{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T19:43:39Z","timestamp":1761767019800,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030827854"},{"type":"electronic","value":"9783030827861"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100006498","name":"Clemson University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006498","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This chapter introduces the book <jats:italic>Modern Socio-Technical Perspectives on Privacy<\/jats:italic>. The book informs academic researchers and industry professionals about the socio-technical privacy challenges related to modern networked technologies. This chapter provides a working definition of privacy, describes the envisioned audiences of this book, and summarizes the key aspects covered in each chapter. The chapter concludes with an invitation to join our community of privacy researchers and practitioners at <jats:ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"uri\" xlink:href=\"http:\/\/modern-privacy.org\">modern-privacy.org<\/jats:ext-link>.<\/jats:p>","DOI":"10.1007\/978-3-030-82786-1_1","type":"book-chapter","created":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T09:02:49Z","timestamp":1644397369000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Introduction and Overview"],"prefix":"10.1007","author":[{"given":"Bart P.","family":"Knijnenburg","sequence":"first","affiliation":[]},{"given":"Xinru","family":"Page","sequence":"additional","affiliation":[]},{"given":"Pamela","family":"Wisniewski","sequence":"additional","affiliation":[]},{"given":"Heather Richter","family":"Lipford","sequence":"additional","affiliation":[]},{"given":"Nicholas","family":"Proferes","sequence":"additional","affiliation":[]},{"given":"Jennifer","family":"Romano","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,9]]},"reference":[{"key":"1_CR1","volume-title":"Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information","author":"B Auxier","year":"2019","unstructured":"Auxier, Brooke, Rainie Lee, Monica Anderson, Andrew Perrin, Madhu Kumar, and Erica Turner. 2019. Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information. Pew Research Center."},{"issue":"2","key":"1_CR2","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1080\/07370024.2016.1203791","volume":"32","author":"O Ayalon","year":"2017","unstructured":"Ayalon, Oshrat, and Eran Toch. 2017. Not even past: Information aging and temporal privacy in online social networks. Human Computer Interaction 32 (2): 73\u2013102.","journal-title":"Human Computer Interaction"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Lampinen, Airi, Fred Stutzman, and Markus Bylund. 2011. Privacy for a networked world: Bridging theory and design. In CHI\u201911 Extended Abstracts on Human Factors in Computing Systems, ACM, 2441\u20132444.","DOI":"10.1145\/1979742.1979579"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Lipford, Heather Richter, Pamela J. Wisniewski, Cliff Lampe, Lorraine Kisselburgh, and Kelly Caine. 2012. Reconciling privacy with social media. In Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work Companion, ACM, 19\u201320.","DOI":"10.1145\/2141512.2141523"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Stark, Luke, Jen King, Xinru Page, et al. 2016. Bridging the gap between privacy by design and privacy in practice. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, ACM, 3415\u20133422.","DOI":"10.1145\/2851581.2856503"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Vitak, Jessica, Pamela Wisniewski, Xinru Page, et al. 2015. The future of networked privacy: Challenges and opportunities. In Proceedings of the 18th ACM Conference Companion on Computer Supported Cooperative Work & Social Computing, ACM, 267\u2013272.","DOI":"10.1145\/2685553.2685554"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Wilkinson, Daricia, Moses Namara, Karla Badillo-Urquiola, et al. 2018. Moving beyond a \u201cOne-size Fits All\u201d: Exploring individual differences in privacy. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, ACM, W16:1\u2013W16:8.","DOI":"10.1145\/3170427.3170617"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Barkhuus, Louise. 2012. The mismeasurement of privacy: Using contextual integrity to reconsider privacy in HCI. In Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, ACM, 367\u2013376.","DOI":"10.1145\/2207676.2207727"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Ackerman, Mark S., Lorrie Faith Cranor, and Joseph Reagle. 1999. Privacy in e-commerce: Examining user scenarios and privacy preferences. In Proceedings of the 1st ACM conference on electronic commerce, ACM Press, 1\u20138.","DOI":"10.1145\/336992.336995"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Pamela Wisniewski, A. K. M., Najmul Islam, Bart P. Knijnenburg, and Sameer Patil. 2015. Give social network users the privacy they want. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, ACM, 1427\u20131441.","DOI":"10.1145\/2675133.2675256"},{"key":"1_CR11","volume-title":"Understanding Privacy","author":"DJ Solove","year":"2008","unstructured":"Solove, Daniel J. 2008. Understanding Privacy. Cambridge, MA: Harvard University Press."},{"key":"1_CR12","volume-title":"Privacy and Freedom","author":"AF Westin","year":"1967","unstructured":"Westin, Alan F. 1967. Privacy and Freedom. New York, NY: Atheneum."},{"key":"1_CR13","first-page":"745","volume":"44","author":"DJ Solove","year":"2007","unstructured":"Solove, Daniel J. 2007. \u201cI\u2019ve Got Nothing to Hide\u201d and other misunderstandings of privacy. San Diego Law Review 44: 745.","journal-title":"San Diego Law Review"},{"issue":"3","key":"1_CR14","doi-asserted-by":"publisher","first-page":"477","DOI":"10.2307\/40041279","volume":"154","author":"DJ Solove","year":"2006","unstructured":"\u2014\u2014\u2014. 2006. A taxonomy of privacy. University of Pennsylvania Law Review 154 (3): 477\u2013564.","journal-title":"University of Pennsylvania Law Review"},{"issue":"3\u20134","key":"1_CR15","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, Cynthia, and Aaron Roth. 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9 (3\u20134): 211\u2013407.","journal-title":"Foundations and Trends\u00ae in Theoretical Computer Science"},{"key":"1_CR16","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.ijhcs.2016.09.006","volume":"98","author":"PJ Wisniewski","year":"2017","unstructured":"Wisniewski, Pamela J., Bart P. Knijnenburg, and Heather Richter Lipford. 2017. Making privacy personal: Profiling social network users to inform privacy education and nudging. International Journal of Human-Computer Studies 98: 95\u2013108.","journal-title":"International Journal of Human-Computer Studies"},{"issue":"3","key":"1_CR17","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1207\/s15327051hci2103_2","volume":"21","author":"P Dourish","year":"2006","unstructured":"Dourish, Paul, and Ken Anderson. 2006. Collective information practice: Emploring privacy and security as social and cultural phenomena. Human Computer Interaction 21 (3): 319\u2013342.","journal-title":"Human Computer Interaction"},{"key":"1_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5817\/CP2016-1-4","volume":"10","author":"H Jia","year":"2016","unstructured":"Jia, Haiyan, and Xu. Heng. 2016. Measuring individuals\u2019 concerns over collective privacy on social networking sites. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 10: 1.","journal-title":"Cyberpsychology: Journal of Psychosocial Research on Cyberspace"},{"key":"1_CR19","doi-asserted-by":"publisher","DOI":"10.1515\/9780804772891","volume-title":"Privacy in Context: Technology, Policy, and the Integrity of Social Life","author":"H Nissenbaum","year":"2009","unstructured":"Nissenbaum, Helen. 2009. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford, CA: Stanford Law Books."},{"issue":"2","key":"1_CR20","doi-asserted-by":"publisher","first-page":"167","DOI":"10.2307\/249477","volume":"20","author":"HJ Smith","year":"1996","unstructured":"Smith, H. Jeff, Sandra J. Milberg, and Sandra J. Burke. 1996. Information privacy: Measuring individuals\u2019 concerns about organizational practices. MIS Quarterly 20 (2): 167\u2013196.","journal-title":"MIS Quarterly"},{"issue":"4","key":"1_CR21","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1287\/isre.2015.0600","volume":"26","author":"T Dinev","year":"2015","unstructured":"Dinev, Tamara, Allen R. McConnell, and H. Jeff Smith. 2015. Research Commentary\u2014Informing privacy research through information systems, psychology, and behavioral economics: Thinking outside the \u201cAPCO\u201d box. Information Systems Research 26 (4): 639\u2013655.","journal-title":"Information Systems Research"}],"container-title":["Modern Socio-Technical Perspectives on Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-82786-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T10:08:08Z","timestamp":1648548488000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-82786-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030827854","9783030827861"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-82786-1_1","relation":{},"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"9 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}