{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:00:11Z","timestamp":1742943611742,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030856090"},{"type":"electronic","value":"9783030856106"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-85610-6_38","type":"book-chapter","created":{"date-parts":[[2021,8,25]],"date-time":"2021-08-25T06:03:15Z","timestamp":1629871395000},"page":"665-675","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Communicating Privacy: User Priorities for Privacy Requirements in Home Energy Applications"],"prefix":"10.1007","author":[{"given":"Lisa","family":"Diamond","sequence":"first","affiliation":[]},{"given":"Peter","family":"Fr\u00f6hlich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,26]]},"reference":[{"key":"38_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MPRV.2017.2940957","volume":"16","author":"J Hong","year":"2017","unstructured":"Hong, J.: The privacy landscape of pervasive computing. IEEE Perv. Comput. 16, 40\u201348 (2017)","journal-title":"IEEE Perv. Comput."},{"key":"38_CR2","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/MSP.2017.4251118","volume":"15","author":"R Chow","year":"2017","unstructured":"Chow, R.: The last mile for IoT privacy. IEEE Secur. Priv. 15, 73\u201376 (2017)","journal-title":"IEEE Secur. Priv."},{"key":"38_CR3","doi-asserted-by":"crossref","unstructured":"Cuijpers, C., Koops, B.-J.: Smart metering and privacy in Europe: lessons from the Dutch case. In: Social Science Research Network, Rochester, NY (2013)","DOI":"10.1007\/978-94-007-5170-5_12"},{"key":"38_CR4","doi-asserted-by":"publisher","first-page":"806","DOI":"10.1016\/j.scs.2017.12.041","volume":"38","author":"MA Ferrag","year":"2018","unstructured":"Ferrag, M.A., Maglaras, L.A., Janicke, H., Jiang, J., Shu, L.: A systematic review of data protection and privacy preservation schemes for smart grid communications. Sustain. Cities Soc. 38, 806\u2013835 (2018)","journal-title":"Sustain. Cities Soc."},{"key":"38_CR5","series-title":"Computer Communications and Networks","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-319-08470-1_15","volume-title":"Privacy in a Digital, Networked World","author":"S Uludag","year":"2015","unstructured":"Uludag, S., Zeadally, S., Badra, M.: Techniques, taxonomy, and challenges of privacy protection in the smart grid. In: Zeadally, S., Badra, M. (eds.) Privacy in a Digital, Networked World. CCN, pp. 343\u2013390. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-08470-1_15"},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"Jackson, C.B., Wang, Y.: Addressing the privacy paradox through personalized privacy notifications. In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 2, p. 68 (2018)","DOI":"10.1145\/3214271"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Acquisti, A., et al.: Nudges for privacy and security: understanding and assisting users\u2019 choices online. ACM Comput. Surv. (CSUR) 50, 44 (2017)","DOI":"10.1145\/3054926"},{"key":"38_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-540-40956-4_8","volume-title":"Privacy Enhancing Technologies","author":"AS Patrick","year":"2003","unstructured":"Patrick, A.S., Kenny, S.: From privacy legislation to interface design: implementing information privacy in human-computer interactions. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 107\u2013124. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-40956-4_8"},{"key":"38_CR9","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-319-92925-5_14","volume-title":"Privacy and Identity 2017","author":"P Raschke","year":"2017","unstructured":"Raschke, P., K\u00fcpper, A., Drozd, O., Kirrane, S.: Designing a GDPR-compliant and usable privacy dashboard. In: Hansen, M., Kosta, E., Nai-Fovino, I., Fischer-H\u00fcbner, S. (eds.) Privacy and Identity 2017. IFIP AICT, vol. 526, pp. 221\u2013236. Springer, Cham. (2017). https:\/\/doi.org\/10.1007\/978-3-319-92925-5_14"},{"key":"38_CR10","doi-asserted-by":"crossref","unstructured":"Kelley, P.G., Bresee, J., Cranor, L.F., Reeder, R.W.: A nutrition label for privacy. In: Proceedings of the 5th Symposium on Usable Privacy and Security, p. 4. ACM (2009)","DOI":"10.1145\/1572532.1572538"},{"key":"38_CR11","unstructured":"Fox, G., Tonge, C., Lynn, T., Mooney, J.: Communicating compliance: developing a GDPR privacy label (2018)"},{"key":"38_CR12","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1016\/j.rser.2016.01.011","volume":"59","author":"ML Tuballa","year":"2016","unstructured":"Tuballa, M.L., Abundo, M.L.: A review of the development of smart grid technologies. Renew. Sustain. Energy Rev. 59, 710\u2013725 (2016). https:\/\/doi.org\/10.1016\/j.rser.2016.01.011","journal-title":"Renew. Sustain. Energy Rev."},{"key":"38_CR13","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1016\/j.enpol.2011.11.049","volume":"41","author":"E McKenna","year":"2012","unstructured":"McKenna, E., Richardson, I., Thomson, M.: Smart meter data: balancing consumer privacy concerns with legitimate applications. Energy Policy 41, 807\u2013814 (2012). https:\/\/doi.org\/10.1016\/j.enpol.2011.11.049","journal-title":"Energy Policy"},{"key":"38_CR14","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.enpol.2013.03.025","volume":"59","author":"E D\u00fctschke","year":"2013","unstructured":"D\u00fctschke, E., Paetz, A.-G.: Dynamic electricity pricing\u2014which programs do consumers prefer? Energy Policy 59, 226\u2013234 (2013). https:\/\/doi.org\/10.1016\/j.enpol.2013.03.025","journal-title":"Energy Policy"},{"key":"38_CR15","doi-asserted-by":"publisher","first-page":"1205","DOI":"10.1037\/a0039650","volume":"141","author":"B Karlin","year":"2015","unstructured":"Karlin, B., Zinger, J.F., Ford, R.: The effects of feedback on energy conservation: a meta-analysis. Psychol. Bull. 141, 1205\u20131227 (2015). https:\/\/doi.org\/10.1037\/a0039650","journal-title":"Psychol. Bull."},{"key":"38_CR16","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/s10603-011-9177-2","volume":"35","author":"A-G Paetz","year":"2012","unstructured":"Paetz, A.-G., D\u00fctschke, E., Fichtner, W.: Smart homes as a means to sustainable energy consumption: a study of consumer perceptions. J. Consum. Policy 35, 23\u201341 (2012)","journal-title":"J. Consum. Policy"},{"key":"38_CR17","doi-asserted-by":"publisher","first-page":"1675","DOI":"10.1016\/j.rser.2017.07.018","volume":"82","author":"R Zafar","year":"2018","unstructured":"Zafar, R., Mahmood, A., Razzaq, S., Ali, W., Naeem, U., Shehzad, K.: Prosumer based energy management and sharing in smart grid. Renew. Sustain. Energy Rev. 82, 1675\u20131684 (2018). https:\/\/doi.org\/10.1016\/j.rser.2017.07.018","journal-title":"Renew. Sustain. Energy Rev."},{"key":"38_CR18","doi-asserted-by":"publisher","first-page":"2011","DOI":"10.1109\/TCE.2010.5606359","volume":"56","author":"HS Cho","year":"2010","unstructured":"Cho, H.S., Yamazaki, T., Hahn, M.: AERO: extraction of user\u2019s activities from electric power consumption data. IEEE Trans. Consum. Electron. 56, 2011\u20132018 (2010). https:\/\/doi.org\/10.1109\/TCE.2010.5606359","journal-title":"IEEE Trans. Consum. Electron."},{"key":"38_CR19","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSP.2009.76","volume":"7","author":"P McDaniel","year":"2009","unstructured":"McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Secur. Privacy 7, 75\u201377 (2009). https:\/\/doi.org\/10.1109\/MSP.2009.76","journal-title":"IEEE Secur. Privacy"},{"key":"38_CR20","doi-asserted-by":"crossref","unstructured":"C\u00e1rdenas, A.A., Safavi-Naini, R.: Security and privacy in the smart grid. In: Handbook on Securing Cyber-Physical Critical Infrastructure, pp. 637\u2013654. Elsevier (2012)","DOI":"10.1016\/B978-0-12-415815-3.00025-X"},{"key":"38_CR21","doi-asserted-by":"publisher","unstructured":"Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., Irwin, D.: Private memoirs of a smart meter. In: Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building, pp. 61\u201366. ACM, New York (2010). https:\/\/doi.org\/10.1145\/1878431.1878446.","DOI":"10.1145\/1878431.1878446"},{"key":"38_CR22","unstructured":"National Institute of Standards and Technology (NIST), U.S. Department of Commerce: Guidelines for Smart Grid Cyber Security, vol. 2, Privacy and the Smart Grid (NISTIR 7628r1). National Institute of Standard and Technology (NIST), U.S. Department of Commerce (2014)"},{"key":"38_CR23","unstructured":"O2: Effectively engaging consumers to ensure smart meter success (2013)"},{"key":"38_CR24","unstructured":"Seshadri, P., Barton, C., Manfred, K.: Capturing the value of smart meters (2010).www.bcgperspectives.com"},{"key":"38_CR25","unstructured":"Valocchi, M., Juliano, J.: Knowledge is power: driving smarter energy usage through consumer education. IBM Inst. Bus. (2012)"},{"key":"38_CR26","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1016\/j.enpol.2011.11.047","volume":"41","author":"T Krishnamurti","year":"2012","unstructured":"Krishnamurti, T., et al.: Preparing for smart grid technologies: a behavioral decision research approach to understanding consumer expectations about smart meters. Energy Policy 41, 790\u2013797 (2012). https:\/\/doi.org\/10.1016\/j.enpol.2011.11.047","journal-title":"Energy Policy"},{"key":"38_CR27","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/j.enpol.2013.08.043","volume":"63","author":"N Balta-Ozkan","year":"2013","unstructured":"Balta-Ozkan, N., Davidson, R., Bicket, M., Whitmarsh, L.: Social barriers to the adoption of smart homes. Energy Policy 63, 363\u2013374 (2013)","journal-title":"Energy Policy"},{"key":"38_CR28","unstructured":"Wimberly, J.: Separating smart grid from smart meters? Consumer perceptions and expectations of smart grid. EcoAlign (2010)"},{"key":"38_CR29","unstructured":"Lundin, B.V.: Breaking down consumer privacy barriers. http:\/\/www.smartgridnews.com\/story\/breaking-down-consumer-privacy-barriers\/2015-03-10. Accessed 14 Mar 2015"},{"key":"38_CR30","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.erss.2015.08.022","volume":"9","author":"S D\u00f6belt","year":"2015","unstructured":"D\u00f6belt, S., Jung, M., Busch, M., Tscheligi, M.: Consumers\u2019 privacy concerns and implications for a privacy preserving smart grid architecture\u2014results of an Austrian study. Energy Res. Soc. Sci. 9, 137\u2013145 (2015). https:\/\/doi.org\/10.1016\/j.erss.2015.08.022","journal-title":"Energy Res. Soc. Sci."},{"key":"38_CR31","unstructured":"Consumer Futures, R.: Smart and clear. Customer attitudes to communicating rights and choices on energy data privacy and access (2014)"},{"key":"38_CR32","doi-asserted-by":"crossref","unstructured":"Diamond, L., Schrammel, J., Fr\u00f6hlich, P., Regal, G., Tscheligi, M.: Privacy in the smart grid: end-user concerns and requirements. In: Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct, pp. 189\u2013196 (2018)","DOI":"10.1145\/3236112.3236139"},{"key":"38_CR33","doi-asserted-by":"publisher","first-page":"167","DOI":"10.2307\/249477","volume":"20","author":"HJ Smith","year":"1996","unstructured":"Smith, H.J., Milberg, S.J., Burke, S.J.: Information privacy: measuring individuals\u2019 concerns about organizational practices. MIS Q. 20, 167 (1996). https:\/\/doi.org\/10.2307\/249477","journal-title":"MIS Q."},{"key":"38_CR34","first-page":"196","volume":"8","author":"K Karrer","year":"2009","unstructured":"Karrer, K., Glaser, C., Clemens, C., Bruder, C.: Technikaffinit\u00e4t erfassen\u2013der Fragebogen TA-EG. Der Mensch im Mittelpunkt technischer Systeme. 8, 196\u2013201 (2009)","journal-title":"Der Mensch im Mittelpunkt technischer Systeme."}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-85610-6_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,3]],"date-time":"2021-12-03T22:15:48Z","timestamp":1638569748000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-85610-6_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030856090","9783030856106"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-85610-6_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"26 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTERACT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"interact2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.interact2021.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"680","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"105","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}