{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:08:51Z","timestamp":1763507331412,"version":"3.45.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030902377"},{"type":"electronic","value":"9783030902384"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-90238-4_15","type":"book-chapter","created":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T07:11:14Z","timestamp":1637305874000},"page":"198-216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Partial Consent: A Study on User Preference for Informed Consent"],"prefix":"10.1007","author":[{"given":"Sven","family":"Bock","sequence":"first","affiliation":[]},{"given":"Ashraf Ferdouse","family":"Chowdhury","sequence":"additional","affiliation":[]},{"given":"Nurul","family":"Momen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,20]]},"reference":[{"issue":"1","key":"15_CR1","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2005.22","volume":"3","author":"A Acquisti","year":"2005","unstructured":"Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Secur. Priv. 3(1), 26\u201333 (2005)","journal-title":"IEEE Secur. Priv."},{"issue":"2","key":"15_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/147078539703900202","volume":"39","author":"G Albaum","year":"1997","unstructured":"Albaum, G.: The Likert scale revisited. Mark. Res. Soc. J. 39(2), 1\u201321 (1997)","journal-title":"Mark. Res. Soc. J."},{"key":"15_CR3","unstructured":"Bock, S.: My data is mine - users\u2019 handling of personal data in everyday life. In: SICHERHEIT 2018, pp. 261\u2013266. Gesellschaft f\u00fcr Informatik e.V., Bonn (2018)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Bock, S., Momen, N.: Nudging the user with privacy indicator: a study on the app selection behavior of the user. In: Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society. ACM (2020)","DOI":"10.1145\/3419249.3420111"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1007\/978-3-030-60114-0_39","volume-title":"HCI International 2020 - Late Breaking Papers: User Experience Design and Case Studies","author":"S Bock","year":"2020","unstructured":"Bock, S., Momen, N.: A study on user preference: influencing app selection decision with privacy indicator. In: Stephanidis, C., Marcus, A., Rosenzweig, E., Rau, P.-L.P., Moallem, A., Rauterberg, M. (eds.) HCII 2020. LNCS, vol. 12423, pp. 579\u2013599. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-60114-0_39"},{"key":"15_CR6","unstructured":"Brown, B.: Studying the internet experience. HP laboratories technical report HPL 49 (2001)"},{"key":"15_CR7","unstructured":"European Commission: Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation). Off. J. Eur. Union L119 (2016)"},{"key":"15_CR8","unstructured":"Norwegian Consumer Council: Deceived by design, how tech companies use dark patterns to discourage us from exercising our rights to privacy. Norwegian Consumer Council Report (2018)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Custers, B.: Click here to consent forever: expiry dates for informed consent. Big Data Soc. 3(1) (2016)","DOI":"10.1177\/2053951715624935"},{"key":"15_CR10","volume-title":"A history and Theory of Informed Consent","author":"RR Faden","year":"1986","unstructured":"Faden, R.R., Beauchamp, T.L.: A history and Theory of Informed Consent. Oxford University Press, Oxford (1986)"},{"key":"15_CR11","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-59171-1_1","volume-title":"Trust Management XI","author":"L Fritsch","year":"2017","unstructured":"Fritsch, L.: Partial commitment \u2013 \u201ctry before you buy\u2019\u2019 and \u201cbuyer\u2019s remorse\u2019\u2019 for personal data in big data & machine learning. In: Stegh\u00f6fer, J.-P., Esfandiari, B. (eds.) IFIPTM 2017. IAICT, vol. 505, pp. 3\u201311. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59171-1_1"},{"key":"15_CR12","first-page":"117","volume-title":"Open Identity Summit 2017","author":"L Fritsch","year":"2017","unstructured":"Fritsch, L., Momen, N.: Derived partial identities generated from app permissions. In: Fritsch, L., Ro\u00dfnagel, H., H\u00fchnlein, D. (eds.) Open Identity Summit 2017, pp. 117\u2013130. Gesellschaft f\u00fcr Informatik, Bonn (2017)"},{"issue":"7","key":"15_CR13","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/s11623-010-0128-x","volume":"34","author":"C Fuchs","year":"2010","unstructured":"Fuchs, C.: Facebook, web 2.0 und \u00f6konomische \u00fcberwachung. Datenschutz Datensicherheit-DuD 34(7), 453\u2013458 (2010)","journal-title":"Datenschutz Datensicherheit-DuD"},{"issue":"3","key":"15_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10664-020-09934-4","volume":"26","author":"M Hatamian","year":"2021","unstructured":"Hatamian, M., Wairimu, S., Momen, N., Fritsch, L.: A privacy and security analysis of early-deployed COVID-19 contact tracing android apps. Empir. Softw. Eng. 26(3), 1\u201351 (2021)","journal-title":"Empir. Softw. Eng."},{"key":"15_CR15","unstructured":"Momen, N.: Measuring apps\u2019 privacy-friendliness: introducing transparency to apps\u2019 data access behavior. Ph.D. thesis, Karlstad University, Department of Mathematics and Computer Science (2020)"},{"key":"15_CR16","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/978-3-030-50732-9_74","volume-title":"HCI International 2020 - Posters","author":"N Momen","year":"2020","unstructured":"Momen, N., Bock, S.: Neither do i want to accept, nor decline; is there an alternative? In: Stephanidis, C., Antona, M. (eds.) HCII 2020. CCIS, vol. 1226, pp. 573\u2013580. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-50732-9_74"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Momen, N., Bock, S., Fritsch, L.: Accept - maybe - decline: introducing partial consent for the permission-based access control model of Android. In: Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, SACMAT 2020, pp. 71\u201380. ACM (2020)","DOI":"10.1145\/3381991.3395603"},{"key":"15_CR18","unstructured":"Momen, N., Fritsch, L.: App-generated digital identities extracted through android permission-based data access - a survey of app privacy. In: SICHERHEIT 2020, pp. 15\u201328. Gesellschaft f\u00fcr Informatik e.V., Bonn (2020)"},{"issue":"6","key":"15_CR19","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MSEC.2019.2938445","volume":"17","author":"N Momen","year":"2019","unstructured":"Momen, N., Hatamian, M., Fritsch, L.: Did app privacy improve after the GDPR? IEEE Secur. Priv. 17(6), 10\u201320 (2019)","journal-title":"IEEE Secur. Priv."},{"key":"15_CR20","doi-asserted-by":"publisher","unstructured":"Momen, N., Pulls, T., Fritsch, L., Lindskog, S.: How much privilege does an app need? Investigating resource usage of android apps (short paper). In: 2017 15th Annual Conference on Privacy, Security and Trust (PST), pp. 268\u20132685 (2017). https:\/\/doi.org\/10.1109\/PST.2017.00039","DOI":"10.1109\/PST.2017.00039"}],"container-title":["Lecture Notes in Computer Science","HCI International 2021 - Late Breaking Papers: Design and User Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-90238-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:05:06Z","timestamp":1763507106000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-90238-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030902377","9783030902384"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-90238-4_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"20 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}