{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:50:58Z","timestamp":1742982658763,"version":"3.40.3"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030939557"},{"type":"electronic","value":"9783030939564"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-93956-4_6","type":"book-chapter","created":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T08:03:00Z","timestamp":1641974580000},"page":"87-107","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Two-Fold Study to\u00a0Investigate Users\u2019 Perception of\u00a0IoT Information Sensitivity Levels and\u00a0Their Willingness to\u00a0Share the\u00a0Information"],"prefix":"10.1007","author":[{"given":"Sanonda Datta","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Stephen","family":"Kaplan","sequence":"additional","affiliation":[]},{"given":"Aubree","family":"Nygaard","sequence":"additional","affiliation":[]},{"given":"Sepideh","family":"Ghanavati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,12]]},"reference":[{"key":"6_CR1","unstructured":"California Consumers\u2019 Privacy Act. https:\/\/oag.ca.gov\/privacy\/ccpa"},{"key":"6_CR2","unstructured":"International Data Corporation Forecast. https:\/\/tinyurl.com\/y694wg2v"},{"key":"6_CR3","unstructured":"IoT Line Up. http:\/\/iotlineup.com\/"},{"key":"6_CR4","unstructured":"Privacy Grade Website. http:\/\/privacygrade.org\/third_party_libraries"},{"key":"6_CR5","unstructured":"Spearman Coefficient. https:\/\/tinyurl.com\/nctpfudu"},{"key":"6_CR6","unstructured":"The EU GDPR - Article 14. https:\/\/eugdpr.org. Accessed 01 May 2020"},{"key":"6_CR7","unstructured":"The Health Insurance Portability and Accountability Act of 1996 (HIPAA)"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"102509","DOI":"10.1016\/j.jnca.2019.102509","volume":"152","author":"M Nobakht","year":"2020","unstructured":"Nobakht, M., et al.: PGFit: static permission analysis of health and fitness apps in IoT programming frameworks. J. Network Comput. Appl. 152, 102509 (2020)","journal-title":"J. Network Comput. Appl."},{"issue":"3","key":"6_CR9","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1057\/ejis.2012.26","volume":"22","author":"RC Nickerson","year":"2013","unstructured":"Nickerson, R.C., et al.: A method for taxonomy development and its application in information systems. Eur. J. Inf. Syst. 22(3), 336\u2013359 (2013). https:\/\/doi.org\/10.1057\/ejis.2012.26","journal-title":"Eur. J. Inf. Syst."},{"key":"6_CR10","unstructured":"Kang, R., et al.: Privacy attitudes of mechanical Turk workers and the US public. In: 10th Symposium on Usable Privacy and Security ($$\\{$$SOUPS$$\\}$$ 2014) (2014)"},{"key":"6_CR11","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/978-3-030-75018-3_8","volume-title":"Research Challenges in Information Science","author":"SD Gupta","year":"2021","unstructured":"Gupta, S.D., Nygaard, A., Kaplan, S., Jain, V., Ghanavati, S.: PHIN: a privacy protected heterogeneous IoT network. In: Cherfi, S., Perini, A., Nurcan, S. (eds.) RCIS 2021. LNBIP, vol. 415, pp. 124\u2013141. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75018-3_8"},{"key":"6_CR12","unstructured":"Mare, S., et al.: Smart devices in AirBnBs: considering privacy and security for both guests and hosts. In: Proceedings on Privacy Enhancing Technologies"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Slavin, R., et al.: PVDetector: a detector of privacy-policy violations for android apps. In: IEEE\/ACM International Conference on Mobile Software Engineering and Systems, pp. 299\u2013300 (2016)","DOI":"10.1145\/2897073.2897720"},{"issue":"3","key":"6_CR14","doi-asserted-by":"publisher","first-page":"66","DOI":"10.2478\/popets-2019-0037","volume":"2019","author":"S Zimmeck","year":"2019","unstructured":"Zimmeck, S., et al.: Maps: scaling privacy compliance analysis to a million apps. Proc. Priv. Enhancing Technol. 2019(3), 66\u201386 (2019)","journal-title":"Proc. Priv. Enhancing Technol."},{"issue":"7","key":"6_CR15","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1080\/1369118X.2018.1543442","volume":"23","author":"M Zimmer","year":"2020","unstructured":"Zimmer, M., et al.: \u2018There\u2019s nothing really they can do with this information\u2019: unpacking how users manage privacy boundaries for personal fitness information. Inf. Commun. Soc. 23(7), 1020\u20131037 (2020)","journal-title":"Inf. Commun. Soc."},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Bhatia, J., Breaux, T.D.: Privacy risk in cybersecurity data sharing. In: ISCS 2016 (2016)","DOI":"10.1145\/2994539.2994541"},{"issue":"6","key":"6_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3267808","volume":"25","author":"J Bhatia","year":"2018","unstructured":"Bhatia, J., Breaux, T.D.: Empirical measurement of perceived privacy risk. ACM Trans. Comput. Hum. Interact. (TOCHI) 25(6), 1\u201347 (2018)","journal-title":"ACM Trans. Comput. Hum. Interact. (TOCHI)"},{"key":"6_CR18","unstructured":"Bokaie, H.M.: Information Retrieval and Semantic Inference from Natural Language Privacy Policies. Ph.D. thesis, The University of Texas at San Antonio (2019)"},{"issue":"3","key":"6_CR19","first-page":"281","volume":"19","author":"T Breaux","year":"2014","unstructured":"Breaux, T., Hibshi, H.: Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements. REJ 19(3), 281\u2013307 (2014)","journal-title":"REJ"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Breaux, T.D., Smullen, D., Hibshi, H.: Detecting repurposing and over-collection in multi-party privacy requirements specifications. In: 2015 IEEE 23rd International Requirements Engineering Conference (RE). IEEE (2015)","DOI":"10.1109\/RE.2015.7320419"},{"key":"6_CR21","unstructured":"Checkit, G.: Smart home device adoption. Article. https:\/\/tinyurl.com\/yba69fcp"},{"key":"6_CR22","unstructured":"Cyber Physical Systems Public Working Group: PRELIMINARY DISCUSSION DRAFT - Framework for Cyber-Physical Systems - Release 0.7 (2015)"},{"issue":"1","key":"6_CR23","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev, T., Hart, P.: An extended privacy calculus model for e-commerce transactions. Inf. Syst. Res. 17(1), 61\u201380 (2006)","journal-title":"Inf. Syst. Res."},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Emami-Naeini, P., Agarwal, Y., Cranor, L.F., Hibshi, H.: Ask the experts: what should be on an IoT privacy and security label? In: 2020 IEEE S&P (2020)","DOI":"10.1109\/SP40000.2020.00043"},{"key":"6_CR25","unstructured":"Emami-Naeini, P., Dheenadhayalan, J., Agarwal, Y., Cranor, L.F.: Which privacy and security attributes most impact consumers\u2019 risk perception and willingness to purchase IoT devices?"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Haney, J., Acar, Y., Furman, S.: \u201cIt\u2019s the company, the government, you and i\u201d: user perceptions of responsibility for smart home privacy and security. In: 30th $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 21) (2021)","DOI":"10.6028\/NIST.IR.8330"},{"key":"6_CR27","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.chb.2018.11.022","volume":"92","author":"D Kim","year":"2019","unstructured":"Kim, D., Park, K., Park, Y., Ahn, J.H.: Willingness to provide personal information: Perspective of privacy calculus in IoT services. Comput. Hum. Behav. 92, 273\u2013281 (2019)","journal-title":"Comput. Hum. Behav."},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Liu, L., Karatas, C., et al.: Toward detection of unsafe driving with wearables. In: Proceedings of the 2015 Workshop on WSA, pp. 27\u201332. ACM (2015)","DOI":"10.1145\/2753509.2753518"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Maitra, S., Suh, B., Ghanavati, S.: Privacy consistency analyzer for android applications. In: 5th International Workshop (ESPRE), pp. 28\u201333 (2018)","DOI":"10.1109\/ESPRE.2018.00011"},{"key":"6_CR30","unstructured":"Markos, E.C.: Consumer privacy: A two essay dissertation examining perceptions of information sensitivity. University of Massachusetts Amherst (2010)"},{"key":"6_CR31","unstructured":"Mekovec, R.: Factors that influence internet users\u2019 privacy perception. In: ITI 2011, pp. 227\u2013232. IEEE (2011)"},{"key":"6_CR32","unstructured":"Michalevsky, Y., Schulman, A.: Powerspy: location tracking using mobile device power analysis. In: 24th $$\\{$$USENIX$$\\}$$ Security Symposium, pp. 785\u2013800 (2015)"},{"issue":"1","key":"6_CR33","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1111\/joca.12111","volume":"51","author":"GR Milne","year":"2017","unstructured":"Milne, G.R., Pettinico, G., Hajjat, F.M., Markos, E.: Information sensitivity typology: mapping the degree and type of risk consumers perceive in personal data sharing. J. Consum. Affairs 51(1), 133\u2013161 (2017)","journal-title":"J. Consum. Affairs"},{"key":"6_CR34","unstructured":"National Science and Technology Council: National Privacy Research Strategy (2016). https:\/\/www.nitrd.gov\/PUBS\/NationalPrivacyResearchStrategy.pdf"},{"key":"6_CR35","unstructured":"Okoyomon, E., Samarin, N., et al.: On the ridiculousness of notice and consent: contradictions in app privacy policies (2019)"},{"key":"6_CR36","unstructured":"Safi, M., Reyes, I., Egelman, S.: Inference of user demographics and habits from seemingly benign smartphone sensors"},{"key":"6_CR37","unstructured":"Smullen, D.: Modeling, analyzing, and consistency checking privacy requirements using eddy. In: Proceedings of the Symposium and Bootcamp on the Science of Security"},{"key":"6_CR38","unstructured":"Torabi, S.: Understanding users\u2019 perception toward sharing personal health information"},{"key":"6_CR39","unstructured":"Weible, R.J.: Privacy and data: An empirical study of the influence of types of data and situational context upon privacy perceptions. Ph.D. thesis, MSU (1993)"},{"issue":"2","key":"6_CR40","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s10660-013-9111-6","volume":"13","author":"F Xu","year":"2013","unstructured":"Xu, F., Michael, K., Chen, X.: Factors affecting privacy disclosure on social network sites: an integrated model. Electron. Comm. Res. 13(2), 151\u2013168 (2013)","journal-title":"Electron. Comm. Res."},{"key":"6_CR41","doi-asserted-by":"crossref","unstructured":"Yu, L., Lou, X.: Can we trust the privacy policies of android apps? IEEE (2016)","DOI":"10.1109\/DSN.2016.55"},{"key":"6_CR42","unstructured":"Zeng, E.: End user security and privacy concerns with smart homes. In: SOUPS"},{"key":"6_CR43","doi-asserted-by":"crossref","unstructured":"Zheng, S., Apthorpe, N., Chetty, M., Feamster, N.: User perceptions of smart home IoT privacy. In: Proceedings of the ACM on Human-Computer Interaction (CSCW), vol. 2","DOI":"10.1145\/3274469"},{"key":"6_CR44","unstructured":"Creswell, J.W., Creswell, J.D.: Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. Sage publications (2017)"}],"container-title":["Communications in Computer and Information Science","Emerging Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-93956-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T04:28:32Z","timestamp":1651811312000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-93956-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030939557","9783030939564"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-93956-4_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"12 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Emerging Information Security and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eisa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eisa.compute.dtu.dk\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}