{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T06:47:13Z","timestamp":1750315633904,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030969592"},{"type":"electronic","value":"9783030969608"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96960-8_22","type":"book-chapter","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T17:31:02Z","timestamp":1645551062000},"page":"332-346","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Privacy Attitudes and\u00a0COVID Symptom Tracking Apps: Understanding Active Boundary Management by\u00a0Users"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0804-832X","authenticated-orcid":false,"given":"Jinkyung","family":"Park","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7703-9005","authenticated-orcid":false,"given":"Eiman","family":"Ahmed","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9674-7747","authenticated-orcid":false,"given":"Hafiz","family":"Asif","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7420-6947","authenticated-orcid":false,"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8194-2336","authenticated-orcid":false,"given":"Vivek","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,23]]},"reference":[{"key":"22_CR1","volume-title":"The State of Exception","author":"G Agamben","year":"2005","unstructured":"Agamben, G.: The State of Exception. Duke University Press, Durham (2005)"},{"key":"22_CR2","unstructured":"Asif, H.: Chapter 7, Privacy or utility? How to preserve both in outlier analysis. Ph.D. thesis, Rutgers University-Graduate School-Newark (2021)"},{"key":"22_CR3","volume-title":"Understanding Attitudes and Predicting Social Behavior","author":"I Azjen","year":"1980","unstructured":"Azjen, I.: Understanding Attitudes and Predicting Social Behavior. Englewood Cliffs, Bergen (1980)"},{"issue":"4","key":"22_CR4","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MPULS.2020.3008356","volume":"11","author":"J Berglund","year":"2020","unstructured":"Berglund, J.: Tracking COVID-19: there\u2019s an app for that. IEEE Pulse 11(4), 14\u201317 (2020)","journal-title":"IEEE Pulse"},{"key":"22_CR5","unstructured":"Cho, H., Ippolito, D., Yu, Y.W.: Contact tracing mobile apps for COVID-19: privacy considerations and related trade-offs. arXiv preprint arXiv:2003.11511 (2020)"},{"issue":"9","key":"22_CR6","doi-asserted-by":"publisher","first-page":"1018","DOI":"10.1080\/02770903.2017.1388391","volume":"55","author":"S Davis","year":"2018","unstructured":"Davis, S., Peters, D., Calvo, R., Sawyer, S., Foster, J., Smith, L.: \u201cKiss myAsthma\u2019\u2019: using a participatory design approach to develop a self-management app with young people with asthma. J. Asthma 55(9), 1018\u20131027 (2018)","journal-title":"J. Asthma"},{"issue":"1","key":"22_CR7","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev, T., Hart, P.: An extended privacy calculus model for e-commerce transactions. Inf. Syst. Res. 17(1), 61\u201380 (2006)","journal-title":"Inf. Syst. Res."},{"issue":"6497","key":"22_CR8","doi-asserted-by":"publisher","first-page":"1362","DOI":"10.1126\/science.abc0473","volume":"368","author":"DA Drew","year":"2020","unstructured":"Drew, D.A., et al.: Rapid implementation of mobile technology for real-time epidemiology of COVID-19. Science 368(6497), 1362\u20131367 (2020)","journal-title":"Science"},{"key":"22_CR9","unstructured":"Gvili, Y.: Security analysis of the COVID-19 contact tracing specifications by Apple Inc. and Google Inc. IACR Cryptol. ePrint Arch. 2020, 428 (2020)"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Kaptchuk, G., Goldstein, D.G., Hargittai, E., Hofman, J., Redmiles, E.M.: How good is good enough for COVID19 apps? The influence of benefits, accuracy, and privacy on willingness to adopt. arXiv preprint arXiv:2005.04343 (2020)","DOI":"10.1145\/3488307"},{"key":"22_CR11","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.cose.2015.07.002","volume":"64","author":"S Kokolakis","year":"2017","unstructured":"Kokolakis, S.: Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122\u2013134 (2017)","journal-title":"Comput. Secur."},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"159","DOI":"10.2307\/2529310","volume":"33","author":"JR Landis","year":"1977","unstructured":"Landis, J.R., Koch, G.G.: The measurement of observer agreement for categorical data. Biometrics 33, 159\u2013174 (1977)","journal-title":"Biometrics"},{"issue":"3","key":"22_CR13","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1111\/j.1540-4560.1977.tb01880.x","volume":"33","author":"RS Laufer","year":"1977","unstructured":"Laufer, R.S., Wolfe, M.: Privacy as a concept and a social issue: a multidimensional developmental theory. J. Soc. Issues 33(3), 22\u201342 (1977)","journal-title":"J. Soc. Issues"},{"issue":"3","key":"22_CR14","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1016\/j.chb.2010.12.009","volume":"27","author":"KY Lin","year":"2011","unstructured":"Lin, K.Y., Lu, H.P.: Why people use social networking sites: an empirical study integrating network externalities and motivation theory. Comput. Hum. Behav. 27(3), 1152\u20131161 (2011)","journal-title":"Comput. Hum. Behav."},{"key":"22_CR15","doi-asserted-by":"publisher","DOI":"10.4135\/9781071802878","volume-title":"The Content Analysis Guidebook","author":"KA Neuendorf","year":"2017","unstructured":"Neuendorf, K.A.: The Content Analysis Guidebook. SAGE, New York (2017)"},{"issue":"4","key":"22_CR16","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1111\/j.1468-2885.1991.tb00023.x","volume":"1","author":"S Petronio","year":"1991","unstructured":"Petronio, S.: Communication boundary management: a theoretical model of managing disclosure of private information between marital couples. Commun. Theory 1(4), 311\u2013335 (1991)","journal-title":"Commun. Theory"},{"key":"22_CR17","doi-asserted-by":"crossref","DOI":"10.1353\/book4588","volume-title":"Boundaries of Privacy: Dialectics of Disclosure","author":"S Petronio","year":"2002","unstructured":"Petronio, S.: Boundaries of Privacy: Dialectics of Disclosure. Suny Press, Albany (2002)"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Petronio, S.: Communication privacy management theory. In: The International Encyclopedia of Interpersonal Communication, pp. 1\u20139. American Cancer Society (2015)","DOI":"10.1002\/9781118540190.wbeic132"},{"issue":"9","key":"22_CR19","doi-asserted-by":"publisher","first-page":"153","DOI":"10.3390\/fi12090153","volume":"12","author":"AM Ramakrishnan","year":"2020","unstructured":"Ramakrishnan, A.M., Ramakrishnan, A.N., Lagan, S., Torous, J.: From symptom tracking to contact tracing: a framework to explore and assess COVID-19 apps. Future Internet 12(9), 153 (2020)","journal-title":"Future Internet"},{"issue":"4","key":"22_CR20","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1111\/j.1468-2958.1993.tb00309.x","volume":"19","author":"RE Rice","year":"1993","unstructured":"Rice, R.E.: Media appropriateness: using social presence theory to compare traditional and new organizational media. Hum. Commun. Res. 19(4), 451\u2013484 (1993)","journal-title":"Hum. Commun. Res."},{"issue":"1","key":"22_CR21","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","volume":"91","author":"RW Rogers","year":"1975","unstructured":"Rogers, R.W.: A protection motivation theory of fear appeals and attitude change1. J. Psychol. 91(1), 93\u2013114 (1975)","journal-title":"J. Psychol."},{"issue":"8","key":"22_CR22","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1038\/s41591-020-0928-y","volume":"26","author":"T Sharma","year":"2020","unstructured":"Sharma, T., Bashir, M.: Use of apps in the COVID-19 response and the loss of privacy protection. Nat. Med. 26(8), 1165\u20131167 (2020)","journal-title":"Nat. Med."},{"key":"22_CR23","unstructured":"Simko, L., Calo, R., Roesner, F., Kohno, T.: COVID-19 contact tracing and privacy: studying opinion and preferences. arXiv preprint arXiv:2005.06056 (2020)"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Stanton, J.M.: Information technology and privacy: a boundary management perspective. In: Socio-Technical and Human Cognition Elements of Information Systems, pp. 79\u2013103. IGI Global (2003)","DOI":"10.4018\/978-1-59140-104-9.ch005"},{"issue":"2","key":"22_CR25","doi-asserted-by":"publisher","first-page":"152","DOI":"10.24908\/ss.v1i2.3351","volume":"1","author":"JM Stanton","year":"2003","unstructured":"Stanton, J.M., Stam, K.R.: Information technology, privacy, and power within organizations: a view from boundary theory and social exchange perspectives. Surveill. Soc. 1(2), 152\u2013190 (2003)","journal-title":"Surveill. Soc."},{"key":"22_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-030-71292-1_4","volume-title":"Diversity, Divergence, Dialogue","author":"K Walters","year":"2021","unstructured":"Walters, K., Markazi, D.M.: Insights from people\u2019s experiences with AI: privacy management processes. In: Toeppe, K., Yan, H., Chu, S.K.W. (eds.) iConference 2021. LNCS, vol. 12645, pp. 33\u201338. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-71292-1_4"},{"key":"22_CR27","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-030-63086-7_17","volume-title":"Security and Privacy in Communication Networks","author":"H Wen","year":"2020","unstructured":"Wen, H., Zhao, Q., Lin, Z., Xuan, D., Shroff, N.: A study of the privacy of COVID-19 contact tracing apps. In: Park, N., Sun, K., Foresti, S., Butler, K., Saxena, N. (eds.) SecureComm 2020. LNICST, vol. 335, pp. 297\u2013317. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-63086-7_17"},{"key":"22_CR28","unstructured":"WHO: World Health Organization: Who coronavirus (COVID-19) dashboard. https:\/\/covid19.who.int\/. Accessed 15 Sept 2021"},{"key":"22_CR29","unstructured":"WHO: World Health Organization: Who director-general\u2019s opening remarks at the media briefing on covid-19 - 11 March 2020. www.who.int\/director-general\/speeches\/detail\/who-director-general-s-opening-remarks-at-the-media-briefing-on-covid-19--11-march-2020. Accessed 15 Sept 2021"},{"issue":"2","key":"22_CR30","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1111\/hex.13179","volume":"24","author":"SN Williams","year":"2021","unstructured":"Williams, S.N., Armitage, C.J., Tampe, T., Dienes, K.: Public attitudes towards COVID-19 contact tracing apps: a UK-based focus group study. Health Expect. 24(2), 377\u2013385 (2021)","journal-title":"Health Expect."},{"issue":"9","key":"22_CR31","doi-asserted-by":"publisher","first-page":"e0238973","DOI":"10.1371\/journal.pone.0238973","volume":"15","author":"A Wnuk","year":"2020","unstructured":"Wnuk, A., Oleksy, T., Maison, D.: The acceptance of COVID-19 tracking technologies: the role of perceived threat, lack of control, and ideological beliefs. PLoS ONE 15(9), e0238973 (2020)","journal-title":"PLoS ONE"},{"key":"22_CR32","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.adhoc.2012.06.003","volume":"13","author":"E Yoneki","year":"2014","unstructured":"Yoneki, E., Crowcroft, J.: EpiMap: towards quantifying contact networks for understanding epidemiology in developing countries. Ad Hoc Netw. 13, 83\u201393 (2014)","journal-title":"Ad Hoc Netw."}],"container-title":["Lecture Notes in Computer Science","Information for a Better World: Shaping the Global Future"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96960-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T22:49:10Z","timestamp":1700261350000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96960-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030969592","9783030969608"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96960-8_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"iConference","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 February 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 March 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconference2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ischools.org\/iConference","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfTool","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"147","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}