{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T21:06:36Z","timestamp":1747256796243,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031055621"},{"type":"electronic","value":"9783031055638"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-05563-8_8","type":"book-chapter","created":{"date-parts":[[2022,5,13]],"date-time":"2022-05-13T20:08:55Z","timestamp":1652472535000},"page":"107-123","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["User Experience, Knowledge, Perceptions, and Behaviors Associated with Internet of Things (IoT) Device Information Privacy"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4338-7052","authenticated-orcid":false,"given":"Maria","family":"Chaparro Osman","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0887-0265","authenticated-orcid":false,"given":"Andrew","family":"Nakushian","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1095-3433","authenticated-orcid":false,"given":"Summer","family":"Rebensky","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3186-0594","authenticated-orcid":false,"given":"Tricia","family":"Prior","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0859-4785","authenticated-orcid":false,"given":"Meredith","family":"Carroll","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,16]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","unstructured":"Suresh, P., Daniel, J.V., Parthasarathy, V., Aswathy, R.H., Bajaj, K.: Cyberspace: Post-Snowden. Strategic Analysis, 4, 582 A state of the art review on the Internet of Things (IoT) history, technology and fields of deployment. In: 2014 International Conference on Science Engineering and Management Research (ICSEMR), pp. 1\u20138 (2014). https:\/\/doi.org\/10.1109\/ICSEMR.2014.7043637","DOI":"10.1109\/ICSEMR.2014.7043637"},{"issue":"2","key":"8_CR2","first-page":"17","volume":"2","author":"Y Sattarova Feruza","year":"2007","unstructured":"Sattarova Feruza, Y., Kim, T.H.: IT security review: privacy, protection, access control, assurance and system security. Int. J. Multimedia Ubiquitous Eng. 2(2), 17\u201332 (2007)","journal-title":"Int. J. Multimedia Ubiquitous Eng."},{"issue":"6221","key":"8_CR3","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.aaa1465","volume":"347","author":"A Acquisti","year":"2015","unstructured":"Acquisti, A., Brandimarte, L., Loewenstein, G.: Privacy and human behavior in the age of information. Science 347(6221), 509\u2013514 (2015)","journal-title":"Science"},{"key":"8_CR4","doi-asserted-by":"publisher","unstructured":"Zheng, S., Apthorpe, N., Chetty, M., Feamster, N.:\u00a0User Perceptions of Smart Home IoT Privacy (2018). https:\/\/doi.org\/10.1145\/3274469","DOI":"10.1145\/3274469"},{"key":"8_CR5","unstructured":"Olmstead, K., Smith, A.: What the Public Knows About Cybersecurity. The Pew Research Center (2017)"},{"key":"8_CR6","doi-asserted-by":"publisher","unstructured":"Williams, M., Nurse, J.R.C., Creese, S.: Privacy is the Boring Bit: user perceptions and behaviour in the Internet-of-Things. In: 15th Annual Conference on Privacy, Security, and Trust (PST), pp. 181\u201318109 (2017). https:\/\/doi.org\/10.1109\/PST.2017.00029","DOI":"10.1109\/PST.2017.00029"},{"issue":"3","key":"8_CR7","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1002\/asi.24113","volume":"70","author":"PF Wu","year":"2019","unstructured":"Wu, P.F.: The privacy paradox in the context of online social networking: a self-identity perspective. J. Am. Soc. Inf. Sci. 70(3), 207\u2013217 (2019). https:\/\/doi.org\/10.1002\/asi.24113","journal-title":"J. Am. Soc. Inf. Sci."},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.cose.2018.04.002","volume":"77","author":"N Gerber","year":"2018","unstructured":"Gerber, N., Gerber, P., Volkamer, M.: Explaining the privacy paradox: a systematic review of literature investigating privacy attitude and behavior. Comput. Secur. 77, 226\u2013261 (2018)","journal-title":"Comput. Secur."},{"key":"8_CR9","unstructured":"Rittenberg, L., Tregarthen, T.: Principles of Microeconomics. Saylor (2018)"},{"issue":"2","key":"8_CR10","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1111\/jcc4.12052","volume":"19","author":"M Taddicken","year":"2014","unstructured":"Taddicken, M.: The \u2018privacy paradox\u2019 in the social web: the impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. J. Comput.-Mediat. Commun. 19(2), 248\u2013273 (2014)","journal-title":"J. Comput.-Mediat. Commun."},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Aleisa, N., Renaud, K., Bongiovanni, I.: The privacy paradox applies to IoT devices too: a Saudi Arabian study.\u00a0Comput. Secur. 96 101897 (2020)","DOI":"10.1016\/j.cose.2020.101897"},{"key":"8_CR12","doi-asserted-by":"publisher","unstructured":"Kokolakis, S.: Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122\u2013134 (2017) https:\/\/doi.org\/10.1016\/j.cose.2020.101897","DOI":"10.1016\/j.cose.2020.101897"},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.chb.2017.12.001","volume":"81","author":"H Choi","year":"2018","unstructured":"Choi, H., Park, J., Jung, Y.: The role of privacy fatigue in online privacy behavior. Comput. Hum. Behav. 81, 42\u201351 (2018). https:\/\/doi.org\/10.1016\/j.chb.2017.12.001","journal-title":"Comput. Hum. Behav."},{"key":"8_CR14","unstructured":"Keith, M.J., Maynes, C., Lowry, P.B., Babb, J.: Privacy fatigue: the effect of privacy control complexity on consumer electronic information disclosure. In: International Conference on Information Systems (ICIS 2014), Auckland, New Zealand, December, pp. 14\u201317 (2014)"},{"key":"8_CR15","unstructured":"Kang, R., Dabbish, L., Fruchter, N., Kiesler, S.: My data just goes everywhere: user mental models of the internet and implications for privacy and security. In: 2015 Symposium on Usable Privacy and Security, pp. 39\u201352 (2015)"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-030-77392-2_23","volume-title":"HCI for Cybersecurity, Privacy and Trust","author":"S Rebensky","year":"2021","unstructured":"Rebensky, S., Carroll, M., Nakushian, A., Chaparro, M., Prior, T.: Understanding the last line of defense: human response to cybersecurity events. In: Moallem, A. (ed.) HCII 2021. LNCS, vol. 12788, pp. 353\u2013366. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77392-2_23"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Burns, A., Roberts, T., Posey, C., Bennett, R., Courtney, J.: Assessing the role of security education, training, and awareness on \u2018insiders\u2019 security-related behavior: an expectancy theory approach. In: 2015 48th Hawaii International Conference on System Sciences, pp. 3930\u20133940 (2015)","DOI":"10.1109\/HICSS.2015.471"},{"issue":"4","key":"8_CR18","first-page":"570","volume":"47","author":"KH Tan","year":"2017","unstructured":"Tan, K.H., Zhan, Y.: Improving new product development using big data: a case study of an electronics company. RD Manage. 47(4), 570\u2013582 (2017)","journal-title":"RD Manage."},{"key":"8_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2021.120681","volume":"167","author":"S Ribeiro-Navarrete","year":"2021","unstructured":"Ribeiro-Navarrete, S., Saura, J.R., Palacios-Marqu\u00e9s, D.: Towards a new era of mass data collection: assessing pandemic surveillance technologies to preserve user privacy. Technol. Forecast. Soc. Chang. 167, 120681 (2021)","journal-title":"Technol. Forecast. Soc. Chang."},{"issue":"1","key":"8_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-016-0028-x","volume":"7","author":"C Fan","year":"2017","unstructured":"Fan, C., Liu, Y., Huang, J., Rong, Z., Zhou, T.: Correlation between social proximity and mobility similarity. Sci. Rep. 7(1), 1\u20138 (2017)","journal-title":"Sci. Rep."},{"issue":"23","key":"8_CR21","doi-asserted-by":"publisher","first-page":"R941","DOI":"10.1016\/j.cub.2011.10.030","volume":"21","author":"T Sharot","year":"2011","unstructured":"Sharot, T.: The optimism bias. Curr. Biol. 21(23), R941\u2013R945 (2011)","journal-title":"Curr. Biol."},{"issue":"1","key":"8_CR22","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","volume":"41","author":"PA Norberg","year":"2007","unstructured":"Norberg, P.A., Horne, D.R., Horne, D.A.: The privacy paradox: personal information disclosure intentions versus behaviors. J. Consum. Aff. 41(1), 100 (2007)","journal-title":"J. Consum. Aff."},{"issue":"2","key":"8_CR23","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1257\/jel.54.2.442","volume":"54","author":"A Acquisti","year":"2016","unstructured":"Acquisti, A., Taylor, C., Wagman, L.: The economics of privacy. J. Econ. Lit. 54(2), 442\u2013492 (2016). https:\/\/doi.org\/10.1257\/jel.54.2.442","journal-title":"J. Econ. Lit."},{"key":"8_CR24","unstructured":"Wizner, B.: What changed after Snowden? A U.S. perspective. Int. J. Commun. [Online], 897+ (2017). https:\/\/link.gale.com\/apps\/doc\/A504267253\/LitRC?u=melb26933&sid=LitRC&xid=7bb84a74"},{"key":"8_CR25","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1080\/09700161.2014.918448","volume":"4","author":"K Bajaj","year":"2014","unstructured":"Bajaj, K.: Cyberspace: post-Snowden. Strateg. Anal. 4, 582 (2014)","journal-title":"Strateg. Anal."},{"key":"8_CR26","doi-asserted-by":"publisher","unstructured":"Steinfeld, N.: \u201cI agree to the terms and conditions\u201d: (How) do users read privacy policies online? An eye-tracking experiment.\u00a0Comput. Human Behav. 55 992\u20131000 (2016). https:\/\/doi-org.portal.lib.fit.edu\/https:\/\/doi.org\/10.1016\/j.chb.2015.09.038","DOI":"10.1016\/j.chb.2015.09.038"},{"issue":"3","key":"8_CR27","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1002\/dir.20009","volume":"18","author":"GR Milne","year":"2004","unstructured":"Milne, G.R., Culnan, M.J.: Strategies for reducing online privacy risks: why consumers read (Or don\u2019t read) online privacy notices. J. Interact. Mark. 18(3), 15\u201329 (2004). https:\/\/doi.org\/10.1002\/dir.20009","journal-title":"J. Interact. Mark."},{"issue":"9","key":"8_CR28","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1007\/s11606-012-2046-0","volume":"27","author":"LM Stossel","year":"2012","unstructured":"Stossel, L.M., Segar, N., Gliatto, P., Fallar, R., Karani, R.: Readability of patient education materials available at the point of care. J. Gen. Intern. Med. 27(9), 1165\u20131170 (2012). https:\/\/doi.org\/10.1007\/s11606-012-2046-0","journal-title":"J. Gen. Intern. Med."},{"issue":"1","key":"8_CR29","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1080\/1369118X.2018.1486870","volume":"23","author":"JA Obar","year":"2020","unstructured":"Obar, J.A., Oeldorf-Hirsch, A.: The biggest lie on the Internet: ignoring the privacy policies and terms of service policies of social networking services. Inf. Commun. Soc. 23(1), 128\u2013147 (2020)","journal-title":"Inf. Commun. Soc."},{"key":"8_CR30","doi-asserted-by":"publisher","unstructured":"Jim\u00e9nez Iglesias, L., Aguilar Paredes, C., S\u00e1nchez G\u00f3mez, L., Guti\u00e9rrez, M.P.-M.: User experience and media. The three click rule in newspapers\u2019 webs for smartphones.\u00a0Revista Latina de Comunicacion Social,\u00a073, 595\u2013613 (n.d.). https:\/\/doi.org\/10.4185\/RLCS-2018-1271","DOI":"10.4185\/RLCS-2018-1271"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-05563-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:58:56Z","timestamp":1709834336000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-05563-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031055621","9783031055638"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-05563-8_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"16 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2022.hci.international\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}