{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:30:36Z","timestamp":1742985036661,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031371196"},{"type":"electronic","value":"9783031371202"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-37120-2_9","type":"book-chapter","created":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T23:04:56Z","timestamp":1687993496000},"page":"134-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Evaluating the\u00a0Effectiveness of\u00a0Privacy and\u00a0Security Promotion Strategies"],"prefix":"10.1007","author":[{"given":"M.","family":"Iacono","sequence":"first","affiliation":[]},{"given":"M.","family":"Mastroianni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,29]]},"reference":[{"key":"9_CR1","unstructured":"Iacono, M., Mastroianni, M.: Il curioso caso della divergenza tra consapevolezza e comportamenti in materia di sicurezza informatica dopo la crisi pandemica: quando non bastano norme ed esperienza, Edizioni Scientifiche Italiane, pp. 107\u2013118 (2022)"},{"key":"9_CR2","doi-asserted-by":"publisher","unstructured":"Campanile, L., Iacono, M., Marulli, F., Mastroianni, M.: Designing a GDPR compliant blockchain-based IOV distributed information tracking system. Inf. Process. Manage. 58(3), 102511 (2021). https:\/\/doi.org\/10.1016\/j.ipm.2021.102511, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0306457321000194","DOI":"10.1016\/j.ipm.2021.102511"},{"key":"9_CR3","doi-asserted-by":"publisher","unstructured":"Campanile, L., Iacono, M., Mastroianni, M.: Towards privacy-aware software design in small and medium enterprises. In: 2022 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech), pp. 1\u20138 (2022). https:\/\/doi.org\/10.1109\/DASC\/PiCom\/CBDCom\/Cy55231.2022.9927958, https:\/\/doi.org\/10.1109\/DASC\/PiCom\/CBDCom\/Cy55231.2022.9927958","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/Cy55231.2022.9927958 10.1109\/DASC\/PiCom\/CBDCom\/Cy55231.2022.9927958"},{"key":"9_CR4","doi-asserted-by":"publisher","unstructured":"Zaidi, A., Mansoor, F., Papantoni-Kazakos, T.: Theory of influence networks, J. Intell. Robot Syst. 60, 457\u2013491 (2010). http:\/\/dx.doi.org\/https:\/\/doi.org\/10.1007\/s10846-010-9425-8, https:\/\/doi.org\/10.1007\/s10846-010-9425-8","DOI":"10.1007\/s10846-010-9425-8"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-1-4419-0056-2_19","volume-title":"Springer","author":"F Mansoor","year":"2009","unstructured":"Mansoor, F., Zaidi, A.K., Wagenhals, L., Levis, A.H.: Meta-modeling the cultural behavior using timed influence nets. In: Computing, S., Modeling, B. (eds.) Springer, pp. 1\u20139. MA, US, Boston (2009). https:\/\/doi.org\/10.1007\/978-1-4419-0056-2_19"},{"key":"9_CR6","doi-asserted-by":"publisher","unstructured":"\u00d8verby, H.: The Privacy Paradox, pp. 1\u20132. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-642-27739-9_1619-1","DOI":"10.1007\/978-3-642-27739-9_1619-1"},{"key":"9_CR7","doi-asserted-by":"publisher","unstructured":"Gerber, N., Gerber, P., Volkamer, M.: Explaining the privacy paradox: a systematic review of literature investigating privacy attitude and behavior. Comput. Secur. 77, 226\u2013261 (2018). https:\/\/doi.org\/10.1016\/j.cose.2018.04.002, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404818303031","DOI":"10.1016\/j.cose.2018.04.002"},{"key":"9_CR8","first-page":"1","volume":"89","author":"DJ Solove","year":"2021","unstructured":"Solove, D.J.: The myth of the privacy paradox. Geo. Wash. L. Rev. 89, 1 (2021)","journal-title":"Geo. Wash. L. Rev."},{"issue":"4","key":"9_CR9","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1002\/jcpy.1191","volume":"30","author":"A Acquisti","year":"2020","unstructured":"Acquisti, A., Brandimarte, L., Loewenstein, G.: Secrets and likes: the drive for privacy and the difficulty of achieving it in the digital age. J. Consum. Psychol. 30(4), 736\u2013758 (2020)","journal-title":"J. Consum. Psychol."},{"key":"9_CR10","unstructured":"Paul, E.F., Miller Jr, F.D., Paul, J.: Freedom of Speech: Volume 21, Part 2, vol. 21, Cambridge University Press, Cambridge (2004)"},{"issue":"2","key":"9_CR11","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1108\/JCM-03-2021-4510","volume":"40","author":"T Fernandes","year":"2023","unstructured":"Fernandes, T., Costa, M.: Privacy concerns with COVID-19 tracking apps: a privacy calculus approach. J. Consum. Mark. 40(2), 181\u2013192 (2023)","journal-title":"J. Consum. Mark."},{"key":"9_CR12","doi-asserted-by":"publisher","unstructured":"Zhang, F., Pan, Z., Lu, Y.: Smart surveillance for personal data digitalization: contextual personalization-privacy paradox in smart home. Inf. Manage. 60(2), 103736 (2023). https:\/\/doi.org\/10.1016\/j.im.2022.103736, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0378720622001446","DOI":"10.1016\/j.im.2022.103736"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2023 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-37120-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T23:38:29Z","timestamp":1687995509000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-37120-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031371196","9783031371202"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-37120-2_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"29 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Custom based on Cyberchair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"283","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8,5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PHD Showcase Papers: 6(for main conf) \/ For ICCSA 2023 Workshops 876 subm sent, 350 full papers and 29 short papers accepted, additional PHD Showcase Papers: 2","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}