{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:24:32Z","timestamp":1743006272217,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031480409"},{"type":"electronic","value":"9783031480416"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-48041-6_14","type":"book-chapter","created":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T05:03:03Z","timestamp":1701406983000},"page":"191-202","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["\u201cI Simply Accept the Terms and Conditions so that I Can Use an App at All\u201d: Smartphone Use and Privacy Among Older Adults in Switzerland"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9076-4121","authenticated-orcid":false,"given":"Sarah","family":"Speck","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7925-6073","authenticated-orcid":false,"given":"Cora","family":"Pauli","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7796-2759","authenticated-orcid":false,"given":"Cornelia","family":"Ursprung","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0238-7187","authenticated-orcid":false,"given":"Miriam","family":"Wallimann","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Huber","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0791-4991","authenticated-orcid":false,"given":"Sabina","family":"Misoch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,2]]},"reference":[{"key":"14_CR1","unstructured":"Pew Research Center: Smartphone Ownership Is Growing Rapidly Around the World, but Not Always Equally (2019). https:\/\/www.pewglobal.org\/wp-content\/uploads\/sites\/2\/2019\/02\/Pew-Research-Center_Global-Technology-Use-2018_2019-02-05.pdf"},{"key":"14_CR2","unstructured":"Seifert, A., Martin, M., Perrig-Chiello, P.: Bildungs- und Lernbed\u00fcrfnisse im Alter: Bericht zur nationalen Befragungsstudie in der Schweiz (2021)"},{"key":"14_CR3","unstructured":"Seifert, A., Ackermann, T.P., Schelling, H.R.: Digitale Senioren 2020: Nutzung von Informations- und Kommunikationstechnologien durch Personen ab 65 Jahren in der Schweiz (2020)"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-319-58536-9_16","volume-title":"Human Aspects of IT for the Aged Population. Applications, Services and Contexts","author":"E-M Zeissig","year":"2017","unstructured":"Zeissig, E.-M., Lidynia, C., Vervier, L., et al.: Online privacy perceptions of older adults. In: Zhou, J., Salvendy, G. (eds.) ITAP 2017. LNCS, vol. 10298, pp. 181\u2013200. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-58536-9_16"},{"key":"14_CR5","doi-asserted-by":"publisher","unstructured":"Bartol, J., Prevodnik, K., Vehovar, V., et al.: The roles of perceived privacy control, Internet privacy concerns and Internet skills in the direct and indirect Internet uses of older adults: conceptual integration and empirical testing of a theoretical model. New Med. Soc. 146144482211227 (2022). https:\/\/doi.org\/10.1177\/14614448221122734","DOI":"10.1177\/14614448221122734"},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1177\/1461444899001001015","volume":"1","author":"J van Dijk","year":"1999","unstructured":"van Dijk, J.: The one-dimensional network society of manuel castells. New Media Soc. 1, 127\u2013138 (1999). https:\/\/doi.org\/10.1177\/1461444899001001015","journal-title":"New Media Soc."},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Kwasny, M.N., Caine, K.E., Rogers, W.A., et al.: Privacy and technology: folk definitions and perspectives. In: CHI 2008 ACM, pp. 3290\u20133296 (2008)","DOI":"10.1145\/1358628.1358846"},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","volume":"41","author":"PA Norberg","year":"2007","unstructured":"Norberg, P.A., Horne, D.R., Horne, D.A.: The privacy paradox: personal information disclosure intentions versus behaviors. J. Consum. Aff. 41, 100\u2013126 (2007). https:\/\/doi.org\/10.1111\/j.1745-6606.2006.00070.x","journal-title":"J. Consum. Aff."},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1016\/j.jbusres.2018.08.008","volume":"92","author":"PA Rauschnabel","year":"2018","unstructured":"Rauschnabel, P.A., He, J., Ro, Y.K.: Antecedents to the adoption of augmented reality smart glasses: a closer look at privacy risks. J. Bus. Res. 92, 374\u2013384 (2018). https:\/\/doi.org\/10.1016\/j.jbusres.2018.08.008","journal-title":"J. Bus. Res."},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Ghaiumy Anaraky, R., Byrne, K.A., Wisniewski, P.J., et al.: To disclose or not to disclose: examining the privacy decision-making processes of older vs. younger adults. In: Kitamura, Y., Quigley, A., Isbister, K. et al. (eds.) Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. ACM, New York, NY, USA, pp. 1\u201314 (2021)","DOI":"10.1145\/3411764.3445204"},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1080\/10447318.2019.1619259","volume":"35","author":"C Stephanidis","year":"2019","unstructured":"Stephanidis, C., Salvendy, G., Antona, M., et al.: Seven HCI grand challenges. Int. J. Hum.-Comput. Interact. 35, 1229\u20131269 (2019). https:\/\/doi.org\/10.1080\/10447318.2019.1619259","journal-title":"Int. J. Hum.-Comput. Interact."},{"issue":"10","key":"14_CR12","doi-asserted-by":"publisher","first-page":"1372","DOI":"10.1177\/0002764218787026","volume":"62","author":"I Elueze","year":"2018","unstructured":"Elueze, I., Quan-Haase, A.: Privacy attitudes and concerns in the digital lives of older adults: Westin\u2019s privacy attitude typology revisited. Am. Behav. Sci. 62(10), 1372\u20131391 (2018). https:\/\/doi.org\/10.1177\/0002764218787026","journal-title":"Am. Behav. Sci."},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Speck, S., Pauli, C., Ursprung, C., et al.: Easierphone: participative development of a senior-friendly smartphone application. In: Proceedings of the 9th International Conference on Information and Communication Technologies for Ageing Well and e-Health, pp. 199\u2013207 (2023)","DOI":"10.5220\/0011974400003476"},{"issue":"1","key":"14_CR14","doi-asserted-by":"publisher","first-page":"455","DOI":"10.56553\/popets-2023-0027","volume":"2023","author":"J Colnago","year":"2023","unstructured":"Colnago, J., Cranor, L., Acquisti, A.: Is there a reverse privacy paradox? An exploratory analysis of gaps between privacy perspectives and privacy-seeking behaviors. Proc. Priv. Enhancing Technol. 2023(1), 455\u2013476 (2023). https:\/\/doi.org\/10.56553\/popets-2023-0027","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"14_CR15","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1201\/9781410615862.ch32","volume-title":"The Human-Computer Interaction Handbook","author":"C-M Karat","year":"2007","unstructured":"Karat, C.-M., Brodie, C., Karat, J.: Human-computer interaction viewed from the intersection of privacy, security, and trust. In: Sears, A., Jacko, J. (eds.) The Human-Computer Interaction Handbook, vol. 20071544, pp. 639\u2013658. CRC Press (2007)"},{"key":"14_CR16","volume-title":"The Environment and Social Behavior: Privacy, Personal Space, Territory","author":"I Altman","year":"1975","unstructured":"Altman, I.: The Environment and Social Behavior: Privacy, Personal Space, Territory. Brooks\/Cole Publishing Company, Monterey, California, Crowding (1975)"},{"key":"14_CR17","volume-title":"Privacy and Freedom","author":"AF Westin","year":"1967","unstructured":"Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967)"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Olson, J.S., Grudin, J., Horbitz, E.: A study on preferences on sharing and privacy. In: Proceedings of the SIGCHI Conference on Human factors in Computing Systems, San Jose, California, USA (2005)","DOI":"10.1145\/1056808.1057073"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Ludford, R.J., Priedhorsky, R., Reily, K., et al.: Capturing, sharing, and using local place information. In: Proceedings of the SIGCHI Conference, San Jose, California, USA (2007)","DOI":"10.1145\/1240624.1240811"},{"key":"14_CR20","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.2307\/41409971","volume":"35","author":"C B\u00e9langer","year":"2011","unstructured":"B\u00e9langer, C.: Privacy in the digital age: a review of information privacy research in information systems. MIS Q. 35, 1017 (2011). https:\/\/doi.org\/10.2307\/41409971","journal-title":"MIS Q."},{"key":"14_CR21","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.02828","author":"Y Li","year":"2011","unstructured":"Li, Y.: Empirical studies on online information privacy concerns: literature review and an integrative framework. Commun. Assoc. Inform. Syst. (2011). https:\/\/doi.org\/10.17705\/1CAIS.02828","journal-title":"Commun. Assoc. Inform. Syst."},{"issue":"4","key":"14_CR22","doi-asserted-by":"publisher","first-page":"989","DOI":"10.2307\/41409970","volume":"35","author":"H Jeff Smith","year":"2011","unstructured":"Jeff Smith, H., Dinev, T., Xu, H.: Information privacy research: an interdisciplinary review. MIS Q. 35(4), 989 (2011). https:\/\/doi.org\/10.2307\/41409970","journal-title":"MIS Q."},{"key":"14_CR23","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1023\/A:1006184504201","volume":"17","author":"H Nissenbaum","year":"1998","unstructured":"Nissenbaum, H.: Protecting privacy in an information age: the problem of privacy in public. Law Philos. 17, 559\u2013596 (1998). https:\/\/doi.org\/10.1023\/A:1006184504201","journal-title":"Law Philos."},{"key":"14_CR24","doi-asserted-by":"publisher","first-page":"76","DOI":"10.3414\/me9104","volume":"47","author":"KL Courtney","year":"2008","unstructured":"Courtney, K.L.: Privacy and senior willingness to adopt smart home information technology in residential care facilities. Methods Inf. Med. 47, 76\u201381 (2008). https:\/\/doi.org\/10.3414\/me9104","journal-title":"Methods Inf. Med."},{"key":"14_CR25","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1177\/0733464815609440","volume":"36","author":"H-YS Tsai","year":"2017","unstructured":"Tsai, H.-Y.S., Shillair, R., Cotten, S.R.: Social support and \u201cplaying around\u201d: an examination of how older adults acquire digital literacy with tablet computers. J. Appl. Gerontol. 36, 29\u201355 (2017). https:\/\/doi.org\/10.1177\/0733464815609440","journal-title":"J. Appl. Gerontol."},{"key":"14_CR26","doi-asserted-by":"publisher","unstructured":"Kwasny, M.N., Caine, K.E., Rogers, W.A., et al.: Privacy and Technology: Folk Definitions and Perspectives. In: Proceedings of teh SIGCHI Conference Human Factor Computer System, pp. 3291\u20133296 (2008). https:\/\/doi.org\/10.1145\/1358628.1358846","DOI":"10.1145\/1358628.1358846"},{"key":"14_CR27","unstructured":"Sayre, S., Horne, D.A.: Trading secrets for savings: how concerned are consumers about club cards as a privacy threat? In: ACR North American Advances (2000)"},{"key":"14_CR28","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1509\/jppm.19.1.27.16941","volume":"19","author":"J Phelps","year":"2000","unstructured":"Phelps, J., Nowak, G., Ferrell, E.: Privacy concerns and consumer willingness to provide personal information. J. Public Policy Mark. 19, 27\u201341 (2000). https:\/\/doi.org\/10.1509\/jppm.19.1.27.16941","journal-title":"J. Public Policy Mark."},{"key":"14_CR29","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.cose.2015.07.002","volume":"64","author":"S Kokolakis","year":"2017","unstructured":"Kokolakis, S.: Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122\u2013134 (2017). https:\/\/doi.org\/10.1016\/j.cose.2015.07.002","journal-title":"Comput. Secur."},{"key":"14_CR30","first-page":"41","volume":"14","author":"TB White","year":"2004","unstructured":"White, T.B.: Consumer disclosure and disclosure avoidance: a motivational. Framework 14, 41\u201351 (2004)","journal-title":"Framework"},{"key":"14_CR31","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/641205.641209","volume":"46","author":"JB Earp","year":"2003","unstructured":"Earp, J.B., Baumer, D.: Innovative web use to learn about consumer behavior and online privacy. Commun. ACM 46, 81\u201383 (2003). https:\/\/doi.org\/10.1145\/641205.641209","journal-title":"Commun. ACM"},{"key":"14_CR32","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1007\/s10723-019-09500-3","volume":"17","author":"E-M Schomakers","year":"2019","unstructured":"Schomakers, E.-M., Lidynia, C., Ziefle, M.: A typology of online privacy personalities. J. Grid Comput. 17, 727\u2013747 (2019). https:\/\/doi.org\/10.1007\/s10723-019-09500-3","journal-title":"J. Grid Comput."},{"key":"14_CR33","doi-asserted-by":"publisher","first-page":"1168","DOI":"10.1177\/1461444820912544","volume":"22","author":"C Lutz","year":"2020","unstructured":"Lutz, C., Hoffmann, C.P., Ranzini, G.: Data capitalism and the user: an exploration of privacy cynicism in Germany. New Media Soc. 22, 1168\u20131187 (2020). https:\/\/doi.org\/10.1177\/1461444820912544","journal-title":"New Media Soc."},{"key":"14_CR34","volume-title":"Measuring the user experience: Collecting, analyzing, and presenting usability metrics","author":"T Tullis","year":"2013","unstructured":"Tullis, T., Albert, B.: Measuring the user experience: Collecting, analyzing, and presenting usability metrics, 2nd edn. Elsevier\/Morgan Kaufmann, Amsterdam, Boston (2013)","edition":"2"},{"key":"14_CR35","doi-asserted-by":"publisher","DOI":"10.1515\/9783110545982","volume-title":"Qualitative Interviews","author":"S Misoch","year":"2019","unstructured":"Misoch, S.: Qualitative Interviews. De Gruyter (2019)"},{"key":"14_CR36","doi-asserted-by":"crossref","unstructured":"N\u00f8rgaard, M., Hornb\u00e6k. K.: What do usability evaluators do in practice? In: Carroll, J.M., B\u00f8dker. S., Coughlin, J. (eds.) Proceedings of the 6th conference on Designing Interactive systems. ACM, New York, NY, USA, pp. 209\u2013218 (2006)","DOI":"10.1145\/1142405.1142439"},{"key":"14_CR37","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/5657.001.0001","volume-title":"Protocol Analysis","author":"KA Ericsson","year":"1993","unstructured":"Ericsson, K.A., Simon, H.A.: Protocol Analysis. The MIT Press (1993)"},{"key":"14_CR38","unstructured":"Mayring, P.: Qualitative Content Analysis [28 paragraphs]. Forum Qualitative Sozialforschung\/Forum: Qualitative Social Research (2000)"},{"key":"14_CR39","doi-asserted-by":"publisher","first-page":"398","DOI":"10.2307\/2991764","volume":"42","author":"JT Scholz","year":"1998","unstructured":"Scholz, J.T., Lubell, M.: Trust and taxpaying: testing the heuristic approach to collective action. Am. J. Political Sci. 42, 398 (1998). https:\/\/doi.org\/10.2307\/2991764","journal-title":"Am. J. Political Sci."}],"container-title":["Lecture Notes in Computer Science","HCI International 2023 \u2013 Late Breaking Papers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-48041-6_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T05:04:58Z","timestamp":1701407098000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-48041-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031480409","9783031480416"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-48041-6_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"2 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2023.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7472","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1578","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"396","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}