{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:26:54Z","timestamp":1743017214041,"version":"3.40.3"},"publisher-location":"Cham","reference-count":76,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031610882"},{"type":"electronic","value":"9783031610899"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-61089-9_6","type":"book-chapter","created":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T05:03:25Z","timestamp":1716959005000},"page":"109-141","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Home Alone? Exploring the\u00a0Geographies of\u00a0Digitally-Mediated Privacy Practices at\u00a0Home During the\u00a0COVID-19 Pandemic"],"prefix":"10.1007","author":[{"given":"Kim","family":"Cheetham","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3807-0197","authenticated-orcid":false,"given":"Ola","family":"Michalec","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,5,30]]},"reference":[{"key":"6_CR1","volume-title":"The Environment and Social Behaviour: Privacy, Personal Space, Territory, Crowding","author":"I Altman","year":"1975","unstructured":"Altman, I.: The Environment and Social Behaviour: Privacy, Personal Space, Territory, Crowding. Brooks\/Cole Publishing Company, Monterey, CA (1975)"},{"key":"6_CR2","doi-asserted-by":"publisher","unstructured":"Apthorpe, N., Shvartzshnaider, Y., Mathur, A., Reisman, D., Feamster, N.: Discovering smart home internet of things privacy norms using contextual integrity. In: Proceedings of the ACM on Interactive, Mobile, Wearabloe and Ubiquitous Technologies, pp. 1\u201323 (2018). https:\/\/doi.org\/10.1145\/3214262","DOI":"10.1145\/3214262"},{"key":"6_CR3","unstructured":"Armano, D.: COVID-19 will be remembered as the \u2018great accelerator\u2019 of digital transformation (2020). https:\/\/www.forbes.com\/sites\/davidarmano\/2020\/09\/09\/covid-19-will-be-remembered-as-the-great-accelerator-of-digital-transformation\/"},{"issue":"4","key":"6_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/1461444815614001","volume":"19","author":"L Baruh","year":"2015","unstructured":"Baruh, L., Popescu, M.: Big Data analytics and the limits of privacy self-management. New Media Soc. 19(4), 1\u201318 (2015). https:\/\/doi.org\/10.1177\/1461444815614001","journal-title":"New Media Soc."},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Betkier, M.: Privacy Online, Law, and the Effective Regulation of Online Services. Intersentia, Cambridge (2019)","DOI":"10.1017\/9781780689371"},{"key":"6_CR6","unstructured":"de Bolle, C.: Pandemic profiteering: how criminals exploit the COVID-19 crisis. Technical report, Europol, The Hague, The Netherlands (2020)"},{"issue":"2","key":"6_CR7","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706QP063OA","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3(2), 77\u2013101 (2006). https:\/\/doi.org\/10.1191\/1478088706QP063OA","journal-title":"Qual. Res. Psychol."},{"key":"6_CR8","doi-asserted-by":"publisher","unstructured":"Bruno, M., Nikolaeva, A.: Towards a maintenance-based approach to mode shift: comparing two cases of Dutch cycling policy using social practice theory. J. Transp. Geogr. 86(C) (2020). https:\/\/doi.org\/10.1016\/j.jtrangeo.2020.102772","DOI":"10.1016\/j.jtrangeo.2020.102772"},{"issue":"4","key":"6_CR9","first-page":"908","volume":"126","author":"F Brunton","year":"2017","unstructured":"Brunton, F., Nissen, H.: Privacy\u2019s trust gap: a review. Yale Law J. 126(4), 908\u20131241 (2017)","journal-title":"Yale Law J."},{"issue":"3","key":"6_CR10","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1111\/j.1468-2885.1996.tb00127.x","volume":"6","author":"DB Buller","year":"1996","unstructured":"Buller, D.B., Burgoon, J.K.: Interpersonal deception theory. Commun. Theor. 6(3), 203\u2013242 (1996). https:\/\/doi.org\/10.1111\/j.1468-2885.1996.tb00127.x","journal-title":"Commun. Theor."},{"key":"6_CR11","unstructured":"Cetina, K.K., Schatzki, T.R., von Savigny, E.: The Practice Turn in Contemporary Theory. Routledge (2005)"},{"key":"6_CR12","doi-asserted-by":"publisher","unstructured":"Chen, Q., Min, C., Zhang, W., Wang, G., Ma, X., Evans, R.: Unpacking the black box: how to promote citizen engagement through government social media during the COVID-19 crisis. Comput. Hum. Behav. 110 (2020). https:\/\/doi.org\/10.1016\/j.chb.2020.106380","DOI":"10.1016\/j.chb.2020.106380"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Cohen, J.E.: Configuring the networked citizen. In: Imagining New Legalities, pp. 129\u2013153. Stanford University Press (2020)","DOI":"10.1515\/9780804781572-008"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Coldicutt, R.: Infrastructure not time travel (2020). https:\/\/glimmersreport.net\/report\/insight","DOI":"10.1093\/acrefore\/9780190201098.013.1159"},{"issue":"3","key":"6_CR15","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1207\/s15327051hci2103_2","volume":"21","author":"P Dourish","year":"2009","unstructured":"Dourish, P., Anderson, K.: Collective information practice: exploring privacy and security as social and cultural phenomena. Hum. Comput. Interact. 21(3), 319\u2013342 (2009). https:\/\/doi.org\/10.1207\/s15327051hci2103_2","journal-title":"Hum. Comput. Interact."},{"key":"6_CR16","unstructured":"European Convention: Charter of fundamental rights of the European union. Technical report, OJ C 326 (EN) (2012)"},{"key":"6_CR17","unstructured":"Evans, D., McMeekin, A., Southerton, D.: Sustainable consumption, behaviour change policies and theories of practice (2012)"},{"key":"6_CR18","unstructured":"Evans, J.: 12 security tips for the \u2018work from home\u2019 enterprise (2020). https:\/\/www.computerworld.com\/article\/3532352\/12-security-tips-for-the-work-from-home-enterprise.html"},{"issue":"1","key":"6_CR19","doi-asserted-by":"publisher","first-page":"113","DOI":"10.11143\/fennia.100343","volume":"199","author":"D Ferreira","year":"2021","unstructured":"Ferreira, D., Vale, M.: From cyberspace to cyberspatialities? Fennia-Int. J. Geogr. 199(1), 113\u2013117 (2021). https:\/\/doi.org\/10.11143\/fennia.100343","journal-title":"Fennia-Int. J. Geogr."},{"key":"6_CR20","unstructured":"Florida, R.: The uncertain future of corporate HQs (2020). https:\/\/hbr.org\/2020\/09\/the-uncertain-future-of-corporate-hqs"},{"key":"6_CR21","doi-asserted-by":"publisher","unstructured":"Foden, M.: Everyday consumption practices as a site for activism? Exploring the motivations of grassroots reuse groups. People Place Policy Online 6(3) (2012). https:\/\/doi.org\/10.3351\/ppp.0006.0003.0004","DOI":"10.3351\/ppp.0006.0003.0004"},{"key":"6_CR22","doi-asserted-by":"publisher","DOI":"10.1093\/wentk\/9780190612269.001.0001","volume-title":"Privacy: What Everyone Needs to Know","author":"LP Francis","year":"2017","unstructured":"Francis, L.P., Francis, J.G.: Privacy: What Everyone Needs to Know. Oxford University Press, New York, NY (2017)"},{"key":"6_CR23","unstructured":"Freeguard, G., Shepheard, M., Davies, O.: Digital government during the coronavirus crisis. Technical report Institute for Government, London, UK (2020)"},{"key":"6_CR24","unstructured":"Galic\u0306, M.: Surveillance and privacy in smart cities and living labs: conceptualising privacy for public space. Optima Grafische Communicatie, Rotterdam (2019)"},{"key":"6_CR25","unstructured":"Goh, L.: The future is now: imagining university life post-COVID (2021). https:\/\/www.universityworldnews.com\/post.php?story=20210224140632590"},{"issue":"1","key":"6_CR26","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1214\/aoms\/1177705148","volume":"32","author":"LA Goodman","year":"1961","unstructured":"Goodman, L.A.: Snowball sampling. Ann. Math. Stat. 32(1), 148\u2013170 (1961)","journal-title":"Ann. Math. Stat."},{"key":"6_CR27","unstructured":"Habib, H., et al.: Away from prying eyes: analyzing use and understanding of private browsing. In: Proceedings of the Fourteenth Symposium on Usable Privacy and Security, pp. 159\u2013175. USENIX Association, Baltimore, MD (2018)"},{"key":"6_CR28","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.destud.2019.12.002","volume":"67","author":"C Hoolohan","year":"2020","unstructured":"Hoolohan, C., Browne, A.L.: Design thinking for practice-based intervention: co-producing the change points toolkit to unlock (un) sustainable practices. Des. Stud. 67, 102\u2013132 (2020). https:\/\/doi.org\/10.1016\/j.destud.2019.12.002","journal-title":"Des. Stud."},{"key":"6_CR29","unstructured":"Information Commissioner\u2019s Office: The ICO\u2019s updated regulatory approach in response to the coronavirus pandemic (2021). https:\/\/ico.org.uk\/media\/2617613\/ico-regulatory-approach-during-coronavirus.pdf"},{"issue":"4","key":"6_CR30","doi-asserted-by":"publisher","first-page":"1826","DOI":"10.3390\/ijerph18041826","volume":"18","author":"C Ipsen","year":"2021","unstructured":"Ipsen, C., van Veldhoven, K., Kirchner, K., Hansen, J.P.: Six key advantages and disadvantages of working from home in Europe during COVID-19. Int. J. Environ. Res. Pub. Health 18(4), 1826 (2021). https:\/\/doi.org\/10.3390\/ijerph18041826","journal-title":"Int. J. Environ. Res. Pub. Health"},{"issue":"10","key":"6_CR31","doi-asserted-by":"publisher","first-page":"1467","DOI":"10.1080\/02723638.2019.1614369","volume":"40","author":"S Jameson","year":"2019","unstructured":"Jameson, S., Richter, C., Taylor, L.: People\u2019s strategies for perceived surveillance in Amsterdam smart city. Urban Geogr. 40(10), 1467\u20131484 (2019). https:\/\/doi.org\/10.1080\/02723638.2019.1614369","journal-title":"Urban Geogr."},{"issue":"2","key":"6_CR32","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1080\/15602210600616218","volume":"6","author":"JK Jesson","year":"2006","unstructured":"Jesson, J.K., Lacey, F.M.: How to do (or not to do) a critical literature review. Pharm. Educ. 6(2), 139\u2013148 (2006)","journal-title":"Pharm. Educ."},{"issue":"5","key":"6_CR33","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1093\/jcr\/ucy039","volume":"45","author":"T Kim","year":"2018","unstructured":"Kim, T., Barasz, K., John, L.K.: Why am i seeing this ad? The effect of ad transparency on ad effectiveness. J. Consum. Aff. 45(5), 906\u2013932 (2018). https:\/\/doi.org\/10.1093\/jcr\/ucy039","journal-title":"J. Consum. Aff."},{"key":"6_CR34","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.comppsych.2020.152180","volume":"100","author":"O Kiraly","year":"2020","unstructured":"Kiraly, O., Potenza, M.N., Stein, D.J., Kind, D.C., Hodgins, D.C., Saunders, J.B.: Preventing problematic internet use during the COVID-19 pandemic: consensus guidance. Compr. Psychiatry 100, 152\u2013180 (2020). https:\/\/doi.org\/10.1016\/j.comppsych.2020.152180","journal-title":"Compr. Psychiatry"},{"key":"6_CR35","doi-asserted-by":"crossref","unstructured":"Koops, B.J., Galic\u0306, M.: Conceptualizing Space and Place: Lessons from Geography for the Debate on Privacy in Public. Edward Elgar Publishing, Cheltenham (2017)","DOI":"10.4337\/9781786435408.00007"},{"issue":"6","key":"6_CR36","doi-asserted-by":"publisher","first-page":"1194","DOI":"10.1177\/0309132519888687","volume":"44","author":"A Leszczynski","year":"2020","unstructured":"Leszczynski, A.: Digital methods iii: the digital mundane. Prog. Hum. Geogr. 44(6), 1194\u20131201 (2020). https:\/\/doi.org\/10.1177\/0309132519888687","journal-title":"Prog. Hum. Geogr."},{"key":"6_CR37","doi-asserted-by":"publisher","unstructured":"Lewandowsky, S., et al.: Public acceptance of privacy-encroaching policies to address the COVID-19 pandemic in the united kingdom. PLOS ONE 16(1) (2021). https:\/\/doi.org\/10.1371\/journal.pone.0245740","DOI":"10.1371\/journal.pone.0245740"},{"key":"6_CR38","doi-asserted-by":"publisher","DOI":"10.1111\/radm.12460","author":"W Liu","year":"2021","unstructured":"Liu, W., Beltagui, A., Ye, S.: Accelerated innovation through repurposing: exaptation of design and manufacturing in response to COVID-19. R&D Manage. (2021). https:\/\/doi.org\/10.1111\/radm.12460","journal-title":"R&D Manage."},{"issue":"1\/2","key":"6_CR39","doi-asserted-by":"publisher","first-page":"118","DOI":"10.24908\/ss.v17i1\/2.12925","volume":"17","author":"S Maalsen","year":"2019","unstructured":"Maalsen, S., Sadowski, J.: The smart home on fire: amplifying and accelerating domestic surveillance. Surveill. Soc. 17(1\/2), 118\u2013124 (2019). https:\/\/doi.org\/10.24908\/ss.v17i1\/2.12925","journal-title":"Surveill. Soc."},{"issue":"3","key":"6_CR40","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1111\/j.1540-4560.1977.tb01879.x","volume":"33","author":"ST Margulis","year":"1977","unstructured":"Margulis, S.T.: Conceptions of privacy: current status and next steps. J. Soc. Issues 33(3), 5\u201321 (1977). https:\/\/doi.org\/10.1111\/j.1540-4560.1977.tb01879.x","journal-title":"J. Soc. Issues"},{"key":"6_CR41","doi-asserted-by":"crossref","unstructured":"Margulis, S.T.: Privacy as information management: a social psychological and environmental framework. Technical report, U.S. Department of Commerce, National Bureau of Standards, Washington, DC (1979)","DOI":"10.6028\/NBS.IR.79-1793"},{"issue":"2","key":"6_CR42","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1111\/1540-4560.00063","volume":"59","author":"ST Margulis","year":"2003","unstructured":"Margulis, S.T.: Privacy as a social issue and behavioural concept. J. Soc. Issues 59(2), 243\u2013261 (2003)","journal-title":"J. Soc. Issues"},{"key":"6_CR43","doi-asserted-by":"publisher","unstructured":"Margulis, S.T.: Three theories of privacy: an overview. In: Trepte, S., Reinecke, L. (eds.) Privacy Online, pp. 9\u201317. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21521-6_2","DOI":"10.1007\/978-3-642-21521-6_2"},{"key":"6_CR44","doi-asserted-by":"publisher","unstructured":"Michalec, A.O., Hayes, E., Longhurst, J.: Building smart cities, the just way. A critical review of \u201csmart\u201d and \u201cjust\u201d initiatives in Bristol, UK. Sustain. Cities Soc. 47 (2019). https:\/\/doi.org\/10.1016\/j.scs.2019.101510","DOI":"10.1016\/j.scs.2019.101510"},{"key":"6_CR45","doi-asserted-by":"publisher","unstructured":"Morton, A., Sasse, M.A.: Privacy is a process, not a pet: a theory for effective privacy practice. In: Proceedings of the 2012 New Security Paradigms Workshop (2012). https:\/\/doi.org\/10.1145\/2413296.2413305","DOI":"10.1145\/2413296.2413305"},{"key":"6_CR46","doi-asserted-by":"publisher","unstructured":"Nabity-Grover, T., Cheung, C.M.K., Thatcher, J.B.: Inside out and outside in: how the COVID-19 pandemic affects self-disclosure on social media. Int. J. Inf. Manage. 55, 102\u2013188 (2020). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2020.102188","DOI":"10.1016\/j.ijinfomgt.2020.102188"},{"key":"6_CR47","unstructured":"National Cyber Security Centre: Home working: preparing your organisation and staff (2020). https:\/\/www.ncsc.gov.uk\/guidance\/home-working"},{"key":"6_CR48","doi-asserted-by":"publisher","DOI":"10.1515\/9780804772891","volume-title":"Privacy in Context: Technology, Policy and the Integrity of Social Life","author":"H Nissenbaum","year":"2009","unstructured":"Nissenbaum, H.: Privacy in Context: Technology, Policy and the Integrity of Social Life. Stanford University Press, Redwood City, CA (2009)"},{"key":"6_CR49","unstructured":"Palmer, A.: Amazon sellers fined for price gouging hand sanitizer amid coronavirus pandemic (2020). https:\/\/www.cnbc.com\/2020\/11\/17\/amazon-sellers-fined-for-coronavirus-price-gouging-hand-sanitizer.html"},{"issue":"3","key":"6_CR50","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1177\/1473325002001003636","volume":"1","author":"MQ Patton","year":"2002","unstructured":"Patton, M.Q.: Two decades of developments in qualitative inquiry: a personal, experiential perspective. Qual. Soc. Work. 1(3), 261\u2013283 (2002). https:\/\/doi.org\/10.1177\/1473325002001003636","journal-title":"Qual. Soc. Work."},{"issue":"2","key":"6_CR51","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1177\/2F13684310222225432","volume":"5","author":"A Reckwitz","year":"2002","unstructured":"Reckwitz, A.: Toward a theory of social practices: a development in culturalist theorizing. Eur. J. Soc. Theor. 5(2), 243\u2013263 (2002). https:\/\/doi.org\/10.1177\/2F13684310222225432","journal-title":"Eur. J. Soc. Theor."},{"key":"6_CR52","volume-title":"Legislating Privacy: Technology, Social Values, and Public Policy","author":"P Regan","year":"1995","unstructured":"Regan, P.: Legislating Privacy: Technology, Social Values, and Public Policy. University of North Carolina Press, Chapel Hill, NC (1995)"},{"issue":"3","key":"6_CR53","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1177\/0162243918806061","volume":"44","author":"J Sadowski","year":"2019","unstructured":"Sadowski, J., Bendor, R.: Selling smartness: corporate narratives and the smart city as a sociotechnical imaginary. Sci. Technol. Hum. Values 44(3), 540\u2013563 (2019). https:\/\/doi.org\/10.1177\/0162243918806061","journal-title":"Sci. Technol. Hum. Values"},{"key":"6_CR54","first-page":"0308518X2110223","volume":"56","author":"J Sadowski","year":"2021","unstructured":"Sadowski, J., Strengers, Y., Kennedy, J.: More work for Big Mother: revaluing care and control in smart homes. Environ. Plan. A Econ. Space 56, 0308518X2110223 (2021)","journal-title":"Environ. Plan. A Econ. Space"},{"key":"6_CR55","doi-asserted-by":"publisher","DOI":"10.4135\/9781412986281","volume-title":"The SAGE Dictionary of Qualitative Inquiry","author":"TA Schwandt","year":"2007","unstructured":"Schwandt, T.A.: The SAGE Dictionary of Qualitative Inquiry. Sage, London (2007)"},{"issue":"6\u20137","key":"6_CR56","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1080\/01634372.2020.1764687","volume":"63","author":"A Seifert","year":"2020","unstructured":"Seifert, A.: The digital exclusion of older adults during the COVID-19 pandemic. J. Gerontol. Soc. Work 63(6\u20137), 674\u2013676 (2020). https:\/\/doi.org\/10.1080\/01634372.2020.1764687","journal-title":"J. Gerontol. Soc. Work"},{"key":"6_CR57","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511625138","volume-title":"Philosophical Dimensions of Privacy: An Anthology","author":"FD Shoeman","year":"1984","unstructured":"Shoeman, F.D.: Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press, Cambridge (1984)"},{"key":"6_CR58","unstructured":"Shove, E.: Changing human behaviour and lifestyle: a challenge for sustainable consumption. In: The Ecological Economics of Consumption, pp. 111\u2013131 (2004). http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.124.7935&rep=rep1&type=pdf"},{"issue":"6","key":"6_CR59","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1068\/a42282","volume":"42","author":"E Shove","year":"2010","unstructured":"Shove, E.: Beyond the ABC: climate change policy and theories of social change. Environ Plan A 42(6), 1273\u20131285 (2010). https:\/\/doi.org\/10.1068\/a42282","journal-title":"Environ Plan A"},{"key":"6_CR60","doi-asserted-by":"publisher","DOI":"10.4135\/9781446250655","volume-title":"The Dynamics of Social Practice: Everyday Life and How It Changes","author":"E Shove","year":"2012","unstructured":"Shove, E., Pantzar, M., Watson, M.: The Dynamics of Social Practice: Everyday Life and How It Changes. Sage, London (2012)"},{"key":"6_CR61","first-page":"102","volume":"2","author":"J Singh","year":"2020","unstructured":"Singh, J., Singh, J.: COVID-19 and its impact on society. Electron. Res. J. Soc. Sci. Humanit. 2, 102\u2013106 (2020)","journal-title":"Electron. Res. J. Soc. Sci. Humanit."},{"key":"6_CR62","unstructured":"Slack Help Center: What is a channel? (2021). https:\/\/slack.com\/intl\/en-gb\/help\/articles\/360017938993"},{"issue":"1","key":"6_CR63","first-page":"83","volume":"15","author":"J Slupska","year":"2019","unstructured":"Slupska, J.: Safe at home: towards a feminist critique of cybersecurity. St. Antony\u2019s Int. Rev. 15(1), 83\u2013100 (2019)","journal-title":"St. Antony\u2019s Int. Rev."},{"issue":"4","key":"6_CR64","doi-asserted-by":"publisher","first-page":"989","DOI":"10.2307\/41409970","volume":"35","author":"HJ Smith","year":"2011","unstructured":"Smith, H.J., Dinev, T., Xu, H.: Information privacy research: an interdisciplinary review. MIS Q. 35(4), 989\u20131015 (2011). https:\/\/doi.org\/10.2307\/41409970","journal-title":"MIS Q."},{"key":"6_CR65","volume-title":"Understanding Privacy","author":"DJ Solove","year":"2008","unstructured":"Solove, D.J.: Understanding Privacy. Harvard University Press, Cambridge, MA (2008)"},{"issue":"5","key":"6_CR66","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1177\/0306312717709363","volume":"47","author":"BK Sovacool","year":"2017","unstructured":"Sovacool, B.K., Hess, D.J.: Ordering theories: typologies and conceptual frameworks for socio-technical change. Soc. Stud. Sci. 47(5), 703\u2013750 (2017). https:\/\/doi.org\/10.1177\/0306312717709363","journal-title":"Soc. Stud. Sci."},{"key":"6_CR67","doi-asserted-by":"crossref","unstructured":"Strengers, Y.: Peak electricity demand and social practice theories: reframing the role of change agents in the energy sector. In: The Global Challenge of Encouraging Sustainable Living. Edward Elgar Publishing (2013)","DOI":"10.4337\/9781781003756.00010"},{"key":"6_CR68","doi-asserted-by":"publisher","unstructured":"Strengers, Y., Kennedy, J., Arcari, P., Nicholls, L., Gregg, M.: Protection, productivity and pleasure in the smart home: emerging expectations and gendered insights from Australian early adopters. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pp. 1\u201313 (2019). https:\/\/doi.org\/10.1145\/3290605.3300875","DOI":"10.1145\/3290605.3300875"},{"key":"6_CR69","doi-asserted-by":"publisher","first-page":"105436","DOI":"10.1016\/j.clsr.2020.105436","volume":"38","author":"PJ van de Waerdt","year":"2020","unstructured":"van de Waerdt, P.J.: Information asymmetries: recognizing the limits of the GDPR on the data-driven market. Comput. Law Secur. Rev. 38, 105436 (2020). https:\/\/doi.org\/10.1016\/j.clsr.2020.105436","journal-title":"Comput. Law Secur. Rev."},{"issue":"3","key":"6_CR70","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1177\/2056305120948250","volume":"6","author":"J Vitak","year":"2020","unstructured":"Vitak, J., Zimmer, M.: More than just privacy: using contextual integrity to evaluate the long-term risks from COVID-19 surveillance technologies. Soc. Media Soc. 6(3), 44 (2020). https:\/\/doi.org\/10.1177\/2056305120948250","journal-title":"Soc. Media Soc."},{"key":"6_CR71","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1080\/14461242.2021.1941184","volume":"31","author":"W Wang","year":"2021","unstructured":"Wang, W., Sun, L., Lui, T., Lai, T.: The use of e-health during the COVID-19 pandemic: a case study in China\u2019s Hubei province. Health Sociol. Rev. 31, 215\u2013231 (2021). https:\/\/doi.org\/10.1080\/14461242.2021.1941184","journal-title":"Health Sociol. Rev."},{"issue":"2","key":"6_CR72","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1177\/1469540505053090","volume":"5","author":"A Warde","year":"2005","unstructured":"Warde, A.: Consumption and theories of practice. J. Consum. Cult. 5(2), 131\u2013153 (2005). https:\/\/doi.org\/10.1177\/1469540505053090","journal-title":"J. Consum. Cult."},{"issue":"5","key":"6_CR73","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"SD Warren","year":"1890","unstructured":"Warren, S.D., Brandeis, L.D.: Right to privacy. Harv. Law Rev. 4(5), 193 (1890). https:\/\/doi.org\/10.2307\/1321160","journal-title":"Harv. Law Rev."},{"key":"6_CR74","doi-asserted-by":"publisher","first-page":"102072","DOI":"10.1016\/j.gloenvcha.2020.102072","volume":"62","author":"M Watson","year":"2020","unstructured":"Watson, M., Browne, A., Evans, D., Foden, M., Hoolohan, C., Sharp, L.: Challenges and opportunities for re-framing resource use policy with practice theories: the change points approach. Glob. Environ. Chang. 62, 102072 (2020). https:\/\/doi.org\/10.1016\/j.gloenvcha.2020.102072","journal-title":"Glob. Environ. Chang."},{"key":"6_CR75","volume-title":"Privacy and Freedom","author":"AF Westin","year":"1968","unstructured":"Westin, A.F.: Privacy and Freedom. Athenum, New York, NY (1968)"},{"issue":"4","key":"6_CR76","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1002\/asi.24232","volume":"71","author":"PF Wu","year":"2020","unstructured":"Wu, P.F., Vitak, J., Zimmer, M.T.: A contextual approach to information privacy research. J. Am. Soc. Inf. Sci. 71(4), 485\u2013490 (2020). https:\/\/doi.org\/10.1002\/asi.24232","journal-title":"J. Am. Soc. Inf. Sci."}],"container-title":["Lecture Notes in Computer Science","Privacy Technologies and Policy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-61089-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T05:04:34Z","timestamp":1716959074000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-61089-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031610882","9783031610899"],"references-count":76,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-61089-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"30 May 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APF","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual Privacy Forum","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lyon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 June 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 June 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apf2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}