{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T04:05:26Z","timestamp":1749182726396,"version":"3.41.0"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031938276","type":"print"},{"value":"9783031938283","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-93828-3_14","type":"book-chapter","created":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T08:38:38Z","timestamp":1749112718000},"page":"171-190","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["From Consent to Contract \u2013 The Realisation of the Intent Economy \u2013 A Design Consultation for a Commerce Based Personal Data Ecosystem"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7795-1144","authenticated-orcid":false,"given":"Mick","family":"Lockwood","sequence":"first","affiliation":[]},{"given":"Iain","family":"Henderson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,25]]},"reference":[{"key":"14_CR1","unstructured":"Bentham, J.: Panopticon: or the Inspection House. Kessinger Publishing, London (1791)"},{"key":"14_CR2","unstructured":"Bruns, A.: Towards produsage, futures for user-led content production. In: Proceedings Cultural Attitudes Towards Communication and Technology, pp. 275\u2013284 (2006)"},{"key":"14_CR3","unstructured":"Carroll, J.M.: Designing Interaction: Psychology at the Human Computer Interface. Cambridge University Press (1991)"},{"key":"14_CR4","volume-title":"The Nature of Explanation","author":"KJW Craik","year":"1943","unstructured":"Craik, K.J.W.: The Nature of Explanation. University Press, Macmillan (1943)"},{"key":"14_CR5","unstructured":"Elmqvist, N.: Embodied human-data interaction. In: Proceedings of the CHI Workshop on Embodied Interaction: Theory and Practice in HCI, pp. 104\u2013107 (2011)"},{"key":"14_CR6","unstructured":"Foucault, M.: Discipline and punish: the birth of the prison. Penguin Social Sciences (1975)"},{"key":"14_CR7","unstructured":"Fuchs, C.: Internet and Surveillance: The Challenges of Web 2.0 and Social Media. Routledge, New York (2012)"},{"key":"14_CR8","first-page":"132","volume-title":"Computers, surveillance, and privacy","author":"O Gandy","year":"1996","unstructured":"Gandy, O.: Coming to terms with the panoptic sort. In: Lyon, D., Zureik, E. (eds.) Computers, surveillance, and privacy, pp. 132\u2013155. University of Minnesota Press, Minneapolis (1996)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Gavison, R.: Privacy and the limits of law. Philos. Dimensions Priv. Anthology 89(3) (1984)","DOI":"10.2307\/795891"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Harrison, S., Tatar, D., Sengers, P.: The three paradigms of HCI. In: Grudin, J. (ed.) Three Faces of Human-Computer Interaction IEEE Annals of the History of Computing, CHI 2007, vol. 27, no. 4, pp. 46\u201362, October\u2013December 2007","DOI":"10.1109\/MAHC.2005.67"},{"key":"14_CR11","first-page":"32","volume-title":"Victorian Minds","author":"G Himmelfarb","year":"1968","unstructured":"Himmelfarb, G.: The Haunted House of Jeremy Bentham. In: Victorian Minds, pp. 32\u201381. Alfred A. Knopf, New York (1968)"},{"key":"14_CR12","unstructured":"Huffpost: Google CEO on privacy. Huffington Post (2010)"},{"key":"14_CR13","unstructured":"Jarvis, J.: Public Parts. Simon & Schuster (2011)"},{"issue":"1","key":"14_CR14","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/503355.503366","volume":"9","author":"J Johnson","year":"2002","unstructured":"Johnson, J., Henderson, A.: Conceptual models: begin by designing what to design. Interactions 9(1), 25\u201332 (2002). https:\/\/doi.org\/10.1145\/503355.503366","journal-title":"Interactions"},{"issue":"10","key":"14_CR15","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/S1364-6613(00)01751-4","volume":"5","author":"PN Johnson-Laird","year":"2001","unstructured":"Johnson-Laird, P.N.: Mental models and deduction. Trends Cogn. Sci. 5(10), 434\u2013442 (2001)","journal-title":"Trends Cogn. Sci."},{"key":"14_CR16","unstructured":"Jones, W.: Keeping Found Things Found. Morgan Kaufmann Publishers (2010)"},{"key":"14_CR17","unstructured":"Kessler, G.: James Clapper\u2019s \u201cleast untruthful\u201d statement to the Senate. The Washington Post (2013)"},{"key":"14_CR18","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.cose.2015.07.002","volume":"64","author":"S Kokolakis","year":"2017","unstructured":"Kokolakis, S.: Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122\u2013134 (2017)","journal-title":"Comput. Secur."},{"key":"14_CR19","unstructured":"Levine, R.: Clue Chain Manifesto. Basic Books (1999)"},{"key":"14_CR20","unstructured":"Lockwood, M.: Personal data sovereignty: a sustainable interface layer for a human centered data ecosystem. (Thesis). University of Salford (2020)"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Lockwood, M.: An accessible interface layer for self-sovereign identity. Front. Blockchain 4 (2021a)","DOI":"10.3389\/fbloc.2021.611945"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Lockwood, M.: Exploring value propositions to drive self-sovereign identity adoption. Front. Blockchain 4 (2021b)","DOI":"10.3389\/fbloc.2021.611945"},{"key":"14_CR23","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1111\/j.1467-954X.1993.tb00896.x","volume":"41","author":"D Lyon","year":"1993","unstructured":"Lyon, D.: An electronic panopticon: a sociological critique of surveillance theory. Sociol. Rev. 41, 653\u2013678 (1993)","journal-title":"Sociol. Rev."},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Moglen, E.: The tangled web we have woven. Commun. ACM 56(2) (2013)","DOI":"10.1145\/2408776.2408784"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Mortier, R.: Human-data interaction: the human face of the data-driven society (2014). Available at SSRN: https:\/\/ssrn.com\/abstract=2508051. Accessed 13 Feb 2025","DOI":"10.2139\/ssrn.2508051"},{"key":"14_CR26","unstructured":"Mortier, R., Haddadi, H., Henderson, T.: Challenges & opportunities in human-data interaction. In: Proceedings of DE2013: Open Digital, pp. 4\u20136 (2013)"},{"key":"14_CR27","unstructured":"Norman, D.: Some observations on mental models. In: Human-Computer Interaction, pp. 241\u2013244. Morgan Kaufmann Publishers Inc., San Francisco (1987)"},{"issue":"1","key":"14_CR28","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","volume":"41","author":"P Norberg","year":"2007","unstructured":"Norberg, P., Horne, D., Horne, D.: The privacy paradox: personal information disclosure intentions versus US behaviors. J. Consum. Aff. 41(1), 100\u2013126 (2007)","journal-title":"J. Consum. Aff."},{"issue":"2","key":"14_CR29","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MIC.2016.34","volume":"20","author":"K Ohara","year":"2016","unstructured":"Ohara, K.: The seven veils of privacy. IEEE Internet Comput. 20(2), 86\u201391 (2016)","journal-title":"IEEE Internet Comput."},{"key":"14_CR30","unstructured":"Ohm, P.: Broken promises of privacy: responding to the surprising failure of anonymization. UCLA Law Review (2010)"},{"key":"14_CR31","doi-asserted-by":"crossref","unstructured":"Payne, S.: Users mental models: the very ideas. In: HCI Models, Theories, and Frameworks: Toward a Multidisciplinary Science (2003)","DOI":"10.1016\/B978-155860808-5\/50006-X"},{"key":"14_CR32","unstructured":"Poster, M.: Foucault and databases: participatory surveillance. In: The Mode of Information, pp. 69\u201398. The University of Chicago Press (1990)"},{"key":"14_CR33","unstructured":"ProjectVRM: Project VRM (2019). https:\/\/cyber.harvard.edu\/projectvrm\/Main_Page. Accessed 13 Feb 2025"},{"key":"14_CR34","unstructured":"Robins, K., Webster, F.: Cybernetic capitalism: information, technology, everyday life. In: The Political Economy of Information, The University of Wisconsin Press, Madison (1988)"},{"key":"14_CR35","unstructured":"Rogers, E.: Diffusion of Innovations, 5th edn. Free Press of Glencoe, New York (2012)"},{"key":"14_CR36","unstructured":"Rosenberg, M., et al.: How Trump Consultants Exploited the Facebook Data of Millions. New York Times (2018)"},{"key":"14_CR37","unstructured":"Schneier, B.: Data and Goliath. W. W. Norton & Company (2015)"},{"issue":"23","key":"14_CR38","doi-asserted-by":"publisher","first-page":"R941","DOI":"10.1016\/j.cub.2011.10.030","volume":"21","author":"T Sharot","year":"2011","unstructured":"Sharot, T.: The optimism bias. Curr. Biol. 21(23), R941\u2013R945 (2011)","journal-title":"Curr. Biol."},{"key":"14_CR39","doi-asserted-by":"publisher","DOI":"10.1353\/sor.2017.0010","volume-title":"Privacy Under Surveillance Capitalism","author":"J Silverman","year":"2017","unstructured":"Silverman, J.: Privacy Under Surveillance Capitalism. Rand Corporation, United States (2017)"},{"key":"14_CR40","unstructured":"Solove, D.: I\u2019ve got nothing to hide, and other misunderstandings of privacy. Solove Post, pp. 745\u2013772, May 2008"},{"key":"14_CR41","unstructured":"Solove, D.: Understanding Privacy. Harvard University Press (2008b)"},{"key":"14_CR42","volume-title":"Plans and Situated Actions","author":"LA Suchman","year":"1987","unstructured":"Suchman, L.A.: Plans and Situated Actions. Cambridge University Press, Cambridge (1987)"},{"key":"14_CR43","unstructured":"Tobin, A., Reed, D.: The inevitable rise of self-sovereign identity. Sovrin Foundation (2016). https:\/\/sovrin.org\/wp-content\/uploads\/2018\/03\/The-Inevitable-Rise-of-Self-Sovereign-Identity.pdf. Accessed: 13 Feb 2025"},{"issue":"4","key":"14_CR44","first-page":"295","volume":"4","author":"JJ Thomson","year":"1975","unstructured":"Thomson, J.J.: The right to privacy. Philos Public Aff 4(4), 295\u2013314 (1975)","journal-title":"Philos Public Aff"},{"key":"14_CR45","unstructured":"Turnhout, K.: Design patterns for mixed-method research in HCI. HAN University of Applied Science (2014)"},{"key":"14_CR46","doi-asserted-by":"crossref","unstructured":"Van Kleek, M., O\u2019Hara, K.: The future of social is personal: the potential of the personal data store. Social Collective Intelligence: Combining the Powers of Humans and Machines to Build a Smarter Society, pp. 125\u2013158 (2014). http:\/\/eprints.soton.ac.uk\/363518\/1\/pds.pdf. Accessed 13 Feb 2025","DOI":"10.1007\/978-3-319-08681-1_7"},{"key":"14_CR47","unstructured":"Weston, A.: Privacy and Freedom. Ig Publishing (1967)"},{"key":"14_CR48","unstructured":"Whitten, A., J. Tygar: Why Johnny can\u2019t encrypt: a usability evaluation of PGP 5.0. In: Proceedings of the 8th USENIX Security Symposium, August 1999"},{"key":"14_CR49","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1057\/jit.2015.5","volume":"30","author":"S Zuboff","year":"2015","unstructured":"Zuboff, S.: Big other: surveillance capitalism and the prospects of an information civilization. J. Inf. Technol. 30, 75\u201389 (2015)","journal-title":"J. Inf. Technol."}],"container-title":["Lecture Notes in Computer Science","Human Interface and the Management of Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-93828-3_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T08:38:48Z","timestamp":1749112728000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-93828-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031938276","9783031938283"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-93828-3_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"25 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}