{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T20:38:27Z","timestamp":1767904707650,"version":"3.49.0"},"publisher-location":"Cham","reference-count":73,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032050014","type":"print"},{"value":"9783032050021","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T00:00:00Z","timestamp":1757376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T00:00:00Z","timestamp":1757376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-05002-1_11","type":"book-chapter","created":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T15:07:31Z","timestamp":1757344051000},"page":"203-225","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Dancing with\u00a0Data: Privacy Compromises of\u00a0Egyptian Women Reconciling Westernized Social Media Sharing with\u00a0Local Cultural Values"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-2912-6338","authenticated-orcid":false,"given":"Mennatallah","family":"Saleh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6519-318X","authenticated-orcid":false,"given":"Shaun","family":"Macdonald","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1712-1610","authenticated-orcid":false,"given":"Christian","family":"Sturm","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,9]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Abokhodair, N., Vieweg, S.: Privacy & social media in the context of the Arab gulf. In: Proceedings of the 2016 ACM Conference on Designing Interactive Systems, pp. 672\u2013683 (2016)","DOI":"10.1145\/2901790.2901873"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Abu-Lughod, L.: \u201cOrientalism\u201d and middle east feminist studies (2001)","DOI":"10.2307\/3178451"},{"key":"11_CR3","unstructured":"Afnan, T., Zou, Y., Mustafa, M., Naseem, M., Schaub, F.: Aunties, strangers, and the FBI: online privacy concerns and experiences of Muslim-American women. In: Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), pp. 387\u2013406 (2022)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Ahmed, S.I., Haque, M.R., Chen, J., Dell, N.: Digital privacy challenges with shared mobile phone use in Bangladesh. Proc. ACM Hum.-Comput. Interact. 1(CSCW), 1\u201320 (2017)","DOI":"10.1145\/3134652"},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ijedudev.2015.09.001","volume":"45","author":"R Assaad","year":"2015","unstructured":"Assaad, R., Krafft, C.: Is free basic education in Egypt a reality or a myth? Int. J. Educ. Dev. 45, 16\u201330 (2015)","journal-title":"Int. J. Educ. Dev."},{"issue":"1","key":"11_CR6","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1300\/J265v04n01_04","volume":"4","author":"M Badran","year":"1986","unstructured":"Badran, M.: Islam, patriarchy, and feminism in the middle east. Trends Hist. 4(1), 49\u201371 (1986)","journal-title":"Trends Hist."},{"issue":"1","key":"11_CR7","first-page":"1","volume":"27","author":"G Bansal","year":"2024","unstructured":"Bansal, G.: Reprogramming the software of the mind: a new framework for cultural homogenization. J. Glob. Inf. Technol. Manag. 27(1), 1\u20137 (2024)","journal-title":"J. Glob. Inf. Technol. Manag."},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Birge, C.: Enhancing research into usable privacy and security. In: Proceedings of the 27th ACM International Conference on Design of Communication, pp. 221\u2013226 (2009)","DOI":"10.1145\/1621995.1622039"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Blank, G., Bolsover, G., Dubois, E.: A new privacy paradox: young people and privacy on social network sites. In: Prepared for the Annual Meeting of the American Sociological Association, vol.\u00a017 (2014)","DOI":"10.2139\/ssrn.2479938"},{"key":"11_CR10","unstructured":"Blumler, J.G., Katz, E.: The uses of mass communications: current perspectives on gratifications research. Sage Ann. Rev. Commun. Res. Vol. III (1974)"},{"issue":"1","key":"11_CR11","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1111\/ecin.13015","volume":"60","author":"M Bourreau","year":"2022","unstructured":"Bourreau, M., Moreau, F., Wikstr\u00f6m, P.: Does digitization lead to the homogenization of cultural content? Econ. Inq. 60(1), 427\u2013453 (2022)","journal-title":"Econ. Inq."},{"key":"11_CR12","unstructured":"Cavoukian, A., et al.: Privacy by design: The 7 foundational principles 5, 12 (2009). Information and Privacy Commissioner of Ontario, Canada"},{"issue":"3","key":"11_CR13","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1177\/1368430212463453","volume":"16","author":"S Cihangir","year":"2013","unstructured":"Cihangir, S.: Gender specific honor codes and cultural change. Group Processes Intergroup Relat. 16(3), 319\u2013333 (2013)","journal-title":"Group Processes Intergroup Relat."},{"key":"11_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2022.101304","volume":"45","author":"DP Cingel","year":"2022","unstructured":"Cingel, D.P., Carter, M.C., Krause, H.V.: Social media and self-esteem. Curr. Opin. Psychol. 45, 101304 (2022)","journal-title":"Curr. Opin. Psychol."},{"key":"11_CR15","unstructured":"Corbin, J., Strauss, A.: Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory. Sage Publications (2014)"},{"key":"11_CR16","unstructured":"Costa, C., Torres, R.: To be or not to be, the importance of digital identity in the networked society. Educa\u00e7\u00e3o, Forma\u00e7\u00e3o & Tecnologias (Specia) (2011)"},{"issue":"1","key":"11_CR17","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1080\/1467598032000044647","volume":"14","author":"AFE Darwish","year":"2003","unstructured":"Darwish, A.F.E., Huber, G.L.: Individualism vs collectivism in different cultures: a cross-cultural study. Intercult. Educ. 14(1), 47\u201356 (2003)","journal-title":"Intercult. Educ."},{"key":"11_CR18","unstructured":"Elworthy, F.T.: The evil eye: an account of this ancient and widespread superstition. J. Murray (1895)"},{"issue":"3","key":"11_CR19","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/S0147-1767(97)00005-9","volume":"21","author":"E Feghali","year":"1997","unstructured":"Feghali, E.: Arab cultural communication patterns. Int. J. Intercult. Relat. 21(3), 345\u2013378 (1997)","journal-title":"Int. J. Intercult. Relat."},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Fernea, R.: Gender, sexuality and patriarchy in modern Egypt. Critique Crit. Middle Eastern Stud. 12(2), 141\u2013153 (2003)","DOI":"10.1080\/1066992032000130602"},{"issue":"3","key":"11_CR21","doi-asserted-by":"publisher","first-page":"220","DOI":"10.2307\/2643011","volume":"14","author":"YV Gankovsky","year":"1974","unstructured":"Gankovsky, Y.V.: The social structure of society in the People\u2019s Republic of Bangladesh. Asian Surv. 14(3), 220\u2013230 (1974)","journal-title":"Asian Surv."},{"key":"11_CR22","first-page":"593","volume":"40","author":"S Ghoshray","year":"2013","unstructured":"Ghoshray, S.: Employer surveillance versus employee privacy: the new reality of social media and workplace privacy. N. Ky. L. Rev. 40, 593 (2013)","journal-title":"N. Ky. L. Rev."},{"issue":"2","key":"11_CR23","first-page":"108","volume":"15","author":"BG Glaser","year":"2016","unstructured":"Glaser, B.G.: Open coding descriptions. Grounded Theor. Rev. 15(2), 108\u2013110 (2016)","journal-title":"Grounded Theor. Rev."},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Glaser, B.G., Strauss, A.L.: The Discovery of Grounded Theory: Strategies for Qualitative Research. Routledge (2017)","DOI":"10.4324\/9780203793206"},{"issue":"7","key":"11_CR25","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1089\/cyber.2017.0709","volume":"21","author":"A Gruzd","year":"2018","unstructured":"Gruzd, A., Hern\u00e1ndez-Garc\u00eda, A.: Privacy concerns and self-disclosure in private and public uses of social media. Cyberpsychol. Behav. Soc. Netw. 21(7), 418\u2013428 (2018)","journal-title":"Cyberpsychol. Behav. Soc. Netw."},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Hamid\u00a0Nemati, J.D.W., Chow, A.: Privacy coping and information-sharing behaviors in social media: a comparison of Chinese and U.S. users. J. Glob. Inf. Technol. Manag. 17(4), 228\u2013249 (2014)","DOI":"10.1080\/1097198X.2014.978622"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Haque, S.T., Saha, P., Rahman, M.S., Ahmed, S.I.: Of Ulti,\u2018Hajano\u2019, and \u201cMatachetar otanetak datam\u201d exploring local practices of exchanging confidential and sensitive information in urban Bangladesh. Proc. ACM Hum.-Comput. Interact. 3(CSCW), 1\u201322 (2019)","DOI":"10.1145\/3359275"},{"issue":"7302","key":"11_CR28","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1038\/466029a","volume":"466","author":"J Henrich","year":"2010","unstructured":"Henrich, J., Heine, S.J., Norenzayan, A.: Most people are not weird. Nature 466(7302), 29 (2010)","journal-title":"Nature"},{"issue":"2\u20133","key":"11_CR29","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1017\/S0140525X0999152X","volume":"33","author":"J Henrich","year":"2010","unstructured":"Henrich, J., Heine, S.J., Norenzayan, A.: The weirdest people in the world? Behav. Brain Sci. 33(2\u20133), 61\u201383 (2010)","journal-title":"Behav. Brain Sci."},{"issue":"1","key":"11_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/jcp2010001","volume":"2","author":"TB Herath","year":"2022","unstructured":"Herath, T.B., Khanna, P., Ahmed, M.: Cybersecurity practices for social media users: a systematic literature review. J. Cybersecur. Priv. 2(1), 1\u201318 (2022)","journal-title":"J. Cybersecur. Priv."},{"key":"11_CR31","unstructured":"Hinnebusch, R.A.: Children of the elite: political attitudes of the westernized bourgeoisie in contemporary Egypt. Middle East J. 36(4) (1982)"},{"issue":"2","key":"11_CR32","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/BF01733682","volume":"1","author":"G Hofstede","year":"1984","unstructured":"Hofstede, G.: Cultural dimensions in management and planning. Asia Pac. J. Manag. 1(2), 81\u201399 (1984)","journal-title":"Asia Pac. J. Manag."},{"key":"11_CR33","doi-asserted-by":"crossref","unstructured":"Hoodfar, H.: Return to the veil: personal strategy and public participation in Egypt. In: Working Women, pp. 115\u2013136. Routledge (2005)","DOI":"10.4324\/9780203975930-11"},{"key":"11_CR34","doi-asserted-by":"crossref","unstructured":"Howell, B.: Weird? Institutions and consumers\u2019 perceptions of artificial intelligence in 31 countries. AI & Soc., 1\u201323 (2025)","DOI":"10.2139\/ssrn.4902254"},{"key":"11_CR35","unstructured":"Internet World Stats: Internet world stats: usage and population statistics. https:\/\/www.internetworldstats.com\/stats5.htm. Accessed 9 June 2022"},{"key":"11_CR36","unstructured":"Krishnan, S.: Exploitation of human trust, curiosity and ignorance by malware. arXiv preprint arXiv:2002.11805 (2020)"},{"issue":"4","key":"11_CR37","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1177\/0306396818823172","volume":"60","author":"M Kwet","year":"2019","unstructured":"Kwet, M.: Digital colonialism: US empire and the new imperialism in the global south. Race Class 60(4), 3\u201326 (2019)","journal-title":"Race Class"},{"key":"11_CR38","doi-asserted-by":"crossref","unstructured":"Liao, Y.: Sharing personal health information on social media: balancing self-presentation and privacy. In: Proceedings of the 10th International Conference on Social Media and Society, pp. 194\u2013204 (2019)","DOI":"10.1145\/3328529.3328560"},{"key":"11_CR39","doi-asserted-by":"crossref","unstructured":"Lingard, L., Albert, M., Levinson, W.: Grounded theory, mixed methods, and action research. BMJ 337 (2008)","DOI":"10.1136\/bmj.39602.690162.47"},{"key":"11_CR40","doi-asserted-by":"crossref","unstructured":"Linxen, S., Sturm, C., Br\u00fchlmann, F., Cassau, V., Opwis, K., Reinecke, K.: How WEIRD is CHI? In: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, pp. 1\u201314 (2021)","DOI":"10.1145\/3411764.3445488"},{"issue":"4","key":"11_CR41","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1080\/0144929X.2014.937458","volume":"34","author":"J Liu","year":"2015","unstructured":"Liu, J., Rau, P.L.P., Wendler, N.: Trust and online information-sharing in close relationships: a cross-cultural perspective. Behav. Inf. Technol. 34(4), 363\u2013374 (2015)","journal-title":"Behav. Inf. Technol."},{"issue":"6\u20138","key":"11_CR42","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1177\/1748048518802241","volume":"81","author":"A L\u00f6wstedt","year":"2019","unstructured":"L\u00f6wstedt, A.: Do we still adhere to the norms of ancient Egypt? A comparison of Ptahhotep\u2019s communication ethics with current regulatory principles. Int. Commun. Gaz. 81(6\u20138), 493\u2013517 (2019)","journal-title":"Int. Commun. Gaz."},{"key":"11_CR43","first-page":"9953","volume":"259","author":"K Mitri","year":"2022","unstructured":"Mitri, K.: In the gender war, was patriarchy victorious? Theoretical concepts of gender discrimination in patriarchal societies and solutions. J. ISSN 259, 9953 (2022)","journal-title":"J. ISSN"},{"key":"11_CR44","unstructured":"Mohd, K.B.: The integrity of fintech in information security from Islamic perspective. Editorial Board 61 (2019)"},{"issue":"6","key":"11_CR45","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1145\/3278154","volume":"25","author":"R Molich","year":"2018","unstructured":"Molich, R.: Are usability evaluations reproducible? Interactions 25(6), 82\u201385 (2018)","journal-title":"Interactions"},{"key":"11_CR46","unstructured":"Mughazy, M.A.E.: Pragmatics of the evil eye in Egyptian Arabaic (2000)"},{"key":"11_CR47","doi-asserted-by":"crossref","unstructured":"Munyendo, C.W., Acar, Y., Aviv, A.J.: \u201cIn eighty percent of the cases, I select the password for them\u201d: security and privacy challenges, advice, and opportunities at cybercafes in Kenya. In: 2023 IEEE Symposium on Security and Privacy (SP), pp. 570\u2013587. IEEE (2023)","DOI":"10.1109\/SP46215.2023.10179410"},{"key":"11_CR48","doi-asserted-by":"crossref","unstructured":"Mustafa, M., Asad, A.M., Hassan, S., Haider, U., Durrani, Z., Krombholz, K.: Pakistani teens and privacy-how gender disparities, religion and family values impact the privacy design space. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (2023)","DOI":"10.1145\/3576915.3623087"},{"key":"11_CR49","unstructured":"Naguib, A.M.: Ketabat fel mogtamaa wal iqtisad-masr (writings about society and economy-Egypt) (2006)"},{"issue":"1","key":"11_CR50","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","volume":"41","author":"PA Norberg","year":"2007","unstructured":"Norberg, P.A., Horne, D.R., Horne, D.A.: The privacy paradox: personal information disclosure intentions versus behaviors. J. Consum. Aff. 41(1), 100\u2013126 (2007)","journal-title":"J. Consum. Aff."},{"key":"11_CR51","doi-asserted-by":"crossref","unstructured":"Nourian, L., Shinohara, K., Tigwell, G.W.: Digital accessibility in Iran: an investigation focusing on Iran\u2019s national policies on accessibility and disability support. In: Proceedings of the 24th International ACM SIGACCESS Conference on Computers and Accessibility, pp.\u00a01\u20135 (2022)","DOI":"10.1145\/3517428.3550385"},{"issue":"1","key":"11_CR52","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1215\/15525864-8790347","volume":"17","author":"N Pratt","year":"2021","unstructured":"Pratt, N.: Popular culture, gender, and revolution in Egypt. J. Middle East Women\u2019s Stud. 17(1), 137\u2013146 (2021)","journal-title":"J. Middle East Women\u2019s Stud."},{"key":"11_CR53","doi-asserted-by":"crossref","unstructured":"Riva, G., Wiederhold, B.K., Cipresso, P.: Psychology of social media: from technology to identity. In: The Psychology of Social Networking, vol. 1, pp. 4\u201314. De Gruyter Open Poland (2016)","DOI":"10.1515\/9783110473780-003"},{"key":"11_CR54","doi-asserted-by":"crossref","unstructured":"Saleh, M., Elagroudy, P., Lukowicz, P., Sturm, C.: Ghost readers of the Nile: decrypting password sharing habits in chatting applications among Egyptian women. Proc. ACM Hum.-Comput. Interact. 8(MHCI), 1\u201343 (2024)","DOI":"10.1145\/3676506"},{"key":"11_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-030-29387-1_5","volume-title":"Human-Computer Interaction \u2013 INTERACT 2019","author":"M Saleh","year":"2019","unstructured":"Saleh, M., Khamis, M., Sturm, C.: What about My privacy, Habibi? In: Lamas, D., Loizides, F., Nacke, L., Petrie, H., Winckler, M., Zaphiris, P. (eds.) INTERACT 2019. LNCS, vol. 11748, pp. 67\u201387. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29387-1_5"},{"issue":"9","key":"11_CR56","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"JH Saltzer","year":"1975","unstructured":"Saltzer, J.H., Schroeder, M.D.: The protection of information in computer systems. Proc. IEEE 63(9), 1278\u20131308 (1975)","journal-title":"Proc. IEEE"},{"key":"11_CR57","doi-asserted-by":"crossref","unstructured":"Sambasivan, N., et al.: \u201cThey don\u2019t leave us alone anywhere we go\u201d gender and digital abuse in south Asia. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pp. 1\u201314 (2019)","DOI":"10.1145\/3290605.3300232"},{"key":"11_CR58","unstructured":"Sambasivan, N., et al.: \u201cPrivacy is not for Me, it\u2019s for those rich women\u201d: performative privacy practices on mobile phones by women in south Asia. In: Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), pp. 127\u2013142 (2018)"},{"key":"11_CR59","doi-asserted-by":"crossref","unstructured":"Sannon, S., Bazarova, N.N., Cosley, D.: Privacy lies: understanding how, when, and why people lie to protect their privacy in multiple online contexts. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1\u201313 (2018)","DOI":"10.1145\/3173574.3173626"},{"key":"11_CR60","doi-asserted-by":"crossref","unstructured":"Saravanakumar, K., Deepa, K., et\u00a0al.: On privacy and security in social media\u2013a comprehensive study. Procedia Comput. Sci. 78 (2016)","DOI":"10.1016\/j.procs.2016.02.019"},{"issue":"3","key":"11_CR61","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1038\/s42256-023-00621-9","volume":"5","author":"N Sengupta","year":"2023","unstructured":"Sengupta, N., Subramanian, V., Mukhopadhyay, A., Scaria, A.G.: A global south perspective for ethical algorithms and the state. Nat. Mach. Intell. 5(3), 184\u2013186 (2023)","journal-title":"Nat. Mach. Intell."},{"key":"11_CR62","doi-asserted-by":"crossref","unstructured":"Sherman, L.E., Hernandez, L.M., Greenfield, P.M., Dapretto, M.: What the brain \u2018Likes\u2019: neural correlates of providing feedback on social media. Soc. Cogn. Affect. Neurosci. 13(7), 699\u2013707 (2018)","DOI":"10.1093\/scan\/nsy051"},{"issue":"1","key":"11_CR63","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1111\/j.1467-971X.1994.tb00283.x","volume":"13","author":"PB Stevens","year":"1994","unstructured":"Stevens, P.B.: The pragmatics of street hustlers\u2019 English in Egypt. World Englishes 13(1), 61\u201373 (1994)","journal-title":"World Englishes"},{"key":"11_CR64","doi-asserted-by":"crossref","unstructured":"Tarek\u00a0Okasha, H.E., El-Ghamry, R.: Overview of the family structure in Egypt and its relation to psychiatry. Int. Rev. Psychiatry 24(2) (2012). pMID: 22515467","DOI":"10.3109\/09540261.2012.658030"},{"key":"11_CR65","unstructured":"Thomson, S.B.: Sample size and grounded theory. Thomson, SB (2010). Grounded theory-sample size. J. Adm. Gov. 5(1), 45\u201352 (2010)"},{"key":"11_CR66","doi-asserted-by":"crossref","unstructured":"Turel, O., Qahri-Saremi, H.: Role of \u201clikes\u201d and \u201cdislikes\u201d in influencing user behaviors on social media. J. Manag. Inf. Syst. 41(2), 515\u2013545 (2024)","DOI":"10.1080\/07421222.2024.2340829"},{"key":"11_CR67","unstructured":"Usmani, S.A.A., Shahzad, M.: Sharing\/spreading non-verified information on social media in the light of Quran and Sunnah. The Islamic Culture \u201cAs-Saqafat-ul Islamia\u201d Al Thaqafa Al Islamiyah-Res. J.-Sheikh Zayed Islamic Centre University of Karachi 43 (2020)"},{"issue":"1","key":"11_CR68","first-page":"166","volume":"25","author":"AF Westin","year":"1968","unstructured":"Westin, A.F.: Privacy and freedom. Washington Lee Law Rev. 25(1), 166 (1968)","journal-title":"Washington Lee Law Rev."},{"key":"11_CR69","unstructured":"Whitten, A., Tygar, J.D.: Why Johnny can\u2019t encrypt: a usability evaluation of PGP 5.0. In: USENIX Security Symposium, vol.\u00a0348, pp. 169\u2013184 (1999)"},{"issue":"3","key":"11_CR70","first-page":"207","volume":"70","author":"PF Wu","year":"2019","unstructured":"Wu, P.F.: The privacy paradox in the context of online social networking: a self-identity perspective. J. Am. Soc. Inf. Sci. 70(3), 207\u2013217 (2019)","journal-title":"J. Am. Soc. Inf. Sci."},{"key":"11_CR71","unstructured":"Yamin, S.: Challenging patriarchy: Pakistan, Egypt, and Turkey. In: Women Waging War and Peace: International Perspectives of Women\u2019s roles in Conflict and Post-Conflict Reconstruction (2011)"},{"issue":"8","key":"11_CR72","doi-asserted-by":"publisher","first-page":"3879","DOI":"10.1007\/s12144-019-00344-4","volume":"40","author":"L Yin","year":"2021","unstructured":"Yin, L., Wang, P., Nie, J., Guo, J., Feng, J., Lei, L.: Social networking sites addiction and FoMo: the mediating role of envy and the moderating role of need to belong. Curr. Psychol. 40(8), 3879\u20133887 (2021)","journal-title":"Curr. Psychol."},{"key":"11_CR73","doi-asserted-by":"crossref","unstructured":"Zakaria, N., Stanton, J.M., Sarkar-Barney, S.T.: Designing and implementing culturally-sensitive it applications: the interaction of culture values and privacy issues in the middle east. Inf. Technol. People (2003)","DOI":"10.1108\/09593840310463023"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-05002-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T16:06:53Z","timestamp":1767888413000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-05002-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,9]]},"ISBN":["9783032050014","9783032050021"],"references-count":73,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-05002-1_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,9]]},"assertion":[{"value":"9 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTERACT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belo Horizonte","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brazil","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"interact2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifip-tc13.org\/interact2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}