{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:02:48Z","timestamp":1725793368710},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319067001"},{"type":"electronic","value":"9783319067018"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06701-8_6","type":"book-chapter","created":{"date-parts":[[2014,5,8]],"date-time":"2014-05-08T02:25:29Z","timestamp":1399515929000},"page":"85-98","source":"Crossref","is-referenced-by-count":1,"title":["The Design of a Multi-layer Scrutiny Protocol to Support Online Privacy and Accountability"],"prefix":"10.1007","author":[{"given":"Jonas","family":"Sj\u00f6str\u00f6m","sequence":"first","affiliation":[]},{"given":"P\u00e4r J.","family":"\u00c5gerfalk","sequence":"additional","affiliation":[]},{"given":"Alan R.","family":"Hevner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Aakhus, M., \u00c5gerfalk, P., Lyytinen, K., Te\u2019eni, D.: Call for Paper: Information Systems for Symbolic Action: Social Media and Beyond. MIS Quarterly (2011)"},{"issue":"2\/4","key":"6_CR2","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1080\/15228830802094429","volume":"26","author":"A. Barak","year":"2008","unstructured":"Barak, A., Hen, L., Boniel-Nissim, M., Shapira, N.: A Comprehensive Review and a Meta-Analysis of the Effectiveness of Internet-Based Psychotherapeutic Interventions. Journal of Technology in Human Services\u00a026(2\/4), 109\u2013160 (2008)","journal-title":"Journal of Technology in Human Services"},{"issue":"4","key":"6_CR3","doi-asserted-by":"crossref","first-page":"1017","DOI":"10.2307\/41409971","volume":"35","author":"F. B\u00e9langer","year":"2011","unstructured":"B\u00e9langer, F., Crossler, R.E.: Privacy in the Digital Age: A review of information privacy research in information systems. MIS Quarterly\u00a035(4), 1017\u20131041 (2011)","journal-title":"MIS Quarterly"},{"key":"6_CR4","first-page":"171","volume-title":"Computers in Society: Privacy, Ethics and the Internet","author":"M.J. Culnan","year":"2003","unstructured":"Culnan, M.J.: Consumer Privacy, Technology and Policy. In: George, J.F. (ed.) Computers in Society: Privacy, Ethics and the Internet, pp. 171\u2013183. Pearson\/Prentice Hall, Upper Saddle River (2003)"},{"key":"6_CR5","volume-title":"Studies in Ethnomethodology","author":"H. Garfinkel","year":"1967","unstructured":"Garfinkel, H.: Studies in Ethnomethodology. Polity Press, Cambridge (1967)"},{"issue":"3","key":"6_CR6","doi-asserted-by":"publisher","first-page":"29","DOI":"10.4018\/jthi.2005070103","volume":"1","author":"G. Goldkuhl","year":"2005","unstructured":"Goldkuhl, G., Agerfalk, P.J.: IT Artefacts as Socio-Pragmatic Instruments: Reconciling the Pragmatic, Semiotic, and Technical. International Journal of Technology and Human Interaction\u00a01(3), 29\u201343 (2005)","journal-title":"International Journal of Technology and Human Interaction"},{"issue":"3","key":"6_CR7","doi-asserted-by":"crossref","first-page":"611","DOI":"10.2307\/25148742","volume":"30","author":"S. Gregor","year":"2006","unstructured":"Gregor, S.: The Nature of Theory in Information Systems. MIS Quarterly\u00a030(3), 611\u2013642 (2006)","journal-title":"MIS Quarterly"},{"issue":"2","key":"6_CR8","doi-asserted-by":"crossref","first-page":"337","DOI":"10.25300\/MISQ\/2013\/37.2.01","volume":"37","author":"S. Gregor","year":"2013","unstructured":"Gregor, S., Hevner, A.R.: Positioning and Presenting Design Science Research for Maximum Impact. MIS Quarterly\u00a037(2), 337\u2013355 (2013)","journal-title":"MIS Quarterly"},{"issue":"5","key":"6_CR9","doi-asserted-by":"crossref","first-page":"312","DOI":"10.17705\/1jais.00129","volume":"8","author":"S. Gregor","year":"2007","unstructured":"Gregor, S., Jones, D.: The anatomy of a design theory. Journal of the Association for Information Systems\u00a08(5), 312\u2013335 (2007)","journal-title":"Journal of the Association for Information Systems"},{"issue":"1","key":"6_CR10","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"A.R. Hevner","year":"2004","unstructured":"Hevner, A.R., March, S.T., Park, J., Ram, S.: Design science in Information Systems research. MIS Quarterly\u00a028(1), 75\u2013105 (2004)","journal-title":"MIS Quarterly"},{"issue":"3","key":"6_CR11","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1287\/isre.14.3.221.16560","volume":"14","author":"A.S. Lee","year":"2003","unstructured":"Lee, A.S., Baskerville, R.: Generalizing Generalizability in Information Systems Research. Information Systems Research\u00a014(3), 221\u2013243 (2003)","journal-title":"Information Systems Research"},{"key":"6_CR12","unstructured":"Merriam-Webster: Privacy, http:\/\/www.merriam-webster.com\/dictionary\/privacy"},{"issue":"1","key":"6_CR13","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1017\/S1352465899271068","volume":"27","author":"S. Riley","year":"1999","unstructured":"Riley, S., Veale, D.: The Internet & its Relevance to Cognitive Behavioural Psychotherapists. Behavioural and Cognitive Psychotherapy\u00a027(1), 37\u201346 (1999)","journal-title":"Behavioural and Cognitive Psychotherapy"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Sj\u00f6str\u00f6m, J., \u00c5gerfalk, P.J., Hevner, A.R.: Privacy and Accountability in Online Communities: Towards a Theory of Scrutiny. In: Helfert, M., Donnellan, B. (eds.) Proceedings of European Design Science Symposium 2013. To appear in CCIS. Springer (2013)","DOI":"10.1007\/978-3-319-13936-4_4"},{"issue":"4","key":"6_CR15","doi-asserted-by":"crossref","first-page":"989","DOI":"10.2307\/41409970","volume":"35","author":"H.J. Smith","year":"2011","unstructured":"Smith, H.J., Dinev, T.: Information Privacy Research: An interdisciplinary review. MIS Quarterly\u00a035(4), 989\u20131015 (2011)","journal-title":"MIS Quarterly"},{"issue":"3","key":"6_CR16","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1089\/1094931041291295","volume":"7","author":"J. Suler","year":"2004","unstructured":"Suler, J.: The Online Disinhibition Effect. Cyberpsychology and Behavior\u00a07(3), 321\u2013327 (2004)","journal-title":"Cyberpsychology and Behavior"},{"issue":"1","key":"6_CR17","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/s12160-009-9131-6","volume":"38","author":"D. Tate","year":"2009","unstructured":"Tate, D., Finkelstein, E.: Cost effectiveness of internet interventions: review and recommendations. Annals of Behavioral Medicine\u00a038(1), 40\u201345 (2009)","journal-title":"Annals of Behavioral Medicine"},{"key":"6_CR18","unstructured":"United Nations: The Universal Declaration of Human Rights, http:\/\/www.webcitation.org\/6LIK5GgYI"},{"key":"6_CR19","volume-title":"Economy and Society","author":"M. Weber","year":"1978","unstructured":"Weber, M.: Economy and Society. University of California Press, Berkeley (1978)"},{"issue":"6","key":"6_CR20","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1145\/1349026.1349043","volume":"51","author":"D.J. Weitzner","year":"2008","unstructured":"Weitzner, D.J., Abelson, H., Berners-Lee, T., Feigenbaum, J., Hendler, J., Sussman, G.J.: Information accountability. Communications of the ACM\u00a051(6), 82\u201387 (2008)","journal-title":"Communications of the ACM"},{"key":"6_CR21","unstructured":"Zhuo, J.: Where Anonymity Breeds Contempt. The New York Times (2010)"}],"container-title":["Lecture Notes in Computer Science","Advancing the Impact of Design Science: Moving from Theory to Practice"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06701-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,19]],"date-time":"2020-08-19T04:21:18Z","timestamp":1597810878000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06701-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319067001","9783319067018"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06701-8_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}