{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:31:36Z","timestamp":1743089496443,"version":"3.40.3"},"publisher-location":"Cham","reference-count":60,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319076195"},{"type":"electronic","value":"9783319076201"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07620-1_36","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:55:03Z","timestamp":1402404903000},"page":"410-421","source":"Crossref","is-referenced-by-count":5,"title":["Mental Models for Usable Privacy: A Position Paper"],"prefix":"10.1007","author":[{"given":"Kovila P. L.","family":"Coopamootoo","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Gro\u00df","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd Generation E-Commerce: Privacy preferences vs. actual behavior. In: Proc. ACM Conf. E-Commerce, pp. 38\u201347 (2001)","DOI":"10.1145\/501158.501163"},{"issue":"1","key":"36_CR2","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2005.22","volume":"3","author":"A. Acquisti","year":"2005","unstructured":"Acquisti, A., Grossklags, J.: Privacy and rationality in indiviual decision making. IEEE S & P\u00a03(1), 26\u201333 (2005)","journal-title":"IEEE S & P"},{"issue":"1","key":"36_CR3","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/TSE.2008.88","volume":"38","author":"S. Spiekermann","year":"2009","unstructured":"Spiekermann, S., Cranor, L.: Engineering privacy. IEEE Trans. on S\/W Eng.\u00a038(1), 67\u201382 (2009)","journal-title":"IEEE Trans. on S\/W Eng."},{"key":"36_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-45427-6_23","volume-title":"Ubicomp 2001: Ubiquitous Computing","author":"M. Langheinrich","year":"2001","unstructured":"Langheinrich, M.: Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol.\u00a02201, pp. 273\u2013291. Springer, Heidelberg (2001)"},{"key":"36_CR5","unstructured":"Cavoukian, A.: Privacy by Design... Take the Challenge. Information (2009)"},{"key":"#cr-split#-36_CR6.1","doi-asserted-by":"crossref","unstructured":"Milne, G.R., Culnan, M.J.: Strategies for reducing privacy risks: why consumers read (or don't read) online privacy notices? Journ. of Interactive Marketing\u00a018(3), 15-29 (2004)","DOI":"10.1002\/dir.20009"},{"key":"#cr-split#-36_CR6.2","unstructured":"and Privacy Commissioner of Ontario, Canada (2009)"},{"key":"36_CR7","unstructured":"Zwick, D., Dholakia, N.: Models of privacy in the digital age: implications for marketing and e-commerce. Research Inst. for Telecom. and Information Marketing (1999)"},{"issue":"4157","key":"36_CR8","doi-asserted-by":"publisher","first-page":"1124","DOI":"10.1126\/science.185.4157.1124","volume":"185","author":"A. Tversky","year":"1974","unstructured":"Tversky, A., Kahneman, D.: Judgement under uncertainty: heuristics and biases. Science\u00a0185(4157), 1124\u20131131 (1974)","journal-title":"Science"},{"key":"36_CR9","first-page":"126","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems","author":"L. Palen","year":"2003","unstructured":"Palen, L., Dourish, P.: \u2018Unpacking\u2019 privacy for a networked world. In: Proceedings of the CHI Conference on Human Factors in Computing Systems, pp. 126\u2013136. ACM, NY (2003)"},{"key":"36_CR10","unstructured":"Norman, D.A.: Some observations on mental models. In: Human-computer Interaction, pp. 241\u2013244. Morgan Kaufmann Publishers Inc., CA (1983, 1987)"},{"key":"36_CR11","unstructured":"Borgman, C.L.: The user\u2019s mental model of an information retrieval system: effects on performance. Dissertation abstract internations, 45, 4a (1984)"},{"key":"36_CR12","doi-asserted-by":"crossref","unstructured":"Halasz, F.G.: Mental models and problem solving in using a calculator. Doctoral dissertation, Standord University, CA, USA (1984)","DOI":"10.1145\/800045.801613"},{"key":"36_CR13","doi-asserted-by":"crossref","unstructured":"Stanovich, K.E.: Who is Rational? Studies of Individual Differences in Reasoning, Elrbaum (1999)","DOI":"10.4324\/9781410603432"},{"key":"36_CR14","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1017\/S0140525X00003435","volume":"23","author":"K.E. Stanovich","year":"2000","unstructured":"Stanovich, K.E., West, R.F.: Individual differences in reasoning: Implications for the rationality debate. Behav. Brain Sci.\u00a023, 645\u2013726 (2000)","journal-title":"Behav. Brain Sci."},{"key":"36_CR15","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1146\/annurev.psych.59.103006.093629","volume":"59","author":"J.B.T. Evans","year":"2008","unstructured":"Evans, J.B.T.: Dual-processing accounts of reasoning, judgment and social cognition. Annual Review of Psychology\u00a059, 255\u2013278 (2008)","journal-title":"Annual Review of Psychology"},{"key":"36_CR16","volume-title":"Thinking fast and slow","author":"D. Kahneman","year":"2011","unstructured":"Kahneman, D.: Thinking fast and slow. Farrar, Strauss (2011)"},{"issue":"1","key":"36_CR17","first-page":"119","volume":"79","author":"H.F. Nissenbaum","year":"2004","unstructured":"Nissenbaum, H.F.: Privacy as contextual integrity. Washington Law Review\u00a079(1), 119\u2013158 (2004)","journal-title":"Washington Law Review"},{"key":"36_CR18","volume-title":"The Environment and Social Behaviour: Privacy, Personal Space, Territory and Crowding","author":"I. Altman","year":"1975","unstructured":"Altman, I.: The Environment and Social Behaviour: Privacy, Personal Space, Territory and Crowding. Brooks\/Cole Publishing, Monterey (1975)"},{"key":"36_CR19","doi-asserted-by":"crossref","unstructured":"Coles-Kemp, L., Kani-Zabihi, E.: On-line privacy and consent: a dialogue, not a monologue. In: NSPW 2010 (2010)","DOI":"10.1145\/1900546.1900560"},{"key":"36_CR20","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.istr.2009.10.003","volume":"14","author":"L. Bennett","year":"2009","unstructured":"Bennett, L.: Reflections on privacy, identity and consent in on-line services. Information Security Technical Report\u00a014, 119\u2013123 (2009)","journal-title":"Information Security Technical Report"},{"key":"36_CR21","unstructured":"LeBoeuf, R.A., Shafir, E.: Decision Making. In: Holyoak, K.J., Morrisson, R.G. (eds.) The Cambridge Handbook of Thinking and Reasoning (2005)"},{"issue":"2","key":"36_CR22","doi-asserted-by":"publisher","first-page":"262","DOI":"10.2307\/1914185","volume":"47","author":"D. Kahneman","year":"1979","unstructured":"Kahneman, D., Tversky, A.: Prospect theory: an analysis of decision under risk. Econometrica\u00a047(2), 262\u2013292 (1979)","journal-title":"Econometrica"},{"issue":"1","key":"36_CR23","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1257\/jep.5.1.193","volume":"5","author":"D. Kahneman","year":"1991","unstructured":"Kahneman, D., Jack, L.K., Thaler, R.: Anomalies: The endowment effect, loss aversion and the status quo bias. Journal of Economic Perspectives\u00a05(1), 193\u2013206 (1991)","journal-title":"Journal of Economic Perspectives"},{"key":"36_CR24","unstructured":"Kahneman, D., Frederick, S.: A model of Heuristic Judgment. In: Holyoak, K.J., Morrisson, R.G. (eds.) The Cambridge Handbook of Thinking and Reasoning (2005)"},{"key":"36_CR25","doi-asserted-by":"crossref","unstructured":"Baumeister, R.F., Vohs, K.D., Tice, D.M.: The strength model of self-control. Current Directions in Psychological Science (2007)","DOI":"10.1111\/j.1467-8721.2007.00534.x"},{"key":"36_CR26","volume-title":"The nature of explanation","author":"K. Craik","year":"1943","unstructured":"Craik, K.: The nature of explanation. Cambridge University Press, Cambridge (1943)"},{"key":"36_CR27","volume-title":"Mental Models: Towards a Cognitive Science of Language, Inference, and Consciousness","author":"P.N. Johnson-Laird","year":"1983","unstructured":"Johnson-Laird, P.N.: Mental Models: Towards a Cognitive Science of Language, Inference, and Consciousness. Cambridge University Press, Cambridge (1983)"},{"key":"36_CR28","unstructured":"Johnson-Laird, P.N.: How we reason. Oxford University Press (2006)"},{"issue":"4","key":"36_CR29","doi-asserted-by":"publisher","first-page":"1040","DOI":"10.1037\/0033-295X.112.4.1040","volume":"112","author":"J.B.T. Evans","year":"2002","unstructured":"Evans, J.B.T., Over, D.E., Handley, S.J.: Suppositions, extensionality, and conditionals: a critique of the mental model theory of Johnson-Laird and Byrne. Psychological Review\u00a0112(4), 1040\u20131052 (2002)","journal-title":"Psychological Review"},{"issue":"4","key":"36_CR30","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.dr.2009.09.002","volume":"29","author":"C. Gauffroy","year":"2009","unstructured":"Gauffroy, C., Barouillet, P.: Heuristic and analytic processes in mental models for conditionals: an integrative development theory. Develop. Review\u00a029(4), 249\u2013282 (2009)","journal-title":"Develop. Review"},{"key":"36_CR31","doi-asserted-by":"crossref","unstructured":"Johnson-Laird, P.N.: Mental models and human reasoning. Proceedings of the National Academy of Sciences of the USA, 107(43) (2007)","DOI":"10.1073\/pnas.1012933107"},{"key":"36_CR32","volume-title":"Deduction","author":"P.N. Johnson-Laird","year":"1991","unstructured":"Johnson-Laird, P.N., Byrne, R.M.J.: Deduction. Erlbaum, Hillsdale (1991)"},{"key":"36_CR33","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1037\/0033-295X.102.3.533","volume":"102","author":"T.A. Polk","year":"1995","unstructured":"Polk, T.A., Newell, A.: Deduction as verbal reasoning. Psychol. Rev.\u00a0102, 533\u2013566 (1995)","journal-title":"Psychol. Rev."},{"key":"36_CR34","unstructured":"Rogers, Y., Rutherford, A., Bibby, P.A.: Models in the Mind: Theory, Perspective and Application, London (1992)"},{"key":"36_CR35","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1146\/annurev.psych.52.1.223","volume":"52","author":"A.B. Markman","year":"2001","unstructured":"Markman, A.B., Gentner, D.: Thinking. Annual Review of Psychology\u00a052, 223\u2013247 (2001)","journal-title":"Annual Review of Psychology"},{"key":"36_CR36","unstructured":"Johnson-Laird, P.N.: Mental models and thought. In: Holyoak, K.J., Morrisson, R.G. (eds.) The Cambridge Handbook of Thinking and Reasoning (2005)"},{"key":"36_CR37","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1037\/0033-295X.109.4.646","volume":"109","author":"P.N. Johnson-Laird","year":"2002","unstructured":"Johnson-Laird, P.N., Byrne, R.M.J.: Conditionals: A theory of meaning, pragmatics, and inference. Psychological Review\u00a0109, 646\u2013678 (2002)","journal-title":"Psychological Review"},{"issue":"3","key":"36_CR38","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1037\/0033-295X.115.3.760","volume":"115","author":"P. Barrouillet","year":"2008","unstructured":"Barrouillet, P., Gauffroy, C., Lecas, J.F.: Mental models and the suppositional account of conditionals. Psychological Review\u00a0115(3), 760\u2013771 (2008)","journal-title":"Psychological Review"},{"key":"36_CR39","unstructured":"Sasse, M.A.: Eliciting and Describing Users\u2019 Models of Computer Systems. Ph.D. Thesis, Computer Science, University of Birmingham (1997)"},{"key":"36_CR40","first-page":"99","volume-title":"Mental Models","author":"D. Gentner","year":"1983","unstructured":"Gentner, D., Gentner, D.R.: Flowing waters or teemings crowds: mental models of electricity. In: Gentner, D., Stevens, A.L. (eds.) Mental Models, pp. 99\u2013130. Lawrence Erlbaum Associate, Hilsdale (1983)"},{"issue":"3","key":"36_CR41","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1093\/sf\/70.3.601","volume":"70","author":"K. Carley","year":"1992","unstructured":"Carley, K., Palmquist, M.: Extracting, representing, and analyzing mental models. Social Forces\u00a070(3), 601\u2013636 (1992)","journal-title":"Social Forces"},{"key":"36_CR42","first-page":"155","volume-title":"Mental Models","author":"J. DeKleer","year":"1983","unstructured":"DeKleer, J., Brown, J.S.: Assumptions and ambiguities in mechanistics mental models. In: Gentner, D., Stevens, A.L. (eds.) Mental Models, pp. 155\u2013190. Lawrence Erlbaum Associate, Hilsdale (1983)"},{"key":"36_CR43","doi-asserted-by":"crossref","unstructured":"Lederer, S., Mankoff, J., Dey, A.K.: Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. In: CHI 2003. ACM, New York (2003)","DOI":"10.1145\/765891.765952"},{"key":"36_CR44","unstructured":"Richter-Lipford, H., Besmer, A., Watson, J.: Understanding privacy settings in Facebook with an audience view. In: Proc. 1st Conf. on Usability Psych., & Sec., pp. 1\u20138. USENIX Association (2008)"},{"key":"36_CR45","unstructured":"PRIME WP06.1, HCI Guidelines, D06.1.f (2008), \n                    \n                      https:\/\/www.primeproject.eu\/prime_products\/reports\/arch\/pub_del_D06.1.f_ec_wp06.1_v1_final.pdf"},{"key":"36_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-27585-2_1","volume-title":"Open Problems in Network Security","author":"E. W\u00e4stlund","year":"2012","unstructured":"W\u00e4stlund, E., Angulo, J., Fischer-H\u00fcbner, S.: Evoking comprehensive mental models of anonymous credentials. In: Camenisch, J., Kesdogan, D. (eds.) iNetSec 2011. LNCS, vol.\u00a07039, pp. 1\u201314. Springer, Heidelberg (2012)"},{"key":"36_CR47","doi-asserted-by":"crossref","unstructured":"Camp, L.J.: Mental models of privacy and security. IEEE Technology and Society Magazine\u00a028(3) (2009)","DOI":"10.1109\/MTS.2009.934142"},{"key":"36_CR48","first-page":"394","volume":"61","author":"H.A. Simon","year":"1973","unstructured":"Simon, H.A., Chase, W.G.: Skill in chess. American Scientist\u00a061, 394\u2013403 (1973)","journal-title":"American Scientist"},{"key":"36_CR49","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.1080\/00140138908966916","volume":"32","author":"G.C. Veer van der","year":"1989","unstructured":"van der Veer, G.C.: Individual differences and the user interface. Ergonomics\u00a032, 1431\u20131449 (1989)","journal-title":"Ergonomics"},{"key":"36_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0953-5438(00)00030-8","volume":"13","author":"M. Otter","year":"2000","unstructured":"Otter, M., Johnson, H.: Lost in hyperspace: metrics and mental models. Interacting with Computers\u00a013, 1\u201340 (2000)","journal-title":"Interacting with Computers"},{"key":"36_CR51","unstructured":"Kraiger, K., Salas, E.: Measuring mental models to assess learning during training. Paper presented at the Annual Meeting of the Society for Industrial\/Organizational Psychology, San Francisco, CA (1993)"},{"key":"36_CR52","unstructured":"Diesner, J., Kumaraguru, P., Carley, K.M.: Mental models of privacy and security from interviews with Indians. In: 55th Annual Conference of the International Communication Association, New York, NY (2005)"},{"key":"36_CR53","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1017\/CBO9780511814570.008","volume-title":"Research Methods for Human-Computer Interaction","author":"A. Adams","year":"2008","unstructured":"Adams, A., Lunt, P., Cairns, P.: A qualitative approach to HCI research. In: Cairns, P., Cox, A.L. (eds.) Research Methods for Human-Computer Interaction, 1st edn., pp. 138\u2013157. Cambridge University Press, Cambridge (2008)","edition":"1"},{"key":"36_CR54","doi-asserted-by":"crossref","unstructured":"Kinchin, I.M., Hay, D.B.: How a qualitative approach to concept map analysis can be used to aid learning by illustrating patterns of conceptual development. Educational Research\u00a042(1) (2000)","DOI":"10.1080\/001318800363908"},{"key":"36_CR55","volume-title":"Children\u2019s Understanding: The Development of Mental Models","author":"G.S. Halford","year":"1993","unstructured":"Halford, G.S.: Children\u2019s Understanding: The Development of Mental Models. Lawrence Erlbaum, Hillsdale (1993)"},{"key":"36_CR56","doi-asserted-by":"crossref","DOI":"10.4324\/9781410601629","volume-title":"Learning, Creating and Using Knowledge: Concept Maps as Facilitative Tools in Schools and Corporations","author":"J.D. Novak","year":"1998","unstructured":"Novak, J.D.: Learning, Creating and Using Knowledge: Concept Maps as Facilitative Tools in Schools and Corporations. Lawrence Erlbaum, Hillsdale (1998)"},{"key":"36_CR57","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139173469","volume-title":"Learning How to Learn","author":"J.D. Novak","year":"1984","unstructured":"Novak, J.D., Gowin, D.B.: Learning How to Learn. Cambridge University Press, Cambridge (1984)"},{"key":"36_CR58","volume-title":"New Horizons in Psychology","author":"P.C. Wason","year":"1966","unstructured":"Wason, P.C.: Reasoning. In: Foss, B.M. (ed.) New Horizons in Psychology, Penguin, Harmondworth (1966)"},{"issue":"1","key":"36_CR59","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1016\/j.joep.2011.10.009","volume":"33","author":"P. Dolan","year":"2012","unstructured":"Dolan, P., Hallsworth, M., Halpern, D., King, D., Metcalfe, R., Vlaev, I.: Influencing behaviour: The mindspace way. Journal of Economic Psychology\u00a033(1), 264\u2013277 (2012)","journal-title":"Journal of Economic Psychology"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07620-1_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T23:10:57Z","timestamp":1582413057000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07620-1_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076195","9783319076201"],"references-count":60,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07620-1_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}