{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:01:01Z","timestamp":1743098461707,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319076195"},{"type":"electronic","value":"9783319076201"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07620-1_37","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:55:03Z","timestamp":1402404903000},"page":"422-432","source":"Crossref","is-referenced-by-count":1,"title":["Web Privacy Policies in Higher Education: How Are Content and Design Used to Provide Notice (Or a Lack Thereof) to Users?"],"prefix":"10.1007","author":[{"given":"Anna L.","family":"Langhorne","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","unstructured":"DeSantis, N.: U. of Iowa Shares Data With Local Sheriff on Students Seeking Gun Permits. The Chronicle of Higher Education (December 17, 2013)"},{"issue":"2","key":"37_CR2","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1145\/1467247.1467277","volume":"52","author":"M. Culnan","year":"2009","unstructured":"Culnan, M., Carlin, T.: Online Privacy Practices in Higher Education: Making the Grade? Communications of the ACM\u00a052(2), 126\u2013130 (2009)","journal-title":"Communications of the ACM"},{"key":"37_CR3","unstructured":"Loh, W.: UMD Data Breach (2014), \n                    \n                      http:\/\/uhr.umd.edu\/2014\/02\/umd-data-breach"},{"key":"37_CR4","unstructured":"Cox, J.: Are Colleges and Universities at Greater Risk of Data Breaches? Network World (2010), \n                    \n                      http:\/\/www.networkworld.com\/news\/2010\/091510-higher-ed-data-breaches.html"},{"key":"37_CR5","unstructured":"National Conference of State Legislatures, \n                    \n                      http:\/\/www.ncsl.org\/research\/telecommunications-and-information-technology\/security-breach-notification-laws.aspx\n                    \n                    \n                   (retrieved February 2, 2014)"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"FERPA, 34 C.F.R. section 99.3 (2011)","DOI":"10.3917\/cact.034.0099"},{"key":"37_CR7","unstructured":"California Social Media Privacy Law S.B. 1394 (2012)"},{"key":"37_CR8","doi-asserted-by":"crossref","unstructured":"Jensen, C., Potts, C.: Privacy Policies as Decision-making Tools: An Evaluation of Online Privacy Notices. Paper presented at the CHI 2004, Vienna, Austria (2004)","DOI":"10.1145\/985692.985752"},{"issue":"2","key":"37_CR9","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/1165734.1165735","volume":"13","author":"L. Cranor","year":"2006","unstructured":"Cranor, L., Guduru, P., Arjula, M.: User Interfaces for Privacy Agents. ACM Transactions on Computer-Human Interaction\u00a013(2), 135\u2013178 (2006)","journal-title":"ACM Transactions on Computer-Human Interaction"},{"key":"37_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-03168-7_3","volume-title":"Privacy Enhancing Technologies","author":"A.M. McDonald","year":"2009","unstructured":"McDonald, A.M., Reeder, R.W., Kelley, P.G., Cranor, L.F.: A Comparative Study of Online Privacy Policies and Formats. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol.\u00a05672, pp. 37\u201355. Springer, Heidelberg (2009)"},{"key":"37_CR11","unstructured":"Au, N., Law, R.: Presentation Formats of Policy Statements On Hotel Websites and Privacy Concerns: A Multimedia Learning Theory Perspective. Journal of Hospitality & Tourism Research (2012)"},{"issue":"4","key":"37_CR12","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/j.jsis.2010.10.002","volume":"19","author":"S. Goel","year":"2010","unstructured":"Goel, S., Chengalur-Smith, I.N.: Metrics for Characterizing the Form of Security Policies. The Journal of Strategic Information Systems\u00a019(4), 281\u2013295 (2010)","journal-title":"The Journal of Strategic Information Systems"},{"issue":"3","key":"37_CR13","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1109\/TEM.2008.922634","volume":"55","author":"M.W. Vail","year":"2008","unstructured":"Vail, M.W., Earp, J.B., Ant\u00f3n, A.I.: An Empirical Study of Consumer Perceptions and Comprehension of Web Site Privacy Policies. IEEE Transactions on Engineering Management\u00a055(3), 442\u2013454 (2008)","journal-title":"IEEE Transactions on Engineering Management"},{"key":"37_CR14","unstructured":"Article 29 Data protection Working Party, Opinion on More Harmonised Information Provisions 1198704\/EN WP 100, European Commission (2004)"},{"key":"37_CR15","first-page":"1573","volume-title":"Proceedings of the 28th International Conference on Human Factors in Computing Systems","author":"P. Kelley","year":"2010","unstructured":"Kelley, P., Cesca, L., Bresee, J., Cranor, L.: Standardizing Privacy Notices: An Online Study of the Nutrition Label Approach. In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, p. 1573. ACM, New York (2010)"},{"issue":"1","key":"37_CR16","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1108\/09685221211219155","volume":"20","author":"J. Angulo","year":"2012","unstructured":"Angulo, J., Fishcer-H\u00fcbner, S., W\u00e4stlund, E., Pulls, T.: Toward Usable Privacy Policy Display and Management. Information Management & Computer Security\u00a020(1), 4\u201317 (2012)","journal-title":"Information Management & Computer Security"},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Leon, P., Cranshaw, J., Cranor, L., Graves, J., Hastak, M., Ur, B., Guzi, X.: What Do Online Behavioral Advertising Disclosures Communicat to Users? Carnegie Mellon University CyLab (2012)","DOI":"10.1145\/2381966.2381970"},{"issue":"12","key":"37_CR18","doi-asserted-by":"crossref","first-page":"798","DOI":"10.17705\/1jais.00281","volume":"12","author":"X. Heng","year":"2011","unstructured":"Heng, X., Dinev, T., Smith, J., Hart, P.: Information privacy Concerns: Linking Indivdiual Perceptions with Institutional Privacy Assurances. Journal of the Association for Information Systems\u00a012(12), 798\u2013824 (2011)","journal-title":"Journal of the Association for Information Systems"},{"issue":"5","key":"37_CR19","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1108\/02635570610666403","volume":"106","author":"C. Flavi\u00e1n","year":"2006","unstructured":"Flavi\u00e1n, C., Guinal\u00edu, M.: Consumer Trust, Perceived Security and Privacy Policy: Three Basic Elements of Loyalty to a Web Site. Industrial Management & Data Systems\u00a0106(5), 601\u2013620 (2006)","journal-title":"Industrial Management & Data Systems"},{"issue":"4","key":"37_CR20","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1108\/09593840410570285","volume":"17","author":"S. McRobb","year":"2004","unstructured":"McRobb, S., Rogerson, S.: Are They Really Listening? An Investigation Into Published Online Privacy Policies at The Beginning of The Third Millennium. Information Technology & People\u00a017(4), 442\u2013461 (2004)","journal-title":"Information Technology & People"},{"key":"37_CR21","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s10796-011-9336-7","volume":"15","author":"I. Reay","year":"2013","unstructured":"Reay, I., Beatty, P., Dick, S., Miller, J.: Privacy Policies and National Culture on the Internet. Inf. Syst. Front.\u00a015, 279\u2013292 (2013)","journal-title":"Inf. Syst. Front."},{"key":"37_CR22","unstructured":"Jensen, C., Potts, C.: Private Policies Examined: Fair Warning or Fair Game? (2003)"},{"issue":"2","key":"37_CR23","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1109\/TEM.2005.844927","volume":"52","author":"J.B. Earp","year":"2005","unstructured":"Earp, J.B., Ant\u00f3n, A.I., Aiman-Smith, L., Stufflebeam, W.H.: Examining Internet Privacy Policies within the Context of User Privacy Values. IEEE Transactions on Engineering Management\u00a052(2), 227\u2013237 (2005)","journal-title":"IEEE Transactions on Engineering Management"},{"key":"37_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jeco.2006010101","volume":"4","author":"D. Meinert","year":"2006","unstructured":"Meinert, D., Peterson, D., Criswell, J., Crossland, M.: Privacy Policy Statements and Consumer Willingness to Provide Persona Information. Journal of Electronic Commerce in Organizations\u00a04, 1\u201317 (2006)","journal-title":"Journal of Electronic Commerce in Organizations"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07620-1_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T23:11:04Z","timestamp":1582413064000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07620-1_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076195","9783319076201"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07620-1_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}