{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T04:04:21Z","timestamp":1746331461968,"version":"3.40.4"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319085920"},{"type":"electronic","value":"9783319085937"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08593-7_5","type":"book-chapter","created":{"date-parts":[[2014,6,23]],"date-time":"2014-06-23T12:55:19Z","timestamp":1403528119000},"page":"74-82","source":"Crossref","is-referenced-by-count":3,"title":["On Usable Location Privacy for Android with Crowd-Recommendations"],"prefix":"10.1007","author":[{"given":"Benjamin","family":"Henne","sequence":"first","affiliation":[]},{"given":"Christian","family":"Kater","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Smith","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Beede, R., Warbritton, D., Han, R.: Myshield: Protecting mobile device data via security circles. Tech. Rep. CU-CS-1091-12, Univ. of Colorado Boulder (2012)"},{"issue":"7","key":"5_CR2","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1007\/s00779-010-0346-0","volume":"15","author":"M. Benisch","year":"2011","unstructured":"Benisch, M., Kelley, P.G., Sadeh, N., Cranor, L.F.: Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs. Personal and Ubiquitous Computing\u00a015(7), 679\u2013694 (2011)","journal-title":"Personal and Ubiquitous Computing"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Beresford, A.R., Rice, A., Skehin, N., Sohan, R.: Mockdroid: Trading privacy for application functionality on smartphones. In: Proc. HotMobile 2011, pp. 49\u201354. ACM (2011)","DOI":"10.1145\/2184489.2184500"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Brush, A.B., Krumm, J., Scott, J.: Exploring end user preferences for location obfuscation, location-based services, and the value of location. In: Proc. UbiComp 2010, pp. 95\u2013104. ACM (2010)","DOI":"10.1145\/1864349.1864381"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Fisher, D., Dorner, L., Wagner, D.: Location Privacy: User Behavior In The Field. In: Proc. SPSM 2012, pp. 51\u201356. ACM (2012)","DOI":"10.1145\/2381934.2381945"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Henne, B., Kater, C., Brenner, M., Smith, M.: Selective cloaking: Need-to-know for location-based apps. In: Proc. PST 2013. IEEE (2013)","DOI":"10.1109\/PST.2013.6596032"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D.: These aren\u2019t the droids you\u2019re looking for: retrofitting android to protect data from imperious applications. In: Proc. CCS 2011, pp. 639\u2013652. ACM (2011)","DOI":"10.1145\/2046707.2046780"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Lin, J., Amini, S., Hong, J.I., Sadeh, N., Lindqvist, J., Zhang, J.: Expectation and purpose: Understanding users\u2019 mental models of mobile app privacy through crowdsourcing. In: Proc. UbiComp 2012, pp. 501\u2013510. ACM (2012)","DOI":"10.1145\/2370216.2370290"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Tang, K., Hong, J., Siewiorek, D.: The implications of offering more disclosure choices for social location sharing. In: Proc. CHI 2012, pp. 391\u2013394. ACM (2012)","DOI":"10.1145\/2207676.2207730"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08593-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T12:35:55Z","timestamp":1746275755000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-08593-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319085920","9783319085937"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08593-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}