{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T04:20:13Z","timestamp":1747887613643,"version":"3.41.0"},"publisher-location":"Cham","reference-count":47,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319170152"},{"type":"electronic","value":"9783319170169"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17016-9_6","type":"book-chapter","created":{"date-parts":[[2015,3,29]],"date-time":"2015-03-29T00:52:41Z","timestamp":1427590361000},"page":"77-94","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Configuration Behavior of Restrictive Default Privacy Settings on Social Network Sites"],"prefix":"10.1007","author":[{"given":"Markus","family":"Tschersich","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,28]]},"reference":[{"issue":"4","key":"6_CR1","doi-asserted-by":"crossref","first-page":"989","DOI":"10.2307\/41409970","volume":"35","author":"HJ Smith","year":"2011","unstructured":"Smith, H.J., Dinev, T., Xu, H.: Information privacy research: an interdisciplinary review. MIS Q. 35(4), 989\u20131016 (2011)","journal-title":"MIS Q."},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Shah, R.C., Kesan, J.P.: Policy through software defaults. In: Proceedings of the 2006 International Conference on Digital Government Research, pp. 265\u2013272. Digital Government Society of North America (2006)","DOI":"10.1145\/1146598.1146670"},{"issue":"2","key":"6_CR3","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/359205.359241","volume":"44","author":"S Bellman","year":"2001","unstructured":"Bellman, S., Johnson, E.J., Lohse, G.L.: On site: to opt-in or opt-out?: it depends on the question. Commun. ACM 44(2), 25\u201327 (2001)","journal-title":"Commun. ACM"},{"issue":"1","key":"6_CR4","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/BF00055564","volume":"1","author":"W Samuelson","year":"1988","unstructured":"Samuelson, W., Zeckhauser, R.: Status quo bias in decision making. J. Risk Uncertain. 1(1), 7\u201359 (1988)","journal-title":"J. Risk Uncertain."},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Burke, M., Marlow, C., Lento, T.: Social network activity and social well-being. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1909\u20131912. ACM (2010)","DOI":"10.1145\/1753326.1753613"},{"issue":"1","key":"6_CR6","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev, T., Hart, P.: An extended privacy calculus model for e-commerce transactions. Inf. Syst. Res. 17(1), 61\u201380 (2006)","journal-title":"Inf. Syst. Res."},{"issue":"4","key":"6_CR7","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MTS.2012.2225459","volume":"31","author":"A Cavoukian","year":"2012","unstructured":"Cavoukian, A.: Privacy by design (leading edge). IEEE Technol. Soc. Mag. 31(4), 18\u201319 (2012)","journal-title":"IEEE Technol. Soc. Mag."},{"key":"6_CR8","unstructured":"Cavoukian, A.: Privacy by design (2008). http:\/\/privacybydesign.ca\/content\/uploads\/2009\/08\/7foundationalprinciples.pdf"},{"key":"6_CR9","unstructured":"Schaar, P.: Privacy by Default: Airbag f\u00fcr die Informationsgesellschaft (2009). https:\/\/www.bfdi.bund.de\/bfdi_forum\/showthread.php?t=3365"},{"key":"6_CR10","unstructured":"European Parliament. Report on the proposel for a regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) (2014). http:\/\/www.europarl.europa.eu\/sides\/getDoc.do?pubRef=-%2F%2FEP%2F%2FTEXT%2BREPORT%2BA7-2013-0402%2B0%2BDOC%2BXML%2BV0%2F%2FEN&language=EN#title1"},{"key":"6_CR11","unstructured":"Europe versus Facebook. Facebook\u2019s views on the proposed data protection regulation (2012). http:\/\/www.europe-v-facebook.org\/FOI_Facebook_Lobbying.pdf"},{"key":"6_CR12","unstructured":"Brooks, L., Anene, V.: Information disclosure and generational differences in social network sites (2012)"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Krasnova, H., Veltri, N.F.: Privacy calculus on social networking sites: explorative evidence from germany and USA. In: 2010 43rd Hawaii International Conference on System Sciences (HICSS), pp. 1\u201310. IEEE (2010)","DOI":"10.1109\/HICSS.2010.307"},{"issue":"4","key":"6_CR14","doi-asserted-by":"publisher","first-page":"1649","DOI":"10.1016\/j.chb.2013.01.049","volume":"29","author":"E Litt","year":"2013","unstructured":"Litt, E.: Understanding social network site users privacy tool use. Comput. Hum. Behav. 29(4), 1649\u20131656 (2013)","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"6_CR15","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"DM Boyd","year":"2008","unstructured":"Boyd, D.M., Ellison, N.B.: Social network sites: definition, history, and scholarship. J. Comput. Mediated Commun. 13(1), 210\u2013230 (2008)","journal-title":"J. Comput. Mediated Commun."},{"issue":"1","key":"6_CR16","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1386\/macp.6.1.81\/1","volume":"6","author":"T Taraszow","year":"2010","unstructured":"Taraszow, T., Aristodemou, E., Shitta, G., Laouris, Y., Arsoy, A.: Disclosure of personal and contact information by young people in social networking sites: an analysis using facebook profiles as an example. Int. J. Media Cult. Polit. 6(1), 81\u2013101 (2010)","journal-title":"Int. J. Media Cult. Polit."},{"issue":"3","key":"6_CR17","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.chb.2009.11.012","volume":"26","author":"A Nosko","year":"2010","unstructured":"Nosko, A., Wood, E., Molema, S.: All about me: disclosure in online social networking profiles: the case of facebook. Comput. Hum. Behav. 26(3), 406\u2013418 (2010)","journal-title":"Comput. Hum. Behav."},{"issue":"2\u20133","key":"6_CR18","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s10799-005-5879-y","volume":"6","author":"RK Chellappa","year":"2005","unstructured":"Chellappa, R.K., Sin, R.G.: Personalization versus privacy: an empirical examination of the online consumers dilemma. Inf. Technol. Manage. 6(2\u20133), 181\u2013202 (2005)","journal-title":"Inf. Technol. Manage."},{"issue":"2","key":"6_CR19","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1111\/1540-4560.00067","volume":"59","author":"MJ Culnan","year":"2003","unstructured":"Culnan, M.J., Bies, R.J.: Consumer privacy: balancing economic and justice considerations. J. Soc. Issues 59(2), 323\u2013342 (2003)","journal-title":"J. Soc. Issues"},{"key":"6_CR20","first-page":"1","volume":"36","author":"N Ellison","year":"2006","unstructured":"Ellison, N., Steinfield, C., Lampe, C.: Spatially bounded online social networks and social capital. Int. Commun. Assoc. 36, 1\u201337 (2006)","journal-title":"Int. Commun. Assoc."},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Lampe, C., Ellison, N.B., Steinfield, C.: Changes in use and perception of facebook. In: Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, pp. 721\u2013730. ACM (2008)","DOI":"10.1145\/1460563.1460675"},{"key":"6_CR22","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-1-4419-6967-5_8","volume-title":"Economics of Information Security and Privacy","author":"J Bonneau","year":"2010","unstructured":"Bonneau, J., Preibusch, S.: The privacy jungle: on the market for data protection in social networks. In: Moore, T., Pym, D., Ioannidis, C. (eds.) Economics of Information Security and Privacy, pp. 121\u2013167. Springer, Boston (2010)"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71\u201380. ACM (2005)","DOI":"10.1145\/1102199.1102214"},{"issue":"1","key":"6_CR24","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1111\/j.1083-6101.2008.01432.x","volume":"14","author":"K Lewis","year":"2008","unstructured":"Lewis, K., Kaufman, J., Christakis, N.: The taste for privacy: an analysis of college student privacy settings in an online social network. J. Comput. Mediated Commun. 14(1), 79\u2013100 (2008)","journal-title":"J. Comput. Mediated Commun."},{"issue":"3","key":"6_CR25","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1287\/isre.1080.0193","volume":"19","author":"C Forman","year":"2008","unstructured":"Forman, C., Ghose, A., Wiesenfeld, B.: Examining the relationship between reviews and sales: the role of reviewer identity disclosure in electronic markets. Inf. Syst. Res. 19(3), 291\u2013313 (2008)","journal-title":"Inf. Syst. Res."},{"key":"6_CR26","unstructured":"Koroleva, K., Brecht, F., Goebel, L., Malinova, M.: Generation facebook-a cognitive calculus model of teenage user behavior on social network sites. In: Proceedings of AMCIS 2011 (2011)"},{"issue":"3","key":"6_CR27","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.appdev.2008.12.010","volume":"30","author":"TA Pempek","year":"2009","unstructured":"Pempek, T.A., Yermolayeva, Y.A., Calvert, S.L.: College students\u2019 social networking experiences on facebook. J. Appl. Dev. Psychol. 30(3), 227\u2013238 (2009)","journal-title":"J. Appl. Dev. Psychol."},{"issue":"1","key":"6_CR28","doi-asserted-by":"publisher","first-page":"201","DOI":"10.2307\/202051","volume":"1","author":"M Granovetter","year":"1983","unstructured":"Granovetter, M.: The strength of weak ties: a network theory revisited. Sociol. Theory 1(1), 201\u2013233 (1983)","journal-title":"Sociol. Theory"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Burke, M., Marlow, C., Lento, T.: Feed me: motivating newcomer contribution in social network sites. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 945\u2013954. ACM (2009)","DOI":"10.1145\/1518701.1518847"},{"issue":"1","key":"6_CR30","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1080\/13691180701858836","volume":"11","author":"RC Shah","year":"2008","unstructured":"Shah, R.C., Sandvig, C.: Software defaults as de facto regulation the case of the wireless internet. Inf. Commun. Soc. 11(1), 25\u201346 (2008)","journal-title":"Inf. Commun. Soc."},{"issue":"12","key":"6_CR31","first-page":"99","volume":"86","author":"DG Goldstein","year":"2008","unstructured":"Goldstein, D.G., Johnson, E.J., Herrmann, A., Heitmann, M.: Nudge your customers toward better choices. Harvard Bus. Rev. 86(12), 99\u2013105 (2008)","journal-title":"Harvard Bus. Rev."},{"key":"6_CR32","doi-asserted-by":"publisher","first-page":"1338","DOI":"10.1126\/science.1091721","volume":"302","author":"EJ Johnson","year":"2003","unstructured":"Johnson, E.J., Goldstein, D.: Do defaults save lives? Sci. New York then Washington 302, 1338\u20131339 (2003)","journal-title":"Sci. New York then Washington"},{"issue":"1","key":"6_CR33","doi-asserted-by":"publisher","first-page":"75","DOI":"10.2501\/IJMR-53-1-075-094","volume":"53","author":"L Jin","year":"2011","unstructured":"Jin, L.: Improving response rates in web surveys with default setting the effects of default on web survey participation and permission. Int. J. Mark. Res. 53(1), 75\u201394 (2011)","journal-title":"Int. J. Mark. Res."},{"key":"6_CR34","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1257\/jep.5.1.193","volume":"5","author":"D Kahneman","year":"1991","unstructured":"Kahneman, D., Knetsch, J.L., Thaler, R.H.: Anomalies: the endowment effect, loss aversion, and status quo bias. J. Econ. Perspect. 5, 193\u2013206 (1991)","journal-title":"J. Econ. Perspect."},{"issue":"4","key":"6_CR35","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1086\/209545","volume":"25","author":"R Dhar","year":"1999","unstructured":"Dhar, R., Nowlis, S.M.: The effect of time pressure on consumer choice deferral. J. Consum. Res. 25(4), 369\u2013384 (1999)","journal-title":"J. Consum. Res."},{"issue":"6","key":"6_CR36","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1037\/0022-3514.79.6.995","volume":"79","author":"SS Iyengar","year":"2000","unstructured":"Iyengar, S.S., Lepper, M.R.: When choice is demotivating: can one desire too much of a good thing? J. Pers. Soc. Psychol. 79(6), 995 (2000)","journal-title":"J. Pers. Soc. Psychol."},{"key":"6_CR37","first-page":"583","volume":"82","author":"JP Kesan","year":"2006","unstructured":"Kesan, J.P., Shah, R.C.: Setting software defaults: perspectives from law, computer science and behavioral economics. Notre Dame L. Rev. 82, 583 (2006)","journal-title":"Notre Dame L. Rev."},{"key":"6_CR38","unstructured":"Hargittai, E., et al.: Facebook privacy settings: who cares? First Monday 15(8) (2010). http:\/\/firstmonday.org\/article\/view\/3086\/2589"},{"issue":"3","key":"6_CR39","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1002\/asi.22994","volume":"65","author":"T Stern","year":"2014","unstructured":"Stern, T., Kumar, N.: Improving privacy settings control in online social networks with a wheel interface. J. Assoc. Inf. Sci. Technol. 65(3), 524\u2013538 (2014)","journal-title":"J. Assoc. Inf. Sci. Technol."},{"issue":"2","key":"6_CR40","doi-asserted-by":"publisher","first-page":"175","DOI":"10.3758\/BF03193146","volume":"39","author":"F Faul","year":"2007","unstructured":"Faul, F., Erdfelder, E., Lang, A.-G., Buchner, A.: G* power 3: a flexible statistical power analysis program for the social, behavioral, and biomedical sciences. Behav. Res. Meth. 39(2), 175\u2013191 (2007)","journal-title":"Behav. Res. Meth."},{"key":"6_CR41","volume-title":"Discovering Statistics using IBM SPSS Statistics","author":"A Field","year":"2013","unstructured":"Field, A.: Discovering Statistics using IBM SPSS Statistics. Sage, London (2013)"},{"key":"6_CR42","doi-asserted-by":"publisher","first-page":"429","DOI":"10.2307\/2529511","volume":"32","author":"CJ Scheirer","year":"1976","unstructured":"Scheirer, C.J., Ray, W.S., Hare, N.: The analysis of ranked data derived from completely randomized factorial designs. Biometrics 32, 429\u2013434 (1976)","journal-title":"Biometrics"},{"key":"6_CR43","unstructured":"Krasnova, H., Hildebrand, T., Guenther, O., Kovrigin, A., Nowobilska, A.: Why participate in an online social network? an empirical analysis (2008)"},{"key":"6_CR44","doi-asserted-by":"crossref","unstructured":"Archambault, A., Grudin, J.: A longitudinal study of facebook, linkedin, and twitter use. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2741\u20132750. ACM (2012)","DOI":"10.1145\/2207676.2208671"},{"key":"6_CR45","doi-asserted-by":"crossref","unstructured":"Quinn, D., Chen, L., Mulvenna, M.: Does age make a difference in the behaviour of online social network users? In: 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing (iThings\/CPSCom), pp. 266\u2013272. IEEE (2011)","DOI":"10.1109\/iThings\/CPSCom.2011.86"},{"key":"6_CR46","unstructured":"Richter, A., Riemer, K.: Corporate social networking sites-modes of use and appropriation through co-evolution. In: ACIS 2009 Proceedings (2009)"},{"key":"6_CR47","doi-asserted-by":"crossref","unstructured":"DiMicco, J.M., Geyer, W., Millen, D.R., Dugan, C., Brownholtz, B.: People sensemaking and relationship building on an enterprise social network site. In: 42nd Hawaii International Conference on System Sciences, HICSS 2009, pp. 1\u201310. IEEE (2009)","DOI":"10.1109\/HICSS.2009.343"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17016-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T18:12:53Z","timestamp":1747851173000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-17016-9_6"}},"subtitle":["Analyzing the Combined Effect of Default Settings and Interface Style"],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319170152","9783319170169"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17016-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}