{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:27:08Z","timestamp":1742912828545,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_31","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"347-356","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Reminding Users of their Privacy at the Point of Interaction: The Effect of Privacy Salience on Disclosure Behaviour"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Hughes-Roberts","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Barnes, S.B.: A privacy paradox: social networking in the united states. First Monday, 11(9) (2006)","DOI":"10.5210\/fm.v11i9.1394"},{"key":"31_CR2","volume-title":"Research Methods in Psychology","author":"GM Breakwell","year":"2006","unstructured":"Breakwell, G.M.: Research Methods in Psychology. Sage Publications Ltd., Oxford (2006)"},{"key":"31_CR3","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen, I.: The Theory of Planned Behaviour. Organ. Behav. Hum. Decis. Process. 50, 179\u2013211 (1991)","journal-title":"Organ. Behav. Hum. Decis. Process."},{"issue":"3","key":"31_CR4","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2007.75","volume":"5","author":"D Rosenblum","year":"2007","unstructured":"Rosenblum, D.: What anyone can know: the privacy risks of social networking. IEEE Secur. Priv. 5(3), 40\u201349 (2007)","journal-title":"IEEE Secur. Priv."},{"key":"31_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-540-68504-3_4","volume-title":"Persuasive Technology","author":"BJ Fogg","year":"2008","unstructured":"Fogg, B.J., Iizawa, D.: Online persuasion in facebook and mixi: a cross-cultural comparison. In: Oinas-Kukkonen, H., Hasle, P., Harjumaa, M., Segerst\u00e5hl, K., \u00d8hrstr\u00f8m, P. (eds.) PERSUASIVE 2008. LNCS, vol. 5033, pp. 35\u201346. Springer, Heidelberg (2008)"},{"issue":"3","key":"31_CR6","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1177\/1461444808089415","volume":"10","author":"S Livingstone","year":"2008","unstructured":"Livingstone, S.: Taking risky opportunities in youthful content creation: teenagers\u2019 use of social networking sites for intimacy, privacy and self-expression. New Media Soc. 10(3), 393\u2013411 (2008)","journal-title":"New Media Soc."},{"issue":"1\u20132","key":"31_CR7","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1080\/15228831003770775","volume":"28","author":"DJ Houghton","year":"2010","unstructured":"Houghton, D.J., Joinson, A.: Privacy, social network sites, and social relations. J. Technol. Hum. Serv. 28(1\u20132), 74\u201394 (2010)","journal-title":"J. Technol. Hum. Serv."},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Kolter, J., Pernul, G.: Generating user-understandable privacy preferences. In: International Conference on Availability, Reliability and Security, pp. 299\u2013306 (2009)","DOI":"10.1109\/ARES.2009.89"},{"key":"31_CR9","unstructured":"Miller, R.E., Salmona, M., Melton, J.: Students and social networking site: a model of inappropriate posting. In: Proceedings of the Southern Association for Information Systems Conference, Atlanta (2011)"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Strater, K., Richter, H.: Examing privacy and disclosure in a social networking community. In: Symposium on Usable Privacy and Security, pp. 157\u2013158 (2007)","DOI":"10.1145\/1280680.1280706"},{"key":"31_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/11957454_3","volume-title":"Privacy Enhancing Technologies","author":"A Acquisti","year":"2006","unstructured":"Acquisti, A., Gross, R.: Imagined communities: awareness, information sharing, and privacy on the Facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 36\u201358. Springer, Heidelberg (2006)"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Anderson, J., Church, L.: Privacy suites: shared privacy for social networks. In: 5th Symposium on Usable Privacy and Security (2009)","DOI":"10.1145\/1572532.1572569"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Fogg, B.J.: The behaviour grid: 35 ways behaviour can change. In: PERSUASIVE 2009, Clairemont, California (2009)","DOI":"10.1145\/1541948.1542001"},{"issue":"4","key":"31_CR14","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MSP.2009.88","volume":"7","author":"B Masiello","year":"2009","unstructured":"Masiello, B.: Deconstructing the privacy experience. IEEE Secur. Priv. 7(4), 68\u201370 (2009)","journal-title":"IEEE Secur. Priv."},{"key":"31_CR15","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.chb.2014.05.006","volume":"38","author":"YM Baek","year":"2014","unstructured":"Baek, Y.M.: Solving the privacy paradox: a counter-argument experimental approach. Comput. Hum. Behav. 38, 33\u201342 (2014)","journal-title":"Comput. Hum. Behav."},{"key":"31_CR16","unstructured":"Hughes-Roberts, T.: Privacy as a secondary goal problem: an experiment examining control. In: HAISA 2014, Plymouth, pp. 69\u201379 (2014)"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Lew, L., et al.: Of course I wouldn\u02bct do that in real life: advancing the arguments for increasing realism in HCI experiments. In: Computer Human Interaction (2011)","DOI":"10.1145\/1979742.1979621"},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Brandimarte, M., Acquisti, A., Loewenstien, G.: Misplaced confidences: privacy and the control paradox. In: Workshop on the Economics of Information Security, Harvard (2012)","DOI":"10.1177\/1948550612455931"},{"issue":"1","key":"31_CR19","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1111\/j.1083-6101.2009.01494.x","volume":"15","author":"B Debatin","year":"2009","unstructured":"Debatin, B., et al.: Facebook and online privacy: attitudes, behaviors, and unintended consequences. J. Comput.-Mediated Commun. 15(1), 83\u2013108 (2009)","journal-title":"J. Comput.-Mediated Commun."},{"key":"31_CR20","doi-asserted-by":"crossref","unstructured":"Wang, Y., et al.: Privacy nudges for social media: an exploratory Facebook study. In: Proceedings of the 22nd international conference on World Wide Web companion, International World Wide Web Conferences Steering Committee (2013)","DOI":"10.1145\/2487788.2488038"},{"key":"31_CR21","doi-asserted-by":"crossref","unstructured":"Fogg, B.J.: Persuasive Technology: Using Computers to Change What We Think and Do, Grudin, J., Nielsen, J., Card, S.K (eds.). Morgan Kaufmann, San Francisco (2003)","DOI":"10.1145\/764008.763957"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:18:45Z","timestamp":1583507925000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}