{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T14:57:17Z","timestamp":1777388237957,"version":"3.51.4"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319203751","type":"print"},{"value":"9783319203768","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_40","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"449-460","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Legal Issues and User Experience in Ubiquitous Systems from a Privacy Perspective"],"prefix":"10.1007","author":[{"given":"Patricia C.","family":"de Souza","sequence":"first","affiliation":[]},{"given":"Cristiano","family":"Maciel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"40_CR1","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.chb.2009.11.012","volume":"26","author":"A Nosko","year":"2010","unstructured":"Nosko, A., Wood, E., Molema, S.: All about me: Disclosure in online social networking profiles: the case of FACEBOOK. Comput. Hum. Behav. 26, 406\u2013418 (2010)","journal-title":"Comput. Hum. Behav."},{"key":"40_CR2","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.chb.2008.08.006","volume":"25","author":"J Fogel","year":"2009","unstructured":"Fogel, J., Nehmad, E.: Internet social network communities: risk taking, trust, and privacy concerns. Comput. Hum. Behav. 25, 153\u2013160 (2009)","journal-title":"Comput. Hum. Behav."},{"key":"40_CR3","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1016\/j.intcom.2010.05.001","volume":"22","author":"D Shin","year":"2010","unstructured":"Shin, D.: The effects of trust, security and privacy in social networking: a security-based approach to understand the pattern of adoption. Interact. Comput. 22, 428\u2013438 (2010)","journal-title":"Interact. Comput."},{"key":"40_CR4","doi-asserted-by":"crossref","unstructured":"Borges, G., Ribeiro, T., Maciel, C., Souza, P.C.: Who is this guy who liked my picture? privacy control mechanisms on Facebook for Generations X and Y. In: 15th International Conference on Enterprise Information Systems (ICEIS 2013), France, pp. 179\u2013186 (2013)","DOI":"10.5220\/0004570201790186"},{"key":"40_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/11824633_11","volume-title":"Trust and Privacy in Digital Business","author":"S Dritsas","year":"2006","unstructured":"Dritsas, S., Tsaparas, J., Gritzalis, D.: A generic privacy enhancing technology for pervasive computing environments. In: Fischer-H\u00fcbner, S., Furnell, S., Lambrinoudakis, C. (eds.) TrustBus 2006. LNCS, vol. 4083, pp. 103\u2013113. Springer, Heidelberg (2006)"},{"key":"40_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-642-22263-4_5","volume-title":"Privacy Enhancing Technologies","author":"I Bilogrevic","year":"2011","unstructured":"Bilogrevic, I., Jadliwala, M., Kalkan, K., Hubaux, J.-P., Aad, I.: Privacy in mobile computing for location-sharing-based services. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 77\u201396. Springer, Heidelberg (2011)"},{"key":"40_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-540-40956-4_8","volume-title":"Privacy Enhancing Technologies","author":"AS Patrick","year":"2003","unstructured":"Patrick, A.S., Kenny, S.: From privacy legislation to interface design: implementing information privacy in human-computer interactions. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 107\u2013124. Springer, Heidelberg (2003)"},{"key":"40_CR8","doi-asserted-by":"crossref","unstructured":"O\u2019Hara, K.: Are we getting privacy the wrong way round?. In: Internet Computing, IEEE, vol.17, no. 4, pp. 89\u201392, July\u2013August 2013","DOI":"10.1109\/MIC.2013.62"},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Patil, S., Norcie, G., Kapadia, A., Lee, A.J.: Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice. In: Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS 2012). ACM, NY, USA (2012)","DOI":"10.1145\/2335356.2335363"},{"issue":"3","key":"40_CR10","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1093\/iwc\/iws017","volume":"25","author":"E Luger","year":"2013","unstructured":"Luger, E., Rodden, T.: Terms of agreement: rethinking consent for pervasive computing. Interact. Comput. 25(3), 229\u2013241 (2013)","journal-title":"Interact. Comput."},{"key":"40_CR11","unstructured":"Lei N\u00b0 12.965: Marco Civil da Internet (2014). http:\/\/www.planalto.gov.br\/ccivil_03\/_ato2011-2014\/2014\/lei\/l12965.htm"},{"key":"40_CR12","unstructured":"ONU: Declara\u00e7\u00e3o Universal dos Direitos Humanos. http:\/\/portal.mj.gov.br\/sedh\/ct\/legis_intern\/ddh_bib_inter_universal.htm"},{"key":"40_CR13","unstructured":"Vianna, T.L.: Transpar\u00eancia p\u00fablica, opacidade privada: o Direito como instrumento de limita\u00e7\u00e3o do poder na sociedade de controle. Tese de doutorado, Universidade Federal do Paran\u00e1 (2006). http:\/\/www.midiaindependente.org\/media\/2008\/05\/419863.pdf"},{"key":"40_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-4990-3","volume-title":"Ethical and Social Issues in the Information Age","author":"JM Kizza","year":"2013","unstructured":"Kizza, J.M.: Ethical and Social Issues in the Information Age, 5th edn. Springer, New York (2013)","edition":"5"},{"key":"40_CR15","volume-title":"Dicion\u00e1rio Eletr\u00f4nico Houaiss da L\u00edngua Portuguesa","author":"A Houaiss","year":"2012","unstructured":"Houaiss, A.: Dicion\u00e1rio Eletr\u00f4nico Houaiss da L\u00edngua Portuguesa. Objetiva, S\u00e3o Paulo (2012)"},{"key":"40_CR16","volume-title":"La intimidad como espect\u00e1culo","author":"P Sibila","year":"2008","unstructured":"Sibila, P.: La intimidad como espect\u00e1culo, 1st edn. Fondo de Cultura Econ\u00f3mica, Buenos Aires (2008). http:\/\/cmap.javeriana.edu.co\/servlet\/SBReadResourceServlet?rid=1J2SK927M-22DBXQG-1TB","edition":"1"},{"key":"40_CR17","unstructured":"Jennings, C., Fena, L.: Priv@cidade.com \u2013 Como preservar sua intimidade na era da internet. Futura, S\u00e3o Paulo, SP (2000)"},{"key":"40_CR18","unstructured":"Maciel, C., Souza, P.C., Viterbo, J., Mendes, F.F., Seghrouchni, A.E.F.: A multi-agent architecture to support ubiquitous aplications in smart environments. In: Fifth International Workshop on Collaborative Agents - Research & Development (CARE) - 13th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2014), Paris-France (2014)"},{"key":"40_CR19","unstructured":"Constitui\u00e7\u00e3o da Rep\u00fablica Federativa do Brasil (1998). http:\/\/www.planalto.gov.br\/ccivil_03\/constituicao\/constituicao.htm"},{"key":"40_CR20","unstructured":"Baranauskas, C., Souza, C.S., Pereira, R. (Orgs.): I GranDIHC-BR - Grandes Desafios de Pesquisa em Intera\u00e7\u00e3o Humano-Computador no Brasil. Relat\u00f3rio T\u00e9cnico. Comiss\u00e3o Especial de Intera\u00e7\u00e3o Humano-Computador (CEIHC) da SBC (2014)"},{"key":"40_CR21","unstructured":"Maciel, C., Pereira, V., Hornung, H., Piccolo, L.G.S., Prates, R.O.: Valores humanos. In: Baranauskas, Souza and Pereira (orgs.) I GranDIHC-BR \u2014 Grandes Desafios de Pesquisa em Intera\u00e7\u00e3o Humano-Computador no Brasil. Relat\u00f3rio T\u00e9cnico. Comiss\u00e3o Especial de Intera\u00e7\u00e3o Humano Computador (CEIHC) da SBC, pp. 27\u201330 (2014)"},{"key":"40_CR22","unstructured":"Fiorela, S.: The Insidiousness of Facebook Messenger\u2019s Android Mobile App Permissions (2013). http:\/\/www.huffingtonpost.com\/sam-fiorella\/the-insidiousness-offace_b_4365645.html"},{"key":"40_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2200\/S00227ED1V01Y200911HCI006","volume":"3","author":"A Blandford","year":"2010","unstructured":"Blandford, A., Attfield, S.: Interacting with information. Synth. Lect. Hum.-Centered Inf., Morgan & Claypool 3, 1\u201399 (2010)","journal-title":"Synth. Lect. Hum.-Centered Inf., Morgan & Claypool"},{"key":"40_CR24","unstructured":"UNHCFREG: Viber security vulnerabilities: do not use Viber until these issues are resolved (2014). http:\/\/www.unhcfreg.com\/#!Viber-Security-Vulnerabilities-Do-not-use-Viber-until-these-issues-are-resolved\/c5rt\/BB4208CF-7F0A-4DE1-92A4-529425549683"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T12:23:42Z","timestamp":1748521422000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}