{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:08:48Z","timestamp":1761581328870,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_46","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"517-525","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Information Presentation: Considering On-line User Confidence for Effective Engagement"],"prefix":"10.1007","author":[{"given":"Elahe","family":"Kani-Zabihi","sequence":"first","affiliation":[]},{"given":"Lizzie","family":"Coles-Kemp","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Helmhout","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"46_CR1","doi-asserted-by":"crossref","unstructured":"Coles-Kemp, L., Kani-Zabihi, E.: On-line privacy and consent: A dialogue not a monologue. In 21\u201323 Sep ACM PRESS, Ed. ACM Press, pp. 1\u201315 (2010)","DOI":"10.1145\/1900546.1900560"},{"key":"46_CR2","doi-asserted-by":"crossref","unstructured":"Coles-Kemp, L., Kani-Zabihi, E.: Practice makes perfect: motivating confident on-line privacy protection practices. In: IEEE International Conference on Privacy, Security, Risk and Trust and IEEE Internationa Conference on Social Computing, 9\u201311 Oct, Anonymous IEEE, pp. 866\u2013871 (2011)","DOI":"10.1109\/PASSAT\/SocialCom.2011.51"},{"key":"46_CR3","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s00779-004-0308-5","volume":"8","author":"P Dourish","year":"2004","unstructured":"Dourish, P., Grinter, R.E., La De Delgado Flor, J.: Security in the wild: user strategies for managing security as an everyday, practical problem. Personal Ubiquitous Comput. 8, 391\u2013401 (2004)","journal-title":"Personal Ubiquitous Comput."},{"key":"46_CR4","unstructured":"Kani-zabihi, E., Coles-Kemp, L.: Service users\u2019 requirements for tools to support effective on-line privacy and consent practices. In: The 15th Nordic Conference in Secure IT Systems (NordSec\u2019 10), 24\u201330 Oct, LNCS, Ed. ACM Press, pp. 106\u2013120 (2010)"},{"key":"46_CR5","unstructured":"Kani-Zabihi, E., Helmhout, M.: Increasing service users\u2019 privacy awareness by introducing on-line interactive privacy features. In: Pre-Proceedings of Nordsec 2011 16th Nordic Conference on Secure IT-Systems, Talinn, Estonia, Oct 26\u201328, 2011, Anonymous, pp. 287\u2013306 (2011)"},{"key":"46_CR6","doi-asserted-by":"crossref","unstructured":"Karahasanovic, A., Brandtz\u00e6g, P.B., Vanattenhoven, J., Lievens, B., Nielsen, K.T., Pierson, J.: Ensuring trust, privacy, and etiquette in Web 2.0 Applications, pp. 42\u201349 (2009)","DOI":"10.1109\/MC.2009.186"},{"key":"46_CR7","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1108\/09593841011069130","volume":"23","author":"R Kuriyan","year":"2010","unstructured":"Kuriyan, R., Kitner, K., Watkins, J.: ICTs, development and trust: an overview. Inf. Technol. People 23, 216\u2013221 (2010)","journal-title":"Inf. Technol. People"},{"key":"46_CR8","first-page":"94","volume-title":"Familiarity, Confidence, Trust: Problems and Alternatives. Trust: Making and Breaking Cooperative Relations, Electronic Edition","author":"N Luhmann","year":"2000","unstructured":"Luhmann, N.: Familiarity, Confidence, Trust: Problems and Alternatives. Trust: Making and Breaking Cooperative Relations, Electronic Edition, pp. 94\u2013107. Department of Sociology, University of Oxford, Oxford (2000)"},{"key":"46_CR9","unstructured":"Ofcom Media Literacy Matters.: Online trust and privacy: People\u2019s attitude and behaviour (2010)"},{"key":"46_CR10","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1108\/09593841011069149","volume":"23","author":"ML Smith","year":"2010","unstructured":"Smith, M.L.: Building institutional trust through e-government trustworthiness cues. Inf. Technol. People 23, 222\u2013246 (2010)","journal-title":"Inf. Technol. People"},{"key":"46_CR11","unstructured":"US Federal Trade Commission: Privacy Online: Fair Information Practices in the Electronic Marketplace: A Report to Congress. FTC, Washington, DC (2000) (Retrieved June 6, 2000)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,18]],"date-time":"2022-05-18T14:51:05Z","timestamp":1652885465000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}