{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:07:43Z","timestamp":1743026863129,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_49","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"547-558","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Signs of Time: Designing Social Networking Site Profile Interfaces with Temporal Contextual Integrity"],"prefix":"10.1007","author":[{"given":"Alexander","family":"Novotny","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Novotny, A., Spiekermann, S.: Oblivion on the web: an inquiry of user needs and technologies. In: Proceedings of the European Conference on Information Systems (ECIS 2014), Tel Aviv (2014)","key":"49_CR1","DOI":"10.2139\/ssrn.3604183"},{"doi-asserted-by":"crossref","unstructured":"Ayalon, O., Toch, E.: Retrospective privacy: managing longitudinal privacy in online social networks. In: Proceedings of the 9th Symposium on Usable Privacy and Security, pp. 1\u201313. ACM, Newcastle (2013)","key":"49_CR2","DOI":"10.1145\/2501604.2501608"},{"doi-asserted-by":"crossref","unstructured":"Lindley, S., Corish, R., Vaara, E.K., Ferreira, P., Simbelis, V.: Changing perspectives of time in HCI. In: Proceedings of the CHI 2013 Extended Abstracts on Human Factors in Computing Systems (CHI EA 2013), pp. 3211\u20133214. ACM, Paris (2013)","key":"49_CR3","DOI":"10.1145\/2468356.2479649"},{"issue":"3","key":"49_CR4","doi-asserted-by":"publisher","first-page":"383","DOI":"10.2307\/3478805","volume":"48","author":"WL Prosser","year":"1960","unstructured":"Prosser, W.L.: Privacy. Cal. L. Rev. 48(3), 383\u2013423 (1960)","journal-title":"Privacy. Cal. L. Rev."},{"issue":"3","key":"49_CR5","doi-asserted-by":"publisher","first-page":"477","DOI":"10.2307\/40041279","volume":"154","author":"D Solove","year":"2006","unstructured":"Solove, D.: A taxonomy of privacy. U. Pen. L. Rev. 154(3), 477\u2013560 (2006)","journal-title":"U. Pen. L. Rev."},{"issue":"1","key":"49_CR6","first-page":"34","volume":"53","author":"K Borcea-Pfitzmann","year":"2011","unstructured":"Borcea-Pfitzmann, K., Pfitzmann, A., Berg, M.: Privacy 3.0:=\u00a0data minimization\u00a0+\u00a0user control\u00a0+\u00a0contextual integrity. IT 53(1), 34\u201340 (2011)","journal-title":"IT"},{"key":"49_CR7","volume-title":"Privacy in Context: Technology, Policy, and the Integrity of Social Life","author":"H Nissenbaum","year":"2010","unstructured":"Nissenbaum, H.: Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, Stanford (2010)"},{"doi-asserted-by":"crossref","unstructured":"Greenberg, S., Rounding, M.: The Notification Collage: Posting Information to Public and Personal Displays. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2001), pp. 514\u2013521. ACM, Seattle (2001)","key":"49_CR8","DOI":"10.1145\/365024.365339"},{"issue":"3","key":"49_CR9","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1016\/j.cag.2007.01.030","volume":"31","author":"W Aigner","year":"2007","unstructured":"Aigner, W., Miksch, S., M\u00fcller, W., Schumann, H., Tominski, C.: Visualizing time-oriented data - a systematic view. Comput. Graph. 31(3), 401\u2013409 (2007)","journal-title":"Comput. Graph."},{"key":"49_CR10","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-12","volume-title":"An Introduction to Computer Security: The NIST Handbook, NIST Special Publication 800-12","author":"B Guttman","year":"1995","unstructured":"Guttman, B., Roback, E.A.: An Introduction to Computer Security: The NIST Handbook, NIST Special Publication 800-12. DIANE Publishing, Gaithersburg (1995)"},{"issue":"2","key":"49_CR11","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s10676-009-9187-9","volume":"11","author":"M Turilli","year":"2009","unstructured":"Turilli, M., Floridi, L.: The ethics of information transparency. Ethics Inf. Technol. 11(2), 105\u2013112 (2009)","journal-title":"Ethics Inf. Technol."},{"key":"49_CR12","volume-title":"Ph\u00e4nomen und Logik der Zeichen","author":"CS Peirce","year":"1983","unstructured":"Peirce, C.S.: Ph\u00e4nomen und Logik der Zeichen. Suhrkamp, Frankfurt am Main (1983)"},{"issue":"2","key":"49_CR13","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1016\/j.chb.2010.11.019","volume":"27","author":"Y-C Hsieh","year":"2011","unstructured":"Hsieh, Y.-C., Chen, K.-H.: How different information types affect viewer\u2019s attention on internet advertising. Comput. Hum. Behav. 27(2), 935\u2013945 (2011)","journal-title":"Comput. Hum. Behav."},{"doi-asserted-by":"crossref","unstructured":"Rekimoto, J.: TimeScape: a time machine for the desktop environment. In: Proceedings of the CHI 1999 Extended Abstracts on Human Factors in Computing Systems (CHI EA 1999), pp. 180\u2013181. ACM, Pittsburgh (1999)","key":"49_CR14","DOI":"10.1145\/632716.632830"},{"doi-asserted-by":"crossref","unstructured":"Zhao, O.J., Ng, T., Cosley, D.: No forests without trees: particulars and patterns in visualizing personal communication. In: Proceedings of the 2012 iConference, pp. 25\u201332. ACM, Toronto (2012)","key":"49_CR15","DOI":"10.1145\/2132176.2132180"},{"doi-asserted-by":"crossref","unstructured":"Bauer, L., Cranor, L.F., Komanduri, S., Mazurek, M.L., Reiter, M.K., Sleeper, M., Ur, B.: The post anachronism: the temporal dimension of Facebook privacy. In: Proceedings of the 12th ACM Workshop on Privacy in the Electronic Society (WPES 2013), pp. 1\u201312. ACM, Berlin (2013)","key":"49_CR16","DOI":"10.1145\/2517840.2517859"},{"doi-asserted-by":"crossref","unstructured":"Zhao, X., Salehi, N., Naranjit, S., Alwaalan, S., Voida, S., Cosley, D.: The many faces of Facebook: experiencing social media as performance, exhibition, and personal archive. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2013), pp. 1\u201310. ACM, Paris (2013)","key":"49_CR17","DOI":"10.1145\/2470654.2470656"},{"key":"49_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1007\/978-3-540-73111-5_94","volume-title":"Human-Computer Interaction","author":"A AlTaboli","year":"2007","unstructured":"AlTaboli, A., Abou-Zeid, M.R.: Effect of physical consistency of web interface design on users\u2019 performance and satisfaction. In: Jacko, J.A. (ed.) HCI 2007. LNCS, vol. 4553, pp. 849\u2013858. Springer, Heidelberg (2007)"},{"unstructured":"World Wide Web Consortium (W3C). http:\/\/www.w3.org\/TR\/WCAG20\/","key":"49_CR19"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,5]],"date-time":"2020-09-05T06:49:49Z","timestamp":1599288589000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}