{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:34:07Z","timestamp":1725852847288},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319318103"},{"type":"electronic","value":"9783319318110"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31811-0_4","type":"book-chapter","created":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T10:59:22Z","timestamp":1459508362000},"page":"55-70","source":"Crossref","is-referenced-by-count":2,"title":["Improving Users\u2019 Trust Through Friendly Privacy Policies: An Empirical Study"],"prefix":"10.1007","author":[{"given":"Oluwa","family":"Lawani","sequence":"first","affiliation":[]},{"given":"Esma","family":"A\u00efmeur","sequence":"additional","affiliation":[]},{"given":"Kimiz","family":"Dalkir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,2]]},"reference":[{"key":"4_CR1","unstructured":"Ermakova, T., Baumann, A., Fabian, B., Krasnova, H.: Privacy policies and users\u2019 trust: does readability matter? In: Presented at the Twentieth Americas Conference on Information Systems (2014)"},{"key":"4_CR2","first-page":"12","volume":"2012","author":"S Furnell","year":"2012","unstructured":"Furnell, S., Phippen, A.: Online privacy: a matter of policy? Comput. Fraud Secur. 2012, 12\u201318 (2012)","journal-title":"Comput. Fraud Secur."},{"key":"4_CR3","unstructured":"Office of the Privacy Commissioner of Canada: Survey of Canadians on Privacy-Related Issues. https:\/\/www.priv.gc.ca\/information\/por-rop\/2013\/por_2013_01_e.asp"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"dos Santos Brito, K., Cardoso Garcia, K.V., Araujo Durao, F., Romero de Lemos Meira, S.: How people care about their personal data released on social media. In: Eleventh Annual International Conference on Privacy, Security and Trust (PST), pp. 111\u2013118 (2013)","DOI":"10.1109\/PST.2013.6596044"},{"key":"4_CR5","first-page":"543","volume":"4","author":"AM McDonald","year":"2008","unstructured":"McDonald, A.M., Cranor, L.F.: The cost of reading privacy policies. J. Law Policy Inf. Soc. 4, 543 (2008)","journal-title":"J. Law Policy Inf. Soc."},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Schaub, F., Breaux, T.D., Sadeh, N.: Crowdsourcing the extraction of data practices from privacy policies. In: Second AAAI Conference on Human Computation and Crowdsourcing, pp. 56\u201357 (2014)","DOI":"10.1609\/hcomp.v2i1.13190"},{"key":"4_CR7","unstructured":"Williams, T.L., Agarwal, N., Wigand, R.T.: Protecting Private Information: Current Attitudes Concerning Privacy Policies (2015)"},{"key":"4_CR8","unstructured":"Richards, N.M., King, J.H.: Big data ethics, Wake Forest Law Review, p. 40 (2014)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Cranor, L.F., Hoke, C., Leon, P.G., Au, A.: Are they worth reading? An in-depth analysis of online advertising companies\u2019 privacy policies. In: TPRC Conference (2014)","DOI":"10.2139\/ssrn.2418590"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Noorian, Z., Iyilade, J., Mohkami, M., Vassileva, J.: Trust mechanism for enforcing compliance to secondary data use contracts. In: IEEE 13th International Conference Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 519\u2013526 (2014)","DOI":"10.1109\/TrustCom.2014.66"},{"key":"4_CR11","unstructured":"W3C. P3P Specification. http:\/\/www.w3.org\/TR\/P3P11\/ . Accessed 28 May 2015"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Acquisti, A.: The economics of personal data and the economics of privacy. In: Background Paper for OECD Joint WPISP-WPIE Roundtable, vol. 1, p. 50 (2010)","DOI":"10.1007\/978-3-642-27739-9_1641-1"},{"key":"4_CR13","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MIC.2003.1167344","volume":"7","author":"G Linden","year":"2003","unstructured":"Linden, G., Smith, B., York, J.: Amazon.com recommendations: item-to-item collaborative filtering. IEEE Internet Comput. 7, 76\u201380 (2003)","journal-title":"IEEE Internet Comput."},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s12525-015-0191-0","volume":"25","author":"S Spiekermann","year":"2015","unstructured":"Spiekermann, S., Acquisti, A., B\u00f6hme, R., Hui, K.-L.: The challenges of personal data markets and privacy. Electron. Markets 25, 161\u2013167 (2015)","journal-title":"Electron. Markets"},{"key":"4_CR15","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1086\/671754","volume":"42","author":"A Acquisti","year":"2013","unstructured":"Acquisti, A., John, L.K., Loewenstein, G.: What is privacy worth? J. Legal Stud. 42, 249\u2013274 (2013)","journal-title":"J. Legal Stud."},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Osothongs, A., Sonehara, N.: A proposal of personal information trading platform (PIT): a fair trading between personal information and incentives. In: Fourth International Conference on Digital Information and Communication Technology and its Applications (DICTAP), pp. 269\u2013274 (2014)","DOI":"10.1109\/DICTAP.2014.6821694"},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1016\/j.pmcj.2012.07.011","volume":"9","author":"AK Chorppath","year":"2013","unstructured":"Chorppath, A.K., Alpcan, T.: Trading privacy with incentives in mobile commerce: a game theoretic approach. Pervasive Mob. Comput. 9, 598\u2013612 (2013)","journal-title":"Pervasive Mob. Comput."},{"key":"4_CR18","unstructured":"Grossklags, J., Acquisti, A.: When 25 cents is too much: an experiment on willingness-to-sell and willingness-to-protect personal information. In: Presented at the Workshop on the Economics of Information Security (2007)"},{"key":"4_CR19","first-page":"39","volume":"42","author":"GL Urban","year":"2000","unstructured":"Urban, G.L., Sultan, F., Qualls, W.J.: Placing trust at the center of your Internet strategy. Sloan Manag. Rev. 42, 39\u201348 (2000)","journal-title":"Sloan Manag. Rev."},{"key":"4_CR20","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/2501654.2501661","volume":"45","author":"W Sherchan","year":"2013","unstructured":"Sherchan, W., Nepal, S., Paris, C.: A survey of trust in social networks. ACM Comput. Surv. 45, 47 (2013)","journal-title":"ACM Comput. Surv."},{"key":"4_CR21","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.dss.2007.07.001","volume":"44","author":"DJ Kim","year":"2008","unstructured":"Kim, D.J., Ferrin, D.L., Rao, H.R.: A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents. Decis. Support Syst. 44, 544\u2013564 (2008)","journal-title":"Decis. Support Syst."},{"key":"4_CR22","unstructured":"Raimondo, M.A.: The measurement of trust in marketing studies: a review of models and methodologies. In: 16th IMP-Conference, Bath, UK (2000)"},{"key":"4_CR23","unstructured":"Song, Y., Kunjithapatham, A., Messer, A.: Method and apparatus for user centric private data management. ed: Google Patents (2006)"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Reidenberg, J.R., Breaux, T., Cranor, L.F., French, B., Grannis, A., Graves, J.T., et al.: Disagreeable Privacy Policies: Mismatches Between Meaning and Users\u2019 Understanding (2014)","DOI":"10.2139\/ssrn.2418297"},{"key":"4_CR25","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1109\/TEM.2005.844927","volume":"52","author":"JB Earp","year":"2005","unstructured":"Earp, J.B., Ant\u00f3n, A.I., Aiman-Smith, L., Stufflebeam, W.H.: Examining Internet privacy policies within the context of user privacy values. IEEE Trans. Eng. Manage. 52, 227\u2013237 (2005)","journal-title":"IEEE Trans. Eng. Manage."},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Sumeeth, M., Singh, R., Miller, J.: Are online privacy policies readable? In: Optimizing Information Security and Advancing Privacy Assurance: New Technologies, New Technologies, p. 91 (2012)","DOI":"10.4018\/978-1-4666-0026-3.ch005"},{"key":"4_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/978-3-642-38844-6_28","volume-title":"User Modeling, Adaptation, and Personalization","author":"J Iyilade","year":"2013","unstructured":"Iyilade, J., Vassileva, J.: A framework for privacy-aware user data trading. In: Carberry, S., Weibelzahl, S., Micarelli, A., Semeraro, G. (eds.) UMAP 2013. LNCS, vol. 7899, pp. 310\u2013317. Springer, Heidelberg (2013)"},{"key":"4_CR28","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1016\/j.dss.2012.10.034","volume":"54","author":"T Zhou","year":"2013","unstructured":"Zhou, T.: An empirical examination of continuance intention of mobile payment services. Decis. Support Syst. 54, 1085\u20131091 (2013)","journal-title":"Decis. Support Syst."},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Kittur, A., Chi, E.H., Suh, B.: Crowdsourcing user studies with mechanical turk. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 453\u2013456 (2008)","DOI":"10.1145\/1357054.1357127"},{"key":"4_CR30","volume-title":"IBM\u00ae SPSS\u00ae Amos\u2122 22 User\u2019s Guide","author":"JL Arbuckle","year":"2013","unstructured":"Arbuckle, J.L.: IBM\u00ae SPSS\u00ae Amos\u2122 22 User\u2019s Guide. IBM, Chicago (2013)"},{"key":"4_CR31","first-page":"7","volume":"4","author":"D Gefen","year":"2000","unstructured":"Gefen, D., Straub, D., Boudreau, M.-C.: Structural equation modeling and regression: guidelines for research practice. Commun. Assoc. Inf. Syst. 4, 7 (2000)","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"4_CR32","volume-title":"Psychometric Theory","author":"JC Numally","year":"1978","unstructured":"Numally, J.C.: Psychometric Theory. McGraw-Hill, New York (1978)"},{"issue":"1","key":"4_CR33","doi-asserted-by":"publisher","first-page":"39","DOI":"10.2307\/3151312","volume":"18","author":"C Fornell","year":"1981","unstructured":"Fornell, C., Larcker, D.F.: Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 18(1), 39\u201350 (1981)","journal-title":"J. Mark. Res."}],"container-title":["Lecture Notes in Computer Science","Risks and Security of Internet and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31811-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,17]],"date-time":"2023-08-17T12:34:58Z","timestamp":1692275698000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31811-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319318103","9783319318110"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31811-0_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}