{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T15:43:02Z","timestamp":1726760582004},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319412634"},{"type":"electronic","value":"9783319412641"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-41264-1_31","type":"book-chapter","created":{"date-parts":[[2016,7,4]],"date-time":"2016-07-04T23:00:39Z","timestamp":1467673239000},"page":"231-238","source":"Crossref","is-referenced-by-count":3,"title":["Insights into Internet Privacy for Visually Impaired and Blind People"],"prefix":"10.1007","author":[{"given":"Georg","family":"Regal","sequence":"first","affiliation":[]},{"given":"Elke","family":"Mattheiss","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Busch","sequence":"additional","affiliation":[]},{"given":"Manfred","family":"Tscheligi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,6]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Akhter, F., Buzzi, M.C., Buzzi, M., Leporini, B.: Conceptual framework: how to engineer online trust for disabled users. In: 2009 IEEE\/WIC\/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, pp. 614\u2013617 (2009)","DOI":"10.1109\/WI-IAT.2009.361"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Buzzi, M.C., Buzzi, M., Leporini, B., Akhter, F.: User trust in ecommerce services: perception via screen reader. In: Proceedings - 2009 International Conference on New Trends in Information and Service Science, NISS 2009, pp. 1166\u20131171. IEEE Computer Society (2009)","DOI":"10.1109\/NISS.2009.271"},{"key":"31_CR3","series-title":"IFIP Advances in Information and Communication Technology, AICT, 216483","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1007\/978-3-642-20769-3_20","volume-title":"Privacy and Identity Management for Life","author":"J Dobias","year":"2011","unstructured":"Dobias, J.: Privacy effects of web bugs amplified by web 2.0. In: Fischer-H\u00fcbner, S., Duquenoy, P., Hansen, M., Leenes, R., Zhang, G. (eds.) Privacy and Identity Management for Life. IFIP AICT, vol. 352, pp. 244\u2013257. Springer, Heidelberg (2011)"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Egelman, S., Cranor, L.F., Hong, J.: You\u2019ve been warned. In: Proceeding of the Twenty-Sixth Annual CHI Conference on Human Factors in Computing Systems \u2013 CHI 2008, pp. 1065\u20131074. ACM Press (2008)","DOI":"10.1145\/1357054.1357219"},{"key":"31_CR5","unstructured":"Egelman, S.: Trust me: design patterns for constructing trustworthy trust indicators. Doctoral thesis, School of Computer Science, Carnegie Mellon University (2009)"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Reeder, R.W., Almuhimedi, H., Consolvo, S.: Experimenting at scale with Google Chrome\u2019s SSL warning. In: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems - CHI 2014, pp. 2667\u20132670. ACM Press (2014)","DOI":"10.1145\/2556288.2557292"},{"key":"31_CR7","unstructured":"Hochheiser, H., Feng, J., Lazar, J.: Challenges in universally usable privacy and security. In: Symposium on Usable Privacy and Security (SOUPS) 2008 (2008)"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Lipford, H.R., Watson, J., Whitney, M., Froiland, K., Reeder, R.W.: Visual vs. compact. In: Proceedings of the 28th International Conference on Human Factors in Computing Systems - CHI 2010, pp. 1111\u20131114. ACM Press (2010)","DOI":"10.1145\/1753326.1753492"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"De Luca, A., Frauendienst, B., Maurer, M., et al.: Does MoodyBoard make internet use more secure? In: Proceedings of the 2011 Annual Conference on Human Factors in Computing Systems - CHI 2011, pp. 887\u2013890. ACM Press (2011)","DOI":"10.1145\/1978942.1979072"},{"key":"31_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/978-3-642-03168-7_3","volume-title":"Privacy Enhancing Technologies","author":"AM McDonald","year":"2009","unstructured":"McDonald, A.M., Reeder, R.W., Kelley, P.G., Cranor, L.F.: A comparative study of online privacy policies and formats. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 37\u201355. Springer, Heidelberg (2009)"},{"issue":"9","key":"31_CR11","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/S1353-4858(01)00916-3","volume":"2001","author":"M Pemble","year":"2001","unstructured":"Pemble, M.: Crying \u2018Havoc\u2019, Crying \u2018Wolf\u2019 or Just Howling at the Moon? Netw. Secur. 2001(9), 14\u201316 (2001)","journal-title":"Netw. Secur."},{"issue":"3","key":"31_CR12","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/s10209-009-0171-2","volume":"9","author":"G Sauer","year":"2010","unstructured":"Sauer, G., Holman, J., Lazar, J., Hochheiser, H., Feng, J.: Accessible privacy and security: a universally usable human-interaction proof tool. Univers. Access Inf. Soc. 9(3), 239\u2013248 (2010)","journal-title":"Univers. Access Inf. Soc."},{"issue":"5","key":"31_CR13","doi-asserted-by":"crossref","first-page":"1297","DOI":"10.1016\/j.apergo.2013.09.015","volume":"45","author":"U Schmuntzsch","year":"2014","unstructured":"Schmuntzsch, U., Sturm, C., Roetting, M.: The warning glove \u2013 development and evaluation of a multimodal action-specific warning prototype. Appl. Ergon. 45(5), 1297\u20131305 (2014)","journal-title":"Appl. Ergon."}],"container-title":["Lecture Notes in Computer Science","Computers Helping People with Special Needs"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-41264-1_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T13:48:57Z","timestamp":1498312137000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-41264-1_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319412634","9783319412641"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-41264-1_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}