{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T01:36:39Z","timestamp":1771637799175,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319413532","type":"print"},{"value":"9783319413549","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-41354-9_1","type":"book-chapter","created":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T07:22:29Z","timestamp":1467357749000},"page":"3-14","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Transparency, Privacy and Trust \u2013 Technology for Tracking and Controlling My Data Disclosures: Does This Work?"],"prefix":"10.1007","author":[{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"first","affiliation":[]},{"given":"Julio","family":"Angulo","sequence":"additional","affiliation":[]},{"given":"Farzaneh","family":"Karegar","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Pulls","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,2]]},"reference":[{"key":"1_CR1","unstructured":"Andersson, C., Camenisch, J., Crane, S., Fischer-H\u00fcbner, S., Leenes, R., Pearson, S., Pettersson, J.S., Sommer, D.: Trust in PRIME. In: Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology. IEEE Xplore (2005)"},{"key":"1_CR2","unstructured":"Angulo, J., Fischer-H\u00fcbner, S., Pettersson, J.S.: General HCI principles and guidelines for accountability and transparency in the cloud. A4Cloud deliverable D:C-7.1, A4Cloud Project, September 2013"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Angulo, J., Fischer-H\u00fcbner, S., Pulls, T., W\u00e4stlund, E.: Usable transparency with the data track: a tool for visualizing data disclosures. In: Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems \u2013 CHI 2015, pp. 1803\u20131808. ACM (2015)","DOI":"10.1145\/2702613.2732701"},{"key":"1_CR4","unstructured":"Art. 29 Data Protection Working Party. Opinion 5\/2012 on Cloud Computing. European Commission, 1 July 2012"},{"key":"1_CR5","unstructured":"Art. 29 Data Protection Working Party, Opinion 03\/2013 on Purpose Limitation. European Commission, 2 Apr 2013"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/978-3-319-17016-9_21","volume-title":"Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance","author":"M Azraoui","year":"2015","unstructured":"Azraoui, M., Elkhiyaoui, K., \u00d6nen, M., Bernsmed, K., De Oliveira, A.S., Sendor, J.: A-PPL: an accountability policy language. In: Garcia-Alfaro, J., Herrera-Joancomart\u00ed, J., Lupu, E., Posegga, J., Aldini, A., Martinelli, F., Suri, N. (eds.) DPM\/SETOP\/QASA 2014. LNCS, vol. 8872, pp. 319\u2013326. Springer, Heidelberg (2015)"},{"issue":"1","key":"1_CR7","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/2945.468391","volume":"1","author":"RA Becker","year":"1995","unstructured":"Becker, R.A., Eick, S.G., Wilks, A.R.: Visualizing network data. IEEE Trans. Vis. Comput. Graph. 1(1), 16\u201328 (1995)","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"key":"1_CR8","unstructured":"Bernsmed, K., Fischer-H\u00fcbner, S., et al.: A4Cloud Deliverable D.D-5.4 User Interface Prototypes, 31 Sept 2015"},{"key":"1_CR9","unstructured":"European Commission. Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Off. J. L. 281, 0031\u20130050, 23 Nov 1995"},{"key":"1_CR10","unstructured":"European Commission. Proposal for a Regulation of the European Parliament and of the Council on the protection of individual with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), Brussels, 15 December 2015"},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-20317-6_13","volume-title":"Privacy and Identity Management for Life","author":"S Fischer-H\u00fcbner","year":"2011","unstructured":"Fischer-H\u00fcbner, S., Hedbom, H., W\u00e4stlund, E.: Trust and assurance HCI. In: Camenisch, J., Fischer-H\u00fcbner, S., Rannenberg, K. (eds.) Privacy and Identity Management for Life, pp. 245\u2013260. Springer, Heidelberg (2011)"},{"key":"1_CR12","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-642-55137-6_6","volume-title":"Privacy and Identity Management for Emerging Services and Technologies","author":"S Fischer-H\u00fcbner","year":"2014","unstructured":"Fischer-H\u00fcbner, S., Angulo, J., Pulls, T.: How can cloud users be supported in deciding on, tracking and controlling how their data are used? In: Hansen, M., Hoepman, J.-H., Leenes, R., Whitehouse, D. (eds.) Privacy and Identity 2013. IFIP AICT, vol. 421, pp. 77\u201392. Springer, Heidelberg (2014)"},{"issue":"1","key":"1_CR13","first-page":"4","volume":"1","author":"LC Freeman","year":"2000","unstructured":"Freeman, L.C.: Visualizing social networks. J. Soc. Struct. 1(1), 4 (2000)","journal-title":"J. Soc. Struct."},{"key":"1_CR14","unstructured":"Google. Google dashboard. \n                    https:\/\/www.google.com\/settings\/dashboard"},{"key":"1_CR15","unstructured":"Hildebrandt, M.: Behavioural biometric profiling and transparency enhancing tools. FIDIS Deliverable, D7.12. FIDIS EU project (2009)"},{"key":"1_CR16","first-page":"38","volume-title":"Cloud Computing and Services Science","author":"MG Jaatun","year":"2015","unstructured":"Jaatun, M.G., Cruzes, D.S., Angulo, J., Fischer-H\u00fcbner, S.: Accountability through transparency for cloud customers. In: Helfert, M., Mu\u00f1oz, V.M., Ferguson, D. (eds.) Cloud Computing and Services Science, pp. 38\u201357. Springer International Publishing, Switzerland (2015)"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Kani-Zabihi, E., Helmhout, M., Coles-Kemp, L.: Increasing service users\u2019 privacy awareness by introducing on-line interactive privacy features. In: IAAC Symposium 2011 (2012)","DOI":"10.1007\/978-3-642-29615-4_10"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Kolter, J., Netter, M., Pernul, G.: Visualizing past personal data disclosures. In: International Conference on Availability, Reliability, and Security, ARES 2010. IEEE (2010)","DOI":"10.1109\/ARES.2010.51"},{"key":"1_CR19","unstructured":"Lacoh\u00e9e, H., Crane, S., Phippen, A.: Trustguide: Final Report (2006)"},{"key":"1_CR20","unstructured":"Maguire, M., Bevan, N.: User requirements analysis. In: Mun, M. Hao, S., Mishra, N., Shilton, K., Burke, J., Estrin, D., Hansen, M., Govindan, R. (eds.) Proceedings of IFIP 17th World Computer Congress. Personal Data Vaults: a Locus of Control for Personal Data Streams, CoNEXT 2010: 17. ACM Digital Library (2002)"},{"key":"1_CR21","unstructured":"Mozilla. Lightbeam add-on for Firefox. \n                    https:\/\/www.mozilla.org\/en-US\/lightbeam\/"},{"key":"1_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-540-40956-4_8","volume-title":"Privacy Enhancing Technologies","author":"AS Patrick","year":"2003","unstructured":"Patrick, A.S., Kenny, S.: From privacy legislation to interface design: implementing information privacy in human-computer interactions. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 107\u2013124. Springer, Heidelberg (2003)"},{"key":"1_CR23","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-0-387-70802-7_18","volume-title":"Advances in Information Systems Development","author":"JS Pettersson","year":"2007","unstructured":"Pettersson, J.S., Fischer-H\u00fcbner, S., Bergmann, M.: Outlining \u201cdata track\u201d: privacy-friendly data maintenance for end-users. In: Wojtkowski, W., Wojtkowski, W.G., Zupancic, J., Magyar, G., Knapp, G. (eds.) Advances in Information Systems Development, pp. 215\u2013226. Springer US, Heidelberg (2007)"},{"key":"1_CR24","unstructured":"Popescu, A., et al.: User empowerment for enhanced online presence management \u2013 use cases and tools. In: Amsterdam Privacy Conference 2015, pp. 23\u201326, Amsterdam, 8 October 2015"},{"key":"1_CR25","unstructured":"PrimeLife, Privacy and Identity Management in Europe for Life - Policy Languages. \n                    http:\/\/primelife.ercim.eu\/results\/primer\/133-policy-languages"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Pulls, T., Peeters, R., Wouters, K.: Distributed privacy-preserving transparency logging. In: Workshop on Privacy in the Electronic Society. ACM (2013)","DOI":"10.1145\/2517840.2517847"},{"key":"1_CR27","unstructured":"Svensk F\u00f6rfattningssamling Riksdagen. Patientdatalag (2008: 355)"},{"key":"1_CR28","unstructured":"W3C, \u201cP3P \u2013 The Platform for Privacy Preferences 1.1 (P3P1.1) Specification\u201d, W3C Working Group Note, 13 November 2006. \n                    http:\/\/www.w3.org\/P3P\/"},{"key":"1_CR29","unstructured":"W\u00e4stlund, E., Fischer-H\u00fcbner, S.: End user transparency tools: UI prototypes. PrimeLife Deliverable D.4.2.2. PrimeLife project (2010)"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management X"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-41354-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,20]],"date-time":"2020-07-20T00:08:54Z","timestamp":1595203734000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-41354-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319413532","9783319413549"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-41354-9_1","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"2 July 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}