{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:19:50Z","timestamp":1743099590260,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319448046"},{"type":"electronic","value":"9783319448053"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-44805-3_18","type":"book-chapter","created":{"date-parts":[[2016,8,24]],"date-time":"2016-08-24T01:03:04Z","timestamp":1472000584000},"page":"215-228","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Manifestations of Users\u2019 Privacy Concerns in a Formative Usability Test of Social Networking Site"],"prefix":"10.1007","author":[{"given":"Kimmo","family":"Tarkkanen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ville","family":"Harkke","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"issue":"1","key":"18_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/1100000004","volume":"1","author":"G Iachello","year":"2007","unstructured":"Iachello, G., Hong, J.: End-user privacy in human-computer interaction. Found. Trends Hum.-Comput. Interact. 1(1), 1\u2013137 (2007)","journal-title":"Found. Trends Hum.-Comput. Interact."},{"key":"18_CR2","first-page":"267","volume-title":"Proceedings of the 18th ACM Conference Companion on Computer Supported Cooperative Work and Social Computing","author":"J Vitak","year":"2015","unstructured":"Vitak, J., Wisniewski, P., Page, X., Lampinen, A., Litt, E., De Wolf, R., Kelley, P.G., Sleeper, M.: The future of networked privacy: challenges and opportunities. In: Cosley, D., Forte, A., Ciolfi, L., McDonald, D. (eds.) Proceedings of the 18th ACM Conference Companion on Computer Supported Cooperative Work and Social Computing, pp. 267\u2013272. ACM, New York (2015)"},{"issue":"3","key":"18_CR3","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1207\/s15327051hci2103_2","volume":"21","author":"P Dourish","year":"2006","unstructured":"Dourish, P., Anderson, K.: Collective information practice: exploring privacy and security as social and cultural phenomena. Hum.-comput. Interact. 21(3), 319\u2013342 (2006)","journal-title":"Hum.-comput. Interact."},{"key":"18_CR4","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1145\/2207676.2207761","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"P Wisniewski","year":"2012","unstructured":"Wisniewski, P., Lipford, H., Wilson, D.: Fighting for my space: coping mechanisms for SNS boundary regulation. In: Konstan, J.A., Chi, E.D., H\u00f6\u00f6k, K. (eds.) Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 609\u2013618. ACM, New York (2012)"},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"2441","DOI":"10.1145\/1979742.1979579","volume-title":"CHI 2011 Extended Abstracts on Human Factors in Computing Systems","author":"A Lampinen","year":"2011","unstructured":"Lampinen, A., Stutzman, F., Bylund, M.: Privacy for a networked world: bridging theory and design. In: Tan, D., Begole, B., Kellogg, W.A. (eds.) CHI 2011 Extended Abstracts on Human Factors in Computing Systems, pp. 2441\u20132444. ACM, New York (2011)"},{"key":"18_CR6","unstructured":"Workshop at CHI 2016: Bridging the Gap between Privacy by Design and Privacy in Practice. Call for Participation. https:\/\/networkedprivacy2016.wordpress.com\/call-for-participation\/"},{"issue":"2","key":"18_CR7","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1145\/1067860.1067868","volume":"12","author":"M Boyle","year":"2005","unstructured":"Boyle, M., Greenberg, S.: The language of privacy: learning from video media space analysis and design. ACM Trans. Comput.-Hum. Interact. 12(2), 328\u2013370 (2005)","journal-title":"ACM Trans. Comput.-Hum. Interact."},{"key":"18_CR8","doi-asserted-by":"crossref","first-page":"3217","DOI":"10.1145\/1978942.1979420","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"A Lampinen","year":"2011","unstructured":"Lampinen, A., Lehtinen, V., Lehmuskallio, A., Tamminen, S.: We\u2019re in it together: interpersonal management of disclosure in social network services. In: Tan, D., Fitzpatrick, G., Gutwin, C., Begole, B., Kellogg, W.A. (eds.) Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 3217\u20133226. ACM, New York (2011)"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Wisniewski, P., Islam, A.K.M., Knijnenburg, B.P., Patil, S.: Give social network users the privacy they want. In: Cosley, D., Forte, A., Ciolfi, L., McDonald, D. (eds.) Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work and Social Computing, pp. 1427\u20131441. ACM, New York (2015)","DOI":"10.1145\/2675133.2675256"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Atluri, W., De Capitani di Vimercati, S., Dingledine, R. (eds.) Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71\u201380. ACM, New York (2005)","DOI":"10.1145\/1102199.1102214"},{"issue":"1","key":"18_CR11","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"DM Boyd","year":"2008","unstructured":"Boyd, D.M., Ellison, N.B.: Social network sites: definition, history, and scholarship. J. Comput.\u2010Mediated Commun. 13(1), 210\u2013230 (2008)","journal-title":"J. Comput.\u2010Mediated Commun."},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.bushor.2011.01.005","volume":"54","author":"JH Kietzmann","year":"2011","unstructured":"Kietzmann, J.H., Hermkens, K., McCarthy, I.P., Silvestre, B.S.: Social media? Get serious! understanding the functional building blocks of social media. Bus. Horiz. 54, 241\u2013251 (2011)","journal-title":"Bus. Horiz."},{"key":"18_CR13","volume-title":"The Environment and Social Behavior - Privacy, Personal Space, Territory","author":"I Altman","year":"1975","unstructured":"Altman, I.: The Environment and Social Behavior - Privacy, Personal Space, Territory. Crowding. Brooks\/Cole Publishing Company, Monterey (1975)"},{"key":"18_CR14","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1145\/642611.642635","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"L Palen","year":"2003","unstructured":"Palen, L., Dourish, P.: Unpacking privacy for a networked world. In: Cockton, G., Korhonen, P. (eds.) Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 129\u2013136. ACM, New York (2003)"},{"issue":"2","key":"18_CR15","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1108\/10662241211214575","volume":"22","author":"X Tan","year":"2012","unstructured":"Tan, X., Qin, L., Kim, Y., Hsu, J.: Impact of privacy concern in social networking web sites. Internet Res. 22(2), 211\u2013233 (2012)","journal-title":"Internet Res."},{"issue":"3","key":"18_CR16","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1207\/s15506878jobem4703_3","volume":"47","author":"MJ Metzger","year":"2003","unstructured":"Metzger, M.J., Docter, S.: Public opinion and policy initiatives for online privacy protection. J. Broadcast. Electron. Media 47(3), 350\u2013374 (2003)","journal-title":"J. Broadcast. Electron. Media"},{"issue":"5","key":"18_CR17","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1002\/asi.20530","volume":"58","author":"MZ Yao","year":"2007","unstructured":"Yao, M.Z., Rice, R.E., Wallis, K.: Predicting user concerns about online privacy. J. Am. Soc. Inform. Sci. Technol. 58(5), 710\u2013722 (2007)","journal-title":"J. Am. Soc. Inform. Sci. Technol."},{"key":"18_CR18","first-page":"1","volume-title":"Proceedings of Americas Conference on Information Systems","author":"P Karr-Wisniewski","year":"2011","unstructured":"Karr-Wisniewski, P., Wilson, D., Richter-Lipford, H.: A new social order: mechanisms for social network site boundary regulation. In: Sambamurthy, V., Tanniru, M. (eds.) Proceedings of Americas Conference on Information Systems, pp. 1\u20138. AIS, Detroit (2011)"},{"key":"18_CR19","first-page":"235","volume":"38","author":"P Wisniewski","year":"2016","unstructured":"Wisniewski, P., Islam, A.K.M.N., Richter Lipford, H., Wilson, D.C.: Framing and measuring multi-dimensional interpersonal privacy preferences of social networking site users. Comm. AIS 38, 235\u2013258 (2016)","journal-title":"Comm. AIS"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Besmer, A., Richter Lipford, H.: Moving beyond untagging: photo privacy in a tagged world. In: Mynatt, E., Fitzpatrick, G, Hudson, S., Edwards, K., Rodden, T. (eds.) Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1563\u20131572. ACM, New York (2010)","DOI":"10.1145\/1753326.1753560"},{"issue":"3","key":"18_CR21","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1109\/47.867942","volume":"43","author":"T Boren","year":"2000","unstructured":"Boren, T., Ramey, J.: Thinking aloud: reconciling theory and practice. IEEE Trans. Prof. Commun. 43(3), 261\u2013278 (2000)","journal-title":"IEEE Trans. Prof. Commun."},{"issue":"2","key":"18_CR22","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1080\/01449290701773842","volume":"28","author":"M Hertzum","year":"2009","unstructured":"Hertzum, M., Hansen, K.D., Andersen, H.H.: Scrutinising usability evaluation: does thinking aloud affect behaviour and mental workload? Behav. Inf. Technol. 28(2), 165\u2013181 (2009)","journal-title":"Behav. Inf. Technol."},{"key":"18_CR23","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1145\/642611.642636","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"NS Good","year":"2003","unstructured":"Good, N.S., Krekelberg, A.: Usability and privacy: a study of Kazaa P2P file-sharing. In: Cockton, G., Korhonen, P. (eds.) Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 137\u2013144. ACM, New York (2003)"},{"key":"18_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-319-22668-2_14","volume-title":"Human-Computer Interaction \u2013 INTERACT 2015","author":"A Bruun","year":"2015","unstructured":"Bruun, A., Stage, J.: An empirical study of the effects of three think-aloud protocols on identification of usability problems. In: Abascal, J., Barbosa, S., Fetter, M., Gross, T., Palanque, P., Winckler, M. (eds.) INTERACT 2015. LNCS, vol. 9297, pp. 159\u2013176. Springer, Heidelberg (2015)"},{"key":"18_CR25","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s00779-008-0214-3","volume":"13","author":"N Sadeh","year":"2009","unstructured":"Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., Rao, J.: Understanding and capturing people\u2019s privacy policies in a mobile social networking application. Pers. Ubiquit. Comput. 13, 401\u2013412 (2009)","journal-title":"Pers. Ubiquit. Comput."},{"key":"18_CR26","unstructured":"Whitten, A., Tygar, J.D.: Why johnny can\u2019t encrypt: a usability evaluation of PGP 5.0. In: Treese, W. (ed.) Proceedings of the 8th USENIX Security Symposium, pp. 169\u2013184. Usenix, Washington (1999)"}],"container-title":["IFIP Advances in Information and Communication Technology","Technology and Intimacy: Choice or Coercion"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-44805-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,6]],"date-time":"2022-07-06T22:58:57Z","timestamp":1657148337000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-44805-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319448046","9783319448053"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-44805-3_18","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"25 August 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Human Choice and Computers","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salford","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcc2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}