{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:44:29Z","timestamp":1762875869002,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319557823"},{"type":"electronic","value":"9783319557830"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-55783-0_12","type":"book-chapter","created":{"date-parts":[[2017,3,31]],"date-time":"2017-03-31T06:29:49Z","timestamp":1490941789000},"page":"164-181","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Visualizing Exports of Personal Data by Exercising the Right of Data Portability in the Data Track - Are People Ready for This?"],"prefix":"10.1007","author":[{"given":"Farzaneh","family":"Karegar","sequence":"first","affiliation":[]},{"given":"Tobias","family":"Pulls","sequence":"additional","affiliation":[]},{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,1]]},"reference":[{"key":"12_CR1","unstructured":"Angulo, J., Fischer-H\u00fcbner, S., Pulls, T., W\u00e4stlund, E.: Usable transparency with the data track: a tool for visualizing data disclosures. In: Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, CHI EA 2015, pp. 1803\u20131808, NY, USA (2015). http:\/\/doi.acm.org\/10.1145\/2702613.2732701"},{"issue":"1","key":"12_CR2","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/2945.468391","volume":"1","author":"RA Becker","year":"1995","unstructured":"Becker, R.A., Eick, S.G., Wilks, A.R.: Visualizing network data. IEEE Trans. Visual. Comput. Graph. 1(1), 16\u201328 (1995)","journal-title":"IEEE Trans. Visual. Comput. Graph."},{"key":"12_CR3","unstructured":"Bernsmed, K., Fischer-H\u00fcbner, S.: A4Cloud deliverable D.D-5.4 user interface prototypes (2015)"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-319-44760-5_9","volume-title":"Privacy Technologies and Policy","author":"C Bier","year":"2016","unstructured":"Bier, C., K\u00fchne, K., Beyerer, J.: PrivacyInsight: the next generation privacy dashboard. In: Schiffner, S., Serna, J., Ikonomou, D., Rannenberg, K. (eds.) APF 2016. LNCS, vol. 9857, pp. 135\u2013152. Springer, Cham (2016). doi:10.1007\/978-3-319-44760-5_9"},{"key":"12_CR5","volume-title":"Constructing Grounded Theory","author":"K Charmaz","year":"2014","unstructured":"Charmaz, K.: Constructing Grounded Theory. Sage, Thousand Oaks (2014)"},{"key":"12_CR6","unstructured":"European Commission: Directive 95\/46\/EC of the European Parliament and of the Council of 24 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, October 1995"},{"key":"12_CR7","unstructured":"European Commission: Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation), April 2016. Official Journal of the European Union, L119\/1, 4 May 2016"},{"key":"12_CR8","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-41354-9_1","volume-title":"Trust Management X","author":"S Fischer-H\u00fcbner","year":"2016","unstructured":"Fischer-H\u00fcbner, S., Angulo, J., Karegar, F., Pulls, T.: Transparency, Privacy and Trust \u2013 Technology for Tracking and Controlling My Data Disclosures: Does This Work? In: Habib, S.M.M., Vassileva, J., Mauw, S., M\u00fchlh\u00e4user, M. (eds.) IFIPTM 2016. IAICT, vol. 473, pp. 3\u201314. Springer, Cham (2016). doi:10.1007\/978-3-319-41354-9_1"},{"key":"12_CR9","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-642-55137-6_6","volume-title":"Privacy and Identity Management for Emerging Services and Technologies","author":"S Fischer-H\u00fcbner","year":"2014","unstructured":"Fischer-H\u00fcbner, S., Angulo, J., Pulls, T.: How can cloud users be supported in deciding on, tracking and controlling how their data are used? In: Hansen, M., Hoepman, J.-H., Leenes, R., Whitehouse, D. (eds.) Privacy and Identity 2013. IAICT, vol. 421, pp. 77\u201392. Springer, Heidelberg (2014). doi:10.1007\/978-3-642-55137-6_6"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-20317-6_13","volume-title":"Privacy and Identity Management for Life","author":"S Fischer-H\u00fcbner","year":"2011","unstructured":"Fischer-H\u00fcbner, S., Hedbom, H., W\u00e4stlund, E.: Trust and assurance HCI. In: Camenisch, J., Fischer-H\u00fcbner, S., Rannenberg, K. (eds.) Privacy and Identity Management for Life, pp. 245\u2013260. Springer, Heidelberg (2011)"},{"issue":"1","key":"12_CR11","first-page":"4","volume":"1","author":"LC Freeman","year":"2000","unstructured":"Freeman, L.C.: Visualizing social networks. J. Soc. Struct. 1(1), 4 (2000)","journal-title":"J. Soc. Struct."},{"key":"12_CR12","unstructured":"Hildebrandt, M.: Behavioural biometric profiling and transparency enhancing tools. FIDIS WP7 deliverable. http:\/\/www.fidis.net\/"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-642-29615-4_10","volume-title":"Information Security Technology for Applications","author":"E Kani-Zabihi","year":"2012","unstructured":"Kani-Zabihi, E., Helmhout, M.: Increasing service users\u2019 privacy awareness by introducing on-line interactive privacy features. In: Laud, P. (ed.) NordSec 2011. LNCS, vol. 7161, pp. 131\u2013148. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-29615-4_10"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Kolter, J., Netter, M., Pernul, G.: Visualizing past personal data disclosures. In: ARES 2010 International Conference on Availability, Reliability, and Security, pp. 131\u2013139. IEEE (2010)","DOI":"10.1109\/ARES.2010.51"},{"key":"12_CR15","unstructured":"Mozilla: Lightbeam add-on for Firefox. https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/lightbeam\/"},{"key":"12_CR16","unstructured":"Mun, M., Hao, S., Mishra, N., Shilton, K., Burke, J., Estrin, D., Hansen, M., Govindan, R.: Personal data vaults: a locus of control for personal data streams. In: Proceedings of the 6th International Conference, pp. 17:1\u201317:12. Co-NEXT 2010, NY, USA (2010). http:\/\/doi.acm.org\/10.1145\/1921168.1921191"},{"issue":"2","key":"12_CR17","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s11135-006-9000-3","volume":"41","author":"AJ Onwuegbuzie","year":"2007","unstructured":"Onwuegbuzie, A.J., Leech, N.L.: Validity and qualitative research: an oxymoron? Qual. Quant. 41(2), 233\u2013249 (2007). http:\/\/dx.doi.org\/10.1007\/s11135-006-9000-3","journal-title":"Qual. Quant."},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-0-387-70802-7_18","volume-title":"Advances in Information Systems Development","author":"JS Pettersson","year":"2007","unstructured":"Pettersson, J.S., Fischer-H\u00fcbner, S., Bergmann, M.: Outlining \u201cData Track\u201d: privacy-friendly data maintenance for end-users. In: Wojtkowski, W., Wojtkowski, W., Zupancic, J., Magyar, G., Knapp, G. (eds.) Advances in Information Systems Development, pp. 215\u2013226. Springer, Heidelberg (2007)"},{"key":"12_CR19","unstructured":"Pettersson, J.S., Fischer-H\u00fcbner, S., Danielsson, N., Nilsson, J., Bergmann, M., Clauss, S., Kriegelstein, T., Krasemann, H.: Making PRIME usable. In: Proceedings of the 2005 Symposium on Usable Privacy and Security, SOUPS 2005, pp. 53\u201364, NY, USA (2005). http:\/\/doi.acm.org\/10.1145\/1073001.1073007"},{"key":"12_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-319-31456-3_3","volume-title":"Privacy Technologies and Policy","author":"A Popescu","year":"2016","unstructured":"Popescu, A., Hildebrandt, M., Breuer, J., Claeys, L., Papadopoulos, S., Petkos, G., Michalareas, T., Lund, D., Heyman, R., Graaf, S., Gadeski, E., Borgne, H., deVries, K., Kastrinogiannis, T., Kousaridas, A., Padyab, A.: Increasing transparency and privacy for online social network users \u2013 USEMP value model, scoring framework and legal. In: Berendt, B., Engel, T., Ikonomou, D., Le M\u00e9tayer, D., Schiffner, S. (eds.) APF 2015. LNCS, vol. 9484, pp. 38\u201359. Springer, Cham (2016). doi:10.1007\/978-3-319-31456-3_3"},{"key":"12_CR21","volume-title":"Handbook of Usability Testing: How to Plan, Design and Conduct Effective Tests","author":"J Rubin","year":"2008","unstructured":"Rubin, J., Chisnell, D.: Handbook of Usability Testing: How to Plan, Design and Conduct Effective Tests. Wiley, New York (2008)"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management. Facing up to Next Steps"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-55783-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,21]],"date-time":"2021-03-21T01:04:49Z","timestamp":1616288689000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-55783-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319557823","9783319557830"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-55783-0_12","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"1 April 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}