{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:01:58Z","timestamp":1776092518675,"version":"3.50.1"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319584591","type":"print"},{"value":"9783319584607","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58460-7_45","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T11:08:42Z","timestamp":1494587322000},"page":"656-674","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Exploring Consumers\u2019 Attitudes of Smart TV Related Privacy Risks"],"prefix":"10.1007","author":[{"given":"Marco","family":"Ghiglieri","sequence":"first","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]},{"given":"Karen","family":"Renaud","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"key":"45_CR1","unstructured":"Working Group Smart TV of the German TV-Platform: Marktanalyse Smart-TV - Eine Bestandsaufnahme der Deutschen TV-Plattform. http:\/\/tv-plattform.de\/images\/stories\/pdf\/marktanalyse_smart-tv_2013.pdf. Accessed 06 Nov 2016"},{"issue":"3","key":"45_CR2","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MTS.2009.934142","volume":"28","author":"LJ Camp","year":"2006","unstructured":"Camp, L.J.: Mental models of privacy and security. Technol. Soc. Mag. IEEE 28(3), 37\u201346 (2006)","journal-title":"Technol. Soc. Mag. IEEE"},{"issue":"7","key":"45_CR3","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1016\/j.im.2016.02.003","volume":"53","author":"BC Choi","year":"2016","unstructured":"Choi, B.C., Land, L.: The effects of general privacy concerns and transactional privacy concerns on facebook apps usage. Inf. Manage. 53(7), 868\u2013877 (2016). https:\/\/doi.org\/10.1016\/j.im.2016.02.003","journal-title":"Inf. Manage."},{"key":"45_CR4","unstructured":"Clark, S., Goodspeed, T., Metzger, P., Wasserman, Z., Xu, K., Blaze, M.: Why (special agent) johnny (still) can\u2019t encrypt: a security analysis of the APCO project 25 two-way radio system. In: USENIX Security Symposium (2011)"},{"key":"45_CR5","unstructured":"David Lodge: Is Your Samsung TV Listening To You? Pen Test Partners. https:\/\/www.pentestpartners.com\/blog\/is-your-samsung-tv-listening-to-you\/. Accessed 23 Feb 2016"},{"issue":"1","key":"45_CR6","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1111\/j.1083-6101.2009.01494.x","volume":"15","author":"B Debatin","year":"2009","unstructured":"Debatin, B., Lovejoy, J.P., Horn, A.K., Hughes, B.N.: Facebook and online privacy: attitudes, behaviors, and unintended consequences. J. Comput.-Mediat. Commun. 15(1), 83\u2013108 (2009)","journal-title":"J. Comput.-Mediat. Commun."},{"issue":"3","key":"45_CR7","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1002\/ejsp.2049","volume":"45","author":"T Dienlin","year":"2015","unstructured":"Dienlin, T., Trepte, S.: Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors. Eur. J. Soc. Psychol. 45(3), 285\u2013297 (2015)","journal-title":"Eur. J. Soc. Psychol."},{"issue":"1","key":"45_CR8","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev, T., Hart, P.: An extended privacy calculus model for e-commerce transactions. Info. Syst. Res. 17(1), 61\u201380 (2006). http:\/\/dx.doi.org\/10.1287\/isre.1060.0080","journal-title":"Info. Syst. Res."},{"key":"45_CR9","unstructured":"DoctorBeet\u2019s Blog: LG Disables Smart TV features in the EU to force users to accept new oppressive Privacy policy. http:\/\/doctorbeet.blogspot.de\/. Accessed 23 Feb 2016"},{"key":"45_CR10","unstructured":"Dourish, P., Delgado De La Flor, J., Joseph, M.: Security as a practical problem: some preliminary observations of everyday mental models. In: Proceedings of CHI Workshop on HCI and Security Systems. Fort Lauderdale, Florida, 5\u201310 Apr 2003"},{"key":"45_CR11","unstructured":"Bursztein, E.: Survey: most people don\u2019t lock their Android phones - but should (2014). https:\/\/www.elie.net\/blog\/survey-most-people-dont-lock-their-android-phones-but-should"},{"key":"45_CR12","doi-asserted-by":"crossref","unstructured":"Friedman, B., Hurley, D., Howe, D.C., Felten, E., Nissenbaum, H.: Users\u2019 conceptions of web security: a comparative study. In: CHI 2002 Extended Abstracts on Human Factors in Computing Systems, pp. 746\u2013747. ACM (2002)","DOI":"10.1145\/506443.506577"},{"key":"45_CR13","doi-asserted-by":"crossref","unstructured":"Gaw, S., Felten, E.W., Fernandez-Kelly, P.: Secrecy, flagging, and paranoia: adoption criteria in encrypted email. In: SIGCHI Conference on Human Factors in Computing Systems, pp. 591\u2013600. CHI 2006 (2006)","DOI":"10.1145\/1124772.1124862"},{"issue":"3","key":"45_CR14","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MSP.2016.54","volume":"14","author":"M Ghiglieri","year":"2016","unstructured":"Ghiglieri, M., Waidner, M.: HbbTV security and privacy: issues and challenges. IEEE Sec. Priv. 14(3), 61\u201367 (2016)","journal-title":"IEEE Sec. Priv."},{"key":"45_CR15","unstructured":"Ghiglieri, M.: I know what you watched last sunday - a new survey of privacy in HbbTV. In: Workshop Web 2.0 Security and Privacy 2014 in Conjunction with the IEEE Symposium on Security and Privacy (2014)"},{"key":"45_CR16","unstructured":"Ghiglieri, M.: Incorrect HTTPS Certificate Validation in Samsung Smart TVs. Technical report (2014)"},{"key":"45_CR17","unstructured":"Ghiglieri, M., Oswald, F., Tews, E.: HbbTV - i know what you are watching. In: Informationssicherheit St\u00e4rken - Vertrauen in die Zukunft Schaffen, pp. 225\u2013238. Bundesamt fr Sicherheit in der Informationstechnik, May 2013"},{"key":"45_CR18","doi-asserted-by":"crossref","unstructured":"Ghiglieri, M., Tews, E.: A privacy protection system for HbbTV in smart TVs. In: IEEE 11th Consumer Communications and Networking Conference (CCNC), pp. 648\u2013653, Jan 2014","DOI":"10.1109\/CCNC.2014.6866595"},{"issue":"4","key":"45_CR19","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1504\/IJKL.2005.008352","volume":"1","author":"S Gupta","year":"2005","unstructured":"Gupta, S., Bostrom, R.P.: Theoretical model for investigating the impact of knowledge portals on different levels of knowledge processing. Int. J. Knowl. Learn. 1(4), 287\u2013304 (2005)","journal-title":"Int. J. Knowl. Learn."},{"key":"45_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-39077-7_13","volume-title":"Privacy Enhancing Technologies","author":"M Harbach","year":"2013","unstructured":"Harbach, M., Fahl, S., Rieger, M., Smith, M.: On the acceptance of privacy-preserving authentication technology: the curious case of national identity cards. In: Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 245\u2013264. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-39077-7_13"},{"key":"45_CR21","unstructured":"Harbach, M., von Zezschwitz, E., Fichtner, A., De Luca, A., Smith, M.: It\u2019s a hard lock life: a field study of smartphone (un) locking behavior and risk perception. In: Symposium on Usable Privacy and Security (SOUPS), pp. 213\u2013230 (2014)"},{"key":"45_CR22","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1016\/j.chb.2015.11.005","volume":"55","author":"G Kim","year":"2016","unstructured":"Kim, G., Koo, H.: The causal relationship between risk and trust in the online marketplace. Comput. Hum. Behav. 55, 1020\u20131029 (2016). doi:10.1016\/j.chb.2015.11.005","journal-title":"Comput. Hum. Behav."},{"key":"45_CR23","doi-asserted-by":"crossref","unstructured":"Krasnova, H., Veltri, N.F.: Privacy calculus on social networking sites: explorative evidence from Germany and USA. In: 2010 43rd Hawaii International Conference on System Sciences (HICSS), pp. 1\u201310. IEEE (2010)","DOI":"10.1109\/HICSS.2010.307"},{"issue":"2","key":"45_CR24","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/1989098.1989101","volume":"42","author":"NK Lankton","year":"2011","unstructured":"Lankton, N.K., McKnight, D.H.: What does it mean to trust facebook?: examining technology and interpersonal trust beliefs. SIGMIS Database 42(2), 32\u201354 (2011). http:\/\/doi.acm.org\/10.1145\/1989098.1989101","journal-title":"SIGMIS Database"},{"key":"45_CR25","unstructured":"Matyszczyk, C.: Samsung\u2019s warning: Our Smart TVs record your living room chatter (2015). http:\/\/www.cnet.com\/uk\/news\/samsungs-warning-our-smart-tvs-record-your-living-room-chatter\/"},{"key":"45_CR26","doi-asserted-by":"crossref","unstructured":"Mich\u00e9le, B., Karpow, A.: Watch and be watched: compromising all smart TV generations. In: IEEE 11th Consumer Communications and Networking Conference (CCNC), pp. 351\u2013356, Jan 2014","DOI":"10.1109\/CCNC.2014.6866594"},{"key":"45_CR27","doi-asserted-by":"crossref","unstructured":"Niemietz, M., Somorovsky, J., Mainka, C., Schwenk, J.: Not so Smart: On Smart TV Apps (undated). http:\/\/www.ei.ruhr-uni-bochum.de\/media\/nds\/veroeffentlichungen\/2015\/08\/31\/SmartTvAttacks.pdf","DOI":"10.1109\/SIOT.2015.13"},{"key":"45_CR28","doi-asserted-by":"crossref","unstructured":"Ophoff, J., Robinson, M.: Exploring end-user smartphone security awareness within a South African context. In: Information Security for South Africa (ISSA), 2014, pp. 1\u20137. IEEE (2014)","DOI":"10.1109\/ISSA.2014.6950500"},{"key":"45_CR29","unstructured":"Oren, Y., Keromytis, A.D.: From the ether to the ethernet-attacking the internet using broadcast digital television. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 353\u2013368 (2014)"},{"key":"45_CR30","doi-asserted-by":"crossref","unstructured":"Raja, F., Hawkey, K., Hsu, S., Wang, K.L., Beznosov, K.: Promoting a physical security mental model for personal firewall warnings. In: CHI 2011 Extended Abstracts on Human Factors in Computing Systems, CHI EA 2011, pp. 1585\u20131590. ACM, New York (2011)","DOI":"10.1145\/1979742.1979812"},{"key":"45_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-319-08506-7_13","volume-title":"Privacy Enhancing Technologies","author":"K Renaud","year":"2014","unstructured":"Renaud, K., Volkamer, M., Renkema-Padmos, A.: Why doesn\u2019t Jane protect her privacy? In: Cristofaro, E., Murdoch, S.J. (eds.) PETS 2014. LNCS, vol. 8555, pp. 244\u2013262. Springer, Cham (2014). doi:10.1007\/978-3-319-08506-7_13"},{"key":"45_CR32","unstructured":"Rob Waugh (Metro): Smart TV hackers are filming people having sex on their sofas and putting it on porn sites. http:\/\/metro.co.uk\/2016\/05\/23\/smart-tv-hackers-are-filming-people-having-sex-on-their-sofas-and-putting-it-on-porn-sites-5899248\/. Accessed 06 Nov 2016"},{"key":"45_CR33","unstructured":"Samsung: Samsung Privacy Policy-SmartTV Supplement. http:\/\/www.samsung.com\/sg\/info\/privacy\/smarttv\/. Accessed 06 Nov 2016"},{"key":"45_CR34","unstructured":"Seven One Media: Addressable TV - The Future is now. (02). Accessed 4 Feb 2016. Available from authors on request"},{"key":"45_CR35","first-page":"745","volume":"44","author":"DJ Solove","year":"2007","unstructured":"Solove, D.J.: \u201cI\u2019ve got nothing to hide\u201d and other misunderstandings of privacy. San Diego Law Rev. 44, 745 (2007)","journal-title":"San Diego Law Rev."},{"key":"45_CR36","unstructured":"Sony: Privacy Policy for the applications and\/or online services on Sony\u2019s cloud platform. http:\/\/policies.sony.net\/tvsideview\/pp_en.htm. Accessed 23 Feb 2016"},{"key":"45_CR37","unstructured":"Trepte, S., Dienlin, T., Reinecke, L.: Risky behaviors: how online experiences influence privacy behaviors. Von der Gutenberg-Galaxis zur Google-Galaxis (From the Gutenberg galaxy to the Google galaxy), pp. 225\u2013244 (2014)"},{"key":"45_CR38","doi-asserted-by":"crossref","unstructured":"Trepte, S., Reinecke, L.: Privacy Online: Perspectives on Privacy and Self-disclosure in the Social Web (2011)","DOI":"10.1007\/978-3-642-21521-6"},{"key":"45_CR39","series-title":"Law, Governance and Technology Series","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/978-94-017-9385-8_14","volume-title":"Reforming European Data Protection Law","author":"S Trepte","year":"2015","unstructured":"Trepte, S., Teutsch, D., Masur, P.K., Eicher, C., Fischer, M., Hennh\u00f6fer, A., Lind, F.: Do people know about privacy and data protection strategies? Towards the \u201cOnline Privacy Literacy Scale\u201d (OPLIS). In: Gutwirth, S., Leenes, R., Hert, P. (eds.) Reforming European Data Protection Law. LGTS, vol. 20, pp. 333\u2013365. Springer, Dordrecht (2015). doi:10.1007\/978-94-017-9385-8_14"},{"key":"45_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-319-24858-5_17","volume-title":"Security and Trust Management","author":"M Volkamer","year":"2015","unstructured":"Volkamer, M., Renaud, K., Kulyk, O., Emer\u00f6z, S.: A socio-technical investigation into smartphone security. In: Foresti, S. (ed.) STM 2015. LNCS, vol. 9331, pp. 265\u2013273. Springer, Cham (2015). doi:10.1007\/978-3-319-24858-5_17"},{"key":"45_CR41","doi-asserted-by":"crossref","unstructured":"Wash, R.: Folk models of home computer security. In: Proceedings of the Sixth Symposium on Usable Privacy and Security, pp. 11. ACM, Redmond (2010)","DOI":"10.1145\/1837110.1837125"},{"key":"45_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-27585-2_1","volume-title":"Open Problems in Network Security","author":"E W\u00e4stlund","year":"2012","unstructured":"W\u00e4stlund, E., Angulo, J., Fischer-H\u00fcbner, S.: Evoking comprehensive mental models of anonymous credentials. In: Camenisch, J., Kesdogan, D. (eds.) iNetSec 2011. LNCS, vol. 7039, pp. 1\u201314. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-27585-2_1"},{"key":"45_CR43","doi-asserted-by":"crossref","unstructured":"Weirich, D., Sasse, M.A.: Pretty good persuasion: a first step towards effective password security in the real world. In: Proceedings of 2001 Workshop on New Security Paradigms, NSPW 2001, pp. 137\u2013143. Cloudcroft, NM (2001)","DOI":"10.1145\/508171.508195"},{"key":"45_CR44","unstructured":"Zolfagharifard, E.: Is YOUR TV spying on you? Report reveals how Vizio smart televisions track your data so that it can be sold to advertisers (2015). http:\/\/www.dailymail.co.uk\/sciencetech\/article-3312597\/Is-TV-spying-Report-reveals-Vizio-smart-televisions-track-data-sold-advertisers.html"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58460-7_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T02:04:21Z","timestamp":1625105061000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58460-7_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584591","9783319584607"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58460-7_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Aspects of Information Security, Privacy, and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"has2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}