{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:26:43Z","timestamp":1743085603013,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584591"},{"type":"electronic","value":"9783319584607"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58460-7_46","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T11:08:42Z","timestamp":1494587322000},"page":"675-690","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Sharing Information with Web Services \u2013 A Mental Model Approach in the Context of Optional Information"],"prefix":"10.1007","author":[{"given":"Oksana","family":"Kulyk","sequence":"first","affiliation":[]},{"given":"Benjamin Maximilian","family":"Reinheimer","sequence":"additional","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"key":"46_CR1","doi-asserted-by":"crossref","unstructured":"Ackerman, M.S., Cranor, L.F., Reagle, J.: Privacy in e-commerce: examining user scenarios and privacy preferences. In: 1st ACM Conference on Electronic Commerce, pp. 1\u20138. ACM (1999)","DOI":"10.1145\/336992.336995"},{"key":"46_CR2","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-1-4471-0353-0_4","volume-title":"People and Computers XV - Interaction Without Frontiers","author":"A Adams","year":"2001","unstructured":"Adams, A., Sasse, M.A.: Privacy in multimedia communications: protecting users, not just data. In: Blandford, A., Vanderdonckt, J., Gray, P. (eds.) People and Computers XV - Interaction Without Frontiers, pp. 49\u201364. Springer, London (2001)"},{"key":"46_CR3","doi-asserted-by":"crossref","unstructured":"Alkaldi, N., Renaud, K.: Why do people adopt, or reject, smartphone password managers? In: EuroUSEC 2016: European Workshop on Usable Security, vol. 18, pp. 1\u201314 (2016)","DOI":"10.14722\/eurousec.2016.23011"},{"key":"46_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-27576-0_1","volume-title":"Financial Cryptography and Data Security","author":"R B\u00f6hme","year":"2012","unstructured":"B\u00f6hme, R., P\u00f6tzsch, S.: Collective exposure: peer effects in voluntary disclosure of personal data. In: Danezis, G. (ed.) FC 2011. LNCS, vol. 7035, pp. 1\u201315. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-27576-0_1"},{"issue":"1","key":"46_CR5","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/2738210.2738215","volume":"45","author":"S Egelman","year":"2015","unstructured":"Egelman, S., Peer, E.: Predicting privacy and security attitudes. ACM SIGCAS Comput. Soc. 45(1), 22\u201328 (2015)","journal-title":"ACM SIGCAS Comput. Soc."},{"key":"46_CR6","unstructured":"Knijnenburg, B.P., Kobsa, A., Jin, H.: Counteracting the negative effect of form auto-completion on the privacy calculus. In: ICIS 2013: International Conference on Information Systems. AIS eLibrary (2013)"},{"key":"46_CR7","unstructured":"Korff, S., B\u00f6hme, R.: Too much choice: end-user privacy decisions in the context of choice proliferation. In: SOUpPS 2014: Symposium on Usable Privacy and Security, pp. 69\u201387. USENIX (2014)"},{"key":"46_CR8","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-642-21521-6_10","volume-title":"Privacy Online","author":"NC Kr\u00e4mer","year":"2011","unstructured":"Kr\u00e4mer, N.C., Haferkamp, N.: Online self-presentation: balancing privacy concerns and impression construction on social networking sites. In: Trepte, S., Reinecke, L. (eds.) Privacy Online, pp. 127\u2013141. Springer, Heidelberg (2011)"},{"key":"46_CR9","doi-asserted-by":"crossref","unstructured":"Krol, K., Preibusch, S.: Control versus effort in privacy warnings for webforms. In: WPES 2016: ACM on Workshop on Privacy in the Electronic Society, pp. 13\u201323. ACM (2016)","DOI":"10.1145\/2994620.2994640"},{"key":"46_CR10","doi-asserted-by":"crossref","unstructured":"Kulyk, O., Gerber, P., El Hanafi, M., Reinheimer, B., Renaud, K., Volkamer, M.: Encouraging privacy-aware smartphone app. installation: what would the technically-adept do. In: USEC 2016: Usable Security Workshop. Internet Society (2016)","DOI":"10.14722\/usec.2016.23016"},{"key":"46_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-642-38908-5_19","volume-title":"Trust and Trustworthy Computing","author":"M Malheiros","year":"2013","unstructured":"Malheiros, M., Preibusch, S., Sasse, M.A.: \u201cFairly truthful\u201d: the impact of perceived effort, fairness, relevance, and sensitivity on personal data disclosure. In: Huth, M., Asokan, N., \u010capkun, S., Flechais, I., Coles-Kemp, L. (eds.) Trust 2013. LNCS, vol. 7904, pp. 250\u2013266. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-38908-5_19"},{"key":"46_CR12","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-642-39498-0_9","volume-title":"The Economics of Information Security and Privacy","author":"S Preibusch","year":"2013","unstructured":"Preibusch, S., Krol, K., Beresford, A.R.: The privacy economics of voluntary over-disclosure in web forms. In: B\u00f6hme, R. (ed.) The Economics of Information Security and Privacy, pp. 183\u2013209. Springer, Heidelberg (2013)"},{"key":"46_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-319-08506-7_13","volume-title":"Privacy Enhancing Technologies","author":"K Renaud","year":"2014","unstructured":"Renaud, K., Volkamer, M., Renkema-Padmos, A.: Why doesn\u2019t jane protect her privacy? In: Cristofaro, E., Murdoch, S.J. (eds.) PETS 2014. LNCS, vol. 8555, pp. 244\u2013262. Springer, Cham (2014). doi:10.1007\/978-3-319-08506-7_13"},{"key":"46_CR14","unstructured":"The European Parliament and of the Council of European Union: Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (2016), http:\/\/eur-lex.europa.eu\/legal-content\/EN\/ALL\/?uri=CELEX:32016R0679, last accessed on 10.02.2017"},{"key":"46_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/978-3-642-42001-6_18","volume-title":"Number Theory and Cryptography","author":"M Volkamer","year":"2013","unstructured":"Volkamer, M., Renaud, K.: Mental models \u2013 general introduction and review of their application to human-centred security. In: Fischlin, M., Katzenbeisser, S. (eds.) Number Theory and Cryptography. LNCS, vol. 8260, pp. 255\u2013280. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-42001-6_18"},{"key":"46_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-319-24858-5_17","volume-title":"Security and Trust Management","author":"M Volkamer","year":"2015","unstructured":"Volkamer, M., Renaud, K., Kulyk, O., Emer\u00f6z, S.: A socio-technical investigation into smartphone security. In: Foresti, S. (ed.) STM 2015. LNCS, vol. 9331, pp. 265\u2013273. Springer, Cham (2015). doi:10.1007\/978-3-319-24858-5_17"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58460-7_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T02:04:26Z","timestamp":1625105066000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58460-7_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584591","9783319584607"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58460-7_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Aspects of Information Security, Privacy, and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"has2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}