{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T22:34:27Z","timestamp":1764714867312,"version":"3.37.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319781044"},{"type":"electronic","value":"9783319781051"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78105-1_27","type":"book-chapter","created":{"date-parts":[[2018,3,14]],"date-time":"2018-03-14T06:03:15Z","timestamp":1521007395000},"page":"229-239","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Privacy Attitudes and Data Valuation Among Fitness Tracker Users"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9362-9032","authenticated-orcid":false,"given":"Jessica","family":"Vitak","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5008-2097","authenticated-orcid":false,"given":"Yuting","family":"Liao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9244-7915","authenticated-orcid":false,"given":"Priya","family":"Kumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4229-4847","authenticated-orcid":false,"given":"Michael","family":"Zimmer","sequence":"additional","affiliation":[]},{"given":"Katherine","family":"Kritikos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,15]]},"reference":[{"key":"27_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/11957454_3","volume-title":"Privacy Enhancing Technologies","author":"A Acquisti","year":"2006","unstructured":"Acquisti, A., Gross, R.: Imagined communities: awareness, information sharing, and privacy on the Facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 36\u201358. Springer, Heidelberg (2006). \nhttps:\/\/doi.org\/10.1007\/11957454_3"},{"issue":"2","key":"27_CR2","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1177\/1357034X15624973","volume":"22","author":"K Ball","year":"2016","unstructured":"Ball, K., Di Domenico, M.L., Nunan, D.: Big data surveillance and the body-subject. Body Soc. 22(2), 58\u201381 (2016). \nhttps:\/\/doi.org\/10.1177\/1357034X15624973","journal-title":"Body Soc."},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Barnes, S.D.: A privacy paradox: social networking in the United States. First Monday 11(9) (2006)","DOI":"10.5210\/fm.v11i9.1394"},{"issue":"5","key":"27_CR4","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1080\/1369118X.2012.678878","volume":"15","author":"D Boyd","year":"2012","unstructured":"Boyd, D., Crawford, K.: Critical questions for big data: provocations for a cultural, technological, and scholarly phenomenon. Inf. Commun. Soc. 15(5), 662\u2013679 (2012). \nhttps:\/\/doi.org\/10.1080\/1369118X.2012.678878","journal-title":"Inf. Commun. Soc."},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Boyd, D., Hargittai, E.: Facebook privacy settings: who cares? First Monday 15(8) (2010)","DOI":"10.5210\/fm.v15i8.3086"},{"key":"27_CR6","first-page":"91","volume":"38","author":"M Christovich","year":"2016","unstructured":"Christovich, M.: Why should we care what Fitbit shares: a proposed statutory solution to protect sensitive personal fitness information. Hastings Commun.\/Entertain. Law J. 38, 91\u2013116 (2016)","journal-title":"Hastings Commun.\/Entertain. Law J."},{"key":"27_CR7","doi-asserted-by":"publisher","unstructured":"Clawson, J., et al.: No longer wearing: investigating the abandonment of personal health-tracking technologies on Craigslist. In: Proceedings of UbiComp 2015, pp. 647\u2013658. ACM, New York (2015). \nhttps:\/\/doi.org\/10.1145\/2750858.2807554","DOI":"10.1145\/2750858.2807554"},{"issue":"4\u20135","key":"27_CR8","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1177\/1367549415584857","volume":"18","author":"K Crawford","year":"2015","unstructured":"Crawford, K., Lingel, J., Karppi, T.: Our metrics, ourselves: a hundred years of self-tracking from the weight scale to the wrist wearable device. Euro. J. Cult. Stud. 18(4\u20135), 479\u2013496 (2015). \nhttps:\/\/doi.org\/10.1177\/1367549415584857","journal-title":"Euro. J. Cult. Stud."},{"key":"27_CR9","unstructured":"De Mooy, M., Yuen, S.: Toward privacy aware research and development in wearable health. Center for Democracy and Technology, Washington (2016)"},{"issue":"2","key":"27_CR10","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1109\/TEM.2005.844927","volume":"52","author":"JB Earp","year":"2005","unstructured":"Earp, J.B., Anton, A.I., Aiman-Smith, L., Stufflebeam, W.H.: Examining internet privacy policies within the context of user privacy values. IEEE Trans. Eng. Manag. 52(2), 227\u2013237 (2005). \nhttps:\/\/doi.org\/10.1109\/TEM.2005.844927","journal-title":"IEEE Trans. Eng. Manag."},{"key":"27_CR11","first-page":"1","volume":"119","author":"European Union","year":"2016","unstructured":"European Union: Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data. Off. J. Eur. Union 119, 1\u201388 (2016)","journal-title":"Off. J. Eur. Union"},{"key":"27_CR12","unstructured":"Fitbit: Fitbit Privacy Policy (2016). \nhttp:\/\/www.fitbit.com\/legal\/privacy-policy"},{"key":"27_CR13","volume-title":"Tracking for Health","author":"S Fox","year":"2013","unstructured":"Fox, S., Duggan, M.: Tracking for Health. Pew Research Center, Washington (2013)"},{"key":"27_CR14","doi-asserted-by":"publisher","unstructured":"Fritz, T., Huang, E.M., Murphy, G.C., Zimmermann, T.: Persuasive technology in the real world: a study of long-term use of activity sensing devices for fitness. In: Proceedings of CHI 2014, pp. 487\u2013496. ACM, New York (2014). \nhttps:\/\/doi.org\/10.1145\/2556288.2557383","DOI":"10.1145\/2556288.2557383"},{"key":"27_CR15","doi-asserted-by":"publisher","unstructured":"Gorm, N., Shklovski, I.: Sharing steps in the workplace: changing privacy concerns over time. In: Proceedings of CHI 2016, pp. 4315\u20134319. ACM, New York (2016). \nhttps:\/\/doi.org\/10.1145\/2858036.2858352","DOI":"10.1145\/2858036.2858352"},{"key":"27_CR16","doi-asserted-by":"publisher","unstructured":"Gorm, N., Shklovski, I.: Steps, choices and moral accounting: observations from a step-counting campaign in the workplace. In: Proceedings of CSCW 2016, pp. 148\u2013159. ACM, New York (2016). \nhttps:\/\/doi.org\/10.1145\/2818048.2819944","DOI":"10.1145\/2818048.2819944"},{"issue":"1","key":"27_CR17","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1177\/0894439310397146","volume":"30","author":"E Hargittai","year":"2012","unstructured":"Hargittai, E., Hsieh, Y.P.: Succinct survey measures of web-use skills. Soc. Sci. Comput. Rev. 30(1), 95\u2013107 (2012). \nhttps:\/\/doi.org\/10.1177\/0894439310397146","journal-title":"Soc. Sci. Comput. Rev."},{"key":"27_CR18","first-page":"3737","volume":"10","author":"E Hargittai","year":"2016","unstructured":"Hargittai, E., Marwick, A.: \u201cWhat can I really do?\u201d Explaining the privacy paradox with online apathy. Int. J. Commun. 10, 3737\u20133757 (2016)","journal-title":"Int. J. Commun."},{"key":"27_CR19","unstructured":"Ho, J.-J., Novick, S., Yeung, C.: A snapshot of data sharing by select health and fitness apps. Federal Trade Commission, Washington (2014)"},{"key":"27_CR20","unstructured":"Jawbone: Jawbone UP Privacy Policy (2014). \nhttps:\/\/jawbone.com\/up\/privacy"},{"key":"27_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-642-01516-8_13","volume-title":"Pervasive Computing","author":"P Klasnja","year":"2009","unstructured":"Klasnja, P., Consolvo, S., Choudhury, T., Beckwith, R., Hightower, J.: Exploring privacy concerns about personal sensing. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 176\u2013183. Springer, Heidelberg (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-642-01516-8_13"},{"key":"27_CR22","unstructured":"Kumar, P.: Privacy policies and their lack of clear disclosure regarding the life cycle of user information. In: FS-16\u201304, pp. 249\u2013256. AAAI, Palo Alto (2016)"},{"key":"27_CR23","volume-title":"The Quantified Self: A Sociology of Self-Tracking","author":"D Lupton","year":"2016","unstructured":"Lupton, D.: The Quantified Self: A Sociology of Self-Tracking. Polity, Cambridge (2016)"},{"key":"27_CR24","first-page":"543","volume":"4","author":"AM McDonald","year":"2008","unstructured":"McDonald, A.M., Cranor, L.F.: The cost of reading privacy policies. ISJLP 4, 543\u2013568 (2008)","journal-title":"ISJLP"},{"key":"27_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-662-48051-9_17","volume-title":"Financial Cryptography and Data Security","author":"VG Motti","year":"2015","unstructured":"Motti, V.G., Caine, K.: Users\u2019 privacy concerns about wearables: impact of form factor, sensors and type of data collected. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) FC 2015. LNCS, vol. 8976, pp. 231\u2013244. Springer, Heidelberg (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-662-48051-9_17"},{"key":"27_CR26","doi-asserted-by":"publisher","unstructured":"Patterson, H.: Contextual expectations of privacy in self-generated health information flows. In: TPRC 41, pp. 1\u201348. SSRN, Rochester (2013). \nhttps:\/\/doi.org\/10.2139\/ssrn.2242144","DOI":"10.2139\/ssrn.2242144"},{"key":"27_CR27","first-page":"85","volume":"93","author":"SR Peppet","year":"2014","unstructured":"Peppet, S.R.: Regulating the internet of things: first steps toward managing discrimination, privacy, security and consent. Tex. Law Rev. 93, 85\u2013178 (2014)","journal-title":"Tex. Law Rev."},{"key":"27_CR28","doi-asserted-by":"publisher","unstructured":"Raij, A., Ghosh, A., Kumar, S., Srivastava, M.: Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment. In: Proceedings of CHI 2011, pp. 11\u201320. ACM, New York (2011). \nhttps:\/\/doi.org\/10.1145\/1978942.1978945","DOI":"10.1145\/1978942.1978945"},{"key":"27_CR29","doi-asserted-by":"publisher","unstructured":"Rooksby, J., Rost, M., Morrison, A., Chalmers, M.: Personal tracking as lived informatics. In: Proceedings of CHI 2014, pp. 1163\u20131172. ACM, New York (2014). \nhttps:\/\/doi.org\/10.1145\/2556288.2557039","DOI":"10.1145\/2556288.2557039"},{"key":"27_CR30","unstructured":"Shirer, M., Llamas, R., Ubrani, J.: IDC Forecasts Wearables Shipments to Reach 213.6 Million Units Worldwide in 2020. IDC (2016)"},{"key":"27_CR31","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1111\/jcc4.12052","volume":"19","author":"M Taddicken","year":"2014","unstructured":"Taddicken, M.: The \u201cprivacy paradox\u201d in the social web. J. Comput.-Mediat. Commun. 19, 248\u2013273 (2014). \nhttps:\/\/doi.org\/10.1111\/jcc4.12052","journal-title":"J. Comput.-Mediat. Commun."},{"key":"27_CR32","first-page":"274","volume-title":"Routledge Handbook of Media Use and Well-Being","author":"J Vitak","year":"2016","unstructured":"Vitak, J.: A digital path to happiness? In: Reinecke, L., Oliver, M.B. (eds.) Routledge Handbook of Media Use and Well-Being, pp. 274\u2013287. Routledge, New York (2016)"},{"key":"27_CR33","unstructured":"Xu, H., Gupta, S., Rosson, M.B., Carroll, J.M.: Measuring mobile users\u2019 concerns for information privacy. In: Proceedings of ICIS 2012, pp. 1\u201316. AIS, Atlanta (2012)"}],"container-title":["Lecture Notes in Computer Science","Transforming Digital Worlds"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78105-1_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,14]],"date-time":"2018-03-14T06:17:40Z","timestamp":1521008260000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78105-1_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319781044","9783319781051"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78105-1_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}