{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:32:48Z","timestamp":1755999168221,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319952758"},{"type":"electronic","value":"9783319952765"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-95276-5_10","type":"book-chapter","created":{"date-parts":[[2018,6,29]],"date-time":"2018-06-29T13:30:22Z","timestamp":1530279022000},"page":"137-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Public Privacy and Brick Houses Made of Glass"],"prefix":"10.1007","author":[{"given":"Stephen","family":"Marsh","sequence":"first","affiliation":[]},{"given":"Ada","family":"Diaconescu","sequence":"additional","affiliation":[]},{"given":"David","family":"Evans","sequence":"additional","affiliation":[]},{"given":"Tracy Ann","family":"Kosa","sequence":"additional","affiliation":[]},{"given":"Peter R.","family":"Lewis","sequence":"additional","affiliation":[]},{"given":"Sheikh","family":"Mahbub Habib","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,30]]},"reference":[{"key":"10_CR1","unstructured":"Altman, I.: Environment and Social Behaviour. Brooks\/Cole Publishing, Pacific Grove (1976)"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Behrooz, S.: Trust-based framework for information sharing in health care. Master\u2019s thesis, University of Ontario Institute of Technology (2016)","DOI":"10.1007\/978-3-319-41354-9_6"},{"key":"10_CR3","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-319-41354-9_6","volume-title":"Trust Management X","author":"S Behrooz","year":"2016","unstructured":"Behrooz, S., Marsh, S.: A trust-based framework for information sharing between mobile health care applications. In: Habib, S., Vassileva, J., Mauw, S., M\u00fchlh\u00e4user, M. (eds.) IFIPTM 2016. IAICT, vol. 473, pp. 79\u201395. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-41354-9_6"},{"issue":"3","key":"10_CR4","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MTS.2017.2728727","volume":"36","author":"K Bellman","year":"2017","unstructured":"Bellman, K., Botev, J., Hildmann, H., Lewis, P.R., Marsh, S., Pitt, J., Scholtes, I., Tomforde, S.: Socially-sensitive systems design: exploring social potential. IEEE Technol. Soc. Mag. 36(3), 72\u201380 (2017)","journal-title":"IEEE Technol. Soc. Mag."},{"key":"10_CR5","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-41354-9_1","volume-title":"Trust Management X","author":"S Fischer-H\u00fcbner","year":"2016","unstructured":"Fischer-H\u00fcbner, S., Angulo, J., Karegar, F., Pulls, T.: Transparency, privacy and trust \u2013 technology for tracking and controlling my data disclosures: does this work? In: Habib, S., Vassileva, J., Mauw, S., M\u00fchlh\u00e4user, M. (eds.) IFIPTM 2016. IAICT, vol. 473, pp. 3\u201314. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-41354-9_1"},{"key":"10_CR6","unstructured":"Kosa, T.A.: Towards measuring privacy. Ph.D. thesis, University of Ontario Institute of Technology (2015)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Lampinen, A., Lehtinen, V., Lehmuskallio, A., Tamminen, S.: We\u2019re in it together: interpersonal management of disclosure in social network services. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2011, pp. 3217\u20133226. ACM, New York (2011)","DOI":"10.1145\/1978942.1979420"},{"key":"10_CR8","doi-asserted-by":"publisher","unstructured":"Lewis, P.R., Platzner, M., Rinner, B., Torresen, J., Yao, X. (eds.) Self-Aware Computing Systems: An Engineering Approach. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-319-39675-0","DOI":"10.1007\/978-3-319-39675-0"},{"key":"10_CR9","unstructured":"Marsh, S.: Formalising trust as a computational concept. Ph.D. thesis, Department of Computing Science, University of Stirling (1994). http:\/\/www.stephenmarsh.ca\/Files\/pubs\/Trust-thesis.pdf"},{"key":"10_CR10","doi-asserted-by":"publisher","unstructured":"Marsh, S., Basu, A., Dwyer, N.: Rendering unto C\u00e6sar the things that are C\u00e6sar\u2019s: complex trust and human understanding. In: Dimitrakos, T., Moona, R., Patel, D., McKnight, D.H. (eds.) Proceedings IFIPTM 2012: Trust Management VI, Surat India. AICT, vol. 374, pp. 191\u2013200. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29852-3_13","DOI":"10.1007\/978-3-642-29852-3_13"},{"key":"10_CR11","first-page":"231","volume":"19","author":"S Marsh","year":"2011","unstructured":"Marsh, S., Briggs, P., El-Khatib, K., Esfandiari, B., Stewart, J.A.: Defining and investigating device comfort. J. Inf. Process. 19, 231\u2013252 (2011)","journal-title":"J. Inf. Process."},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Nissenbaum, H.: Privacy in Context. Stanford Law Books, Redwood City (2009)","DOI":"10.1515\/9780804772891"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Palen, L., Dourish, P.: Unpacking \u201cprivacy\u201d for a networked world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2003, pp. 129\u2013136. ACM, New York (2003)","DOI":"10.1145\/642611.642635"},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"309","DOI":"10.4135\/9781483329529.n23","volume-title":"Engaging Theories in Interpersonal Communication: Multiple Perspectives","author":"S Petronio","year":"2008","unstructured":"Petronio, S., Durham, W.T.: Communication privacy management theory. In: Baxter, L.A., Braithwaite, D.O. (eds.) Engaging Theories in Interpersonal Communication: Multiple Perspectives, pp. 309\u2013322. Sage, Thousand Oaks (2008)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Salimian, M.H., Reilly, D., Brooks, S., MacKay, B.: Physical-digital privacy interfaces for mixed reality collaboration: an exploratory study. In: Proceedings of the 2016 ACM International Conference on Interactive Surfaces and Spaces, ISS 2016, pp. 261\u2013270. ACM, New York (2016)","DOI":"10.1145\/2992154.2992167"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Wisniewski, P.J., Knijnenburg, B.P., Lipford, H.R.: Making privacy personal. Int. J. Hum.-Comput. Stud. 98(C), 95\u2013108 (2017)","DOI":"10.1016\/j.ijhcs.2016.09.006"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management XII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95276-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T00:03:34Z","timestamp":1656720214000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-95276-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319952758","9783319952765"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95276-5_10","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"30 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IFIPTM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Trust Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ifiptm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.uoit.ca\/ifiptm2018\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}