{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:19:24Z","timestamp":1776107964540,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540206101","type":"print"},{"value":"9783540409564","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-40956-4_8","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T19:02:02Z","timestamp":1277233322000},"page":"107-124","source":"Crossref","is-referenced-by-count":59,"title":["From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions"],"prefix":"10.1007","author":[{"given":"Andrew S.","family":"Patrick","sequence":"first","affiliation":[]},{"given":"Steve","family":"Kenny","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Comstock, E.M., Clemens, E.A.: Perceptions of computer manuals: A view from the field. In: Proceedings of the Human Factors Society 31st Annual Meeting, pp. 139\u2013143 (1987)","DOI":"10.1177\/154193128703100131"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Cranor, L.F., Arjula, M., Guduru, P.: Use of a P3P User Agent by Early Adopters. In: Proceedings of Workshop on Privacy in the Electronic Society, Washington, D.C., November 21 (2002)","DOI":"10.1145\/644527.644528"},{"key":"8_CR3","unstructured":"Directive 95\/46\/EC of the European Parliament and of the Council of October 24, 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of such Data. Official Journal of the European Communities, p. 31 (1995)"},{"key":"8_CR4","first-page":"0001","volume":"024","author":"Directive 97\/66\/EC of the European Parliament and of the Council of December 15","year":"1997","unstructured":"Directive 97\/66\/EC of the European Parliament and of the Council of December 15, 1997, concerning the processing of personal data and the protection of privacy in the telecommunications sector. Official Journal L 024, 30\/01\/1998 p. 0001 \u2013 0008 (1997)","journal-title":"Official Journal L"},{"key":"8_CR5","unstructured":"Halket, T.D., Cosgrove, D.B.: Is your online agreement in jeopardy?, http:\/\/www.cio.com\/legal\/edit\/010402_agree.html"},{"key":"8_CR6","unstructured":"Kenny, S., Borking, J.: The value of privacy engineering. Journal of Information, Law and Technology, JILT (2002), http:\/\/elj.warwick.ac.uk\/jilt\/02-1\/kenny.html"},{"key":"8_CR7","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/3-540-44566-8_52","volume-title":"User Modeling 2001","author":"A. Kobsa","year":"2001","unstructured":"Kobsa, A.: Tailoring privacy to users\u2019 needs (Invited Keynote). In: Bauer, M., Gmytrasiewicz, P.J., Vassileva, J. (eds.) UM 2001. LNCS (LNAI), vol.\u00a02109, pp. 303\u2013313. Springer, Heidelberg (2001), http:\/\/www.ics.uci.edu\/~kobsa\/papers\/2001-UM01-kobsa.pdf"},{"issue":"5","key":"8_CR8","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1145\/506218.506249","volume":"45","author":"A. Kobsa","year":"2002","unstructured":"Kobsa, A.: Personalized hypermedia and international privacy. Communications of the ACM\u00a045(5), 64\u201367 (2002), http:\/\/www.ics.uci.edu\/~kobsa\/papers\/2002-CACM-kobsa.pdf","journal-title":"Communications of the ACM"},{"key":"8_CR9","unstructured":"Kunz, C.L.: Click-Through Agreements: Strategies for Avoiding Disputes on Validity of Assent (2002), http:\/\/www.efscouncil.org\/frames\/Forum%20Members\/Kunz_Clickthr_%20Agrmt_%20Strategies.ppt . See also Kunz, C.L., Debrow, J., Del Duca, M., Thayer, H.: Click-Through Agreements: Strategies for Avoiding Disputes on Validity of Assent. Business Lawyer 57, 401 (2001)"},{"key":"8_CR10","volume-title":"Usability engineering","author":"J. Nielsen","year":"1993","unstructured":"Nielsen, J.: Usability engineering. Morgan Kaufmann, San Diego (1993)"},{"key":"8_CR11","volume-title":"The psychology of everyday things","author":"D.A. Norman","year":"1988","unstructured":"Norman, D.A.: The psychology of everyday things. Basic Books, New York (1988)"},{"key":"8_CR12","volume-title":"Humancomputer interaction","author":"J. Preece","year":"1994","unstructured":"Preece, J., Rogers, Y., Sharp, H., Benyon, D., Holland, S., Carey, T.: Humancomputer interaction. Addison-Wesley, Reading (1994)"},{"key":"8_CR13","volume-title":"The unified modeling language reference manual","author":"J. Rumbaugh","year":"1998","unstructured":"Rumbaugh, J., Jacobson, I., Booch, G.: The unified modeling language reference manual. Addison-Wesley, Reading (1998)"},{"key":"8_CR14","unstructured":"Saunders, C.: Trust central to E-commerce, online marketing. Internet Advertising Report (2001), http:\/\/www.internetnews.com\/IAR\/article.php\/12_926191"},{"key":"8_CR15","volume-title":"Designing the user interface: Strategies for effective humancomputer interaction","author":"B. Shneiderman","year":"1987","unstructured":"Shneiderman, B.: Designing the user interface: Strategies for effective humancomputer interaction. Addison-Wesley, Reading (1987)"},{"key":"8_CR16","unstructured":"Slade, K.H.: Dealing with customers: Protecting their privacy and enforcing your contracts (1999), http:\/\/www.haledorr.com\/db30\/cgi-bin\/pubs\/1999_06_CLE_Program.pdf"},{"key":"8_CR17","unstructured":"Thornburgh, D.: Click-through contracts: How to make them stick. In: Internet Management Strategies (2001), http:\/\/www.loeb.com\/FSL5CS\/articles\/articles45.asp"},{"key":"8_CR18","volume-title":"Engineering psychology and human performance","author":"C.D. Wickens","year":"2000","unstructured":"Wickens, C.D., Hollands, J.G.: Engineering psychology and human performance, 3rd edn. Prentice Hall, Upper Saddle River (2000)","edition":"3"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-40956-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T09:37:01Z","timestamp":1559209021000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-40956-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540206101","9783540409564"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-40956-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003]]}}}