{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:50:11Z","timestamp":1725501011631},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744085"},{"type":"electronic","value":"9783540744092"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74409-2_9","type":"book-chapter","created":{"date-parts":[[2007,8,17]],"date-time":"2007-08-17T15:57:55Z","timestamp":1187366275000},"page":"65-74","source":"Crossref","is-referenced-by-count":9,"title":["Privacy Assurance: Bridging the Gap Between Preference and Practice"],"prefix":"10.1007","author":[{"given":"Tariq Ehsan","family":"Elahi","sequence":"first","affiliation":[]},{"given":"Siani","family":"Pearson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"AOL Search Data Scandal, \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/AOL_search_data_scandal"},{"key":"9_CR2","unstructured":"Office of the Secretary, Standards for Privacy of Individually Identifiable Health Information, Federal Register, vol. 67\u2013157 (August 2002), \n                    \n                      http:\/\/www.hhs.gov\/ocr\/hipaa\/privrulepd.pdf"},{"key":"9_CR3","unstructured":"Data Protection Act (1998) - UK, \n                    \n                      http:\/\/www.opsi.gov.uk\/ACTS\/acts1998\/19980029.htm"},{"key":"9_CR4","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/3-540-44566-8_52","volume-title":"User Modeling 2001","author":"A. Kobsa","year":"2001","unstructured":"Kobsa, A.: Tailoring Privacy to Users\u2019 Needs. In: Bauer, M., Gmytrasiewicz, P.J., Vassileva, J. (eds.) UM 2001. LNCS (LNAI), vol.\u00a02109, pp. 303\u2013313. Springer, Heidelberg (2001)"},{"key":"9_CR5","unstructured":"Trust-e Privacy Seal Program, \n                    \n                      http:\/\/www.truste.org\/"},{"key":"9_CR6","unstructured":"BBBOnLine Privacy Seal Program, \n                    \n                      http:\/\/www.bbbonline.org\/privacy\/"},{"key":"9_CR7","unstructured":"Cranor, L.F., Hogben, G., Langheinrich, M., Marchiori, M., Presler-Marshal, M., Reagle, J., Schunter, M.: The Platform for Privacy Preferences 1.1 (P3P1.1) Specification, W3C Working Draft 10 (February 2006)"},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/S0963-8687(02)00018-5","volume":"11","author":"F. Berlanger","year":"2002","unstructured":"Berlanger, F., Hiller, J.S., Smith, W.J.: Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. Journal of Strategic Information Systems\u00a011, 245\u2013270 (2002)","journal-title":"Journal of Strategic Information Systems"},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/355112.355124","volume":"43-12","author":"B. Shneiderman","year":"2000","unstructured":"Shneiderman, B.: Designing Trust Into Online Experiences. Communications of the ACM\u00a043-12, 57\u201359 (2000)","journal-title":"Communications of the ACM"},{"key":"9_CR10","unstructured":"Leenes, R., Fischer-Hubner, S. (ed.): Prime Framework version 2, \n                    \n                      https:\/\/www.prime-project.eu\/prime_products\/reports\/fmwk\/pub_del_D14.1.b_ec_wp14.1_V1_final.pdf"},{"key":"9_CR11","unstructured":"Cranor, L.F.: Web Privacy with P3P, O\u2019Reilly and Associates (2002)"},{"key":"9_CR12","unstructured":"Clarke, R.: Platform for Privacy Preferences: A Critique, \n                    \n                      http:\/\/www.anu.edu.au\/people\/Roger.Clarke\/DV\/P3PCrit.html"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Ackerman, M.S.: Privacy in pervasive environments: next generation labelling protocols. In: Personal Ubiquitous Computing 2004, pp. 430\u2013439, Springer, Heidelberg (2004)","DOI":"10.1007\/s00779-004-0305-8"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/11755593_19","volume-title":"Trust Management","author":"S. Pearson","year":"2006","unstructured":"Pearson, S.: Towards Automated Evaluation of Trust Constraints. In: St\u00f8len, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol.\u00a03986, pp. 252\u2013266. Springer, Heidelberg (2006)"},{"key":"9_CR15","unstructured":"PRIME principles, \n                    \n                      https:\/\/www.prime-project.eu\/about\/principles\/"},{"key":"9_CR16","unstructured":"VeriSign Identity Protection, \n                    \n                      http:\/\/www.verisign.com\/products-services\/security-services\/identity-protection\/index.html"},{"key":"9_CR17","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1108\/09685220410553569","volume":"12-4","author":"K. Moulinos","year":"2004","unstructured":"Moulinos, K., Iliadis, J., Tsoumas, V.: Towards secure sealing of privacy policies. Information Management & Computer Security\u00a012-4, 350\u2013361 (2004)","journal-title":"Information Management & Computer Security"},{"key":"9_CR18","unstructured":"Sommer, D. (ed.): PRIME Architecture version 2, (will appear mid to late 2007) \n                    \n                      https:\/\/www.primeproject.eu\/prime_products\/reports\/arch\/"},{"key":"9_CR19","unstructured":"Petterson, J.S.: R1 - First report from the pilot study on privacy technology in the framework of consumer support infrastructure. Working Paper, Department of Information Systems and Centre for HumanIT, Karlstad University, Karlstad (December 2006)"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Cranor, L.F.: What Do They \u201cIndicate?\u201d: Evaluating Security and Privacy Indicators. Interactions, 45\u201347 (2006)","DOI":"10.1145\/1125864.1125890"},{"key":"9_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-45853-0_7","volume-title":"Computer Security - ESORICS 2002","author":"G. Hogben","year":"2002","unstructured":"Hogben, G., Jackson, T., Wilikens, M.: A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol.\u00a02502, pp. 104\u2013125. Springer, Heidelberg (2002)"},{"key":"9_CR22","volume-title":"DEXA 2002","author":"G. Karjoth","year":"2002","unstructured":"Karjoth, G., Schunter, M., Waidner, M.: Privacy-enabled Services for Enterprise. In: DEXA 2002, IEEE, Los Alamitos (2002)"},{"key":"9_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/3-540-36467-6_6","volume-title":"Privacy Enhancing Technologies","author":"G. Karjoth","year":"2003","unstructured":"Karjoth, G., Schunter, M., Waidner, M.: Platform for Enterprise Privacy Practices: Privacy-Enabled management of Customer Data. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 69\u201384. Springer, Heidelberg (2003)"},{"key":"9_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1007\/978-3-540-39650-5_10","volume-title":"Computer Security \u2013 ESORICS 2003","author":"M. Backes","year":"2003","unstructured":"Backes, M., Pfitzmann, B., Schunter, M.: A Toolkit for Managing Enterprise Privacy Policies. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.\u00a02808, pp. 162\u2013180. Springer, Heidelberg (2003)"},{"key":"9_CR25","unstructured":"Clarke, R.: P3P Re-visited, \n                    \n                      http:\/\/www.anu.edu.au\/people\/Roger.Clarke\/DV\/P3PRev.html"},{"key":"9_CR26","unstructured":"P3P 1.0 Implementation Report, \n                    \n                      http:\/\/www.w3.org\/P3P\/implementation-report.html"},{"key":"9_CR27","unstructured":"AT&T, AT&T Privacy Bird, \n                    \n                      http:\/\/www.privacybird.com"},{"key":"9_CR28","unstructured":"Arshad, F.: Privacy Fox \u2013 A JavaScript-based P3P Agent for Mozilla Firefox, \n                    \n                      http:\/\/privacyfox.mozdev.org\/PaperFinal.pdf"},{"key":"9_CR29","series-title":"Lecture Notes in Computer Science","volume-title":"Trust and Privacy in Digital Business","author":"M. Casassa Mont","year":"2004","unstructured":"Casassa Mont, M.: Dealing with privacy obligations: Important aspects and technical approaches. In: Katsikas, S.K., Lopez, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol.\u00a03184, Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74409-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T01:10:53Z","timestamp":1558487453000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74409-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540744085","9783540744092"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74409-2_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}