{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:17:16Z","timestamp":1742959036090,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540880103"},{"type":"electronic","value":"9783540880110"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88011-0_6","type":"book-chapter","created":{"date-parts":[[2008,9,20]],"date-time":"2008-09-20T07:34:05Z","timestamp":1221896045000},"page":"45-53","source":"Crossref","is-referenced-by-count":1,"title":["Cooperative Visualization of Privacy Risks"],"prefix":"10.1007","author":[{"given":"George O. M.","family":"Yee","sequence":"first","affiliation":[]},{"given":"Larry","family":"Korba","sequence":"additional","affiliation":[]},{"given":"Ronggong","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Goldberg, I., Wagner, D., Brewer, E.: Privacy-Enhancing Technologies for the Internet. In: IEEE COMPCON 1997, pp. 103\u2013109 (1997)","key":"6_CR1","DOI":"10.21236\/ADA385546"},{"issue":"1","key":"6_CR2","doi-asserted-by":"crossref","first-page":"54","DOI":"10.4018\/jebr.2005010104","volume":"1","author":"G. Yee","year":"2005","unstructured":"Yee, G., Korba, L.: Semi-Automatic Derivation and Use of Personal Privacy Policies in E-Business. International Journal of E-Business Research\u00a01(1), 54\u201369 (2005)","journal-title":"International Journal of E-Business Research"},{"doi-asserted-by":"crossref","unstructured":"Yee, G., Korba, L., Song, R.: Legislative Bases for Personal Privacy Policy Specification. In: Yee, G. (ed.) Privacy Protection for E-Services, pp. 281\u2013294. Idea Group, Inc. (2006)","key":"6_CR3","DOI":"10.4018\/978-1-59140-914-4.ch011"},{"doi-asserted-by":"crossref","unstructured":"Yee, G., Korba, L.: Bilateral E-services Negotiation Under Uncertainty. In: International Symposium on Applications and the Internet (SAINT2003), Orlando, Florida, pp. 352\u2013355 (2003)","key":"6_CR4","DOI":"10.1109\/SAINT.2003.1183071"},{"unstructured":"Yee, G., Korba, L.: The Negotiation of Privacy Policies in Distance Education. In: 14th IRMA International Conference, Philadelphia, Pennsylvania, pp. 702\u2013705 (2003)","key":"6_CR5"},{"doi-asserted-by":"crossref","unstructured":"Moran, T.P., Chiu, P., van Melle, W.: Pen-Based Interaction Techniques for Organizing Material on an Electronic Whiteboard. In: 10th Annual ACM Symposium on User Interface Software and Technology, Banff, Alberta, Canada, pp. 45\u201354 (1997)","key":"6_CR6","DOI":"10.1145\/263407.263508"},{"doi-asserted-by":"crossref","unstructured":"Hong, J.I., Ng, J.D., Lederer, S., Landay, J.A.: Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems. In: Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques, Cambridge, MA, pp. 91\u2013100 (2004)","key":"6_CR7","DOI":"10.1145\/1013115.1013129"},{"doi-asserted-by":"crossref","unstructured":"Karger, P.A.: Privacy and Security Threat Analysis of the Federal Employee Personal Identity Verification (PIV) Program. In: Second Symposium on Usable Privacy and Security, Pittsburgh, Pennsylvania, pp. 114\u2013121 (2006)","key":"6_CR8","DOI":"10.1145\/1143120.1143135"},{"unstructured":"The Privacy Impact Assessment Guidelines: A Framework to Manage Privacy Risk, http:\/\/www.tbs-sct.gc.ca\/pgol-pged\/piatp-pfefvp\/course1\/mod2\/mod2-5_e.asp","key":"6_CR9"},{"doi-asserted-by":"crossref","unstructured":"Salter, C., Sami Saydjari, O., Schneier, B., Wallner, J.: Towards a Secure System Engineering Methodology. In: New Security Paradigms Workshop (1998)","key":"6_CR10","DOI":"10.1145\/310889.310900"},{"unstructured":"Data Flow Diagram, http:\/\/en.wikipedia.org\/wiki\/Data_flow_diagram","key":"6_CR11"}],"container-title":["Lecture Notes in Computer Science","Cooperative Design, Visualization, and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88011-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:54:01Z","timestamp":1738371241000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-540-88011-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540880103","9783540880110"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88011-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}