{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T13:17:16Z","timestamp":1773235036091,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642033148","type":"print"},{"value":"9783642033155","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03315-5_17","type":"book-chapter","created":{"date-parts":[[2009,7,25]],"date-time":"2009-07-25T03:15:46Z","timestamp":1248491746000},"page":"226-236","source":"Crossref","is-referenced-by-count":56,"title":["Privacy Awareness: A Means to Solve the Privacy Paradox?"],"prefix":"10.1007","author":[{"given":"Stefanie","family":"P\u00f6tzsch","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/11957454_3","volume-title":"Privacy Enhancing Technologies","author":"A. Acquisti","year":"2006","unstructured":"Acquisti, A., Gross, R.: Imagined communities: Awareness, information sharing, and privacy on the Facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol.\u00a04258, pp. 36\u201358. Springer, Heidelberg (2006)"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Adams, A., Sasse, M.A.: Privacy in multimedia communications: Protecting users, not just data. In: Blandford, A., Vanderdonkt, J. (eds.) People and Computers XV - Interaction without frontiers. Joint Proceedings of HCI 2001, pp. 49\u201364 (2001)","DOI":"10.1007\/978-1-4471-0353-0_4"},{"issue":"1","key":"17_CR3","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1177\/001391657600800102","volume":"8","author":"I. Altman","year":"1976","unstructured":"Altman, I.: Privacy: A conceptual analysis. Environment and Behavior\u00a08(1), 7\u201329 (1976)","journal-title":"Environment and Behavior"},{"issue":"1","key":"17_CR4","doi-asserted-by":"crossref","first-page":"13","DOI":"10.2307\/25148715","volume":"30","author":"N.F. Awad","year":"2006","unstructured":"Awad, N.F., Krishnan, M.S.: The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization. MIS Quarterly\u00a030(1), 13\u201328 (2006)","journal-title":"MIS Quarterly"},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/1316624.1316632","volume-title":"Proceedings of the 2007 international ACM Conference on Supporting Group Work. GROUP 2007","author":"J.P. Birnholtz","year":"2007","unstructured":"Birnholtz, J.P., Gutwin, C., Hawkey, K.: Privacy in the open: how attention mediates awareness and privacy in open-plan offices. In: Proceedings of the 2007 international ACM Conference on Supporting Group Work. GROUP 2007, Sanibel Island, Florida, USA, November 04 - 07, pp. 51\u201360. ACM, New York (2007)"},{"issue":"2-3","key":"17_CR6","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s10799-005-5879-y","volume":"6","author":"R.K. Chellappa","year":"2005","unstructured":"Chellappa, R.K., Sin, R.G.: Personalization versus Privacy: An Empirical Examination of the Online Consumer\u2019s Dilemma. Inf. Technol. and Management\u00a06(2-3), 181\u2013202 (2005)","journal-title":"Inf. Technol. and Management"},{"key":"17_CR7","unstructured":"Clarke, R.: Introduction to Dataveillance and Information Privacy, and Definitions and Terms. Latest revs. (August 7, 2006), http:\/\/www.anu.edu.au\/people\/Roger.Clarke\/DV\/Intro.html (last access 2008-07-29)"},{"key":"17_CR8","first-page":"1","volume-title":"Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society. WPES 2002","author":"L.F. Cranor","year":"2002","unstructured":"Cranor, L.F., Arjula, M., Guduru, P.: Use of a P3P user agent by early adopters. In: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society. WPES 2002, Washington, DC, November 21, pp. 1\u201310. ACM, New York (2002)"},{"issue":"1","key":"17_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17705\/1jais.00044","volume":"5","author":"D.F. Galletta","year":"2004","unstructured":"Galletta, D.F., Henry, R., McCoy, S., Polak, P.: Web Site Delays: How Tolerant Are Users? Journal of the Association for Information Systems\u00a05(1), 1\u201328 (2004)","journal-title":"Journal of the Association for Information Systems"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/1102199.1102214","volume-title":"Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society. WPES 2005","author":"R. Gross","year":"2005","unstructured":"Gross, R., Acquisti, A., Heinz, H.J.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society. WPES 2005, Alexandria, VA, USA, November 2005, pp. 71\u201380. ACM, New York (2005)"},{"key":"17_CR11","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-642-03315-5_5","volume-title":"The Future of Identity in the Information Society","author":"H. Hedbom","year":"2009","unstructured":"Hedbom, H.: A Survey on Transparency Tools for Enhancing Privacy. In: Maty\u00e1\u0161, V., et al. (eds.) The Future of Identity in the Information Society. IFIP AICT, vol.\u00a0298, pp. 67\u201382. Springer, Heidelberg (2009)"},{"issue":"10","key":"17_CR12","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"T.N. Jagatic","year":"2007","unstructured":"Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Communications of the ACM\u00a050(10), 94\u2013100 (2007)","journal-title":"Communications of the ACM"},{"key":"17_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/11766155_16","volume-title":"Emerging Trends in Information and Communication Security","author":"S. K\u00f6psell","year":"2006","unstructured":"K\u00f6psell, S.: Low Latency Anonymous Communication - How long are users willing to wait? In: M\u00fcller, G. (ed.) ETRICS 2006. LNCS, vol.\u00a03995, pp. 221\u2013237. Springer, Heidelberg (2006)"},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1145\/108844.108867","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems: Reaching Through Technology. CHI 1991","author":"W.E. Mackay","year":"1991","unstructured":"Mackay, W.E.: Triggers and barriers to customizing software. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems: Reaching Through Technology. CHI 1991, New Orleans, Louisiana, United States, April 27 - May 02, pp. 153\u2013160. ACM, New York (1991)"},{"issue":"1","key":"17_CR15","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/S0267-3649(03)00103-1","volume":"19","author":"C.H. Manny","year":"2003","unstructured":"Manny, C.H.: European and American privacy: Commerce, rights, and justice. Computer Law and Security Report\u00a019(1), 4\u201310 (2003)","journal-title":"Computer Law and Security Report"},{"issue":"2","key":"17_CR16","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/0272-4944(95)90018-7","volume":"15","author":"P.B. Newell","year":"1995","unstructured":"Newell, P.B.: Perspectives on privacy. Journal of Environmental Psychology\u00a015(2), 87\u2013104 (1995)","journal-title":"Journal of Environmental Psychology"},{"issue":"1","key":"17_CR17","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","volume":"41","author":"P.A. Norberg","year":"2007","unstructured":"Norberg, P.A., Horne, D.R., Horne, D.A.: The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs\u00a041(1), 100\u2013126 (2007)","journal-title":"Journal of Consumer Affairs"},{"key":"17_CR18","unstructured":"PRIME General Public Tutorial v2, https:\/\/www.prime-project.eu\/tutorials\/gpto (last access 2008-05-15)"},{"issue":"1","key":"17_CR19","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1509\/jppm.19.1.62.16949","volume":"19","author":"K.B. Sheehan","year":"2000","unstructured":"Sheehan, K.B., Hoy, M.G.: Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing\u00a019(1), 62\u201372 (2000)","journal-title":"Journal of Public Policy & Marketing"},{"key":"17_CR20","volume-title":"Models of bounded rationality","author":"H.A. Simon","year":"1982","unstructured":"Simon, H.A.: Models of bounded rationality. MIT Press, Cambridge (1982)"},{"key":"17_CR21","first-page":"38","volume-title":"Proceedings of the 3rd ACM Conference on Electronic Commerce. EC 2001","author":"S. Spiekermann","year":"2001","unstructured":"Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. In: Proceedings of the 3rd ACM Conference on Electronic Commerce. EC 2001, Tampa, Florida, USA, October 14 - 17, pp. 38\u201347. ACM, New York (2001)"},{"key":"17_CR22","unstructured":"Varian, H.R.: Economic aspects of personal privacy. In: Privacy and Self-Regulation in the Information Age, National Telecommunications and Information Administration (1996)"},{"key":"17_CR23","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"S. Warren","year":"1890","unstructured":"Warren, S., Brandeis, L.: The right to privacy. Harvard Law Review\u00a04, 193\u2013220 (1890)","journal-title":"Harvard Law Review"},{"key":"17_CR24","volume-title":"Privacy and Freedom","author":"A.F. Westin","year":"1967","unstructured":"Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967)"}],"container-title":["IFIP Advances in Information and Communication Technology","The Future of Identity in the Information Society"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03315-5_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T13:52:39Z","timestamp":1558446759000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03315-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642033148","9783642033155"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03315-5_17","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}