{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T12:21:20Z","timestamp":1761740480354},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642033148"},{"type":"electronic","value":"9783642033155"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03315-5_18","type":"book-chapter","created":{"date-parts":[[2009,7,25]],"date-time":"2009-07-25T03:15:46Z","timestamp":1248491746000},"page":"237-253","source":"Crossref","is-referenced-by-count":10,"title":["Testing Privacy Awareness"],"prefix":"10.1007","author":[{"given":"Mike","family":"Bergmann","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Andersson, C., Camenisch, J., Crane, S., Fischer-H\u00fcbner, S., Leenes, R., Pearson, S., Pettersson, J.S., Sommer, D.: Trust in PRIME. In: Proceedings of the 5th IEEE Int. Symposium on Signal Processing and IT, Athens, Greece, December 18-21 (2005)"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Ant\u00f3n, A.I., Earp, J.B., Bolchini, D., He, Q., Jensen, C., Stufflebeam, W.: The lack of clarity in financial privacy policies and the need for standardization. In: IEEE Security and Privacy, March 2004, vol.\u00a02, pp. 36\u201345 (2004)","DOI":"10.1109\/MSECP.2004.1281243"},{"key":"18_CR3","unstructured":"Ant\u00f3n, A.I., Earp, J.B., Vail, M.W., Jain, N., Gheen, C., Frink, J.M.: An Analysis of Web Site Privacy Policy Evolution in the Presence of HIPAA, http:\/\/www4.ncsu.edu\/~njain\/publications\/hipaa_7_24_submit.pdf"},{"key":"18_CR4","volume-title":"Proceedings of the Human Factors and Ergonomics Society 42nd Annual Meeting","author":"J.P. Benway","year":"1998","unstructured":"Benway, J.P.: Banner Blindness: The Irony of Attention Grabbing on the World Wide Web. In: Proceedings of the Human Factors and Ergonomics Society 42nd Annual Meeting. Rice University Research, Houston (1998)"},{"key":"18_CR5","volume-title":"The Future of Identity in the Information Society: Proceedings of the Third IFIP WG 9.2, 9.6\/11.6, 11.7\/FIDIS International Summer School, International Summerschool Karlstad, Sweden","author":"M. Bergmann","year":"2008","unstructured":"Bergmann, M.: Generic Predefined Privacy Preferences for Online Applications. In: H\u00fcbner, S.F., Duquenoy, P., Zuccato, A., Martucci, L. (eds.) The Future of Identity in the Information Society: Proceedings of the Third IFIP WG 9.2, 9.6\/11.6, 11.7\/FIDIS International Summer School, International Summerschool Karlstad, Sweden, August 4-10, 2007. Springer, Boston (2008)"},{"key":"18_CR6","volume-title":"ACM Transactions on Computer-Human Interaction (TOCHI)","author":"M. Burke","year":"2005","unstructured":"Burke, M., Hornof, A., Nilsen, E., Gorman, N.: High-cost banner blindness: Ads increase perceived workload, hinder visual search, and are forgotten. In: ACM Transactions on Computer-Human Interaction (TOCHI), December 12, 2005. Rice University Research, Houston (2005)"},{"key":"18_CR7","unstructured":"Council of Europe. Data Protection Directive 1995\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal L No. 281, 23.11.1995 (1995)"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Cranor, L.: P3P: Making privacy policies more useful. IEEE Security and Privacy, pp. 50\u201355 (2003)","DOI":"10.1109\/MSECP.2003.1253568"},{"key":"18_CR9","unstructured":"Cranor, L., Reagle, J., Ackerman, M.: Beyond Concern: Understanding Net Users Attitudes About Online Privacy. AT&T Labs-Research Technical Report, TR 99.4.3 (April 1999), http:\/\/citeseer.ist.psu.edu\/cranor99beyond.html"},{"issue":"3","key":"18_CR10","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/1125864.1125890","volume":"XIII","author":"L.F. Cranor","year":"2006","unstructured":"Cranor, L.F.: What do they \u201cindicate?\u201d: Evaluating Security and Privacy Indicators. Interactions\u00a0XIII(3), 45\u201357 (2006)","journal-title":"Interactions"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Diaper, D., Waelend, P.: World Wide Web working whilst ignoring graphics: good news for web page designers. Interacting With Computers\u00a013 (December 2000)","DOI":"10.1016\/S0953-5438(00)00036-9"},{"key":"18_CR12","unstructured":"Egelman, S., Tsai, J., Cranor, L., Acquisti, A.: Studying the Impact of Privacy Information on Online Purchase Decisions. In: Workshop on Privacy and HCI: Methodologies for Studying Privacy Issues at CHI 2006 (2006), http:\/\/cups.cs.cmu.edu\/pubs\/chi06.pdf"},{"key":"18_CR13","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/3-540-45150-1_3","volume-title":"IT-Security and Privacy","author":"S. Fischer-H\u00fcbner","year":"2001","unstructured":"Fischer-H\u00fcbner, S.: IT-Security and Privacy, vol.\u00a01958, p. 35. Springer, Heidelberg (2001)"},{"key":"18_CR14","unstructured":"Fox, S., Rainie, L., Lenhart, J.H.A., Spooner, T., Carter, C.: Trust and Privacy Online: Why Americans want to rewrite the Rules. In: The Pew Internet & American Life Project, August 20 (2000), http:\/\/www.pewinternet.org\/pdfs\/PIP_Trust_Privacy_Report.pdf (last visited November 11, 2008)"},{"key":"18_CR15","unstructured":"Gideon, J., Cranor, L., Egelman, S., Acquisti, A.: Power Strips, Prophylactics, and Privacy, Oh My! In: ACM International Conference Proceeding Series, Proceedings of the second symposium on Usable privacy and security, Pittsburgh, Pennsylvania, vol.\u00a0149, pp. 133\u2013144 (2006), http:\/\/portal.acm.org\/citation.cfm?id=1143120.1143137 ISBN:1-59593-448-0"},{"key":"18_CR16","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.ijhcs.2005.04.019","volume":"63","author":"C. Jensen","year":"2005","unstructured":"Jensen, C., Potts, C., Jensen, C.: Privacy practices of Internet users: Self-report versus observed behavior. International Journal of Human-Computer Studies\u00a063, 203\u2013227 (2005)","journal-title":"International Journal of Human-Computer Studies"},{"key":"18_CR17","unstructured":"Kallmann, A.: Skalierung in der empirischen Forschung. M\u00fcnchen (1979)"},{"key":"18_CR18","unstructured":"Kumaraguru, P., Cranor, L.: Privacy Indexes: A Survey of Westin\u2019s Studies. ISRI Technical Report, CMU-ISRI-05-138, Carnegie Mellon University (December 2005)"},{"key":"18_CR19","unstructured":"Pettersson., J.S. (ed.): HCI Guidelines, PRIME Deliverable D6.1.f. PRIME Deliverable (version 1, February 2008), https:\/\/www.prime-project.eu\/prime_products\/reports\/arch\/"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Pettersson, J.S., Fischer-H\u00fcbner, S., Danielsson, N., Nilsson, J., Bergmann, M., Clau\u00df, S., Kriegelstein, T., Krasemann, H.: Making PRIME Usable. In: Symposium on Usable Privacy and Security, Pittsburgh, PA, USA, July 2005. Carnegie Mellon University (2005)","DOI":"10.1145\/1073001.1073007"},{"key":"18_CR21","first-page":"103","volume-title":"Communications of the ACM archive","author":"I. Pollach","year":"2007","unstructured":"Pollach, I.: What\u2019s Wrong with Online Privacy Policies? In: Communications of the ACM archive, vol.\u00a050, pp. 103\u2013108. ACM Press, New York (2007)"},{"key":"18_CR22","unstructured":"W3C. Platform for Privacy Preferences (April 2002), http:\/\/www.w3.org\/TR\/P3P\/"},{"key":"18_CR23","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"S.D. Warren","year":"1890","unstructured":"Warren, S.D., Brandeis, L.D.: The Right to Privacy. Harvard Law Review\u00a04, 193\u2013220 (1890)","journal-title":"Harvard Law Review"},{"key":"18_CR24","volume-title":"Privacy and Freedom","author":"A. Westin","year":"1967","unstructured":"Westin, A.: Privacy and Freedom. Atheneum, New York (1967)"},{"key":"18_CR25","volume-title":"Bibliography of surveys of the U.S. Public, 1970-2003","author":"A.F. Westin","year":"2003","unstructured":"Westin, A.F., Center for Social and Legal Research: Bibliography of surveys of the U.S. Public, 1970-2003. CSLR, Hackensack (2003)"},{"key":"18_CR26","unstructured":"Westin, A.F., HARRIS LOUIS & ASSOCIATES: Harris-Equifax Consumer Privacy Survey. Tech. rep., 1991. Conducted for Equifax Inc. 1,255 adults of the U.S. public (1991)"}],"container-title":["IFIP Advances in Information and Communication Technology","The Future of Identity in the Information Society"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03315-5_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T13:52:55Z","timestamp":1558446775000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03315-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642033148","9783642033155"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03315-5_18","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}