{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:11:50Z","timestamp":1742926310975,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642217920"},{"type":"electronic","value":"9783642217937"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21793-7_37","type":"book-chapter","created":{"date-parts":[[2011,6,26]],"date-time":"2011-06-26T18:48:21Z","timestamp":1309114101000},"page":"330-338","source":"Crossref","is-referenced-by-count":0,"title":["Exploring Informational Privacy Perceptions in the Context of Online Social Networks: A Phenomenology Perspective"],"prefix":"10.1007","author":[{"given":"Emma Nuraihan","family":"Mior Ibrahim","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","unstructured":"Boncle., Good privacy. Networking that embraces privacy (2008), http:\/\/www.boncle.com\/index.html (retrieved February 3, 2010)"},{"key":"37_CR2","unstructured":"Givens., Online Privacy and Technology. Privacy Rights Clearing House (2009), http:\/\/www.privacyrights.org\/Online-Privacyand-Technology (retrieved February 3, 2010)"},{"issue":"1","key":"37_CR3","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1509\/jppm.19.1.7.16951","volume":"19","author":"E.M. Caudill","year":"2000","unstructured":"Caudill, E.M., Murphey, P.E.: Consumer Online Privacy: Legal and Ethical Issues. Journal of Public Policy and Marketing\u00a019(1), 7\u201319 (2000)","journal-title":"Journal of Public Policy and Marketing"},{"issue":"1","key":"37_CR4","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1509\/jppm.19.1.62.16949","volume":"19","author":"K.B. Sheehan","year":"2000","unstructured":"Sheehan, K.B., Hoy, M.G.: Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing\u00a019(1), 62\u201373 (2000)","journal-title":"Journal of Public Policy & Marketing"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Krasnova, H., G\u00fcnther, O., Spiekermann, S., Koroleva, K.: Privacy concerns and identity in online social networks. Identity Journal Limited 2009 (2009)","DOI":"10.1007\/s12394-009-0019-1"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Schofield, C., Joinson, A.D.: Privacy, Trust, and Disclosure Online (2008)","DOI":"10.1017\/CBO9780511813740.003"},{"key":"37_CR7","unstructured":"Stern, T.: Internet Privacy from the Individual and Business Perspectives \u2013 Introduction: privacy, Trust: privacy from the business perspective, Individual vs. business = privacy vs. personalization, Cookies, Google, Solutions. Baruch College, CUNY, USA online encyclopaedia 2009 (2009)"},{"key":"37_CR8","first-page":"206","volume-title":"Comms Yearbook 6","author":"J. Burgoon","year":"1982","unstructured":"Burgoon, J.: Privacy and communication. In: Burgoon, M. (ed.) Comms Yearbook 6, pp. 206\u2013249. Sage, Forrester Research, CA, Cambridge, MA (1982)"},{"key":"37_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45150-1","volume-title":"IT-Security and Privacy-Design and Use of Privacy-Enhancing Security Mechanisms","author":"S. Fischer-H\u00fcbner","year":"2001","unstructured":"Fischer-H\u00fcbner, S.:IT-Security and Privacy-Design and Use of Privacy-Enhancing Security Mechanisms. LNCS, vol.\u00a01958. Springer, Heidelberg (2001)"},{"key":"37_CR10","doi-asserted-by":"crossref","DOI":"10.7591\/9781501721243","volume-title":"In pursuit of privacy: Law, ethics, and the rise of technology","author":"J. DeCew","year":"1997","unstructured":"DeCew, J.: In pursuit of privacy: Law, ethics, and the rise of technology. Cornell University Press, Ithaca (1997)"},{"key":"37_CR11","volume-title":"Privacy and freedom","author":"A. Westin","year":"1967","unstructured":"Westin, A.: Privacy and freedom. Atheneum, New York (1967)"},{"issue":"6","key":"37_CR12","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/s00779-004-0304-9","volume":"8","author":"S. Lederer","year":"2004","unstructured":"Lederer, S., Hong, J.I., Dey, A.K., Landay, J.A.: Personal privacy through understanding and action: five pitfalls for designers. Personal Ubiquitous Computing\u00a08(6), 440\u2013454 (2004)","journal-title":"Personal Ubiquitous Computing"},{"key":"37_CR13","unstructured":"Internet Society (2007), http:\/\/www.faqs.org\/rfcs\/rfc2828.html (retrieved February 3, 2010)"},{"issue":"1","key":"37_CR14","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"D. Boyd","year":"2007","unstructured":"Boyd, D., Ellison, N.: Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication\u00a013(1), 11 (2007)","journal-title":"Journal of Computer-Mediated Communication"},{"key":"37_CR15","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1111\/j.1083-6101.2006.00020.x","volume":"11","author":"N. Ellison","year":"2006","unstructured":"Ellison, N., Heino, R., Gibbs, J.: Managing impressions online: Self-presentation processes in the online dating environment. Journal of Computer-Mediated Communication\u00a011, 2 (2006), article 2","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"3","key":"37_CR16","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1086\/378616","volume":"30","author":"H.J. Schau","year":"2003","unstructured":"Schau, H.J., Gilly, M.C.: We are what we post? Self-presentation in personal web space. Journal of Consumer Research\u00a030(3), 385\u2013404 (2003)","journal-title":"Journal of Consumer Research"},{"key":"37_CR17","unstructured":"Brym, R.J., Lenton, R.L.: Love Online: A Report on Digital Dating in Canada (2001), http:\/\/www.nelson.com\/nelson\/harcourt\/sociology\/newsociety3e\/loveonline.pdf (2008) (retrieved March 10, 2010)"},{"key":"37_CR18","unstructured":"Dwyer, C., Hiltz, S.R., Passerini, K.: Trust and Privacy Concern within Social Networking Sites: A Comparison of Facebook and MySpace. In: Thirteenth American Conference on Information Systems, USA (2007)"},{"issue":"1","key":"37_CR19","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1177\/0270467607311484","volume":"28","author":"Z. Tufekci","year":"2008","unstructured":"Tufekci, Z.: Can you see me now? Audience and disclosure regulation in Online Social Network Sites. Bulletin of Science, Technology & Society\u00a028(1), 20\u201336 (2008)","journal-title":"Bulletin of Science, Technology & Society"},{"issue":"1","key":"37_CR20","first-page":"10","volume":"3","author":"F. Stutzman","year":"2006","unstructured":"Stutzman, F.: An Evaluation of Identity-Sharing Behavior in Social Network Communities. International Digital and Media Arts Journal\u00a03(1), 10\u201313 (2006)","journal-title":"International Digital and Media Arts Journal"},{"issue":"3","key":"37_CR21","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/270858.270866","volume":"27","author":"J. Moor","year":"1997","unstructured":"Moor, J.: Towards a theory of privacy in the information age. Computers and Society\u00a027(3), 27\u201332 (1997)","journal-title":"Computers and Society"},{"key":"37_CR22","unstructured":"Preibusch, S., Hoser, B., G\u00fcrses, S., Berendt, B.: Ubiquitous social networks opportunities and challenges for privacy-aware user modelling. In: Proceedings of the Data Mining for User Modelling Workshop (DM.UM 2007) at UM 2007, Corfu (June 2007)"},{"key":"37_CR23","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/1397735.1397744","volume-title":"Proceedings of the First Workshop on online Social Networks, WOSP 2008","author":"B. Krishnamurthy","year":"2008","unstructured":"Krishnamurthy, B., Wills, C.E.: Characterizing privacy in online social networks. In: Proceedings of the First Workshop on online Social Networks, WOSP 2008, Seattle, WA, USA, August 18, pp. 37\u201342. ACM, New York (2008)"},{"key":"37_CR24","doi-asserted-by":"crossref","unstructured":"Patil, S., Romero, N., Karat, J.: Privacy and HCI: Methodologies for Studying Privacy Issues. In: CHI 2006, Montr\u00e9al, Qu\u00e9bec, Canada, April 22-27 (2006)","DOI":"10.1145\/1125451.1125771"},{"key":"37_CR25","doi-asserted-by":"crossref","unstructured":"Harper, J., Singleton, S.: With a Grain of Salt: What Consumer Privacy Surveys Don\u2019t Tell Us (2001), http:\/\/ssrn.com\/abstract=299930 (retrieved February 3, 2010)","DOI":"10.2139\/ssrn.299930"},{"key":"37_CR26","unstructured":"Kruger, D.: An introduction to phenomenological psychology, 2nd edn., Cape Town (1988)"},{"key":"37_CR27","doi-asserted-by":"publisher","DOI":"10.4135\/9781412995658","volume-title":"Phenomenological research methods","author":"C. Moustakas","year":"1994","unstructured":"Moustakas, C.: Phenomenological research methods. Sage, Thousand Oaks (1994)"},{"key":"37_CR28","doi-asserted-by":"crossref","unstructured":"Groenewald, T.: A phenomenological research design illustrated. International 140 Journal of Qualitative Methods\u00a03(1) (2004), Article 4","DOI":"10.1177\/160940690400300104"},{"key":"37_CR29","doi-asserted-by":"crossref","unstructured":"Cairns, P., Cox, A.L.: Research Methods for Human Computer Interaction, Cambridge (2009)","DOI":"10.1017\/CBO9780511814570"},{"key":"37_CR30","unstructured":"Nyshadham, E.A., Ugbaja, M.: A study of Ecommerce Risk Perceptions Among B2C Consumers: A Two Country Study. In: Proceedings of the 19th Bled eConference, Bled, Slovenia, June 5-7 (2006)"},{"key":"37_CR31","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"N.K. Malhotra","year":"2004","unstructured":"Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet users\u2019 information privacy concerns (IUIPC): The construct, the scale and a causal model. Information Systems Research\u00a015, 336\u2013355 (2004)","journal-title":"Information Systems Research"},{"key":"37_CR32","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s10660-009-9036-2","volume":"9","author":"D.G. Taylor","year":"2009","unstructured":"Taylor, D.G., Davis, D.F., Jillapalli, R.: Privacy concern and online personalization: the moderating effects of information control and compensation. Electron Commer. Res.\u00a09, 203\u2013223 (2009)","journal-title":"Electron Commer. Res."},{"key":"37_CR33","unstructured":"Carew, P.J., Stapleton, L.: Towards a Privacy Framework for Information Systems Development. Information Systems Development: Advances in Theory, Practice and Education (2005)"}],"container-title":["Lecture Notes in Computer Science","Human Interface and the Management of Information. Interacting with Information"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21793-7_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T20:07:26Z","timestamp":1686168446000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21793-7_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642217920","9783642217937"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21793-7_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}