{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:20:23Z","timestamp":1743078023494,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642217920"},{"type":"electronic","value":"9783642217937"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21793-7_39","type":"book-chapter","created":{"date-parts":[[2011,6,26]],"date-time":"2011-06-26T14:48:21Z","timestamp":1309099701000},"page":"349-358","source":"Crossref","is-referenced-by-count":2,"title":["Does Privacy Information Influence Users\u2019 Online Purchasing Behavior?"],"prefix":"10.1007","author":[{"given":"Jimmy H.","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Kim-Phuong L.","family":"Vu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1007\/978-3-540-73354-6_84","volume-title":"Human Interface and the Management of Information. Interacting in Information Environments","author":"R.W. Proctor","year":"2007","unstructured":"Proctor, R.W., Vu, K.-P.L., Ali, M.A.: Usability of User Agents for Privacy-Preference Specification. In: Smith, M.J., Salvendy, G. (eds.) HCII 2007. LNCS, vol.\u00a04558, pp. 766\u2013776. Springer, Heidelberg (2007)"},{"key":"39_CR2","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.ijhcs.2005.04.019","volume":"63","author":"C. Jensen","year":"2005","unstructured":"Jensen, C., Potts, C., Jensen, C.: Privacy practices of Internet users: Self-reports versus observed behavior. Int. J. Hum.-Comput. St.\u00a063, 203\u2013227 (2005)","journal-title":"Int. J. Hum.-Comput. St."},{"key":"39_CR3","unstructured":"Turow, J., Feldman, L., Meltzer, K.: Open to exploration: American shopper online and offline. A report from the Annenberg public policy center of the University of Pennsylvania. University of Pennsylvania (2005)"},{"key":"39_CR4","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1177\/0093650206287076","volume":"33","author":"M.J. Metzger","year":"2006","unstructured":"Metzger, M.J.: Effects of site, vendor, and consumer characteristics on Web site trust and disclosure. Commun. Res.\u00a033, 155\u2013179 (2006)","journal-title":"Commun. Res."},{"key":"39_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1007\/978-3-540-73354-6_88","volume-title":"Human Interface and the Management of Information. Interacting in Information Environments","author":"K.-P.L. Vu","year":"2007","unstructured":"Vu, K.-P.L., Chambers, V., Garcia, F.P., Creekmur, B., Sulaitis, J., Nelson, D., Pierce, R., Proctor, R.W.: How Users Read and Comprehend Privacy Policies. In: Smith, M.J., Salvendy, G. (eds.) HCII 2007. LNCS, vol.\u00a04558, pp. 802\u2013811. Springer, Heidelberg (2007)"},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"Byers, S., Cranor, L.F., Kormann, D.: Automated analysis of P3P-enabbled Web sites. In: ICES 2003, Pittsburgh, Pennsylvania, pp. 326\u2013338 (2003)","DOI":"10.1145\/948005.948048"},{"key":"39_CR7","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1145\/1053291.1053295","volume":"48","author":"B. Berendt","year":"2005","unstructured":"Berendt, B., Gunther, O., Spiekermann, S.: Privacy in e-commerce: Stated preference vs. actual Behavior. Commun. ACM\u00a048, 101\u2013106 (2005)","journal-title":"Commun. ACM"},{"key":"39_CR8","unstructured":"Jupiter Research, \n                    \n                      http:\/\/www.ftc.gov\/bcp\/workshops\/security\/020520leathern.pdf"},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"Jensen, C., Potts, C.: Privacy policies as decision-making tools: An evaluation of online privacy notices. In: CHI 2004, New York, NY, vol.\u00a06, pp. 471\u2013478 (2004)","DOI":"10.1145\/985692.985752"},{"key":"39_CR10","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1080\/10447310801937999","volume":"24","author":"R.W. Proctor","year":"2008","unstructured":"Proctor, R.W., Ali, M.A., Vu, K.-P.L.: Examining usability of Web privacy policies. Int. J. Hum.-Comput. Int.\u00a024, 307\u2013328 (2008)","journal-title":"Int. J. Hum.-Comput. Int."},{"key":"39_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1007\/978-3-540-73354-6_87","volume-title":"Human Interface and the Management of Information. Interacting in Information Environments","author":"K.-P.L. Vu","year":"2007","unstructured":"Vu, K.-P.L., Garcia, F.P., Nelson, D., Sulaitis, J., Creekmur, B., Chambers, V., Proctor, R.W.: Examining User Privacy Practices While Shopping Online: What Are Users Looking for? In: Smith, M.J., Salvendy, G. (eds.) HCII 2007. LNCS, vol.\u00a04558, pp. 792\u2013801. Springer, Heidelberg (2007)"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Cranor, L.F., Arjula, M., Guduru, P.: Use of a P3P user agent by early adopters. In: WPES 2002, ACM Workshop on Privacy in the Electronic Society, New York, NY, pp. 1\u201310 (2002)","DOI":"10.1145\/644527.644528"},{"key":"39_CR13","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/1165734.1165735","volume":"13","author":"L.F. Cranor","year":"2006","unstructured":"Cranor, L.F., Guduru, P., Arjula, M.: User interfaces for privacy agents. ACM Trans. Comput.-Hum. Interact.\u00a013, 135\u2013178 (2006)","journal-title":"ACM Trans. Comput.-Hum. Interact."},{"key":"39_CR14","unstructured":"Tsai, J., Egelman, S., Cranor, L.F., Acquisti, A.: The effect of online privacy information on purchasing behavior: An experimental study. In: The 6th Workshop on the Economics of Information Security, WEIS (2008), \n                    \n                      http:\/\/weis2007.econinfosec.org\/papers\/57.pdf"}],"container-title":["Lecture Notes in Computer Science","Human Interface and the Management of Information. Interacting with Information"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21793-7_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T22:47:04Z","timestamp":1582411624000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21793-7_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642217920","9783642217937"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21793-7_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}