{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:02:22Z","timestamp":1760043742975},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642296147"},{"type":"electronic","value":"9783642296154"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29615-4_10","type":"book-chapter","created":{"date-parts":[[2012,4,23]],"date-time":"2012-04-23T07:30:30Z","timestamp":1335166230000},"page":"131-148","source":"Crossref","is-referenced-by-count":19,"title":["Increasing Service Users\u2019 Privacy Awareness by Introducing On-Line Interactive Privacy Features"],"prefix":"10.1007","author":[{"given":"Elahe","family":"Kani-Zabihi","sequence":"first","affiliation":[]},{"given":"Martin","family":"Helmhout","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"John, L.K., Acquisti, A., Loewenstein, G.: The Best of Strangers: Context Dependent Willingness to Divulge Personal Information (2009), SSRN http:\/\/ssrn.com\/abstract=1430482"},{"key":"10_CR2","unstructured":"Constantine, L.L., Lockwood, L.A.D.: Software for Use: A practical guide to the models and methods of usage-centred design. Addison Wesley (2000)"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/0148-2963(95)00006-E","volume":"34","author":"L. Leuthesser","year":"1995","unstructured":"Leuthesser, L., Kohli, A.K.: Relational Behavior in Business Markets: Implications for Relationship Management. Journal of Business Research\u00a034, 221\u2013223 (1995)","journal-title":"Journal of Business Research"},{"issue":"1","key":"10_CR4","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s00779-003-0253-8","volume":"8","author":"P. Dourish","year":"2004","unstructured":"Dourish, P.: What we talk about when we talk about the context. Personal and Ubiquitous Computing\u00a08(1), 19\u201330 (2004)","journal-title":"Personal and Ubiquitous Computing"},{"issue":"1","key":"10_CR5","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/344949.345004","volume":"7","author":"T. Erickson","year":"2000","unstructured":"Erickson, T., Kellogg, W.A.: Social translucence: an approach to designing systems that support social processes. ACM Transactions on Computer-Human Interaction\u00a07(1), 59\u201383 (2000)","journal-title":"ACM Transactions on Computer-Human Interaction"},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/MC.2011.192","volume":"44","author":"D. Breznitz","year":"2011","unstructured":"Breznitz, D., Murphree, M., Goodman, S.: Ubiquitous Data Collection: Rethinking Privacy Debates. Computer\u00a044, 100\u2013102 (2011)","journal-title":"Computer"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Coles-Kemp, L., Kani-Zabihi, E.: On-line privacy and consent: A dialogue not a monologue, September 21-23, pp. 1\u201315. ACM Press (2010)","DOI":"10.1145\/1900546.1900560"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Hiok, C.Y., Khoo, V.K.T.: Education Services Mashup: Examining the Impact of Web Design Features on User Trust. In Second International Conference on Computer Research and Development, pp. 349\u2013353. IEEE (2010)","DOI":"10.1109\/ICCRD.2010.28"},{"key":"10_CR9","unstructured":"Coles-Kemp, L., Kani-Zabihi, E.: Practice Makes Perfect- Motivating confident on-line privacy protection practices. In: IEEE International Conference on Social Computing (forthcoming, 2011)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Ghazinour, K., Majedi, M., Barker, K.: A model for privacy policy visualization. In: 33rd Annual IEEE International Computer Software and Applications Conference, pp. 335\u2013340 (2009)","DOI":"10.1109\/COMPSAC.2009.156"},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.ijhcs.2005.04.019","volume":"63","author":"C. Jensen","year":"2005","unstructured":"Jensen, C., Potts, C., Jensen, C.: Privacy practices of Internet users: self-reports versus observed behaviour. International Journal of Human-Computer Studies\u00a063, 203\u2013227 (2005)","journal-title":"International Journal of Human-Computer Studies"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1108\/14684520610686292","volume":"30","author":"E. Kani-Zabihi","year":"2006","unstructured":"Kani-Zabihi, E., Ghinea, G., Chen, S.Y.: Digital libraries: what do users want? Online Information Review\u00a030, 395\u2013412 (2006)","journal-title":"Online Information Review"},{"key":"10_CR13","unstructured":"Kani-Zabihi, E., Coles-Kemp, L.: Service users\u2019 requirements for tools to support effective on-line privacy and consent practices. In: The 15th Nordic Conference in Secure IT Systems (NordSec 2010), October 24-30. LNCS, pp. 106\u2013120. ACM Press (2010)"},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jdls.2010102701","volume":"1","author":"E. Kani-Zabihi","year":"2010","unstructured":"Kani-Zabihi, E., Ghinea, G., Chen, S.Y.: Experiences with Developing a User-Centered Digital Library. International Journal of Digital Library Systems\u00a01, 1\u201323 (2010)","journal-title":"International Journal of Digital Library Systems"},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MC.2009.186","volume":"42","author":"A. Karahasanovic","year":"2009","unstructured":"Karahasanovic, A., Brandtz\u00e6g, P.B., Vanattenhoven, J., Lievens, B., Nielsen, K.T., Pierson, J.: Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications. Computer\u00a042, 42\u201349 (2009)","journal-title":"Computer"},{"key":"10_CR16","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/1107458.1107491","volume":"49","author":"C.M. Karat","year":"2006","unstructured":"Karat, C.M., Brodie, C., Karat, J.: Usable privacy and security for personal information management. Communications of the ACM\u00a049, 56\u201357 (2006)","journal-title":"Communications of the ACM"},{"key":"10_CR17","unstructured":"Information Commissioner\u2019s Office \u201cPrivacy by Design\u201d, http:\/\/www.ico.gov.uk\/upload\/documents\/pdb_report_html\/index.html (last accessed August 5, 2010)"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Palen, L., Dourish, P.: Unpacking privacy for a networke d world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 129\u2013136. ACM (2003)","DOI":"10.1145\/642611.642635"},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1016\/j.cose.2009.12.007","volume":"29","author":"G. Pernul","year":"2010","unstructured":"Pernul, G., Kolter, J., Kernchen, T.: Collaborative Privacy Management. Computers & Security\u00a029, 580\u2013591 (2010)","journal-title":"Computers & Security"},{"key":"10_CR20","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-1-4471-0259-5_18","volume-title":"Frontiers of Human-Centred Computing, Online Communities and Virtual Environments","author":"J. Preece","year":"2001","unstructured":"Preece, J.: Online Communities; Usability, Sociability, Theory and Methods. In: Earnshaw, R., Guedj, R., van Dam, A., Vince, T. (eds.) Frontiers of Human-Centred Computing, Online Communities and Virtual Environments, pp. 263\u2013277. Springer, Amsterdam (2001)"},{"key":"10_CR21","unstructured":"Preece, J., Rogers, Y., Sharp, H.: Interaction design: beyond human-computer interaction. John Wiley (2009)"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Xiaozhao, D., Jianhai, R.: Users\u2019 Privacy Issues with E-learning in Library 2.0. In: International Conference on Multimedia Information Networking and Security, pp. 90\u201392. IEEE (2009)","DOI":"10.1109\/MINES.2009.96"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Satchell, C., Dourish, P.: Beyond the user: use and non-use in HCI. In: Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24\/7, pp. 9\u201316. ACM (2009)","DOI":"10.1145\/1738826.1738829"},{"key":"10_CR24","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/TSE.2008.88","volume":"35","author":"S. Spiekermann","year":"2009","unstructured":"Spiekermann, S., Cranor, L.F.: Engineering privacy. IEEE Transactions on Software Engineering\u00a035, 67\u201382 (2009)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10_CR25","volume-title":"Usability Engineering","author":"J. Nielsen","year":"1993","unstructured":"Nielsen, J.: Usability Engineering. Academic Press, Boston (1993)"}],"container-title":["Lecture Notes in Computer Science","Information Security Technology for Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29615-4_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T14:36:02Z","timestamp":1642084562000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29615-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642296147","9783642296154"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29615-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}