{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:57:33Z","timestamp":1725901053308},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642316678"},{"type":"electronic","value":"9783642316685"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31668-5_13","type":"book-chapter","created":{"date-parts":[[2012,6,28]],"date-time":"2012-06-28T04:34:43Z","timestamp":1340858083000},"page":"171-186","source":"Crossref","is-referenced-by-count":0,"title":["Extending Comparison Shopping Sites by Privacy Information on Retailers"],"prefix":"10.1007","author":[{"given":"Ulrich","family":"K\u00f6nig","sequence":"first","affiliation":[]},{"given":"Marit","family":"Hansen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","series-title":"IFIP","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-0-387-79026-8_14","volume-title":"The Future of Identity in the Information Society","author":"M. Hansen","year":"2008","unstructured":"Hansen, M.: Marrying transparency tools with user-controlled identity management. In: Fischer-H\u00fcbner, S., Duquenoy, P., Zuccato, A., Martucci, L. (eds.) The Future of Identity in the Information Society. IFIP, vol.\u00a0262, pp. 199\u2013220. Springer, Boston (2008)"},{"key":"13_CR2","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-642-03315-5_5","volume-title":"The Future of Identity in the Information Society","author":"H. Hedbom","year":"2009","unstructured":"Hedbom, H.: A Survey on Transparency Tools for Enhancing Privacy. In: Maty\u00e1\u0161, V., Fischer-H\u00fcbner, S., Cvr\u010dek, D., \u0160venda, P. (eds.) The Future of Identity. IFIP AICT, vol.\u00a0298, pp. 67\u201382. Springer, Heidelberg (2009)"},{"key":"13_CR3","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1145\/1143120.1143137","volume-title":"Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006","author":"J. Gideon","year":"2006","unstructured":"Gideon, J., Cranor, L.F., Egelman, S., Acquisti, A.: Power strips, prophylactics, and privacy, oh my! In: Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006, pp. 133\u2013144. ACM, New York (2006)"},{"issue":"3","key":"13_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1314683.1314684","volume":"4","author":"A.M. McDonald","year":"2008","unstructured":"McDonald, A.M., Cranor, L.F.: The cost of reading privacy policies. ACM Transactions on Computer-Human Interaction\u00a04(3), 1\u201322 (2008)","journal-title":"ACM Transactions on Computer-Human Interaction"},{"key":"13_CR5","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-642-20317-6_14","volume-title":"Privacy and Identity Management for Life","author":"J. Angulo","year":"2011","unstructured":"Angulo, J., Fischer-H\u00fcbner, S., Pulls, T., K\u00f6nig, U.: HCI for policy display and administration. In: Bezzi, M., Duquenoy, P., Fischer-H\u00fcbner, S., Hansen, M., Zhang, G. (eds.) Privacy and Identity Management for Life. IFIP AICT, vol.\u00a0512, pp. 261\u2013278. Springer, Heidelberg (2011)"},{"key":"13_CR6","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-642-20317-6_15","volume-title":"Privacy and Identity Management for Life","author":"L.E. Holtz","year":"2011","unstructured":"Holtz, L.E., Zwingelberg, H., Hansen, M.: Privacy policy icons. In: Bezzi, M., Duquenoy, P., Fischer-H\u00fcbner, S., Hansen, M., Zhang, G. (eds.) Privacy and Identity Management for Life. IFIP AICT, vol.\u00a0512, pp. 279\u2013286. Springer, Boston (2011)"},{"key":"13_CR7","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-642-20769-3_26","volume-title":"Privacy and Identity Management for Life","author":"U. K\u00f6nig","year":"2011","unstructured":"K\u00f6nig, U.: PrimeLife Checkout \u2013 A Privacy-Enabling e-Shopping User Interface. In: Fischer-H\u00fcbner, S., Duquenoy, P., Hansen, M., Leenes, R., Zhang, G. (eds.) Privacy and Identity Management for Life. IFIP AICT, vol.\u00a0352, pp. 325\u2013337. Springer, Heidelberg (2011)"},{"issue":"2","key":"13_CR8","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1287\/isre.1090.0260","volume":"22","author":"J.Y. Tsai","year":"2011","unstructured":"Tsai, J.Y., Egelman, S., Cranor, L., Acquisti, A.: The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research\u00a022(2), 254\u2013268 (2011)","journal-title":"Information Systems Research"},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-20317-6_13","volume-title":"Privacy and Identity Management for Life","author":"S. Fischer-H\u00fcbner","year":"2011","unstructured":"Fischer-H\u00fcbner, S., Hedbom, H., W\u00e4stlund, E.: Trust and assurance HCI. In: Camenisch, J., Fischer-H\u00fcbner, S., Rannenberg, K. (eds.) Privacy and Identity Management for Life, pp. 245\u2013260. Springer, Heidelberg (2011)"},{"unstructured":"Fischer-H\u00fcbner, S., Angulo, J., Graf, C., W\u00e4stlund, E., Wolkerstorfer, P., Hochleitner, C.: Towards usable privacy enhancing technologies: Lessons learned from the PrimeLife Project. Deliverable D4.1.6 (2011)","key":"13_CR10"},{"doi-asserted-by":"crossref","unstructured":"Berners-Lee, T.: Long live the web: A call for continued open standards and neutrality. Scientific American\u00a012 (2010)","key":"13_CR11","DOI":"10.1038\/scientificamerican1210-80"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management for Life"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31668-5_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,19]],"date-time":"2022-01-19T20:01:14Z","timestamp":1642622474000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31668-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642316678","9783642316685"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31668-5_13","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2012]]}}}