{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T12:01:41Z","timestamp":1759147301684,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642392641"},{"type":"electronic","value":"9783642392658"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39265-8_8","type":"book-chapter","created":{"date-parts":[[2013,7,1]],"date-time":"2013-07-01T22:54:16Z","timestamp":1372719256000},"page":"68-77","source":"Crossref","is-referenced-by-count":2,"title":["Trustworthy and Inclusive Identity Management for Applications in Social Media"],"prefix":"10.1007","author":[{"given":"Till Halbach","family":"R\u00f8ssvoll","sequence":"first","affiliation":[]},{"given":"Lothar","family":"Fritsch","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Johnson, M., Egelman, S., Bellovin, S.M.: Facebook and privacy: It\u2019s complicated. In: Symposium on Usable Privacy and Security (SOUPS), pp. 24\u201329 (2012)","DOI":"10.1145\/2335356.2335369"},{"key":"8_CR2","unstructured":"e-Me Consortium: Inclusive Identity Management in New Social Media, VERDIKT research project no. 201554, Research Council of Norway (2011), \n                    \n                      http:\/\/www.nr.no\/pages\/dart\/project_flyer_e-me"},{"key":"8_CR3","unstructured":"Hochheiser, H., Feng, J., Lazar, J.: Challenges in universally usable privacy and security. In: Symposium on Usable Privacy and Security (SOUPS), vol.\u00a02008 (2008)"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Birge, C.: Enhancing research into usable privacy and security. In: Proceedings of the 27th ACM International Conference on Design of Communication, pp. 221\u2013226. ACM (2009)","DOI":"10.1145\/1621995.1622039"},{"issue":"2","key":"8_CR5","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2008.49","volume":"6","author":"R. Dhamija","year":"2008","unstructured":"Dhamija, R., Dusseault, L.: The seven flaws of identity management: Usability and security challenges. IEEE Security & Privacy\u00a06(2), 24\u201329 (2008)","journal-title":"IEEE Security & Privacy"},{"issue":"1","key":"8_CR6","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/1107458.1107491","volume":"49","author":"C. Karat","year":"2006","unstructured":"Karat, C., Brodie, C., Karat, J.: Usable privacy and security for personal information management. Communications of the ACM\u00a049(1), 56\u201357 (2006)","journal-title":"Communications of the ACM"},{"key":"8_CR7","volume-title":"Security and Usablity: Designing secure systems that people can use. Theory in practice","author":"L.F. Cranor","year":"2005","unstructured":"Cranor, L.F., Garfinkel, S.: Security and Usablity: Designing secure systems that people can use. Theory in practice. O\u2019Reilly, Sebastopol (2005)"},{"key":"8_CR8","unstructured":"Schade, A., Nielsen, J.: Trust and Credibility, 2nd edn. E-Commerce User Experience, vol.\u00a09. Nielsen Norman Group (2000)"},{"issue":"3","key":"8_CR9","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/S1567-4223(03)00024-3","volume":"2","author":"B. Corbitt","year":"2003","unstructured":"Corbitt, B., Thanasankit, T., Yi, H.: Trust and e-commerce: a study of consumer perceptions. Electronic Commerce Research and Applications\u00a02(3), 203\u2013215 (2003)","journal-title":"Electronic Commerce Research and Applications"},{"key":"8_CR10","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-642-31479-7_46","volume-title":"Constructing Ambient Intelligence","author":"L. Fritsch","year":"2012","unstructured":"Fritsch, L., Groven, A.-K., Schulz, T.: On the Internet of Things, Trust is Relative (chapter 9). In: Wichert, R., Van Laerhoven, K., Gelissen, J. (eds.) AmI 2011. CCIS, vol.\u00a0277, pp. 267\u2013273. Springer, Heidelberg (2012)"},{"key":"8_CR11","unstructured":"R\u00f8ssvoll, T.H.: Trust implications for universal design of social-networking applications. In: User-Centered Trust in Interactive Systems Workshop at NordiCHI (2012)"},{"key":"8_CR12","unstructured":"R\u00f8ssvoll, T.H., Fritsch, L.: Reducing the user burden of identity management: A prototype based case study for a social-media payment application. In: Sixth International Conference on Advances in Computer-Human Interactions, ACHI (2013)"},{"key":"8_CR13","unstructured":"Fritsch, L.: Social media, e-id and privacy - background for the e-me project. Technical Report DART\/02\/2011, Norsk Regnesentral (2011)"},{"key":"8_CR14","unstructured":"Fuglerud, K.S.: Universal design in ICT services, Trondheim, Norway, 244\u2013267 (2009)"},{"issue":"3","key":"8_CR15","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/s12394-010-0075-6","volume":"3","author":"L. Fritsch","year":"2010","unstructured":"Fritsch, L., Fuglerud, K.S., Solheim, I.: Towards inclusive identity management. Identity in the Information Society\u00a03(3), 515\u2013538 (2010)","journal-title":"Identity in the Information Society"},{"key":"8_CR16","volume-title":"Proceedings of eChallenges-2011","author":"K.S. Fuglerud","year":"2011","unstructured":"Fuglerud, K.S., R\u00f8ssvoll, T.H.: Usability and accessibility of personal identification management systems in electronic services. In: Proceedings of eChallenges-2011. IIMC International Information Management Corporation Ltd., Florence (2011)"},{"key":"8_CR17","unstructured":"Fritsch, L.: Privacy visualization requirements in the internet of things - a utrustit fp7 ict project note. Technical report, Norsk Regnesentral (Norwegian Computing Center) (2012)"},{"issue":"12","key":"8_CR18","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/322796.322806","volume":"42","author":"A. Adams","year":"1999","unstructured":"Adams, A., Sasse, M.A.: Users are not the enemy: Why users compromize computer security mechanisms and how to take remedial measure. Commun. ACM\u00a042(12), 41\u201346 (1999)","journal-title":"Commun. ACM"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1007\/978-3-540-70540-6_69","volume-title":"Computers Helping People with Special Needs","author":"W. Huber","year":"2008","unstructured":"Huber, W., Vitouch, P.: Usability and accessibility on the internet: Effects of accessible web design on usability. In: Miesenberger, K., Klaus, J., Zagler, W.L., Karshmer, A.I. (eds.) ICCHP 2008. LNCS, vol.\u00a05105, pp. 482\u2013489. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction. Users and Contexts of Use"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39265-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T21:21:37Z","timestamp":1582406497000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39265-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642392641","9783642392658"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39265-8_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}