{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T23:11:00Z","timestamp":1772838660813,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642394973","type":"print"},{"value":"9783642394980","type":"electronic"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39498-0_10","type":"book-chapter","created":{"date-parts":[[2013,11,28]],"date-time":"2013-11-28T13:05:32Z","timestamp":1385643932000},"page":"211-236","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":70,"title":["Choice Architecture and Smartphone Privacy: There\u2019s a Price for That"],"prefix":"10.1007","author":[{"given":"Serge","family":"Egelman","sequence":"first","affiliation":[]},{"given":"Adrienne Porter","family":"Felt","sequence":"additional","affiliation":[]},{"given":"David","family":"Wagner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,10,8]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Acquisti, A.: Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the ACM Electronic Commerce Conference (EC \u201904), New\u00a0York. ACM, New\u00a0York (2004)","DOI":"10.1145\/988772.988777"},{"issue":"1","key":"10_CR2","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MSP.2005.22","volume":"3","author":"A. Acquisti","year":"2005","unstructured":"Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Secur. Priv. 3(1), 26\u201333 (2005). http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=1392696","journal-title":"IEEE Secur. Priv."},{"key":"10_CR3","volume-title":"What is privacy worth? In: Twenty First Workshop on Information Systems and Economics (WISE), Phoenix","author":"A. Acquisti","year":"2009","unstructured":"Acquisti, A., John, L., Loewenstein, G.: What is privacy worth? In: Twenty First Workshop on Information Systems and Economics (WISE), Phoenix (2009)"},{"key":"10_CR4","unstructured":"Agele, M., Kruegel, C., Kirda, E., Vigna, G.: Pios: detecting privacy leaks in iOS applications. In: Proceedings of the Network and Distributed System Security Symposium (NDSS), San\u00a0Diego (2011)"},{"key":"10_CR5","unstructured":"Android Developers: Manifest.permission. http:\/\/developer.android.com\/reference\/android\/Manifest.permission.html. Accessed 28 Dec 2011"},{"key":"10_CR6","unstructured":"Barkhuus, L.: Privacy in location-based services, concern vs. coolness. In: Workshop on Location System Privacy and Control at MobileHCI \u201904, Glasgow (2004)"},{"key":"10_CR7","unstructured":"Barkhuus, L., Dey, A.: Location-based services for mobile telephony: a study of users\u2019 privacy concerns. In: INTERACT\u201903, Zurich, pp.\u00a0702\u2013712 (2003)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Beautement, A., Sasse, M.A., Wonham, M.: The compliance budget: managing security behaviour in organisations. In: Proceedings of the 2008 Workshop on New Security Paradigms, NSPW \u201908, Lake Tahoe, pp.\u00a047\u201358. ACM, New York (2008)","DOI":"10.1145\/1595676.1595684"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"B\u00f6hme, R., Grossklags, J.: The security cost of cheap user interaction. In: Proceedings of the 2011 New Security Paradigms Workshop (NSPW), Marin County. ACM, New York (2011)","DOI":"10.1145\/2073276.2073284"},{"key":"10_CR10","volume-title":"Is this App safe? A large scale study on application permissions and risk signals","author":"P.H. Chia","year":"2012","unstructured":"Chia, P.H., Yamamoto, Y., Asokan, N.: Is this App safe? A large scale study on application permissions and risk signals. In: World Wide Web Conference, Lyon (2012)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Consolvo, S., Smith, I.E., Matthews, T., LaMarca, A., Tabert, J., Powledge, P.: Location disclosure to social relations: why, when, & what people want to share. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI \u201905, Portland. ACM, New York (2005)","DOI":"10.1145\/1054972.1054985"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Cvrcek, D., Kumpost, M., Matyas, V., Danezis, G.: A study on the value of location privacy. In: Proceedings of the 2006 Workshop on Privacy in an Electronic Society (WPES\u201906), Alexandria (2006)","DOI":"10.1145\/1179601.1179621"},{"key":"10_CR13","volume-title":"How much is location privacy worth? In: Proceedings of the Workshop on the Economics of Information Security (WEIS 2005), Cambridge","author":"G. Danezis","year":"2005","unstructured":"Danezis, G., Lewis, S., Anderson, R.: How much is location privacy worth? In: Proceedings of the Workshop on the Economics of Information Security (WEIS 2005), Cambridge (2005)"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Egelman, S., Tsai, J., Cranor, L.F., Acquisti, A.: Timing is everything? The effects of timing and placement of online privacy indicators. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI \u201909, Boston. ACM, New York (2009)","DOI":"10.1145\/1518701.1518752"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS), Chicago. ACM, New York (2009)","DOI":"10.1145\/1653662.1653691"},{"key":"10_CR16","unstructured":"Enck, W., Gilbert, P., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI\u201910, Vancouver. USENIX Association, Berkeley (2010)"},{"key":"10_CR17","unstructured":"Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of Android application security. In: Proceedings of the 20th USENIX Security Conference USENIX Association, Berkeley (2011)"},{"key":"10_CR18","unstructured":"Felt, A.P., Greenwood, K., Wagner, D.: The effectiveness of application permissions. In: Proceedings of the 2nd USENIX Conference on Web Application Development, WebApps\u201911, Portland, pp.\u00a07\u20137. USENIX Association, Berkeley (2011)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Egelman, S., Wagner, D.: I\u2019ve got 99 problems, but vibration ain\u2019t one: a survey of smartphone users\u2019 concerns. In: Proceedings of the ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Raleigh (2012)","DOI":"10.1145\/2381934.2381943"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the 2012 Symposium on Usable Privacy and Security (SOUPS), Washington, DC (2012)","DOI":"10.1145\/2335356.2335360"},{"key":"10_CR21","volume-title":"Power strips, prophylactics, and privacy, oh my! In: Proceedings of the 2006 Symposium on Usable Privacy and Security, Pittsburgh","author":"J. Gideon","year":"2006","unstructured":"Gideon, J., Egelman, S., Cranor, L., Acquisti, A.: Power strips, prophylactics, and privacy, oh my! In: Proceedings of the 2006 Symposium on Usable Privacy and Security, Pittsburgh (2006)"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Good, N., Dhamija, R., Grossklags, J., Aronovitz, S., Thaw, D., Mulligan, D., Konstan, J.: Stopping spyware at the gate: a user study of privacy, notice and spyware. In: Proceedings of the Symposium on Usable Privacy and Security (SOUPS 2005), Pittsburgh (2005)","DOI":"10.1145\/1073001.1073006"},{"key":"10_CR23","unstructured":"Grossklags, J., Acquisti, A.: When 25 cents is too much: an experiment on willingness-to-sell and willingness-to-protect personal information. In: Proceedings (online) of the Sixth Workshop on Economics of Information Security (WEIS), Pittsburgh (2007)"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D.: These aren\u2019t the droids you\u2019re looking for: retrofitting Android to protect data from imperious applications. In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), Chicago. ACM, New York (2011)","DOI":"10.1145\/2046707.2046780"},{"issue":"5","key":"10_CR25","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MSP.2005.137","volume":"3","author":"B. Huberman","year":"2005","unstructured":"Huberman, B., Adar, E., Fine, L.: Valuating privacy. IEEE Secur. Priv. 3(5), 22\u201325 (2005)","journal-title":"Valuating privacy. IEEE Secur. Priv."},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Iachello, G., Smith, I., Consolvo, S., Chen, M., Abowd, G.D.: Developing privacy guidelines for social location disclosure applications and services. In: Proceedings of the 2005 Symposium on Usable Privacy and Security, SOUPS \u201905, Pittsburgh, pp.\u00a065\u201376. ACM, New\u00a0York (2005)","DOI":"10.1145\/1073001.1073008"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Lederer, S., Mankoff, J., Dey, A.K.: Who wants to know what when? Privacy preference determinants in ubiquitous computing. In: CHI \u201903 Extended Abstracts on Human Factors in Computing Systems, CHI EA \u201903, Ft.\u00a0Lauderdale, pp.\u00a0724\u2013725. ACM, New York (2003)","DOI":"10.1145\/765891.765952"},{"key":"10_CR28","unstructured":"McDonald, A.M., Cranor, L.F.: Beliefs and behaviors: internet users\u2019 understanding of behavioral advertising. In: 38th Research Conference on Communication, Information and Internet Policy (Telecommunications Policy Research Conference), Arlington (2010)"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Nauman, M., Khan, S., Zhang, X.: Apex: extending Android permission model and enforcement with user-defined runtime constraints. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Beijing. ACM, New York (2010)","DOI":"10.1145\/1755688.1755732"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Pearce, P., Felt, A.P., Nunez, G., Wagner, D.: Addroid: privilege separation for applications and advertisers in Android. In: Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS), Seoul. ACM, New York (2012)","DOI":"10.21236\/ADA584780"},{"key":"10_CR31","unstructured":"Purcell, K.: Half of adult cell phone owners have apps on their phones. Pew Internet & American Life Project. http:\/\/pewinternet.org\/Reports\/2011\/Apps-update.aspx (2011)"},{"key":"10_CR32","unstructured":"Simonite, T.: Apple ignored warning on address-book access. Technology Review (MIT). http:\/\/www.technologyreview.com\/communications\/39746\/ (2012)"},{"key":"10_CR33","doi-asserted-by":"crossref","unstructured":"Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. In: Proceedings of EC\u201901: Third ACM Conference on Electronic Commerce, Tampa, pp.\u00a038\u201347 (2001)","DOI":"10.1145\/501158.501163"},{"key":"10_CR34","volume-title":"Nudge: Improving Decisions About Health, Wealth, and Happiness","author":"R. Thaler","year":"2008","unstructured":"Thaler, R., Sunstein, C.: Nudge: Improving Decisions About Health, Wealth, and Happiness. Yale University Press, New Haven\/London (2008)"},{"key":"10_CR35","unstructured":"Tsai, J., Egelman, S., Cranor, L., Acquisti, A.: The effect of online privacy information on purchasing behavior: an experimental study. In: Proceedings of the 2007 Workshop on the Economics of Information Security (WEIS\u201907), Pittsburgh (2007)"},{"key":"10_CR36","volume-title":"E-Commerce & Privacy: What Net Users Want","author":"A.F. Westin","year":"1998","unstructured":"Westin, A.F.: E-Commerce & Privacy: What Net Users Want. Privacy & American Business, Hackensack (1998)"},{"key":"10_CR37","doi-asserted-by":"crossref","unstructured":"Wiese, J., Kelley, P.G., Cranor, L.F., Dabbish, L., Hong, J.I., Zimmerman, J.: Are you close with me? Are you nearby? Investigating social groups, closeness, and willingness to share. In: Proceedings of the 13th International Conference on Ubiquitous Computing, UbiComp \u201911, Beijing, pp.\u00a0197\u2013206. ACM, New York (2011)","DOI":"10.1145\/2030112.2030140"},{"key":"10_CR38","unstructured":"Zickuhr, K.: Generations and their gadgets. http:\/\/pewinternet.org\/Reports\/2011\/Generations-and-gadgets\/Report\/Cell-phones.aspx (2011). Accessed 2 Oct 2012"}],"container-title":["The Economics of Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39498-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T20:38:34Z","timestamp":1676839114000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-39498-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642394973","9783642394980"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39498-0_10","relation":{},"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"8 October 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}