{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T16:51:29Z","timestamp":1732035089261},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662438251"},{"type":"electronic","value":"9783662438268"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43826-8_7","type":"book-chapter","created":{"date-parts":[[2014,6,25]],"date-time":"2014-06-25T03:50:01Z","timestamp":1403668201000},"page":"92-107","source":"Crossref","is-referenced-by-count":7,"title":["Usable Privacy for Mobile Sensing Applications"],"prefix":"10.1007","author":[{"given":"Delphine","family":"Christin","sequence":"first","affiliation":[]},{"given":"Franziska","family":"Engelmann","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Google Now. The right informaiton at just the right time, \n                    \n                      http:\/\/www.google.com\/landing\/now\/\n                    \n                    \n                   (accessed in August 2013)"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/11957454_3","volume-title":"Privacy Enhancing Technologies","author":"A. Acquisti","year":"2006","unstructured":"Acquisti, A., Gross, R.: Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol.\u00a04258, pp. 36\u201358. Springer, Heidelberg (2006)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Ahern, S., Eckles, D., Good, N.S., King, S., Naaman, M., Nair, R.: Over-exposed? Privacy Patterns and Considerations in Online and Mobile Photo Sharing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI), pp. 357\u2013366 (2007)","DOI":"10.1145\/1240624.1240683"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Bilandzic, M., Banholzer, M., Peev, D., Georgiev, V., Balagtas-Fernandez, F., De Luca, A.: Laermometer: A Mobile Noise Mapping Application. In: Proceedings of the 5th ACM Nordic Conference on Human-Computer Interaction (NordiCHI), pp. 415\u2013418 (2008)","DOI":"10.1145\/1463160.1463208"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Brush, A., Krumm, J., Scott, J.: Exploring End User Preferences for Location Obfuscation, Location-based Services, and the Value of Location. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing (Ubicomp), pp. 95\u2013104 (2010)","DOI":"10.1145\/1864349.1864381"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Christin, D., B\u00fcchner, C., Leibecke, N.: What\u2019s the Value of Your Privacy? Exploring Factors That Influence Privacy-sensitive Contributions to Participatory Sensing Applications. In: Proceedings of the IEEE Workshop on Privacy and Anonymity for the Digital Economy, LCN Workshop (2013)","DOI":"10.1109\/LCNW.2013.6758532"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Christin, D., Guillemet, J., Reinhardt, A., Hollick, M., Kanhere, S.S.: Privacy-preserving Collaborative Path Hiding for Participatory Sensing Applications. In: Proceedings of the 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), pp. 341\u2013350 (2011)","DOI":"10.1109\/MASS.2011.41"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Christin, D., Pons-Sorolla, R., Hollick, D., Kanhere, M., TrustMeter, S.S.: A Trust Assessment Framework for Collaborative Path Hiding in Participatory Sensing Applications. In: Proceedings of the 9th IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) (2014)","DOI":"10.1109\/ISSNIP.2014.6827614"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Christin, D., Reinhardt, A., Hollick, M., Trumpold, K.: Exploring User Preferences for Privacy Interfaces in Mobile Sensing Applications. In: Proceedings of 11th ACM International Conference on Mobile and Ubiquitous Multimedia (MUM). pp. 14:1\u201314:10 (2012)","DOI":"10.1145\/2406367.2406385"},{"issue":"11","key":"7_CR10","doi-asserted-by":"publisher","first-page":"1928","DOI":"10.1016\/j.jss.2011.06.073","volume":"84","author":"D. Christin","year":"2011","unstructured":"Christin, D., Reinhardt, A., Kanhere, S.S., Hollick, M.: A Survey on Privacy in Mobile Participatory Sensing Applications. Journal of Systems and Software\u00a084(11), 1928\u20131946 (2011)","journal-title":"Journal of Systems and Software"},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/1165734.1165735","volume":"13","author":"L.F. Cranor","year":"2006","unstructured":"Cranor, L.F., Guduru, P., Arjula, M.: User Interfaces for Privacy Agents. ACM Transactions on Computer-Human Interacteration (TOCHI)\u00a013, 135\u2013178 (2006)","journal-title":"ACM Transactions on Computer-Human Interacteration (TOCHI)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Good, N.S., Krekelberg, A.: Usability and Privacy: A Study of Kazaa P2P File-sharing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI), pp. 137\u2013144 (2003)","DOI":"10.1145\/642611.642636"},{"key":"7_CR13","unstructured":"Hansen, M., Fischer-H\u00fcbner, S., Pettersson, J., Bergmann, M.: Transparency Tools for User-controlled Identity Management. In: Proceedings of the 17th eChallenges Conference (e-2007), pp. 1360\u20131367 (2007)"},{"key":"7_CR14","unstructured":"International Communication Union: The World in 2013: ICT Facts and Figures, \n                    \n                      http:\/\/www.itu.int\n                    \n                    \n                   (accessed in May 2013)"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-642-01516-8_13","volume-title":"Pervasive Computing","author":"P. Klasnja","year":"2009","unstructured":"Klasnja, P., Consolvo, S., Choudhury, T., Beckwith, R., Hightower, J.: Exploring Privacy Concerns about Personal Sensing. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol.\u00a05538, pp. 176\u2013183. Springer, Heidelberg (2009)"},{"issue":"6","key":"7_CR16","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/s00779-004-0304-9","volume":"8","author":"S. Lederer","year":"2004","unstructured":"Lederer, S., Hong, I., Dey, K., Landay, A.: Personal Privacy Through Understanding and Action: Five Pitfalls for Designers. Personal Ubiquitous Computing\u00a08(6), 440\u2013454 (2004)","journal-title":"Personal Ubiquitous Computing"},{"key":"7_CR17","unstructured":"Lipford, H., Besmer, A.: Users\u2019 (Mis)Conceptions of Social Applications. In: Proceedings of the 36th Graphics Interface Conference (GI), pp. 63\u201370 (2010)"},{"key":"7_CR18","unstructured":"Lipford, H., Besmer, A., Watson, J.: Understanding Privacy Settings in Facebook with an Audience View. In: Proceedings of the 1st Conference on Usability, Psychology, and Security (UPSEC), pp. 1\u20138 (2008)"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Maisonneuve, N., Stevens, M., Niessen, M.E., Steels, L.: NoiseTube: Measuring and Mapping Noise Pollution with Mobile Phones. In: Proceedings of the 4th International Symposium on Information Technologies in Environmental Engineering (ITEE), pp. 215\u2013228 (2009)","DOI":"10.1007\/978-3-540-88351-7_16"},{"key":"7_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-540-40956-4_8","volume-title":"Privacy Enhancing Technologies","author":"A.S. Patrick","year":"2003","unstructured":"Patrick, A.S., Kenny, S.: From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions. In: Dingledine, R. (ed.) PET 2003. LNCS, vol.\u00a02760, pp. 107\u2013124. Springer, Heidelberg (2003)"},{"key":"7_CR21","unstructured":"Warzel, C.: This Is What It Looks Like When Your Phone Tracks Your Every Move, \n                    \n                      http:\/\/www.buzzfeed.com\n                    \n                    \n                   (accessed in August 2013)"},{"key":"7_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/3-540-36159-6_24","volume-title":"Information and Communications Security","author":"K.-P. Yee","year":"2002","unstructured":"Yee, K.-P.: User Interaction Design for Secure Systems. In: Deng, R., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol.\u00a02513, pp. 278\u2013290. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practice. Securing the Internet of Things"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43826-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T04:23:24Z","timestamp":1558931004000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43826-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662438251","9783662438268"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43826-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}