{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T07:41:52Z","timestamp":1760600512083,"version":"build-2065373602"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"3-6","license":[{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s00779-025-01846-8","type":"journal-article","created":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T12:36:27Z","timestamp":1751459787000},"page":"181-192","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Under the camera eye: effects of video-surveillance technology on users\u2019 performance and anxiety levels"],"prefix":"10.1007","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0461-2752","authenticated-orcid":false,"given":"Luciano","family":"Gamberini","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Barattini","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8562-0123","authenticated-orcid":false,"given":"Patrik","family":"Pluchino","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2334-2882","authenticated-orcid":false,"given":"Valeria","family":"Orso","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,2]]},"reference":[{"key":"1846_CR1","unstructured":"Pew Research Center, February 2019, \u201cSmartphone ownership is growing rapidly around the world, but not always equally\u201d retrieved from https:\/\/www.pewresearch.org\/global\/wp-content\/uploads\/sites\/2\/2019\/02\/Pew-Research-Center_Global-Technology-Use-2018_2019-02-05.pdf"},{"key":"1846_CR2","unstructured":"Sousa WH, Miethe TD, & Sakiyama M. (2015). Body worn cameras on police: results from a national survey of public attitudes. University of Nevada Las Vegas: Center for Crime and Justice Policy"},{"key":"1846_CR3","doi-asserted-by":"crossref","unstructured":"Bonetto M, Korshunov P, Ramponi G, & Ebrahimi T. (2015, May). Privacy in mini-drone based video surveillance. In Automatic Face and Gesture Recognition (FG), 2015 11th IEEE International Conference and Workshops on (Vol. 4 1\u20136). IEEE","DOI":"10.1109\/FG.2015.7285023"},{"key":"1846_CR4","unstructured":"Cropley J. (2017). Top video surveillance trends for 2017. Retrieved February 6, 2018, from https:\/\/cdn.ihs.com\/www\/pdf\/TEC-Video-Surveillance-Trends.pdf"},{"key":"1846_CR5","unstructured":"Laricchia F. (2023). Video surveillance camera market size worldwide 2019\u20132026. Statista. https:\/\/www.statista.com\/statistics\/477917\/video-surveillance-equipment-market-worldwide\/ Accessed 18 January 24"},{"issue":"6","key":"1846_CR6","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.ijhcs.2010.02.002","volume":"68","author":"Y Schikhof","year":"2010","unstructured":"Schikhof Y, Mulder I, Choenni S (2010) Who will watch (over) me? Humane monitoring in dementia care. Int J Hum Comput Stud 68(6):410\u2013422","journal-title":"Int J Hum Comput Stud"},{"key":"1846_CR7","doi-asserted-by":"crossref","unstructured":"Khan MNH, & Neustaedter C. (2019, May). An exploratory study of the use of drones for assisting firefighters during emergency situations. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems 1\u201314","DOI":"10.1145\/3290605.3300502"},{"key":"1846_CR8","doi-asserted-by":"publisher","first-page":"106938","DOI":"10.1016\/j.chb.2021.106938","volume":"125","author":"A Wnuk","year":"2021","unstructured":"Wnuk A, Oleksy T, Domaradzka A (2021) Prosociality and endorsement of liberty: communal and individual predictors of attitudes towards surveillance technologies. Comput Hum Behav 125:106938","journal-title":"Comput Hum Behav"},{"key":"1846_CR9","unstructured":"Thormundsson B (2024). Smart home - statistics & facts. Statista. https:\/\/www.statista.com\/topics\/2430\/smart-homes\/#topicOverview. Accessed Jan 18th 2024"},{"key":"1846_CR10","unstructured":"Bernd J, Abu-Salma R, & Frik A. (2020). {Bystanders\u2019} privacy: the perspectives of nannies on smart home surveillance. In 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20)"},{"key":"1846_CR11","doi-asserted-by":"crossref","unstructured":"Windl M, & Mayer S. (2022). The skewed privacy concerns of bystanders in smart environments. Proceedings of the ACM on Human-Computer Interaction, 6(MHCI) 1\u201321","DOI":"10.1145\/3546719"},{"key":"1846_CR12","doi-asserted-by":"publisher","first-page":"106923","DOI":"10.1016\/j.chb.2021.106923","volume":"124","author":"M Kashef","year":"2021","unstructured":"Kashef M, Visvizi A, Troisi O (2021) Smart city as a smart service system: human-computer interaction and smart city surveillance systems. Comput Hum Behav 124:106923","journal-title":"Comput Hum Behav"},{"issue":"1","key":"1846_CR13","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/s43681-022-00155-7","volume":"3","author":"MZ Iqbal","year":"2023","unstructured":"Iqbal MZ, Campbell AG (2023) Adopting smart glasses responsibly: potential benefits, ethical, and privacy concerns with Ray-Ban stories. AI and Ethics 3(1):325\u2013327","journal-title":"AI and Ethics"},{"issue":"5","key":"1846_CR14","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/j.brat.2009.02.010","volume":"47","author":"SG Hofmann","year":"2009","unstructured":"Hofmann SG, Heering S, Sawyer AT, Asnaani A (2009) How to handle anxiety: the effects of reappraisal, acceptance, and suppression strategies on anxious arousal. Behav Res Ther 47(5):389\u2013394","journal-title":"Behav Res Ther"},{"key":"1846_CR15","doi-asserted-by":"crossref","unstructured":"Albayaydh WS, & Flechais I. (2022). Exploring bystanders\u2019 privacy concerns with smart homes in Jordan. In Proceedings of the 2022 CHI Conf Human Factors in Computing Systems 1\u201324","DOI":"10.1145\/3491102.3502097"},{"key":"1846_CR16","doi-asserted-by":"crossref","unstructured":"Singhal S, Neustaedter C, Schiphorst T, Tang A, Patra A, & Pan R. (2016, May). You are being watched: bystanders\u2019 perspective on the use of camera devices in public spaces. In Proceedings of the 2016 CHI Conference Extended Abstr Human Factors in Computing Syst (pp. 3197\u20133203). ACM","DOI":"10.1145\/2851581.2892522"},{"key":"1846_CR17","doi-asserted-by":"crossref","unstructured":"Von Terzi P, Tretter S, Uhde A, Hassenzahl M, & Diefenbach S. (2021). Technology-mediated experiences and social context: relevant needs in private vs. public interaction and the importance of others for positive affect. Front Psychol 12 718315","DOI":"10.3389\/fpsyg.2021.718315"},{"issue":"2","key":"1846_CR18","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MMUL.2019.2902922","volume":"26","author":"M Koelle","year":"2019","unstructured":"Koelle M, Rose E, Boll S (2019) Ubiquitous intelligent cameras\u2014between legal nightmare and social empowerment. IEEE Multimedia 26(2):76\u201386","journal-title":"IEEE Multimedia"},{"issue":"2","key":"1846_CR19","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1037\/h0035494","volume":"100","author":"RG Geen","year":"1973","unstructured":"Geen RG (1973) Effects of being observed on short-and long-term recall. J Exp Psychol 100(2):395","journal-title":"J Exp Psychol"},{"issue":"4","key":"1846_CR20","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1080\/00222895.1978.10735166","volume":"10","author":"DM Landers","year":"1978","unstructured":"Landers DM, Snyder Bauer R, Feltz DL (1978) Social facilitation during the initial stage of motor learning: a re-examination of Martens\u2019 audience study. J Mot Behav 10(4):325\u2013337","journal-title":"J Mot Behav"},{"issue":"2","key":"1846_CR21","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1111\/j.2044-8295.1975.tb01449.x","volume":"66","author":"VR Putz","year":"1975","unstructured":"Putz VR (1975) The effects of different modes of supervision on vigilance behaviour. Br J Psychol 66(2):157\u2013160","journal-title":"Br J Psychol"},{"issue":"2","key":"1846_CR22","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1300\/J151v04n02_04","volume":"4","author":"M Constantinou","year":"2005","unstructured":"Constantinou M, Ashendorf L, McCaffrey RJ (2005) Effects of a third party observer during neuropsychological assessment: when the observer is a video camera. J Forensic Neuropsychol 4(2):39\u201347","journal-title":"J Forensic Neuropsychol"},{"issue":"CSCW1","key":"1846_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3579603","volume":"7","author":"Y Wu","year":"2023","unstructured":"Wu Y, Gui X, Wisniewski PJ, Li Y (2023) Do streamers care about bystanders\u2019 privacy? An examination of live streamers\u2019 considerations and strategies for bystanders\u2019 privacy management. Proc ACM Human-Comput Interact 7(CSCW1):1\u201329","journal-title":"Proc ACM Human-Comput Interact"},{"issue":"3","key":"1846_CR24","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1037\/0022-3514.49.3.759","volume":"49","author":"JR Cook","year":"1985","unstructured":"Cook JR (1985) Repression\u2013sensitization and approach\u2013avoidance as predictors of response to a laboratory stressor. J Pers Soc Psychol 49(3):759","journal-title":"J Pers Soc Psychol"},{"issue":"1","key":"1846_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/S0272263100012560","volume":"16","author":"PD MacIntyre","year":"1994","unstructured":"MacIntyre PD, Gardner RC (1994) The effects of induced anxiety on three stages of cognitive processing in computerized vocabulary learning. Stud Second Lang Acquis 16(1):1\u201317","journal-title":"Stud Second Lang Acquis"},{"key":"1846_CR26","doi-asserted-by":"crossref","unstructured":"Oulasvirta A, Pihlajamaa A, Perki\u00f6 J, Ray D, V\u00e4h\u00e4kangas T, Hasu T., ... & Myllym\u00e4ki P. (2012, September). Long-term effects of ubiquitous surveillance in the home. In Proceedings of the 2012 ACM Conf Ubiquitous Comput 41\u201350","DOI":"10.1145\/2370216.2370224"},{"issue":"2","key":"1846_CR27","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1191\/030913200668791096","volume":"24","author":"H Koskela","year":"2000","unstructured":"Koskela H (2000) \u2018The gaze without eyes\u2019: video-surveillance and the changing nature of urban space. Prog Hum Geogr 24(2):243\u2013265","journal-title":"Prog Hum Geogr"},{"issue":"3","key":"1846_CR28","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MPRV.2014.53","volume":"13","author":"K Wolf","year":"2014","unstructured":"Wolf K, Schmidt A, Bexheti A, Langheinrich M (2014) Lifelogging: you\u2019re wearing a camera? IEEE Pervasive Comput 13(3):8\u201312","journal-title":"IEEE Pervasive Comput"},{"issue":"5","key":"1846_CR29","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1177\/0963662510376886","volume":"21","author":"V Pavone","year":"2012","unstructured":"Pavone V, Esposti SD (2012) Public assessment of new surveillance-oriented security technologies: beyond the trade-off between privacy and security. Public Underst Sci 21(5):556\u2013572","journal-title":"Public Underst Sci"},{"key":"1846_CR30","doi-asserted-by":"crossref","unstructured":"Iachello G, Truong KN, Abowd GD, Hayes GR, & Stevens M. (2006, April). Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world. In Proceedings of the SIGCHI conference on Human Factors in computing systems 1009\u20131018. ACM","DOI":"10.1145\/1124772.1124923"},{"issue":"10","key":"1846_CR31","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1089\/cyber.2013.0585","volume":"17","author":"A Oulasvirta","year":"2014","unstructured":"Oulasvirta A, Suomalainen T, Hamari J, Lampinen A, Karvonen K (2014) Transparency of intentions decreases privacy concerns in ubiquitous surveillance. Cyberpsychol Behav Soc Netw 17(10):633\u2013638","journal-title":"Cyberpsychol Behav Soc Netw"},{"issue":"1","key":"1846_CR32","first-page":"135","volume":"1","author":"JA Taylor","year":"2008","unstructured":"Taylor JA, Lips M, Organ J (2008) Identification practices in government: citizen surveillance and the quest for public service improvement. Identity Inf Soc 1(1):135","journal-title":"Identity Inf Soc"},{"key":"1846_CR33","doi-asserted-by":"crossref","unstructured":"Faklaris C, Cafaro F, Blevins A, O\u2019Haver MA, & Singhal N. 2020 A snapshot of bystander attitudes about mobile live-streaming video in public settings. In Informatics 7 2 10. Multidiscip Digital Publ Instit.","DOI":"10.3390\/informatics7020010"},{"key":"1846_CR34","doi-asserted-by":"crossref","unstructured":"Denning T, Dehlawi Z, & Kohno T. (2014, April). In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 2377\u20132386 ACM","DOI":"10.1145\/2556288.2557352"},{"key":"1846_CR35","doi-asserted-by":"crossref","unstructured":"Jung J, & Philipose M. (2014, September). Courteous glass. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication 1307\u20131312. ACM","DOI":"10.1145\/2638728.2641711"},{"key":"1846_CR36","unstructured":"Dick E. (2020). How to address privacy questions raised by the expansion of augmented reality in public spaces. Inf Technol Innov Found"},{"key":"1846_CR37","doi-asserted-by":"publisher","first-page":"104047","DOI":"10.1016\/j.robot.2022.104047","volume":"151","author":"M Rubagotti","year":"2022","unstructured":"Rubagotti M, Tusseyeva I, Baltabayeva S, Summers D, Sandygulova A (2022) Perceived safety in physical human\u2013robot interaction\u2014a survey. Robot Auton Syst 151:104047","journal-title":"Robot Auton Syst"},{"issue":"2","key":"1846_CR38","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/3447889","volume":"28","author":"JR Cauchard","year":"2021","unstructured":"Cauchard JR, Khamis M, Garcia J, Kljun M, Brock AM (2021) Toward a roadmap for human-drone interaction. Interactions 28(2):76\u201381","journal-title":"Interactions"},{"issue":"3","key":"1846_CR39","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1515\/popets-2016-0022","volume":"2016","author":"Y Wang","year":"2016","unstructured":"Wang Y, Xia H, Yao Y, Huang Y (2016) Flying eyes and hidden controllers: a qualitative study of people\u2019s privacy perceptions of civilian drones in the US. Proc Priv Enhancing Technol 2016(3):172\u2013190","journal-title":"Proc Priv Enhancing Technol"},{"issue":"3","key":"1846_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3351269","volume":"3","author":"A Wojciechowska","year":"2019","unstructured":"Wojciechowska A, Frey J, Mandelblum E, Amichai-Hamburger Y, Cauchard JR (2019) Designing drones: factors and characteristics influencing the perception of flying robots. Proc ACM Interact Mobile Wearable Ubiquitous Technol 3(3):1\u201319","journal-title":"Proc ACM Interact Mobile Wearable Ubiquitous Technol"},{"issue":"6","key":"1846_CR41","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1111\/risa.12330","volume":"35","author":"RA Clothier","year":"2015","unstructured":"Clothier RA, Greer DA, Greer DG, Mehta AM (2015) Risk perception and the public acceptance of drones. Risk Anal 35(6):1167\u20131183","journal-title":"Risk Anal"},{"key":"1846_CR42","doi-asserted-by":"crossref","unstructured":"Lidynia C, Philipsen R, & Ziefle M. (2017). Droning on about drones\u2014acceptance of and perceived barriers to drones in civil usage contexts. In Advances in human factors in robots and unmanned systems 317\u2013329. Springer Cham","DOI":"10.1007\/978-3-319-41959-6_26"},{"key":"1846_CR43","doi-asserted-by":"crossref","unstructured":"Chang V, Chundury P, & Chetty M. (2017, May). Spiders in the sky: user perceptions of drones, privacy, and security. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems 6765\u20136776. ACM","DOI":"10.1145\/3025453.3025632"},{"key":"1846_CR44","doi-asserted-by":"publisher","first-page":"167438","DOI":"10.1109\/ACCESS.2019.2953900","volume":"7","author":"D Tezza","year":"2019","unstructured":"Tezza D, Andujar M (2019) The state-of-the-art of human\u2013drone interaction: a survey. IEEE Access 7:167438\u2013167454","journal-title":"IEEE Access"},{"key":"1846_CR45","doi-asserted-by":"crossref","unstructured":"Ljungblad S, Man Y, Bayta\u015f MA, Gamboa M, Obaid M, & Fjeld M. (2021, May). What matters in professional drone pilots\u2019 practice? An interview study to understand the complexity of their work and inform human-drone interaction research. In Proc 2021 CHI Conf Human Factors Comput Syst 1\u201316","DOI":"10.1145\/3411764.3445737"},{"key":"1846_CR46","doi-asserted-by":"crossref","unstructured":"Serafinelli E. (2022). Imagining the social future of drones. Convergence 13548565211054904","DOI":"10.1177\/13548565211054904"},{"issue":"2","key":"1846_CR47","doi-asserted-by":"publisher","first-page":"231","DOI":"10.5194\/gh-72-231-2017","volume":"72","author":"F Klauser","year":"2017","unstructured":"Klauser F, Pedrozo S (2017) Big data from the sky: popular perceptions of private drones in Switzerland. Geographica helvetica 72(2):231\u2013239","journal-title":"Geographica helvetica"},{"key":"1846_CR48","doi-asserted-by":"crossref","unstructured":"Herdel V, Yamin LJ, Ginosar E, & Cauchard JR. (2021). Public drone: attitude towards drone capabilities in various contexts. In Proc 23rd Int Conf Mobile Human-Comput Interact 1\u201316","DOI":"10.1145\/3447526.3472053"},{"key":"1846_CR49","unstructured":"Urbaniak GC, & Plous S. (1997). Research randomizer.\u00a0Retrieved July\u00a07 2008"},{"issue":"8","key":"1846_CR50","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1037\/bul0000051","volume":"142","author":"TP Moran","year":"2016","unstructured":"Moran TP (2016) Anxiety and working memory capacity: a meta-analysis and narrative review. Psychol Bull 142(8):831","journal-title":"Psychol Bull"},{"key":"1846_CR51","doi-asserted-by":"crossref","unstructured":"Cullum CM. (1998). Neuropsychological assessment of adults","DOI":"10.1016\/B0080-4270(73)00227-3"},{"key":"1846_CR52","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.jneumeth.2013.10.024","volume":"222","author":"ST Mueller","year":"2014","unstructured":"Mueller ST, Piper BJ (2014) The psychology experiment building language (PEBL) and PEBL test battery. J Neurosci Methods 222:250\u2013259","journal-title":"J Neurosci Methods"},{"issue":"2\u20133","key":"1846_CR53","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s12525-009-0012-4","volume":"19","author":"H Xu","year":"2009","unstructured":"Xu H, Gupta S (2009) The effects of privacy concerns and personal innovativeness on potential and experienced customers\u2019 adoption of location-based services. Electron Mark 19(2\u20133):137\u2013149","journal-title":"Electron Mark"},{"key":"1846_CR54","doi-asserted-by":"crossref","unstructured":"Spielberger CD. (1983). Manual for the State-Trait Anxiety Inventory STAI (form Y)(\u201c self-evaluation questionnaire\u201d)","DOI":"10.1037\/t06496-000"},{"key":"1846_CR55","unstructured":"Pedrabissi L, & Santinello M. (1989). Inventario per l\u2019ansia di \u00abStato\u00bb e di \u00abTratto\u00bb: nuova versione italiana dello STAI Forma Y: Manuale. Organizzazioni Speciali Firenze 44"},{"issue":"2","key":"1846_CR56","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1287\/isre.9.2.204","volume":"9","author":"R Agarwal","year":"1998","unstructured":"Agarwal R, Prasad J (1998) A conceptual and operational definition of personal innovativeness in the domain of information technology. Inf Syst Res 9(2):204\u2013215","journal-title":"Inf Syst Res"},{"issue":"1","key":"1846_CR57","first-page":"21","volume":"2","author":"NM Razali","year":"2011","unstructured":"Razali NM, Wah YB (2011) Power comparisons of Shapiro-Wilk, Kolmogorov-Smirnov, Lilliefors and Anderson-Darling tests. J Stat Model Anal 2(1):21\u201333","journal-title":"J Stat Model Anal"},{"issue":"1","key":"1846_CR58","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1111\/j.2517-6161.1995.tb02031.x","volume":"57","author":"Y Benjamini","year":"1995","unstructured":"Benjamini Y, Hochberg Y (1995) Controlling the false discovery rate: a practical and powerful approach to multiple testing. J Roy Stat Soc Ser B (Methodol) 57(1):289\u2013300. https:\/\/doi.org\/10.1111\/j.2517-6161.1995.tb02031.x","journal-title":"J Roy Stat Soc Ser B (Methodol)"},{"issue":"1","key":"1846_CR59","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s00779-009-0229-4","volume":"14","author":"DH Nguyen","year":"2010","unstructured":"Nguyen DH, Hayes GR (2010) Information privacy in institutional and end-user tracking and recording technologies. Pers Ubiquit Comput 14(1):53\u201372","journal-title":"Pers Ubiquit Comput"},{"issue":"4","key":"1846_CR60","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1162\/DAED_a_00113","volume":"140","author":"H Nissenbaum","year":"2011","unstructured":"Nissenbaum H (2011) A contextual approach to privacy online. Daedalus 140(4):32\u201348","journal-title":"Daedalus"},{"key":"#cr-split#-1846_CR61.1","doi-asserted-by":"crossref","unstructured":"Davis FD. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly, 319-340.","DOI":"10.2307\/249008"},{"key":"#cr-split#-1846_CR61.2","doi-asserted-by":"crossref","unstructured":"Venkatesh, V., & Bala, H. (2008). Technology acceptance model 3 and a research agenda on interventions. Decis Sci 39(2) 273-315","DOI":"10.1111\/j.1540-5915.2008.00192.x"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-025-01846-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00779-025-01846-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-025-01846-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T07:14:40Z","timestamp":1760598880000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00779-025-01846-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,2]]},"references-count":62,"journal-issue":{"issue":"3-6","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["1846"],"URL":"https:\/\/doi.org\/10.1007\/s00779-025-01846-8","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"type":"print","value":"1617-4909"},{"type":"electronic","value":"1617-4917"}],"subject":[],"published":{"date-parts":[[2025,7,2]]},"assertion":[{"value":"22 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}