{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T16:33:16Z","timestamp":1775320396197,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,9,11]],"date-time":"2013-09-11T00:00:00Z","timestamp":1378857600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1007\/s10676-013-9329-y","type":"journal-article","created":{"date-parts":[[2013,9,11]],"date-time":"2013-09-11T03:41:00Z","timestamp":1378870860000},"page":"15-26","source":"Crossref","is-referenced-by-count":15,"title":["Contextual integrity\u2019s decision heuristic and the tracking by social network sites"],"prefix":"10.1007","volume":"16","author":[{"given":"Rath Kanha","family":"Sar","sequence":"first","affiliation":[]},{"given":"Yeslam","family":"Al-Saggaf","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,9,11]]},"reference":[{"key":"9329_CR1","doi-asserted-by":"crossref","unstructured":"Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing and privacy on the Facebook. In P. Golle & G. Danezis (Eds.), Privacy enhancing technologies. Springer, Berlin.","DOI":"10.1007\/11957454_3"},{"key":"9329_CR2","unstructured":"Barocas, S., & Nissenbaum, H. (2009). In Proceedings of the engaging data forum: The first international forum on the application and management of personal electronic information. http:\/\/www.nyu.edu\/projects\/nissenbaum\/papers\/ED_SII_On_Notice.pdf ."},{"key":"9329_CR3","unstructured":"Barth, A., Datta, A., Mitchelle, J. C., & Nissenbaum, H. (2006). In 2006 IEEE symposium on security and privacy (pp. 15 \u2013198). Berkeley\/Oakland, CA: IEEE."},{"key":"9329_CR4","doi-asserted-by":"crossref","unstructured":"Boyd, D., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(12), 210. http:\/\/jcmc.indiana.edu\/vol13\/issue1\/boyd.ellison.html .","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"issue":"1","key":"9329_CR5","doi-asserted-by":"crossref","first-page":"23","DOI":"10.6017\/ital.v26i1.3286","volume":"26","author":"L. Charnigo","year":"2007","unstructured":"Charnigo, L., & Barnett-Ellis, P. (2007). Checking out Facebook.com: The impact of a digital trend on academic libraries. Information Technology and Libraries, 26(1), 23.","journal-title":"Information Technology and Libraries"},{"key":"9329_CR6","doi-asserted-by":"crossref","first-page":"1337","DOI":"10.1016\/j.chb.2010.07.028","volume":"27","author":"C. M. K. Cheung","year":"2011","unstructured":"Cheung, C. M. K., Chiu, P. Y., & Lee, M. K. O. (2011). Online social networks: Why do students use facebook? Computer in Human Behaviour 27, 1337.","journal-title":"Computer in Human Behaviour"},{"key":"9329_CR7","volume-title":"Internetworking with TCP\/IP","author":"D. E. Comer","year":"2000","unstructured":"Comer, D. E. (2000) Internetworking with TCP\/IP. USA: Prentice Hall."},{"key":"9329_CR8","unstructured":"Facebook. (2011). Facebook developers: Like button. http:\/\/developers.facebook.com\/docs\/reference\/plugins\/like\/ ."},{"key":"9329_CR9","unstructured":"Facebook. (2012a). Data use policy. http:\/\/www.facebook.com\/about\/privacy\/ ."},{"key":"9329_CR10","unstructured":"Facebook. (2012b). Facebook: About. http:\/\/www.facebook.com\/facebook\/info ."},{"key":"9329_CR11","unstructured":"Google. (2011). Plus one: Recommend on search, share on google +. http:\/\/www.google.com\/+1\/button\/ ."},{"key":"9329_CR12","unstructured":"Google. (2012). Privacy policy. http:\/\/www.google.com\/intl\/en-GB\/policies\/privacy\/ ."},{"key":"9329_CR14","unstructured":"Grodzinsky, F. S., & Tavani, H. T. (2010). Applying the contextual integrity model of privacy to personal blogs in the blogosphere. International Journal of Internet Research Ethics, 3(12)."},{"issue":"1","key":"9329_CR13","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1145\/2095266.2095270","volume":"41","author":"F. S. Grodzinsky","year":"2011","unstructured":"Grodzinsky, F. S., & Tavani, H. T. (2011). Privacy in the cloud: Applying Nissenbaum\u2019s theory of contextual integrity. SIGCAS Computers and Society 41(1), 38. doi: 10.1145\/2095266.2095270 .","journal-title":"SIGCAS Computers and Society"},{"key":"9329_CR15","unstructured":"Hormozi, A. M. (2005). Cookies and privacy. UEDP 32, 1. http:\/\/pubget.com\/paper\/pgtmp_0546b9eb19bab1a955d7219154ec4381 ."},{"issue":"4","key":"9329_CR16","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/s10676-010-9224-8","volume":"13","author":"G. Hull","year":"2011","unstructured":"Hull, G., Lipford, H. R., & Latulipe, C. (2011). Contextual gaps: Privacy issues on Facebook. Ethics and Information Technology, 13(4), 289.","journal-title":"Ethics and Information Technology"},{"key":"9329_CR17","doi-asserted-by":"crossref","unstructured":"Joinson, A. N. (2008). In Proceedings of the twenty-sixth annual SIGCHI conference on human factors in computing systems (pp. 1027\u20131036). New York, NY: ACM CHI \u201908. doi: 10.1145\/1357054.1357213 .","DOI":"10.1145\/1357054.1357213"},{"key":"9329_CR18","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1145\/1672308.1672328","volume":"40","author":"B. Krishnamurthy","year":"2010","unstructured":"Krishnamurthy, B., & Wills, C. E. (2010a). On the leakage of personally identifiable information via online social networks. SIGCOMM Computer Communication Review, 40, 112. doi: 10.1145\/1672308.1672328 .","journal-title":"SIGCOMM Computer Communication Review"},{"key":"9329_CR19","unstructured":"Krishnamurthy, B., & Wills, C. E. (2010b). In Proceedings of the 3rd conference on online social networks (p. 4). Berkeley, CA: USENIX Association. WOSN\u201910. http:\/\/portal.acm.org\/citation.cfm?id=1863190.1863194 ."},{"key":"9329_CR20","unstructured":"Krishnamurthy, B., & Naryshkin, K. (2011). In Proceedings of the Web2.0 security and privacy workshop (pp. 1\u201310). Oakland, CA."},{"key":"9329_CR21","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1145\/502152.502153","volume":"1","author":"D. M. Kristol","year":"2001","unstructured":"Kristol, D. M. (2001). HTTP Cookies: Standards, privacy, and politics. ACM Transactions on Internet Technology, 1, 151. doi: 10.1145\/502152.502153 .","journal-title":"ACM Transactions on Internet Technology"},{"key":"9329_CR22","doi-asserted-by":"crossref","DOI":"10.1145\/1180875.1180901","volume-title":"A Face(book) in the crowd: Social searching vs. social browsing","author":"C. Lampe","year":"2006","unstructured":"Lampe, C., Ellison, N., & Steinfield, C. (2006). A Face(book) in the crowd: Social searching vs. social browsing. New York: ACM Press."},{"issue":"4","key":"9329_CR23","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1108\/14779960810921141","volume":"6","author":"R. Lucas","year":"2008","unstructured":"Lucas, R., & Mason, N. (2008). A survey of ethics and regulation within the ICT industry in Australia: Ethics education. Journal of Information, Communication and Ethics in Society, 6(4), 349.","journal-title":"Journal of Information, Communication and Ethics in Society"},{"key":"9329_CR24","unstructured":"Mayer, J. (2011). Tracking the trackers: Where everybody knows your username. http:\/\/cyberlaw.stanford.edu\/node\/6740 ."},{"issue":"3","key":"9329_CR25","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1207\/s15327019eb0703_3","volume":"7","author":"H. Nissenbaum","year":"1997","unstructured":"Nissenbaum, H. (1997). Toward an approach to privacy in public: Challenges of information technology. Ethics and Behavior, 7(3), 207.","journal-title":"Ethics and Behavior"},{"key":"9329_CR26","first-page":"559","volume":"17","author":"H. Nissenbaum","year":"1998","unstructured":"Nissenbaum, H. (1998). Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy, 17, 559.","journal-title":"Law and Philosophy"},{"issue":"1","key":"9329_CR27","first-page":"119","volume":"79","author":"H. Nissenbaum","year":"2004","unstructured":"Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review Association, 79(1), 119.","journal-title":"Washington Law Review Association"},{"key":"9329_CR28","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"H. Nissenbaum","year":"2010","unstructured":"Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford, CA: Stanford University Press."},{"key":"9329_CR29","doi-asserted-by":"crossref","unstructured":"Nissenbaum, H. (2011). A contextual approach to privacy online. The Journal of the American Academy of Art and Sciences, 140(4), 32.","DOI":"10.1162\/DAED_a_00113"},{"key":"9329_CR30","doi-asserted-by":"crossref","unstructured":"Pempek, T. A., Yermolayeva, Y. A., & Calvert, S. L. (2009). College students\u2019 social networking experiences on Facebook. Journal of Applied Developmental Psychology, 30(3), 227. http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0193397308001408 .","DOI":"10.1016\/j.appdev.2008.12.010"},{"key":"9329_CR31","unstructured":"Purcell, K. (2011). Search and email still top the list of most popular online activities. http:\/\/pewinternet.org\/\/media\/\/Files\/Reports\/2012\/PIP_Digital_differences_041312.pdf ."},{"issue":"1","key":"9329_CR32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.1467-9973.2006.00474.x","volume":"36","author":"H. T. Tavani","year":"2007","unstructured":"Tavani, H. T. (2007). Philosophical theories of privacy: Implications for an adequate online privacy policy. Metaphilosophy, 38(1), 1. doi: 10.1111\/j.1467-9973.2006.00474.x .","journal-title":"Metaphilosophy"},{"key":"9329_CR33","unstructured":"Twitter. (2011). Twitter buttons. http:\/\/twitter.com\/about\/resources\/buttons ."},{"key":"9329_CR34","unstructured":"Twitter. (2012). Twitter privacy policy. https:\/\/twitter.com\/privacy ."},{"key":"9329_CR35","unstructured":"Twitter. (2013). Previous twitter privacy policies. http:\/\/twitter.com\/privacy\/previous ."},{"issue":"6","key":"9329_CR36","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.2307\/1120997","volume":"66","author":"A. F. Westin","year":"1966","unstructured":"Westin, A. F. (1966). Science, privacy, and freedom: Issues and proposals for the 1970\u2019s. Part I\u2014The current impact of surveillance on privacy. Columbia Law Review, 66(6), 1003.","journal-title":"Columbia Law Review"},{"issue":"1","key":"9329_CR37","first-page":"39","volume":"7","author":"K. Young","year":"2009","unstructured":"Young, K. (2009). Online social networking: An Australian perspective. International Journal of Emerging Technologies and Society, 7(1), 39.","journal-title":"International Journal of Emerging Technologies and Society"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-013-9329-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-013-9329-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-013-9329-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T18:16:25Z","timestamp":1563905785000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-013-9329-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,11]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,3]]}},"alternative-id":["9329"],"URL":"https:\/\/doi.org\/10.1007\/s10676-013-9329-y","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,9,11]]}}}