{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T16:49:43Z","timestamp":1773852583195,"version":"3.50.1"},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,4,24]],"date-time":"2020-04-24T00:00:00Z","timestamp":1587686400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,4,24]],"date-time":"2020-04-24T00:00:00Z","timestamp":1587686400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["688520 \u2013 TeSLA \u2013 H2020 \u2013 ICT \u2013 2015\/H2015 \u2013 ICT \u2013 2015"],"award-info":[{"award-number":["688520 \u2013 TeSLA \u2013 H2020 \u2013 ICT \u2013 2015\/H2015 \u2013 ICT \u2013 2015"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2020,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Personal data use is increasingly permeating our everyday life. Informed consent for personal data use is a central instrument for ensuring the protection of personal data. However, current informed consent practices often fail to actually inform data subjects about the use of personal data. This article presents the results of a requirements analysis for informed consent from both a legal and usability perspective, considering the application context of educational assessment. The requirements analysis is based on European Union (EU) law and a review of current practices. As the main outcome, the article presents a blueprint which will be the basis for the development of an informed consent template that supports data controllers in establishing an effective and efficient informed consent form. Because the blueprint, and subsequently, the template, distinguishes between legal and usability requirements, it also provides the basis for the mapping of legal requirements in other (non-European) contexts.<\/jats:p>","DOI":"10.1007\/s10676-020-09531-5","type":"journal-article","created":{"date-parts":[[2020,4,24]],"date-time":"2020-04-24T15:03:36Z","timestamp":1587740616000},"page":"223-238","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Exploring solutions to the privacy paradox in the context of e-assessment: informed consent revisited"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1633-9124","authenticated-orcid":false,"given":"Ekaterina","family":"Muravyeva","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5104-7648","authenticated-orcid":false,"given":"Jos\u00e9","family":"Janssen","sequence":"additional","affiliation":[]},{"given":"Marcus","family":"Specht","sequence":"additional","affiliation":[]},{"given":"Bart","family":"Custers","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,24]]},"reference":[{"key":"9531_CR1","doi-asserted-by":"publisher","first-page":"285","DOI":"10.4324\/9781351028264-26","volume-title":"The Routledge handbook of the ethics of consent","author":"J Ach","year":"2018","unstructured":"Ach, J. (2018). Consent and medical treatment. In A. M\u00fcller & P. Schaber (Eds.), The Routledge handbook of the ethics of consent (pp. 285\u2013297). Abington: Taylor & Francis Group."},{"key":"9531_CR2","doi-asserted-by":"publisher","unstructured":"Bashir, M., Hayes, C., Lambert, A. D., & Kesan, J. P. (2015). Online privacy and informed consent: The dilemma of information asymmetry. In Proceedings of the Association for Information Science and Technology, ASIST 2015 (pp. 1\u201310). Saint Louis, MO. https:\/\/doi.org\/10.1002\/pra2.2015.145052010043","DOI":"10.1002\/pra2.2015.145052010043"},{"issue":"4","key":"9531_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/23294515.2014.938199","volume":"5","author":"O Berger","year":"2014","unstructured":"Berger, O., Sand, K., Johansen, I., Loge, J. H., Kaasa, S., & Gr\u00f8nberg, B. H. (2014). What do cancer patients and members of ethical review boards in Norway consider important elements of informed consent documents? AJOB Empirical Bioethics, 5(4), 1\u201313. https:\/\/doi.org\/10.1080\/23294515.2014.938199.","journal-title":"AJOB Empirical Bioethics"},{"key":"9531_CR4","doi-asserted-by":"publisher","first-page":"222","DOI":"10.4324\/9781351028264-21","volume-title":"The Routledge handbook of the ethics of consent","author":"B Bix","year":"2018","unstructured":"Bix, B. (2018). Consent and contracts. In A. M\u00fcller & P. Schaber (Eds.), The Routledge handbook of the ethics of consent (pp. 222\u2013235). Abington: Taylor & Francis Group."},{"issue":"2","key":"9531_CR5","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1080\/10447318.2014.986634","volume":"31","author":"B Blazica","year":"2015","unstructured":"Blazica, B., & Lewis, J. R. (2015). A Slovene translation of the system usability scale: The SUS-SI. International Journal of Human-Computer Interaction, 31(2), 112\u2013117. https:\/\/doi.org\/10.1080\/10447318.2014.986634.","journal-title":"International Journal of Human-Computer Interaction"},{"key":"9531_CR6","doi-asserted-by":"publisher","unstructured":"B\u00f6hme, R., & K\u00f6psell, S. (2010). Trained to accept? A field experiment on consent dialogs. In Proceedings of the 28th International Conference on Human Factors in Computing Systems (pp. 2403\u20132406). Atlanta, GA. https:\/\/doi.org\/10.1145\/1753326.1753689.","DOI":"10.1145\/1753326.1753689"},{"key":"9531_CR7","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1016\/j.socscimed.2007.08.006","volume":"65","author":"M Burgess","year":"2007","unstructured":"Burgess, M. (2007). Proposing modesty for informed consent. Social Science & Medicine, 65, 2284\u20132295. https:\/\/doi.org\/10.1016\/j.socscimed.2007.08.006.","journal-title":"Social Science & Medicine"},{"issue":"2","key":"9531_CR8","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1300\/J067v24n01","volume":"24","author":"E Burkemper","year":"2008","unstructured":"Burkemper, E. (2004). Informed consent in social work ethics education: Guiding student education with an informed consent template. Journal of Teaching in Social Work, 24(2), 141\u2013160. https:\/\/doi.org\/10.1300\/J067v24n01.","journal-title":"Journal of Teaching in Social Work"},{"key":"9531_CR9","unstructured":"Burmeister, O. K. (2000). Usability testing: Revisiting informed consent procedures for testing internet sites. In Proceedings of the 2nd Australian Institute of Computer Ethics Conference (pp. 3\u20139). Canberra. Retrieved from https:\/\/dl.acm.org\/citation.cfm?id=563717."},{"key":"9531_CR10","doi-asserted-by":"publisher","unstructured":"Bustos-Jim\u00e9nez, J. (2014). Do we really need an online informed consent? Discussion from a technocratic point of view. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2014 (pp. 629\u2013634). Seattle, WA. https:\/\/doi.org\/10.1145\/2638728.2641683.","DOI":"10.1145\/2638728.2641683"},{"key":"9531_CR11","first-page":"21","volume":"59","author":"A Cheek","year":"2008","unstructured":"Cheek, A. (2008). International plain language standards\u2014the view from the Center for Plain Language. Clarity, 59, 21\u201328.","journal-title":"Clarity"},{"key":"9531_CR12","volume-title":"An introduction to information design","author":"K Coates","year":"2014","unstructured":"Coates, K., & Ellison, A. (2014). An introduction to information design. London: Laurence King Publishing."},{"key":"9531_CR13","doi-asserted-by":"publisher","unstructured":"Coles-Kemp, L., & Kani-Zabihi, E. (2010). On-line privacy and consent: A Dialogue, Not a Monologue. In Proceedings of the New Security Paradigms Workshop, NSPW 2010 (pp. 95\u2013105). Concord, MA. https:\/\/doi.org\/10.1145\/1900546.1900560","DOI":"10.1145\/1900546.1900560"},{"issue":"2","key":"9531_CR14","first-page":"429","volume":"24","author":"KD Collins","year":"2005","unstructured":"Collins, K. D. (2005). The use of plain-language principles in texas litigation formbooks. Review of Litigation, 24(2), 429\u2013472.","journal-title":"Review of Litigation"},{"key":"9531_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.clsr.2016.11.005","volume":"5","author":"E Cradock","year":"2016","unstructured":"Cradock, E., Stalla-Bourdillon, S., & Millard, D. (2016). Nobody puts data in a corner? Why a new approach to categorising personal data is required for the obligation to inform. Computer Law & Security Review: The International Journal of Technology Law and Practice, 5, 1\u201317. https:\/\/doi.org\/10.1016\/j.clsr.2016.11.005.","journal-title":"Computer Law & Security Review: The International Journal of Technology Law and Practice"},{"key":"9531_CR16","volume-title":"Educational research: Planning, conducting, and evaluating quantitative and qualitative research","author":"JW Creswell","year":"2013","unstructured":"Creswell, J. W. (2013). Educational research: Planning, conducting, and evaluating quantitative and qualitative research (4th ed.). London: Pearson Education Limited.","edition":"4"},{"issue":"11","key":"9531_CR17","doi-asserted-by":"publisher","first-page":"1347","DOI":"10.1080\/08870446.2019.1606222","volume":"34","author":"R Crutzen","year":"2019","unstructured":"Crutzen, R., Peters, G. Y., & Mondschein, C. (2019). Why and how we should care about the General Data Protection Regulation. Psychology & Health, 34(11), 1347\u20131357. https:\/\/doi.org\/10.1080\/08870446.2019.1606222.","journal-title":"Psychology & Health"},{"issue":"1","key":"9531_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/2053951715624935","volume":"3","author":"B Custers","year":"2016","unstructured":"Custers, B. (2016). Click here to consent forever: expiry dates for informed consent. Big Data & Society, 3(1), 1\u20136. https:\/\/doi.org\/10.1177\/2053951715624935.","journal-title":"Big Data & Society"},{"issue":"3","key":"9531_CR19","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1002\/1944-2866.POI366","volume":"6","author":"B Custers","year":"2014","unstructured":"Custers, B., Van der Hof, S., & Schermer, B. (2014). Privacy expectations of social media users: The role of informed consent in privacy policies. Policy and Internet, 6(3), 268\u2013295. https:\/\/doi.org\/10.1002\/1944-2866.POI366.","journal-title":"Policy and Internet"},{"issue":"3","key":"9531_CR20","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1080\/01411920120048340","volume":"27","author":"M David","year":"2001","unstructured":"David, M., Edwards, R., & Alldred, P. (2001). Children and school-based research: \u2018informed consent\u2019 or \u2018educated consent\u2019? British Educational Research Journal, 27(3), 347\u2013365. https:\/\/doi.org\/10.1080\/01411920120048340.","journal-title":"British Educational Research Journal"},{"key":"9531_CR21","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.futures.2014.09.002","volume":"71","author":"T Dolan","year":"2015","unstructured":"Dolan, T. (2015). Does the principle of informed consent apply to futures studies research? Futures, 71, 114\u2013121. https:\/\/doi.org\/10.1016\/j.futures.2014.09.002.","journal-title":"Futures"},{"key":"9531_CR22","doi-asserted-by":"publisher","unstructured":"Drachsler, H., & Greller, W. (2016). Privacy and analytics\u2014it\u2019s a DELICATE issue: A checklist for trusted learning analytics. In Proceedings of the 6th Conference on Learning Analytics and Knowledge, LAK 2016 (pp. 1\u201310). Edinburgh: ACM. https:\/\/doi.org\/10.1145\/2883851.2883893","DOI":"10.1145\/2883851.2883893"},{"issue":"1","key":"9531_CR23","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1207\/S15327809JLS1101_4","volume":"11","author":"DC Edelson","year":"2009","unstructured":"Edelson, D. C. (2009). Design research: What we learn when we engage in design. Journal of the Learning Sciences, 11(1), 105\u2013121.","journal-title":"Journal of the Learning Sciences"},{"key":"9531_CR24","unstructured":"Elsen, M., Elshout, S., Kieruj, N., & Benning, T. (2014). Onderzoek naar privacyafwegingen. Retrieved from https:\/\/www.centerdata.nl\/sites\/default\/files\/bestanden\/online_privacy.pdf"},{"key":"9531_CR25","unstructured":"Ergonomic Requirements for Office Work with Visual Display Terminals (VDTs)\u2014Part 11: Guidance on usability, Pub. L. No. ISO 9241\u201311:1998 (1998). International Organization for Standardization. Retrieved from https:\/\/www.iso.org\/obp\/ui\/#iso:std:iso:9241:-11:ed-1:v1:en"},{"key":"9531_CR26","doi-asserted-by":"publisher","first-page":"272","DOI":"10.4324\/9781351028264-25","volume-title":"The Routledge handbook of the ethics of consent","author":"N Eyal","year":"2018","unstructured":"Eyal, N. (2018). Infomed consent. In A. M\u00fcller & P. Schaber (Eds.), The Routledge handbook of the ethics of consent (pp. 272\u2013285). Abington: Taylor & Francis Group."},{"key":"9531_CR27","volume-title":"The EU General Data Protection Regulation (GDPR): A commentary","author":"L Feiler","year":"2018","unstructured":"Feiler, L., Forgo, N., & Weigly, M. (2018). The EU General Data Protection Regulation (GDPR): A commentary. London: Globe Law and Business."},{"key":"9531_CR28","unstructured":"Garwood, K. (2014). Plain, but not simple: Plain language research with readers, writers, and texts."},{"issue":"3","key":"9531_CR29","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1080\/08923640701341653","volume":"21","author":"J Gaytan","year":"2007","unstructured":"Gaytan, J., & McEwen, B. C. (2007). Effective online instructional and assessment strategies. American Journal of Distance Education, 21(3), 117\u2013132. https:\/\/doi.org\/10.1080\/08923640701341653.","journal-title":"American Journal of Distance Education"},{"issue":"6","key":"9531_CR30","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1080\/10494820.2016.1220052","volume":"24","author":"S Greener","year":"2016","unstructured":"Greener, S. (2016). Unlearning with technology. Interactive Learning Environments, 24(6), 1027\u20131029. https:\/\/doi.org\/10.1080\/10494820.2016.1220052.","journal-title":"Interactive Learning Environments"},{"key":"9531_CR31","doi-asserted-by":"publisher","first-page":"18","DOI":"10.7748\/nop2004.06.16.4.18.c2314","volume":"16","author":"G Grout","year":"2004","unstructured":"Grout, G. (2004). Using negotiated consent in research and practice. Nursing Older People, 16, 18\u201320. https:\/\/doi.org\/10.7748\/nop2004.06.16.4.18.c2314.","journal-title":"Nursing Older People"},{"key":"9531_CR32","doi-asserted-by":"publisher","unstructured":"Hand, D. J. (2006). Protection or privacy? Data mining and personal data. In Proceedings of the 10th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2006 (pp. 1\u201310). Singapore. https:\/\/doi.org\/10.1007\/11731139_1.","DOI":"10.1007\/11731139_1"},{"key":"9531_CR33","doi-asserted-by":"publisher","first-page":"44","DOI":"10.4324\/9781351028264-5","volume-title":"The Routledge handbook of the ethics of consent","author":"H Hurd","year":"2018","unstructured":"Hurd, H. (2018). The normative force of consent. In A. M\u00fcller & P. Schauber (Eds.), The Routledge handbook of the ethics of consent (pp. 44\u201355). Abington: Taylor & Francis Group."},{"key":"9531_CR34","unstructured":"Jansen, M. (2017). De privacy-paradox: steeds meer informatie verstrekken, maar wel zo compact en simpel mogelijk alstublieft. Retrieved from https:\/\/www.dirkzwager.nl\/kennis\/artikelen\/de-privacy-paradox-steeds-meer-informatie-verstrekken-maar-wel-zo-compact-en-simpel-mogelijk-alstublieft\/"},{"issue":"1","key":"9531_CR35","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1145\/985692.985752","volume":"6","author":"C Jensen","year":"2004","unstructured":"Jensen, C., & Potts, C. (2004). Privacy policies as decision-making tools: an evaluation of online privacy notices. International Journal of Human-Computer Interaction, 6(1), 471\u2013478. https:\/\/doi.org\/10.1145\/985692.985752.","journal-title":"International Journal of Human-Computer Interaction"},{"key":"9531_CR36","volume-title":"Doing your literature review. Traditional and systematic techniques","author":"JK Jesson","year":"2011","unstructured":"Jesson, J. K., Matheson, L., & Lacey, F. M. (2011). Doing your literature review. Traditional and systematic techniques. London: Sage."},{"key":"9531_CR81","unstructured":"Joint information systems committee. (1993). Retrieved from https:\/\/www.jisc.ac.uk\/."},{"issue":"2","key":"9531_CR37","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1177\/1080569911404059","volume":"74","author":"DR Jones","year":"2011","unstructured":"Jones, D. R. (2011). Academic dishonesty: Are more students cheating? Business Communication Quarterly, 74(2), 141\u2013150. https:\/\/doi.org\/10.1177\/1080569911404059.","journal-title":"Business Communication Quarterly"},{"key":"9531_CR38","doi-asserted-by":"publisher","unstructured":"Kay, M., & Terry, M. (2010). Textured agreements: Re-envisioning electronic consent. In Proceedings of the Symposium on Usable Privacy and Security, SOUPS 2010 (pp. 1\u201313). Redmond, WA. https:\/\/doi.org\/10.1145\/1837110.1837127","DOI":"10.1145\/1837110.1837127"},{"key":"9531_CR39","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1038\/ejhg.2014.71","volume":"23","author":"J Kaye","year":"2015","unstructured":"Kaye, J., Whitley, E. A., Lund, D., Morrison, M., Teare, H., & Melham, K. (2015). Dynamic consent: A patient interface for twenty-first century research networks. European Journal of Human Genetics, 23, 141\u2013146. https:\/\/doi.org\/10.1038\/ejhg.2014.71.","journal-title":"European Journal of Human Genetics"},{"issue":"11","key":"9531_CR40","doi-asserted-by":"publisher","first-page":"2587","DOI":"10.1002\/asi.23629","volume":"67","author":"A Kobsa","year":"2016","unstructured":"Kobsa, A., Cho, H., & Knijnenburg, B. (2016). The effect of personalization provider characteristics on privacy attitudes and behaviors: An elaboration likelihood model approach. Journal of the Association for Information Science and Technology, 67(11), 2587\u20132606. https:\/\/doi.org\/10.1002\/asi.23629.","journal-title":"Journal of the Association for Information Science and Technology"},{"key":"9531_CR41","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.cct.2016.06.005","volume":"49","author":"J Lentz","year":"2016","unstructured":"Lentz, J., Kennett, M., Perlmutter, J., & Forrest, A. (2016). Paving the way to a more effective informed consent process: Recommendations from the Clinical Trials Transformation Initiative. Contemporary Clinical Trials, 49, 65\u201369. https:\/\/doi.org\/10.1016\/j.cct.2016.06.005.","journal-title":"Contemporary Clinical Trials"},{"issue":"1","key":"9531_CR42","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1080\/13645579.2015.1116835","volume":"20","author":"R Lie","year":"2017","unstructured":"Lie, R., & Witteveen, L. (2017). Visual informed consent: Informed consent without forms. International Journal of Social Research Methodology, 20(1), 63\u201375. https:\/\/doi.org\/10.1080\/13645579.2015.1116835.","journal-title":"International Journal of Social Research Methodology"},{"key":"9531_CR43","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/276758.276775","volume":"28","author":"D Lin","year":"1998","unstructured":"Lin, D., & Loui, M. C. (1998). Taking the byte out of cookies: Privacy, consent, and the web. Computers and Society, 28, 39\u201351. https:\/\/doi.org\/10.1145\/276758.276775.","journal-title":"Computers and Society"},{"key":"9531_CR44","doi-asserted-by":"publisher","unstructured":"Luger, E. (2012). Consent reconsidered; Reframing consent for ubiquitous computing systems. In Proceedings of the 2012 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2012 (pp. 264\u2013267). Seattle, WA. https:\/\/doi.org\/10.1145\/2370216.2370310","DOI":"10.1145\/2370216.2370310"},{"key":"9531_CR45","doi-asserted-by":"publisher","unstructured":"Luger, E., & Rodden, T. (2014). Sustaining consent through agency: a framework for future development. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2014 (pp. 659\u2013664). Seattle, WA. https:\/\/doi.org\/10.1145\/2638728.2641680","DOI":"10.1145\/2638728.2641680"},{"key":"9531_CR46","doi-asserted-by":"publisher","unstructured":"Luger, E., Rodden, T., Jirotka, M., & Edwards, L. (2014). How do you solve a problem like consent? In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2014 (pp. 613\u2013619). Seattle, WA. https:\/\/doi.org\/10.1145\/2638728.2641676","DOI":"10.1145\/2638728.2641676"},{"issue":"1","key":"9531_CR47","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s10676-016-9390-4","volume":"18","author":"J Mai","year":"2016","unstructured":"Mai, J. (2016). Personal information as communicative acts. Ethics and Information Technology, 18(1), 51\u201357. https:\/\/doi.org\/10.1007\/s10676-016-9390-4.","journal-title":"Ethics and Information Technology"},{"issue":"3","key":"9531_CR48","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1080\/13600834.2015.1091128","volume":"24","author":"J M\u00e4kinen","year":"2015","unstructured":"M\u00e4kinen, J. (2015). Data quality, sensitive data and joint controllership as examples of grey areas in the existing data protection framework for the Internet of Things. Information & Communications Technology Law, 24(3), 262\u2013277. https:\/\/doi.org\/10.1080\/13600834.2015.1091128.","journal-title":"Information & Communications Technology Law"},{"issue":"7","key":"9531_CR49","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1080\/02602930902981139","volume":"35","author":"AL McCann","year":"2010","unstructured":"McCann, A. L. (2010). Factors affecting the adoption of an e-assessment system. Assessment & Evaluation in Higher Education, 35(7), 799\u2013818. https:\/\/doi.org\/10.1080\/02602930902981139.","journal-title":"Assessment & Evaluation in Higher Education"},{"key":"9531_CR50","doi-asserted-by":"publisher","first-page":"2199","DOI":"10.1016\/j.socscimed.2007.08.009","volume":"65","author":"T Miller","year":"2007","unstructured":"Miller, T., & Boulton, M. (2007). Changing constructions of informed consent: Qualitative research and complex social worlds. Social Science & Medicine, 65, 2199\u20132211. https:\/\/doi.org\/10.1016\/j.socscimed.2007.08.009.","journal-title":"Social Science & Medicine"},{"key":"9531_CR51","doi-asserted-by":"publisher","unstructured":"Moran, S., Luger, E., & Rodden, T. (2014). An emerging tool kit for attaining informed consent in UbiComp. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2014 (pp. 635\u2013639). https:\/\/doi.org\/10.1145\/2638728.2641677","DOI":"10.1145\/2638728.2641677"},{"key":"9531_CR80","unstructured":"Muravyeva, E., Janssen, J., Dirkx, K., & Specht, M. (2019). Students\u2019 attitudes towards personal data sharing in the context of e-assessment: Informed consent or privacy paradox? In Proceedings of the 2018 International Technology Enhanced Assessment Conference, TEA 2018 (pp. 16\u201326). Amsterdam, The Netherlands."},{"issue":"2","key":"9531_CR52","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1108\/JICES-10-2014-0040","volume":"14","author":"A Noain-Sanchez","year":"2016","unstructured":"Noain-S\u00e1nchez, A. (2016). \u201cPrivacy by default\u201d and active \u201cinformed consent\u201d by layers. Journal of Information, Communication and Ethics in Society, 14(2), 124\u2013138. https:\/\/doi.org\/10.1108\/JICES-10-2014-0040.","journal-title":"Journal of Information, Communication and Ethics in Society"},{"key":"9531_CR53","doi-asserted-by":"publisher","unstructured":"Noguera, I., Guerrero-Roldan, A. E., & Rodr\u00edguez, M. E. (2017). Assuring authorship and authentication across the e-assessment process. In Proceedings of the Technology Enhanced Assessment, TEA 2016 (pp. 86\u201392). Barcelona. https:\/\/doi.org\/10.1007\/978-3-319-57744-9","DOI":"10.1007\/978-3-319-57744-9"},{"issue":"1","key":"9531_CR54","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","volume":"41","author":"PA Norberg","year":"2007","unstructured":"Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviours. Journal of Consumer Affairs, 41(1), 100\u2013126.","journal-title":"Journal of Consumer Affairs"},{"issue":"2","key":"9531_CR55","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1177\/0266382116650297","volume":"33","author":"R O\u2019Brien","year":"2016","unstructured":"O\u2019Brien, R. (2016). Privacy and security: The new European data protection regulation and it\u2019s data breach notification requirements. Business Information Review, 33(2), 81\u201384. https:\/\/doi.org\/10.1177\/0266382116650297.","journal-title":"Business Information Review"},{"key":"9531_CR56","doi-asserted-by":"publisher","unstructured":"O\u2019Kane, A. A., Mentis, H. M., & Thereska, E. (2013). Non-static nature of patient consent: Shifting privacy perspectives in health information sharing. In Proceedings of the 16th ACM Conference on Computer Supported Cooperative Work and Social Computing, CSCW 2013 (pp. 553\u2013562). San Antonio, TA. https:\/\/doi.org\/10.1145\/2441776.2441838","DOI":"10.1145\/2441776.2441838"},{"key":"9531_CR57","doi-asserted-by":"publisher","unstructured":"Oliver-Lalana, A. D. (2004). Consent as a threat. A critical approach to privacy negotiation in e-commerce practices. In Proceedings of the Trust and Privacy in Digital Business, TrustBus 2004 (pp. 110\u2013119). Zaragoza. https:\/\/doi.org\/10.1007\/978-3-540-30079-3_12","DOI":"10.1007\/978-3-540-30079-3_12"},{"issue":"9","key":"9531_CR58","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1080\/10447318.2011.653325","volume":"28","author":"J Park","year":"2012","unstructured":"Park, J., & Han, S. H. (2012). Integration of adaptable and adaptive approaches for interface personalization through collaborative menu. International Journal of Human-Computer Interaction, 28(9), 613\u2013626. https:\/\/doi.org\/10.1080\/10447318.2011.653325.","journal-title":"International Journal of Human-Computer Interaction"},{"issue":"2","key":"9531_CR59","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/357775.357778","volume":"25","author":"J Parsons","year":"2000","unstructured":"Parsons, J., & Wand, Y. (2000). Emancipating instances from the tyranny of classes in information modeling. Transactions in Database Systems, 25(2), 228\u2013268.","journal-title":"Transactions in Database Systems"},{"key":"9531_CR60","doi-asserted-by":"publisher","unstructured":"Plomp, T. (2010). Educational design research: an introduction. In T. Plomp & N. Nieveen (Eds.), Educational design research (pp. 10\u201351). Enschede: Netherlands Institute for Curriculum Development. https:\/\/doi.org\/10.1007\/978-1-4614-3185-5_11.","DOI":"10.1007\/978-1-4614-3185-5_11"},{"issue":"3","key":"9531_CR61","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1080\/13600860903262248","volume":"23","author":"R Polcak","year":"2009","unstructured":"Polcak, R. (2009). Aims, methods and achievements in European data protection. International Review of Law, Computers & Technology, 23(3), 179\u2013188. https:\/\/doi.org\/10.1080\/13600860903262248.","journal-title":"International Review of Law, Computers & Technology"},{"key":"9531_CR62","unstructured":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC. Retrieved from https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679&from=EN"},{"key":"9531_CR63","doi-asserted-by":"publisher","unstructured":"Rosner, G. (2014). Who owns your data? In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2014 (pp. 623\u2013628). Seattle, WA. https:\/\/doi.org\/10.1145\/2638728.2641679","DOI":"10.1145\/2638728.2641679"},{"issue":"2","key":"9531_CR64","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1080\/21507711003771405","volume":"1","author":"K Sand","year":"2010","unstructured":"Sand, K., Kaasa, S., & Loge, J. H. (2010). The understanding of informed consent information\u2014definitions and measurements in empirical studies. AJOB Primary Research, 1(2), 4\u201324. https:\/\/doi.org\/10.1080\/21507711003771405.","journal-title":"AJOB Primary Research"},{"key":"9531_CR65","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s10676-014-9343-8","volume":"16","author":"BW Schermer","year":"2014","unstructured":"Schermer, B. W., Custers, B., & Van der Hof, S. (2014). The crisis of consent: How stronger legal protection may lead to weaker consent in data protection. Ethics and Information Technology, 16, 171\u2013182. https:\/\/doi.org\/10.1007\/s10676-014-9343-8.","journal-title":"Ethics and Information Technology"},{"key":"9531_CR66","unstructured":"Schofield, B. (2014). Informed consent in research. The European Health Psychologist, 1(3), 101\u2013106. Retrieved from https:\/\/ehps.net\/ehp\/index.php\/contents\/article\/view\/ehp.v16.i3.p101."},{"key":"9531_CR67","first-page":"26","volume":"63","author":"K Schriver","year":"2010","unstructured":"Schriver, K., Cheek, A. L., & Mercer, M. (2010). The research basis of plain language techniques: Implications for establishing standards. Clarity, 63, 26\u201333.","journal-title":"Clarity"},{"issue":"3","key":"9531_CR68","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1093\/phe\/phr020","volume":"4","author":"M Sheehan","year":"2011","unstructured":"Sheehan, M., & Martin, J. (2011). Can broad consent be informed consent? Public Health Ethics, 4(3), 226\u2013235. https:\/\/doi.org\/10.1093\/phe\/phr020.","journal-title":"Public Health Ethics"},{"key":"9531_CR69","doi-asserted-by":"publisher","first-page":"992","DOI":"10.1016\/j.chb.2015.09.038","volume":"55","author":"N Steinfeld","year":"2016","unstructured":"Steinfeld, N. (2016). \u201cI agree to the terms and conditions\u201d: (how) Do users read privacy policies online? An eye-tracking experiment. Computers in Human Behavior, 55, 992\u20131000. https:\/\/doi.org\/10.1016\/j.chb.2015.09.038.","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"9531_CR70","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1111\/1467-8535.00343","volume":"34","author":"J Underwood","year":"2003","unstructured":"Underwood, J., & Szabo, A. (2003). Academic offences and e-learning: Individual propensities in cheating. British Journal of Educational Technology, 34(4), 467\u2013478. https:\/\/doi.org\/10.1111\/1467-8535.00343.","journal-title":"British Journal of Educational Technology"},{"key":"9531_CR71","unstructured":"Unified Modeling Language. (1997). Object management group. Retrieved from https:\/\/www.uml.org\/"},{"issue":"2","key":"9531_CR72","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1080\/13600869.2013.812594","volume":"28","author":"B Van Alsenoy","year":"2014","unstructured":"Van Alsenoy, B., Kosta, E., & Dumortier, J. (2014). Privacy notices versus informational self-determination: Minding the gap. International Review of Law, Computers & Technology, 28(2), 185\u2013203. https:\/\/doi.org\/10.1080\/13600869.2013.812594.","journal-title":"International Review of Law, Computers & Technology"},{"key":"9531_CR73","unstructured":"Van Est, R., Rerimassie, V., Van Keulen, I., & Dorren, G. (2014). Intimate technology. The battle for our body and behaviour. The Hague: Rathenau Instituut. Retrieved from https:\/\/pure.tue.nl\/ws\/files\/3957297\/608649605251186.pdf"},{"key":"9531_CR74","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s10603-018-9399-7","volume":"41","author":"I Van Ooijen","year":"2019","unstructured":"Van Ooijen, I., & Vrabec, H. U. (2019). Does the GDPR enhance consumers\u2019 control over personal data? An analysis from a behavioural perspective. Journal of Consumer Policy, 41, 91\u2013107.","journal-title":"Journal of Consumer Policy"},{"key":"9531_CR75","doi-asserted-by":"publisher","unstructured":"Van Rest, J., Boonstra, D., Everts, M., Van Rijn, M., & Van Paassen, R. (2014). Designing privacy-by-design. In Proceedings of the Annual Privacy Forum, APF 2012 (pp. 55\u201372). Limassol, Cyprus. https:\/\/doi.org\/10.1007\/978-3-642-54069-1_4","DOI":"10.1007\/978-3-642-54069-1_4"},{"issue":"41","key":"9531_CR76","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11257-011-9114-8","volume":"23","author":"Y Wang","year":"2013","unstructured":"Wang, Y., & Kobsa, A. (2013). A PLA-based privacy-enhancing user modeling framework and its evaluation. User Modeling and User-Adapted Interaction, 23(41), 1\u201345. https:\/\/doi.org\/10.1007\/s11257-011-9114-8.","journal-title":"User Modeling and User-Adapted Interaction"},{"key":"9531_CR77","doi-asserted-by":"publisher","unstructured":"Wilkowska, W., & Ziefle, M. (2011). Perception of privacy and security for acceptance of e-health technologies. In Proceedings of the 5th International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth 2011 (pp. 593\u2013600). https:\/\/doi.org\/10.4108\/icst.pervasivehealth.2011.246027","DOI":"10.4108\/icst.pervasivehealth.2011.246027"},{"issue":"5","key":"9531_CR78","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1007\/s11423-016-9463-4","volume":"64","author":"J Willis","year":"2016","unstructured":"Willis, J., Slade, S., & Prinsloo, P. (2016). Ethical oversight of student data in learning analytics: A typology derived from a cross-continental, cross-institutional perspective. Educational Technology Research and Development, 64(5), 881\u2013901. https:\/\/doi.org\/10.1007\/s11423-016-9463-4.","journal-title":"Educational Technology Research and Development"},{"issue":"3","key":"9531_CR79","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/2700519","volume":"15","author":"S Xinogalos","year":"2015","unstructured":"Xinogalos, S. (2015). Object-oriented design and programming: An investigation of novices\u2019 conceptions on objects and classes. Transactions on Computing Education, 15(3), 13\u201319.","journal-title":"Transactions on Computing Education"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-020-09531-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10676-020-09531-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-020-09531-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T05:46:19Z","timestamp":1619329579000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10676-020-09531-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,24]]},"references-count":81,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["9531"],"URL":"https:\/\/doi.org\/10.1007\/s10676-020-09531-5","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,24]]},"assertion":[{"value":"24 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}