{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:24:40Z","timestamp":1740122680929,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T00:00:00Z","timestamp":1495756800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s11277-017-4421-y","type":"journal-article","created":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T09:19:18Z","timestamp":1495790358000},"page":"145-154","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Privacy and Economics in a 5G Environment"],"prefix":"10.1007","volume":"95","author":[{"given":"Samant","family":"Khajuria","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4994-4144","authenticated-orcid":false,"given":"Knud Erik","family":"Skouby","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,26]]},"reference":[{"key":"4421_CR1","volume-title":"Communication power","author":"M Castells","year":"2009","unstructured":"Castells, M. (2009). Communication power. Oxford: Oxford University Press."},{"issue":"1","key":"4421_CR2","first-page":"1","volume":"4","author":"E Fife","year":"2012","unstructured":"Fife, E., & Orjuela, J. (2012). The privacy calculus: Mobile apps and user perceptions of privacy and security.\u00a0International Journal of Engineering Business  Management,\u00a04(1), 1\u201310.","journal-title":"International Journal of Engineering Business Management"},{"key":"4421_CR3","unstructured":"BBC Series. (2010). The virtual revolution. \n                        http:\/\/www.bbc.co.uk\/programmes\/b00n4j0r\/episodes\/guide\n                        \n                    . Episode 2, \u201cThe cost of free\u201d."},{"key":"4421_CR4","unstructured":"Leon, P. G., et al. (2015). Privacy and behavioral advertising: Towards meeting users\u2019 preferences. In Symposium on usable privacy and security (SOUPS)."},{"key":"4421_CR5","unstructured":"Futuresight. (2011). User perspectives on mobile privacy\u2014Summary of research findings. GSMA."},{"key":"4421_CR6","unstructured":"Raine, L., et al. (2013). Anonymity, privacy, and security online. Pew Research Center."},{"key":"4421_CR7","unstructured":"Ericsson White Paper. (2015). 5G Security-Scenarios and Solutions, Uen\u00a0284 23-3269."},{"key":"4421_CR8","doi-asserted-by":"crossref","first-page":"1399","DOI":"10.1007\/s11277-015-2480-5","volume":"81","author":"P Lynggaard","year":"2015","unstructured":"Lynggaard, P., & Skouby, K. E. (2015). Deploying 5G-technologies in smart city and smart home wireless sensor networks with interferences. Wireless Personal Communications, 81, 1399\u20131413.","journal-title":"Wireless Personal Communications"},{"key":"4421_CR9","first-page":"95","volume":"2012","author":"White House","year":"2012","unstructured":"White House. (2012). Consumer data privacy in a networked world: A framework for protecting privacy and promoting innovation. Journal of Privacy and Confidentiality , 2012, 95\u2013142.","journal-title":"Journal of Privacy and Confidentiality"},{"issue":"1","key":"4421_CR10","first-page":"39","volume":"30","author":"JR Reidenberg","year":"2015","unstructured":"Reidenberg, J. R., et al. (2015). Disagreeable privacy policies: Mismatches between meaning and users\u2019 understanding. Berkeley Technology Law Journal,\u00a030(1), 39.","journal-title":"Berkeley Technology Law Journal"},{"key":"4421_CR11","unstructured":"Castelluccia, C., et al. (2012). Privacy, accountability and trust\u2014Challenges and opportunities. European Network and Information Security Agency (ENISA)."},{"key":"4421_CR12","unstructured":"Khajuria, S., et al. (2015). Where does my private data go?-visualization of users\u2019 privacy. In 48th annual Hawaii international conference on system sciences."},{"key":"4421_CR13","unstructured":"Electronic Frontier Foundation\/Privacy Badger: \n                        http:\/\/www.eff.org\/privacybadger\n                        \n                    ."},{"key":"4421_CR14","unstructured":"MyPermissions: \n                        http:\/\/mypermissions.org\/\n                        \n                    ."},{"key":"4421_CR15","unstructured":"PC. (2014). \n                        http:\/\/www.pcworld.com\/article\/2147306\/f-securefreedome-review-vpn-and-security-for-mobile-devices.html\n                        \n                    ."},{"key":"4421_CR16","unstructured":"AVG PrivacyFix: \n                        http:\/\/www.avg.com\/ww-en\/privacyfix\n                        \n                    ."},{"key":"4421_CR17","unstructured":"The World in 2025: 10 predictions of innovation. THOMSON REUTERS report, [Online]. Available: \n                        http:\/\/sciencewatch.com\/sites\/sw\/files\/m\/pdf\/World-2025.pdf\n                        \n                    ."},{"key":"4421_CR18","doi-asserted-by":"crossref","unstructured":"S\u00f8rensen, L. T, et al. (2015). 5G visions of user privacy. In IEEE 81st vehicular technology conference (VTC Spring).","DOI":"10.1109\/VTCSpring.2015.7145587"},{"key":"4421_CR19","unstructured":"Chaplin, M., & Creasey, J. (2011). The 2011 standard of good practice for information security. Information Security Forum (ISF)."},{"key":"4421_CR20","unstructured":"Regulation (EU) of the European Parliament and of the council \u201cGeneral Data Protection Regulation\u201d Document 32016R0679 (2016)."},{"key":"4421_CR21","unstructured":"Mortensen, H. (2016). Guildeline\u2014General data protection regulation\u2014Implementation in Danish companies. The Danish ICT and Electronics Federation, DI."},{"issue":"4","key":"4421_CR22","first-page":"519","volume":"35","author":"Friederich Hayek","year":"1945","unstructured":"Hayek, Friederich. (1945). The use of knowledge in society. The American Economic Review, 35(4), 519\u2013530.","journal-title":"The American Economic Review"},{"key":"4421_CR23","unstructured":"Varian, H. R. Markets for information goods. \n                        http:\/\/people.ischool.berkeley.edu\/~hal\/Papers\/japan\/\n                        \n                    ."},{"issue":"2","key":"4421_CR24","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1257\/jel.54.2.442","volume":"52","author":"A Acquisti","year":"2016","unstructured":"Acquisti, A., et al. (2016). The economics of privacy. Journal of Economic Literature, 52(2), 442\u2013492.","journal-title":"Journal of Economic Literature"},{"key":"4421_CR25","unstructured":"Noam, E. (1997). Privacy and self-regulation: Markets for electronic privacy. In US Department of Commerce: Privacy and self-regulation in the information age. Washington."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4421-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4421-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4421-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T06:33:59Z","timestamp":1500964439000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4421-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,26]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["4421"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4421-y","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2017,5,26]]}}}