{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:11:13Z","timestamp":1761621073654},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642237737"},{"type":"electronic","value":"9783642237744"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23774-4_31","type":"book-chapter","created":{"date-parts":[[2011,8,30]],"date-time":"2011-08-30T22:49:30Z","timestamp":1314744570000},"page":"380-387","source":"Crossref","is-referenced-by-count":3,"title":["Improving Users\u2019 Consistency When Recalling Location Sharing Preferences"],"prefix":"10.1007","author":[{"given":"Jayant","family":"Venkatanathan","sequence":"first","affiliation":[]},{"given":"Denzil","family":"Ferreira","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Benisch","sequence":"additional","affiliation":[]},{"given":"Jialiu","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Evangelos","family":"Karapanos","sequence":"additional","affiliation":[]},{"given":"Vassilis","family":"Kostakos","sequence":"additional","affiliation":[]},{"given":"Norman","family":"Sadeh","sequence":"additional","affiliation":[]},{"given":"Eran","family":"Toch","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","unstructured":"Barkhuus, L.: Privacy in location-based services, concern vs. coolness. In: Mobile HCI 2004 Workshop: Location System Privacy and Control (2004)"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Benisch, M., Kelley, P.G., Sadeh, N., Cranor, L.F.: Capturing location-privacy preferences: Quantifying accuracy and user-burden tradeoffs. Personal and Ubiquitous Computing, 1\u201316 (2010)","DOI":"10.1007\/s00779-010-0346-0"},{"issue":"(36","key":"31_CR3","first-page":"15724","volume":"106","author":"N. Eagle","year":"2009","unstructured":"Eagle, N., Pentland, A.S., Lazer, D.: Inferring friendship network structure by using mobile phone data. Proceedings of the National Academy of Sciences\u00a0106((36), 15724\u201315728 (2009)","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"31_CR4","doi-asserted-by":"crossref","DOI":"10.4135\/9781412984201","volume-title":"Experience Sampling Method: Measuring the Quality of Everyday Life","author":"J.M. Hektner","year":"2007","unstructured":"Hektner, J.M., Schmidt, J.A., Csikszentmihalyi, M.: Experience Sampling Method: Measuring the Quality of Everyday Life. Sage Publications, Thousand Oaks (2007)"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: MobiSys 2004, pp. 177\u2013189 (2004)","DOI":"10.1145\/990064.990087"},{"issue":"5702","key":"31_CR6","doi-asserted-by":"publisher","first-page":"1776","DOI":"10.1126\/science.1103572","volume":"306","author":"D. Kahneman","year":"2004","unstructured":"Kahneman, D., Krueger, A.B., Schkade, D.A., Schwarz, N., Stone, A.A.: A Survey Method for Characterizing Daily Life Experience: The Day Reconstruction Method. Science\u00a0306(5702), 1776\u20131780 (2004)","journal-title":"Science"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Kelley, P.G., Hankes Drielsma, P., Sadeh, N., Cranor, L.F.: User-controllable learning of security and privacy policies. In: AISec 2008, pp. 11\u201318 (2008)","DOI":"10.1145\/1456377.1456380"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Khalil, A., Connelly, K.: Context-aware telephony: privacy preferences and sharing patterns. In: CSCW 2006, pp. 469\u2013478 (2006)","DOI":"10.1145\/1180875.1180947"},{"issue":"6","key":"31_CR9","doi-asserted-by":"publisher","first-page":"934","DOI":"10.1037\/0033-2909.128.6.934","volume":"128","author":"M.D. Robinson","year":"2002","unstructured":"Robinson, M.D., Clore, G.L.: Belief and feeling: Evidence for an accessibility model of emotional self-report. Psychological Bulletin\u00a0128(6), 934\u2013960 (2002)","journal-title":"Psychological Bulletin"},{"key":"31_CR10","first-page":"157","volume-title":"Global and episodic reports of hedonic experience. Calendar and Time Diary Methods in Life Course Research: Methods in Life Course Research","author":"N. Schwarz","year":"2008","unstructured":"Schwarz, N., Kahneman, D., Xu, J., Belli, R., Stafford, F., Alwin, D., et al.: Global and episodic reports of hedonic experience. Calendar and Time Diary Methods in Life Course Research: Methods in Life Course Research, p. 157. Sage Pubns., Thousand Oaks (2008)"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Tsai, J.Y., Kelley, P., Drielsma, P., Cranor, L.F., Hong, J., Sadeh, N.: Who\u2019s viewed you?: the impact of feedback in a mobile location sharing application. In: CHI 2009, pp. 2003\u20132012 (2009)","DOI":"10.1145\/1518701.1519005"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Wagner, D., Lopez, M., Doria, A., Pavlyshak, I., Kostakos, V., Oakley, I., Spiliotopoulos, T.: Hide And Seek: Location Sharing Practices With Social Media. In: MobileHCI 2010, pp. 55\u201358.","DOI":"10.1145\/1851600.1851612"},{"issue":"1","key":"31_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1146\/annurev.psych.53.100901.135114","volume":"53","author":"E. Tulving","year":"2002","unstructured":"Tulving, E.: Episodic Memory: From Mind to Brain. Annual Review of Psychology\u00a053(1), 1\u201325 (2002)","journal-title":"Annual Review of Psychology"},{"key":"31_CR14","unstructured":"Karapanos, E., Martens, J.-B., Hassenzahl, M.: Reconstructing Experiences through Sketching. Arxiv preprint, arXiv:0912.5343 (2009)"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Hsieh, G., Li, I., Dey, A., Forlizzi, J., Hudson, S.E.: Using visualizations to increase compliance in experience sampling. In: Proceedings of the 10th International Conference on Ubiquitous Computing (2008)","DOI":"10.1145\/1409635.1409657"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23774-4_31.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:14:27Z","timestamp":1606187667000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23774-4_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642237737","9783642237744"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23774-4_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}