{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,11]],"date-time":"2026-05-11T21:56:40Z","timestamp":1778536600544,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642372841","type":"print"},{"value":"9783642372858","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37285-8_21","type":"book-chapter","created":{"date-parts":[[2013,4,18]],"date-time":"2013-04-18T09:58:17Z","timestamp":1366279097000},"page":"189-192","source":"Crossref","is-referenced-by-count":13,"title":["Privacy Awareness of Students and Its Impact on Online Learning Participation \u2013 A Case Study"],"prefix":"10.1007","author":[{"given":"Birgy","family":"Lorenz","sequence":"first","affiliation":[]},{"given":"Sonia","family":"Sousa","sequence":"additional","affiliation":[]},{"given":"Vladimir","family":"Tomberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"21_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.7763\/IJIET.2011.V1.1","volume":"1","author":"M. May","year":"2011","unstructured":"May, M., S\u00e9bastien, G.: Privacy Concerns in E-learning: Is Using Tracking System a Thread? International Journal of Information and Education Technology\u00a01(1), 1\u20138 (2011)","journal-title":"International Journal of Information and Education Technology"},{"issue":"4","key":"21_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jdet.2003100101","volume":"1","author":"K. El-Khatib","year":"2003","unstructured":"El-Khatib, K., Korba, L., Xu, Y., Yee, G.: Privacy and security in e-learning. International Journal of Distance Education Technologies\u00a01(4), 1\u201319 (2003)","journal-title":"International Journal of Distance Education Technologies"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Hayaati, N., Alwi, M., Fan, I.-S.: Information Security Threats Analysis for E-Learning. Elearning, 285\u2013291 (2010)","DOI":"10.1007\/978-3-642-13166-0_41"},{"key":"21_CR4","unstructured":"Next Generation Learning, Analysis of emerging trends affecting the use of technology in education. Learning (September 2008)"},{"key":"21_CR5","unstructured":"Gurses, S., Rizk, R., Gunther, O.: Privacy design in online social networks: Learning from privacy breaches and community feedback. Information Systems Journal (2008)"},{"key":"21_CR6","unstructured":"Vabariigi Valitsus, G\u00fcmnaasiumi riiklik \u00f5ppekava (2011), \n                    \n                      https:\/\/www.riigiteataja.ee\/akt\/114012011002"},{"key":"21_CR7","unstructured":"Estonian Information Technology Foundation (EITF). E-Learning Development Centre Strategy, Tallinn (2012)"},{"key":"21_CR8","unstructured":"Piir, M.: Suletud ja avatud \u00f5pikeskkond, e-\u00f5ppe ajakiri (2011), \n                    \n                      http:\/\/www.etu.ut.ee\/kevad-2011\/opikeskkonnad\/"},{"key":"21_CR9","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-0-387-79026-8_14","volume":"262","author":"M. Hansen","year":"2008","unstructured":"Hansen, M.: Marrying Transparency Tools with User-Controlled Identity Management. The Future of Identity in the Information Society\u00a0262, 199\u2013220 (2008)","journal-title":"The Future of Identity in the Information Society"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Razavi, M.N., Iverson, L.: A grounded theory of information sharing behavior in a personal learning space. In: Proceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work, pp. 459\u2013468 (2006)","DOI":"10.1145\/1180875.1180946"}],"container-title":["IFIP Advances in Information and Communication Technology","Open and Social Technologies for Networked Learning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37285-8_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T12:16:01Z","timestamp":1557663361000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37285-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642372841","9783642372858"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37285-8_21","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}