{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T21:05:32Z","timestamp":1777151132112,"version":"3.51.4"},"reference-count":56,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["The Information Society"],"published-print":{"date-parts":[[2016,5,26]]},"DOI":"10.1080\/01972243.2016.1153012","type":"journal-article","created":{"date-parts":[[2016,4,13]],"date-time":"2016-04-13T18:50:38Z","timestamp":1460573438000},"page":"200-216","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":76,"title":["Putting mobile application privacy in context: An empirical study of user privacy expectations for mobile devices"],"prefix":"10.1080","volume":"32","author":[{"given":"Kirsten","family":"Martin","sequence":"first","affiliation":[]},{"given":"Katie","family":"Shilton","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,4,13]]},"reference":[{"key":"cit0001","volume-title":"Apps across America: The economics and ecosystem of the mobile app market","author":"ACT","year":"2012"},{"issue":"1","key":"cit0006","first-page":"109","volume":"75","author":"Beales J. H.","year":"2008","journal-title":"University of Chicago Law Review"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-011-0081-0"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.1093\/pan\/mpr057"},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.5840\/beq200616340"},{"key":"cit0010","volume-title":"Privacy and data management on mobile devices","author":"Boyles J. L.","year":"2012"},{"key":"cit0011","first-page":"1","volume":"15","author":"Braunstein A.","year":"2011","journal-title":"SOUPS 2011 Proceedings of the Seventh Symposium on Usable Privacy and Security"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20459"},{"key":"cit0013","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2014.915278"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.84"},{"key":"cit0015","volume-title":"Operationalizing privacy by design: A guide to implementing strong privacy practices","author":"Cavoukian A.","year":"2012"},{"key":"cit0016","author":"Columbus L.","year":"2013","journal-title":"Forbes"},{"key":"cit0017","doi-asserted-by":"publisher","DOI":"10.1002\/dir.4000090204"},{"key":"cit0018","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00067"},{"issue":"4","key":"cit0019","doi-asserted-by":"crossref","first-page":"673","DOI":"10.2307\/20650322","volume":"33","author":"Culnan M. J.","year":"2009","journal-title":"Management Information Systems Quarterly"},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.1080\/01972240490508018"},{"key":"cit0022","doi-asserted-by":"publisher","DOI":"10.2307\/1251773"},{"key":"cit0023","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2006.02.006"},{"key":"cit0024","volume-title":"Protecting consumer privacy in an era of rapid change","author":"Federal Trade Commission","year":"2010"},{"key":"cit0025","volume-title":"Protecting consumer privacy in an era of rapid change: Recommendations for businesses and policymakers","author":"Federal Trade Commission","year":"2012"},{"key":"cit0026","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"cit0027","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2012.709479"},{"key":"cit0028","doi-asserted-by":"publisher","DOI":"10.1080\/019722499128583"},{"issue":"1","key":"cit0029","doi-asserted-by":"crossref","first-page":"19","DOI":"10.2307\/25148779","volume":"31","author":"Hui K.-L.","year":"2007","journal-title":"MIS Quarterly"},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.1177\/0049124105283121"},{"key":"cit0031","first-page":"121","volume-title":"Readings in cyberethics","author":"Johnson D. G.","year":"2004","edition":"2"},{"key":"cit0032","author":"Kang C.","year":"2013","journal-title":"The Washington Post"},{"key":"cit0033","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2014.944730"},{"key":"cit0034","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.2228728","volume-title":"Mechanical Turk is not anonymous","author":"Lease M.","year":"2013"},{"issue":"1","key":"cit0035","first-page":"62","volume":"51","author":"Li H.","year":"2010","journal-title":"Journal of Computer Information Systems"},{"key":"cit0036","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"cit0038","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v18i12.4838"},{"key":"cit0037","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-015-2565-9"},{"key":"cit0039","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-012-1215-8"},{"key":"cit0041","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2009.02.025"},{"key":"cit0042","first-page":"540","volume":"4","author":"McDonald A. M.","year":"2008","journal-title":"I\/S: A Journal of Law and Policy for the Information Society"},{"key":"cit0044","doi-asserted-by":"publisher","DOI":"10.1080\/01972240290108168"},{"key":"cit0045","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.25.2.238"},{"issue":"2","key":"cit0046","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1177\/074391569101200206","volume":"12","author":"Milne G. R.","year":"1993","journal-title":"Journal of Public Policy & Marketing"},{"issue":"1","key":"cit0047","first-page":"119","volume":"79","author":"Nissenbaum H.","year":"2004","journal-title":"Washington Law Review"},{"key":"cit0048","doi-asserted-by":"crossref","DOI":"10.1515\/9780804772891","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"Nissenbaum H.","year":"2009"},{"key":"cit0049","doi-asserted-by":"publisher","DOI":"10.1162\/DAED_a_00113"},{"key":"cit0050","first-page":"837","volume-title":"Handbook of survey research","author":"Nock S.","year":"2010"},{"key":"cit0051","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0015"},{"key":"cit0052","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.27.16941"},{"key":"cit0053","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2013.825358"},{"key":"cit0055","doi-asserted-by":"publisher","DOI":"10.1145\/1753846.1753873"},{"key":"cit0054","volume-title":"Measuring social judgments: The factorial survey approach","author":"Rossi P. H.","year":"1982"},{"key":"cit0056","doi-asserted-by":"publisher","DOI":"10.1080\/01972240252818207"},{"key":"cit0057","doi-asserted-by":"publisher","DOI":"10.1145\/1592761.1592778"},{"key":"cit0058","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"cit0060","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.88"},{"key":"cit0061","volume-title":"Engaging privacy and information technology in a digital age","author":"Waldo J.","year":"2007"},{"key":"cit0062","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssresearch.2009.03.004"},{"key":"cit0065","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0416"},{"key":"cit0066","doi-asserted-by":"publisher","DOI":"10.5465\/AMBPP.2009.44249857"}],"container-title":["The Information Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01972243.2016.1153012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,18]],"date-time":"2020-09-18T15:07:37Z","timestamp":1600441657000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01972243.2016.1153012"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,13]]},"references-count":56,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2016,4,13]]},"published-print":{"date-parts":[[2016,5,26]]}},"alternative-id":["10.1080\/01972243.2016.1153012"],"URL":"https:\/\/doi.org\/10.1080\/01972243.2016.1153012","relation":{},"ISSN":["0197-2243","1087-6537"],"issn-type":[{"value":"0197-2243","type":"print"},{"value":"1087-6537","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,13]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}