{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T06:16:24Z","timestamp":1751609784444,"version":"3.40.5"},"reference-count":72,"publisher":"Informa UK Limited","issue":"19","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2023,11,26]]},"DOI":"10.1080\/10447318.2022.2104428","type":"journal-article","created":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T07:37:44Z","timestamp":1659944264000},"page":"3758-3773","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":3,"title":["An Exploratory Analysis of Interface Features Influencing Mobile Location Data Disclosure"],"prefix":"10.1080","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8085-2355","authenticated-orcid":false,"given":"Alexis","family":"Shore","sequence":"first","affiliation":[{"name":"Division of Emerging Media Studies, Boston University, Boston, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6239-2634","authenticated-orcid":false,"given":"James J.","family":"Cummings","sequence":"additional","affiliation":[{"name":"Division of Emerging Media Studies, Boston University, Boston, MA, USA"}]}],"member":"301","published-online":{"date-parts":[[2022,8,8]]},"reference":[{"key":"e_1_3_4_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2022.2074668"},{"key":"e_1_3_4_3_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.abj0826"},{"key":"e_1_3_4_4_1","doi-asserted-by":"publisher","DOI":"10.1086\/671754"},{"key":"e_1_3_4_5_1","doi-asserted-by":"publisher","DOI":"10.1257\/jel.54.2.442"},{"key":"e_1_3_4_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753846.1754054"},{"key":"e_1_3_4_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2020.1850839"},{"key":"e_1_3_4_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2494091.2497343"},{"key":"e_1_3_4_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.02.047"},{"key":"e_1_3_4_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.econlet.2012.04.077"},{"key":"e_1_3_4_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20459"},{"key":"e_1_3_4_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.07.001"},{"key":"e_1_3_4_13_1","volume-title":"Influence","author":"Cialdini R. B.","year":"1987","unstructured":"Cialdini, R. B. (1987). Influence (Vol. 3). A. Michel."},{"key":"e_1_3_4_14_1","volume-title":"Privacy Law Scholars Conference","author":"Colnago J.","year":"2021","unstructured":"Colnago, J., Cranor, L., Acquisti, A., & Stanton, K. (2021). What do privacy surveys actually measure? Distinguishing attitude, preference, concern, expectation, decision, and behavior [Paper presentation]. Privacy Law Scholars Conference [Unpublished manuscript]."},{"key":"e_1_3_4_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892410"},{"key":"e_1_3_4_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179601.1179621"},{"key":"e_1_3_4_17_1","article-title":"How much is location privacy worth?","volume":"5","author":"Danezis G.","year":"2005","unstructured":"Danezis, G., Lewis, S., & Anderson, R. J. (2005). How much is location privacy worth? In Proceedings of WEIS (Vol. 5).","journal-title":"Proceedings of WEIS"},{"key":"e_1_3_4_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1941487.1941515"},{"key":"e_1_3_4_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.08.035"},{"key":"e_1_3_4_20_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3611232"},{"key":"e_1_3_4_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/10304312.2016.1265094"},{"key":"e_1_3_4_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892413"},{"key":"e_1_3_4_23_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2019.00178"},{"key":"e_1_3_4_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"e_1_3_4_25_1","doi-asserted-by":"publisher","DOI":"10.4159\/9780674985124"},{"key":"e_1_3_4_26_1","first-page":"1343","article-title":"Surveillance as loss of obscurity","volume":"72","author":"Hartzog W.","year":"2015","unstructured":"Hartzog, W., & Selinger, E. (2015). Surveillance as loss of obscurity. Washington & Lee Law Review, 72, 1343.","journal-title":"Washington & Lee Law Review"},{"key":"e_1_3_4_27_1","first-page":"1","article-title":"The case for online obscurity","volume":"101","author":"Hartzog W.","year":"2013","unstructured":"Hartzog, W., & Stutzman, F. (2013). The case for online obscurity. California Law Review, 101, 1.","journal-title":"California Law Review"},{"key":"e_1_3_4_28_1","doi-asserted-by":"publisher","DOI":"10.1006\/jeem.2001.1215"},{"key":"e_1_3_4_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2741958"},{"key":"e_1_3_4_30_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148779"},{"key":"e_1_3_4_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/cb.1861"},{"key":"e_1_3_4_32_1","unstructured":"Jacobs B. & Schraffenberger H. (2020). Friction for Privacy. Why privacy by design needs user experience design . https:\/\/repository.ubn.ru.nl\/handle\/2066\/219344"},{"key":"e_1_3_4_33_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015044207315"},{"key":"e_1_3_4_34_1","doi-asserted-by":"publisher","DOI":"10.1257\/jep.5.1.193"},{"key":"e_1_3_4_35_1","doi-asserted-by":"publisher","DOI":"10.1257\/jep.5.1.193"},{"key":"e_1_3_4_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274359"},{"key":"e_1_3_4_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314403"},{"key":"e_1_3_4_38_1","unstructured":"Laziuk E. (2021). iOS 14.5 opt-in rate\u2014Daily updates since launch. Flurry Blog . Retrieved March 12 2022 from https:\/\/www.flurry.com\/blog\/ios-14-5-opt-in-rate-att-restricted-app-tracking-transparency-worldwide-us-daily-latest-update\/"},{"key":"e_1_3_4_39_1","doi-asserted-by":"publisher","DOI":"10.5392\/IJoC.2017.13.1.022"},{"key":"e_1_3_4_40_1","first-page":"545","article-title":"Examining the determinants of mobile location-based services\u2019 continuance","author":"Lehrer C.","year":"2011","unstructured":"Lehrer, C., Constantiou, I., & Hess, T. (2011). Examining the determinants of mobile location-based services\u2019 continuance. Journal of Marketing Research, 545\u2013556.","journal-title":"Journal of Marketing Research,"},{"key":"e_1_3_4_41_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v18i12.4838"},{"key":"e_1_3_4_42_1","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v9i4.4342"},{"key":"e_1_3_4_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3335082.3335106"},{"key":"e_1_3_4_44_1","volume-title":"Spying with maps: Surveillance technologies and the future of privacy","author":"Monmonier M.","year":"2004","unstructured":"Monmonier, M. (2004). Spying with maps: Surveillance technologies and the future of privacy. University of Chicago Press."},{"key":"e_1_3_4_45_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2021.1913859"},{"key":"e_1_3_4_46_1","doi-asserted-by":"publisher","DOI":"10.1108\/JICES-10-2014-0040"},{"key":"e_1_3_4_47_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2418247"},{"key":"e_1_3_4_48_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3642217"},{"key":"e_1_3_4_49_1","first-page":"961","article-title":"A duty of loyalty for privacy law","volume":"99","author":"Richards N.","year":"2021","unstructured":"Richards, N., & Hartzog, W. (2021). A duty of loyalty for privacy law. Washington University Law Review, 99, 961.","journal-title":"Washington University Law Review"},{"key":"e_1_3_4_50_1","volume-title":"On the willingness to pay for privacy as a freemium model: First empirical evidence","author":"Schreiner M.","year":"2013","unstructured":"Schreiner, M., & Hess, T. (2013). On the willingness to pay for privacy as a freemium model: First empirical evidence. ECIS."},{"key":"e_1_3_4_51_1","unstructured":"Selinger E. & Hartzog W. (2014). Obscurity and privacy. Routledge companion to philosophy of technology . SSRN: https:\/\/ssrn.com\/abstract=2439866"},{"key":"e_1_3_4_52_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2011.654198"},{"key":"e_1_3_4_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39345-7_20"},{"key":"e_1_3_4_54_1","volume-title":"The social psychology of telecommunications","author":"Short J.","year":"1976","unstructured":"Short, J., Williams, E., & Christie, B. (1976). The social psychology of telecommunications. John Wiley & Sons, Ltd."},{"key":"e_1_3_4_55_1","volume-title":"With a grain of salt: What consumer privacy surveys don't tell us","author":"Singleton S. M.","year":"2002","unstructured":"Singleton, S. M., & Harper, J. (2002). With a grain of salt: What consumer privacy surveys don't tell us. Competitive Enterprise. SSRN 299930."},{"key":"e_1_3_4_56_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.10.114"},{"key":"e_1_3_4_57_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3536265"},{"key":"e_1_3_4_58_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2021.1960092"},{"key":"e_1_3_4_59_1","volume-title":"CSCW\u201912 Workshop on Reconciling Privacy with Social Media.","author":"Stutzman F.","year":"2012","unstructured":"Stutzman, F., Hartzog, W. (2012). Obscurity by design: An approach to building privacy into social media [Paper presentation]. CSCW\u201912 Workshop on Reconciling Privacy with Social Media. Seattle, WA."},{"key":"e_1_3_4_60_1","first-page":"73","volume-title":"Digital media, youth, and credibility","author":"Sundar S. S.","year":"2008","unstructured":"Sundar, S. S. (2008). The MAIN model: A heuristic approach to understanding technology effects on credibility. In M. J. Metzger & A. J. Flanagin (Eds.), Digital media, youth, and credibility (pp. 73\u2013100). MIT Press."},{"key":"e_1_3_4_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376854"},{"key":"e_1_3_4_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/pst.2014.6890920"},{"key":"e_1_3_4_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.08.022"},{"key":"e_1_3_4_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572583"},{"key":"e_1_3_4_65_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2018.474"},{"key":"e_1_3_4_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557413"},{"key":"e_1_3_4_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10603-019-09419-y"},{"key":"e_1_3_4_68_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077801216646277"},{"key":"e_1_3_4_69_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260305"},{"key":"e_1_3_4_70_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2017.1339940"},{"key":"e_1_3_4_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557347"},{"key":"e_1_3_4_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820073"},{"key":"e_1_3_4_73_1","volume-title":"The age of surveillance capitalism: The fight for a human future at the new frontier of power: Barack Obama's books of 2019","author":"Zuboff S.","year":"2019","unstructured":"Zuboff, S. (2019). The age of surveillance capitalism: The fight for a human future at the new frontier of power: Barack Obama's books of 2019. Profile books."}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2022.2104428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,3]],"date-time":"2023-11-03T13:32:18Z","timestamp":1699018338000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2022.2104428"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,8]]},"references-count":72,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2023,11,26]]}},"alternative-id":["10.1080\/10447318.2022.2104428"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2022.2104428","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"type":"print","value":"1044-7318"},{"type":"electronic","value":"1532-7590"}],"subject":[],"published":{"date-parts":[[2022,8,8]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-03-17","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-07-18","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-08-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}