{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T12:43:42Z","timestamp":1737636222117,"version":"3.33.0"},"reference-count":30,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["New Review of Hypermedia and Multimedia"],"published-print":{"date-parts":[[2007,12]]},"DOI":"10.1080\/13614560701709861","type":"journal-article","created":{"date-parts":[[2007,12,8]],"date-time":"2007-12-08T06:21:27Z","timestamp":1197094887000},"page":"163-185","source":"Crossref","is-referenced-by-count":6,"title":["Designing for privacy in personal learning spaces"],"prefix":"10.1080","volume":"13","author":[{"given":"M.","family":"Najafian Razavi","sequence":"first","affiliation":[]},{"given":"L.","family":"Iverson","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","doi-asserted-by":"crossref","unstructured":"A. Adams , \u201cUsers\u2019 perception of privacy in multimedia communication, extended abstract\u201d , in Proceedings of CHI 1999 , Pittsburgh, PA , 1999a .","DOI":"10.1145\/632751.632752"},{"key":"CIT0002","unstructured":"A. Adams , \u201cThe implications of users\u2019 privacy perception on communication and information privacy policies\u201d , inProceedings of Telecommunications Policy Research Conference, Washington DC , 1999b ."},{"key":"CIT0003","doi-asserted-by":"crossref","unstructured":"A. Adams and M. A. Sasse , \u201cPrivacy in multimedia communications: protecting users not just data\u201d , inProceedings of IMH HCI, 2001 , pp. 49 \u2013 64 .","DOI":"10.1007\/978-1-4471-0353-0_4"},{"key":"CIT0004","doi-asserted-by":"crossref","unstructured":"V. Bellotti and A. Sellen , \u201cDesign for privacy in ubiquitous computing environments\u201d , inProceedings of the 3rd European Conference on Computer Supported Cooperative Work (ECSCW 93), 1993 .","DOI":"10.1007\/978-94-011-2094-4_6"},{"key":"CIT0005","unstructured":"D. Boyd \u201cIdentity production in a networked culture: why youth heart MySpace\u201d , in American Association for the Advancement of Science , St. Louis, MO, 19 February , 2006 ."},{"key":"CIT0006","doi-asserted-by":"crossref","unstructured":"A. L. Burrow \u201cNegotiating access within Wiki: a system to construct and maintain a taxonomy of access rules\u201d , inProceedings of the fifteenth ACM conference on Hypertext and hypermedia, Santa Cruz , CA , 2004 , pp. 77 \u2013 86 .","DOI":"10.1145\/1012807.1012831"},{"key":"CIT0007","doi-asserted-by":"crossref","unstructured":"X. Caoand and L. Iverson , \u201cIntentional access management: making access control usable for end-users\u201d , inProceedings of the Second Symposium on Usable Privacy and Security, Pittsburgh, PA, 12\u201314 July , 2006 .","DOI":"10.1145\/1143120.1143124"},{"key":"CIT0008","doi-asserted-by":"crossref","unstructured":"T. Erickson \u201cFrom PIM to GIM: personal information management in group contexts\u201d , in Communications of the ACM , January , 2006 .","DOI":"10.1145\/1107458.1107495"},{"volume-title":"Knowledge Management Foundations","year":"2002","author":"Fuller S.","key":"CIT0009"},{"volume-title":"The Discovery of Grounded Theory: Strategies for Qualitative Research","year":"1967","author":"Glaser B.","key":"CIT0010"},{"key":"CIT0011","doi-asserted-by":"crossref","unstructured":"R. Gross , A. Acquisti and H. J. Heinz III , \u201cInformation revelation and privacy in online social networks\u201d , in Proceedings of the 2005 ACM workshop on Privacy in the electronic society , pp. 71 \u2013 80 .","DOI":"10.1145\/1102199.1102214"},{"key":"CIT0012","doi-asserted-by":"crossref","unstructured":"H. R. Hartson , Cognitive, physical, sensory, and functional affordances in interaction design\u201d , Behav. Inform. Technol . 22 , pp. 315 \u2013 338 , 2003 .","DOI":"10.1080\/01449290310001592587"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1109\/ICALT.2006.1652591"},{"key":"CIT0014","unstructured":"D. Love , G. McKean and P. Gathercoal , Portfolios to webfolios and beyond: levels of maturation\u201d , Educause Quart . 27 , pp. 24 \u2013 37 , May 2004 ."},{"key":"CIT0015","unstructured":"J. McGrenere and W. Ho , \u201cAffordances: clarifying and evolving a concept\u201d , in Proceedings of Graphics Interface , May 15\u201317, Montreal , 2000 , pp. 179 \u2013 186 ."},{"key":"CIT0016","doi-asserted-by":"crossref","unstructured":"D. R. Millen , J. Feinberg and B. Kerr , \u201cDogear: social bookmarking in the enterprise , in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems , Montr\u00e9al, Qu\u00e9bec, Canada, 22\u201327 April , 2006 .","DOI":"10.1145\/1124772.1124792"},{"volume-title":"Readme First for a User's Guide to Qualitative Methods","year":"2002","author":"Morse J. M.","key":"CIT0017"},{"volume-title":"The Design of Everyday Things","year":"1988","author":"Norman D. A.","key":"CIT0018"},{"key":"CIT0019","doi-asserted-by":"crossref","unstructured":"D. A. Norman , \u201cAffordances, conventions, and design\u201d , Interactions , 6 , pp. 38 \u2013 41 , 1999 .","DOI":"10.1145\/301153.301168"},{"key":"CIT0020","doi-asserted-by":"crossref","unstructured":"J. S. Olson , J. Grudin and E. Horvitz , \u201cA study of preferences for sharing and privacy\u201d , in Proceedings of CHI 2005 , Portland, OR .","DOI":"10.1145\/1056808.1057073"},{"key":"CIT0021","doi-asserted-by":"crossref","unstructured":"L. Palen and P. Dourish , \u201cUnpacking \u2018privacy\u2019 for a networked world\u201d , inProceedings of the SIGCHI Conference on Human Factors in Computing Systems, Ft. Lauderdale, FL, 5\u201310 April , 2003 .","DOI":"10.1145\/642633.642635"},{"key":"CIT0022","doi-asserted-by":"crossref","unstructured":"S. Patil and J. Lai , \u201cWho gets to know what, when: configuring privacy permissions in an awareness application\u201d , in Proceedings of CHI 2005 , Portland, OR .","DOI":"10.1145\/1054972.1054987"},{"key":"CIT0023","doi-asserted-by":"crossref","unstructured":"M. N. Razavi and L. Iverson , \u201cA grounded theory of information sharing behavior in a personal learning space\u201d , inProceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work, Banff, Alberta, Canada, 4\u20138 November , 2006 .","DOI":"10.1145\/1180875.1180946"},{"key":"CIT0024","unstructured":"D. Tosh and B. Werdmuller , \u201cePortfolios and weblogs: one vision for ePortfolio development\u201d , 2004, ePortfolio research and development community (ERADC), available online at http:\/\/www.eradc.org\/papers\/ePortfolio_Weblog.pdf (accessed May 2007)."},{"key":"CIT0025","doi-asserted-by":"crossref","unstructured":"M. Van Harmelen , \u201cPersonal learning environments\u201d , inProceedings of the Sixth IEEE International Conference on Advanced Learning Technologies (ICALT'06),\u2009 2006 , pp. 815 \u2013 816 .","DOI":"10.1109\/ICALT.2006.1652565"},{"key":"CIT0026","unstructured":"T. Whalen and C. Gates , \u201cPrivate lives: user attitudes towards personal information on the web\u201d , inSOUPS 2005."},{"key":"CIT0027","doi-asserted-by":"crossref","unstructured":"S. Whittaker and C. Sidner , \u201cEmail overload: exploring personal information management of email\u201d , inProceedings of the SIGCHI Conference on Human Factors in Computing Systems: Common Ground, Vancouver, British Columbia, Canada, 13\u201318 April , 1996 .","DOI":"10.1145\/238386.238530"},{"key":"CIT0028","unstructured":"A. Whitten and J. D. Tygar , \u201cSafe staging for computer security\u201d , in HCI and Security Systems Workshop , CHI 2003, Ft. Lauderdale, FL, April , 2003 ."},{"key":"CIT0029","unstructured":"Wikipedia definition of affordance . Available online at http:\/\/en.wikipedia.org\/wiki\/Affordance (accessed May 2007) ."},{"key":"CIT0030","unstructured":"Wikipedia definition of principle of least surprise . Available online at http:\/\/en.wikipedia.org\/wiki\/Principle_of_least_astonishment (accessed May 2007) ."}],"container-title":["New Review of Hypermedia and Multimedia"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/13614560701709861","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T12:22:54Z","timestamp":1737634974000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/13614560701709861"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,12]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2007,12]]}},"alternative-id":["10.1080\/13614560701709861"],"URL":"https:\/\/doi.org\/10.1080\/13614560701709861","relation":{},"ISSN":["1361-4568","1740-7842"],"issn-type":[{"type":"print","value":"1361-4568"},{"type":"electronic","value":"1740-7842"}],"subject":[],"published":{"date-parts":[[2007,12]]}}}