{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T16:31:25Z","timestamp":1751387485065},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/istas.2005.1452707","type":"proceedings-article","created":{"date-parts":[[2005,7,27]],"date-time":"2005-07-27T21:00:20Z","timestamp":1122498020000},"page":"9-16","source":"Crossref","is-referenced-by-count":7,"title":["Privacy: personal information, threats, and technologies"],"prefix":"10.1109","author":[{"given":"R.","family":"Beckwith","sequence":"first","affiliation":[]},{"given":"S.","family":"Mainwaring","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"132","article-title":"Direct anonymous attestation","author":"brickell","year":"2004","journal-title":"Proceedings of CCS 2004"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/365024.365034"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/644527.644528"},{"key":"ref13","first-page":"72","article-title":"Technical challenges of protecting digital entertainment content","author":"traw","year":"2003","journal-title":"Computer"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/632716.632752"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1203752"},{"key":"ref6","article-title":"Beyond Concern: Understanding Net Users' Attitudes about Online Privacy","author":"cranor","year":"1999","journal-title":"AT&T Labs-Research technical report TR 99 4 3"},{"journal-title":"Profiles of the Future An Inquiry into the Limits of the Possible","year":"1962","author":"clarke","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/986655.986670"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1145\/1054972.1054985","article-title":"Location disclosure to social relations: why, when, & what people want to share","author":"consolvo","year":"2005","journal-title":"Proceedings of the SIGCHI conference on Human factors in computing systems (CHI 2005)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-011-2094-4_6"},{"journal-title":"Equifax-Harris Consumer Privacy Survey 1995","year":"1995","author":"harris","key":"ref1"},{"key":"ref9","first-page":"169","article-title":"Why Johnny can't encrypt: A usability evaluation of PGP 5.0","author":"whitten","year":"1999","journal-title":"Proceedings of the 8th USENIX Security Symposium"}],"event":{"name":"2005 International Symposium on Technology and Society, 2005. Weapons and Wires: Prevention and Safety in a Time of Fear. ISTAS 2005.","location":"Loyola Marymount University, Los Angeles, CA, USA"},"container-title":["Proceedings. 2005 International Symposium on Technology and Society, 2005. Weapons and Wires: Prevention and Safety in a Time of Fear. ISTAS 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9860\/31201\/01452707.pdf?arnumber=1452707","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T17:36:45Z","timestamp":1497634605000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1452707\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/istas.2005.1452707","relation":{},"subject":[]}}