{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:39:51Z","timestamp":1759963191534,"version":"3.28.0"},"reference-count":44,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/istas.2013.6613114","type":"proceedings-article","created":{"date-parts":[[2013,10,2]],"date-time":"2013-10-02T22:31:24Z","timestamp":1380753084000},"page":"147-154","source":"Crossref","is-referenced-by-count":11,"title":["Peer-produced privacy protection"],"prefix":"10.1109","author":[{"given":"Vaibhav","family":"Garg","sequence":"first","affiliation":[]},{"given":"Sameer","family":"Patil","sequence":"additional","affiliation":[]},{"given":"Apu","family":"Kapadia","sequence":"additional","affiliation":[]},{"given":"L. Jean","family":"Camp","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1126\/science.1130992"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/1394445.1394494"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6967-5_8"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518816"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143137"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295174"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807763"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1207\/S15327051HCI1504_2"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1038\/340091a0"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-3591-8_21"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1126\/science.162.3859.1243"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-481-8865-9_19"},{"key":"37","article-title":"Reliable, usable signaling to defeat masquerade attacks","author":"camp","year":"2006","journal-title":"Workshop on the Economics of Information Security (WEIS)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772727"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1145\/352580.352587"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0531(82)90029-1"},{"key":"21","first-page":"543","article-title":"The cost of reading privacy policies","volume":"4","author":"mcdonald","year":"2008","journal-title":"ISJLP"},{"key":"20","first-page":"26","article-title":"Adverse selection in online \"trust\" certifications","author":"edelman","year":"2006","journal-title":"Fifth Workshop on the Economics of Information Security"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958885"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837120"},{"key":"41","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/978-3-540-85230-8_2","article-title":"Evaluating the wisdom of crowds in assessing phishing websites","volume":"5143","author":"moore","year":"2008","journal-title":"Financial Cryptography"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572539"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.2307\/1964229"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1595676.1595684"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078846"},{"key":"24","first-page":"393","article-title":"The right of privacy","volume":"12","author":"posner","year":"1977","journal-title":"Georgia Law Review"},{"key":"25","first-page":"405","article-title":"The economics of privacy","volume":"71","author":"posner","year":"1981","journal-title":"The American Economic Review"},{"key":"26","article-title":"On the viability of privacy-enhancing technologies in a self-regulated business-to-consumer market: Will privacy remain a luxury good","author":"bo?hme","year":"2007","journal-title":"Workshop on the Economics of Information Security (WEIS)"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1177\/1948550612455931"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1017\/S0376892900015939"},{"journal-title":"Communities and Sustainable Forestry in De-veloping Countries","year":"1995","author":"ascher","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1099203.1099220"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0304-9"},{"key":"10","first-page":"111","article-title":"Strategies and struggles with privacy in an online social networking community","author":"strater","year":"2008","journal-title":"Proceedings of the 22nd British HCI Group Annual Conference on People and Computers Culture Creativity Interaction-Volume 1"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"30","first-page":"88","article-title":"The right to be forgotten","volume":"64","author":"rosen","year":"2012","journal-title":"Stanford Law Review Online"},{"journal-title":"Consumer Reports Magazine","article-title":"Facebook & your privacy: Who sees the data you share on the biggest social network","year":"2012","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068823"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/2141512.2141575"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/501158.501163"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-011-2094-4_9"},{"key":"4","first-page":"86","article-title":"My privacy policy: Exploring end-user specification of freeform location access rules","volume":"7398","author":"patil","year":"2012","journal-title":"Proc Usable Security Workshop (USEC)"},{"key":"9","volume":"6046","author":"paul","year":"2011","journal-title":"Improving the Usability of Privacy Settings in Facebook"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_3"}],"event":{"name":"2013 IEEE International Symposium on Technology and Society (ISTAS)","start":{"date-parts":[[2013,6,27]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2013,6,29]]}},"container-title":["2013 IEEE International Symposium on Technology and Society (ISTAS): Social Implications of Wearable Computing and Augmediated Reality in Everyday Life"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6596466\/6613092\/06613114.pdf?arnumber=6613114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,28]],"date-time":"2019-07-28T16:06:28Z","timestamp":1564329988000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6613114\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/istas.2013.6613114","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}