{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:35:45Z","timestamp":1729625745598,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1109\/percom.2016.7456518","type":"proceedings-article","created":{"date-parts":[[2016,4,21]],"date-time":"2016-04-21T20:20:04Z","timestamp":1461270004000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["PriMe: Human-centric privacy measurement based on user preferences towards data sharing in mobile participatory sensing systems"],"prefix":"10.1109","author":[{"given":"Rui","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jiannong","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"VanSyckel","sequence":"additional","affiliation":[]},{"given":"Wenyu","family":"Gao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2013","article-title":"12 Most Abused Android App Permissions","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/978-3-642-27576-0_3"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1002\/(SICI)1097-4571(199503)46:2<133::AID-ASI6>3.0.CO;2-Z"},{"key":"ref13","first-page":"1","article-title":"Smartphone privacy in mobile computing: Issues, methods and systems","volume":"13","author":"liu","year":"2015","journal-title":"DBSJ Journal"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/2078827.2078847"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/2441955.2442032"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1016\/j.chb.2012.07.008"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/PerCom.2012.6199861"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/s10707-013-0193-z"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/MASS.2011.41"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/2757384.2757396"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1016\/j.jss.2011.06.073"},{"key":"ref6","first-page":"166","article-title":"Privacy and freedom","volume":"25","author":"westin","year":"1968","journal-title":"Washington and Lee Law Rev"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.2307\/1321160"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/2632048.2636064"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.4324\/9781410614575","author":"bond","year":"2013","journal-title":"Applying the Rasch Model Fundamental measurement in the Human Sciences"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/MobServ.2015.30"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/SURV.2012.031412.00077"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/1814433.1814450"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/PERCOMW.2011.5766897"}],"event":{"name":"2016 IEEE International Conference on Pervasive Computing and Communications (PerCom)","start":{"date-parts":[[2016,3,14]]},"location":"Sydney, Australia","end":{"date-parts":[[2016,3,19]]}},"container-title":["2016 IEEE International Conference on Pervasive Computing and Communications (PerCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7452833\/7456493\/7456518.pdf?arnumber=7456518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T23:00:02Z","timestamp":1567810802000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7456518\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/percom.2016.7456518","relation":{},"subject":[],"published":{"date-parts":[[2016,3]]}}}