{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:10:07Z","timestamp":1755911407027,"version":"3.44.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1109\/pst47121.2019.8949041","type":"proceedings-article","created":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T23:06:06Z","timestamp":1578438366000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["End-Users and Service Providers: Trust and Distributed Responsibility for Account Security"],"prefix":"10.1109","author":[{"given":"Yomna","family":"Abdelaziz","sequence":"first","affiliation":[{"name":"Carleton University"}]},{"given":"Daniela","family":"Napoli","sequence":"additional","affiliation":[{"name":"Carleton University"}]},{"given":"Sonia","family":"Chiasson","sequence":"additional","affiliation":[{"name":"Carleton University"}]}],"member":"263","reference":[{"key":"ref10","first-page":"543","article-title":"The cost of reading privacy policies","volume":"4","author":"mcdonald","year":"2008","journal-title":"ISJLP"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1600176.1600178"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557330"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1995.9508080335"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.70.2.133"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/569905.569910"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2010.128"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355124"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2007.03.002"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985776"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466446"},{"journal-title":"Google has 2 billion users on Android 500M on Google photos","year":"2017","author":"matney","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2012.0323"},{"journal-title":"Company Info","year":"2018","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134067"},{"key":"ref29","article-title":"A summary of survey methodology best practices for security and privacy researchers","author":"redmiles","year":"2017","journal-title":"Department of Computer Science Technical Report"},{"journal-title":"World Internet Users and 2018 Population Stats","year":"2018","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/isis-summit-vienna-2015-T3.3005"},{"key":"ref7","first-page":"145","author":"simon","year":"2015","journal-title":"Distributed epistemic responsibility in a hyperconnected era"},{"journal-title":"Facebook and Cambridge Analytica What you need to know as fallout widens","year":"2018","author":"granville","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3217804.3217906"},{"journal-title":"Google defends its right to scan Gmail accounts as outraged privacy advocates seek to end practice","year":"2013","author":"press","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/986537.986613"},{"journal-title":"An update on our plans to restrict data access on Facebook","year":"2018","key":"ref22"},{"journal-title":"Discovering Statistics Using Ibm Spss Statistics","year":"2013","author":"field","key":"ref21"},{"journal-title":"Terms of Service","year":"2018","key":"ref24"},{"journal-title":"Terms of Service","year":"2018","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3243141.3243150"},{"key":"ref25","article-title":"Expecting the unexpected: Understanding mismatched privacy expectations online","author":"rao","year":"2016","journal-title":"Symposium On Usable Privacy and Security (SOUPS)"}],"event":{"name":"2019 17th International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2019,8,26]]},"location":"Fredericton, NB, Canada","end":{"date-parts":[[2019,8,28]]}},"container-title":["2019 17th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8937293\/8949011\/08949041.pdf?arnumber=8949041","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:43:00Z","timestamp":1755909780000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8949041\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/pst47121.2019.8949041","relation":{},"subject":[],"published":{"date-parts":[[2019,8]]}}}