{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:21:45Z","timestamp":1776082905751,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,7,20]],"date-time":"2011-07-20T00:00:00Z","timestamp":1311120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,7,20]]},"DOI":"10.1145\/2078827.2078845","type":"proceedings-article","created":{"date-parts":[[2011,12,20]],"date-time":"2011-12-20T17:47:13Z","timestamp":1324403233000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":91,"title":["Home is safer than the cloud!"],"prefix":"10.1145","author":[{"given":"Iulia","family":"Ion","sequence":"first","affiliation":[{"name":"ETH Zurich"}]},{"given":"Niharika","family":"Sachdeva","sequence":"additional","affiliation":[{"name":"IIIT-Delhi"}]},{"given":"Ponnurangam","family":"Kumaraguru","sequence":"additional","affiliation":[{"name":"IIIT-Delhi"}]},{"given":"Srdjan","family":"\u010capkun","sequence":"additional","affiliation":[{"name":"ETH Zurich"}]}],"member":"320","published-online":{"date-parts":[[2011,7,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_3"},{"key":"e_1_3_2_1_2_1","unstructured":"C. Albanesius. Google: Software bug caused Gmail deletions. PCMAG News http:\/\/www.pcmag.com\/article2\/0 2817 2381168 00.asp March 1 2011.  C. Albanesius. Google: Software bug caused Gmail deletions. PCMAG News http:\/\/www.pcmag.com\/article2\/0 2817 2381168 00.asp March 1 2011."},{"key":"e_1_3_2_1_3_1","unstructured":"J. Q. Anderson and L. Rainie. The 2011 cloud trends and best practices report. Hosting.com. http:\/\/www.hosting.com\/resources\/ebooks\/2011-cloud-computing-trends-report.  J. Q. Anderson and L. Rainie. The 2011 cloud trends and best practices report. Hosting.com. http:\/\/www.hosting.com\/resources\/ebooks\/2011-cloud-computing-trends-report."},{"key":"e_1_3_2_1_4_1","volume-title":"The future of cloud computing","author":"Anderson J. Q.","year":"2010","unstructured":"J. Q. Anderson and L. Rainie . The future of cloud computing . Pew Research Center , June 2010 . http:\/\/pewinternet.org\/Reports\/2010\/The-future-of-cloud-computing.aspx. J. Q. Anderson and L. Rainie. The future of cloud computing. Pew Research Center, June 2010. http:\/\/pewinternet.org\/Reports\/2010\/The-future-of-cloud-computing.aspx."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240490507956"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2010.44"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655020"},{"key":"e_1_3_2_1_8_1","volume-title":"Special Report","author":"Data Security Council of India (DSCI).","year":"2010","unstructured":"Data Security Council of India (DSCI). Data protection challenges in Indian cloud computing. an Indian perspective . Special Report , December 2010 . Data Security Council of India (DSCI). Data protection challenges in Indian cloud computing. an Indian perspective. Special Report, December 2010."},{"key":"e_1_3_2_1_9_1","unstructured":"Dropbox. https:\/\/www.dropbox.com.  Dropbox. https:\/\/www.dropbox.com."},{"key":"e_1_3_2_1_10_1","unstructured":"eStandards Forum Financial Standards Foundation. Business indicators. http:\/\/www.estandardsforum.org\/switzerland\/business-indicators?id=166 2009.  eStandards Forum Financial Standards Foundation. Business indicators. http:\/\/www.estandardsforum.org\/switzerland\/business-indicators?id=166 2009."},{"key":"e_1_3_2_1_11_1","unstructured":"The Swiss Federal Data Protection Act. http:\/\/www.edoeb.admin.ch\/org\/00828\/index.html.  The Swiss Federal Data Protection Act. http:\/\/www.edoeb.admin.ch\/org\/00828\/index.html."},{"key":"e_1_3_2_1_12_1","unstructured":"FolderShare. https:\/\/www.foldershare.com\/.  FolderShare. https:\/\/www.foldershare.com\/."},{"key":"e_1_3_2_1_13_1","unstructured":"H. Geert. Geert hofstede cultural dimensions. http:\/\/www.geert-hofstede.com.  H. Geert. Geert hofstede cultural dimensions. http:\/\/www.geert-hofstede.com."},{"key":"e_1_3_2_1_14_1","volume-title":"McGraw-Hil","author":"Geert H.","year":"1991","unstructured":"H. Geert . Cultural and Organizations - Software of the Mind - Intercultural Cooperation and its importance for survival . McGraw-Hil , 1991 . H. Geert. Cultural and Organizations - Software of the Mind - Intercultural Cooperation and its importance for survival. McGraw-Hil, 1991."},{"key":"e_1_3_2_1_15_1","volume-title":"World Privacy Forum","author":"Gellman R.","year":"2009","unstructured":"R. Gellman . Privacy in the clouds: Risks to privacy and confidentiality from cloud computing . World Privacy Forum , February 2009 . R. Gellman. Privacy in the clouds: Risks to privacy and confidentiality from cloud computing. World Privacy Forum, February 2009."},{"key":"e_1_3_2_1_16_1","volume-title":"January 13","author":"News Google","year":"2010","unstructured":"Google 'may pull out of China after Gmail cyberattack'. BBC News , http:\/\/news.bbc.co.uk\/2\/hi\/8455712.stm , January 13 , 2010 . Google 'may pull out of China after Gmail cyberattack'. BBC News, http:\/\/news.bbc.co.uk\/2\/hi\/8455712.stm, January 13, 2010."},{"key":"e_1_3_2_1_17_1","unstructured":"Google Docs. https:\/\/docs.google.com.  Google Docs. https:\/\/docs.google.com."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.115"},{"key":"e_1_3_2_1_19_1","volume-title":"PCWorld","author":"Gross G.","year":"2008","unstructured":"G. Gross . Cloud computing may draw government action . PCWorld , September 12, 2008 , http:\/\/pcworld.about.com\/od\/businesscenter\/Cloud-Computing-May-Draw-Gover.htm. G. Gross. Cloud computing may draw government action. PCWorld, September 12, 2008, http:\/\/pcworld.about.com\/od\/businesscenter\/Cloud-Computing-May-Draw-Gover.htm."},{"key":"e_1_3_2_1_20_1","volume-title":"September 3","author":"Hoofnagle C. J.","year":"2008","unstructured":"C. J. Hoofnagle and J. King . Research report: What Californians understand about privacy online. Available at SSRN: http:\/\/ssrn.com\/abstract=1133075 , September 3 , 2008 . C. J. Hoofnagle and J. King. Research report: What Californians understand about privacy online. Available at SSRN: http:\/\/ssrn.com\/abstract=1133075, September 3, 2008."},{"key":"e_1_3_2_1_21_1","volume-title":"Use of cloud computing applications and services","author":"Horrigan J. B.","year":"2008","unstructured":"J. B. Horrigan . Use of cloud computing applications and services . Pew Research Center , September 2008 . J. B. Horrigan. Use of cloud computing applications and services. Pew Research Center, September 2008."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1842733.1842751"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-144"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.03.001"},{"key":"e_1_3_2_1_25_1","unstructured":"M. N. Khan. Does India have a data protection law? http:\/\/www.legalserviceindia.com\/article\/l406-Does-India-have-a-Data-Protection-law.html November 2009.  M. N. Khan. Does India have a data protection law? http:\/\/www.legalserviceindia.com\/article\/l406-Does-India-have-a-Data-Protection-law.html November 2009."},{"key":"e_1_3_2_1_26_1","volume-title":"The Huffington Post","author":"Kinetz E.","year":"2011","unstructured":"E. Kinetz . Google , skype targeted in india security crackdown . The Huffington Post , February 9, 2011 , http:\/\/www.huffingtonpost.com\/2010\/09\/02\/google-skype-targeted-in-_n_703198.html. E. Kinetz. Google, skype targeted in india security crackdown. The Huffington Post, February 9, 2011, http:\/\/www.huffingtonpost.com\/2010\/09\/02\/google-skype-targeted-in-_n_703198.html."},{"key":"e_1_3_2_1_27_1","volume-title":"July 29, 2009.","author":"Kumar M.","unstructured":"M. Kumar . List of terrorist attacks on India. http:\/\/kumarmohit.wordpress.com\/2009\/07\/29\/list-of-terrorist-attacks-on-india\/ , July 29, 2009. M. Kumar. List of terrorist attacks on India. http:\/\/kumarmohit.wordpress.com\/2009\/07\/29\/list-of-terrorist-attacks-on-india\/, July 29, 2009."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/11767831_16"},{"key":"e_1_3_2_1_30_1","volume-title":"Publicity and Personality Laws","author":"Michael H.","year":"2001","unstructured":"H. Michael . International Privacy , Publicity and Personality Laws . Reed Elsevier , 2001 . H. Michael. International Privacy, Publicity and Personality Laws. Reed Elsevier, 2001."},{"key":"e_1_3_2_1_31_1","unstructured":"National Intelligence Grid (NATGRID). http:\/\/currentaffairs.gktoday.in\/2010\/02\/national-intelligence-grid-natgrid.html.  National Intelligence Grid (NATGRID). http:\/\/currentaffairs.gktoday.in\/2010\/02\/national-intelligence-grid-natgrid.html."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1841853.1841875"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.140"},{"issue":"3","key":"e_1_3_2_1_34_1","article-title":"New data protection act in switzerland: More transparency, additional costs","volume":"2006","author":"Rosenthal D.","year":"2007","unstructured":"D. Rosenthal . New data protection act in switzerland: More transparency, additional costs . Privacy Laws & Business International Newsletter , 2006 ( 3 ), December 2007 . D. Rosenthal. New data protection act in switzerland: More transparency, additional costs. Privacy Laws & Business International Newsletter, 2006(3), December 2007.","journal-title":"Privacy Laws & Business International Newsletter"},{"key":"e_1_3_2_1_35_1","volume-title":"Cloud development survey","author":"Schindler E.","year":"2010","unstructured":"E. Schindler . Cloud development survey . Evans Data Corporation , Strategic Reports , July 2010 . http:\/\/www.evansdata.com\/reports\/viewRelease.php?reportID=27. E. Schindler. Cloud development survey. Evans Data Corporation, Strategic Reports, July 2010. http:\/\/www.evansdata.com\/reports\/viewRelease.php?reportID=27."},{"key":"e_1_3_2_1_36_1","volume-title":"Information technology act","author":"Singel R.","year":"2000","unstructured":"R. Singel . Information technology act 2000 . Department of Information Technology . http:\/\/www.mit.gov.in\/content\/it-act-2000-dpl-cyber-laws. R. Singel. Information technology act 2000. Department of Information Technology. http:\/\/www.mit.gov.in\/content\/it-act-2000-dpl-cyber-laws."},{"key":"e_1_3_2_1_37_1","volume-title":"WIRED","author":"Singel R.","year":"2011","unstructured":"R. Singel . Twitter's response to wikileaks subpoena should be the industry standard . WIRED , January 10, 2011 , http:\/\/www.wired.com\/threatlevel\/2011\/01\/twitter\/. R. Singel. Twitter's response to wikileaks subpoena should be the industry standard. WIRED, January 10, 2011, http:\/\/www.wired.com\/threatlevel\/2011\/01\/twitter\/."},{"key":"e_1_3_2_1_38_1","volume-title":"http:\/\/laws.findlaw.com\/us\/442\/735.html","author":"v. Maryland Smith","year":"1979","unstructured":"Smith v. Maryland . 442 U. S. 735 ( 1979 ): http:\/\/laws.findlaw.com\/us\/442\/735.html . Smith v. Maryland. 442 U. S. 735 (1979): http:\/\/laws.findlaw.com\/us\/442\/735.html."},{"key":"e_1_3_2_1_39_1","first-page":"2010","article-title":"Caught in the cloud: Privacy, encryption, and government back doors in the Web 2.0 era","volume":"359","author":"Soghoian C.","unstructured":"C. Soghoian . Caught in the cloud: Privacy, encryption, and government back doors in the Web 2.0 era . Journal on Telecommunications & High Tech. Law 359 , 8(2), 2010 . C. Soghoian. Caught in the cloud: Privacy, encryption, and government back doors in the Web 2.0 era. Journal on Telecommunications & High Tech. Law 359, 8(2), 2010.","journal-title":"Journal on Telecommunications & High Tech. Law"},{"key":"e_1_3_2_1_40_1","unstructured":"SurveyMonkey. http:\/\/www.surveymonkey.com.  SurveyMonkey. http:\/\/www.surveymonkey.com."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2010.05.005"},{"key":"e_1_3_2_1_42_1","unstructured":"Unique Identification Authority India (UID). http:\/\/uidai.gov.in\/.  Unique Identification Authority India (UID). http:\/\/uidai.gov.in\/."},{"key":"e_1_3_2_1_43_1","volume-title":"WJS Blogs","author":"Vascellaro J. E.","year":"2009","unstructured":"J. E. Vascellaro . Google discloses privacy glitch . WJS Blogs , March 8, 2009 . http:\/\/blogs.wsj.com\/digits\/2009\/03\/08\/1214\/. J. E. Vascellaro. Google discloses privacy glitch. WJS Blogs, March 8, 2009. http:\/\/blogs.wsj.com\/digits\/2009\/03\/08\/1214\/."},{"key":"e_1_3_2_1_44_1","volume-title":"New York","author":"Westin A. F.","year":"1967","unstructured":"A. F. Westin . Privacy and Freedom . Atheneum , New York , first edition, 1967 . A. F. Westin. Privacy and Freedom. Atheneum, New York, first edition, 1967."}],"event":{"name":"SOUPS '11: Symposium On Usable Privacy and Security","location":"Pittsburgh Pennsylvania","acronym":"SOUPS '11","sponsor":["Carnegie Mellon CyLab","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the Seventh Symposium on Usable Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2078827.2078845","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2078827.2078845","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:15Z","timestamp":1750241175000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2078827.2078845"}},"subtitle":["privacy concerns for consumer cloud storage"],"short-title":[],"issued":{"date-parts":[[2011,7,20]]},"references-count":43,"alternative-id":["10.1145\/2078827.2078845","10.1145\/2078827"],"URL":"https:\/\/doi.org\/10.1145\/2078827.2078845","relation":{},"subject":[],"published":{"date-parts":[[2011,7,20]]},"assertion":[{"value":"2011-07-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}