{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T12:10:46Z","timestamp":1771675846738,"version":"3.50.1"},"reference-count":85,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T00:00:00Z","timestamp":1380585600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["IIS-0308277, IIS-0808783, CNS-0831526"],"award-info":[{"award-number":["IIS-0308277, IIS-0808783, CNS-0831526"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004358","name":"Samsung","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004358","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["IIS-0308277, IIS-0808783, CNS-0831526"],"award-info":[{"award-number":["IIS-0308277, IIS-0808783, CNS-0831526"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Interact. Intell. Syst."],"published-print":{"date-parts":[[2013,10]]},"abstract":"<jats:p>Recommender systems increasingly use contextual and demographical data as a basis for recommendations. Users, however, often feel uncomfortable providing such information. In a privacy-minded design of recommenders, users are free to decide for themselves what data they want to disclose about themselves. But this decision is often complex and burdensome, because the consequences of disclosing personal information are uncertain or even unknown. Although a number of researchers have tried to analyze and facilitate such information disclosure decisions, their research results are fragmented, and they often do not hold up well across studies. This article describes a unified approach to privacy decision research that describes the cognitive processes involved in users\u2019 \u201cprivacy calculus\u201d in terms of system-related perceptions and experiences that act as mediating factors to information disclosure. The approach is applied in an online experiment with 493 participants using a mock-up of a context-aware recommender system. Analyzing the results with a structural linear model, we demonstrate that personal privacy concerns and disclosure justification messages affect the perception of and experience with a system, which in turn drive information disclosure decisions. Overall, disclosure justification messages do not increase disclosure. Although they are perceived to be valuable, they decrease users\u2019 trust and satisfaction. Another result is that manipulating the order of the requests increases the disclosure of items requested early but decreases the disclosure of items requested later.<\/jats:p>","DOI":"10.1145\/2499670","type":"journal-article","created":{"date-parts":[[2013,11,6]],"date-time":"2013-11-06T14:09:19Z","timestamp":1383746959000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":95,"title":["Making Decisions about Privacy"],"prefix":"10.1145","volume":"3","author":[{"given":"Bart P.","family":"Knijnenburg","sequence":"first","affiliation":[{"name":"University of California, Irvine"}]},{"given":"Alfred","family":"Kobsa","sequence":"additional","affiliation":[{"name":"University of California, Irvine"}]}],"member":"320","published-online":{"date-parts":[[2013,10]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/336992.336995"},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"e_1_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Acquisti A. and Grossklags J. 2008. What can behavioral economics teach us about privacy? In Digital Privacy: Theory Technologies and Practices A. Acquisti S. de Capitani di Vimercati S. Gritzalis and C. Lambrinoudakis Eds. Taylor & Francis 363--377.  Acquisti A. and Grossklags J. 2008. What can behavioral economics teach us about privacy? In Digital Privacy: Theory Technologies and Practices A. Acquisti S. de Capitani di Vimercati S. Gritzalis and C. Lambrinoudakis Eds. Taylor & Francis 363--377.","DOI":"10.1201\/9781420052183.ch18"},{"key":"e_1_2_2_4_1","volume-title":"Proceedings of the 21st Workshop on Information Systems and Economics.","author":"Acquisti A.","unstructured":"Acquisti , A. , John , L. , and Loewenstein , G . 2009. What is privacy worth? In Proceedings of the 21st Workshop on Information Systems and Economics. Acquisti, A., John, L., and Loewenstein, G. 2009. What is privacy worth? In Proceedings of the 21st Workshop on Information Systems and Economics."},{"key":"#cr-split#-e_1_2_2_5_1.1","doi-asserted-by":"crossref","unstructured":"Acquisti A. John L. K. and Loewenstein G. 2011. The impact of relative standards on the propensity to disclose. J. Marketing Res. 1--15. DOI:http:\/\/dx.doi.org\/10.1509\/jmr.09.0215. 10.1509\/jmr.09.0215","DOI":"10.1509\/jmr.09.0215"},{"key":"#cr-split#-e_1_2_2_5_1.2","doi-asserted-by":"crossref","unstructured":"Acquisti A. John L. K. and Loewenstein G. 2011. The impact of relative standards on the propensity to disclose. J. Marketing Res. 1--15. DOI:http:\/\/dx.doi.org\/10.1509\/jmr.09.0215.","DOI":"10.1509\/jmr.09.0215"},{"key":"#cr-split#-e_1_2_2_6_1.1","doi-asserted-by":"crossref","unstructured":"Adomavicius G. and Tuzhilin A. 2011. Context-aware recommender systems. In Recommender Systems Handbook F. Ricci L. Rokach B. Shapira and P. B. Kantor Eds. Springer 217--253. DOI:http:\/\/dx.doi.org\/10.1007\/978-0-387-85820-3_7. 10.1007\/978-0-387-85820-3_7","DOI":"10.1007\/978-0-387-85820-3_7"},{"key":"#cr-split#-e_1_2_2_6_1.2","doi-asserted-by":"crossref","unstructured":"Adomavicius G. and Tuzhilin A. 2011. Context-aware recommender systems. In Recommender Systems Handbook F. Ricci L. Rokach B. Shapira and P. B. Kantor Eds. Springer 217--253. DOI:http:\/\/dx.doi.org\/10.1007\/978-0-387-85820-3_7.","DOI":"10.1007\/978-0-387-85820-3_7"},{"key":"e_1_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(78)90047-1"},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208940.2208951"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.88.3.588"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837120"},{"key":"e_1_2_2_11_1","volume-title":"Proceedings of the 2nd Workshop on Context-Aware Recommender Systems.","author":"B\u00f6hmer M.","unstructured":"B\u00f6hmer , M. , Bauer , G. , and Kr\u00fcger , A . 2010. Exploring the design space of context-aware recommender systems that suggest mobile applications . In Proceedings of the 2nd Workshop on Context-Aware Recommender Systems. B\u00f6hmer, M., Bauer, G., and Kr\u00fcger, A. 2010. Exploring the design space of context-aware recommender systems that suggest mobile applications. In Proceedings of the 2nd Workshop on Context-Aware Recommender Systems."},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v58:2"},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830525"},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/564376.564419"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-005-5879-y"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054985"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.2307\/249775"},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961634.1961639"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518752"},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.1030.0033"},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.103.4.650"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851600.1851698"},{"key":"e_1_2_2_23_1","volume-title":"The Equifax Report on Consumers in the Information Age","author":"Harris L.","unstructured":"Harris , L. and Associates . 199 0. The Equifax Report on Consumers in the Information Age . Equifax Inc., Atlanta, GA. Harris, L. and Associates. 1990. The Equifax Report on Consumers in the Information Age. Equifax Inc., Atlanta, GA."},{"key":"e_1_2_2_24_1","volume-title":"Harris-Equifax Consumer Privacy Survey","author":"Harris L.","year":"1991","unstructured":"Harris , L. and Associates . 1991. Harris-Equifax Consumer Privacy Survey 1991 . Equifax Inc., Atlanta, GA. Harris, L. and Associates. 1991. Harris-Equifax Consumer Privacy Survey 1991. Equifax Inc., Atlanta, GA."},{"key":"e_1_2_2_25_1","unstructured":"Harris L. Associates and Westin A. F. 1998. Personalized marketing and privacy on the net: What consumers want. Privacy Amer. Business Newsl.  Harris L. Associates and Westin A. F. 1998. Personalized marketing and privacy on the net: What consumers want. Privacy Amer. Business Newsl."},{"key":"e_1_2_2_26_1","volume-title":"Consumer Privacy Attitudes: A Major Shift Since 2000 and Why. Harris Interactive","author":"Harris L.","unstructured":"Harris , L. , Westin , A. F. , and Associates . 2003. Consumer Privacy Attitudes: A Major Shift Since 2000 and Why. Harris Interactive , Inc . Harris, L., Westin, A. F., and Associates. 2003. Consumer Privacy Attitudes: A Major Shift Since 2000 and Why. Harris Interactive, Inc."},{"key":"e_1_2_2_27_1","volume-title":"The thing and I: Understanding the relationship between user and product","author":"Hassenzahl M.","unstructured":"Hassenzahl , M. 2005. The thing and I: Understanding the relationship between user and product . In Funology, Human-Computer Interaction Series, M. A. Blythe, K. Overbeeke, A. F. Monk and P. C. Wright Eds., Springer , 31--42. DOI:http:\/\/dx.doi.org\/10.1007\/1-4020-2967-5_4. 10.1007\/1-4020-2967-5_4 Hassenzahl, M. 2005. The thing and I: Understanding the relationship between user and product. In Funology, Human-Computer Interaction Series, M. A. Blythe, K. Overbeeke, A. F. Monk and P. C. Wright Eds., Springer, 31--42. DOI:http:\/\/dx.doi.org\/10.1007\/1-4020-2967-5_4."},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/10705519909540118"},{"key":"e_1_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1183463.1183467"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017327.2017330"},{"key":"e_1_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1561\/1100000004"},{"key":"e_1_2_2_32_1","first-page":"2","article-title":"Consumer trust in an internet store: A cross-cultural validation","volume":"5","author":"Jarvenpaa S.","year":"1999","unstructured":"Jarvenpaa , S. and Tractinsky , N. 1999 . Consumer trust in an internet store: A cross-cultural validation . J. Comput. Mediated Commun. 5 , 2 . DOI:http:\/\/dx.doi.org\/10.1111\/j.1083-6101.1999.tb00337.x. 10.1111\/j.1083-6101.1999.tb00337.x Jarvenpaa, S. and Tractinsky, N. 1999. Consumer trust in an internet store: A cross-cultural validation. J. Comput. Mediated Commun. 5, 2. DOI:http:\/\/dx.doi.org\/10.1111\/j.1083-6101.1999.tb00337.x.","journal-title":"J. Comput. Mediated Commun."},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1086\/656423"},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.2307\/1914185"},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809477"},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1086\/261737"},{"key":"e_1_2_2_37_1","volume-title":"Proceedings of the Dewald Roode Information Security Workshop. http:\/\/ifip.byu.edu\/2011\/Keith&percnt;20et&percnt;20al.&percnt;20Mobile&percnt;20Applications.pdf.","author":"Keith M. J.","unstructured":"Keith , M. J. , Babb , J. S. , Lowry , P. B. , Furner , C. P. , and Abdullat , A . 2011. The Roles of privacy assurance, network effects, and information cascades in the adoption of and willingness to pay for location-based services with mobile applications . In Proceedings of the Dewald Roode Information Security Workshop. http:\/\/ifip.byu.edu\/2011\/Keith&percnt;20et&percnt;20al.&percnt;20Mobile&percnt;20Applications.pdf. Keith, M. J., Babb, J. S., Lowry, P. B., Furner, C. P., and Abdullat, A. 2011. The Roles of privacy assurance, network effects, and information cascades in the adoption of and willingness to pay for location-based services with mobile applications. In Proceedings of the Dewald Roode Information Security Workshop. http:\/\/ifip.byu.edu\/2011\/Keith&percnt;20et&percnt;20al.&percnt;20Mobile&percnt;20Applications.pdf."},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357127"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2449396.2449448"},{"key":"e_1_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-011-9118-4"},{"key":"e_1_2_2_41_1","volume-title":"The Adaptive Web: Methods and Strategies of Web Personalization","author":"Kobsa A.","unstructured":"Kobsa , A. 2007. Privacy-enhanced web personalization . In The Adaptive Web: Methods and Strategies of Web Personalization , P. Brusilovsky, A. Kobsa, and W. Nejdl Eds., Springer , 628--670. DOI:http:\/\/dx.doi.org\/10.1007\/978-3-540-72079-9_21. 10.1007\/978-3-540-72079-9_21 Kobsa, A. 2007. Privacy-enhanced web personalization. In The Adaptive Web: Methods and Strategies of Web Personalization, P. Brusilovsky, A. Kobsa, and W. Nejdl Eds., Springer, 628--670. DOI:http:\/\/dx.doi.org\/10.1007\/978-3-540-72079-9_21."},{"key":"e_1_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_21"},{"key":"e_1_2_2_43_1","volume-title":"Proceedings of the International Conference on Availability, Reliability and Security. IEEE, 299--306","author":"Kolter J.","year":"2009","unstructured":"Kolter , J. and Pernul , G . 2009. Generating user-understandable privacy preferences . In Proceedings of the International Conference on Availability, Reliability and Security. IEEE, 299--306 . DOI:http:\/\/dx.doi.org\/10.1109\/ARES. 2009 .89. 10.1109\/ARES.2009.89 Kolter, J. and Pernul, G. 2009. Generating user-understandable privacy preferences. In Proceedings of the International Conference on Availability, Reliability and Security. IEEE, 299--306. DOI:http:\/\/dx.doi.org\/10.1109\/ARES.2009.89."},{"key":"e_1_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01880.x"},{"key":"e_1_2_2_45_1","volume-title":"Proceedings of the Lund Conference on Architectural Psychology, R. K\u00fcller Ed., Dowden, Hutchinson & Ross.","author":"Laufer R. S.","unstructured":"Laufer , R. S. , Proshansky , H. M. , and Wolfe , M . 1973. Some analytic dimensions of privacy . In Proceedings of the Lund Conference on Architectural Psychology, R. K\u00fcller Ed., Dowden, Hutchinson & Ross. Laufer, R. S., Proshansky, H. M., and Wolfe, M. 1973. Some analytic dimensions of privacy. In Proceedings of the Lund Conference on Architectural Psychology, R. K\u00fcller Ed., Dowden, Hutchinson & Ross."},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/765891.765952"},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.11.010"},{"key":"e_1_2_2_48_1","volume-title":"Proceedings of the 4th International Symposium on Ubiquitous Computing Systems. H. Ichikawa, W.-D. Cho, I. Satoh, and H. Youn Eds., Springer, 45--58","author":"Lee J.","unstructured":"Lee , J. and Lee , J . 2007. Context awareness by case-based reasoning in a music recommendation system . In Proceedings of the 4th International Symposium on Ubiquitous Computing Systems. H. Ichikawa, W.-D. Cho, I. Satoh, and H. Youn Eds., Springer, 45--58 . DOI:http:\/\/dx.doi.org\/10.1007\/978-3-540-76772-5_4. 10.1007\/978-3-540-76772-5_4 Lee, J. and Lee, J. 2007. Context awareness by case-based reasoning in a music recommendation system. In Proceedings of the 4th International Symposium on Ubiquitous Computing Systems. H. Ichikawa, W.-D. Cho, I. Satoh, and H. Youn Eds., Springer, 45--58. DOI:http:\/\/dx.doi.org\/10.1007\/978-3-540-76772-5_4."},{"key":"e_1_2_2_49_1","first-page":"62","article-title":"Understanding situational online information disclosure as a privacy calculus","volume":"51","author":"Li H.","year":"2010","unstructured":"Li , H. , Sarathy , R. , and Xu , H. 2010 . Understanding situational online information disclosure as a privacy calculus . J. Comput. Inf. Syst. 51 , 1, 62 -- 71 . Li, H., Sarathy, R., and Xu, H. 2010. Understanding situational online information disclosure as a privacy calculus. J. Comput. Inf. Syst. 51, 1, 62--71.","journal-title":"J. Comput. Inf. Syst."},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.01.017"},{"key":"e_1_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.4018\/jisp.2008100105"},{"key":"e_1_2_2_52_1","volume-title":"Privacy vs. Personalization: Part III. Cyber Dialogue","author":"Mabley K.","unstructured":"Mabley , K. 2000. Privacy vs. Personalization: Part III. Cyber Dialogue , Inc . Mabley, K. 2000. Privacy vs. Personalization: Part III. Cyber Dialogue, Inc."},{"key":"e_1_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_2_2_54_1","first-page":"4","article-title":"Privacy, trust, and disclosure: Exploring barriers to electronic commerce","volume":"9","author":"Metzger M. J.","year":"2004","unstructured":"Metzger , M. J. 2004 . Privacy, trust, and disclosure: Exploring barriers to electronic commerce . J. Comput. Mediated Commun. 9 , 4 . Metzger, M. J. 2004. Privacy, trust, and disclosure: Exploring barriers to electronic commerce. J. Comput. Mediated Commun. 9, 4.","journal-title":"J. Comput. Mediated Commun."},{"key":"e_1_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093650206287076"},{"key":"e_1_2_2_56_1","volume-title":"Privacy in Context: Technology, Policy, and the Integrity of Social Life","author":"Nissenbaum H. F.","unstructured":"Nissenbaum , H. F. 2010. Privacy in Context: Technology, Policy, and the Integrity of Social Life . Stanford Law Books , Stanford, CA . Nissenbaum, H. F. 2010. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford Law Books, Stanford, CA."},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1002\/dir.4000090307"},{"key":"e_1_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-011-0737-x"},{"key":"e_1_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958885"},{"key":"e_1_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2003.11044341"},{"key":"e_1_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1066860"},{"key":"e_1_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043932.2043962"},{"key":"e_1_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.3727\/109830511X12978702284390"},{"key":"e_1_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2005.00018.x"},{"key":"e_1_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208940.2208950"},{"key":"e_1_2_2_66_1","unstructured":"Smith H. J. Milberg S. J. and Burke S. J. 1992. Concern for privacy instrument. Working document School of Business Georgetown University Washington DC.  Smith H. J. Milberg S. J. and Burke S. J. 1992. Concern for privacy instrument. Working document School of Business Georgetown University Washington DC."},{"key":"e_1_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.2307\/249477"},{"key":"e_1_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"e_1_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/501158.501163"},{"key":"e_1_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.1.36.97"},{"key":"e_1_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-009-9036-2"},{"key":"e_1_2_2_72_1","volume-title":"Proceedings of the 37th Hawaii International Conference on System Sciences. IEEE Press, 181--190","author":"Teo H. H.","year":"2004","unstructured":"Teo , H. H. , Wan , W. , and Li , L . 2004. Volunteering personal information on the Internet: Effects of reputation, privacy initiatives, and reward on online consumer behavior . In Proceedings of the 37th Hawaii International Conference on System Sciences. IEEE Press, 181--190 . DOI:http:\/\/dx.doi.org\/10.1109\/HICSS. 2004 .1265435. 10.1109\/HICSS.2004.1265435 Teo, H. H., Wan, W., and Li, L. 2004. Volunteering personal information on the Internet: Effects of reputation, privacy initiatives, and reward on online consumer behavior. In Proceedings of the 37th Hawaii International Conference on System Sciences. IEEE Press, 181--190. DOI:http:\/\/dx.doi.org\/10.1109\/HICSS.2004.1265435."},{"key":"e_1_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2681(80)90051-7"},{"key":"e_1_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0260"},{"key":"e_1_2_2_75_1","doi-asserted-by":"crossref","unstructured":"Turow J. King J. Hoofnagle C. J. Bleakley A. and Hennessy M. 2009. Americans reject tailored advertising and three activities that enable it. Manuscript (posted on the Social Science Research Network http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1478214).  Turow J. King J. Hoofnagle C. J. Bleakley A. and Hennessy M. 2009. Americans reject tailored advertising and three activities that enable it. Manuscript (posted on the Social Science Research Network http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1478214).","DOI":"10.2139\/ssrn.1478214"},{"key":"e_1_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1177\/0894439307307682"},{"key":"e_1_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222230410"},{"key":"e_1_2_2_78_1","unstructured":"Wenning R. and Schunter M. 2006. The platform for privacy preferences 1.1 (P3P1.1) Specification. W3C Working Group Note.  Wenning R. and Schunter M. 2006. The platform for privacy preferences 1.1 (P3P1.1) Specification. W3C Working Group Note."},{"key":"e_1_2_2_79_1","volume-title":"The Dimensions of Privacy: A National Opinion Research Survey of Attitudes toward Privacy","author":"Westin A. F.","unstructured":"Westin , A. F. , Harris , L. , The Dimensions of Privacy: A National Opinion Research Survey of Attitudes toward Privacy . Garland Publishing , New York . Westin, A. F., Harris, L., et al. 1981. The Dimensions of Privacy: A National Opinion Research Survey of Attitudes toward Privacy. Garland Publishing, New York."},{"key":"e_1_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.11.017"},{"key":"e_1_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260305"},{"key":"e_1_2_2_82_1","volume-title":"Proceedings of the International Conference on Information Systems. http:\/\/aisel.aisnet.org\/icis2011\/proceedings\/ISsecurity\/3.","author":"Zhang N.","unstructured":"Zhang , N. , Wang , C. , and Xu , Y . 2011. Privacy in online social networks . In Proceedings of the International Conference on Information Systems. http:\/\/aisel.aisnet.org\/icis2011\/proceedings\/ISsecurity\/3. Zhang, N., Wang, C., and Xu, Y. 2011. Privacy in online social networks. In Proceedings of the International Conference on Information Systems. http:\/\/aisel.aisnet.org\/icis2011\/proceedings\/ISsecurity\/3."},{"key":"e_1_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2012.02.002"}],"container-title":["ACM Transactions on Interactive Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2499670","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2499670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:35:43Z","timestamp":1750235743000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2499670"}},"subtitle":["Information Disclosure in Context-Aware Recommender Systems"],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":85,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,10]]}},"alternative-id":["10.1145\/2499670"],"URL":"https:\/\/doi.org\/10.1145\/2499670","relation":{},"ISSN":["2160-6455","2160-6463"],"issn-type":[{"value":"2160-6455","type":"print"},{"value":"2160-6463","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10]]},"assertion":[{"value":"2012-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}