{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T00:21:33Z","timestamp":1773447693053,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,4,26]],"date-time":"2014-04-26T00:00:00Z","timestamp":1398470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,4,26]]},"DOI":"10.1145\/2556288.2557421","type":"proceedings-article","created":{"date-parts":[[2014,4,28]],"date-time":"2014-04-28T14:18:30Z","timestamp":1398694710000},"page":"2347-2356","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":218,"title":["Leakiness and creepiness in app space"],"prefix":"10.1145","author":[{"given":"Irina","family":"Shklovski","sequence":"first","affiliation":[{"name":"IT University of Copenhagen, Copenhagen, Denmark"}]},{"given":"Scott D.","family":"Mainwaring","sequence":"additional","affiliation":[{"name":"Unaffiliated, Portland, OR, USA"}]},{"given":"Halla Hrund","family":"Sk\u00falad\u00f3ttir","sequence":"additional","affiliation":[{"name":"ITU Copenhagen, Copenhagen, Denmark"}]},{"given":"H\u00f6skuldur","family":"Borgthorsson","sequence":"additional","affiliation":[{"name":"ITU Copenhagen, Copenhagen, Denmark"}]}],"member":"320","published-online":{"date-parts":[[2014,4,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-843X.87.1.49"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"e_1_3_2_1_3_1","unstructured":"Altman I. (1975). The Environment and Social Behavior. Belmont California USA: Wadsworth Publishing company Inc. Altman I. (1975). The Environment and Social Behavior. Belmont California USA: Wadsworth Publishing company Inc."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207727"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-010-0342-4"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500889"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078847"},{"key":"e_1_3_2_1_8_1","unstructured":"Collins English dictionary. HarperCollins Publishers City 2009. Collins English dictionary. HarperCollins Publishers City 2009."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381943"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_11_1","unstructured":"Flurry. (2013). Retrieved April 12 2013 from Big Data: http:\/\/www.flurry.com\/big-data.html Flurry. (2013). Retrieved April 12 2013 from Big Data: http:\/\/www.flurry.com\/big-data.html"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/PL00000017"},{"key":"e_1_3_2_1_13_1","unstructured":"Friedman B. (1997) Human values and the design of computer technology. CSLI Publications Stanford CA. Friedman B. (1997) Human values and the design of computer technology. CSLI Publications Stanford CA."},{"key":"e_1_3_2_1_14_1","unstructured":"Futuresight. (2011). Retrieved from User perspectives on mobile privacy: http:\/\/goo.gl\/9sgZXR Futuresight. (2011). Retrieved from User perspectives on mobile privacy: http:\/\/goo.gl\/9sgZXR"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073006"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1085777.1085814"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518953"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34638-5_6"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466466"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1965724.1965735"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518875"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/765891.765952"},{"key":"e_1_3_2_1_23_1","unstructured":"Lenhart A. Ling R. Campbell S. & Purcell. K. Teens and Mobile Phones. Pew Internet and American Life Project. (2010). Lenhart A. Ling R. Campbell S. & Purcell. K. Teens and Mobile Phones. Pew Internet and American Life Project. (2010)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/276758.276775"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Ling R. (2008). New tech new ties: How mobile communication is reshaping social cohesion. Cambridge MA: MIT. Ling R. (2008). New tech new ties: How mobile communication is reshaping social cohesion. Cambridge MA: MIT.","DOI":"10.7551\/mitpress\/7568.001.0001"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1037\/0096-3445.105.1.3"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2012.83"},{"key":"e_1_3_2_1_29_1","volume-title":"J. Katz & M. Aakhus (Ed). Perpetual contact: Mobile communication, private talk, public performance","author":"Nafus D.","year":"2002"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Nippert-Eng C. E. (2010). Islands of privacy. Chicago; London: The University of Chicago Press. Nippert-Eng C. E. (2010). Islands of privacy. Chicago; London: The University of Chicago Press.","DOI":"10.7208\/chicago\/9780226584546.001.0001"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Nissenbaum H. F. (2010) Privacy in context: Technology policy and the integrity of social life. Stanford Law Books Stanford CA. Nissenbaum H. F. (2010) Privacy in context: Technology policy and the integrity of social life. Stanford Law Books Stanford CA.","DOI":"10.1515\/9780804772891"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Norberg P. Horne D. & Horne D. The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs 41 1 (2007) 100--127. Norberg P. Horne D. & Horne D. The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs 41 1 (2007) 100--127.","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"key":"e_1_3_2_1_33_1","volume-title":"J. E. Katz (Ed). Machines that become us: The social context of personal communication technology","author":"Oksman V.","year":"2003"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Peterson C. Maier S. & Seligman M. (1993). Learned helplessness: A theory for the age of personal control. NY: Oxford University Press. Peterson C. Maier S. & Seligman M. (1993). Learned helplessness: A theory for the age of personal control. NY: Oxford University Press.","DOI":"10.1093\/oso\/9780195044669.001.0001"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Rose N. (1999) Powers of Freedom: Reframing Political Thought NY: Cambridge University Press. Rose N. (1999) Powers of Freedom: Reframing Political Thought NY: Cambridge University Press.","DOI":"10.1017\/CBO9780511488856"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.me.23.020172.002203"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2468501"},{"key":"e_1_3_2_1_39_1","volume-title":"IDG Network","author":"Vijayan J.","year":"2013"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.11.017"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/2022245.2022255"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2464464.2464503"}],"event":{"name":"CHI '14: CHI Conference on Human Factors in Computing Systems","location":"Toronto Ontario Canada","acronym":"CHI '14","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the SIGCHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2556288.2557421","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2556288.2557421","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:09:53Z","timestamp":1750234193000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2556288.2557421"}},"subtitle":["perceptions of privacy and mobile app use"],"short-title":[],"issued":{"date-parts":[[2014,4,26]]},"references-count":42,"alternative-id":["10.1145\/2556288.2557421","10.1145\/2556288"],"URL":"https:\/\/doi.org\/10.1145\/2556288.2557421","relation":{},"subject":[],"published":{"date-parts":[[2014,4,26]]},"assertion":[{"value":"2014-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}