{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:31:00Z","timestamp":1775068260799,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":88,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Swedish Foundation for Strategic Research","award":["SURPRISE project (RIT17-0005)"],"award-info":[{"award-number":["SURPRISE project (RIT17-0005)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,11]]},"DOI":"10.1145\/3613904.3641997","type":"proceedings-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:38:25Z","timestamp":1715416705000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Inter-regional Lens on the Privacy Preferences of Drivers for ITS and Future VANETs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5717-8649","authenticated-orcid":false,"given":"Lejla","family":"Islami","sequence":"first","affiliation":[{"name":"Karlstad University, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7384-4552","authenticated-orcid":false,"given":"Agnieszka","family":"Kitkowska","sequence":"additional","affiliation":[{"name":"J\u00f6nk\u00f6ping University, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6938-4466","authenticated-orcid":false,"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[{"name":"Karlstad University, Sweden and Chalmers University of Technology, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"e_1_3_3_3_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.commtr.2022.100053"},{"key":"e_1_3_3_3_2_1","volume-title":"Measuring data sharing intention and its association with the acceptance of connected vehicles. Transportation research part F: traffic psychology and behaviour 89","author":"Acharya Sailesh","year":"2022","unstructured":"Sailesh Acharya and Michelle Mekker. 2022. Measuring data sharing intention and its association with the acceptance of connected vehicles. Transportation research part F: traffic psychology and behaviour 89 (2022), 423\u2013436."},{"key":"e_1_3_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3361331.3361336"},{"key":"e_1_3_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1177\/0340035208092154"},{"key":"e_1_3_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1108\/JGR-01-2019-0008"},{"key":"e_1_3_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1062"},{"key":"e_1_3_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86586-3_10"},{"key":"e_1_3_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-010-0346-0"},{"key":"e_1_3_3_3_9_1","doi-asserted-by":"crossref","unstructured":"Nicole Bergen and Ronald Labont\u00e9. 2020. \u201cEverything is perfect and we have no problems\u201d: detecting and limiting social desirability bias in qualitative research. Qualitative health research 30 5 (2020) 783\u2013792.","DOI":"10.1177\/1049732319889354"},{"key":"e_1_3_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864381"},{"key":"e_1_3_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376389"},{"key":"e_1_3_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054985"},{"key":"e_1_3_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2015.04.005"},{"key":"e_1_3_3_3_14_1","volume-title":"Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation","author":"Culnan J","year":"1999","unstructured":"Mary\u00a0J Culnan and Pamela\u00a0K Armstrong. 1999. Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization science 10, 1 (1999), 104\u2013115."},{"key":"e_1_3_3_3_15_1","volume-title":"Public opinion about automated vehicles in Australia: Results from a large-scale national survey. Transportation research part A: policy and practice 129","author":"Cunningham L","year":"2019","unstructured":"Mitchell\u00a0L Cunningham, Michael\u00a0A Regan, Timothy Horberry, Kamal Weeratunga, and Vinayak Dixit. 2019. Public opinion about automated vehicles in Australia: Results from a large-scale national survey. Transportation research part A: policy and practice 129 (2019), 1\u201318."},{"key":"e_1_3_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179601.1179621"},{"key":"e_1_3_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-03-2018-0036"},{"key":"e_1_3_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57404-8_2"},{"key":"e_1_3_3_3_19_1","unstructured":"George Danezis Stephen Lewis and Ross\u00a0J Anderson. 2005. How much is location privacy worth?. In WEIS Vol.\u00a05. 56."},{"key":"e_1_3_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367733"},{"key":"e_1_3_3_3_21_1","volume-title":"Analysis of multiple dependent variables","author":"Dattalo Patrick","unstructured":"Patrick Dattalo. 2013. Analysis of multiple dependent variables. Oxford University Press, USA."},{"key":"e_1_3_3_3_22_1","unstructured":"Manfred FR\u00a0Kets De\u00a0Vries. 2006. The leadership mystique: Leading behavior in the human enterprise. Pearson Education."},{"key":"e_1_3_3_3_23_1","volume-title":"Can privacy concerns for insurance of connected cars be compensated?Electronic markets 26","author":"Derikx Sebastian","year":"2016","unstructured":"Sebastian Derikx, Mark De\u00a0Reuver, and Maarten Kroesen. 2016. Can privacy concerns for insurance of connected cars be compensated?Electronic markets 26 (2016), 73\u201381."},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.34"},{"key":"e_1_3_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2015.0600"},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.2753\/JOA0091-3367360209"},{"key":"e_1_3_3_3_27_1","volume-title":"Dynamic and mobile","author":"Duckham Matt","unstructured":"Matt Duckham and Lars Kulik. 2006. Location privacy and location-aware computing. In Dynamic and mobile GIS. CRC press, 63\u201380."},{"key":"e_1_3_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858214"},{"key":"e_1_3_3_3_31_1","unstructured":"EF\u00a0Education First. 2023. EF English Proficiency Index. https:\/\/www.ef.com\/wwen\/epi\/"},{"key":"e_1_3_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICL-GNSS.2017.8376244"},{"key":"e_1_3_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.14505\/jarle.v11.2(48).09"},{"key":"e_1_3_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1062"},{"key":"e_1_3_3_3_35_1","volume-title":"Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & security 77","author":"Gerber Nina","year":"2018","unstructured":"Nina Gerber, Paul Gerber, and Melanie Volkamer. 2018. Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & security 77 (2018), 226\u2013261."},{"key":"e_1_3_3_3_36_1","volume-title":"Midwest Research-to-Practice Conference in Adult, Continuing, and Community Education.","author":"Gliem A","year":"2003","unstructured":"Joseph\u00a0A Gliem and Rosemary\u00a0R Gliem. 2003. Calculating, interpreting, and reporting Cronbach\u2019s alpha reliability coefficient for Likert-type scales. Midwest Research-to-Practice Conference in Adult, Continuing, and Community Education."},{"key":"e_1_3_3_3_37_1","volume-title":"The Paradox of Openness","author":"G\u00f6tz Norbert","unstructured":"Norbert G\u00f6tz. 2015. The concept of openness: promise and paradox. In The Paradox of Openness. Brill, 10\u201326."},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/02589346.2016.1155136"},{"key":"e_1_3_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_3_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1162\/JEEA.2008.6.6.1109"},{"key":"e_1_3_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1090-9516(01)00070-0"},{"key":"e_1_3_3_3_42_1","volume-title":"Eunice Naa\u00a0Korkoi Hammond, and Jan Eloff","author":"Islami Lejla","year":"2021","unstructured":"Lejla Islami, Simone Fischer-H\u00fcbner, Eunice Naa\u00a0Korkoi Hammond, and Jan Eloff. 2021. Analysing Drivers\u2019 Preferences for Privacy Enhancing Car-to-Car Communication Systems: A Study from South-Africa. In Privacy and Identity Management: 15th IFIP WG 9.2, 9.6\/11.7, 11.6\/SIG 9.2. 2 International Summer School, Maribor, Slovenia, September 21\u201323, 2020, Revised Selected Papers 15. Springer, 115\u2013133."},{"key":"e_1_3_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102913"},{"key":"e_1_3_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319401"},{"key":"e_1_3_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1086\/656423"},{"key":"e_1_3_3_3_46_1","volume-title":"Finland, Denmark, Norway and Iceland and international rules","author":"J\u00f8rgensen Oluf","unstructured":"Oluf J\u00f8rgensen. 2014. Access to Information in the Nordic Countries. A comparison of the laws of Sweden, Finland, Denmark, Norway and Iceland and international rules. Nordic Council of Ministers, Nordicom."},{"key":"e_1_3_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12062"},{"key":"e_1_3_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.06.003"},{"key":"e_1_3_3_3_49_1","doi-asserted-by":"crossref","unstructured":"Nils Koester Patrick Cichy David Antons and Torsten-Oliver Salge. 2021. Privacy Risk Perceptions in the Connected Car Context. (2021).","DOI":"10.24251\/HICSS.2021.536"},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2010.6"},{"key":"e_1_3_3_3_51_1","doi-asserted-by":"crossref","unstructured":"Scott Lederer Jennifer Mankoff and Anind\u00a0K Dey. 2003. Who wants to know what when? privacy preference determinants in ubiquitous computing. In CHI\u201903 extended abstracts on Human factors in computing systems. 724\u2013725.","DOI":"10.1145\/765891.765952"},{"key":"e_1_3_3_3_52_1","unstructured":"Macrotrends. 2023. Crime Rate & Statistics by Country. https:\/\/www.macrotrends.net\/countries\/ranking\/crime-rate-statistics"},{"key":"e_1_3_3_3_53_1","first-page":"36","article-title":"The role of access to information in enabling transparency and public participation in governance-a case study of access to policy consultation records in South Africa","volume":"9","author":"Marais DL","year":"2017","unstructured":"DL Marais, M Quayle, and JK Burns. 2017. The role of access to information in enabling transparency and public participation in governance-a case study of access to policy consultation records in South Africa. African Journal of Public Affairs 9, 6 (2017), 36\u201349.","journal-title":"African Journal of Public Affairs"},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0039116"},{"key":"e_1_3_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3312"},{"key":"e_1_3_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2014.6890929"},{"key":"e_1_3_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2021.101480"},{"key":"e_1_3_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1515\/9780804772891"},{"key":"e_1_3_3_3_59_1","volume-title":"Crime Index by Country 2023 Mid-Year. https:\/\/www.numbeo.com\/crime\/rankings_by_country.jsp. [Online","year":"2023","unstructured":"Numbeo. 2021. Crime Index by Country 2023 Mid-Year. https:\/\/www.numbeo.com\/crime\/rankings_by_country.jsp. [Online; accessed 24-July-2023]."},{"key":"e_1_3_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858581"},{"key":"e_1_3_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2017.01.006"},{"key":"e_1_3_3_3_62_1","unstructured":"Andreas Pfitzmann and Marit Hansen. 2010. A terminology for talking about privacy by data minimization: Anonymity unlinkability undetectability unobservability pseudonymity and identity management."},{"key":"e_1_3_3_3_63_1","doi-asserted-by":"crossref","unstructured":"Maija Poikela and Eran Toch. 2017. Understanding the valuation of location privacy: a crowdsourcing-based approach. (2017).","DOI":"10.24251\/HICSS.2017.241"},{"key":"e_1_3_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.09.002"},{"key":"e_1_3_3_3_65_1","doi-asserted-by":"publisher","DOI":"10.3390\/jrfm13030053"},{"key":"e_1_3_3_3_66_1","volume-title":"Exploratory factor analysis: implications for theory, research, and practice. Advances in developing human resources 17, 1","author":"Reio\u00a0Jr G","year":"2015","unstructured":"Thomas\u00a0G Reio\u00a0Jr and Brad Shuck. 2015. Exploratory factor analysis: implications for theory, research, and practice. Advances in developing human resources 17, 1 (2015), 12\u201325."},{"key":"e_1_3_3_3_67_1","volume-title":"Linear models in statistics","author":"Rencher C","unstructured":"Alvin\u00a0C Rencher and G\u00a0Bruce Schaalje. 2008. Linear models in statistics. John Wiley & Sons."},{"key":"e_1_3_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2020.101421"},{"key":"e_1_3_3_3_69_1","volume-title":"Understanding and capturing people\u2019s privacy policies in a mobile social networking application. Personal and ubiquitous computing 13","author":"Sadeh Norman","year":"2009","unstructured":"Norman Sadeh, Jason Hong, Lorrie Cranor, Ian Fette, Patrick Kelley, Madhu Prabaker, and Jinghai Rao. 2009. Understanding and capturing people\u2019s privacy policies in a mobile social networking application. Personal and ubiquitous computing 13 (2009), 401\u2013412."},{"key":"e_1_3_3_3_70_1","unstructured":"Pierangela Samarati and Latanya Sweeney. 1998. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. (1998)."},{"key":"e_1_3_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-019-09246-3"},{"key":"e_1_3_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2016.7535565"},{"key":"e_1_3_3_3_73_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005809000600067"},{"key":"e_1_3_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVE.2014.7297637"},{"key":"e_1_3_3_3_75_1","volume-title":"Survey: the nordic countries: happy family. The Economist 350, 8103","author":"Smiley Xan","year":"1999","unstructured":"Xan Smiley. 1999. Survey: the nordic countries: happy family. The Economist 350, 8103 (1999), N3\u0105N6."},{"key":"e_1_3_3_3_76_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0011"},{"key":"e_1_3_3_3_77_1","unstructured":"Statistics South Africa stats sa. 2023. Census 2022 \u2013 Crime in South Africa up in 202223. https:\/\/www.statssa.gov.za\/?p=16562"},{"key":"e_1_3_3_3_78_1","unstructured":"Stats SA \u2013 Statistics South Africa. 2022. STATISTICAL RELEASE P0341 Victims of Crime."},{"key":"e_1_3_3_3_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376854"},{"key":"e_1_3_3_3_80_1","unstructured":"Barbara\u00a0G. Tabachnick and Linda\u00a0S. Fidell. 2019. Using Multivariate Statistics 5. 980 pages."},{"key":"e_1_3_3_3_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864364"},{"key":"e_1_3_3_3_82_1","volume-title":"The self and social behavior in differing cultural contexts.Psychological review 96, 3","author":"Triandis C","year":"1989","unstructured":"Harry\u00a0C Triandis. 1989. The self and social behavior in differing cultural contexts.Psychological review 96, 3 (1989), 506."},{"key":"e_1_3_3_3_83_1","doi-asserted-by":"publisher","DOI":"10.1515\/nor-2015-0021"},{"key":"e_1_3_3_3_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2020.101361"},{"key":"e_1_3_3_3_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338498.3358656"},{"key":"e_1_3_3_3_86_1","first-page":"166","article-title":"Privacy and freedom","volume":"25","author":"Westin F","year":"1968","unstructured":"Alan\u00a0F Westin. 1968. Privacy and freedom. Washington and Lee Law Review 25, 1 (1968), 166.","journal-title":"Washington and Lee Law Review"},{"key":"e_1_3_3_3_87_1","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00072"},{"key":"e_1_3_3_3_88_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207598108247414"},{"key":"e_1_3_3_3_89_1","volume-title":"10th Symposium On Usable Privacy and Security (SOUPS 2014","author":"Woodruff Allison","year":"2014","unstructured":"Allison Woodruff, Vasyl Pihur, Sunny Consolvo, Laura Brandimarte, and Alessandro Acquisti. 2014. Would a Privacy Fundamentalist Sell Their DNA for $1000...If Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and Consequences. In 10th Symposium On Usable Privacy and Security (SOUPS 2014). USENIX Association, Menlo Park, CA, 1\u201318. https:\/\/www.usenix.org\/conference\/soups2014\/proceedings\/presentation\/woodruff"},{"key":"e_1_3_3_3_90_1","volume-title":"The roles of initial trust and perceived risk in public\u2019s acceptance of automated vehicles. Transportation research part C: emerging technologies 98","author":"Zhang Tingru","year":"2019","unstructured":"Tingru Zhang, Da Tao, Xingda Qu, Xiaoyan Zhang, Rui Lin, and Wei Zhang. 2019. The roles of initial trust and perceived risk in public\u2019s acceptance of automated vehicles. Transportation research part C: emerging technologies 98 (2019), 207\u2013220."}],"event":{"name":"CHI '24: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Proceedings of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3641997","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613904.3641997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:57:29Z","timestamp":1750291049000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3641997"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,11]]},"references-count":88,"alternative-id":["10.1145\/3613904.3641997","10.1145\/3613904"],"URL":"https:\/\/doi.org\/10.1145\/3613904.3641997","relation":{},"subject":[],"published":{"date-parts":[[2024,5,11]]},"assertion":[{"value":"2024-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}