{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:30:00Z","timestamp":1769905800375,"version":"3.49.0"},"reference-count":0,"publisher":"Walter de Gruyter GmbH","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10,28]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>We present the results of a survey study (<jats:italic>n<\/jats:italic>\u2009=\u20091,200) investigating online users' privacy sensitivity towards exposing\nspecific data items to service providers of the three most prominent online services in the UK: online retail, social\nnetworking and information search. The study, representative of the online population of the UK, presents proof for the\ncontext-dependence of privacy sensitivity and provides concrete quantitative results for specific data items (like full\nname or mobile phone number). One of the key results is that data that is considered essential in order for a service to\nwork is seldomly rated as sensitive. We could also show that passively collected data is in general more sensitive than\nconcrete data provided by the users. However, specific conditions like control and transparency can have positive\/negative\neffects on the sensitivity of data in a specific context.<\/jats:p>","DOI":"10.1515\/itit-2016-0016","type":"journal-article","created":{"date-parts":[[2016,7,8]],"date-time":"2016-07-08T10:00:59Z","timestamp":1467972059000},"page":"217-228","source":"Crossref","is-referenced-by-count":2,"title":["Sensitivity of personal data items in different online contexts"],"prefix":"10.1515","volume":"58","author":[{"given":"Martin","family":"Ortlieb","sequence":"first","affiliation":[{"name":"Google, Switzerland, Brandschenkestrasse 110, 8002 Zurich, Switzerland Switzerland"}]},{"given":"Ryan","family":"Garner","sequence":"additional","affiliation":[{"name":"CitizenMe \u2013 Somerset House, Strand, London, WC2R 1LA, UK United Kingdom of Great Britain and Northern Ireland"}]}],"member":"374","published-online":{"date-parts":[[2016,7,8]]},"container-title":["it - Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.degruyter.com\/view\/j\/itit.2016.58.issue-5\/itit-2016-0016\/itit-2016-0016.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/itit-2016-0016\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/itit-2016-0016\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T11:44:46Z","timestamp":1624448686000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/itit-2016-0016\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,8]]},"references-count":0,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2016,7,8]]},"published-print":{"date-parts":[[2016,10,28]]}},"alternative-id":["10.1515\/itit-2016-0016"],"URL":"https:\/\/doi.org\/10.1515\/itit-2016-0016","relation":{},"ISSN":["1611-2776","2196-7032"],"issn-type":[{"value":"1611-2776","type":"print"},{"value":"2196-7032","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,8]]}}}