{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T15:56:16Z","timestamp":1726761376896},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030155377"},{"type":"electronic","value":"9783030155384"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-15538-4_3","type":"book-chapter","created":{"date-parts":[[2019,3,10]],"date-time":"2019-03-10T20:02:33Z","timestamp":1552248153000},"page":"39-54","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Enabling Users to Specify Correct Privacy Requirements"],"prefix":"10.1007","author":[{"given":"Manuel","family":"Rudolph","sequence":"first","affiliation":[]},{"given":"Svenja","family":"Polst","sequence":"additional","affiliation":[]},{"given":"Joerg","family":"Doerr","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,8]]},"reference":[{"key":"3_CR1","unstructured":"European Commission: Special Eurobarometer 431 - Data Protection (2015). \n http:\/\/ec.europa.eu\/commfrontoffice\/publicopinion\/archives\/ebs\/ebs_431_en.pdf"},{"key":"3_CR2","unstructured":"Symantec: State of Privacy Report 2015 (2015). \n https:\/\/www.symantec.com\/content\/en\/us\/about\/presskits\/b-state-of-privacy-report-2015.pdf"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1007\/978-3-319-91238-7_45","volume-title":"Human-Computer Interaction. Theories, Methods, and Human Issues","author":"M Rudolph","year":"2018","unstructured":"Rudolph, M., Feth, D., Polst, S.: Why users ignore privacy policies \u2013 a survey and intention model for explaining user privacy behavior. In: Kurosu, M. (ed.) HCI 2018. LNCS, vol. 10901, pp. 587\u2013598. Springer, Cham (2018). \n https:\/\/doi.org\/10.1007\/978-3-319-91238-7_45"},{"key":"3_CR4","unstructured":"Kumaraguru, P., Cranor, L.: Privacy indexes: a survey of Westin\u2019s studies (2005). \n http:\/\/repository.cmu.edu\/isr\/856"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Dupree, J.L., Devries, R., Berry, D.M., Lank, E.: Privacy personas: clustering users via attitudes and behaviors toward security practices. In: Conference on Human Factors in Computing Systems (2016)","DOI":"10.1145\/2858036.2858214"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1146\/annurev.ps.41.020190.002221","volume":"41","author":"JM Digman","year":"1990","unstructured":"Digman, J.M.: Personality structure: emergence of the five-factor model. Ann. Rev. Psychol. 41, 417\u2013440 (1990)","journal-title":"Ann. Rev. Psychol."},{"key":"3_CR7","volume-title":"Please Understand Me 2","author":"D Keirsey","year":"1998","unstructured":"Keirsey, D.: Please Understand Me 2. Prometheus Nemesis Book Company, Carlsbad (1998)"},{"key":"3_CR8","volume-title":"Manual: A Guide to the Development and Use of the Myers-Briggs Type Indicator","author":"IB Myers","year":"1985","unstructured":"Myers, I.B., McCaulley, M.H., Most, R.: Manual: A Guide to the Development and Use of the Myers-Briggs Type Indicator, vol. 1985. Consulting Psychologists Press, Palo Alto (1985)"},{"key":"3_CR9","unstructured":"Urban, J.M., Hoofnagle, C.J.: The privacy pragmatic as privacy vulnerable. In: Workshop on Privacy Personas and Segmentation, SOUPS, Menlo Park, CA, 9\u201311 July 2014"},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"167","DOI":"10.2307\/249477","volume":"20","author":"HJ Smith","year":"1996","unstructured":"Smith, H.J., Milberg, S.J., Burke, S.J.: Information privacy: measuring individuals\u2019 concerns about organizational practices. MIS Q. 20, 167\u2013196 (1996)","journal-title":"MIS Q."},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Morton, A., Sasse, M.A.: Desperately seeking assurances: segmenting users by their information-seeking preferences. In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust (PST), pp. 102\u2013111 (2014)","DOI":"10.1109\/PST.2014.6890929"},{"issue":"4","key":"3_CR12","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"NK Malhotra","year":"2004","unstructured":"Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet users\u2019 information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf. Syst. Res. 15(4), 336\u2013355 (2004)","journal-title":"Inf. Syst. Res."},{"key":"3_CR13","unstructured":"Information Systems Security Research Group. PERMIS, University of Kent. \n http:\/\/sec.cs.kent.ac.uk\/permis\/"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Johnson, M., Karat, J., Karat, C.M., Grueneberg, K.: Usable policy template authoring for iterative policy refinement. In: IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY, Fairfax, Virginia, USA (2010)","DOI":"10.1109\/POLICY.2010.28"},{"key":"3_CR15","unstructured":"Uszok, A., et al.: KAoS policy and domain services: toward a description-logic approach to policy representation, deconfliction, and enforcement. In: IEEE 4th International Workshop on Policies for Distributed Systems and Networks, POLICY (2003)"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing Facebook privacy settings: user expectations vs. reality. In: ACM Conference on Internet Measurement (2011)","DOI":"10.1145\/2068816.2068823"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: Proceedings of the 19th International Conference on World Wide Web. ACM, New York (2010)","DOI":"10.1145\/1772690.1772727"},{"key":"3_CR18","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSECP.2003.1253568","volume":"99","author":"LF Cranor","year":"2003","unstructured":"Cranor, L.F.: P3P: making privacy policies more useful. IEEE Secur. Priv. 99, 50\u201355 (2003)","journal-title":"IEEE Secur. Priv."},{"key":"3_CR19","unstructured":"Cranor, L., Langheinrich, M., Marchiori, M.: A P3P Preference Exchange Language 1.0 (APPEL1.0) (2002). \n https:\/\/www.w3.org\/TR\/P3P-preferences\/"},{"key":"3_CR20","unstructured":"Rudolph, M., Polst, S.: Satisfying and efficient privacy settings. Mensch und Computer (2018)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Rudolph, M., Feth, D., Doerr, J., Spilker, J.: Requirements elicitation and derivation of security policy templates\u2014an industrial case study. In: 24th International Requirements Engineering Conference (RE), Beijing, China, pp. 283\u2013292 (2016)","DOI":"10.1109\/RE.2016.22"},{"key":"3_CR22","unstructured":"Supplementary Experiment Material including extended Figures for this Paper. \n http:\/\/s.fhg.de\/yU6"}],"container-title":["Lecture Notes in Computer Science","Requirements Engineering: Foundation for Software Quality"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-15538-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T08:36:25Z","timestamp":1558341385000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-15538-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030155377","9783030155384"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-15538-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"8 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"REFSQ","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Working Conference on Requirements Engineering: Foundation for Software Quality","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Essen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 March 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 March 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"refsq2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/refsq.org\/2019\/welcome\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}