{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T13:55:00Z","timestamp":1726408500069},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030507312"},{"type":"electronic","value":"9783030507329"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-50732-9_30","type":"book-chapter","created":{"date-parts":[[2020,7,11]],"date-time":"2020-07-11T07:02:59Z","timestamp":1594450979000},"page":"224-230","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["User Attitudes Towards Facebook: Perception and Reassurance of Trust (Estonian Case Study)"],"prefix":"10.1007","author":[{"given":"Triin","family":"Oper","sequence":"first","affiliation":[]},{"given":"Sonia","family":"Sousa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"key":"30_CR1","unstructured":"Weisbaum, H.: Trust in Facebook has dropped by 66 percent since the Cambridge Analytica scandal, April 2018. https:\/\/nbcnews.to\/2vJnYZX. Accessed 17 Mar 2020"},{"issue":"3","key":"30_CR2","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1089\/cpb.2008.0226","volume":"12","author":"E Christofides","year":"2009","unstructured":"Christofides, E., Muise, A., Desmarais, S.: Information disclosure and control on Facebook: are they two sides of the same coin or two different processes? Cyberpsychol. Behav. 12(3), 341\u2013345 (2009)","journal-title":"Cyberpsychol. Behav."},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Dhami, A., Agarwal, N., Chakraborty, T.K., Singh, B.P., Minj, J.: Impact of trust, security and privacy concerns in social networking: an exploratory study to understand the pattern of information revelation in Facebook. In: 2013 IEEE 3rd International Advance Computing Conference (IACC), pp. 465\u2013469. IEEE, February 2013","DOI":"10.1109\/IAdCC.2013.6514270"},{"issue":"1","key":"30_CR4","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1177\/1948550611408619","volume":"3","author":"E Christofides","year":"2012","unstructured":"Christofides, E., Muise, A., Desmarais, S.: Hey mom, what\u2019s on your Facebook? Comparing Facebook disclosure and privacy in adolescents and adults. Soc. Psychol. Personal. Sci. 3(1), 48\u201354 (2012)","journal-title":"Soc. Psychol. Personal. Sci."},{"key":"30_CR5","unstructured":"Universal McCann: Wave 9. The Meaning of Moments. Glen Parker, New York (2017)"},{"key":"30_CR6","unstructured":"Lomas, N.: How Facebook has reacted since the data misuse scandal broke, April 2018. https:\/\/tcrn.ch\/327pql5. Accessed 17 Mar 2020"},{"key":"30_CR7","unstructured":"Ivanova, I.: 8 promises from Facebook after Cambridge Analytica, April 2018. https:\/\/cbsn.ws\/32hl1w0. Accessed 17 Mar 2020"},{"key":"30_CR8","unstructured":"Kokoszka, P.: #DeleteFacebook: Facebook alternatives to get your social media fix, July 2018. http:\/\/bit.ly\/38M1JRC. Accessed 17 Mar 2020"},{"issue":"2","key":"30_CR9","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1002\/asi.20459","volume":"58","author":"T Buchanan","year":"2007","unstructured":"Buchanan, T., Paine, C., Joinson, A.N., Reips, U.D.: Development of measures of online privacy concern and protection for use on the Internet. J. Am. Soc. Inf. Sci. Technol. 58(2), 157\u2013165 (2007)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"30_CR10","unstructured":"Data Never Sleeps 6.0 (2018). http:\/\/bit.ly\/3d46QiF. Accessed 17 Mar 2020"},{"key":"30_CR11","unstructured":"Data Breaches (2019). https:\/\/www.privacyrights.org\/data-breaches. Accessed 17 Mar 2020"},{"key":"30_CR12","unstructured":"Gemalto: Data privacy and new regulations take center stage (2019). https:\/\/breachlevelindex.com\/request-report. Accessed 17 Mar 2020"},{"key":"30_CR13","unstructured":"Whittaker, Z.: 171 million VK.com accounts stolen by hackers, June 2016. https:\/\/zd.net\/2IPZPnM. Accessed 17 Mar 2020"},{"key":"30_CR14","unstructured":"MacMillan, D., McMillan, R.: Google exposed user data, feared repercussions of disclosing to public, October 2018. https:\/\/on.wsj.com\/2SHCdYg. Accessed 17 Mar 2020"},{"key":"30_CR15","unstructured":"Price, R.: Hackers stole millions of Facebook users\u2019 highly sensitive data\u2014and the FBI has asked it not to say who might be behind it, October 2018. http:\/\/bit.ly\/2WwK4KL. Accessed 17 Mar 2020"},{"key":"30_CR16","unstructured":"Price, R.: Facebook endured a staggering number of scandals and controversies in 2018 - here they all are, December 2018. http:\/\/bit.ly\/38U8bW1. Accessed 17 Mar 2020"},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Wathieu, L., Friedman, A.A.: An empirical approach to understanding privacy valuation. In: HBS Marketing Research Paper, (07-075) (2007)","DOI":"10.2139\/ssrn.982593"},{"key":"30_CR18","unstructured":"Livingstone, S.: Children\u2019s privacy online: experimenting with boundaries within and beyond the family (2006)"},{"key":"30_CR19","unstructured":"Cavoukian, A.: Privacy by design in law, policy and practice. A white paper for regulators, decision-makers and policy-makers (2011)"},{"key":"30_CR20","series-title":"IFIP \u2014 The International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-0-387-79026-8_14","volume-title":"The Future of Identity in the Information Society","author":"M Hansen","year":"2008","unstructured":"Hansen, M.: Marrying transparency tools with user-controlled identity management. In: Fischer-H\u00fcbner, S., Duquenoy, P., Zuccato, A., Martucci, L. (eds.) Privacy and Identity 2007. ITIFIP, vol. 262, pp. 199\u2013220. Springer, Boston, MA (2008). https:\/\/doi.org\/10.1007\/978-0-387-79026-8_14"},{"key":"30_CR21","first-page":"1","volume":"1","author":"JJ Borking","year":"2001","unstructured":"Borking, J.J., Raab, C.D.: Laws, PETs and other technologies for privacy protection. J. Inf. Law Technol. 1, 1\u201314 (2001)","journal-title":"J. Inf. Law Technol."},{"issue":"1","key":"30_CR22","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.elerap.2009.05.001","volume":"9","author":"CM Hoadley","year":"2010","unstructured":"Hoadley, C.M., Xu, H., Lee, J.J., Rosson, M.B.: Privacy as information access and illusory control: the case of the Facebook News Feed privacy outcry. Electron. Commer. Res. Appl. 9(1), 50\u201360 (2010)","journal-title":"Electron. Commer. Res. Appl."},{"key":"30_CR23","doi-asserted-by":"crossref","unstructured":"Wang, N., Xu, H., Grossklags, J.: Third-party apps on Facebook: privacy and the illusion of control. In: Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology, p. 4. ACM, December 2011","DOI":"10.1145\/2076444.2076448"},{"issue":"1","key":"30_CR24","doi-asserted-by":"publisher","first-page":"51","DOI":"10.2307\/30036519","volume":"27","author":"D Gefen","year":"2003","unstructured":"Gefen, D., Karahanna, E., Straub, D.W.: Trust and TAM in online shopping: an integrated model. MIS Q. 27(1), 51\u201390 (2003)","journal-title":"MIS Q."},{"issue":"2","key":"30_CR25","first-page":"49","volume":"4","author":"D Kim","year":"2003","unstructured":"Kim, D., Benbasat, I.: Trust-related arguments in internet stores: a framework for evaluation. J. Electron. Commer. Res. 4(2), 49\u201364 (2003)","journal-title":"J. Electron. Commer. Res."},{"issue":"5","key":"30_CR26","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/s10207-007-0028-8","volume":"6","author":"TW Lauer","year":"2007","unstructured":"Lauer, T.W., Deng, X.: Building online trust through privacy practices. Int. J. Inf. Secur. 6(5), 323\u2013331 (2007)","journal-title":"Int. J. Inf. Secur."},{"key":"30_CR27","doi-asserted-by":"crossref","unstructured":"Schoorman, F.D., Mayer, R.C., Davis, J.H.: An integrative model of organizational trust: past, present, and future (2007)","DOI":"10.5465\/amr.2007.24348410"},{"key":"30_CR28","doi-asserted-by":"crossref","unstructured":"Flechais, I., Riegelsberger, J., Sasse, M.A.: Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems. In: Proceedings of the 2005 Workshop on New Security Paradigms, pp. 33\u201341. ACM, September 2005","DOI":"10.1145\/1146269.1146280"},{"issue":"4","key":"30_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2501654.2501661","volume":"45","author":"W Sherchan","year":"2013","unstructured":"Sherchan, W., Nepal, S., Paris, C.: A survey of trust in social networks. ACM Comput. Surv. (CSUR) 45(4), 1\u201333 (2013)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"30_CR30","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/MCOM.2009.4939283","volume":"47","author":"T Strufe","year":"2009","unstructured":"Strufe, T.: Safebook: a privacy-preserving online social network leveraging on real-life trust. IEEE Commun. Mag. 47, 95\u2013101 (2009)","journal-title":"IEEE Commun. Mag."}],"container-title":["Communications in Computer and Information Science","HCI International 2020 - Posters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50732-9_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T00:05:32Z","timestamp":1720656332000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-50732-9_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030507312","9783030507329"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50732-9_30","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2020.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}