{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:33:47Z","timestamp":1725536027342},"publisher-location":"Berlin, Heidelberg","reference-count":47,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642033148"},{"type":"electronic","value":"9783642033155"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03315-5_16","type":"book-chapter","created":{"date-parts":[[2009,7,25]],"date-time":"2009-07-25T07:15:46Z","timestamp":1248506146000},"page":"211-225","source":"Crossref","is-referenced-by-count":0,"title":["User Control Problems and Taking User Empowerment Further"],"prefix":"10.1007","author":[{"given":"Rowena","family":"Rodrigues","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Bhargav-Spantzely, A., Camenisch, J., Gross, T., Sommer, D.: User centricity: A Taxonomy and Open Issues. In: DIM 2006, Proceedings of the Second ACM Workshop on Digital Identity Management, pp. 1\u201310 (2006)","DOI":"10.1145\/1179529.1179531"},{"key":"16_CR2","unstructured":"Cameron, K.: The Seven Laws of Identity, December 5 (2005), http:\/\/www.identityblog.com\/stories\/2005\/05\/13\/TheLawsOfIdentity.pdf"},{"key":"16_CR3","unstructured":"Sun Microsystems, Identity Management Solutions: Overview, http:\/\/www.sun.com\/software\/products\/identity\/ (As at January 5, 2009)"},{"key":"16_CR4","unstructured":"OpenID.Net, What is OpenID, http:\/\/openid.net\/what\/ (As at January 5, 2009)"},{"key":"16_CR5","unstructured":"Higgins: Open Source Identity Framework, The Eclipse Foundation, http:\/\/www.eclipse.org\/higgins\/index.php (As at January 5, 2009)"},{"key":"16_CR6","first-page":"199","volume-title":"Proceedings of the 3rd IFIP WG 9.2, 9.6\/11.6, 11.7\/FIDIS International Summer School","author":"M. Hansen","year":"2008","unstructured":"Hansen, M.: Marrying Transparency Tools with User-controlled Identity Management,\u201d The Future of Identity in the Information Society. In: Fischer-Hubner, S., Duquenoy, P., Zucatto, A., Martucci, L. (eds.) Proceedings of the 3rd IFIP WG 9.2, 9.6\/11.6, 11.7\/FIDIS International Summer School, Karlstad, Sweden, August 2007, pp. 199\u2013222. Springer, Heidelberg (2008)"},{"key":"16_CR7","unstructured":"Edwards, L., Brown, I.: Data Control and Social Networking: Irreconcilable Ideas? In: Matwyshyn, A. (ed.) Harboring Data: Information Security, Law and the Corporation. Stanford University Press (2009), http:\/\/ssrn.com\/abstract=1148732"},{"issue":"2","key":"16_CR8","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2008.49","volume":"6","author":"R. Dhamija","year":"2008","unstructured":"Dhamija, R., Dusseault, L.: The Seven Flaws of Identity Management: Usability and Security Challenges. IEEE Security & Privacy\u00a06(2), 24\u201329 (2008), http:\/\/ieeexplore.ieee.org\/iel5\/8013\/4489835\/04489846.pdf?isnumber=4489835&prod=JNL&arnumber=4489846&arnumber=4489846&arSt=24&ared=29&arAuthor=Dhamija%2C+R.%3B+Dusseault%2C+L ; Gotterbarn, D.: Informatics and Professional Responsibility. Science and Engineering Ethics\u00a07.2, 221\u2013230 (2001)","journal-title":"IEEE Security & Privacy"},{"key":"16_CR9","unstructured":"Viacom International Inc., v YouTube Inc., YouTube LLC and Google Inc., Case 1:07-cv-02103-LLS, March 13 (2007), http:\/\/docs.justia.com\/cases\/federal\/district-courts\/new-york\/nysdce\/1:2007cv02103\/302164\/1\/"},{"key":"16_CR10","unstructured":"British Telecommunications plc, Comprehensive Identity Management: Balancing Cost, Risk and Convenience in Identity Management , White Paper, p 7 (2007), http:\/\/www.btglobalservices.com\/business\/global\/en\/docs\/whitepapers\/22872_Identity_Mgmt_wp_en.pdf"},{"key":"16_CR11","unstructured":"National Computing Centre, Beware fake anti-virus programs, Industry News (Winter 2008), http:\/\/www.nccmembership.co.uk\/pooled\/articles\/BF_WEBART\/view.asp?Q=BF_WEBART_308688"},{"issue":"1","key":"16_CR12","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2005.22","volume":"3","author":"A. Acquisti","year":"2005","unstructured":"Acquisti, A., Grossklags, J.: Privacy and Rationality in Decision Making. IEEE Security & Privacy\u00a03(1), 26\u201333 (2005)","journal-title":"IEEE Security & Privacy"},{"key":"16_CR13","unstructured":"Erasmus, D.: The Praise of Folly, 1514"},{"key":"16_CR14","unstructured":"Laurie, B.: OpenID: Phishing Heaven, p. 187, January 19 (2007), http:\/\/www.links.org\/? ; Leyden, J.: How Poor Crypto Housekeeping Left OpenID Open to Abuse, The Register, August 13 (2008)"},{"key":"16_CR15","unstructured":"Schneier, B.: Secrets and Lies: Digital Security in a Networked World, p. xi (2000)"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Eap, T., Hatala, M., Ga\u0161evi\u0107, D.: Enabling User Control with Personal Identity Management. In: 2007 IEEE International Conference on Services Computing, SCC 2007, pp. 60\u201367 (2007)","DOI":"10.1109\/SCC.2007.56"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Joinson, A., Paine, C.: Self-disclosure, privacy and the Internet. In: Joinson, A., et al. (eds.) The Oxford Handbook of Internet Psychology, ch.\u00a016, pp. 237\u2013252 at 248\u2013249. Oxford University Press, Oxford","DOI":"10.1093\/oxfordhb\/9780199561803.013.0016"},{"key":"16_CR18","volume-title":"Surveillance Studies: An Overview","author":"D. Lyon","year":"2007","unstructured":"Lyon, D.: Surveillance Studies: An Overview. Polity, Malden (2007)"},{"key":"16_CR19","unstructured":"Post, R.: Three Concepts of Privacy. 89 George. L J., 2087 (2001)"},{"key":"16_CR20","unstructured":"Heisenberg, D., Fandel, M.-H.: Projecting EU Regimes Abroad: The EU Data Protection Directive as Global Standard. Paper presented at the Annual Meeting of the American Political Science Association, Boston Marriott Copley Place, Sheraton Boston & Hynes Convention Center, Boston, Massachusetts, August 28 (2002), http:\/\/www.allacademic.com\/meta\/p65517_index.html"},{"key":"#cr-split#-16_CR21.1","unstructured":"De Boni, M., Prigmore, M.: Cultural Aspects of Internet Privacy. In: Proceedings of the UKAIS Conference, Leeds (2002), http:\/\/www.leedsmet.ac.uk\/ies\/comp\/staff\/deboni\/papers\/Cultural_Aspects_of_Internet_Privacy.pdf;"},{"key":"#cr-split#-16_CR21.2","doi-asserted-by":"crossref","unstructured":"Ruiz, B.: Privacy in Telecommunications: A European and an American Approach, p 40. Martinus Nijhoff Publishers (1997)","DOI":"10.1163\/9789004637184"},{"key":"16_CR22","unstructured":"Privacy International, The 2007 International Privacy Ranking, December 28 (2007), http:\/\/www.privacyinternational.org\/article.shtml?cmd%5B347%5D=x-347-559597"},{"key":"16_CR23","unstructured":"UK House of Commons Home Affairs Committee, A Surveillance Society? Fifth Report of Session 2007-2008, Volume I, Report, together with formal minutes, published on June 8, 2008 by authority of the House of Commons London, The Stationery Office Limited, http:\/\/www.publications.parliament.uk\/pa\/cm200708\/cmselect\/cmhaff\/58\/58i.pdf"},{"key":"16_CR24","first-page":"1203","volume":"1163","author":"T. Wu","year":"1999","unstructured":"Wu, T.: Application-Centered Internet Analysis. 85 Va. L. Rev.\u00a01163, 1203\u20131204 (1999); see also Goldsmith, J., Wu, T.: Who Controls the Internet? Illusions of a Borderless World, p.123 (2006)","journal-title":"85 Va. L. Rev."},{"key":"16_CR25","unstructured":"Ohm, P.: The Myth Of The Superuser: Fear, Risk, And Harm Online, U. of Colorado Law Legal Studies Research Paper, No. 07-14, http:\/\/Ssrn.Com\/Abstract=967372"},{"key":"16_CR26","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1017\/S1352325200000495","volume":"2","author":"E. Sherwin","year":"1996","unstructured":"Sherwin, E.: Infelicitous Sex. Legal Theory\u00a02, 209\u2013231 at p 229 (1996)","journal-title":"Legal Theory"},{"key":"16_CR27","unstructured":"Westen, P.: Introduction at p 307, and Chapter 8. The Confusions of Consent, 309\u2013336 in The Logic of Consent: The Diversity and Deceptiveness of Consent as a Defense to Criminal Conduct (2004)"},{"key":"16_CR28","unstructured":"Samson v Aitchison [1912] AC 844; 82 LJPC 1; 107 LT 106; 28 TLR 559"},{"key":"16_CR29","unstructured":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data"},{"key":"#cr-split#-16_CR30.1","unstructured":"Grey, T., et al.: US and EU Authorities Review Privacy Threats on Social Networking Sites: Part 2. ITLT??16 5 (7) (May 1, 2008);"},{"key":"#cr-split#-16_CR30.2","doi-asserted-by":"crossref","unstructured":"Wong, R.: Social Networking: Anybody is a Data Controller!, Working Paper, Revised Version (October 2008), http:\/\/ssrn.com\/abstract=1271668","DOI":"10.2139\/ssrn.1271668"},{"key":"16_CR31","unstructured":"European Court of Human Rights, Judgment of 6 November 2003, Case C-101\/01"},{"key":"16_CR32","unstructured":"Metro-Goldwyn-Mayer Studios Inc. v Grokster, Ltd. (04-480) 545 U.S. 913 (2005) 380 F.3d 1154"},{"key":"16_CR33","unstructured":"Metro-Goldwyn-Mayer Studios Inc. v Grokster, Ltd., as above"},{"key":"#cr-split#-16_CR34.1","unstructured":"EFF, RIAA v. The People: Four Years Later (August 2007), http:\/\/w2.eff.org\/IP\/P2P\/riaa_at_four.pdf;"},{"key":"#cr-split#-16_CR34.2","unstructured":"Reuters, 459 European P2P users sued, October 7 (2004), http:\/\/www.afterdawn.com\/news\/archive\/5675.cfm;"},{"key":"#cr-split#-16_CR34.3","unstructured":"J Borland, RIAA sues 261 file swappers, CNET News.com, September 8 (2003), http:\/\/news.com.com\/2100-1023_3-5072564.html;"},{"key":"#cr-split#-16_CR34.4","unstructured":"Engel, J.: Music Industry Targets CMU, The Saginaw News, April 16 (2007) (quoting the RIAA as filing 18,000 lawsuits)"},{"key":"16_CR35","unstructured":"The Financial Times Limited v The Blackstone Group LP et al., US District Court Southern District of New York, Case Number 1:2009cv00783, Filed on January 28 (2009)"},{"key":"16_CR36","unstructured":"Poppleton v Trustees of the Portsmouth Youth Activities Committee [2008] EWCA Civ 646"},{"key":"16_CR37","unstructured":"Cameron, K.: The Seven Laws of Identity, Version 2, August 18 (2008), http:\/\/www.identityblog.com\/?p=1007"},{"key":"16_CR38","unstructured":"R v Spurge [1961] 2 All ER 688"},{"key":"16_CR39","unstructured":"Burns v Bidder [1996] 3 All ER 29"},{"key":"16_CR40","unstructured":"Privacy Awareness Not Backed up by Behaviour, Survey Finds. Out-Law News, August 13 (2008), http:\/\/www.out-law.com\/page-9345"},{"key":"16_CR41","unstructured":"Council Of Europe, http:\/\/www.coe.int\/t\/e\/legal_affairs\/legal_co-operation\/data_protection\/Data_Protection_Day_default.asp"},{"key":"16_CR42","unstructured":"Opinion on More Harmonised Information Provisions, WP 100, November 25 (2004), http:\/\/ec.europa.eu\/justice_home\/fsj\/privacy\/docs\/wpdocs\/2004\/wp100_en.pdf and Appendices: http:\/\/ec.europa.eu\/justice_home\/fsj\/privacy\/docs\/wpdocs\/2004\/wp100a_en.pdf"}],"container-title":["IFIP Advances in Information and Communication Technology","The Future of Identity in the Information Society"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03315-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,15]],"date-time":"2024-03-15T13:11:35Z","timestamp":1710508295000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03315-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642033148","9783642033155"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03315-5_16","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}