{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T00:29:51Z","timestamp":1725582591900},"publisher-location":"Berlin, Heidelberg","reference-count":39,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642207686"},{"type":"electronic","value":"9783642207693"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20769-3_1","type":"book-chapter","created":{"date-parts":[[2011,4,29]],"date-time":"2011-04-29T05:47:20Z","timestamp":1304056040000},"page":"1-14","source":"Crossref","is-referenced-by-count":0,"title":["Privacy: What Are We Actually Talking About?"],"prefix":"10.1007","author":[{"given":"Philip","family":"Sch\u00fctz","sequence":"first","affiliation":[]},{"given":"Michael","family":"Friedewald","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","first-page":"101","volume":"79","author":"H. Nissenbaum","year":"2004","unstructured":"Nissenbaum, H.: Privacy as contextual integrity. Washington Law Review\u00a079, 101\u2013139 (2004)","journal-title":"Washington Law Review"},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1080\/13511611003791182","volume":"23","author":"M. Friedewald","year":"2010","unstructured":"Friedewald, M., Wright, D., Gutwirth, S., Mordini, E.: Privacy, data protection and emerging sciences and technologies: Towards a common framework. Innovation: The European Journal of Social Science Research\u00a023, 63\u201369 (2010)","journal-title":"Innovation: The European Journal of Social Science Research"},{"key":"1_CR3","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/0022-5193(79)90366-7","volume":"76","author":"R.G. Ford","year":"1979","unstructured":"Ford, R.G., Krumme, D.W.: The analysis of space use patterns. Journal of Theoretical Biology\u00a076, 125\u2013155 (1979)","journal-title":"Journal of Theoretical Biology"},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1146\/annurev.psych.59.103006.093625","volume":"59","author":"F.B. Waal de","year":"2008","unstructured":"de Waal, F.B.: Putting the altruism back into altruism: The evolution of empathy. Annual Review of Psychology\u00a059, 279\u2013300 (2008)","journal-title":"Annual Review of Psychology"},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1177\/0011128702239239","volume":"49","author":"C. Haney","year":"2003","unstructured":"Haney, C.: Mental health issues in long term solitary and supermax confinement. Crime and Delinquency\u00a049, 124\u2013156 (2003)","journal-title":"Crime and Delinquency"},{"key":"1_CR6","volume-title":"Privacy: Studies in social and cultural history","author":"B. Moore Jr.","year":"1984","unstructured":"Moore Jr., B.: Privacy: Studies in social and cultural history. M.E. Sharpe, Armonk (1984)"},{"key":"1_CR7","volume-title":"Privacy and freedom","author":"A.F. Westin","year":"1967","unstructured":"Westin, A.F.: Privacy and freedom. Atheneum, New York (1967)"},{"key":"1_CR8","volume-title":"Feminist Mystique","author":"B. Friedan","year":"1963","unstructured":"Friedan, B.: Feminist Mystique. W. W. Norton & Co., New York (1963)"},{"key":"1_CR9","doi-asserted-by":"crossref","DOI":"10.1515\/9780691215952","volume-title":"Public Man, Private Woman","author":"J.B. Elshtain","year":"1981","unstructured":"Elshtain, J.B.: Public Man, Private Woman. Princeton University Press, Princeton (1981)"},{"key":"1_CR10","volume-title":"The Sexual Contract","author":"C. Pateman","year":"1988","unstructured":"Pateman, C.: The Sexual Contract. Stanford University Press, Stanford (1988)"},{"key":"1_CR11","first-page":"1","volume":"4","author":"S. Freud","year":"1915","unstructured":"Freud, S.: Zeitgem\u00e4sses \u00fcber Krieg und Tod. Imago: Zeitschrift f\u00fcr Anwendung der Psychoanalyse auf die Geisteswissenschaften\u00a04, 1\u201321 (1915)","journal-title":"Imago: Zeitschrift f\u00fcr Anwendung der Psychoanalyse auf die Geisteswissenschaften"},{"key":"1_CR12","first-page":"297","volume":"5","author":"S. Freud","year":"1919","unstructured":"Freud, S.: Das Unheimliche. Imago: Zeitschrift f\u00fcr Anwendung der Psychoanalyse auf die Geisteswissenschaften\u00a05, 297\u2013324 (1919)","journal-title":"Imago: Zeitschrift f\u00fcr Anwendung der Psychoanalyse auf die Geisteswissenschaften"},{"key":"1_CR13","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"S.D. Warren","year":"1890","unstructured":"Warren, S.D., Brandeis, L.D.: The right to privacy. Harvard Law Review\u00a04, 193\u2013220 (1890)","journal-title":"Harvard Law Review"},{"key":"1_CR14","volume-title":"Parerga und Paralipomena: Kleine philosophische Schriften","author":"A. Schopenhauer","year":"1851","unstructured":"Schopenhauer, A.: Parerga und Paralipomena: Kleine philosophische Schriften. Erster Band. Verlag A. W. Hahn, Berlin (1851)"},{"key":"1_CR15","volume-title":"Understanding privacy","author":"D.J. Solove","year":"2008","unstructured":"Solove, D.J.: Understanding privacy. Harvard University Press, Cambridge (2008)"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Barak, A.: Proportionality and principled balancing. Law and Ethics of Human Rights 4, Article 1 (2010), http:\/\/www.bepress.com\/cgi\/viewcontent.cgi?article=1041&context=lehr","DOI":"10.2202\/1938-2545.1041"},{"key":"1_CR17","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.clsr.2010.01.002","volume":"26","author":"K. Aquilina","year":"2010","unstructured":"Aquilina, K.: Public security versus privacy in technology law: A balancing act? Computer Law and Security Review\u00a026, 130\u2013143 (2010)","journal-title":"Computer Law and Security Review"},{"key":"1_CR18","unstructured":"de Tocqueville, A.: Democracy in America, vol.\u00a01. George Adlard, New York (1839)"},{"key":"1_CR19","first-page":"31","volume":"281","author":"Directive 95\/46\/EC of the European Parliament and of the Council of October 24, on the protection","year":"1995","unstructured":"Directive 95\/46\/EC of the European Parliament and of the Council of October 24, on the protection of individuals with regard to the processing of personal data on the free movement of such data. Official Journal of the European Communities L 281, 31\u201350 (1995)","journal-title":"Official Journal of the European Communities L"},{"key":"1_CR20","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1111\/j.1540-4560.1977.tb01880.x","volume":"33","author":"R.S. Laufer","year":"1997","unstructured":"Laufer, R.S., Wolfe, M.: Privacy as a concept and a social issue-multidimensional developmental theory. Journal of Social Issues\u00a033, 22\u201342 (1997)","journal-title":"Journal of Social Issues"},{"key":"1_CR21","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/1-4020-8090-5_13","volume-title":"The Economics of Information Security","author":"A. Acquisti","year":"2004","unstructured":"Acquisti, A., Grossklags, J.: Privacy attitudes and privacy behavior: Losses, gains, and hyperbolic discounting. In: Camp, L.J., Lewis, S. (eds.) The Economics of Information Security, pp. 165\u2013178. Kluwer, Dordrecht (2004)"},{"key":"1_CR22","unstructured":"Harvey, M.: Please RobMe website highlights dangers of telling world your location. The Times, February 19 (2010), http:\/\/technology.timesonline.co.uk\/tol\/news\/tech_and_web\/the_web\/article7032820.ece"},{"key":"1_CR23","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1145\/1053291.1053295","volume":"48","author":"B. Berendt","year":"2005","unstructured":"Berendt, B., G\u00fcnther, O., Spiekermann, S.: Privacy in e-commerce: Stated preferences vs. actual behavior. Communication of the ACM\u00a048, 101\u2013106 (2005)","journal-title":"Communication of the ACM"},{"key":"1_CR24","first-page":"793","volume":"19","author":"J. Grimmelmann","year":"2010","unstructured":"Grimmelmann, J.: Privacy as product safety. Widener Law Journal\u00a019, 793\u2013827 (2010), http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1560243","journal-title":"Widener Law Journal"},{"key":"1_CR25","unstructured":"Grossklags, J., Acquisti, A.: When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information. In: Proceedings of the Sixth Workshop on the Economics of Information Security (WEIS 2007), Pittsburgh, PA (2007)"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Lenard, T.M., Rubin, P.H.: In defense of data: Information and the costs of privacy. Policy and Internet 2, Article 7 (2010), http:\/\/www.psocommons.org\/cgi\/viewcontent.cgi?article=1035&context=policyandinternet","DOI":"10.2202\/1944-2866.1035"},{"key":"1_CR27","unstructured":"Roussopoulos, M., Beslay, L., Bowden, C., Finocchiaro, G., Hansen, M., Langheinrich, M., Le Grand, G., Tsakona, K.: Technology-induced challenges in privacy and data protection in europe. A report by the ENISA ad hoc working group on privacy and technology. European Network and Information Security Agency, Heraklion (2008)"},{"key":"1_CR28","first-page":"745","volume":"44","author":"D.J. Solove","year":"2008","unstructured":"Solove, D.J.: \u201cI\u2019ve got nothing to hide\u201d and other misunderstandings of privacy. St. Diego Law Review\u00a044, 745\u2013772 (2008), http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=998565","journal-title":"St. Diego Law Review"},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Swire, P.P.: Efficient confidentiality for privacy, security, and confidential business information. Brookings-Wharton Papers on Financial Services, 273\u2013310 (2003)","DOI":"10.1353\/pfs.2003.0007"},{"key":"1_CR30","unstructured":"Harizopoulos, S., Shah, M.A., Meza, J., Ranganathan, P.: Energy efficiency: The new holy grail of data management systems research. In: 4th Biennial Conference on Innovative Data Systems Research (CIDR), Asilomar, California, USA, January 4-7 (2009)"},{"key":"1_CR31","series-title":"Handbooks in Information Systems","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1016\/S1574-0145(06)01009-9","volume-title":"Economics and Information Systems","author":"K.L. Hui","year":"2006","unstructured":"Hui, K.L., Png, I.: The economics of privacy. In: Hendershott, T. (ed.) Economics and Information Systems. Handbooks in Information Systems, vol.\u00a01, pp. 471\u2013498. Elsevier Science, Amsterdam (2006)"},{"key":"1_CR32","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1023\/B:ETIN.0000017739.09729.9f","volume":"5","author":"R. Volkman","year":"2003","unstructured":"Volkman, R.: Privacy as life, liberty, property. Ethics and Information Technology\u00a05, 199\u2013210 (2003)","journal-title":"Ethics and Information Technology"},{"key":"1_CR33","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.cose.2005.02.001","volume":"24","author":"T. Tsiakis","year":"2005","unstructured":"Tsiakis, T., Stephanides, G.: The economic approach of information security. Computers & Security\u00a024, 105\u2013108 (2005)","journal-title":"Computers & Security"},{"key":"1_CR34","unstructured":"Acquisti, A., Friedman, A., Telang, R.: Is there a cost to privacy breaches? An event story. In: The Fifth Workshop on the Economics of Information Security (WEIS 2006), Cambridge, UK (2006)"},{"key":"1_CR35","first-page":"45","volume":"38","author":"W. Sonnenreich","year":"2006","unstructured":"Sonnenreich, W., Albanese, J., Stout, B.: Return on security investment (rosi) - a practical quantitative model. Journal of Research and Practice in Information Technology\u00a038, 45\u201356 (2006)","journal-title":"Journal of Research and Practice in Information Technology"},{"key":"1_CR36","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1126\/science.1130992","volume":"314","author":"R.J. Anderson","year":"2006","unstructured":"Anderson, R.J., Moore, T.: The economics of information security. Science\u00a0314, 610\u2013613 (2006)","journal-title":"Science"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Graeff, T.R., Harmon, S.: Collecting and using personal data: consumers\u2019 awareness and concerns. Journal of Consumer Marketing\u00a019 (2002)","DOI":"10.1108\/07363760210433627"},{"key":"1_CR38","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4020-6914-7","volume-title":"Profiling the European Citizen: Cross-Disciplinary Perspectives","author":"M. Hildebrandt","year":"2008","unstructured":"Hildebrandt, M., Gutwirth, S.: Profiling the European Citizen: Cross-Disciplinary Perspectives. Springer, Dordrecht (2008)"},{"key":"1_CR39","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1257\/jep.23.3.37","volume":"23","author":"D.S. Evans","year":"2009","unstructured":"Evans, D.S.: The online advertising industry: Economics, evolution, and privacy. Journal of Economic Perspectives\u00a023, 37\u201360 (2009)","journal-title":"Journal of Economic Perspectives"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management for Life"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20769-3_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T05:07:24Z","timestamp":1637557644000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20769-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642207686","9783642207693"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20769-3_1","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2011]]}}}