{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T17:17:45Z","timestamp":1732036665454},"reference-count":76,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Law & Security Review"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1016\/j.clsr.2017.03.027","type":"journal-article","created":{"date-parts":[[2017,4,29]],"date-time":"2017-04-29T00:01:17Z","timestamp":1493424077000},"page":"434-457","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":13,"title":["Enabling valid informed consent for location tracking through privacy awareness of users: A process theory"],"prefix":"10.1016","volume":"33","author":[{"given":"Aggeliki","family":"Tsohou","sequence":"first","affiliation":[]},{"given":"Eleni","family":"Kosta","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.clsr.2017.03.027_bib0010","series-title":"Imagined communities: awareness, information sharing, and privacy on the Facebook","author":"Acquisti","year":"2006"},{"key":"10.1016\/j.clsr.2017.03.027_bib0015","series-title":"Towards a privacy-enhanced social networking site","author":"A\u00efmeur","year":"2010"},{"key":"10.1016\/j.clsr.2017.03.027_bib0020","series-title":"Your location has been shared 5,398 times! A field study on mobile app privacy nudging","author":"Almuhimedi","year":"2014"},{"key":"10.1016\/j.clsr.2017.03.027_bib0025","author":"Android"},{"key":"10.1016\/j.clsr.2017.03.027_bib0030","author":"Appinstitute"},{"key":"10.1016\/j.clsr.2017.03.027_bib0035","author":"Apple"},{"key":"10.1016\/j.clsr.2017.03.027_bib0040","series-title":"Should the users be informed? On differences in risk perception between Android and iPhone users","author":"Benenson","year":"2013"},{"key":"10.1016\/j.clsr.2017.03.027_bib0045","series-title":"The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing","author":"Benisch","year":"2009"},{"key":"10.1016\/j.clsr.2017.03.027_bib0050","series-title":"Privacy in location-based applications: research issues and emerging trends","year":"2009"},{"key":"10.1016\/j.clsr.2017.03.027_bib0055","series-title":"Social research methods","author":"Bryman","year":"2008"},{"key":"10.1016\/j.clsr.2017.03.027_bib0060","series-title":"Privacy implications of presence sharing in mobile messaging applications","author":"Buchenscheit","year":"2014"},{"key":"10.1016\/j.clsr.2017.03.027_bib0065","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.csi.2015.04.001","article-title":"Information privacy policies: The effects of policy characteristics and online experience","volume":"42","author":"Capistrano","year":"2015","journal-title":"Comp Standards Interfaces"},{"key":"10.1016\/j.clsr.2017.03.027_bib0070","series-title":"EG-Datenschutzrichtlinie (NomosVerlagsgesellschaft, Baden-Baden","author":"Dammann","year":"1997"},{"key":"10.1016\/j.clsr.2017.03.027_bib0075","series-title":"European Parliament and the Council of the European Union, Directive 95\/46\/EC of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data","author":"Data Protection Directive","year":"1995"},{"issue":"2","key":"10.1016\/j.clsr.2017.03.027_bib0080","doi-asserted-by":"crossref","first-page":"7","DOI":"10.2753\/JEC1086-4415100201","article-title":"Internet privacy concerns and social awareness as determinants of intention to transact","volume":"10","author":"Dinev","year":"2006","journal-title":"Int J Elect Commerce"},{"key":"10.1016\/j.clsr.2017.03.027_bib0085","unstructured":"Dutch Data Protection Act. Wet bescherming persoonsgegevens (Wbp) Law of 6 July 2000, Stb. 2000, 302. Last amended by the Law of 4 June 2015, Stb. 2015, 230; 2013."},{"key":"10.1016\/j.clsr.2017.03.027_bib0090","author":"Dutch DPA"},{"key":"10.1016\/j.clsr.2017.03.027_bib9000","unstructured":"EDPS. Guidelines on the protection of personal data processed by mobile applications provided by European Union institutions, European Data Protection Supervisor, November 2016."},{"key":"10.1016\/j.clsr.2017.03.027_bib0095","author":"ePrivacy Directive","year":"2002"},{"issue":"2","key":"10.1016\/j.clsr.2017.03.027_bib0100","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1109\/TEM.2005.844927","article-title":"Examining internet privacy policies within the context of user privacy values","volume":"52","author":"Earp","year":"2005","journal-title":"IEEE Trans Eng Manag"},{"key":"10.1016\/j.clsr.2017.03.027_bib0105","series-title":"Recht der elektronischenMedien","article-title":"ZehnterTeil.Telekommunikationsgesetz (TKG)","author":"Eckhardt","year":"2008"},{"key":"10.1016\/j.clsr.2017.03.027_bib0110","article-title":"How trust is formed in online health communities: a process perspective","volume":"34","author":"Fan","year":"2014","journal-title":"Comm Assoc for Info Sys"},{"key":"10.1016\/j.clsr.2017.03.027_bib0115","author":"Felt"},{"key":"10.1016\/j.clsr.2017.03.027_bib0120","series-title":"An introduction to qualitative research","author":"Flick","year":"2009"},{"key":"10.1016\/j.clsr.2017.03.027_bib0125","series-title":"Profiling the European citizen: cross-disciplinary perspectives","first-page":"147","article-title":"Profiling and location-based services (LBS)","author":"Fritsch","year":"2008"},{"issue":"2","key":"10.1016\/j.clsr.2017.03.027_bib0130","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1109\/TSMCC.2010.2071381","article-title":"Normality mining: privacy implications of behavioral profiles drawn from GPS enabled mobile phones","volume":"41","author":"Gasson","year":"2001","journal-title":"IEEE Trans Sys Man and Cybernetics"},{"key":"10.1016\/j.clsr.2017.03.027_bib0135","series-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC","author":"General Data Protection Regulation","year":"2016"},{"key":"10.1016\/j.clsr.2017.03.027_bib0140","series-title":"Information revelation and privacy in online social networks","author":"Gross","year":"2005"},{"key":"10.1016\/j.clsr.2017.03.027_bib0145","author":"GSMA"},{"key":"10.1016\/j.clsr.2017.03.027_bib0150","author":"Hague District Court (Rechtbank Den Haag)"},{"key":"10.1016\/j.clsr.2017.03.027_bib0155","first-page":"273","article-title":"Behavioral advertising: the offer you can't refuse","volume":"6","author":"Hoofnagle","year":"2012","journal-title":"Harv Law Pol Rev"},{"key":"10.1016\/j.clsr.2017.03.027_bib0160","series-title":"Standardizing privacy notices: an online study of the nutrition label approach","author":"Kelley","year":"2010"},{"issue":"12","key":"10.1016\/j.clsr.2017.03.027_bib0165","first-page":"727","article-title":"Two-process view of trust and distrust building in recommendation agents: a process-tracing study","volume":"9","author":"Komiak","year":"2008","journal-title":"J Assoc Info Sys"},{"key":"10.1016\/j.clsr.2017.03.027_bib0170","author":"Korff"},{"key":"10.1016\/j.clsr.2017.03.027_bib0175","series-title":"Consent in European data protection law","author":"Kosta","year":"2013"},{"key":"10.1016\/j.clsr.2017.03.027_bib0180","series-title":"Geographic data and the law: defining new challenges","isbn-type":"print","first-page":"91","article-title":"The processing of location data under the European Data Protection Legal Framework: behavioural profiling via location tracking","author":"Kosta","year":"2012","ISBN":"http:\/\/id.crossref.org\/isbn\/9789058679246"},{"key":"10.1016\/j.clsr.2017.03.027_bib0185","series-title":"The persistence of planned organizational change: a process theory perspective","author":"Ledford","year":"1984"},{"issue":"1","key":"10.1016\/j.clsr.2017.03.027_bib0190","doi-asserted-by":"crossref","first-page":"71","DOI":"10.2307\/20650279","article-title":"Avoidance of information technology threats: a theoretical perspective","volume":"33","author":"Liang","year":"2009","journal-title":"MIS Q"},{"issue":"6","key":"10.1016\/j.clsr.2017.03.027_bib0195","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1057\/ejis.2008.50","article-title":"Explaining information systems change: a punctuated socio-technical change model","volume":"17","author":"Lyytinen","year":"2008","journal-title":"Eur J Inf Syst"},{"key":"10.1016\/j.clsr.2017.03.027_bib0200","author":"McDonald"},{"key":"10.1016\/j.clsr.2017.03.027_bib0205","series-title":"The cost of reading privacy policies. a journal of law and policy for the information society; Privacy Year in Review issue I\/S; 540","author":"McDonald","year":"2008"},{"key":"10.1016\/j.clsr.2017.03.027_bib0210","series-title":"A comparative study of online privacy policies and formats, privacy enhancing technologies, volume 5672 of the series Lecture Notes in Computer Science, pp 37\u201355","author":"McDonald","year":"2009"},{"key":"10.1016\/j.clsr.2017.03.027_bib0215","series-title":"Cookies and web browser design: Toward realizing informed consent online","author":"Millett","year":"2001"},{"issue":"3","key":"10.1016\/j.clsr.2017.03.027_bib0220","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1002\/dir.20009","article-title":"Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices","volume":"18","author":"Milne","year":"2004","journal-title":"J Interactive Market"},{"key":"10.1016\/j.clsr.2017.03.027_bib0225","series-title":"Explaining organizational behavior","author":"Mohr","year":"1982"},{"key":"10.1016\/j.clsr.2017.03.027_bib0230","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.infoandorg.2006.11.002","article-title":"The qualitative interview in IS research: examining the craft","volume":"17","author":"Myers","year":"2007","journal-title":"Info Org"},{"issue":"2","key":"10.1016\/j.clsr.2017.03.027_bib0235","doi-asserted-by":"crossref","first-page":"249","DOI":"10.2307\/249578","article-title":"Social process model of user-analyst relationships","volume":"16","author":"Newman","year":"1992","journal-title":"MIS Q"},{"key":"10.1016\/j.clsr.2017.03.027_bib0240","series-title":"Der neueTelekommunikationsdatenschutz \u2013 EineDarstellung von Teil 7 Abschnitt 2 TKG, Multimedia und Recht (MMR), p. 436","author":"Ohlenburg","year":"2004"},{"key":"10.1016\/j.clsr.2017.03.027_bib0245","first-page":"281","article-title":"To track or \u201cdo not track\u201d: advancing transparency and individual control in online behavioral advertising","volume":"13","author":"Omer","year":"2012","journal-title":"Minn J Law Sci Technol"},{"key":"10.1016\/j.clsr.2017.03.027_bib0250","author":"Pew Research Center"},{"issue":"1","key":"10.1016\/j.clsr.2017.03.027_bib0255","first-page":"3","article-title":"Disclosing Personal Data Socially - an Empirical Study on Facebook Users' Privacy Awareness","volume":"8","author":"Pitkanen","year":"2012","journal-title":"J Inform Priv Sec"},{"key":"10.1016\/j.clsr.2017.03.027_bib0260","series-title":"Privacy concerns of users for location-based mobile personalization","author":"Rakib","year":"2011"},{"key":"10.1016\/j.clsr.2017.03.027_bib0265","first-page":"1","article-title":"Choice and chance: a conceptual model of paths to information security compromise","volume":"20","author":"Ransbotham","year":"2009","journal-title":"Inform Sys Res"},{"issue":"4","key":"10.1016\/j.clsr.2017.03.027_bib0270","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1287\/isre.6.4.303","article-title":"Reconciling variance and process strategies for studying information system development","volume":"6","author":"Sabherwal","year":"1995","journal-title":"Inform Sys Res"},{"key":"10.1016\/j.clsr.2017.03.027_bib0275","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.infoandorg.2010.11.001","article-title":"Designing interviews to generate rich data for information systems research","volume":"21","author":"Schultze","year":"2011","journal-title":"Inform Org"},{"key":"10.1016\/j.clsr.2017.03.027_bib0280","series-title":"The quality of qualitative research","author":"Seale","year":"1999"},{"key":"10.1016\/j.clsr.2017.03.027_bib0285","series-title":"How IT creates business value: a process theory synthesis","author":"Soh","year":"1995"},{"key":"10.1016\/j.clsr.2017.03.027_bib0290","series-title":"Understanding how visual representations of location feeds affect end-user privacy concerns","author":"Tang","year":"2011"},{"key":"10.1016\/j.clsr.2017.03.027_bib0295","author":"The Wall Street Journal"},{"key":"10.1016\/j.clsr.2017.03.027_bib0300","author":"The Wall Street Journal"},{"issue":"2","key":"10.1016\/j.clsr.2017.03.027_bib0305","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1057\/jit.2010.18","article-title":"Understanding information disclosure behaviour in Australian Facebook users","volume":"25","author":"Tow","year":"2008","journal-title":"J Inform Technol"},{"issue":"3","key":"10.1016\/j.clsr.2017.03.027_bib0310","first-page":"271","article-title":"Process-variance models in information security awareness research","volume":"16","author":"Tsohou","year":"2008","journal-title":"Inform Manag Comp Sec"},{"key":"10.1016\/j.clsr.2017.03.027_bib0315","series-title":"Guidance on the Privacy and Electronic Communications (EC Directive) Regulations 2003, Part 2: Security, confidentiality, traffic and location data, itemised billing, CLI and directories, v.3.4' Information Commissioner's Office","author":"UK_ICO","year":"2006"},{"key":"10.1016\/j.clsr.2017.03.027_bib0320","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1016\/S0883-9026(03)00035-1","article-title":"Event-and outcome-driven explanations of entrepreneurship","volume":"19","author":"Van de Ven","year":"2004","journal-title":"J Bus Vent"},{"key":"10.1016\/j.clsr.2017.03.027_bib0325","series-title":"Article 29 Data Protection Working Party, \u2018Opinion 10\/2004 on More Harmonised Information Provisions\u2018","author":"WP100","year":"2004"},{"key":"10.1016\/j.clsr.2017.03.027_bib0330","series-title":"Article 29 Data Protection Working Party, \u2018Opinion on the use of location data with a view to providing value added services (WP115)\u2019","author":"WP115","year":"2005"},{"key":"10.1016\/j.clsr.2017.03.027_bib0335","series-title":"Article 29 Data Protection Working Party, \u2018Working Document on the processing of personal data relating to health in electronic health records (EHR), WP 131\u2019","author":"WP131","year":"2007"},{"key":"10.1016\/j.clsr.2017.03.027_bib0340","series-title":"Article 29 Data Protection Working Party, Opinion 2\/2010 on online behavioural advertising","author":"WP171","year":"2010"},{"key":"10.1016\/j.clsr.2017.03.027_bib0345","series-title":"Article 29 Data Protection Working Party, Opinion 8\/2010 on applicable law","author":"WP179","year":"2010"},{"key":"10.1016\/j.clsr.2017.03.027_bib0350","series-title":"Article 29 Data Protection Working Party, \u2018Opinion 13\/2011 on Geolocation services on smart mobile devices (WP185)\u2019","author":"WP185","year":"2011"},{"key":"10.1016\/j.clsr.2017.03.027_bib0355","series-title":"Article 29 Data Protection Working Party, Opinion 04\/2012 on Cookie Consent Exemption","author":"WP194","year":"2012"},{"key":"10.1016\/j.clsr.2017.03.027_bib0360","series-title":"Article 29 Data Protection Working Party, \u2018Opinion 2\/2013 on apps on smart devices (WP202)\u2019","author":"WP202","year":"2013"},{"key":"10.1016\/j.clsr.2017.03.027_bib0365","series-title":"Article 29 Data Protection Working Party, Working document on determining the international application of EU data protection law to personal data processing on the Internet by non-EU based web sites","author":"WP56","year":"2002"},{"key":"10.1016\/j.clsr.2017.03.027_bib0370","author":"Zang"},{"key":"10.1016\/j.clsr.2017.03.027_bib0375","author":"Zeit Online"},{"key":"10.1016\/j.clsr.2017.03.027_bib0380","author":"Zuiderveen Borgesius"}],"container-title":["Computer Law & Security Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S026736491730119X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S026736491730119X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T19:46:55Z","timestamp":1698695215000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S026736491730119X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":76,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["S026736491730119X"],"URL":"https:\/\/doi.org\/10.1016\/j.clsr.2017.03.027","relation":{},"ISSN":["0267-3649"],"issn-type":[{"value":"0267-3649","type":"print"}],"subject":[],"published":{"date-parts":[[2017,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Enabling valid informed consent for location tracking through privacy awareness of users: A process theory","name":"articletitle","label":"Article Title"},{"value":"Computer Law & Security Review","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.clsr.2017.03.027","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2017 Aggeliki Tsohou & Eleni Kosta. Published by Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}