{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T15:30:47Z","timestamp":1726759847132},"reference-count":73,"publisher":"Elsevier BV","issue":"12","content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human-Computer Studies"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1016\/j.ijhcs.2013.09.002","type":"journal-article","created":{"date-parts":[[2013,9,12]],"date-time":"2013-09-12T13:01:10Z","timestamp":1378990870000},"page":"1133-1143","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":100,"title":["Guide to measuring privacy concern: Review of survey and observational instruments"],"prefix":"10.1016","volume":"71","author":[{"given":"S\u00f6ren","family":"Preibusch","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ijhcs.2013.09.002_bib1","doi-asserted-by":"crossref","unstructured":"Ackerman, M.S., Cranor, L.F., Reagle, J., 1999. Privacy in e-commerce: examining user scenarios and privacy preferences. In: Proceedings of the First ACM Conference on Electronic commerce. EC '99. ACM, New York, NY, USA, pp. 1\u20138. URL \u3008http:\/\/doi.acm.org\/10.1145\/336992.336995\u3009.","DOI":"10.1145\/336992.336995"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib2","first-page":"36","article-title":"Imagined communities","volume":"vol. 4258","author":"Acquisti","year":"2006"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib3","unstructured":"Aggarwal, G., Bursztein, E., Jackson, C., Boneh, D., 2010. An analysis of private browsing modes in modern browsers. In: Proceedings of the 19th USENIX Security Symposium."},{"key":"10.1016\/j.ijhcs.2013.09.002_bib4","series-title":"The Environment and Social Behavior","author":"Altman","year":"1975"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib5","doi-asserted-by":"crossref","unstructured":"Ant\u00f3n, A.I., Earp, J.B., Young, J.D., 2009. How Internet Users' Privacy Concerns have Evolved Since 2002. Computer Science Technical Report TR-2009-16, North Carolina State University.","DOI":"10.1109\/MSP.2010.38"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib6","doi-asserted-by":"crossref","unstructured":"Barnes, S.B., 2006. A privacy paradox: social networking in the United States. First Monday 11 (September (9)).","DOI":"10.5210\/fm.v11i9.1394"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib7","unstructured":"Bartlett, J., 2012. The data dialogue, September. URL \u3008http:\/\/www.demos.co.uk\/files\/The_Data_Dialogue.pdf\u3009."},{"key":"10.1016\/j.ijhcs.2013.09.002_bib8","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1007\/s10618-012-0254-1","article-title":"More than modelling and hiding","volume":"24","author":"Berendt","year":"2012","journal-title":"Data Mining and Knowledge Discovery"},{"issue":"1","key":"10.1016\/j.ijhcs.2013.09.002_bib9","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.econlet.2012.04.077","article-title":"Unwillingness to pay for privacy","volume":"117","author":"Beresford","year":"2012","journal-title":"Economics Letters"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib10","doi-asserted-by":"crossref","unstructured":"Braunstein, A., Granka, L., Staddon, J., 2011. Indirect content privacy surveys: measuring privacy without asking about it. In: Proceedings of the Seventh Symposium on Usable Privacy and Security. SOUPS '11. ACM, New York, NY, USA, pp. 15:1\u201315:14. URL \u3008http:\/\/doi.acm.org\/10.1145\/2078827.2078847\u3009.","DOI":"10.1145\/2078827.2078847"},{"issue":"2","key":"10.1016\/j.ijhcs.2013.09.002_bib11","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1002\/asi.20459","article-title":"Development of measures of online privacy concern and protection for use on the Internet","volume":"58","author":"Buchanan","year":"2007","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib12","unstructured":"Bundesverfassungsgericht, 1983. Urteil des Ersten Senats vom 15. Dezember 1983 auf die m\u00fcndliche Verhandlung vom 18. und 19. Oktober 1983 (Volksz\u00e4hlung). BVerfGE 65, 1, Bundesverfassungsgericht [Federal Constitutional Court of Germany]. URL \u3008http:\/\/www.servat.unibe.ch\/dfr\/bv065001.html\u3009."},{"key":"10.1016\/j.ijhcs.2013.09.002_bib13","unstructured":"Carrascal, J.P., Riederer, C., Erramilli, V., Cherubini, M., de Oliveira, R., 2011. Your browsing behavior for a big mac: economics of personal information online. CoRR abs\/1112.6098."},{"key":"10.1016\/j.ijhcs.2013.09.002_bib14","doi-asserted-by":"crossref","unstructured":"Chellappa, R.K., Sin, R.G., 2005. Personalization versus privacy: an empirical examination of the online consumer's dilemma. Information Technology and Management 6, 181\u2013202. URL \u3008http:\/\/dx.doi.org\/10.1007\/s10799-005-5879-y\u3009.","DOI":"10.1007\/s10799-005-5879-y"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib15","unstructured":"Coles-Kemp, L., Lai, Y.-L., Ford, M., 2010. Privacy on the Internet: Attitudes and Behaviours. Technical Report, VOME Project."},{"issue":"1","key":"10.1016\/j.ijhcs.2013.09.002_bib16","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1287\/orsc.10.1.104","article-title":"Information privacy concerns, procedural fairness, and impersonal trust","volume":"10","author":"Culnan","year":"1999","journal-title":"Organization Science"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib17","doi-asserted-by":"crossref","unstructured":"Cvrcek, D., Kumpost, M., Matyas, V., Danezis, G., 2006. A study on the value of location privacy. In: Proceedings of the Fifth ACM Workshop on Privacy in Electronic Society. WPES \u201906. ACM, New York, NY, USA, pp. 109\u2013118. URL \u3008http:\/\/doi.acm.org\/10.1145\/1179601.1179621\u3009.","DOI":"10.1145\/1179601.1179621"},{"issue":"6","key":"10.1016\/j.ijhcs.2013.09.002_bib18","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1080\/01449290410001715723","article-title":"Internet privacy concerns and their antecedents \u2013 measurement validity and a regression model","volume":"23","author":"Dinev","year":"2004","journal-title":"Behaviour Information & Technology"},{"issue":"1","key":"10.1016\/j.ijhcs.2013.09.002_bib19","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","article-title":"An extended privacy calculus model for e-commerce transactions","volume":"17","author":"Dinev","year":"2006","journal-title":"Information Systems Research"},{"issue":"3","key":"10.1016\/j.ijhcs.2013.09.002_bib20","doi-asserted-by":"crossref","first-page":"25","DOI":"10.2979\/ESJ.2006.4.3.25","article-title":"Privacy concerns and levels of information exchange","volume":"4","author":"Dinev","year":"2006","journal-title":"e-Service Journal"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib21","doi-asserted-by":"crossref","unstructured":"Dutton, W.H., Blank, G., 2011. Next Generation Users: The Internet in Britain. Oxford Internet Surveys (oxis), Oxford Internet Institute, University of Oxford, October.","DOI":"10.2139\/ssrn.1960655"},{"issue":"May (2)","key":"10.1016\/j.ijhcs.2013.09.002_bib22","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1109\/TEM.2005.844927","article-title":"Examining internet privacy policies within the context of user privacy values","volume":"52","author":"Earp","year":"2005","journal-title":"IEEE Transactions on Engineering Management"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib23","unstructured":"Federal Trade Commission, 2007. Fair information practice principles. URL \u3008http:\/\/www.ftc.gov\/reports\/privacy3\/fairinfo.shtm\u3009."},{"issue":"June (7)","key":"10.1016\/j.ijhcs.2013.09.002_bib24","first-page":"10","article-title":"Cargo cult science","volume":"37","author":"Feynman","year":"1974","journal-title":"Engineering and Science"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib25","unstructured":"Fielding, R.T., Singer, D., 2012. Tracking preference expression (dnt). W3c working draft, World Wide Web Consortium (W3C), October. URL \u3008http:\/\/www.w3.org\/TR\/tracking-dnt\/\u3009."},{"issue":"1","key":"10.1016\/j.ijhcs.2013.09.002_bib26","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.jrp.2005.08.007","article-title":"The international personality item pool and the future of public-domain personality measures","volume":"40","author":"Goldberg","year":"2006","journal-title":"Journal of Research in Personality"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib27","unstructured":"Grossklags, J., Acquisti, A., 2007. When 25 cents is too much: an experiment on willingness-to-sell and willingness-to-protect personal information. In: The Sixth Workshop on the Economics of Information Security (WEIS)."},{"key":"10.1016\/j.ijhcs.2013.09.002_bib28","unstructured":"G\u00fcrses, S., 2010. Multilateral Privacy Requirements Analysis in Online Social Networks. Ph.D. Thesis, HMDB, Department of Computer Science, K.U. Leuven, Belgium, May."},{"key":"10.1016\/j.ijhcs.2013.09.002_bib29","unstructured":"Harkness, J., 2010. Cross-cultural survey guidelines, November. URL \u3008http:\/\/ccsg.isr.umich.edu\/\u3009."},{"key":"10.1016\/j.ijhcs.2013.09.002_bib30","doi-asserted-by":"crossref","unstructured":"Hess, T., Schreiner, M., 2012. \u00d6konomie der Privatsph\u00e4re. Datenschutz und Datensicherheit \u2013 DuD 36, 105\u2013109. URL \u3008http:\/\/dx.doi.org\/10.1007\/s11623-012-0026-5\u3009.","DOI":"10.1007\/s11623-012-0026-5"},{"issue":"2","key":"10.1016\/j.ijhcs.2013.09.002_bib31","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1108\/07363760710737094","article-title":"Exploring consumer lying in information-based exchanges","volume":"24","author":"Horne","year":"2007","journal-title":"The Journal of Consumer Marketing"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib32","unstructured":"IPIP\/Oregon Research Institute, 2012. International personality item pool: a scientific collaboratory for the development of advanced measures of personality traits and other individual differences. URL \u3008http:\/\/ipip.ori.org\/\u3009."},{"issue":"1","key":"10.1016\/j.ijhcs.2013.09.002_bib33","first-page":"79","article-title":"Automating questionnaire design and construction","volume":"42","author":"Jenkins","year":"1999","journal-title":"International Journal of Market Research"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib34","unstructured":"Jentzsch, N., Preibusch, S., Harasser, A., 2012. Study on monetising privacy. An economic model for pricing personal information. ENISA, February."},{"key":"10.1016\/j.ijhcs.2013.09.002_bib35","series-title":"Self-Disclosure","author":"Jourard","year":"1971"},{"issue":"1","key":"10.1016\/j.ijhcs.2013.09.002_bib36","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1037\/h0043357","article-title":"Some factors in self-disclosure","volume":"56","author":"Jourard","year":"1958","journal-title":"The Journal of Abnormal and Social Psychology"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib37","first-page":"628","article-title":"Privacy-enhanced web personalization","volume":"vol. 4321","author":"Kobsa","year":"2007"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib38","doi-asserted-by":"crossref","unstructured":"Krol, K., Moroz, M., Sasse, M.A., 2012. Don't work. Can't work? Why it's time to rethink security warnings. In: Seventh International Conference on Risk and Security of Internet and Systems (CRiSIS), October. URL 10.1109\/CRISIS.2012.6378951.","DOI":"10.1109\/CRISIS.2012.6378951"},{"issue":"1","key":"10.1016\/j.ijhcs.2013.09.002_bib39","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1111\/j.1083-6101.2008.01432.x","article-title":"The taste for privacy","volume":"14","author":"Lewis","year":"2008","journal-title":"Journal of Computer-Mediated Communication"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib40","unstructured":"Lynch, B., 2012. Advancing consumer trust and privacy: Internet Explorer in Windows 8. TechNet Blogs: Microsoft on the Issues, May."},{"key":"10.1016\/j.ijhcs.2013.09.002_bib41","doi-asserted-by":"crossref","unstructured":"Malheiros, M., Preibusch, S., Sasse, M.A., 2013. \u201cfairly truthful\u201d: the impact of perceived effort, fairness, relevance, and sensitivity on personal data disclosure. In: Sixth International Conference on Trust & Trustworthy Computing. Lecture Notes in Computer Science, vol. 7904, Springer, Berlin Heidelberg, pp. 250-266, URL 10.1007\/978-3-642-38908-5_19","DOI":"10.1007\/978-3-642-38908-5_19"},{"issue":"4","key":"10.1016\/j.ijhcs.2013.09.002_bib42","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","article-title":"Internet users' information privacy concerns (IUIPC)","volume":"15","author":"Malhotra","year":"2004","journal-title":"Information Systems Research"},{"issue":"2","key":"10.1016\/j.ijhcs.2013.09.002_bib43","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1111\/j.1365-2648.2004.03185.x","article-title":"Instrument translation process","volume":"48","author":"Maneesriwongul","year":"2004","journal-title":"Journal of Advanced Nursing"},{"issue":"2","key":"10.1016\/j.ijhcs.2013.09.002_bib44","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1111\/1540-4560.00071","article-title":"On the status and contribution of Westin's and Altman's theories of privacy","volume":"59","author":"Margulis","year":"2003","journal-title":"Journal of Social Issues"},{"issue":"3","key":"10.1016\/j.ijhcs.2013.09.002_bib45","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1207\/s15327906mbr0903_1","article-title":"Dimensions of privacy preferences","volume":"9","author":"Marshall","year":"1974","journal-title":"Multivariate Behavioral Research"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib46","doi-asserted-by":"crossref","unstructured":"Maxion, R., 2011. Making experiments dependable. In: Jones, C., Lloyd, J. (Eds.), Dependable and Historic Computing. Lecture Notes in Computer Science, vol. 6875. Springer, Berlin, Heidelberg, pp. 344\u2013357.","DOI":"10.1007\/978-3-642-24541-1_26"},{"issue":"2","key":"10.1016\/j.ijhcs.2013.09.002_bib47","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1111\/j.1083-6101.2007.00328.x","article-title":"Communication privacy management in electronic commerce","volume":"12","author":"Metzger","year":"2007","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"1","key":"10.1016\/j.ijhcs.2013.09.002_bib48","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1177\/1094670511424924","article-title":"Disclosure antecedents in an online service context","volume":"15","author":"Mothersbaugh","year":"2012","journal-title":"Journal of Service Research"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib49","unstructured":"Mowery, K., Bogenreif, D., Yilek, S., Shacham, H., 2011. Fingerprinting information in JavaScript implementations. In: Proceedings of W2SP 2011. IEEE Computer Society, May."},{"issue":"1","key":"10.1016\/j.ijhcs.2013.09.002_bib50","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","article-title":"The privacy paradox","volume":"41","author":"Norberg","year":"2007","journal-title":"Journal of Consumer Affairs"},{"issue":"1","key":"10.1016\/j.ijhcs.2013.09.002_bib51","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1177\/089443930101900103","article-title":"Analysis of internet users' level of online privacy concerns","volume":"19","author":"O'Neil","year":"2001","journal-title":"Social Science Computer Review"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib52","unstructured":"Oomen, I., Leenes, R., 2008. The PRIME Survey \u2013 A Study Regarding Privacy Attitudes and Behaviour of Students in the Netherlands, Flanders and the UK. Technical Report, PRIME (Privacy and Identity Management for Europe)."},{"key":"10.1016\/j.ijhcs.2013.09.002_bib53","unstructured":"Personalization Consortium, 2000, 2005. Personalization & Privacy Survey. Via Internet Archive. URL \u3008http:\/\/replay.waybackmachine.org\/20050513193924\/http:\/\/personalization.org\/SurveyResults.pdf\u3009."},{"key":"10.1016\/j.ijhcs.2013.09.002_bib54","first-page":"604","article-title":"Implementing privacy negotiations in e-commerce","volume":"vol. 3841","author":"Preibusch","year":"2006"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib55","unstructured":"Preibusch, S., 2009. Key facts on privacy negotiations. URL \u3008http:\/\/privacy-negotiations.de\/\u3009."},{"key":"10.1016\/j.ijhcs.2013.09.002_bib56","unstructured":"Preibusch, S., 2013. The value of privacy in web search. In: The Twelfth Workshop on the Economics of Information Security (WEIS)."},{"key":"10.1016\/j.ijhcs.2013.09.002_bib57","doi-asserted-by":"crossref","unstructured":"Preibusch, S., Krol, K., Beresford, A.R., 2012. The privacy economics of voluntary over-disclosure in web forms. In: The Eleventh Workshop on the Economics of Information Security (WEIS).","DOI":"10.1007\/978-3-642-39498-0_9"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib58","doi-asserted-by":"crossref","unstructured":"Preibusch, S., K\u00fcbler, D., Beresford, A.R., Price versus privacy: an experiment into the competitive advantage of collecting less personal information. Electronic Commerce Research, forthcoming, 2013, URL 10.1007\/s10660-013-9130-3","DOI":"10.1007\/s10660-013-9130-3"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib59","unstructured":"Rivenbark, D.R., 2010. Experimentally Elicited Beliefs Explain Privacy Behavior. Technical Report, University of Central Florida \u2013 College of Business Administration, November. URL \u3008http:\/\/web.bus.ucf.edu\/documents\/economics\/workingpapers\/2010-09.pdf\u3009."},{"issue":"1","key":"10.1016\/j.ijhcs.2013.09.002_bib60","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1509\/jppm.19.1.62.16949","article-title":"Dimensions of privacy concern among online consumers","volume":"19","author":"Sheehan","year":"2000","journal-title":"Journal of Public Policy & Marketing"},{"issue":"2","key":"10.1016\/j.ijhcs.2013.09.002_bib61","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/249477","article-title":"Information privacy","volume":"20","author":"Smith","year":"1996","journal-title":"MIS Quarterly"},{"issue":"3","key":"10.1016\/j.ijhcs.2013.09.002_bib62","doi-asserted-by":"crossref","first-page":"503","DOI":"10.2307\/25148854","article-title":"Internet users' information privacy-protective responses","volume":"32","author":"Son","year":"2008","journal-title":"MIS Quarterly"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib63","doi-asserted-by":"crossref","unstructured":"Spiekermann, S., Grossklags, J., Berendt, B., 2001. E-privacy in 2nd generation e-commerce: privacy preferences versus actual behavior. In: Proceedings of the Third ACM Conference on Electronic Commerce. EC '01. ACM, New York, NY, USA, pp. 38\u201347.","DOI":"10.1145\/501158.501163"},{"issue":"1","key":"10.1016\/j.ijhcs.2013.09.002_bib64","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1287\/isre.13.1.36.97","article-title":"An empirical examination of the concern for information privacy instrument","volume":"13","author":"Stewart","year":"2002","journal-title":"Information Systems Research"},{"issue":"3","key":"10.1016\/j.ijhcs.2013.09.002_bib65","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1037\/0021-9010.68.3.459","article-title":"A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations","volume":"68","author":"Stone","year":"1983","journal-title":"Journal of Applied Psychology"},{"issue":"1","key":"10.1016\/j.ijhcs.2013.09.002_bib66","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.1467-9973.2006.00474.x","article-title":"Philosophical theories of privacy","volume":"38","author":"Tavani","year":"2007","journal-title":"Metaphilosophy"},{"key":"10.1016\/j.ijhcs.2013.09.002_bib67","unstructured":"Telef\u00f3nica, S.A., 2012. Telef\u00f3nica launches Telef\u00f3nica Dynamic Insights \u2013 a new global big data business unit, October. URL \u3008http:\/\/dynamicinsights.telefonica.com\/view-news\/?i=94\u3009."},{"key":"10.1016\/j.ijhcs.2013.09.002_bib68","unstructured":"The Gallup Organization, 2008. Data Protection in the European Union. Citizens' Perceptions. Analytical Report. Technical Report 225, Flash Eurobarometer, February."},{"key":"10.1016\/j.ijhcs.2013.09.002_bib69","unstructured":"TNS Opinion and Social, 2011. Attitudes on Data Protection and Electronic Identity in the European Union. Technical Report 359, Special Eurobarometer, June."},{"key":"10.1016\/j.ijhcs.2013.09.002_bib70","unstructured":"TRUSTe, 2012. U.S. Consumer Privacy Attitudes and Business Implications. Technical Report, July. URL \u3008http:\/\/download.truste.com\/dload.php\/?f=FG35QMFR-188\u3009."},{"key":"10.1016\/j.ijhcs.2013.09.002_bib71","unstructured":"Tsai, J., Egelman, S., Cranor, L., Acquisti, A., 2007. The effect of online privacy information on purchasing behavior: an experimental study. In: The Sixth Workshop on the Economics of Information Security (WEIS)."},{"key":"10.1016\/j.ijhcs.2013.09.002_bib72","unstructured":"Westin, A.F., 1967. Privacy and freedom. Atheneum."},{"key":"10.1016\/j.ijhcs.2013.09.002_bib73","unstructured":"Westin, A.F., 1991. Harris\u2013Equifax Consumer Privacy Survey 1991. Technical Report, Harris, Louis and Associates\/Equifax Inc."}],"container-title":["International Journal of Human-Computer Studies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1071581913001183?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1071581913001183?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T01:02:44Z","timestamp":1563930164000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1071581913001183"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":73,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["S1071581913001183"],"URL":"https:\/\/doi.org\/10.1016\/j.ijhcs.2013.09.002","relation":{},"ISSN":["1071-5819"],"issn-type":[{"value":"1071-5819","type":"print"}],"subject":[],"published":{"date-parts":[[2013,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Guide to measuring privacy concern: Review of survey and observational instruments","name":"articletitle","label":"Article Title"},{"value":"International Journal of Human-Computer Studies","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ijhcs.2013.09.002","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2013 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}