{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:44:20Z","timestamp":1730299460252,"version":"3.28.0"},"reference-count":58,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/stast.2013.11","type":"proceedings-article","created":{"date-parts":[[2014,1,3]],"date-time":"2014-01-03T19:09:44Z","timestamp":1388776184000},"page":"18-25","source":"Crossref","is-referenced-by-count":40,"title":["Transparency Enhancing Tools (TETs): An Overview"],"prefix":"10.1109","author":[{"given":"Milena","family":"Janic","sequence":"first","affiliation":[]},{"given":"Jan Pieter","family":"Wijbenga","sequence":"additional","affiliation":[]},{"given":"Thijs","family":"Veugen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1145\/1053291.1053295","article-title":"Privacy in e-commerce: Stated preferences vs actual behavior","volume":"48","author":"berendt","year":"2005","journal-title":"Communications of the ACM"},{"doi-asserted-by":"publisher","key":"36","DOI":"10.1109\/MSP.2005.22"},{"doi-asserted-by":"publisher","key":"33","DOI":"10.1109\/STAST.2011.6059256"},{"doi-asserted-by":"publisher","key":"34","DOI":"10.1016\/S0963-8687(02)00018-5"},{"doi-asserted-by":"publisher","key":"39","DOI":"10.1108\/14684520710832342"},{"doi-asserted-by":"publisher","key":"37","DOI":"10.1007\/s10207-007-0028-8"},{"year":"2005","author":"turow","journal-title":"Open to Exploitation American Shoppers Online and Offline","key":"38"},{"year":"2013","key":"43"},{"doi-asserted-by":"publisher","key":"42","DOI":"10.1007\/s10676-010-9253-3"},{"doi-asserted-by":"publisher","key":"41","DOI":"10.1287\/isre.1090.0260"},{"year":"2013","author":"kool","journal-title":"Trusted Technology Een Onderzoek Naar de Toepassingsvoorwaarden voor Privacy by Design in de Elektronische Dienstverlening Van de Overheid","key":"40"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1016\/S1071-5819(03)00041-7"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1016\/j.im.2003.08.004"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1002\/dir.10008"},{"key":"25","doi-asserted-by":"crossref","DOI":"10.3127\/ajis.v16i2.516","article-title":"Effect of presentation flaw attribution on website quality, trust, and abandonment","volume":"16","author":"everard","year":"2010","journal-title":"Australasian Journal of Information Systems"},{"key":"26","first-page":"185","article-title":"An Empirical evaluation of the factors affecting trust in web banking systems","author":"kini","year":"2000","journal-title":"Americas Conference on Information System"},{"doi-asserted-by":"publisher","key":"27","DOI":"10.1145\/299157.299175"},{"doi-asserted-by":"publisher","key":"28","DOI":"10.4304\/jcp.4.1.11-18"},{"year":"2005","author":"flinn","journal-title":"The Third Annual Conference on Privacy Security and Trust (PST 2005)","article-title":"User perceptions of privacy and security on the web","key":"29"},{"year":"1994","author":"garfinkel","journal-title":"PGP Pretty Good Privacy","key":"3"},{"year":"2003","author":"van blarkom","journal-title":"Handbook of Privacy and Privacy-Enhancing Technologies The Case of Intelligent Software Agents","first-page":"33","key":"2"},{"year":"2013","journal-title":"Identity Theft","key":"1"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1007\/978-3-642-29615-4_10"},{"year":"2005","author":"rainie","journal-title":"Privacy Online How Americans Feel? the Ways They Are Responding to New Threats ? and Why They Are Changing Their Online Behaviour","key":"30"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1201\/9781420052183.ch1"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/TIFS.2012.2190726"},{"year":"0","author":"huijboom","journal-title":"Trust in ICT","key":"32"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/SECPRI.1997.601314"},{"doi-asserted-by":"publisher","key":"31","DOI":"10.1509\/jmkg.2005.69.4.133"},{"year":"2013","journal-title":"Confidence in the Information Society Analytical Report","key":"9"},{"year":"2013","journal-title":"New Survey Reports an Increase in ID Theft and Decrease in Consumer Confidence","key":"8"},{"year":"2013","key":"58"},{"year":"2013","key":"57"},{"doi-asserted-by":"publisher","key":"19","DOI":"10.1016\/S0963-8687(02)00020-3"},{"year":"2013","key":"56"},{"key":"55","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-14527-8_1","article-title":"How unique is your web browser","author":"eckersley","year":"2010","journal-title":"Proceedings of the 10th International Conference on Privacy Enhancing Technologies"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1177\/146144804042523"},{"year":"2012","journal-title":"Internet Users' Response to Consumer Online Privacy","key":"18"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1016\/j.ijhcs.2006.12.001"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1002\/asi.20459"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1080\/01972240490507956"},{"key":"14","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1177\/1461444808101618","article-title":"A multinational study on online privacy: Global concerns and local responses","volume":"11","author":"cho","year":"2009","journal-title":"New Media Society"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1287\/isre.1040.0032"},{"year":"2012","author":"rainie","journal-title":"Transportation and Privacy in the Mobile Age","key":"12"},{"key":"21","doi-asserted-by":"crossref","first-page":"51","DOI":"10.2307\/30036519","article-title":"Trust and TAM in online shopping: An integrated model","volume":"27","author":"gefen","year":"2003","journal-title":"MIS Quarterly"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1002\/cb.235"},{"year":"2013","key":"49"},{"year":"2013","key":"48"},{"year":"2013","key":"45"},{"year":"2013","key":"44"},{"year":"2013","key":"47"},{"year":"2013","key":"46"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1007\/978-3-642-03315-5_5"},{"year":"2013","key":"51"},{"year":"2013","key":"52"},{"year":"2013","key":"53"},{"year":"2013","key":"54"},{"year":"2013","key":"50"}],"event":{"name":"2013 3rd International Workshop on Socio-Technical Aspects in Security and Trust (STAST 2013)","start":{"date-parts":[[2013,6,29]]},"location":"New Orleans, LA","end":{"date-parts":[[2013,6,29]]}},"container-title":["2013 Third Workshop on Socio-Technical Aspects in Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6690964\/6691352\/06691365.pdf?arnumber=6691365","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T18:43:16Z","timestamp":1580755396000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6691365\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":58,"URL":"https:\/\/doi.org\/10.1109\/stast.2013.11","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}