{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:53:47Z","timestamp":1725562427182},"reference-count":50,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T00:00:00Z","timestamp":1582588800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Big Data"],"DOI":"10.3389\/fdata.2020.00007","type":"journal-article","created":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T05:38:40Z","timestamp":1582609120000},"update-policy":"http:\/\/dx.doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Types of Privacy Expectations"],"prefix":"10.3389","volume":"3","author":[{"given":"Ashwini","family":"Rao","sequence":"first","affiliation":[]},{"given":"Juergen","family":"Pfeffer","sequence":"additional","affiliation":[]}],"member":"1965","published-online":{"date-parts":[[2020,2,25]]},"reference":[{"key":"B1","volume-title":"The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding","author":"Altman","year":"1975"},{"key":"B2","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1093\/ijpor\/edw007","article-title":"Answering without reading: IMCs strong satisficing in online surveys","volume":"29","author":"Anduiza","year":"2017","journal-title":"Int. J. Public Opin. Res"},{"key":"B3","volume-title":"Bank of America U.S. Online Privacy Notice","year":"2019"},{"key":"B4","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1145\/1053291.1053295","article-title":"Privacy in e-commerce: stated preferences vs. actual behavior","volume":"48","author":"Berendt","year":"2005","journal-title":"Commun. ACM"},{"key":"B5","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1111\/ajps.12081","article-title":"Separating the shirkers from the workers? making sure respondents pay attention on self-administered surveys","volume":"58","author":"Berinsky","year":"2014","journal-title":"Am. J. Political Sci."},{"key":"B6","volume-title":"Asking Questions: The Definitive Guide to Questionnaire Design - For Market Research, Political Polls, and Social and Health Questionnaires","author":"Bradburn","year":"2004"},{"key":"B7","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1093\/poq\/nfv027","article-title":"Do attempts to improve respondent attention increase social desirability bias?","volume":"79","author":"Clifford","year":"2015","journal-title":"Public Opin. Qtly."},{"key":"B8","volume-title":"Practical Nonparametric Statistics","author":"Conover","year":"1999"},{"key":"B9","volume-title":"General Data Protection Regulation (GDPR)","year":"2016"},{"key":"B10","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/isre.1060.0080","article-title":"An extended privacy calculus model for e-commerce transactions","volume":"17","author":"Dinev","year":"2006","journal-title":"Inf. Syst. Res."},{"key":"B11","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1109\/TEM.2005.844927","article-title":"Examining internet privacy policies within the context of user privacy values","volume":"52","author":"Earp","year":"2005","journal-title":"Trans. Eng. Manage."},{"key":"B12","first-page":"10","article-title":"The expectations-performance comparison process: an investigation of expectation types,","volume-title":"International Fare in Consumer Satisfaction and Complaining Behavior: Papers From the Seventh Annual Conference on Consumer Satisfaction, Dissatisfaction, and Complaining Behavior, The University of Tennessee, Knoxville, Tennessee","author":"Gilly","year":"1983"},{"key":"B13","unstructured":"GomezJ. PinnickT. SoltaniA. Know Privacy. Technical report, UC Berkeley School of Information2009"},{"key":"B14","volume-title":"Judgement and Choice: The Psychology of Decision","author":"Hogarth","year":"1987"},{"key":"B15","volume-title":"Privacy Indexes: A Survey of Westin's Studies.","author":"Kumaraguru","year":"2005"},{"key":"B16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2501604.2501611","article-title":"What matters to users? factors that affect users' willingness to share information with online advertisers,","volume-title":"Proceedings of the Ninth Symposium on Usable Privacy and Security","author":"Leon","year":"2013"},{"key":"B17","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1080\/01488376.2011.580697","article-title":"A comparison of psychometric properties and normality in 4-, 5-, 6-, and 11-point likert scales","volume":"37","author":"Leung","year":"2011","journal-title":"J. Soc. Ser. Res"},{"key":"B18","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1145\/2370216.2370290","article-title":"Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing,","volume-title":"Proceedings of the 2012 ACM Conference on Ubiquitous Computing","author":"Lin","year":"2012"},{"key":"B19","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1145\/2068816.2068823","article-title":"Analyzing facebook privacy settings: user expectations vs. reality,","volume-title":"Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference","author":"Liu","year":"2011"},{"key":"B20","volume-title":"Doing Psychology Experiments","author":"Martin","year":"2007"},{"key":"B21","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1007\/s10551-015-2565-9","article-title":"Understanding privacy online: development of a social contract approach to privacy","volume":"137","author":"Martin","year":"2016","journal-title":"J. Bus. Ethics"},{"key":"B22","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1080\/01972243.2016.1153012","article-title":"Putting mobile application privacy in context: an empirical study of user privacy expectations for mobile devices","volume":"32","author":"Martin","year":"","journal-title":"Inf. Soc."},{"key":"B23","doi-asserted-by":"publisher","first-page":"1871","DOI":"10.1002\/asi.23500","article-title":"Why experience matters to privacy: how context-based experience moderates consumer privacy expectations for mobile applications","volume":"67","author":"Martin","year":"","journal-title":"J. Assoc. Inf. Sci. Tech."},{"key":"B24","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v18i12.4838","article-title":"Transaction costs, privacy, and trust: the laudable goals and ultimate failure of notice and choice to respect privacy online","author":"Martin","year":"2013","journal-title":"First Monday"},{"key":"B25","doi-asserted-by":"crossref","DOI":"10.1145\/3025453.3025706","article-title":"User interactions and permission use on android,","volume-title":"Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems","author":"Micinski","year":"2017"},{"key":"B26","first-page":"10","article-title":"Studying satisfaction, modifying models, eliciting expectations, posing problems, and making meaningful measurements,","volume-title":"Conceptualization and Measurement of Consumer Satisfaction and Dissatisfaction: Proceedings of Conference Conducted by Marketing Science Institute, with Support of National Science Foundation","author":"Miller","year":"1977"},{"key":"B27","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1509\/jppm.29.1.138","article-title":"Are there differences between consumers' and marketers' privacy expectations? A segment- and technology-level analysis","volume":"29","author":"Milne","year":"2010","journal-title":"Public Policy Mark."},{"key":"B28","first-page":"399","article-title":"Privacy expectations and preferences in an IoT world,","volume-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017)","author":"Naeini","year":"2017"},{"key":"B29","doi-asserted-by":"crossref","DOI":"10.1515\/9780804772891","volume-title":"Privacy in Context: Technology, Policy, and the Integrity of Social Life","author":"Nissenbaum","year":"2009"},{"key":"B30","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","article-title":"The privacy paradox: personal information disclosure intentions versus behaviors","volume":"41","author":"Norberg","year":"2007","journal-title":"J. Cons. Aff."},{"key":"B31","doi-asserted-by":"publisher","first-page":"1985","DOI":"10.1145\/1056808.1057073","author":"Olson","year":"2005","journal-title":"A Study of Preferences for Sharing and Privacy, CHI '05 Extended Abstracts on Human Factors in Computing Systems"},{"key":"B32","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1145\/642611.642635","article-title":"Unpacking \u201cprivacy\u201d for a networked world,","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"Palen","year":"2003"},{"key":"B33","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1006\/jevp.1999.0140","article-title":"Model for types of privacy by privacy functions","volume":"19","author":"Pedersen","year":"1999","journal-title":"J. Environ. Psychol."},{"key":"B34","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1509\/jppm.19.1.27.16941","article-title":"Privacy concerns and consumer willingness to provide personal information","volume":"19","author":"Phelps","year":"2000","journal-title":"J. Public Policy Mark."},{"key":"B35","unstructured":"PNC Privacy Policy2017"},{"key":"B36","unstructured":"RaoA. Assessing the Impact of Data Practices on User Privacy. Technische Universit at Munchen2018"},{"key":"B37","volume-title":"Replication Data for: Types of Privacy Expectations, V1.","author":"Rao","year":"2020"},{"key":"B38","article-title":"What do they know about me? Contents and concerns of online behavioral profiles,","volume-title":"Proceedings of the Sixth ASE International Conference on Privacy, Security, Risk and Trust","author":"Rao","year":"2014"},{"key":"B39","first-page":"77","article-title":"Expecting the unexpected: understanding mismatched privacy expectations online,","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)","author":"Rao","year":"2016"},{"key":"B40","doi-asserted-by":"publisher","first-page":"1845","DOI":"10.1016\/j.tele.2018.05.012","article-title":"Understanding user privacy expectations: a software developer's perspective","volume":"35","author":"Senarath","year":"2018","journal-title":"Telemat. Inform"},{"key":"B41","doi-asserted-by":"publisher","first-page":"167","DOI":"10.2307\/249477","article-title":"Information privacy: measuring individuals' concerns about organizational practices","volume":"20","author":"Smith","year":"1996","journal-title":"MIS Quarterly"},{"key":"B42","unstructured":"SurveyMonkey Audience2019"},{"key":"B43","unstructured":"Large Commercial Banks2019"},{"key":"B44","unstructured":"FTC Announces Agenda for PrivacyCon 20172019"},{"key":"B45","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1478214","article-title":"Americans reject tailored advertising and three activities that enable it","author":"Turow","year":"2009","journal-title":"SSRN"},{"key":"B46","first-page":"539","article-title":"Examining American and Chinese internet users' contextual privacy preferences of behavioral advertising,","volume-title":"Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing","author":"Wang","year":"2016"},{"key":"B47","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1111\/1540-4560.00072","article-title":"Social and political dimensions of privacy","volume":"59","author":"Westin","year":"2003","journal-title":"J. Soc. Issues"},{"key":"B48","first-page":"499","article-title":"Android permissions remystified: a field study on contextual integrity,","volume-title":"24th USENIX Security Symposium (USENIX Security 2015)","author":"Wijesekera","year":"2015"},{"key":"B49","volume-title":"Cognitive Interviewing: A Tool for Improving Questionnaire Design","author":"Willis","year":"2004"},{"key":"B50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/0092070393211001","article-title":"The nature and determinants of customer expectations of service","volume":"21","author":"Zeithaml","year":"1993","journal-title":"J. Acad. Mark. Sci."}],"container-title":["Frontiers in Big Data"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/article\/10.3389\/fdata.2020.00007\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,28]],"date-time":"2021-02-28T20:48:13Z","timestamp":1614545293000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/article\/10.3389\/fdata.2020.00007\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,25]]},"references-count":50,"alternative-id":["10.3389\/fdata.2020.00007"],"URL":"https:\/\/doi.org\/10.3389\/fdata.2020.00007","relation":{},"ISSN":["2624-909X"],"issn-type":[{"value":"2624-909X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,25]]}}}