{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:08:02Z","timestamp":1725772082166},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/mobhoc.2009.5336935","type":"proceedings-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T18:45:43Z","timestamp":1259088343000},"page":"694-701","source":"Crossref","is-referenced-by-count":3,"title":["Detecting privacy infractions in applications: A framework and methodology"],"prefix":"10.1109","author":[{"given":"Mic","family":"Smit","sequence":"first","affiliation":[]},{"given":"Kelly","family":"Lyons","sequence":"additional","affiliation":[]},{"given":"Michael","family":"McAllister","sequence":"additional","affiliation":[]},{"given":"Jacob","family":"Slonim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/BF01277643"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1086\/223229"},{"journal-title":"Consumers have false sense of security about online privacy actions inconsistent with attitudes","year":"2006","author":"truste","key":"18"},{"year":"0","key":"15"},{"journal-title":"Community attitudes to privacy","year":"2001","key":"16"},{"year":"0","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.1.104"},{"year":"0","key":"11"},{"journal-title":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data","year":"1995","key":"12"},{"year":"2008","key":"3","article-title":"IBM Tivoli Privacy Manager for ebusiness"},{"journal-title":"Privacy in e-Commerce Software","year":"2007","author":"smit","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/IWSM.1993.315293"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.2307\/1321160"},{"journal-title":"Model code for the protection of personal information","year":"1996","key":"10"},{"journal-title":"Threat Modeling","year":"2004","author":"swiderski","key":"7"},{"journal-title":"Writing Secure Code","year":"2002","author":"howard","key":"6"},{"journal-title":"Privacy impact assessment guidelines A framework to manage privacy risks","year":"2002","key":"5"},{"key":"4","article-title":"Business policies and decision making","author":"ziegler","year":"1966","journal-title":"Meredith Publishing Company"},{"year":"0","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1013115.1013129"}],"event":{"name":"2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS)","start":{"date-parts":[[2009,10,12]]},"location":"Macau, China","end":{"date-parts":[[2009,10,15]]}},"container-title":["2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5312767\/5336910\/05336935.pdf?arnumber=5336935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T02:53:25Z","timestamp":1489892005000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5336935\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/mobhoc.2009.5336935","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}