{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:56:49Z","timestamp":1743004609587,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030503086"},{"type":"electronic","value":"9783030503093"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-50309-3_28","type":"book-chapter","created":{"date-parts":[[2020,7,9]],"date-time":"2020-07-09T23:21:31Z","timestamp":1594336891000},"page":"427-444","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Did I Agree to This? Silent Tracking Through Beacons"],"prefix":"10.1007","author":[{"given":"Edden","family":"Kashi","sequence":"first","affiliation":[]},{"given":"Angeliki","family":"Zavou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"key":"28_CR1","unstructured":"BlueCap. https:\/\/apps.apple.com\/us\/app\/bluecap\/id931219725. Accessed 24 Feb 2020"},{"key":"28_CR2","unstructured":"Bluez Project. Official Linux Bluetooth protocol stack. http:\/\/www.bluez.org\/. Accessed 24 Feb 2020"},{"key":"28_CR3","unstructured":"nRF Connect for Mobile. https:\/\/www.nordicsemi.com\/Software-and-tools\/Development-Tools\/nRF-Connect-for-mobile. Accessed 24 Feb 2020"},{"key":"28_CR4","unstructured":"Physical Web App. https:\/\/google.github.io\/physical-web\/. Accessed 24 Feb 2020"},{"key":"28_CR5","unstructured":"PixelBlock. https:\/\/chrome.google.com\/webstore\/detail\/pixelblock\/jmpmfcjnflbcoidlgapblgpgbilinlem. Accessed 24 Feb 2020"},{"key":"28_CR6","unstructured":"Trocker: a tracker blocker. https:\/\/trockerapp.github.io\/. Accessed 24 Feb 2020"},{"key":"28_CR7","unstructured":"Ugly Email. https:\/\/uglyemail.com\/. Accessed 24 Feb 2020"},{"key":"28_CR8","unstructured":"Bridge: PII vs. non-PII data: what the heck is the difference? https:\/\/www.thebridgecorp.com\/pii-vs-non-pii-data\/. Accessed 24 Feb 2020"},{"key":"28_CR9","unstructured":"Cakebread, C.: You\u2019re not alone, no one reads terms of service agreements, November 2017. https:\/\/www.businessinsider.com\/deloitte-study-91-percent-agree-terms-of-service-without-reading-2017-11. Accessed 24 Feb 2020"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Das, A.K., Pathak, P.H., Chuah, C., Mohapatra, P.: Uncovering privacy leakage in BLE network traffic of wearable fitness trackers. In: Proceedings of the 17th International ACM Workshop on Mobile Computing Systems and Applications, (HotMobile), pp. 99\u2013104 (2016)","DOI":"10.1145\/2873587.2873594"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Englehardt, S., Han, J., Narayanan, A.: I never signed up for this! privacy implications of email tracking. In: Proceedings of Privacy Enhancing Technologies (PETS), pp. 109\u2013126 (2018)","DOI":"10.1515\/popets-2018-0006"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Englehardt, S., et al.: Cookies that give you away: the surveillance implications of web tracking. In: Proceedings of the 24th ACM International Conference on World Wide Web (WWW), pp. 289\u2013299 (2015)","DOI":"10.1145\/2736277.2741679"},{"key":"28_CR13","unstructured":"Fawaz, K., Kim, K.H., Shin, K.G.: Protecting privacy of BLE device users. In: Proceedings of 25th USENIX Security Symposium, pp. 1205\u20131221 (2016)"},{"key":"28_CR14","unstructured":"Kashi, E.: User privacy and security research survey (2019). https:\/\/docs.google.com\/forms\/d\/13xPDjB2OOACHn94ZVHz-8KH_6HCRbrXb16lAEiYQJNc\/viewanalytics"},{"key":"28_CR15","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/3374876","volume":"63","author":"K Kirkpatrick","year":"2020","unstructured":"Kirkpatrick, K.: Tracking shoppers. ACM Commun. 63, 19\u201321 (2020). https:\/\/doi.org\/10.1145\/3374876","journal-title":"ACM Commun."},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Kolias, C., Copi, L., Zhang, F., Stavrou, A.: Breaking BLE beacons for fun but mostly profit. In: Proceedings of the 10th European Workshop on Systems Security (EuroSec), pp. 1\u20136 (2017)","DOI":"10.1145\/3065913.3065923"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Korolova, A., Sharma, V.: Cross-app tracking via nearby bluetooth low energy devices. In: Proceedings of the 8th ACM Conference on Data and Application Security and Privacy, CODASPY, pp. 43\u201352 (2018)","DOI":"10.1145\/3176258.3176313"},{"key":"28_CR18","unstructured":"Mailchimp: about geolocation. https:\/\/mailchimp.com\/help\/about-geolocation\/"},{"key":"28_CR19","unstructured":"Naik, B.I.I.: Tracking user activities using web bugs (2013). https:\/\/resources.infosecinstitute.com\/tracking-user-activities-using-web-bugs\/"},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Nikiforakis, N., et al.: Cookieless monster: exploring the ecosystem of web-based device fingerprinting. In: 2013 IEEE Symposium on Security and Privacy, S&P 2013, Berkeley, CA, USA, 19\u201322 May 2013, pp. 541\u2013555. IEEE Computer Society (2013). https:\/\/doi.org\/10.1109\/SP.2013.43","DOI":"10.1109\/SP.2013.43"},{"key":"28_CR21","unstructured":"Roesner, F., Kohno, T., Wetherall, D.: Detecting and defending against third-party tracking on the web. In: Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI), pp. 155\u2013168 (2012)"},{"key":"28_CR22","doi-asserted-by":"crossref","unstructured":"Ruohonen, J., Lepp\u00e1nen, V.: Invisible pixels are dead, long live invisible pixels! In: Proceedings of the 2018 Workshop on Privacy in the Electronic Society (WPES@CCS), pp. 28\u201332 (2018)","DOI":"10.1145\/3267323.3268950"},{"key":"28_CR23","unstructured":"Schlesigner, J., Day, A.: Most people just click and accept privacy policies without reading them\u2013you might be surprised at what they allow companies to do, March 2019. https:\/\/www.cnbc.com\/2019\/02\/07\/privacy-policies-give-companies-lots-of-room-to-collect-share-data.html"},{"key":"28_CR24","unstructured":"Shanhong, L.: Global market share held by the leading web browser versions as of November 2019, December 2019. https:\/\/www.statista.com\/statistics\/268299\/most-popular-internet-browsers\/"},{"key":"28_CR25","unstructured":"Sonicare, P.: Philips sonicare privacy notice, July 2019. https:\/\/www.usa.philips.com\/a-w\/mobile-privacy-notice\/sonicare-connected-app-gdpr.html"},{"key":"28_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3127519","volume":"18","author":"R Zaeem","year":"2018","unstructured":"Zaeem, R., German, R., Barber, S.: Privacycheck: automatic summarization of privacy policies using data mining. ACM Trans. Internet Technol. 18, 1\u201318 (2018)","journal-title":"ACM Trans. Internet Technol."}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50309-3_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:35:33Z","timestamp":1720571733000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-50309-3_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030503086","9783030503093"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50309-3_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2020.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}