{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T15:13:26Z","timestamp":1772032406934,"version":"3.50.1"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030582005","type":"print"},{"value":"9783030582012","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58201-2_9","type":"book-chapter","created":{"date-parts":[[2020,9,13]],"date-time":"2020-09-13T23:02:29Z","timestamp":1600038149000},"page":"124-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Privacy CURE: Consent Comprehension Made Easy"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6551-6567","authenticated-orcid":false,"given":"Olha","family":"Drozd","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6955-7718","authenticated-orcid":false,"given":"Sabrina","family":"Kirrane","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,14]]},"reference":[{"issue":"4","key":"9_CR1","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MSP.2013.86","volume":"11","author":"A Acquisti","year":"2013","unstructured":"Acquisti, A., Adjerid, I., Brandimarte, L.: Gone in 15 seconds: the limits of privacy transparency and control. IEEE Secur. Priv. 11(4), 72\u201374 (2013)","journal-title":"IEEE Secur. Priv."},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Angulo, J., Fischer-H\u00fcbner, S., Pulls, T., W\u00e4stlund, E.: Usable transparency with the data track: a tool for visualizing data disclosures. In: Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, pp. 1803\u20131808. ACM (2015)","DOI":"10.1145\/2702613.2732701"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"e18","DOI":"10.1016\/j.ijmedinf.2008.12.004","volume":"79","author":"JC Bastien","year":"2010","unstructured":"Bastien, J.C.: Usability testing: a review of some methodological and technical aspects of the method. Int. J. Med. Inform. 79, e18\u2013e23 (2010)","journal-title":"Int. J. Med. Inform."},{"issue":"8\u201312","key":"9_CR4","first-page":"57","volume":"2003","author":"J Benedek","year":"2002","unstructured":"Benedek, J., Miner, T.: Measuring desirability: new methods for evaluating desirability in a usability lab setting. Proc. Usability Prof. Assoc. 2003(8\u201312), 57 (2002)","journal-title":"Proc. Usability Prof. Assoc."},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-319-44760-5_9","volume-title":"Privacy Technologies and Policy","author":"C Bier","year":"2016","unstructured":"Bier, C., K\u00fchne, K., Beyerer, J.: PrivacyInsight: the next generation privacy dashboard. In: Schiffner, S., Serna, J., Ikonomou, D., Rannenberg, K. (eds.) APF 2016. LNCS, vol. 9857, pp. 135\u2013152. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-44760-5_9"},{"issue":"2","key":"9_CR6","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/MSP.2015.34","volume":"13","author":"FZ Borgesius","year":"2015","unstructured":"Borgesius, F.Z.: Informed consent: we can do better to defend privacy. IEEE Secur. Priv. 13(2), 103\u2013107 (2015)","journal-title":"IEEE Secur. Priv."},{"key":"9_CR7","first-page":"3","volume-title":"Handbook of Research Methods in Social and Personality Psychology","author":"MB Brewer","year":"2000","unstructured":"Brewer, M.B., Crano, W.D.: Research design and issues of validity. In: Reis, H.T., Judd, C.M. (eds.) Handbook of Research Methods in Social and Personality Psychology, pp. 3\u201316. Cambridge University Press, Cambridge (2000)"},{"issue":"2","key":"9_CR8","doi-asserted-by":"publisher","first-page":"68","DOI":"10.26522\/brocked.v12i2.38","volume":"12","author":"E Charters","year":"2003","unstructured":"Charters, E.: The use of think-aloud methods in qualitative research: an introduction to think-aloud methods. Brock Educ. J. 12(2), 68\u201382 (2003)","journal-title":"Brock Educ. J."},{"key":"9_CR9","series-title":"Integrated Series in Information Systems","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-0-387-36060-7_1","volume-title":"Information Systems Action Research","author":"P Checkland","year":"2007","unstructured":"Checkland, P., Holwell, S.: Action research. In: Kock, N. (ed.) Information Systems Action Research. Integrated Series in Information Systems, vol. 13, pp. 3\u201317. Springer, Boston (2007). https:\/\/doi.org\/10.1007\/978-0-387-36060-7_1"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Costante, E., Sun, Y., Petkovi\u0107, M., den Hartog, J.: A machine learning solution to assess privacy policy completeness: (short paper). In: Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, pp. 91\u201396. ACM (2012)","DOI":"10.1145\/2381966.2381979"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-030-27813-7_2","volume-title":"Trust, Privacy and Security in Digital Business","author":"O Drozd","year":"2019","unstructured":"Drozd, O., Kirrane, S.: I agree: customize your personal data processing with the core user interface. In: Gritzalis, S., Weippl, E.R., Katsikas, S.K., Anderst-Kotsis, G., Tjoa, A.M., Khalil, I. (eds.) TrustBus 2019. LNCS, vol. 11711, pp. 17\u201332. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-27813-7_2"},{"key":"9_CR12","unstructured":"Friedman, B., Howe, D.C., Felten, E.: Informed consent in the mozilla browser: implementing value-sensitive design. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences, p. 10. IEEE (2002)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Hartson, H.R., Castillo, J.C., Kelso, J., Neale, W.C.: Remote evaluation: the network as an extension of the usability laboratory. In: Proceedings of the SIGCHI. ACM (1996)","DOI":"10.1145\/238386.238511"},{"issue":"4","key":"9_CR14","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1145\/503112.503114","volume":"33","author":"MY Ivory","year":"2001","unstructured":"Ivory, M.Y., Hearst, M.A.: The state of the art in automating usability evaluation of user interfaces. ACM Comput. Surv. (CSUR) 33(4), 470\u2013516 (2001)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Kelley, P.G., Bresee, J., Cranor, L.F., Reeder, R.W.: A nutrition label for privacy. In: Proceedings of the 5th Symposium on Usable Privacy and Security, p. 4. ACM (2009)","DOI":"10.1145\/1572532.1572538"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-319-98192-5_25","volume-title":"The Semantic Web: ESWC 2018 Satellite Events","author":"S Kirrane","year":"2018","unstructured":"Kirrane, S., et al.: A scalable consent, transparency and compliance architecture. In: Gangemi, A., et al. (eds.) ESWC 2018. LNCS, vol. 11155, pp. 131\u2013136. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98192-5_25"},{"key":"9_CR17","unstructured":"Kumar, P.: Privacy policies and their lack of clear disclosure regarding the life cycle of user information. In: 2016 AAAI Fall Symposium Series (2016)"},{"issue":"2","key":"9_CR18","first-page":"1","volume":"5","author":"I Liccardi","year":"2014","unstructured":"Liccardi, I., Pato, J., Weitzner, D.J.: Improving mobile app selection through transparency and better permission analysis. J. Priv. Confid. 5(2), 1\u201355 (2014)","journal-title":"J. Priv. Confid."},{"key":"9_CR19","unstructured":"MacKenzie, I.S.: User studies and usability evaluations: from research to products. In: Proceedings of the 41st Graphics Interface Conference, pp. 1\u20138. CIPS (2015)"},{"key":"9_CR20","first-page":"543","volume":"4","author":"AM McDonald","year":"2008","unstructured":"McDonald, A.M., Cranor, L.F.: The cost of reading privacy policies. ISJLP 4, 543 (2008)","journal-title":"ISJLP"},{"key":"9_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-03168-7_3","volume-title":"Privacy Enhancing Technologies","author":"AM McDonald","year":"2009","unstructured":"McDonald, A.M., Reeder, R.W., Kelley, P.G., Cranor, L.F.: A comparative study of online privacy policies and formats. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 37\u201355. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03168-7_3"},{"key":"9_CR22","unstructured":"Mont, M.C., Sharma, V., Pearson, S.: Encore: dynamic consent, policy enforcement and accountable information sharing within and across organisations. Technical report, HP Laboratories HPL-2012-36 (2012)"},{"issue":"3","key":"9_CR23","first-page":"45","volume":"24","author":"K Peffers","year":"2007","unstructured":"Peffers, K., Tuunanen, T., Rothenberger, M.A., Chatterjee, S.: A design science research methodology for information systems research. JMIS 24(3), 45\u201377 (2007)","journal-title":"JMIS"},{"key":"9_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-030-27813-7_6","volume-title":"Trust, Privacy and Security in Digital Business","author":"L Piras","year":"2019","unstructured":"Piras, L., et al.: Defend architecture: a privacy by design platform for GDPR compliance. In: Gritzalis, S., et al. (eds.) TrustBus 2019. LNCS, vol. 11711, pp. 78\u201393. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-27813-7_6"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Railean, A., Reinhardt, D.: Let there be lite: design and evaluation of a label for IoT transparency enhancement. In: Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct, pp. 103\u2013110. ACM (2018)","DOI":"10.1145\/3236112.3236126"},{"key":"9_CR26","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-319-92925-5_14","volume-title":"Privacy and Identity Management. The Smart Revolution","author":"P Raschke","year":"2018","unstructured":"Raschke, P., K\u00fcpper, A., Drozd, O., Kirrane, S.: Designing a GDPR-compliant and usable privacy dashboard. In: Hansen, M., Kosta, E., Nai-Fovino, I., Fischer-H\u00fcbner, S. (eds.) Privacy and Identity 2017. IAICT, vol. 526, pp. 221\u2013236. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-92925-5_14"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Reeder, R.W., et al.: Expandable grids for visualizing and authoring computer security policies. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1473\u20131482. ACM (2008)","DOI":"10.1145\/1357054.1357285"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Schaub, F., Balebako, R., Durity, A.L., Cranor, L.F.: A design space for effective privacy notices. In: Eleventh Symposium on Usable Privacy and Security, pp. 1\u201317 (2015)","DOI":"10.1109\/MIC.2017.265102930"},{"key":"9_CR29","volume-title":"Interviewing as Qualitative Research: A Guide for Researchers in Education and the Social Sciences","author":"I Seidman","year":"2013","unstructured":"Seidman, I.: Interviewing as Qualitative Research: A Guide for Researchers in Education and the Social Sciences. Teachers College Press, New York (2013)"},{"issue":"9","key":"9_CR30","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1038\/ejhg.2012.282","volume":"21","author":"KS Steinsbekk","year":"2013","unstructured":"Steinsbekk, K.S., Myskja, B.K., Solberg, B.: Broad consent versus dynamic consent in biobank research: is passive participation an ethical problem? EJHG 21(9), 897 (2013)","journal-title":"EJHG"},{"key":"9_CR31","volume-title":"Designing Interfaces: Patterns for Effective Interaction Design","author":"J Tidwell","year":"2010","unstructured":"Tidwell, J.: Designing Interfaces: Patterns for Effective Interaction Design. O\u2019Reilly Media, Inc., Sebastopol (2010)"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Utz, C., Degeling, M., Fahl, S., Schaub, F., Holz, T.: (Un)informed consent: studying GDPR consent notices in the field. arXiv preprint arXiv:1909.02638 (2019)","DOI":"10.1145\/3319535.3354212"},{"key":"9_CR33","unstructured":"Van Someren, M., Barnard, Y., Sandberg, J.: The Think Aloud Method: A Practical Approach to Modelling Cognitive Processes. Academic Press, London (1994)"},{"key":"9_CR34","unstructured":"Weitzner, D.J., et al.: Transparent accountable data mining: new strategies for privacy protection (2006)"},{"key":"9_CR35","doi-asserted-by":"crossref","unstructured":"Wijesekera, P., et al.: The feasibility of dynamically granted permissions: aligning mobile privacy with user preferences. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 1077\u20131093. IEEE (2017)","DOI":"10.1109\/SP.2017.51"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58201-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T00:06:10Z","timestamp":1726272370000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58201-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030582005","9783030582012"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58201-2_9","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Maribor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sec2020.um.si\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"149","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.88","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.14","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}