{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:43:46Z","timestamp":1743083026895,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030856090"},{"type":"electronic","value":"9783030856106"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-85610-6_43","type":"book-chapter","created":{"date-parts":[[2021,8,25]],"date-time":"2021-08-25T06:03:15Z","timestamp":1629871395000},"page":"732-741","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Visuals Triumph in a Curious Case of Privacy Policy"],"prefix":"10.1007","author":[{"given":"Shree","family":"Nivas","sequence":"first","affiliation":[]},{"given":"C. J.","family":"Gokul","sequence":"additional","affiliation":[]},{"given":"Vijayanand","family":"Banahatti","sequence":"additional","affiliation":[]},{"given":"Sachin","family":"Lodha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,26]]},"reference":[{"unstructured":"Smith, A.: Half of online Americans don\u2019t know what a privacy policy is; Pew Research Center. http:\/\/www.pewresearch.org\/fact-tank\/2014\/12\/04\/half-of-americans-dont-know-what-a-privacy-policy-is\/. Accessed Feb 2021","key":"43_CR1"},{"doi-asserted-by":"crossref","unstructured":"Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision-making. Secur. Privacy Mag. IEEE 3, 1 (2005)","key":"43_CR2","DOI":"10.1109\/MSP.2005.22"},{"doi-asserted-by":"crossref","unstructured":"Mc Donald, A.M., Reeder, R.W., Kelley, P.G., Cranor, L.F.: A comparative study of online privacy policies and formats. In: Proceedings of 2009 Workshop on Privacy Enhancing Technologies. ACM (2009)","key":"43_CR3","DOI":"10.1007\/978-3-642-03168-7_3"},{"doi-asserted-by":"crossref","unstructured":"Joshi, A., Kale, S., Chandel, S., Pal, D. K.: Likert scale: explored and explained. Br. J. Appl. Sci. Technol. 7(4), 396\u2013403 (2015)","key":"43_CR4","DOI":"10.9734\/BJAST\/2015\/14975"},{"unstructured":"Raskin, A.: Is creative commons for privacy possible? (2010). http:\/\/www.azarask.in\/blog\/post\/is-a-creative-commons-for-privacy-possible\/. Accessed Jan 2021","key":"43_CR5"},{"unstructured":"Raskin, A.: Privacy Icons: Alpha release (2010).http:\/\/www.azarask.in\/blog\/post\/privacy-icons\/. Accessed Jan 2021","key":"43_CR6"},{"doi-asserted-by":"crossref","unstructured":"Beheshti, M., Taspolat, A., Kaya, S.O., Sapanca, F.H.: Characteristics of instructional videos. World J. Educ. Technol. Curr. Issues 10(1), 061\u2013069 (2018)","key":"43_CR7","DOI":"10.18844\/wjet.v10i1.3186"},{"unstructured":"Bendrath, R.: Icons of privacy, May 2007.http:\/\/bendrath.blogspot.com\/2007\/05\/icons-of-privacy.html","key":"43_CR8"},{"unstructured":"Betrancourt, M., Tversky, B.: Simple animations for organizing diagrams. Int. J. Hum. Comput. Stud. (in press)","key":"43_CR9"},{"doi-asserted-by":"crossref","unstructured":"Jensen, C., Potts, C.: Privacy policies as decision making tools: an evaluation of online privacy notices. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Vienna, Austria (2004)","key":"43_CR10","DOI":"10.1145\/985692.985752"},{"unstructured":"Cisco Visual Networking Index: Forecasts and Trends (2017\u20132022). DocID:1543280537836565, https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/white-paper-c11-741490.html","key":"43_CR11"},{"unstructured":"eMarketedu: The Power of Internet and Online in India. https:\/\/www.emarketeducation.in\/power-internet-penetration-online-india\/. Accessed Feb 2021","key":"43_CR12"},{"unstructured":"Florian Schaub: Article-nobody reads privacy policies-here\u2019s is how to fix that. https:\/\/theconversation.com\/nobody-reads-privacy-policies-heres-how-to-fix-that-81932. Accessed Jan 2021","key":"43_CR13"},{"doi-asserted-by":"crossref","unstructured":"van der Meij, H., van der Meij, J.: Eight guidelines for the design of instructional videos for software training (2013)","key":"43_CR14","DOI":"10.1111\/jcal.12082"},{"unstructured":"Helen, F.: Nissenbaum. Privacy as contextual integrity (2004). https:\/\/www.andrew.cmu.edu\/user\/danupam\/bdmn-oakland06.pdf","key":"43_CR15"},{"key":"43_CR16","volume-title":"Psychometric Theory","author":"J Nunnally","year":"1978","unstructured":"Nunnally, J.: Psychometric Theory. McGraw-Hill, New York (1978)"},{"doi-asserted-by":"crossref","unstructured":"Smith, J., Milberg, S., Burke, S.: Information privacy: measuring individuals\u2019 concerns about organizational practices. MIS Q. 20 (1996)","key":"43_CR17","DOI":"10.2307\/249477"},{"doi-asserted-by":"crossref","unstructured":"Obar, J.A., Oeldorf-Hirsch, A.: The biggest lie on the internet: ignoring the privacy policies and terms of service policies of social networking services. York University, Quello Center, Michigan State University, 7 July 2016","key":"43_CR18","DOI":"10.2139\/ssrn.2757465"},{"unstructured":"Kawulich, B.B.: Participant observation as a data collection method. Forum: Qual. Soc. Res. 6(2) (2005)","key":"43_CR19"},{"doi-asserted-by":"crossref","unstructured":"Cranor, L., Reagle, J., Ackerman, M.: Beyond concern: understanding net users\u2019 attitudes about online privacy. In: Vogelsang, I., Compaine, B.M. (eds.) The Internet Upheaval: Raising Questions, Seeking Answers in Communications Policy. MIT Press, Cambridge (2000)","key":"43_CR20","DOI":"10.7551\/mitpress\/3874.003.0008"},{"unstructured":"Cranor, L.F.: Necessary but not sufficient: standardized mechanisams for privacy notice and choice. J. Telecommun. High. Technol. Law 10, 273 (2012)","key":"43_CR21"},{"unstructured":"McDonald, A.M., Cranor, L.F.: The cost of reading privacy policies. ISJLP 4, 543 (2008)","key":"43_CR22"},{"doi-asserted-by":"crossref","unstructured":"Kelley, P.G., Bresee, J., Cranor, L.F., Reeder, R.W.: A \u201cnutrition label\u201d for privacy. In: Proceedings of the 2009 Symposium on Usable Privacy and Security (SOUPS) (2009)","key":"43_CR23","DOI":"10.1145\/1572532.1572538"},{"unstructured":"Lanner, Pr.: Previewing online terms and conditions: CommonTerms alpha proposal (2012). http:\/\/commonterms.net\/commontermsalphaproposal.pdf","key":"43_CR24"},{"doi-asserted-by":"crossref","unstructured":"Reeder, R.W., Kelley, P.G. McDonald, A.M., Cranor, L.F.: A user study of the expandable grid applied to P3P privacy policy visualization. In: WPES 2008: Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, pp. 45\u201354. ACM (2008)","key":"43_CR25","DOI":"10.1145\/1456403.1456413"},{"doi-asserted-by":"publisher","unstructured":"Reidenberg, J.R., Bhatia, J., Breaux, T., Norton, T.: Ambiguity in privacy policies and the impact of regulation (March 22, 2016). J. Legal Stud. Forthcoming; Fordham Law Legal Studies Research Paper No. 2715164. SSRN: https:\/\/ssrn.com\/abstract=2715164 or https:\/\/doi.org\/10.2139\/ssrn.2715164","key":"43_CR26","DOI":"10.2139\/ssrn.2715164"},{"unstructured":"Sobers, R.: Compliance & regulation. The Average Reading Level of a Privacy Policy.https:\/\/www.varonis.com\/blog\/gdpr-privacy-policy\/. Accessed Feb 2021","key":"43_CR27"},{"doi-asserted-by":"crossref","unstructured":"Vila, T., Greenstadt, R., Molnar, D.: Why we cannot be bothered to read privacy policies: models of privacy economics as a lemons market. In: ACM International Conference Proceeding Series 5 (2003)","key":"43_CR28","DOI":"10.1145\/948005.948057"},{"unstructured":"Waldman, A.: Ezra, privacy, notice, and design. Stanford Technol. Law Rev. 47 (2018). https:\/\/law.stanford.edu\/wp-content\/uploads\/2018\/03\/Waldman_Final_031418.pdf. Accessed Feb 2021","key":"43_CR29"},{"doi-asserted-by":"crossref","unstructured":"Shvartzshnaider, Y., Apthorpe, N., Feamster, N., Nissenbaum, H.: Analyzing privacy policies using contextual integrity annotations. arXiv preprint arXiv:1809.02236 (2018)","key":"43_CR30","DOI":"10.2139\/ssrn.3244876"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-85610-6_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:54:45Z","timestamp":1725688485000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-85610-6_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030856090","9783030856106"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-85610-6_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"26 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTERACT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"interact2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.interact2021.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"680","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"105","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}