{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:16:43Z","timestamp":1743121003061,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031800191"},{"type":"electronic","value":"9783031800207"}],"license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-80020-7_16","type":"book-chapter","created":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T07:30:44Z","timestamp":1734161444000},"page":"289-309","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Web Privacy Perceptions Amongst Indian Users"],"prefix":"10.1007","author":[{"given":"Gayatri","family":"Priyadarsini","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anshika","family":"Saxena","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aditi","family":"Dey","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"family":"Prakriti","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Abhishek","family":"Bichhawat","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,12,15]]},"reference":[{"key":"16_CR1","unstructured":"Amazon: Amazon mechanical turk. https:\/\/www.mturk.com\/"},{"key":"16_CR2","unstructured":"Bielova, N., Litvine, L., Nguyen, A., Chammat, M., Toubiana, V., Harry, E.: The effect of design patterns on (present and future) cookie consent decisions. In: USENIX Security Symposium (2024)"},{"key":"16_CR3","unstructured":"Bollinger, D., Kubicek, K., Cotrini, C., Basin, D.: Automating cookie consent and GDPR violation detection. In: 31st USENIX Security Symposium (USENIX Security 2022), Boston, pp. 2893\u20132910 (2022)"},{"key":"16_CR4","unstructured":"Bouhoula, A., Kubicek, K., Zac, A., Cotrini, C., Basin, D.: Automated large-scale analysis of cookie notice compliance. In: 33st USENIX Security Symposium (USENIX Security 2024). USENIX Association, Philadelphia (2024)"},{"key":"16_CR5","unstructured":"Brazilian National Data Protection Authority: Brazilian general data protection law (LGPD) (2020). https:\/\/iapp.org\/resources\/article\/brazilian-data-protection-law-lgpd-english-translation\/"},{"key":"16_CR6","unstructured":"California State Legislature: California consumer privacy act of 2018 (2018). https:\/\/oag.ca.gov\/privacy\/ccpa"},{"key":"16_CR7","unstructured":"Data Security Council of India: India cybersecurity domestic market 2023 report.pdf (2023). https:\/\/www.dsci.in\/files\/content\/knowledge-centre\/2023\/IndiaCybersecurity_\/DomesticMarket_\/2023_\/Report.pdf"},{"key":"16_CR8","unstructured":"DataReportal: Digital 2024: Global overview report - datareportal - global digital insights. https:\/\/datareportal.com\/reports\/digital-2024-global-overview-report"},{"issue":"6","key":"16_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3469845","volume":"28","author":"V Distler","year":"2021","unstructured":"Distler, V., et al.: A systematic literature review of empirical methods and risk representation in usable privacy and security research. ACM Trans. Comput.-Hum. Interact. (TOCHI) 28(6), 1\u201350 (2021)","journal-title":"ACM Trans. Comput.-Hum. Interact. (TOCHI)"},{"key":"16_CR10","unstructured":"Ministry\u00a0of Electronics & Information\u00a0Technology, G.o.I.: The digital personal data protection bill, 2022. Digital Personal Data Protection Act, 2022 (2022). https:\/\/www.meity.gov.in\/content\/digital-personal-data-protection-bill-2022"},{"key":"16_CR11","unstructured":"European Parliament, Council of the European Union: Regulation (EU) 2016\/679 of the European Parliament and of the Council (2016). https:\/\/data.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"16_CR12","unstructured":"Farke, F.M., Balash, D.G., Golla, M., D\u00fcrmuth, M., Aviv, A.J.: Are privacy dashboards good for end users? Evaluating user perceptions and reactions to Google\u2019s my activity. In: 30th USENIX Security Symposium, pp. 483\u2013500 (2021)"},{"key":"16_CR13","unstructured":"Gayatri-Priyadarsini: Web-privacy-perceptions-amongst-Indian-users. https:\/\/github.com\/Gayatri-Priyadarsini\/Web-Privacy-Perceptions-Amongst-Indian-Users"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Gray, C.M., Santos, C., Bielova, N., Toth, M., Clifford, D.: Dark patterns and the legal requirements of consent banners: an interaction criticism perspective. In: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, pp. 1\u201318 (2021)","DOI":"10.1145\/3411764.3445779"},{"key":"16_CR15","unstructured":"Hossain, M.J.: User privacy & security in internet: a concern for Bangladesh. Ph.D. thesis, Noakhali Science and Technology University (2022)"},{"key":"16_CR16","unstructured":"IFF: IFF\u2019s cybersecurity report for the first quarter of 2024#plugthebreach (2024). https:\/\/internetfreedom.in\/cybersec-report-q1-2024\/"},{"key":"16_CR17","unstructured":"Indian_Parliament: it_act_2000_updated.pdf. https:\/\/www.indiacode.nic.in\/bitstream\/123456789\/13116\/1\/it_act_2000_updated.pdf. Accessed 24 May 2024"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Ingole, C.U., Bandela, M., Tanna, D., Solanki, S.K., Dhotre, P., Patil, R.: Privacy awareness and online behavior of Indian users: an analytical study (2023)","DOI":"10.21203\/rs.3.rs-2985096\/v1"},{"key":"16_CR19","doi-asserted-by":"publisher","unstructured":"Kaushik, S., Sharma, T., Yu, Y., Ali, A.F., Wang, Y., Zou, Y.: Cross-country examination of people\u2019s experience with targeted advertising on social media. In: Extended Abstracts of the 2024 CHI Conference on Human Factors in Computing Systems, CHI EA 2024 (2024). https:\/\/doi.org\/10.1145\/3613905.3650780","DOI":"10.1145\/3613905.3650780"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Kumaraguru, P., Sachdeva, N.: Privacy in India: attitudes and awareness v 2.0. Available at SSRN 2188749 (2012)","DOI":"10.2139\/ssrn.2188749"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Matte, C., Bielova, N., Santos, C.: Do cookie banners respect my choice? Measuring legal compliance of banners from IAB Europe\u2019s transparency and consent framework. In: 2020 IEEE Symposium on Security and Privacy (SP), vol.\u00a01, pp. 791\u2013809 (2020)","DOI":"10.1109\/SP40000.2020.00076"},{"key":"16_CR22","unstructured":"Mayer, P., Zou, Y., Schaub, F., Aviv, A.J.: \u201cnow i\u2019m a bit angry:\u201d individuals\u2019 awareness, perception, and responses to data breaches that affected them. In: 30th USENIX Security Symposium (USENIX Security 2021), pp. 393\u2013410. USENIX Association (2021)"},{"key":"16_CR23","doi-asserted-by":"publisher","unstructured":"Mustafa, M., Asad, A.M., Hassan, S., Haider, U., Durrani, Z., Krombholz, K.: Pakistani teens and privacy - how gender disparities, religion and family values impact the privacy design space. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, pp. 195\u2013209 (2023). https:\/\/doi.org\/10.1145\/3576915.3623087","DOI":"10.1145\/3576915.3623087"},{"key":"16_CR24","unstructured":"Prolific: Prolific $$|$$ quickly find research participants you can trust. https:\/\/www.prolific.com\/"},{"key":"16_CR25","doi-asserted-by":"publisher","unstructured":"Sharma, T., Kaushik, S., Yu, Y., Ahmed, S.I., Wang, Y.: User perceptions and experiences of targeted ads on social media platforms: Learning from Bangladesh and India. In: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023 (2023). https:\/\/doi.org\/10.1145\/3544548.3581498","DOI":"10.1145\/3544548.3581498"},{"key":"16_CR26","doi-asserted-by":"publisher","unstructured":"Singh, A.K., Upadhyaya, N., Seth, A., Hu, X., Sastry, N., Mondal, M.: What cookie consent notices do users prefer: a study in the wild. In: Proceedings of the 2022 European Symposium on Usable Security, EuroUSEC 2022, pp. 28\u201339 (2022). https:\/\/doi.org\/10.1145\/3549015.3555675","DOI":"10.1145\/3549015.3555675"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Srivastava, A., Geethakumari, G.: Measuring privacy leaks in online social networks. In: 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2095\u20132100. IEEE (2013)","DOI":"10.1109\/ICACCI.2013.6637504"},{"key":"16_CR28","unstructured":"Statsindia: Internet usage in india - statistics & facts $$|$$ statista. https:\/\/www.statista.com\/topics\/2157\/internet-usage-in-india\/#topicOverview"},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Toth, M., Bielova, N., Roca, V.: On dark patterns and manipulation of website publishers by CMPs. In: PETS 2022-22nd Privacy Enhancing Technologies Symposium (2022)","DOI":"10.56553\/popets-2022-0082"},{"key":"16_CR30","unstructured":"Hunt, T., Charlotte\u00a0Hunt, S.S.: Have i been pwned: check if your email has been compromised in a data breach. https:\/\/haveibeenpwned.com\/"},{"key":"16_CR31","doi-asserted-by":"crossref","unstructured":"Wei, M., Emami-Naeini, P., Roesner, F., Kohno, T.: Skilled or gulliblef gender stereotypes related to computer security and privacy. In: 2023 IEEE Symposium on Security and Privacy (SP), pp. 2050\u20132067. IEEE (2023)","DOI":"10.1109\/SP46215.2023.10179469"},{"key":"16_CR32","unstructured":"Wire, T.: The wire news India (2023). https:\/\/thewire.in\/government\/india-data-leak-breach-lok-sabha"},{"key":"16_CR33","doi-asserted-by":"publisher","unstructured":"Zhang, M., Meng, W., Zhou, Y., Ren, K.: CSChecker: revisiting GDPR and CCPA compliance of cookie banners on the web. In: Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering, ICSE 2024 (2024).https:\/\/doi.org\/10.1145\/3597503.3639159","DOI":"10.1145\/3597503.3639159"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-80020-7_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T08:05:43Z","timestamp":1734163543000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-80020-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"ISBN":["9783031800191","9783031800207"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-80020-7_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,15]]},"assertion":[{"value":"15 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jaipur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iciss.isrdc.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}