{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T22:41:07Z","timestamp":1760740867179,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819534555"},{"type":"electronic","value":"9789819534562"}],"license":[{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3456-2_32","type":"book-chapter","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T07:24:49Z","timestamp":1760599489000},"page":"461-469","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Large-Scale Analysis of\u00a0Privacy Labels in\u00a0Child-Accessible Mobile Applications"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-8162-1982","authenticated-orcid":false,"given":"Fengqi","family":"Yu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5446-3081","authenticated-orcid":false,"given":"Fuman","family":"Xie","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8248-3362","authenticated-orcid":false,"given":"Naipeng","family":"Dong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6390-9890","authenticated-orcid":false,"given":"Guangdong","family":"Bai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,17]]},"reference":[{"key":"32_CR1","unstructured":"Apple: app privacy details on the app store (2025). https:\/\/developer.apple.com\/app-store\/app-privacy-details\/"},{"key":"32_CR2","unstructured":"Apple Inc.: privacy control. https:\/\/www.apple.com\/au\/privacy\/control\/ (2025)"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Chen, B., Lyu, J., Wu, T., Baruwal\u00a0Chhetri, M., Bai, G.: Semantics-aware cookie purpose compliance. In: Proceedings of the ACM on Web Conference 2025, pp. 1602\u20131613 (2025)","DOI":"10.1145\/3696410.3714746"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Chen, B., Wu, T., Zhang, Y., Chhetri, M.B., Bai, G.: Investigating users\u2019 understanding of privacy policies of virtual personal assistant applications. In: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security (ASIA CCS) (2023)","DOI":"10.1145\/3579856.3590335"},{"key":"32_CR5","unstructured":"European Parliament and Council: Regulation (EU) 2016\/679 of the european parliament and of the council of 27 april 2016 \u2013 general data protection regulation (GDPR). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj (2016), official Journal of the European Union, L 119, 4 May 2016, pp. 1\u201388"},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Feal, \u00c1., Calciati, P., Vallina-Rodriguez, N., Troncoso, C., Gorla, A.: Angel or devil? a privacy study of mobile parental control apps. Proceedings on Privacy Enhancing Technologies (2020)","DOI":"10.2478\/popets-2020-0029"},{"key":"32_CR7","unstructured":"Khandelwal, R., et\u00a0al.: Unpacking privacy labels: A measurement and developer perspective on google\u2019s data safety section. In: 33rd USENIX Security Symposium (USENIX Security 24), pp. 2831\u20132848 (2024)"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Mahadewa, K., et al.: Identifying privacy weaknesses from multi-party trigger-action integration platforms. In: Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 2\u201315 (2021)","DOI":"10.1145\/3460319.3464838"},{"key":"32_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2021.106170","volume":"129","author":"I Milkaite","year":"2021","unstructured":"Milkaite, I., Wolf, R., Lievens, E., Leyn, T., Martens, M.: Children\u2019s reflections on privacy and the protection of their personal data: a child-centric approach to data protection information formats. Child Youth Serv. Rev. 129, 106170 (2021)","journal-title":"Child Youth Serv. Rev."},{"issue":"11","key":"32_CR10","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1136\/archdischild-2023-325960","volume":"108","author":"J Pimienta","year":"2023","unstructured":"Pimienta, J., et al.: Mobile apps and children\u2019s privacy: a traffic analysis of data sharing practices among children\u2019s mobile IOS apps. Arch. Dis. Child. 108(11), 943\u2013945 (2023)","journal-title":"Arch. Dis. Child."},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Sun, R., Xue, M., Tyson, G., Wang, S., Camtepe, S., Nepal, S.: Not seen, not heard in the digital world! measuring privacy practices in children\u2019s apps. In: Proceedings of the ACM Web Conference 2023, pp. 2166\u20132177 (2023)","DOI":"10.1145\/3543507.3583327"},{"key":"32_CR12","unstructured":"U.S. Congress: children\u2019s online privacy protection act of 1998. https:\/\/www.ftc.gov\/legal-library\/browse\/rules\/childrens-online-privacy-protection-rule-coppa (1998), codified at 15 U.S.C. \u00a7\u00a76501\u20136506"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Xie, F., et al.: Scrutinizing privacy policy compliance of virtual personal assistant apps. In: 37th IEEE\/ACM International Conference on Automated Software Engineering (ASE) (2022)","DOI":"10.1145\/3551349.3560416"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Yan, C., Xie, F., Meng, M.H., Zhang, Y., Bai, G.: On the quality of privacy policy documents of virtual personal assistant applications. Proceedings on Privacy Enhancing Technologies (2024)","DOI":"10.56553\/popets-2024-0028"},{"issue":"1","key":"32_CR15","first-page":"1","volume":"12","author":"RN Zaeem","year":"2020","unstructured":"Zaeem, R.N., Barber, K.S.: The effect of the GDPR on privacy policies: recent progress and future promise. ACM Trans. Manag. Inf. Syst. (TMIS) 12(1), 1\u201320 (2020)","journal-title":"ACM Trans. Manag. Inf. Syst. (TMIS)"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3456-2_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T22:04:48Z","timestamp":1760738688000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3456-2_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,17]]},"ISBN":["9789819534555","9789819534562"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3456-2_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,17]]},"assertion":[{"value":"17 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Data Mining and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kyoto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adma2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/adma2025.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}