{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T03:47:01Z","timestamp":1768621621237,"version":"3.49.0"},"reference-count":146,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T00:00:00Z","timestamp":1698710400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T00:00:00Z","timestamp":1698710400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004595","name":"Universiti Sains Malaysia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004595","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s10207-023-00761-4","type":"journal-article","created":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T20:02:37Z","timestamp":1698782557000},"page":"863-885","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["The rise of \u201csecurity and privacy\u201d: bibliometric analysis of computer privacy research"],"prefix":"10.1007","volume":"23","author":[{"given":"Auwal Shehu","family":"Ali","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7087-3726","authenticated-orcid":false,"given":"Zarul Fitri","family":"Zaaba","sequence":"additional","affiliation":[]},{"given":"Manmeet Mahinderjit","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,31]]},"reference":[{"key":"761_CR1","doi-asserted-by":"crossref","unstructured":"Pimple, K.D.: Emerging pervasive information and communication technologies (PICT): ethical challenges, opportunities and safeguards (2014)","DOI":"10.1007\/978-94-007-6833-8"},{"issue":"5","key":"761_CR2","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/S10207-019-00474-7","volume":"19","author":"V Torra","year":"2020","unstructured":"Torra, V.: Random dictatorship for privacy-preserving social choice. Int. J. Inf. Secur. 19(5), 537\u2013545 (2020). https:\/\/doi.org\/10.1007\/S10207-019-00474-7","journal-title":"Int. J. Inf. Secur."},{"issue":"11","key":"761_CR3","doi-asserted-by":"publisher","first-page":"18","DOI":"10.3102\/0013189x002011018","volume":"2","author":"W Ware","year":"1973","unstructured":"Ware, W.: Records, computers and the rights of citizens. Educ. Res. 2(11), 18\u201319 (1973). https:\/\/doi.org\/10.3102\/0013189x002011018","journal-title":"Educ. Res."},{"key":"761_CR4","doi-asserted-by":"publisher","unstructured":"Utz, C., Degeling, M., Fahl, S., Schaub, F., Holz, T.: (Un)informed consent: studying GDPR consent notices in the field. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 973\u2013990, (2019). https:\/\/doi.org\/10.1145\/3319535.3354212","DOI":"10.1145\/3319535.3354212"},{"key":"761_CR5","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2418247","author":"JR Reidenberg","year":"2018","unstructured":"Reidenberg, J.R., Russell, N.C., Callen, A., Qasir, S., Norton, T.: Privacy harms and the effectiveness of the notice and choice framework. SSRN Electron. J. (2018). https:\/\/doi.org\/10.2139\/ssrn.2418247","journal-title":"SSRN Electron. J."},{"issue":"4","key":"761_CR6","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/S10207-019-00458-7","volume":"19","author":"M H\u00f6lzl","year":"2020","unstructured":"H\u00f6lzl, M., Roland, M., Mir, O., Mayrhofer, R.: Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation. Int. J. Inf. Secur. 19(4), 401\u2013417 (2020). https:\/\/doi.org\/10.1007\/S10207-019-00458-7","journal-title":"Int. J. Inf. Secur."},{"issue":"1","key":"761_CR7","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1080\/1369118X.2018.1486870","volume":"23","author":"JA Obar","year":"2020","unstructured":"Obar, J.A., Oeldorf-Hirsch, A.: The biggest lie on the Internet: ignoring the privacy policies and terms of service policies of social networking services. Inf. Commun. Soc. 23(1), 128\u2013147 (2020). https:\/\/doi.org\/10.1080\/1369118X.2018.1486870","journal-title":"Inf. Commun. Soc."},{"key":"761_CR8","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordhb\/9780199589074.013.0023","author":"CJ Bennett","year":"2016","unstructured":"Bennett, C.J., Parsons, C.: Privacy and surveillance: the multidisciplinary literature on the capture, use, and disclosure of personal information in cyberspace. Oxford Handb. Internet Stud. (2016). https:\/\/doi.org\/10.1093\/oxfordhb\/9780199589074.013.0023","journal-title":"Oxford Handb. Internet Stud."},{"issue":"4","key":"761_CR9","doi-asserted-by":"publisher","first-page":"989","DOI":"10.2307\/41409970","volume":"35","author":"H Jeff Smith","year":"2011","unstructured":"Jeff Smith, H., Dinev, T., Xu, H.: Information privacy research: an interdisciplinary review. MIS Q. Manag. Inf. Syst. 35(4), 989\u20131015 (2011). https:\/\/doi.org\/10.2307\/41409970","journal-title":"MIS Q. Manag. Inf. Syst."},{"issue":"6","key":"761_CR10","doi-asserted-by":"publisher","first-page":"171","DOI":"10.17705\/1jais.00068","volume":"6","author":"Y Chan","year":"2005","unstructured":"Chan, Y., Greenaway, K.: Theoretical explanations for firms\u2019 information privacy behaviors. J. Assoc. Inf. Syst. 6(6), 171\u2013198 (2005). https:\/\/doi.org\/10.17705\/1jais.00068","journal-title":"J. Assoc. Inf. Syst."},{"issue":"1","key":"761_CR11","doi-asserted-by":"publisher","first-page":"13","DOI":"10.2307\/25148715","volume":"30","author":"NF Awad","year":"2006","unstructured":"Awad, N.F., Krishnan, M.S.: The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Q. Manag. Inf. Syst. 30(1), 13\u201328 (2006). https:\/\/doi.org\/10.2307\/25148715","journal-title":"MIS Q. Manag. Inf. Syst."},{"issue":"4","key":"761_CR12","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/641205.641209","volume":"46","author":"JB Earp","year":"2003","unstructured":"Earp, J.B., Baumer, D.: Innovative web use to learn about consumer behavior and online privacy. Commun. ACM 46(4), 81\u201383 (2003). https:\/\/doi.org\/10.1145\/641205.641209","journal-title":"Commun. ACM"},{"issue":"6","key":"761_CR13","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1016\/j.ijhcs.2006.12.001","volume":"65","author":"C Paine","year":"2007","unstructured":"Paine, C., Reips, U.D., Stieger, S., Joinson, A., Buchanan, T.: Internet users\u2019 perceptions of \u2018privacy concerns\u2019 and \u2018privacy actions.\u2019 Int. J. Hum. Comput. Stud. 65(6), 526\u2013536 (2007). https:\/\/doi.org\/10.1016\/j.ijhcs.2006.12.001","journal-title":"Int. J. Hum. Comput. Stud."},{"issue":"2","key":"761_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/15252019.2001.10722046","volume":"1","author":"PH Ang","year":"2001","unstructured":"Ang, P.H.: The role of self-regulation of privacy and the internet. J. Interact. Advert. 1(2), 1\u20139 (2001). https:\/\/doi.org\/10.1080\/15252019.2001.10722046","journal-title":"J. Interact. Advert."},{"issue":"3","key":"761_CR15","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1002\/1944-2866.POI334","volume":"5","author":"R Helles","year":"2013","unstructured":"Helles, R., Lomborg, S.: Regulatory response? Tracking the influence of technological developments on privacy regulation in Denmark from 2000 to 2011. Policy Internet 5(3), 289\u2013303 (2013). https:\/\/doi.org\/10.1002\/1944-2866.POI334","journal-title":"Policy Internet"},{"issue":"2","key":"761_CR16","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/S0736-5853(01)00012-0","volume":"19","author":"J Strauss","year":"2002","unstructured":"Strauss, J., Rogerson, K.S.: Policies for online privacy in the United States and the European Union. Telemat. Inform. 19(2), 173\u2013192 (2002). https:\/\/doi.org\/10.1016\/S0736-5853(01)00012-0","journal-title":"Telemat. Inform."},{"key":"761_CR17","doi-asserted-by":"publisher","unstructured":"Uchidiuno, J., Manweiler, J., Weisz, J.D.: Privacy and fear in the drone era: preserving privacy expectations through technology. In: Conference on human factors in computing systems - proceedings, vol 2018. https:\/\/doi.org\/10.1145\/3170427.3188457","DOI":"10.1145\/3170427.3188457"},{"issue":"1","key":"761_CR18","first-page":"471","volume":"6","author":"C Jensen","year":"2004","unstructured":"Jensen, C., Potts, C.: Privacy policies as decision-making tools: an evaluation of online privacy notices. Conf. Hum. Factors Comput. Syst. Proc. 6(1), 471\u2013478 (2004)","journal-title":"Conf. Hum. Factors Comput. Syst. Proc."},{"issue":"2","key":"761_CR19","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1287\/isre.1090.0260","volume":"22","author":"JY Tsai","year":"2011","unstructured":"Tsai, J.Y., Egelman, S., Cranor, L., Acquisti, A.: The effect of online privacy information on purchasing behavior: an experimental study. Inf. Syst. Res. 22(2), 254\u2013268 (2011). https:\/\/doi.org\/10.1287\/isre.1090.0260","journal-title":"Inf. Syst. Res."},{"issue":"1","key":"761_CR20","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1287\/orsc.10.1.104","volume":"10","author":"MJ Culnan","year":"1999","unstructured":"Culnan, M.J., Armstrong, P.K.: Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organ. Sci. 10(1), 104\u2013115 (1999). https:\/\/doi.org\/10.1287\/orsc.10.1.104","journal-title":"Organ. Sci."},{"issue":"1","key":"761_CR21","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.jsis.2014.09.001","volume":"24","author":"J Gerlach","year":"2015","unstructured":"Gerlach, J., Widjaja, T., Buxmann, P.: Handle with care: how online social network providers\u2019 privacy policies impact users\u2019 information sharing behavior. J. Strateg. Inf. Syst. 24(1), 33\u201343 (2015). https:\/\/doi.org\/10.1016\/j.jsis.2014.09.001","journal-title":"J. Strateg. Inf. Syst."},{"issue":"1\u20132","key":"761_CR22","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1080\/15332860903341356","volume":"8","author":"JS Mollick","year":"2009","unstructured":"Mollick, J.S., Mykytyn, P.P.: An empirical investigation on the effects of privacy policies on perceived fairness of online vendors. J. Internet Commer. 8(1\u20132), 88\u2013112 (2009). https:\/\/doi.org\/10.1080\/15332860903341356","journal-title":"J. Internet Commer."},{"issue":"7","key":"761_CR23","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1016\/j.im.2006.07.003","volume":"43","author":"KS Schwaig","year":"2006","unstructured":"Schwaig, K.S., Kane, G.C., Storey, V.C.: Compliance to the fair information practices: how are the Fortune 500 handling online privacy disclosures? Inf. Manag. 43(7), 805\u2013820 (2006). https:\/\/doi.org\/10.1016\/j.im.2006.07.003","journal-title":"Inf. Manag."},{"issue":"1","key":"761_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.im.2015.08.001","volume":"53","author":"G Bansal","year":"2016","unstructured":"Bansal, G., Zahedi, F.M., Gefen, D.: Do context and personality matter? Trust and privacy concerns in disclosing private information online. Inf. Manag. 53(1), 1\u201321 (2016). https:\/\/doi.org\/10.1016\/j.im.2015.08.001","journal-title":"Inf. Manag."},{"issue":"1","key":"761_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/07370020903586662","volume":"25","author":"AN Joinson","year":"2010","unstructured":"Joinson, A.N., Reips, U.D., Buchanan, T., Schofield, C.B.P.: Privacy, trust, and self-disclosure online. Hum. Comput. Interact. 25(1), 1\u201324 (2010). https:\/\/doi.org\/10.1080\/07370020903586662","journal-title":"Hum. Comput. Interact."},{"issue":"3","key":"761_CR26","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1016\/j.chb.2012.11.022","volume":"29","author":"S Taddei","year":"2013","unstructured":"Taddei, S., Contena, B.: Privacy, trust and control: which relationships with online self-disclosure? Comput. Hum. Behav. 29(3), 821\u2013826 (2013). https:\/\/doi.org\/10.1016\/j.chb.2012.11.022","journal-title":"Comput. Hum. Behav."},{"issue":"3","key":"761_CR27","doi-asserted-by":"publisher","first-page":"795","DOI":"10.1007\/s11192-015-1574-x","volume":"103","author":"T Dehdarirad","year":"2015","unstructured":"Dehdarirad, T., Villarroya, A., Barrios, M.: Research on women in science and higher education: a bibliometric analysis. Scientometrics 103(3), 795\u2013812 (2015). https:\/\/doi.org\/10.1007\/s11192-015-1574-x","journal-title":"Scientometrics"},{"issue":"6","key":"761_CR28","doi-asserted-by":"publisher","first-page":"1215","DOI":"10.1007\/s10346-015-0624-z","volume":"12","author":"X Wu","year":"2015","unstructured":"Wu, X., Chen, X., Zhan, F.B., Hong, S.: Global research trends in landslides during 1991\u20132014: a bibliometric analysis. Landslides 12(6), 1215\u20131226 (2015). https:\/\/doi.org\/10.1007\/s10346-015-0624-z","journal-title":"Landslides"},{"issue":"2","key":"761_CR29","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1007\/s11192-015-1708-1","volume":"105","author":"NV Olijnyk","year":"2015","unstructured":"Olijnyk, N.V.: A quantitative examination of the intellectual profile and evolution of information security from 1965 to 2015. Scientometrics 105(2), 883\u2013904 (2015). https:\/\/doi.org\/10.1007\/s11192-015-1708-1","journal-title":"Scientometrics"},{"key":"761_CR30","unstructured":"Anyi, K.W.U., Zainab, A.N., Anuar, N.B.: Bibliometric studies on single journals: a review. Malaysian Journal of Library and Information Science, vol. 14, no. 1. pp. 17\u201355, (2009). Accessed from 21 Oct 2021. [Online]. Available: http:\/\/ijie.um.edu.my\/index.php\/MJLIS\/article\/view\/6951"},{"key":"761_CR31","doi-asserted-by":"crossref","unstructured":"Jos\u00e9 de Oliveira, O., Francisco da Silva, F., Juliani, F., C\u00e9sar Ferreira Motta Barbosa, L., Vieira Nunhes, T.: Bibliometric method for mapping the state-of-the-art and identifying research gaps and trends in literature: an essential instrument to support the development of scientific Projects. In: Scientometrics Recent Advances (2019)","DOI":"10.5772\/intechopen.85856"},{"key":"761_CR32","unstructured":"Barev, T.J., Janson, A.: Towards an integrative understanding of privacy nudging \u2013 systematic review and research Agenda. In: 18th Annu. Pre-ICIS Work. HCI Res. MIS, (2019). Accessed from 21 Oct 2021. [Online]. Available: https:\/\/www.alexandria.unisg.ch\/258828\/"},{"key":"761_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-981-32-9186-7_1","volume":"1013","author":"BT Ngoc","year":"2020","unstructured":"Ngoc, B.T., Van, B.D., The, Q.P.: Privacy, security, and policies: a review of problems and solutions with semantic web technologies. Adv. Intell. Syst. Comput. 1013, 1\u201310 (2020). https:\/\/doi.org\/10.1007\/978-981-32-9186-7_1","journal-title":"Adv. Intell. Syst. Comput."},{"key":"761_CR34","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.cose.2015.07.002","volume":"64","author":"S Kokolakis","year":"2017","unstructured":"Kokolakis, S.: Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122\u2013134 (2017). https:\/\/doi.org\/10.1016\/j.cose.2015.07.002","journal-title":"Comput. Secur."},{"key":"761_CR35","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.invent.2018.12.001","volume":"15","author":"K O\u2019Loughlin","year":"2019","unstructured":"O\u2019Loughlin, K., Neary, M., Adkins, E.C., Schueller, S.M.: Reviewing the data security and privacy policies of mobile apps for depression. Internet Interv. 15, 110\u2013115 (2019). https:\/\/doi.org\/10.1016\/j.invent.2018.12.001","journal-title":"Internet Interv."},{"issue":"3(9)","key":"761_CR36","doi-asserted-by":"publisher","first-page":"23","DOI":"10.18843\/ijms\/v5i3(9)\/04","volume":"V","author":"J Sambada","year":"2018","unstructured":"Sambada, J., Bhayani, S.: A review of literature on consumer privacy concerns and behaviour. Int. J. Manag. Stud. V(3(9)), 23 (2018). https:\/\/doi.org\/10.18843\/ijms\/v5i3(9)\/04","journal-title":"Int. J. Manag. Stud."},{"key":"761_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijmedinf.2019.01.014","volume":"125","author":"N Shen","year":"2019","unstructured":"Shen, N., et al.: Understanding the patient privacy perspective on health information exchange: a systematic review. Int. J. Med. Inform. 125, 1\u201312 (2019). https:\/\/doi.org\/10.1016\/j.ijmedinf.2019.01.014","journal-title":"Int. J. Med. Inform."},{"key":"761_CR38","unstructured":"Pattakou, A., Kalloniatis, C.: Security and privacy under a unified framework: a review. personales.upv.es, (2018). Accessed from 27 Feb 2023. [Online]. Available: http:\/\/personales.upv.es\/thinkmind\/dl\/journals\/sec\/sec_v11_n12_2018\/sec_v11_n12_2018_3.pdf"},{"issue":"4","key":"761_CR39","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.csi.2010.01.006","volume":"32","author":"D Mellado","year":"2010","unstructured":"Mellado, D., Blanco, C., S\u00e1nchez, L.E., Fern\u00e1ndez-Medina, E.: A systematic review of security requirements engineering. Comput. Stand. Interfaces 32(4), 153\u2013165 (2010). https:\/\/doi.org\/10.1016\/j.csi.2010.01.006","journal-title":"Comput. Stand. Interfaces"},{"key":"761_CR40","unstructured":"Pattakou, A., Kalloniatis, C.: Security and privacy requirements engineering methods for traditional and cloud-based systems: a review. Cloud Computing, no. c, p. 7, (2017). Accessed from 27 Feb 2023. [Online]. Available: https:\/\/www.academia.edu\/download\/51928079\/cloud_computing_2017_full.pdf#page=156"},{"key":"761_CR41","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3202047","author":"Y Wang","year":"2022","unstructured":"Wang, Y., et al.: A survey on Metaverse: fundamentals, security, and privacy. IEEE Commun. Surv. Tutor. (2022). https:\/\/doi.org\/10.1109\/COMST.2022.3202047","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"761_CR42","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A Juels","year":"2006","unstructured":"Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381\u2013394 (2006). https:\/\/doi.org\/10.1109\/JSAC.2005.861395","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"761_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102630","author":"SM Tahsien","year":"2020","unstructured":"Tahsien, S.M., Karimipour, H., Spachos, P.: Machine learning based solutions for security of Internet of Things (IoT): a survey. J. Netw. Comput. Appl. (2020). https:\/\/doi.org\/10.1016\/j.jnca.2020.102630","journal-title":"J. Netw. Comput. Appl."},{"key":"761_CR44","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.autcon.2017.03.005","volume":"80","author":"R Santos","year":"2017","unstructured":"Santos, R., Costa, A.A., Grilo, A.: Bibliometric analysis and review of building information modelling literature published between 2005 and 2015. Autom. Constr. 80, 118\u2013136 (2017). https:\/\/doi.org\/10.1016\/j.autcon.2017.03.005","journal-title":"Autom. Constr."},{"issue":"1","key":"761_CR45","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1080\/00038628.2018.1485548","volume":"62","author":"X Zhao","year":"2019","unstructured":"Zhao, X., Zuo, J., Wu, G., Huang, C.: A bibliometric review of green building research 2000\u20132016. Archit. Sci. Rev. 62(1), 74\u201388 (2019). https:\/\/doi.org\/10.1080\/00038628.2018.1485548","journal-title":"Archit. Sci. Rev."},{"issue":"2","key":"761_CR46","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1080\/08039480801961667","volume":"62","author":"J Koskinen","year":"2008","unstructured":"Koskinen, J., et al.: How to use bibliometric methods in evaluation of scientific research? An example from Finnish schizophrenia research. Nord. J. Psychiatry 62(2), 136\u2013143 (2008). https:\/\/doi.org\/10.1080\/08039480801961667","journal-title":"Nord. J. Psychiatry"},{"issue":"7","key":"761_CR47","doi-asserted-by":"publisher","first-page":"1320","DOI":"10.1002\/asi.21062","volume":"60","author":"\u00c9 Archambault","year":"2009","unstructured":"Archambault, \u00c9., Campbell, D., Gingras, Y., Larivi\u00e8re, V.: Comparing bibliometric statistics obtained from the web of science and Scopus. J. Am. Soc. Inf. Sci. Technol. 60(7), 1320\u20131326 (2009). https:\/\/doi.org\/10.1002\/asi.21062","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"issue":"2","key":"761_CR48","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1111\/hir.12031","volume":"30","author":"V Wilson","year":"2013","unstructured":"Wilson, V., Grant, M.J.: Evidence based library and information practice: what\u2019s in it for you? Health Inf. Libr. J. 30(2), 89\u201391 (2013). https:\/\/doi.org\/10.1111\/hir.12031","journal-title":"Health Inf. Libr. J."},{"key":"761_CR49","doi-asserted-by":"publisher","DOI":"10.1053\/j.gastro.2013.02.013","author":"DE Loomes","year":"2013","unstructured":"Loomes, D.E., Van Zanten, S.V.: Bibliometrics of the top 100 clinical articles in digestive disease. Gastroenterology (2013). https:\/\/doi.org\/10.1053\/j.gastro.2013.02.013","journal-title":"Gastroenterology"},{"key":"761_CR50","doi-asserted-by":"publisher","first-page":"1823","DOI":"10.1016\/j.rser.2015.07.141","volume":"52","author":"G Mao","year":"2015","unstructured":"Mao, G., Zou, H., Chen, G., Du, H., Zuo, J.: Past, current and future of biomass energy research: a bibliometric analysis. Renew. Sustain. Energy Rev. 52, 1823\u20131833 (2015). https:\/\/doi.org\/10.1016\/j.rser.2015.07.141","journal-title":"Renew. Sustain. Energy Rev."},{"key":"761_CR51","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.ijpe.2015.01.003","volume":"162","author":"B Fahimnia","year":"2015","unstructured":"Fahimnia, B., Sarkis, J., Davarzani, H.: Green supply chain management: a review and bibliometric analysis. Int. J. Prod. Econ. 162, 101\u2013114 (2015). https:\/\/doi.org\/10.1016\/j.ijpe.2015.01.003","journal-title":"Int. J. Prod. Econ."},{"issue":"2","key":"761_CR52","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1096\/fj.07-9492LSF","volume":"22","author":"ME Falagas","year":"2008","unstructured":"Falagas, M.E., Pitsouni, E.I., Malietzis, G.A., Pappas, G.: Comparison of PubMed, scopus, web of science, and Google scholar: strengths and weaknesses. Wiley Online Libr. 22(2), 338\u2013342 (2008). https:\/\/doi.org\/10.1096\/fj.07-9492LSF","journal-title":"Wiley Online Libr."},{"issue":"10","key":"761_CR53","doi-asserted-by":"publisher","first-page":"1092","DOI":"10.1001\/jama.2009.1307","volume":"302","author":"AV Kulkarni","year":"2009","unstructured":"Kulkarni, A.V., Aziz, B., Shams, I., Busse, J.W.: Comparisons of citations in web of science, Scopus, and Google Scholar for articles published in general medical journals. JAMA 302(10), 1092\u20131096 (2009). https:\/\/doi.org\/10.1001\/jama.2009.1307","journal-title":"JAMA"},{"issue":"1","key":"761_CR54","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1162\/qss_a_00019","volume":"1","author":"J Baas","year":"2020","unstructured":"Baas, J., Schotten, M., Plume, A., Cote, G., Karimi, R.: Scopus as a curated, high-quality bibliometric data source for academic research in quantitative science studies. Quant. Sci. Stud. 1(1), 377\u2013386 (2020). https:\/\/doi.org\/10.1162\/qss_a_00019","journal-title":"Quant. Sci. Stud."},{"issue":"6","key":"761_CR55","doi-asserted-by":"publisher","first-page":"5113","DOI":"10.1007\/s11192-021-03948-5","volume":"126","author":"VK Singh","year":"2021","unstructured":"Singh, V.K., Singh, P., Karmakar, M., Leta, J., Mayr, P.: The journal coverage of web of science, scopus and dimensions: a comparative analysis. Scientometrics 126(6), 5113\u20135142 (2021). https:\/\/doi.org\/10.1007\/s11192-021-03948-5","journal-title":"Scientometrics"},{"issue":"1","key":"761_CR56","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s11192-012-0853-z","volume":"95","author":"H Wang","year":"2013","unstructured":"Wang, H., Liu, M., Hong, S., Zhuang, Y.: A historical review and bibliometric analysis of GPS research from 1991\u20132010. Scientometrics 95(1), 35\u201344 (2013). https:\/\/doi.org\/10.1007\/s11192-012-0853-z","journal-title":"Scientometrics"},{"key":"761_CR57","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1007\/978-3-319-10377-8_13","volume-title":"Measuring scholarly impact","author":"NJ van Eck","year":"2014","unstructured":"van Eck, N.J., Waltman, L.: Visualizing bibliometric networks. In: Measuring scholarly impact, pp. 285\u2013320. Springer International Publishing, Cham (2014)"},{"issue":"4","key":"761_CR58","first-page":"327","volume":"49","author":"HD White","year":"1998","unstructured":"White, H.D., McCain, K.W.: Visualizing a discipline: an author co-citation analysis of information science, 1972\u20131995. J. Am. Soc. Inf. Sci. 49(4), 327\u2013355 (1998)","journal-title":"J. Am. Soc. Inf. Sci."},{"issue":"3","key":"761_CR59","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1177\/1094428114562629","volume":"18","author":"I Zupic","year":"2015","unstructured":"Zupic, I., \u010cater, T.: Bibliometric methods in management and organization. Organ. Res. Methods 18(3), 429\u2013472 (2015). https:\/\/doi.org\/10.1177\/1094428114562629","journal-title":"Organ. Res. Methods"},{"key":"761_CR60","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.dss.2016.03.006","volume":"86","author":"N Wang","year":"2016","unstructured":"Wang, N., Liang, H., Jia, Y., Ge, S., Xue, Y., Wang, Z.: Cloud computing research in the IS discipline: a citation\/co-citation analysis. Decis. Support. Syst. 86, 35\u201347 (2016). https:\/\/doi.org\/10.1016\/j.dss.2016.03.006","journal-title":"Decis. Support. Syst."},{"issue":"1","key":"761_CR61","doi-asserted-by":"publisher","first-page":"21","DOI":"10.4018\/IRMJ.2018010102","volume":"31","author":"S Verma","year":"2018","unstructured":"Verma, S.: Mapping the intellectual structure of the big data research in the IS discipline: a citation\/co-citation analysis. Inf. Resour. Manag. J. 31(1), 21\u201352 (2018). https:\/\/doi.org\/10.4018\/IRMJ.2018010102","journal-title":"Inf. Resour. Manag. J."},{"issue":"3","key":"761_CR62","doi-asserted-by":"publisher","first-page":"335","DOI":"10.3102\/0034654319830380","volume":"89","author":"P Hallinger","year":"2019","unstructured":"Hallinger, P., Kova\u010devi\u0107, J.: A bibliometric review of research on educational administration: science mapping the literature, 1960 to 2018. Rev. Educ. Res. 89(3), 335\u2013369 (2019). https:\/\/doi.org\/10.3102\/0034654319830380","journal-title":"Rev. Educ. Res."},{"key":"761_CR63","unstructured":"F. O. R. H. A. Century.: Who picks up the tab for science?. BU Today, pp. 1\u201313, (2016). Accessed from 21 Oct 2021. [Online]. Available: https:\/\/scholar.google.com\/scholar?hl=en&as_sdt=0%2C5&q=Who+picks+up+the+tab+for+science%3F+For+half+a+century%2C+the+government+funded+research.+Times+are+changing&btnG"},{"issue":"7848","key":"761_CR64","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1038\/d41586-021-00496-z","volume":"591","author":"Q Schiermeier","year":"2021","unstructured":"Schiermeier, Q.: How Europe\u2019s \u20ac100-billion science fund will shape 7 years of research. Nature 591(7848), 20\u201321 (2021). https:\/\/doi.org\/10.1038\/d41586-021-00496-z","journal-title":"Nature"},{"issue":"7491","key":"761_CR65","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1038\/507148a","volume":"507","author":"J Qiu","year":"2014","unstructured":"Qiu, J.: China goes back to basics on research funding. Nature 507(7491), 148\u2013149 (2014). https:\/\/doi.org\/10.1038\/507148a","journal-title":"Nature"},{"key":"761_CR66","unstructured":"UNESCO Institute for Statistics.: Global Investments in R&D A snapshot of R&D expenditure Figure 1. Regional R&D investments Shares of world R&D expenditure (GERD) by region, (2020). Accessed from 07 Mar 2023. [Online]. Available: https:\/\/uis.unesco.org\/sites\/default\/files\/documents\/fs59-global-investments-rd-2020-en.pdf"},{"key":"761_CR67","doi-asserted-by":"publisher","DOI":"10.3145\/epi.2019.jul.07","author":"BC Bj\u00f6rk","year":"2019","unstructured":"Bj\u00f6rk, B.C.: Acceptance rates of scholarly peer-reviewed journals: a literature survey. El Prof. Inf. (2019). https:\/\/doi.org\/10.3145\/epi.2019.jul.07","journal-title":"El Prof. Inf."},{"issue":"3","key":"761_CR68","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/s11192-007-1653-8","volume":"71","author":"G Buela-Casal","year":"2007","unstructured":"Buela-Casal, G., Guti\u00e9rrez-Mart\u00ednez, O., Berm\u00fadez-S\u00e1nchez, M.P., Vadillo-Mu\u00f1oz, O.: Comparative study of international academic rankings of universities. Scientometrics 71(3), 349\u2013365 (2007). https:\/\/doi.org\/10.1007\/s11192-007-1653-8","journal-title":"Scientometrics"},{"key":"761_CR69","unstructured":"Harzing, A.W.: The publish or perish book, (2010). Accessed from 28 Feb 2023. [Online]. Available: http:\/\/www.harzing.info\/download\/popbook12.pdf"},{"key":"761_CR70","unstructured":"Sadeh, N.: Bibliography, (2021). https:\/\/normsadeh.org"},{"issue":"5","key":"761_CR71","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1108\/02635570610666403","volume":"106","author":"C Flavi\u00e1n","year":"2006","unstructured":"Flavi\u00e1n, C., Guinal\u00edu, M.: Consumer trust, perceived security and computer privacy: three basic elements of loyalty to a web site. Ind. Manag. Data Syst. 106(5), 601\u2013620 (2006). https:\/\/doi.org\/10.1108\/02635570610666403","journal-title":"Ind. Manag. Data Syst."},{"key":"761_CR72","unstructured":"Audich, D.: Enhancing readability of privacy policies through ontologies, (2018). Accessed from 21 Oct 2021. [Online]. Available: http:\/\/atrium.lib.uoguelph.ca\/xmlui\/handle\/10214\/12550"},{"issue":"3","key":"761_CR73","doi-asserted-by":"publisher","first-page":"911","DOI":"10.2307\/3479272","volume":"56","author":"TC Clark","year":"1968","unstructured":"Clark, T.C., Westin, A.F.: Privacy and freedom. Calif. Law Rev. 56(3), 911 (1968). https:\/\/doi.org\/10.2307\/3479272","journal-title":"Calif. Law Rev."},{"key":"761_CR74","unstructured":"McDonald, A., Cranor, L.F.: The cost of reading privacy policies. I\/S A J. Law Policy Inf. Soc., vol. 4, no. 543, p. 183, (2001). Accessed from 21 Sep 2021. [Online]. Available: https:\/\/heinonline.org\/hol-cgi-bin\/get_pdf.cgi?handle=hein.journals\/isjlpsoc4&section=27"},{"key":"761_CR75","first-page":"37","volume-title":"Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","author":"AM McDonald","year":"2009","unstructured":"McDonald, A.M., Reeder, R.W., Kelley, P.G., Cranor, L.F.: A comparative study of online privacy policies and formats. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 37\u201355. LNCS, Heidelberg (2009)"},{"issue":"3","key":"761_CR76","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1002\/dir.20009","volume":"18","author":"GR Milne","year":"2004","unstructured":"Milne, G.R., Culnan, M.J.: Strategies for reducing online privacy risks: why consumers read (or don\u2019t read) online privacy notices. J. Interact. Mark. 18(3), 15\u201329 (2004). https:\/\/doi.org\/10.1002\/dir.20009","journal-title":"J. Interact. Mark."},{"key":"761_CR77","unstructured":"Termsfeed.: Generic computer privacy template, (2017). https:\/\/www.termsfeed.com\/pdf.assets\/pdf\/privacy-policy-template"},{"key":"761_CR78","unstructured":"Docracy.: An open source computer privacy for mobile apps, (2011)"},{"key":"761_CR79","unstructured":"3DCart.: Create an online store with 3dcart store builder, (2018)"},{"key":"761_CR80","doi-asserted-by":"publisher","unstructured":"Kolter, J., Pernul, G.: Generating user-understandable privacy preferences. In: Proceedings - International Conference on Availability, Reliability and Security, pp. 299\u2013306. ARES, (2009). https:\/\/doi.org\/10.1109\/ARES.2009.89","DOI":"10.1109\/ARES.2009.89"},{"key":"761_CR81","unstructured":"Lucas, M., Franco, M., Patricio, M.: Computer privacy generator, (2017). https:\/\/privacypolicygenerator.info\/"},{"key":"761_CR82","unstructured":"Miao, D.: PrivacyInformer: an automated privacy description generator for the MIT app inventor, (2014). Accessed from 23 Oct 2021. [Online]. Available: https:\/\/dspace.mit.edu\/handle\/1721.1\/95523"},{"key":"761_CR83","doi-asserted-by":"publisher","unstructured":"Apolinarski, W., Handte, M., Marron, P.J.: Automating the generation of privacy policies for context-sharing applications. In: Proceedings - 2015 International Conference on Intelligent Environments, pp. 73\u201380. IE, (2015). https:\/\/doi.org\/10.1109\/IE.2015.18","DOI":"10.1109\/IE.2015.18"},{"key":"761_CR84","unstructured":"Anderson, A. et al.: extensible access control markup language (xacml) version 1.0,\u201d OASIS, 2003. Accessed from 23 Oct 2021. [Online]. Available: http:\/\/xml.coverpages.org\/XACMLv20CD-CoreSpec.pdf"},{"issue":"1","key":"761_CR85","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1145\/234313.234412","volume":"28","author":"R Sandhu","year":"1996","unstructured":"Sandhu, R., Samarati, P.: Authentication, access control, and audit. ACM Comput. Surv. 28(1), 241\u2013243 (1996). https:\/\/doi.org\/10.1145\/234313.234412","journal-title":"ACM Comput. Surv."},{"key":"761_CR86","unstructured":"Open Geospatial Consortium.: Geospatial eXtensible access control markup language (GeoXACML), (2011)"},{"issue":"1","key":"761_CR87","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J Park","year":"2004","unstructured":"Park, J., Sandhu, R.: The UCON ABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1), 128\u2013174 (2004). https:\/\/doi.org\/10.1145\/984334.984339","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"9","key":"761_CR88","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1151030.1151053","volume":"49","author":"A Pretschner","year":"2006","unstructured":"Pretschner, A., Hilty, M., Basin, D.: Distributed usage control. Commun. ACM 49(9), 39\u201344 (2006). https:\/\/doi.org\/10.1145\/1151030.1151053","journal-title":"Commun. ACM"},{"issue":"2","key":"761_CR89","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/s10664-012-9204-1","volume":"18","author":"R L\u00e4mmel","year":"2013","unstructured":"L\u00e4mmel, R., Pek, E.: Understanding privacy policies. Empir. Softw. Eng. 18(2), 310\u2013374 (2013). https:\/\/doi.org\/10.1007\/s10664-012-9204-1","journal-title":"Empir. Softw. Eng."},{"key":"761_CR90","unstructured":"Harkous, H., Fawaz, K., Lebret, R., Schaub, F., Shin, K.G., Aberer, K.: Polisis: automated analysis and presentation of privacy policies using deep learning. In: Proceedings of the 27th USENIX Security Symposium, pp. 531\u2013548, (2018)"},{"issue":"2","key":"761_CR91","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1080\/15252019.2017.1366885","volume":"17","author":"NJ Evans","year":"2017","unstructured":"Evans, N.J., Phua, J., Lim, J., Jun, H.: Disclosing instagram influencer advertising: the effects of disclosure language on advertising recognition, attitudes, and behavioral intent. J. Interact. Advert. 17(2), 138\u2013149 (2017). https:\/\/doi.org\/10.1080\/15252019.2017.1366885","journal-title":"J. Interact. Advert."},{"key":"761_CR92","doi-asserted-by":"publisher","unstructured":"Bokaei Hosseini, M., Breaux, T.D., Niu, J.: Inferring ontology fragments from semantic role typing of lexical variants. In: Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10753, pp. 39\u201356. LNCS, (2018). https:\/\/doi.org\/10.1007\/978-3-319-77243-1_3.","DOI":"10.1007\/978-3-319-77243-1_3"},{"key":"761_CR93","doi-asserted-by":"publisher","unstructured":"Cranor, L.F., Arjula, M., Guduru, P.: Use of a P3P user agent by early adopters. In: Proceedings of the ACM conference on computer and communications security, no. WORKSHOP, pp. 1\u201310, (2002). https:\/\/doi.org\/10.1145\/644527.644528","DOI":"10.1145\/644527.644528"},{"key":"761_CR94","unstructured":"Marella, A., Pan, C., Hu, Z., Schuab, F., Ur, B., Cranor, L.F.: Assessing privacy awareness from browser Plugins, cups.cs.cmu.edu, no. July, pp. 1\u20132, (2014). Accessed from 21 Oct 2021. [Online]. Available: http:\/\/cups.cs.cmu.edu\/soups\/2014\/posters\/soups2014_posters-paper29.pdf"},{"key":"761_CR95","doi-asserted-by":"publisher","unstructured":"Morel, V., Pardo, R.: SoK: three facets of privacy policies. In: WPES 2020 - Proceedings of the 19th Workshop on Privacy in the Electronic Society, pp. 41\u201356, (2020). https:\/\/doi.org\/10.1145\/3411497.3420216","DOI":"10.1145\/3411497.3420216"},{"issue":"4","key":"761_CR96","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1109\/TIFS.2016.2639339","volume":"12","author":"L Yu","year":"2017","unstructured":"Yu, L., Zhang, T., Luo, X., Xue, L., Chang, H.: Toward automatically generating computer privacy for android apps. IEEE Trans. Inf. Forensics Secur. 12(4), 865\u2013880 (2017). https:\/\/doi.org\/10.1109\/TIFS.2016.2639339","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"761_CR97","doi-asserted-by":"publisher","first-page":"66","DOI":"10.2478\/popets-2019-0037","volume":"2019","author":"S Zimmeck","year":"2019","unstructured":"Zimmeck, S., et al.: MAPS: scaling privacy compliance analysis to a million apps. Proc. Priv. Enhanc. Technol. 2019(3), 66\u201386 (2019). https:\/\/doi.org\/10.2478\/popets-2019-0037","journal-title":"Proc. Priv. Enhanc. Technol."},{"key":"761_CR98","doi-asserted-by":"publisher","unstructured":"Slavin, R. et al.: Toward a framework for detecting computer privacy violations in android application code. In: Proceedings - International Conference on Software Engineering, vol. 14\u201322, pp. 25\u201336, (2016). https:\/\/doi.org\/10.1145\/2884781.2884855","DOI":"10.1145\/2884781.2884855"},{"key":"761_CR99","doi-asserted-by":"publisher","unstructured":"Wang, X., Qin, X., Hosseini, M.B., Slavin, R., Breaux, T.D., Niu, J.: GUILeak, in dl.acm.org, pp. 37\u201347, (2018). https:\/\/doi.org\/10.1145\/3180155.3180196","DOI":"10.1145\/3180155.3180196"},{"issue":"3","key":"761_CR100","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1515\/popets-2018-0021","volume":"2018","author":"I Reyes","year":"2018","unstructured":"Reyes, I., et al.: \u2018Won\u2019t somebody think of the children? Examining COPPA compliance at scale. Proc. Priv. Enhanc. Technol. 2018(3), 63\u201383 (2018). https:\/\/doi.org\/10.1515\/popets-2018-0021","journal-title":"Proc. Priv. Enhanc. Technol."},{"key":"761_CR101","unstructured":"Okoyomon, E. et al.: On the ridiculousness of notice and consent: contradictions in app privacy policies. In: Work. Technol. Consum. Prot. (ConPro 2019), conjunction with 39th IEEE Symp. Secur. Privacy, pp. 1\u20137, (2019). Accessed from 23 Oct 2021. [Online]. Available: https:\/\/dspace.networks.imdea.org\/handle\/20.500.12761\/690"},{"key":"761_CR102","unstructured":"Andow, B. et al.: Policylint: investigating internal computer privacy contradictions on google play. In: Proceedings of the 28th USENIX Security Symposium, pp. 585\u2013602, (2019). Accessed from 23 Oct 2021. [Online]. Available: https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/andow"},{"key":"761_CR103","doi-asserted-by":"publisher","unstructured":"Chen, S. et al.: An empirical assessment of security risks of global android banking apps. In: Proceedings - International Conference on Software Engineering, pp. 1310\u20131322, (2020). https:\/\/doi.org\/10.1145\/3377811.3380417","DOI":"10.1145\/3377811.3380417"},{"key":"761_CR104","doi-asserted-by":"publisher","DOI":"10.1145\/2619091","author":"W Enck","year":"2014","unstructured":"Enck, W., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. (2014). https:\/\/doi.org\/10.1145\/2619091","journal-title":"ACM Trans. Comput. Syst."},{"key":"761_CR105","doi-asserted-by":"publisher","unstructured":"Reinhardt, D., Borchard, J., Hurtienne, J.: Visual interactive computer privacy: the beter choice?, (2021). https:\/\/doi.org\/10.1145\/3411764.3445465","DOI":"10.1145\/3411764.3445465"},{"key":"761_CR106","doi-asserted-by":"publisher","unstructured":"de Jong, S., Spagnuelo, D.: Iconified representations of privacy policies: a GDPR perspective. In: Advances in Intelligent Systems and Computing, vol. 1160, pp. 796\u2013806. AISC, (2020). https:\/\/doi.org\/10.1007\/978-3-030-45691-7_75","DOI":"10.1007\/978-3-030-45691-7_75"},{"key":"761_CR107","unstructured":"Schwartz, P., Solove, D.: \u201cNotice & Choice,\u201d digitalads.org, (2009). Accessed from 23 Oct 2021. [Online]. Available: http:\/\/www.digitalads.org\/sites\/default\/files\/publications\/digitalads_schwartz_solove_notice_choice_nplan_bmsg_memo.pdf"},{"issue":"2","key":"761_CR108","doi-asserted-by":"publisher","first-page":"185","DOI":"10.3233\/SW-170283","volume":"9","author":"A Oltramari","year":"2018","unstructured":"Oltramari, A., et al.: PrivOnto: a semantic framework for the analysis of privacy policies. Semant. Web 9(2), 185\u2013203 (2018). https:\/\/doi.org\/10.3233\/SW-170283","journal-title":"Semant. Web"},{"key":"761_CR109","unstructured":"Shayegh, P., Jain, V., Rabinia, A., Ghanavati, S.: Automated approach to improve IoT privacy policies. arxiv.org, (2019). Accessed from 23 Oct 2021. [Online]. Available: https:\/\/arxiv.org\/abs\/1910.04133"},{"key":"761_CR110","unstructured":"Zimmeck, S., Bellovin, S.M.: Privee: an architecture for automatically analyzing web privacy policies. In: Proceedings of the 23rd USENIX Security Symposium, pp. 1\u201316, (2014). Accessed from 23 Oct 2021. [Online]. Available: https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/zimmeck"},{"issue":"2","key":"761_CR111","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/293411.293455","volume":"42","author":"J Reagle","year":"1999","unstructured":"Reagle, J., Cranor, L.F.: The platform for privacy preferences. Commun. ACM 42(2), 48\u201355 (1999). https:\/\/doi.org\/10.1145\/293411.293455","journal-title":"Commun. ACM"},{"key":"761_CR112","doi-asserted-by":"publisher","unstructured":"Kelley, P.G., Bresee, J., Cranor, L.F., Reeder, R.W.: A \u2018nutrition label\u2019 for privacy, (2009). https:\/\/doi.org\/10.1145\/1572532.1572538","DOI":"10.1145\/1572532.1572538"},{"key":"761_CR113","unstructured":"K\u00f6nig, U., Schallab\u00f6ck, J.: Privacy preferences for E-Mail messages, (2011). Accessed from 23 Oct 2021. [Online]. Available: https:\/\/www.ietf.org\/proceedings\/78\/slides\/apparea-0.pdf"},{"key":"761_CR114","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.911607","author":"MC Rundle","year":"2011","unstructured":"Rundle, M.C.: International personal data protection and digital identity management tools. SSRN Electron. J. (2011). https:\/\/doi.org\/10.2139\/ssrn.911607","journal-title":"SSRN Electron. J."},{"key":"761_CR115","doi-asserted-by":"crossref","unstructured":"Holtz, L.E., Zwingelberg, H., Hansen, M.: Computer privacy icons. In: Privacy and Identity Management for Life, pp. 279\u2013285 (2011)","DOI":"10.1007\/978-3-642-20317-6_15"},{"key":"761_CR116","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v17i7.4010","author":"B van den Berg","year":"2012","unstructured":"van den Berg, B., van der Hof, S.: What happens to my data? A novel approach to informing users of data processing practices. First Monday (2012). https:\/\/doi.org\/10.5210\/fm.v17i7.4010","journal-title":"First Monday"},{"issue":"2","key":"761_CR117","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10796-014-9492-7","volume":"17","author":"S Li","year":"2015","unstructured":"Li, S., Da Xu, L., Zhao, S.: The internet of things: a survey. Inf. Syst. Front. 17(2), 243\u2013259 (2015). https:\/\/doi.org\/10.1007\/s10796-014-9492-7","journal-title":"Inf. Syst. Front."},{"issue":"3","key":"761_CR118","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MPRV.2018.03367733","volume":"17","author":"A Das","year":"2018","unstructured":"Das, A., Degeling, M., Smullen, D., Sadeh, N.: Personalized privacy assistants for the internet of things: providing users with notice and choice. IEEE Pervasive Comput. 17(3), 35\u201346 (2018). https:\/\/doi.org\/10.1109\/MPRV.2018.03367733","journal-title":"IEEE Pervasive Comput."},{"key":"761_CR119","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/3-540-45809-3_19","volume":"2498","author":"M Langheinrich","year":"2002","unstructured":"Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. Lect. Notes Comput. Sci. (Incl. Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinform.) 2498, 237\u2013245 (2002). https:\/\/doi.org\/10.1007\/3-540-45809-3_19","journal-title":"Lect. Notes Comput. Sci. (Incl. Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinform.)"},{"key":"761_CR120","doi-asserted-by":"publisher","unstructured":"Lee, H., Kobsa, A.: Privacy preference modeling and prediction in a simulated campuswide IoT environment. In: 2017 IEEE International Conference on Pervasive Computing and Communications, pp. 276\u2013285. PerCom, (2017). https:\/\/doi.org\/10.1109\/PERCOM.2017.7917874","DOI":"10.1109\/PERCOM.2017.7917874"},{"key":"761_CR121","unstructured":"Emami-Naeini, P. et al.: Privacy expectations and preferences in an IoT world. In: Proceedings of the 13th Symposium on Usable Privacy and Security, SOUPS 2017. pp. 399\u2013412, (2019). Accessed from 22 Feb 2019. [Online]. Available: https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/naeini"},{"key":"761_CR122","doi-asserted-by":"publisher","unstructured":"Mikusz, M., Houben, S., Davies, N., Moessner, K., Langheinrich, M.: Raising awareness of IoT sensor deployments. In: IET Conference Publications, vol. 2018, no. CP740, (2018). https:\/\/doi.org\/10.1049\/cp.2018.0009","DOI":"10.1049\/cp.2018.0009"},{"issue":"5","key":"761_CR123","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557\u2013570 (2002). https:\/\/doi.org\/10.1142\/S0218488502001648","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"761_CR124","doi-asserted-by":"publisher","unstructured":"Sklavos, N., Zaharakis, I.D.: Cryptography and security in internet of things (IoTs): models, schemes, and implementations, (2016). https:\/\/doi.org\/10.1109\/NTMS.2016.7792443","DOI":"10.1109\/NTMS.2016.7792443"},{"key":"761_CR125","unstructured":"Hu, V., Kuhn, D., Ferraiolo, D.: J. V.- Computer, and U. 2015, \u201cAttribute-based access control. ieeexplore.ieee.org, (2015). Accessed from 23 Oct 2021. [Online]. Available: https:\/\/ieeexplore.ieee.org\/abstract\/document\/7042715\/"},{"issue":"2","key":"761_CR126","doi-asserted-by":"publisher","first-page":"47","DOI":"10.4018\/IJISP.2019040104","volume":"13","author":"M Boldt","year":"2019","unstructured":"Boldt, M., Rekanar, K.: Analysis and text classification of privacy policies from rogue and top-100 fortune global companies. Int. J. Inf. Secur. Priv. 13(2), 47\u201366 (2019). https:\/\/doi.org\/10.4018\/IJISP.2019040104","journal-title":"Int. J. Inf. Secur. Priv."},{"key":"761_CR127","doi-asserted-by":"publisher","unstructured":"Amos, R., Acar, G., Lucherini, E., Kshirsagar, M., Narayanan, A., Mayer, J.: Privacy policies over time: curation and analysis of a million-document dataset. In: The Web Conference 2021 - Proceedings of the World Wide Web Conference, pp. 2165\u20132176. WWW, (2021). https:\/\/doi.org\/10.1145\/3442381.3450048","DOI":"10.1145\/3442381.3450048"},{"key":"761_CR128","doi-asserted-by":"crossref","unstructured":"Flach, P.: Machine learning: the art and science of algorithms that make sense of data, (2012).","DOI":"10.1017\/CBO9780511973000"},{"key":"761_CR129","unstructured":"Fawcett, T.: \u201cROC graphs: Notes and practical considerations for researchers. Mach. Learn., vol. 31, no. 1, pp. 1\u201338, (2004). Accessed from 23 Oct 2021. [Online]. Available: https:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.123.4749&rep=rep1&type=pdf"},{"key":"761_CR130","doi-asserted-by":"crossref","unstructured":"Zhu, X., Davidson, I.: Knowledge discovery and data mining: challenges and realities, (2007)","DOI":"10.4018\/978-1-59904-252-7"},{"key":"761_CR131","doi-asserted-by":"publisher","unstructured":"Urban, T., Degeling, M., Holz, T., Pohlmann, N.: Your hashed IP address: Ubuntu. Perspectives on transparency tools for online advertising. In: ACM International Conference Proceeding Series, pp. 702\u2013717, (2019). https:\/\/doi.org\/10.1145\/3359789.3359798","DOI":"10.1145\/3359789.3359798"},{"key":"761_CR132","doi-asserted-by":"publisher","unstructured":"Bufalieri, L., La Morgia, M., Mei, A., Stefa, J.: GDPR: when the right to access personal data becomes a threat. In: Proceedings - 2020 IEEE 13th International Conference on Web Services, pp. 75\u201383. ICWS, (2020). https:\/\/doi.org\/10.1109\/ICWS49710.2020.00017","DOI":"10.1109\/ICWS49710.2020.00017"},{"key":"761_CR133","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106608","author":"MB Hosseini","year":"2021","unstructured":"Hosseini, M.B., Breaux, T.D., Slavin, R., Niu, J., Wang, X.: Analyzing privacy policies through syntax-driven semantic analysis of information types. Inf. Softw. Technol. (2021). https:\/\/doi.org\/10.1016\/j.infsof.2021.106608","journal-title":"Inf. Softw. Technol."},{"key":"761_CR134","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102769","author":"Y Fan","year":"2020","unstructured":"Fan, Y., et al.: Privacy preserving based logistic regression on big data. J. Netw. Comput. Appl. (2020). https:\/\/doi.org\/10.1016\/j.jnca.2020.102769","journal-title":"J. Netw. Comput. Appl."},{"key":"761_CR135","doi-asserted-by":"publisher","unstructured":"Mustapha, M., Krasnashchok, K., Al Bassit, A., Skhiri, S.: Computer privacy classification with XLNet (Short Paper). In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12484, pp. 250\u2013257. LNCS, (2020). https:\/\/doi.org\/10.1007\/978-3-030-66172-4_16","DOI":"10.1007\/978-3-030-66172-4_16"},{"issue":"1","key":"761_CR136","doi-asserted-by":"publisher","first-page":"6","DOI":"10.4103\/mamcjms.mamcjms_50_16","volume":"3","author":"S Labani","year":"2017","unstructured":"Labani, S., Wadhwa, K., Asthana, S.: Basic approach to data analysis and writing of results and discussion sections. MAMC J. Med. Sci. 3(1), 6 (2017). https:\/\/doi.org\/10.4103\/mamcjms.mamcjms_50_16","journal-title":"MAMC J. Med. Sci."},{"issue":"2","key":"761_CR137","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1016\/j.jnca.2010.10.009","volume":"34","author":"MY Su","year":"2011","unstructured":"Su, M.Y.: Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification. J. Netw. Comput. Appl. 34(2), 722\u2013730 (2011). https:\/\/doi.org\/10.1016\/j.jnca.2010.10.009","journal-title":"J. Netw. Comput. Appl."},{"key":"761_CR138","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.cose.2014.11.008","volume":"49","author":"DW Kim","year":"2015","unstructured":"Kim, D.W., Yan, P., Zhang, J.: Detecting fake anti-virus software distribution webpages. Comput. Secur. 49, 95\u2013106 (2015). https:\/\/doi.org\/10.1016\/j.cose.2014.11.008","journal-title":"Comput. Secur."},{"key":"761_CR139","doi-asserted-by":"publisher","unstructured":"Sarne, D., Schler, J., Singer, A., Sela, A., Tov, I.B.S.: Unsupervised topic extraction from privacy policies. In; The Web Conference 2019 - Companion of the World Wide Web Conference, pp. 563\u2013568. WWW, (2019). https:\/\/doi.org\/10.1145\/3308560.3317585","DOI":"10.1145\/3308560.3317585"},{"issue":"8","key":"761_CR140","doi-asserted-by":"publisher","first-page":"2824","DOI":"10.1177\/1461444817733134","volume":"20","author":"E Jardine","year":"2018","unstructured":"Jardine, E.: Privacy, censorship, data breaches and Internet freedom: the drivers of support and opposition to Dark Web technologies. New Media Soc. 20(8), 2824\u20132843 (2018). https:\/\/doi.org\/10.1177\/1461444817733134","journal-title":"New Media Soc."},{"key":"761_CR141","doi-asserted-by":"publisher","DOI":"10.1016\/j.invent.2019.100243","author":"JM Robillard","year":"2019","unstructured":"Robillard, J.M., et al.: Availability, readability, and content of privacy policies and terms of agreements of mental health apps. Internet Interv. (2019). https:\/\/doi.org\/10.1016\/j.invent.2019.100243","journal-title":"Internet Interv."},{"key":"761_CR142","doi-asserted-by":"publisher","unstructured":"Tomuro, N., Lytinen, S., Hornsburg, K.: Automatic summarization of privacy policies using ensemble learning. In: CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy, pp. 133\u2013135, (2016). https:\/\/doi.org\/10.1145\/2857705.2857741","DOI":"10.1145\/2857705.2857741"},{"key":"761_CR143","doi-asserted-by":"publisher","unstructured":"Audich, D.A., Dara, R., Nonnecke, B.: Extracting keyword and keyphrase from online privacy policies. In: 2016 11th International Conference on Digital Information Management, pp. 127\u2013132. ICDIM, (2016). https:\/\/doi.org\/10.1109\/ICDIM.2016.7829792","DOI":"10.1109\/ICDIM.2016.7829792"},{"key":"761_CR144","doi-asserted-by":"publisher","unstructured":"Fabian, B., Ermakova, T., Lentz, T.: Large-scale readability analysis of privacy policies. In: Proceedings - 2017 IEEE\/WIC\/ACM International Conference on Web Intelligence, pp. 18\u201325. WI, (2017). https:\/\/doi.org\/10.1145\/3106426.3106427","DOI":"10.1145\/3106426.3106427"},{"key":"761_CR145","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-319-95276-5_3","volume":"528","author":"DA Audich","year":"2018","unstructured":"Audich, D.A., Dara, R., Nonnecke, B.: Computer privacy annotation for semi-automated analysis: a cost-effective approach. IFIP Adv. Inf. Commun. Technol. 528, 29\u201344 (2018). https:\/\/doi.org\/10.1007\/978-3-319-95276-5_3","journal-title":"IFIP Adv. Inf. Commun. Technol."},{"key":"761_CR146","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.jpdc.2019.09.009","volume":"135","author":"W Fan","year":"2020","unstructured":"Fan, W., He, J., Guo, M., Li, P., Han, Z., Wang, R.: Privacy preserving classification on local differential privacy in data centers. J. Parallel Distrib. Comput. 135, 70\u201382 (2020). https:\/\/doi.org\/10.1016\/j.jpdc.2019.09.009","journal-title":"J. Parallel Distrib. Comput."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00761-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00761-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00761-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T07:35:36Z","timestamp":1711524936000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00761-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,31]]},"references-count":146,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["761"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00761-4","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,31]]},"assertion":[{"value":"11 September 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 October 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}