{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T14:10:18Z","timestamp":1774534218551,"version":"3.50.1"},"reference-count":64,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/legalcode"}],"funder":[{"name":"European Union\u2019s Horizon 2020 Research and Innovation Programme under the Marie Sk\u0142odowska-Curie","award":["675730"],"award-info":[{"award-number":["675730"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/access.2017.2765539","type":"journal-article","created":{"date-parts":[[2017,10,23]],"date-time":"2017-10-23T18:47:36Z","timestamp":1508784456000},"page":"22965-22991","source":"Crossref","is-referenced-by-count":69,"title":["Tools for Achieving Usable Ex Post Transparency: A Survey"],"prefix":"10.1109","volume":"5","author":[{"given":"Patrick","family":"Murmann","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6938-4466","authenticated-orcid":false,"given":"Simone","family":"Fischer-Hubner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2012.6297922"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078846"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01244-0_20"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1456377.1456380"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.328"},{"key":"ref30","first-page":"91","volume":"4717","author":"hsieh","year":"2007","journal-title":"Field Deployment of IMBuddy A Study of Privacy Control and Feedback Mechanisms for Contextual IM"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864364"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.51"},{"key":"ref35","first-page":"2003","article-title":"Who&#x2019;s viewed you? The impact of feedback in a mobile location-sharing application","author":"tsai","year":"2009","journal-title":"Proc Conf Hum Factors Comput Syst"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0214-3"},{"key":"ref60","first-page":"338","article-title":"Towards displaying privacy information with icons","author":"holtz","year":"2010","journal-title":"IFIP Primelife International Summer School on Privacy and Identity Management for Life"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2855321.2855374"},{"key":"ref61","first-page":"125","article-title":"A brief evaluation of icons in the first reading of the European parliament on COM (2012) 0011","author":"pettersson","year":"2014","journal-title":"IFIP Primelife International Summer School on Privacy and Identity Management for Life"},{"key":"ref63","author":"angulo","year":"2015","journal-title":"D-5 3 user-centric transparency tools V2"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2732701"},{"key":"ref64","first-page":"19","article-title":"&#x2018;WTH..!?!&#x2019; Experiences, reactions, and expectations related to online privacy panic situations","author":"angulo","year":"2015","journal-title":"Proc Symp Usable Privacy and Security (SOUPS ' 08"},{"key":"ref27","first-page":"3","article-title":"Transparency, privacy and trust&#x2014;Technology for tracking and controlling my data disclosures: Does this work?","author":"fischer-h\u00fcbner","year":"2017","journal-title":"Proc IFIP Int Conf Trust Manage"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-55783-0_12"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10550-006-0098-6"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2005.1577157"},{"key":"ref20","year":"2016","journal-title":"Inspec"},{"key":"ref22","year":"2016","journal-title":"ACM Digital Library"},{"key":"ref21","year":"2016","journal-title":"Dblp computer science bibliography"},{"key":"ref24","article-title":"Usable transparency enhancing tools: A literature review","author":"murmann","year":"2017"},{"key":"ref23","year":"2016","journal-title":"IEEE Xplore Digital Library"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31456-3_3"},{"key":"ref25","first-page":"131","article-title":"Increasing service users&#x2019; privacy awareness by introducing on-line interactive privacy features","author":"kani-zabihi","year":"2011","journal-title":"16th Nordic Conference in Secure IT Systems (NordSec)"},{"key":"ref50","first-page":"515","article-title":"Classification and categorization: A difference that makes a difference","volume":"52","author":"jacob","year":"2004","journal-title":"Library Trends"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475-6773.2006.00684.x"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073007"},{"key":"ref58","article-title":"Ergonomics of human-system interaction&#x2014;Usability methods supporting human-centered-design","year":"2002"},{"key":"ref57","article-title":"Ergonomics of human-system interaction&#x2014;Part 210: Humancentered design for interactive systems","year":"2010"},{"key":"ref56","year":"2016","journal-title":"Regulation 2016\/680 of the European Parliament and of the Council"},{"key":"ref55","author":"pulls","year":"2016","journal-title":"Tracking and Data"},{"key":"ref54","first-page":"77","article-title":"How can cloud users be supported in deciding on, tracking and controlling how their data are used?","author":"fischer-h\u00fcbner","year":"2013","journal-title":"IFIP Primelife International Summer School on Privacy and Identity Management for Life"},{"key":"ref53","first-page":"22","article-title":"The role of classification in knowledge represantation and discovery","volume":"48","author":"kwasnik","year":"1999","journal-title":"Library Trends"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2011.36"},{"key":"ref10","year":"2016","journal-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation)"},{"key":"ref11","author":"hildebrandt","year":"2009","journal-title":"Behavioural Biometric Profiling and Transparency Enhancing Tools WP7 Deliverable"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501616"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/STAST.2013.11"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03315-5_5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40956-4_8"},{"key":"ref15","article-title":"Ergonomics of human-system interaction&#x2014;Part 210: Humancentered design for interactive systems","year":"1998"},{"key":"ref16","article-title":"Ergonomics of human-system interaction&#x2014;Part 110: Dialogue principles","year":"2006"},{"key":"ref17","first-page":"25","article-title":"Heuristic Evaluation","volume":"17","author":"nielsen","year":"1994","journal-title":"Usability Inspection Methods"},{"key":"ref18","first-page":"13","article-title":"Analyzing the past to prepare for the future: Writing a literature review","volume":"26","author":"webster","year":"2002","journal-title":"MIS Quart"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.07.010"},{"key":"ref4","article-title":"Privacy and data protection by design&#x2014;From policy to engineering","author":"danezis","year":"2014"},{"key":"ref3","first-page":"1131","article-title":"The boundaries of privacy harm","volume":"86","author":"calo","year":"2011","journal-title":"The Ind LJ"},{"key":"ref6","year":"2017","journal-title":"Online Dictionary"},{"key":"ref5","article-title":"Volkszahlungsurteil","volume":"65","author":"court","year":"1983","journal-title":"BVerfGE"},{"key":"ref8","year":"2017","journal-title":"Oxford Dictionary Online"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-009-9187-9"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2890546"},{"key":"ref9","year":"2013","journal-title":"The OECD Privacy Framework"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699114"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2523820"},{"key":"ref48","first-page":"135","volume":"9857","author":"bier","year":"2016","journal-title":"PrivacyInsight The Next Generation Privacy Dashboard"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2015.69"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2513456.2513467"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493510"},{"key":"ref44","first-page":"366","volume":"8030","author":"zavou","year":"2013","journal-title":"Cloudopsy An Autopsy of Data Flows in the Cloud"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.29"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/7859429\/08078167.pdf?arnumber=8078167","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:26:11Z","timestamp":1642004771000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8078167\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":64,"URL":"https:\/\/doi.org\/10.1109\/access.2017.2765539","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}