{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T08:05:21Z","timestamp":1775289921393,"version":"3.50.1"},"reference-count":92,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/cybersa.2018.8551442","type":"proceedings-article","created":{"date-parts":[[2018,11,29]],"date-time":"2018-11-29T19:11:06Z","timestamp":1543518666000},"page":"1-8","source":"Crossref","is-referenced-by-count":33,"title":["How to Make Privacy Policies both GDPR-Compliant and Usable"],"prefix":"10.1109","author":[{"given":"Karen","family":"Renaud","sequence":"first","affiliation":[]},{"given":"Lynsay A.","family":"Shepherd","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.12.008"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00006-3"},{"key":"ref71","article-title":"Online Trust in the Greek context: The influence of perceived companys reputation on consumers trust and the effects of trust on intention for online transactions","author":"broutsou","year":"2012","journal-title":"the Proceedings of the Management of International Business and Economic Systems (MIBES-ESDO) 2012 International Conference School of Management and Economics TEI of Larissa"},{"key":"ref70","first-page":"199","article-title":"Understanding Consumers&#x2019; Trust in Internet Financial Sales Platform: Evidence from Yuebao","author":"sun","year":"2014","journal-title":"Pacific Asia Conference on Information Systems (PACIS)"},{"key":"ref76","doi-asserted-by":"crossref","first-page":"1373","DOI":"10.21917\/ijct.2016.0203","article-title":"Evaluating effectiveness of mobile browser security warnings","volume":"7","author":"shah","year":"2016","journal-title":"ICTACT JOURNAL on COMMUNICATIon TECHNOLOGY"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58735-6_10"},{"key":"ref74","article-title":"Privacy design patterns and anti-patterns","author":"doty","year":"2013","journal-title":"Trustbusters Workshop at the Symposium on Usable Privacy and Security"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501613"},{"key":"ref75","article-title":"Understanding and capturing people&#x2019;s mobile app privacy preferences","author":"lin","year":"2013","journal-title":"Ph D Dissertation"},{"key":"ref38","article-title":"How Privacy Policy Affects Sign-Ups &#x2014; Surprising Data From 4 A\/B Tests","author":"aagaard","year":"2013"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1080\/01449290903004012"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)CO.1943-7862.0001221"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2008.82"},{"key":"ref32","author":"mikowski","year":"2013","journal-title":"Single-page-application"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07620-1_37"},{"key":"ref30","first-page":"557","article-title":"All you need is trust &#x2014; an analysis of trust measures communicated by cloud providers","author":"gantner","year":"2015","journal-title":"Confederated International Conferences On the Move to Meaningful Internet Systems"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2004.01.003"},{"key":"ref36","article-title":"Aligning privacy and usability: Designing a privacy-aware mobile application that people can use","author":"nafra","year":"2014","journal-title":"Master&#x2019;s thesis"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.4135\/9781483384436.n1"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1068\/a43283"},{"key":"ref60","article-title":"You Want Me To Do What? A Design Study of Two-Factor Authentication Messages","author":"redmiles","year":"2017","journal-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017)"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.75"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1080\/026870300401234"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctt9qgrdf"},{"key":"ref28","article-title":"GDPR Data Retention Quick Guide","year":"2017"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2009.09.021"},{"key":"ref27","article-title":"Special Category Data","year":"0"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.06.003"},{"key":"ref66","first-page":"1","article-title":"A design space for effective privacy notices","author":"schaub","year":"2015","journal-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS 2015)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1108\/13552550310476184"},{"key":"ref67","article-title":"Probing the design space of usable privacy policies: A qualitative exploration of a reimagined privacy policy","author":"jones","year":"2017","journal-title":"Proc BHCI"},{"key":"ref68","article-title":"Framing and the malleability of privacy choices","author":"adjerid","year":"2014","journal-title":"Proceedings of the 13th Workshop on the Economics of Information Security"},{"key":"ref69","article-title":"Formal versus informal privacy contracts: Comparing the impact of privacy notices and norms on consumer trust online","author":"martin","year":"2015"},{"key":"ref2","article-title":"Merging technical guidelines for accessible web content with universal design principles","author":"almeida","year":"2010","journal-title":"Tech Rep IC-10-020"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00071.x"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"},{"key":"ref22","first-page":"1","article-title":"A framework for reasoning about the human in the loop","volume":"8","author":"cranor","year":"2008","journal-title":"UPSEC"},{"key":"ref21","first-page":"215","article-title":"The Structure and Function of Communication in Society","volume":"37","author":"lasswell","year":"1948","journal-title":"The Communication of Ideas"},{"key":"ref24","first-page":"667","article-title":"Privacy versus Security","volume":"103","author":"bambauer","year":"2013","journal-title":"J Crim L & Criminology"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-993-9.ch058"},{"key":"ref26","article-title":"Art. 6 GDPR Lawfulness of processing","author":"consulting","year":"2016"},{"key":"ref25","article-title":"GDPR: What&#x2019;s your justification?","author":"cormack","year":"2017"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/978-3-642-20633-7_18","article-title":"Interface design elements for anti-phishing systems","author":"chen","year":"2011","journal-title":"Proceedings of the 6th International Conference on Service-oriented Perspectives in Design Science Research"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702322"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1177\/1461444806069652"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2005.00018.x"},{"key":"ref90","first-page":"171","article-title":"The crisis of consent: How stronger legal protection may lead to weaker consent in data protection","volume":"16","author":"schermer","year":"2014","journal-title":"Ethics and Information Technology"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CSS.2011.6058566"},{"key":"ref58","article-title":"Effective communication of cyber security risks","author":"nurse","year":"2013","journal-title":"7th International Scientific Conference on Security and Protection of Information (SPI 2013)"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23260"},{"key":"ref56","first-page":"215","author":"messaris","year":"2001","journal-title":"The role of images in framing news stories"},{"key":"ref55","doi-asserted-by":"crossref","DOI":"10.4135\/9781452233444","author":"messaris","year":"1997","journal-title":"Visual Persuasion The Role of Images in Advertising"},{"key":"ref54","article-title":"What local consumers want most from local business websites","author":"merchant","year":"2017"},{"key":"ref53","first-page":"272","article-title":"The effect of website design dimensions on initial trust: a synthesis of the empirical literature","volume":"12","author":"karimov","year":"2011","journal-title":"Journal of Electronic Commerce Research"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2016.1243947"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1177\/154193120905302015"},{"key":"ref11","article-title":"Users aren&#x2019;t (necessarily) lazy: using neuroIS to explain habituation to security warnings","author":"anderson","year":"2014","journal-title":"Thirty Fifth International Conference on Information Systems"},{"key":"ref40","article-title":"A user-tailored approach to privacy decision support","author":"knijnenburg","year":"2015","journal-title":"Ph D Dissertation"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180426"},{"key":"ref13","first-page":"12","article-title":"Little brother&#x2019;s watching you: Raising awareness of data leaks on smart-phones","author":"balebako","year":"2013","journal-title":"Proceedings of the Ninth Symposium on Usable Privacy and Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1520340.1520484"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.11.004"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382301"},{"key":"ref16","first-page":"21","article-title":"How to design browser security and privacy alerts","author":"shepherd","year":"2018","journal-title":"Proceedings of the AISB 2018 Symposium on Digital Behaviour Intervention for Cyber Security"},{"key":"ref81","article-title":"Sorry, I Don&#x2019;t Get It: An Analysis of Warning Message Texts","author":"harbach","year":"2013","journal-title":"Proceedings of the 2013 International Conference on Financial Cryptography and Data Security (FC13) Workshop on Usable Security"},{"key":"ref17","article-title":"Warning design","author":"wogalter","year":"2017","journal-title":"Information Design Research and Practice"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-009-9247-9"},{"key":"ref18","first-page":"93","article-title":"Factors Influencing the Effectiveness of Warnings","author":"wogalter","year":"1999","journal-title":"Visual Information for Everyday Use Design and Research Perspectives"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16441-5_16"},{"key":"ref19","first-page":"15","article-title":"Organizing theoretical framework: a consolidated communication-human information processing (c-hip) model","author":"wogalter","year":"1999","journal-title":"Warnings and Risk Communication"},{"key":"ref80","article-title":"Warning! A comprehensive model of the effects of digital information security warning messages","author":"silic","year":"2015","journal-title":"The 2015 Dewald Roode Workshop on Information Systems Security Research"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2014.6815237"},{"key":"ref4","first-page":"39","article-title":"Disagreeable privacy policies: Mismatches between meaning and users&#x2019; understanding","volume":"30","author":"reidenberg","year":"2015","journal-title":"Berkeley Tech LJ"},{"key":"ref3","article-title":"Home Page of EU GDPR","author":"parliament","year":"2018"},{"key":"ref6","article-title":"Preparing for the General Data Protection Regulation (GDPR) - 12 Steps to Take Now","year":"2018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2780305"},{"key":"ref85","article-title":"Trust and the perception of security","author":"d\u2019hertefelt","year":"2000"},{"key":"ref8","article-title":"The biggest lie on the internet: Ignoring the privacy policies and terms of service policies of social networking services","author":"obar","year":"2016","journal-title":"TPRC 44 The 44th Research Conference on Communication Information and Internet Policy"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702442"},{"key":"ref7","article-title":"Facebook and Cambridge Analytica: What You Need to Know as Fallout Widens","author":"granville","year":"2018"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3851-8"},{"key":"ref87","article-title":"Alice in warningland: A large-scale field study of browser security warning effectiveness","volume":"13","author":"akhawe","year":"2013","journal-title":"USENIX Security Symposium"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.18489\/sacj.v29i3.438"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1145\/1357054.1357219","article-title":"You&#x2019;ve been warned: an empirical study of the effectiveness of web browser phishing warnings","author":"egelman","year":"2008","journal-title":"Proceedings of the SIGCHI conference on Human factors in computing systems"},{"key":"ref46","article-title":"Privacy agents in the IoT: considerations on how to balance agent autonomy and user control in privacy decisions","author":"colnago","year":"2016","journal-title":"Ph D Dissertation"},{"key":"ref45","article-title":"HCI Guidelines PRIME (Privacy and Identity Management for Europe) EU Project Report","author":"petterson","year":"2008"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-3-642-45135-5_9","article-title":"Recommendation delivery","author":"murphy-hill","year":"2014","journal-title":"Recommendation Systems in Software Engineering Springer"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07620-1_37"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22846-4_7"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1284621.1284627"},{"key":"ref44","first-page":"578","article-title":"A usability study on the privacy policy visualization model","author":"albalawi","year":"2016","journal-title":"IEEE 14th Intl Conf on Dependable Autonomic and Secure Computing"},{"key":"ref43","article-title":"State of Texas Municipal Web Sites: A Description of Website Attributes and Features of Municipalities with Populations Between 50,000-125,000","author":"goldberg","year":"2009","journal-title":"Master&#x2019;s thesis"}],"event":{"name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","location":"Glasgow","start":{"date-parts":[[2018,6,11]]},"end":{"date-parts":[[2018,6,12]]}},"container-title":["2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536739\/8551360\/08551442.pdf?arnumber=8551442","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T07:26:01Z","timestamp":1775287561000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8551442\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":92,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2018.8551442","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}