{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T09:15:53Z","timestamp":1775639753604,"version":"3.50.1"},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Profess. Commun."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/tpc.2021.3110617","type":"journal-article","created":{"date-parts":[[2021,11,11]],"date-time":"2021-11-11T20:28:58Z","timestamp":1636662538000},"page":"354-373","source":"Crossref","is-referenced-by-count":18,"title":["Privacy Rating: A User-Centered Approach for Visualizing Data Handling Practices of Online Services"],"prefix":"10.1109","volume":"64","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4611-7901","authenticated-orcid":false,"given":"Susanne","family":"Barth","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1404-3584","authenticated-orcid":false,"given":"Dan","family":"Ionita","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7128-6016","authenticated-orcid":false,"given":"Menno","family":"de Jong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0411-0421","authenticated-orcid":false,"given":"Pieter","family":"Hartel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9515-9860","authenticated-orcid":false,"given":"Marianne","family":"Junger","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808119"},{"key":"ref39","article-title":"(2011 Jan.). Privacy by design. The 7 foundational principles. Tech. rep. (revised version), Information and Privacy Commissioner of Ontario","author":"cavoukian","year":"0"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45427-6_23"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1108\/ITP-08-2017-0241"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.21552\/edpl\/2019\/3\/9"},{"key":"ref31","article-title":"Communicating compliance: Developing a GDPR privacy label","author":"fox","year":"2018","journal-title":"Proc 24th Am Conf Inf Syst"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3180445.3180447"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2017.04.013"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v11i9.1394"},{"key":"ref35","volume":"119","year":"2016","journal-title":"Regulation (eu) 2016\/679 of the european parliament and of the council of 27 april 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing directive 95\/46\/ec"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45691-7_75"},{"key":"ref60","article-title":"(2011). Privacy icons. Mozilla Wiki.","author":"moskowitz","year":"0"},{"key":"ref62","author":"pinnick","year":"2011","journal-title":"Privacy short notice design"},{"key":"ref61","article-title":"(2011). PrimeLife&#x2014;Privacy and identity management in Europe for life: Final HCI Res. Rep.","author":"graf","year":"2011"},{"key":"ref63","article-title":"Privacy Label. Blog series part I-IV. Sensor lab","author":"franke","year":"2019"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025556"},{"key":"ref64","year":"2020","journal-title":"Upgrade Your Privacy Statement Privacy Label Helps You Communicate How You Use Data"},{"key":"ref27","first-page":"181","article-title":"DAPIS: An ontology-based data protection icon set","author":"rossi","year":"2019","journal-title":"Knowledge of the Law in the Big Data Age"},{"key":"ref65","first-page":"1703","article-title":"Putting privacy pictograms into practice. A European perspective","author":"hansen","year":"2009","journal-title":"Informatik 2009&#x2013;Im Focus das Leben"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1162\/DAED_a_00113"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2018.8551442"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1515\/til-2019-0008"},{"key":"ref68","year":"2017","journal-title":"Regulation (EU) 2017\/1369 of the European Parliament and of the Council of 4 July 2017 Setting a Framework For Energy Labelling and Repealing Directive 2010\/30\/EU Legislation OJ L 198 28 7 2017"},{"key":"ref69","year":"2020","journal-title":"Energy Label Templates"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2004.tb00865.x"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0501-34"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20769-3_27"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v17i7.4010"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20317-6_15"},{"key":"ref24","article-title":"(2014-2015). The use of privacy icons and standard contract terms for generating consumer trust and confidence in digital services. CREATe working paper. Centre for Copyright and New Business Models in the Creative Economy (CREATe)","author":"edwards","year":"2014"},{"key":"ref23","first-page":"125","article-title":"A brief evaluation of icons in the first reading of the European Parliament on COM (2012) 0011","author":"petterson","year":"2012","journal-title":"Privacy and Identity Management for the Future Internet in the Age of Globalisation"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CeDEM.2017.23"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46963-8_4"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1086\/688405"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00071.x"},{"key":"ref59","article-title":"KnowPrivacy","author":"gomez","year":"0"},{"key":"ref58","article-title":"Iconset for data-privacy declarations. v0.1.","author":"mehldau","year":"0"},{"key":"ref57","article-title":"Understanding online privacy: A systematic review of privacy visualizations and privacy by design guidelines","author":"barth","year":"2021"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2019.11.084"},{"key":"ref55","first-page":"226","article-title":"Privacy awareness: A means to solve the privacy paradox?","author":"p\u00f6tzsch","year":"2008","journal-title":"The Future of Identity"},{"key":"ref54","first-page":"275","article-title":"Addressing the privacy paradox by expanded privacy awareness. The example of context-aware services","author":"deuker","year":"2009","journal-title":"Privacy and Identity Management for Life"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1177\/1050651918762029"},{"key":"ref52","first-page":"387","article-title":"Functional analysis for document design","volume":"51","author":"lentz","year":"2004","journal-title":"Tech Commun"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985752"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2013-002605"},{"key":"ref40","year":"0","journal-title":"Information Technology&#x2014;Security Techniques&#x2014;Privacy Framework"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1207\/s15506878jobem4903_1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2016.10.002"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1515\/9781503620766","author":"festinger","year":"1957","journal-title":"A Theory of Cognitive Dissonance"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2009.2017985"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1177\/1050651920959201"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753561"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2019.08.010"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1186\/s12916-015-0444-y"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1086\/708034"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0173284"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/10447310801937999"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91238-7_45"},{"key":"ref49","article-title":"Lost in privacy? Online privacy from a cybersecurity expert perspective","author":"barth","year":"2021"},{"key":"ref9","first-page":"179","article-title":"An analysis of app privacy statements","volume":"18","author":"prichard","year":"2017","journal-title":"Issues in Inform Syst"},{"key":"ref46","year":"2018","journal-title":"Deceived By Design How Tech Companies Use Dark Patterns to Discourage Us from Exercising Our Rights to Privacy"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2953739"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2019.03.003"},{"key":"ref47","article-title":"Toward an understanding of online privacy perceptions: Using the Q-sort method to identify different user perspectives","author":"barth","year":"2021"},{"key":"ref42","first-page":"86","article-title":"A solution, but not a panacea for defending privacy: The challenges, criticism and limitations of privacy by design","author":"klitou","year":"2012","journal-title":"Annual Privacy Forum"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1080\/13600869.2013.801589"},{"key":"ref44","first-page":"1","article-title":"Attitudes towards privacy by design in e-government: Views from the trenches","volume":"7","author":"gerunov","year":"2020","journal-title":"J Soc Administ Sci"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102124"}],"container-title":["IEEE Transactions on Professional Communication"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/47\/9626066\/09612118.pdf?arnumber=9612118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,15]],"date-time":"2023-01-15T00:40:13Z","timestamp":1673743213000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9612118\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":70,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tpc.2021.3110617","relation":{},"ISSN":["0361-1434","1558-1500"],"issn-type":[{"value":"0361-1434","type":"print"},{"value":"1558-1500","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]}}}