{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:39:09Z","timestamp":1774946349875,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,4]],"date-time":"2013-11-04T00:00:00Z","timestamp":1383523200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,4]]},"DOI":"10.1145\/2517840.2517864","type":"proceedings-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T15:29:36Z","timestamp":1384270176000},"page":"291-296","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["No surprises"],"prefix":"10.1145","author":[{"given":"Frances","family":"Zhang","sequence":"first","affiliation":[{"name":"MIT Computer Science and Artificial Intelligence Lab, Cambridge, Massachusetts, USA"}]},{"given":"Fuming","family":"Shih","sequence":"additional","affiliation":[{"name":"MIT Computer Science and Artificial Intelligence Lab, Cambridge, Massachusetts, USA"}]},{"given":"Daniel","family":"Weitzner","sequence":"additional","affiliation":[{"name":"MIT Computer Science and Artificial Intelligence Lab, Cambridge, Massachusetts, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Mar.","author":"Boyd D.","year":"2010","unstructured":"D. Boyd . Making sense of privacy and publicity , Mar. 2010 . D. Boyd. Making sense of privacy and publicity, Mar. 2010."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335358"},{"key":"e_1_3_2_1_3_1","volume-title":"OSDI'10","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B.-G. Chun , L. P. Cox , J. Jung , P. McDaniel , and A. N. Sheth . Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones . OSDI'10 . USENIX Association , 2010 . W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. OSDI'10. USENIX Association, 2010."},{"key":"e_1_3_2_1_4_1","volume-title":"March","author":"Federal Trade Commission","year":"2012","unstructured":"Federal Trade Commission . Protecting Consumer Privacy in an Era of Rapid Change , March 2012 . Federal Trade Commission. Protecting Consumer Privacy in an Era of Rapid Change, March 2012."},{"key":"e_1_3_2_1_6_1","volume-title":"Yale LJ","author":"Gavison R.","year":"1979","unstructured":"R. Gavison . Privacy and the Limits of Law . Yale LJ , 1979 . R. Gavison. Privacy and the Limits of Law. Yale LJ, 1979."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029194"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34638-5_6"},{"key":"e_1_3_2_1_11_1","volume-title":"ACM SOUPS '12","author":"King J.","year":"2012","unstructured":"J. King . \" How come I'm Allowing Strangers to Go Through My Phone?\" : Smart Phones and Privacy Expectations . In ACM SOUPS '12 , 2012 . J. King. \"How come I'm Allowing Strangers to Go Through My Phone?\": Smart Phones and Privacy Expectations. In ACM SOUPS '12, 2012."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1620545.1620547"},{"key":"e_1_3_2_1_14_1","volume-title":"NIST","author":"McCallister E.","year":"2010","unstructured":"E. McCallister , T. Grance , and K. Scarfone . Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) -Recommendations of the National Institute of Standards and Technology. Technical report , NIST , April 2010 . E. McCallister, T. Grance, and K. Scarfone. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) -Recommendations of the National Institute of Standards and Technology. Technical report, NIST, April 2010."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1822585"},{"key":"e_1_3_2_1_16_1","author":"Schwartz P.","year":"2011","unstructured":"P. Schwartz and D. Solove . The PII Problem: Privacy and a New Concept of Personally Identifiable Information. New York University Law Review , Aug. 2011 . P. Schwartz and D. Solove. The PII Problem: Privacy and a New Concept of Personally Identifiable Information. New York University Law Review, Aug. 2011.","journal-title":"New York University Law Review"},{"key":"e_1_3_2_1_17_1","volume-title":"Consumer data privacy in a networked world: A framework for protecting privacy and promoting innovation in the global digital economy","author":"House White","year":"2012","unstructured":"White House . Consumer data privacy in a networked world: A framework for protecting privacy and promoting innovation in the global digital economy . February 2012 . White House. Consumer data privacy in a networked world: A framework for protecting privacy and promoting innovation in the global digital economy. February 2012."}],"event":{"name":"CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security","location":"Berlin Germany","acronym":"CCS'13","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517840.2517864","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2517840.2517864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:15Z","timestamp":1750232055000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517840.2517864"}},"subtitle":["measuring intrusiveness of smartphone applications by detecting objective context deviations"],"short-title":[],"issued":{"date-parts":[[2013,11,4]]},"references-count":15,"alternative-id":["10.1145\/2517840.2517864","10.1145\/2517840"],"URL":"https:\/\/doi.org\/10.1145\/2517840.2517864","relation":{},"subject":[],"published":{"date-parts":[[2013,11,4]]},"assertion":[{"value":"2013-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}