{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:18:14Z","timestamp":1750306694686,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,4,26]],"date-time":"2014-04-26T00:00:00Z","timestamp":1398470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,4,26]]},"DOI":"10.1145\/2559206.2579403","type":"proceedings-article","created":{"date-parts":[[2014,4,28]],"date-time":"2014-04-28T14:18:30Z","timestamp":1398694710000},"page":"1075-1080","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Electronic privacy and surveillance"],"prefix":"10.1145","author":[{"given":"Juan Pablo","family":"Hourcade","sequence":"first","affiliation":[{"name":"University of Iowa, Iowa City, IA, USA"}]},{"given":"Ann","family":"Cavoukian","sequence":"additional","affiliation":[{"name":"Office of the Information and Privacy Commissioner of Ontario, Toronto, Ontario, Canada"}]},{"given":"Ronald","family":"Deibert","sequence":"additional","affiliation":[{"name":"University of Toronto, Toronto, Ontario, Canada"}]},{"given":"Lorrie Faith","family":"Cranor","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Ian","family":"Goldberg","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, Ontario, Canada"}]}],"member":"320","published-online":{"date-parts":[[2014,4,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Alter A. (2012). Your E-Book Is Reading You. Available at http:\/\/online.wsj.com\/news\/articles\/SB10001424052702304870304577490950051438304  Alter A. (2012). Your E-Book Is Reading You. Available at http:\/\/online.wsj.com\/news\/articles\/SB10001424052702304870304577490950051438304"},{"key":"e_1_3_2_1_2_1","unstructured":"ACM ICPC (2011). 1993-94 18th Annual ACM International Collegiate Programming Contest Final Report. Available at https:\/\/ciiwiki.ecs.baylor.edu\/index.php\/History__ICPC_1994  ACM ICPC (2011). 1993-94 18th Annual ACM International Collegiate Programming Contest Final Report. Available at https:\/\/ciiwiki.ecs.baylor.edu\/index.php\/History__ICPC_1994"},{"key":"e_1_3_2_1_3_1","unstructured":"Ballman D. (2013). 10 New (And Legal) Ways Your Employer Is Spying On You. Available at http:\/\/jobs.aol.com\/articles\/2013\/09\/29\/new-ways-employer-spy\/  Ballman D. (2013). 10 New (And Legal) Ways Your Employer Is Spying On You. Available at http:\/\/jobs.aol.com\/articles\/2013\/09\/29\/new-ways-employer-spy\/"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381695"},{"key":"e_1_3_2_1_5_1","unstructured":"Cavoukian A. and Tapscott D. (1995). Who Knows: Safeguarding Your Privacy in a Networked World. Toronto Canada: Random House Canada.   Cavoukian A. and Tapscott D. (1995). Who Knows: Safeguarding Your Privacy in a Networked World. Toronto Canada: Random House Canada."},{"key":"e_1_3_2_1_6_1","unstructured":"Cavoukian A. and Hamilton T. J. (2002). The Privacy Payoff: How Successful Businesses Build Customer Trust. Toronto Canada: McGraw-Hill.  Cavoukian A. and Hamilton T. J. (2002). The Privacy Payoff: How Successful Businesses Build Customer Trust. Toronto Canada: McGraw-Hill."},{"key":"e_1_3_2_1_7_1","unstructured":"Cranor L. F. (2013). Lorrie Faith Cranor. Available at http:\/\/lorrie.cranor.org\/  Cranor L. F. (2013). Lorrie Faith Cranor. Available at http:\/\/lorrie.cranor.org\/"},{"key":"e_1_3_2_1_8_1","unstructured":"Deibert R. (2013). Ronald Deibert. Available at http:\/\/deibert.citizenlab.org\/  Deibert R. (2013). Ronald Deibert. Available at http:\/\/deibert.citizenlab.org\/"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci2103_2"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772727"},{"key":"e_1_3_2_1_11_1","unstructured":"Ferranti M. (2013). Report on NSA 'secret' payments to RSA fuels encryption controversy. Available at http:\/\/www.pcworld.com\/article\/2082720\/report-on-nsa-secret-payments-to-rsa-fuels-encryption-controversy.html  Ferranti M. (2013). Report on NSA 'secret' payments to RSA fuels encryption controversy. Available at http:\/\/www.pcworld.com\/article\/2082720\/report-on-nsa-secret-payments-to-rsa-fuels-encryption-controversy.html"},{"key":"e_1_3_2_1_12_1","unstructured":"FTC\n\n  \n   (2011). Facebook Settles FTC Charges That It Deceived Consumers By Failing To Keep Privacy Promises. Available at http:\/\/www.ftc.gov\/news-events\/press-releases\/2011\/11\/facebook-settles-ftc-charges-it-deceived-consumers-failing-keep  FTC (2011). Facebook Settles FTC Charges That It Deceived Consumers By Failing To Keep Privacy Promises. Available at http:\/\/www.ftc.gov\/news-events\/press-releases\/2011\/11\/facebook-settles-ftc-charges-it-deceived-consumers-failing-keep"},{"key":"e_1_3_2_1_13_1","unstructured":"Gellman B. and Soltani A. (2013). NSA collects millions of e-mail address books globally. http:\/\/www.washingtonpost.com\/world\/national-security\/nsa-collects-millions-of-e-mail-address-books-globally\/2013\/10\/14\/8e58b5be-34f9-11e3-80c6-7e6dd8d22d8f_story.html?hpid=z1  Gellman B. and Soltani A. (2013). NSA collects millions of e-mail address books globally. http:\/\/www.washingtonpost.com\/world\/national-security\/nsa-collects-millions-of-e-mail-address-books-globally\/2013\/10\/14\/8e58b5be-34f9-11e3-80c6-7e6dd8d22d8f_story.html?hpid=z1"},{"key":"e_1_3_2_1_14_1","unstructured":"Gellman B. and Soltani A. (2013). NSA tracking cellphone locations worldwide Snowden documents show. Available at http:\/\/www.washingtonpost.com\/world\/national-security\/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show\/2013\/12\/04\/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html  Gellman B. and Soltani A. (2013). NSA tracking cellphone locations worldwide Snowden documents show. Available at http:\/\/www.washingtonpost.com\/world\/national-security\/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show\/2013\/12\/04\/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html"},{"key":"e_1_3_2_1_15_1","unstructured":"Goldberg I. (2013). Ian Goldberg. Available at https:\/\/cs.uwaterloo.ca\/~iang\/  Goldberg I. (2013). Ian Goldberg. Available at https:\/\/cs.uwaterloo.ca\/~iang\/"},{"key":"e_1_3_2_1_16_1","unstructured":"Goldberg I. and Wagner D. (1996). Randomness and the Netscape Browser. Dr. Dobb's Journal. http:\/\/www.cs.berkeley.edu\/~daw\/papers\/ddj-netscape.html  Goldberg I. and Wagner D. (1996). Randomness and the Netscape Browser. Dr. Dobb's Journal. http:\/\/www.cs.berkeley.edu\/~daw\/papers\/ddj-netscape.html"},{"key":"e_1_3_2_1_17_1","unstructured":"Greenwald G. (2013). NSA collecting phone records of millions of Verizon customers daily. Available at http:\/\/www.theguardian.com\/world\/2013\/jun\/06\/nsa-phone-records-verizon-court-order  Greenwald G. (2013). NSA collecting phone records of millions of Verizon customers daily. Available at http:\/\/www.theguardian.com\/world\/2013\/jun\/06\/nsa-phone-records-verizon-court-order"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1561\/1100000004"},{"key":"e_1_3_2_1_19_1","unstructured":"International Mathematical Olympiad (2013). Ian Goldberg. Available at http:\/\/www.imo-official.org\/participant_r.aspx?id=1959  International Mathematical Olympiad (2013). Ian Goldberg. Available at http:\/\/www.imo-official.org\/participant_r.aspx?id=1959"},{"key":"e_1_3_2_1_20_1","unstructured":"IPC- Office of the Information Privacy Commissioner (2013). About the Commissioner. Available at http:\/\/www.ipc.on.ca\/english\/AboutUs\/About-The-Commissioner\/  IPC- Office of the Information Privacy Commissioner (2013). About the Commissioner. Available at http:\/\/www.ipc.on.ca\/english\/AboutUs\/About-The-Commissioner\/"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107458.1107491"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592761.1592773"},{"volume-title":"Proceedings of IEEE Conference on Communications, 1745--49","year":"2008","author":"Likarish P.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","unstructured":"Peck D. (2013). They're Watching You at Work. Available at http:\/\/www.theatlantic.com\/magazine\/archive\/2013\/12\/theyre-watching-you-at-work\/354681\/  Peck D. (2013). They're Watching You at Work. Available at http:\/\/www.theatlantic.com\/magazine\/archive\/2013\/12\/theyre-watching-you-at-work\/354681\/"},{"key":"e_1_3_2_1_25_1","unstructured":"Perata E. (2013). Customers Sue Target Over Credit Card Breach. Available at http:\/\/www.npr.org\/blogs\/thetwo-way\/2013\/12\/23\/256576993\/customers-sue-target-over-credit-card-breach  Perata E. (2013). Customers Sue Target Over Credit Card Breach. Available at http:\/\/www.npr.org\/blogs\/thetwo-way\/2013\/12\/23\/256576993\/customers-sue-target-over-credit-card-breach"}],"event":{"name":"CHI '14: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Toronto Ontario Canada","acronym":"CHI '14"},"container-title":["CHI '14 Extended Abstracts on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2559206.2579403","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2559206.2579403","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:40Z","timestamp":1750230100000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2559206.2579403"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,26]]},"references-count":25,"alternative-id":["10.1145\/2559206.2579403","10.1145\/2559206"],"URL":"https:\/\/doi.org\/10.1145\/2559206.2579403","relation":{},"subject":[],"published":{"date-parts":[[2014,4,26]]},"assertion":[{"value":"2014-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}