{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T14:06:45Z","timestamp":1773670005752,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1223977 and 1228777"],"award-info":[{"award-number":["1223977 and 1228777"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2665943.2665953","type":"proceedings-article","created":{"date-parts":[[2014,11,7]],"date-time":"2014-11-07T17:10:54Z","timestamp":1415380254000},"page":"97-106","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Private Browsing"],"prefix":"10.1145","author":[{"given":"Xianyi","family":"Gao","sequence":"first","affiliation":[{"name":"Rutgers University, Piscataway, NJ, USA"}]},{"given":"Yulong","family":"Yang","sequence":"additional","affiliation":[{"name":"Rutgers University, Piscataway, NJ, USA"}]},{"given":"Huiqing","family":"Fu","sequence":"additional","affiliation":[{"name":"Rutgers University, Piscataway, NJ, USA"}]},{"given":"Janne","family":"Lindqvist","sequence":"additional","affiliation":[{"name":"Rutgers University, Piscataway, NJ, USA"}]},{"given":"Yang","family":"Wang","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"USENIX Security'10","author":"Aggarwal G.","year":"2010","unstructured":"G. Aggarwal , E. Bursztein , C. Jackson , and D. Boneh . An analysis of private browsing modes in modern browsers . In USENIX Security'10 , 2010 . G. Aggarwal, E. Bursztein, C. Jackson, and D. Boneh. An analysis of private browsing modes in modern browsers. In USENIX Security'10, 2010."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.198"},{"key":"e_1_3_2_1_3_1","volume-title":"Constructing Grounded Theory","author":"Charmaz K.","year":"2014","unstructured":"K. Charmaz . Constructing Grounded Theory , 2 nd Edition. SAGE Publications Ltd , Mar. 2014 . K. Charmaz. Constructing Grounded Theory, 2nd Edition. SAGE Publications Ltd, Mar. 2014.","edition":"2"},{"key":"e_1_3_2_1_4_1","volume-title":"15th USENIX Security Symposium","author":"Chiasson S.","year":"2006","unstructured":"S. Chiasson , P. C. van Oorschot , and R. Biddle . A usability study and critique of two password managers . In 15th USENIX Security Symposium , 2006 . S. Chiasson, P. C. van Oorschot, and R. Biddle. A usability study and critique of two password managers. In 15th USENIX Security Symposium, 2006."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/506443.506577"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125451.1125615"},{"key":"e_1_3_2_1_7_1","volume-title":"SOUPS '14","author":"Kang R.","year":"2014","unstructured":"R. Kang , S. Brown , L. Dabbish , and S. Kiesler . Privacy attitudes of mechanical turk workers and the u.s. public . In SOUPS '14 , 2014 . R. Kang, S. Brown, L. Dabbish, and S. Kiesler. Privacy attitudes of mechanical turk workers and the u.s. public. In SOUPS '14, 2014."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207759"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_4"},{"key":"e_1_3_2_1_10_1","volume-title":"What is the trend in browser usage? http:\/\/www.w3schools.com\/browsers\/browsers_stats.asp","author":"Statistics Browser","year":"2013","unstructured":"Browser Statistics and Trends. What is the trend in browser usage? http:\/\/www.w3schools.com\/browsers\/browsers_stats.asp , 2013 --10. Browser Statistics and Trends. What is the trend in browser usage? http:\/\/www.w3schools.com\/browsers\/browsers_stats.asp, 2013--10."},{"key":"e_1_3_2_1_11_1","volume-title":"Browse in private (incognito mode). https:\/\/support.google.com\/chrome\/answer\/95464?hl=en","author":"Incognito Browsing Google Chrome","year":"2014","unstructured":"Google Chrome Incognito Browsing . Browse in private (incognito mode). https:\/\/support.google.com\/chrome\/answer\/95464?hl=en , 2014 . Google Chrome Incognito Browsing. Browse in private (incognito mode). https:\/\/support.google.com\/chrome\/answer\/95464?hl=en, 2014."},{"key":"e_1_3_2_1_12_1","volume-title":"What is inprivate browsing? http:\/\/windows.microsoft.com\/en-us\/windows\/what-is-inprivate-browsing#1TC=windows-7","author":"InPrivate Browsing Internet Explorer","year":"2014","unstructured":"Internet Explorer InPrivate Browsing . What is inprivate browsing? http:\/\/windows.microsoft.com\/en-us\/windows\/what-is-inprivate-browsing#1TC=windows-7 , 2014 . Internet Explorer InPrivate Browsing. What is inprivate browsing? http:\/\/windows.microsoft.com\/en-us\/windows\/what-is-inprivate-browsing#1TC=windows-7, 2014."},{"key":"e_1_3_2_1_13_1","volume-title":"Browse the web without saving information about the sites you visit. https:\/\/support.mozilla.org\/en-US\/kb\/private-browsing-browse-web-without-saving-info","author":"Private Browsing Mozilla Firefox","year":"2014","unstructured":"Mozilla Firefox Private Browsing . Browse the web without saving information about the sites you visit. https:\/\/support.mozilla.org\/en-US\/kb\/private-browsing-browse-web-without-saving-info , 2014 . Mozilla Firefox Private Browsing. Browse the web without saving information about the sites you visit. https:\/\/support.mozilla.org\/en-US\/kb\/private-browsing-browse-web-without-saving-info, 2014."},{"key":"e_1_3_2_1_14_1","unstructured":"Opera Private Browsing. Stay secure with private browsing. http:\/\/help.opera.com\/opera\/Windows\/1471\/en\/private.html 2014.  Opera Private Browsing. Stay secure with private browsing. http:\/\/help.opera.com\/opera\/Windows\/1471\/en\/private.html 2014."},{"key":"e_1_3_2_1_15_1","unstructured":"Safari Private Browsing. Safari 5.1: Browser privately. http:\/\/support.apple.com\/kb\/ph5000 2014.  Safari Private Browsing. Safari 5.1: Browser privately. http:\/\/support.apple.com\/kb\/ph5000 2014."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2013.18"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2011.5893816"},{"key":"e_1_3_2_1_18_1","volume-title":"the 8th international Workshop on DPM'13","author":"Satvat K.","year":"2013","unstructured":"K. Satvat , M. Forshaw , F. Hao , and E. Toreini . On the privacy of private browsing{a forensic approach . In the 8th international Workshop on DPM'13 , 2013 . K. Satvat, M. Forshaw, F. Hao, and E. Toreini. On the privacy of private browsing{a forensic approach. In the 8th international Workshop on DPM'13, 2013."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.02.002"},{"key":"e_1_3_2_1_20_1","volume-title":"SOUPS Workshop on Privacy Personas and Segmentation","author":"Schnorf S.","year":"2014","unstructured":"S. Schnorf , A. Sedley , M. Ortlieb , and A. Woodru . A comparison of six sample providers regarding online privacy benchmarks . In SOUPS Workshop on Privacy Personas and Segmentation , 2014 . S. Schnorf, A. Sedley, M. Ortlieb, and A. Woodru. A comparison of six sample providers regarding online privacy benchmarks. In SOUPS Workshop on Privacy Personas and Segmentation, 2014."},{"key":"e_1_3_2_1_21_1","volume-title":"Why private browsing modes do not deliver real privacy. Technical report","author":"Soghoian C.","year":"2010","unstructured":"C. Soghoian . Why private browsing modes do not deliver real privacy. Technical report , 2010 . C. Soghoian. Why private browsing modes do not deliver real privacy. Technical report, 2010."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","location":"Scottsdale Arizona USA","acronym":"CCS'14","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 13th Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2665943.2665953","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2665943.2665953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:25Z","timestamp":1750227205000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2665943.2665953"}},"subtitle":["an Inquiry on Usability and Privacy Protection"],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":22,"alternative-id":["10.1145\/2665943.2665953","10.1145\/2665943"],"URL":"https:\/\/doi.org\/10.1145\/2665943.2665953","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}