{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:11Z","timestamp":1750306571828,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2665943.2665963","type":"proceedings-article","created":{"date-parts":[[2014,11,7]],"date-time":"2014-11-07T17:10:54Z","timestamp":1415380254000},"page":"107-116","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["What Deters Jane from Preventing Identification and Tracking on the Web?"],"prefix":"10.1145","author":[{"given":"Fatemeh","family":"Shirazi","sequence":"first","affiliation":[{"name":"TU Darmstadt\/ CASED\/ KU Leuven, Darmstadt, Germany"}]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[{"name":"TU Darmstadt\/ CASED\/ EC-SPRIDE, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"The Invisible Internet Project project. https:\/\/geti2p.net\/en\/. Accessed: 28\/07\/2014.  The Invisible Internet Project project. https:\/\/geti2p.net\/en\/. Accessed: 28\/07\/2014."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516674"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"e_1_3_2_1_4_1","first-page":"6","volume-title":"Security","author":"Aggarwal G.","year":"2010"},{"volume-title":"Web 2.0 Workshop on Security and Privacy","year":"2012","author":"Balebako R.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.198"},{"key":"e_1_3_2_1_7_1","first-page":"410","volume-title":"HAS, Held as Part of HCI (24)","author":"Coopamootoo K. P. L.","year":"2014"},{"volume-title":"IAPP","year":"2014","author":"Cranor L. F.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"S. J. Cunningham and M. Masoodian. Analyzing users' behaviour to identify their privacy concerns. In PUMP.  S. J. Cunningham and M. Masoodian. Analyzing users' behaviour to identify their privacy concerns. In PUMP."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_12_1","first-page":"1","volume-title":"PETS","author":"Eckersley P.","year":"2010"},{"volume-title":"Internet Privacy. A multidisciplinary analysis","year":"2012","author":"Kelbert F.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207759"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_3_2_1_16_1","unstructured":"J. Lott D. Schall and K. Peters. ActionScript 3.0 cookbook - solutions for Adobe Flash platforms and Adobe Flex application developers. O'Reilly 2007.   J. Lott D. Schall and K. Peters. ActionScript 3.0 cookbook - solutions for Adobe Flash platforms and Adobe Flex application developers. O'Reilly 2007."},{"key":"e_1_3_2_1_17_1","unstructured":"J. Mayer. Tracking The Trackers: Self-help Tools. http:\/\/cyberlaw.stanford.edu\/node\/6730 2011. {Online; accessed 28-July-2014}.  J. Mayer. Tracking The Trackers: Self-help Tools. http:\/\/cyberlaw.stanford.edu\/node\/6730 2011. {Online; accessed 28-July-2014}."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"},{"volume-title":"Telecommunications Policy Research Conference)","year":"2010","author":"McDonald A. M.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685221311314419"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"G. Norcie J. Blythe K. Caine and L. J. Camp. Why johnny can't blow the whistle: Identifying and reducing usability issues in anonymity systems. 2014.  G. Norcie J. Blythe K. Caine and L. J. Camp. Why johnny can't blow the whistle: Identifying and reducing usability issues in anonymity systems. 2014.","DOI":"10.14722\/usec.2014.23022"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/948005.948051"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39185-9_9"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1979742.1979812"},{"volume-title":"PETS","year":"2014","author":"Renaud K.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.11.008"},{"issue":"3","key":"e_1_3_2_1_27_1","first-page":"2006","article-title":"A Taxonomy of Privacy","volume":"154","author":"Solove D. J.","journal-title":"University of Pennsylvania Law Review"},{"key":"e_1_3_2_1_28_1","first-page":"2007","article-title":"i've got nothing to hide\" and other misunderstandings of privacy","volume":"44","author":"Solove D. J.","year":"2007","journal-title":"San Diego Law Review"},{"volume-title":"Intelligent Information Privacy Management. AAAI","year":"2010","author":"Soltani A.","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335362"},{"key":"e_1_3_2_1_31_1","unstructured":"T. Vissers N. Nikiforakis N. Bielova and W. Joosen. Crying wolf? On the price discrimination of online airline tickets. July 2014.  T. Vissers N. Nikiforakis N. Bielova and W. Joosen. Crying wolf? On the price discrimination of online airline tickets. July 2014."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27585-2_1"},{"key":"e_1_3_2_1_34_1","first-page":"14","volume-title":"SSYM","author":"Whitten A.","year":"1999"},{"volume-title":"Workshop on Usable IT Security Management","year":"2008","author":"Wong T.","key":"e_1_3_2_1_35_1"}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CCS'14"},"container-title":["Proceedings of the 13th Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2665943.2665963","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2665943.2665963","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:25Z","timestamp":1750227205000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2665943.2665963"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":34,"alternative-id":["10.1145\/2665943.2665963","10.1145\/2665943"],"URL":"https:\/\/doi.org\/10.1145\/2665943.2665963","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}