{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:22:21Z","timestamp":1776122541552,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"John and Claire Bertucci Fellowship"},{"name":"NSF","award":["CNS-1012763 CNS-1330596 and DGE-0903659"],"award-info":[{"award-number":["CNS-1012763 CNS-1330596 and DGE-0903659"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2808117.2808119","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"63-74","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["The Impact of Timing on the Salience of Smartphone App Privacy Notices"],"prefix":"10.1145","author":[{"given":"Rebecca","family":"Balebako","sequence":"first","affiliation":[{"name":"RAND Corporation, Pittsburgh, PA, USA"}]},{"given":"Florian","family":"Schaub","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Idris","family":"Adjerid","sequence":"additional","affiliation":[{"name":"University of Notre Dame, Notre Dame, IN, USA"}]},{"given":"Alessandro","family":"Acquisti","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Lorrie","family":"Cranor","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.163"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501613"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702210"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.23.2.193.51400"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of SOUPS","author":"Balebako R.","year":"2013","unstructured":"R. Balebako , J. Jung , W. Lu , L. Cranor , and C. Nguyen . \" A Lot of Little Brothers:\" Measuring User Confidence in Smartphone Security and Privacy . In Proc. of SOUPS , 2013 . R. Balebako, J. Jung, W. Lu, L. Cranor, and C. Nguyen. \"A Lot of Little Brothers:\" Measuring User Confidence in Smartphone Security and Privacy. In Proc. of SOUPS, 2013."},{"key":"e_1_3_2_1_8_1","volume-title":"The Privacy and Security Behaviors of Smartphone App Developers. Workshop on Usable Security","author":"Balebako R.","year":"2014","unstructured":"R. Balebako , A. Marsh , J. Lin , J. Hong , and L. F. Cranor . The Privacy and Security Behaviors of Smartphone App Developers. Workshop on Usable Security , 2014 . R. Balebako, A. Marsh, J. Lin, J. Hong, and L. F. Cranor. The Privacy and Security Behaviors of Smartphone App Developers. Workshop on Usable Security, 2014."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2073276.2073284"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753689"},{"key":"e_1_3_2_1_12_1","first-page":"1","article-title":"A Framework for Reasoning About the Human in the Loop","volume":"8","author":"Cranor L. F.","year":"2008","unstructured":"L. F. Cranor . A Framework for Reasoning About the Human in the Loop . UPSEC , 8 : 1 -- 15 , 2008 . L. F. Cranor. A Framework for Reasoning About the Human in the Loop. UPSEC, 8:1--15, 2008.","journal-title":"UPSEC"},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. of WEIS","author":"Egelman S.","year":"2012","unstructured":"S. Egelman , A. Felt , and D. Wagner . Choice Architecture and Smartphone Privacy: There's A Price For That . In Proc. of WEIS , 2012 . S. Egelman, A. Felt, and D. Wagner. Choice Architecture and Smartphone Privacy: There's A Price For That. In Proc. of WEIS, 2012."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518752"},{"key":"e_1_3_2_1_15_1","volume-title":"HOTSEC 2012","author":"Felt A.","year":"2012","unstructured":"A. Felt , S. Egelman , M. Finifter , D. Akhawe , and D. Wagner . How to Ask For Permission . HOTSEC 2012 , 2012 . A. Felt, S. Egelman, M. Finifter, D. Akhawe, and D. Wagner. How to Ask For Permission. HOTSEC 2012, 2012."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23044"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.58"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2302293"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240720"},{"key":"e_1_3_2_1_21_1","unstructured":"J. L. Hall. NTIA Multistakeholder Process Delivers Increased App Transparency. https:\/\/cdt.org\/blog\/ntia-multistakeholder-process-delivers-increased-app-transparency\/.  J. L. Hall. NTIA Multistakeholder Process Delivers Increased App Transparency. https:\/\/cdt.org\/blog\/ntia-multistakeholder-process-delivers-increased-app-transparency\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556978"},{"key":"e_1_3_2_1_23_1","volume-title":"Pew Internet and American Life Project","author":"Jan Boyles M. M.","year":"2012","unstructured":"M. M. Jan Boyles , Aaron Smith . Privacy and Data Management on Mobile Devices . Pew Internet and American Life Project , August 2012 . M. M. Jan Boyles, Aaron Smith. Privacy and Data Management on Mobile Devices. Pew Internet and American Life Project, August 2012."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466466"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v5i2.630"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_3_2_1_29_1","unstructured":"National Telecommunication and Information Administration. Privacy Multistakeholder Process: Mobile Application Transparency. http:\/\/www.ntia.doc.gov\/category\/privacy\/u Jul. 2013.  National Telecommunication and Information Administration. Privacy Multistakeholder Process: Mobile Application Transparency. http:\/\/www.ntia.doc.gov\/category\/privacy\/u Jul. 2013."},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. of SOUPS","author":"Schaub F.","year":"2015","unstructured":"F. Schaub , R. Balebako , A. L. Durity , and L. F. Cranor . A Design Space for Effective Privacy Notices . Proc. of SOUPS , 2015 . F. Schaub, R. Balebako, A. L. Durity, and L. F. Cranor. A Design Space for Effective Privacy Notices. Proc. of SOUPS, 2015."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557400"},{"key":"e_1_3_2_1_32_1","volume-title":"Warnings and Risk Communication","author":"Wogalter M. S.","year":"2005","unstructured":"M. S. Wogalter , D. DeJoy , and K. R. Laughery . Warnings and Risk Communication . CRC Press , 2005 . M. S. Wogalter, D. DeJoy, and K. R. Laughery. Warnings and Risk Communication. CRC Press, 2005."}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808117.2808119","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2808117.2808119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:12Z","timestamp":1750223232000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808117.2808119"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":30,"alternative-id":["10.1145\/2808117.2808119","10.1145\/2808117"],"URL":"https:\/\/doi.org\/10.1145\/2808117.2808119","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}