{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:10Z","timestamp":1750308550234,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Commerce Net"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2808138.2808140","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["On the Privacy Practices of Just Plain Sites"],"prefix":"10.1145","author":[{"given":"Amirhossein","family":"Aleyasen","sequence":"first","affiliation":[{"name":"University of Illinois, Urbana, IL, USA"}]},{"given":"Oleksii","family":"Starov","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY, USA"}]},{"given":"Alyssa Phung","family":"Au","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA, USA"}]},{"given":"Allan","family":"Schiffman","sequence":"additional","affiliation":[{"name":"Commerce Net, Palo Alto, CA, USA"}]},{"given":"Jeff","family":"Shrager","sequence":"additional","affiliation":[{"name":"Commerce Net, Palo Alto, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"11","volume-title":"DC","author":"Cranor L. F.","year":"2013","unstructured":"L. F. Cranor they actually any different? comparing thousands of financial institutions' privacy practices,\" The Twelfth Workshop on the Economics of Information Security WEIS 2013 Washington , DC , pp. 11 -- 12 , June 2013 . L. F. Cranor et al., \"Are they actually any different? comparing thousands of financial institutions' privacy practices,\" The Twelfth Workshop on the Economics of Information Security WEIS 2013 Washington, DC, pp. 11--12, June 2013."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1556460.1556499"},{"key":"e_1_3_2_1_3_1","volume-title":"How much is too much? privacy issues on twitter,\" in Conference of International Communication Association, (Singapore)","author":"Humphreys L.","year":"2010","unstructured":"L. Humphreys , P. Gill , and B. Krishnamurthy , \" How much is too much? privacy issues on twitter,\" in Conference of International Communication Association, (Singapore) , 2010 . L. Humphreys, P. Gill, and B. Krishnamurthy, \"How much is too much? privacy issues on twitter,\" in Conference of International Communication Association, (Singapore), 2010."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511609268"},{"key":"e_1_3_2_1_5_1","first-page":"23","article-title":"Analyzing website privacy requirements using a privacy goal taxonomy","author":"Anton A. I.","year":"2002","unstructured":"A. I. Anton , J. B. Earp , and A. Reese , \" Analyzing website privacy requirements using a privacy goal taxonomy ,\" (IEEE Joint International Conference on 2002 ), pp. 23 -- 31 , 2002. A. I. Anton, J. B. Earp, and A. Reese, \"Analyzing website privacy requirements using a privacy goal taxonomy,\" (IEEE Joint International Conference on 2002), pp. 23--31, 2002.","journal-title":"(IEEE Joint International Conference on"},{"key":"e_1_3_2_1_6_1","volume-title":"Annenberg Public Policy Center of the University of Pennsylvania","author":"Turow J.","year":"2001","unstructured":"J. Turow and A. P. P. Center, Privacy policies on children's Websites: Do they play by the rules ? Annenberg Public Policy Center of the University of Pennsylvania , 2001 . J. Turow and A. P. P. Center, Privacy policies on children's Websites: Do they play by the rules? Annenberg Public Policy Center of the University of Pennsylvania, 2001."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177088"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517868"},{"key":"e_1_3_2_1_9_1","volume-title":"Privacy leakage vs. protection measures: The growing disconnect,\" in Web 2.0 Security and Privacy Workshop","author":"Krishnamurthy B.","year":"2011","unstructured":"B. Krishnamurthy , K. Naryshkin , and C. Wills , \" Privacy leakage vs. protection measures: The growing disconnect,\" in Web 2.0 Security and Privacy Workshop , 2011 . B. Krishnamurthy, K. Naryshkin, and C. Wills, \"Privacy leakage vs. protection measures: The growing disconnect,\" in Web 2.0 Security and Privacy Workshop, 2011."},{"key":"e_1_3_2_1_10_1","volume-title":"OJ","author":"D. E. N.","year":"1995","unstructured":"D. E. N. 95\/46, \"on the protection of individuals with regard to the processing of personal data and on the free movement of such data,\" vol . OJ , October 1995 . D. E. N. 95\/46, \"on the protection of individuals with regard to the processing of personal data and on the free movement of such data,\" vol. OJ, October 1995."},{"key":"e_1_3_2_1_11_1","first-page":"581","article-title":"Automation and the fourth amendment","volume":"96","author":"Tokson M.","year":"2010","unstructured":"M. Tokson , \" Automation and the fourth amendment ,\" Iowa L. Rev. , vol. 96 , p. 581 , 2010 . M. Tokson, \"Automation and the fourth amendment,\" Iowa L. Rev., vol. 96, p. 581, 2010.","journal-title":"Iowa L. Rev."},{"key":"e_1_3_2_1_12_1","first-page":"583","article-title":"The FTC and the new common law of privacy","volume":"114","author":"Solove D. J.","year":"2014","unstructured":"D. J. Solove and W. Hartzog , \" The FTC and the new common law of privacy ,\" Colum. L. Rev. , vol. 114 , pp. 583 -- 1033 , 2014 . D. J. Solove and W. Hartzog, \"The FTC and the new common law of privacy,\" Colum. L. Rev., vol. 114, pp. 583--1033, 2014.","journal-title":"Colum. L. Rev."},{"key":"e_1_3_2_1_13_1","volume-title":"The U.S.-EU Safe Harbor Guide to Self-Certification.","author":"U.","year":"2009","unstructured":"U. D. of Commerce , The U.S.-EU Safe Harbor Guide to Self-Certification. 2009 . U. D. of Commerce, The U.S.-EU Safe Harbor Guide to Self-Certification. 2009."},{"key":"e_1_3_2_1_14_1","volume-title":"Privacy online: A report to congress,\" Federal Trade Commission","author":"Landesberg M. K.","year":"1998","unstructured":"M. K. Landesberg , T. M. Levin , C. G. Curtin , and O. Lev , \" Privacy online: A report to congress,\" Federal Trade Commission , 1998 . M. K. Landesberg, T. M. Levin, C. G. Curtin, and O. Lev, \"Privacy online: A report to congress,\" Federal Trade Commission, 1998."},{"key":"e_1_3_2_1_15_1","first-page":"127","article-title":"The FTC, the unfairness doctrine, and data security breach litigation","volume":"60","author":"Scott M. D.","year":"2008","unstructured":"M. D. Scott , \" The FTC, the unfairness doctrine, and data security breach litigation ,\" Admin. L. Rev. , vol. 60 , pp. 127 -- 182 , 2008 . M. D. Scott, \"The FTC, the unfairness doctrine, and data security breach litigation,\" Admin. L. Rev., vol. 60, pp. 127--182, 2008.","journal-title":"Admin. L. Rev."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.2.238.17136"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382274"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2512938.2512942"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Denver Colorado USA","acronym":"CCS'15"},"container-title":["Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808138.2808140","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2808138.2808140","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:03:44Z","timestamp":1750273424000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808138.2808140"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":20,"alternative-id":["10.1145\/2808138.2808140","10.1145\/2808138"],"URL":"https:\/\/doi.org\/10.1145\/2808138.2808140","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}