{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T11:46:52Z","timestamp":1752666412823,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,7]],"date-time":"2016-05-07T00:00:00Z","timestamp":1462579200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,7]]},"DOI":"10.1145\/2851581.2856503","type":"proceedings-article","created":{"date-parts":[[2016,5,6]],"date-time":"2016-05-06T19:56:09Z","timestamp":1462564569000},"page":"3415-3422","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Bridging the Gap between Privacy by Design and Privacy in Practice"],"prefix":"10.1145","author":[{"given":"Luke","family":"Stark","sequence":"first","affiliation":[{"name":"New York University, New York City, NY, USA"}]},{"given":"Jen","family":"King","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"Xinru","family":"Page","sequence":"additional","affiliation":[{"name":"Bentley University, Waltham, MA, USA"}]},{"given":"Airi","family":"Lampinen","sequence":"additional","affiliation":[{"name":"Mobile Life @ Stockholm University, Kista, Sweden"}]},{"given":"Jessica","family":"Vitak","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Pamela","family":"Wisniewski","sequence":"additional","affiliation":[{"name":"The University of Central Florida, Orlando, FL, USA"}]},{"given":"Tara","family":"Whalen","sequence":"additional","affiliation":[{"name":"Google, Inc., Mountain View, CA, USA"}]},{"given":"Nathaniel","family":"Good","sequence":"additional","affiliation":[{"name":"Good Research, Berkeley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,5,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa1465"},{"key":"e_1_3_2_1_2_1","volume-title":"Citizenfour. Vogue","author":"Aguirre A.","year":"2014","unstructured":"Aguirre , A. Laura Poitras on Filming Edward Snowden and Her New Documentary About Him , Citizenfour. Vogue , 2014 . http:\/\/www.vogue.com\/2865709\/laurapoitras-edward-snowden-documentarycitzenfour\/. Aguirre, A. Laura Poitras on Filming Edward Snowden and Her New Documentary About Him, Citizenfour. Vogue, 2014. http:\/\/www.vogue.com\/2865709\/laurapoitras-edward-snowden-documentarycitzenfour\/."},{"key":"e_1_3_2_1_3_1","first-page":"0","article-title":"Privacy by design: Networked computing, 1969-1979","volume":"0","author":"Braman S","year":"2011","unstructured":"Braman , S . Privacy by design: Networked computing, 1969-1979 . New Media & Society 0 , 0 ( 2011 ), 1-18. Braman, S. Privacy by design: Networked computing, 1969-1979. New Media & Society 0, 0 (2011), 1-18.","journal-title":"New Media & Society"},{"key":"e_1_3_2_1_4_1","volume-title":"Federal Trade Commission","author":"Bureau of Consumer Protection.","year":"2010","unstructured":"Bureau of Consumer Protection. Protecting Consumer Privacy in an Era of Rapid Change . Federal Trade Commission , 2010 . Bureau of Consumer Protection. Protecting Consumer Privacy in an Era of Rapid Change. Federal Trade Commission, 2010."},{"key":"e_1_3_2_1_5_1","volume-title":"Technology and Privacy: The New Landscape","author":"Burkert H.","year":"1997","unstructured":"Burkert , H. Privacy-Enhancing Technologies: Typology , Critique, Vision. In P.E. Agre and M. Rotenberg, eds., Technology and Privacy: The New Landscape . The MIT Press , Cambridge, MA , 1997 , 125-142. Burkert, H. Privacy-Enhancing Technologies: Typology, Critique, Vision. In P.E. Agre and M. Rotenberg, eds., Technology and Privacy: The New Landscape. The MIT Press, Cambridge, MA, 1997, 125-142."},{"key":"e_1_3_2_1_6_1","first-page":"1904","volume":"126","author":"Cohen J.E","year":"2013","unstructured":"Cohen , J.E . What Privacy Is For. Harvard Law Review 126 , ( 2013 ), 1904 - 1933 . Cohen, J.E. What Privacy Is For. Harvard Law Review 126, (2013), 1904-1933.","journal-title":"What Privacy Is For. Harvard Law Review"},{"key":"e_1_3_2_1_7_1","volume-title":"Mother Jones, 2013","author":"Drum K.","year":"2013","unstructured":"Drum , K. The Google Panopticon Is Set to Become Even More Omniscient . Mother Jones, 2013 . http:\/\/www.motherjones.com\/kevindrum\/ 2013 \/09\/google-panopticon.html. Drum, K. The Google Panopticon Is Set to Become Even More Omniscient. Mother Jones, 2013. http:\/\/www.motherjones.com\/kevindrum\/2013\/09\/google-panopticon.html."},{"key":"e_1_3_2_1_8_1","first-page":"35","article-title":"It's Not Privacy, and It\"s Not Fair","volume":"66","author":"Dwork C.","year":"2013","unstructured":"Dwork , C. and Mulligan , D.K . It's Not Privacy, and It\"s Not Fair . Stanford Law Review Online 66 , ( 2013 ), 35 - 40 . Dwork, C. and Mulligan, D.K. It's Not Privacy, and It\"s Not Fair. Stanford Law Review Online 66, (2013), 35-40.","journal-title":"Stanford Law Review Online"},{"key":"e_1_3_2_1_9_1","first-page":"38","article-title":"Applying the \"Contextual Integrity","volume":"3","author":"Grodzinsky F.S.","year":"2010","unstructured":"Grodzinsky , F.S. and Tavani , H.T . Applying the \"Contextual Integrity \" Model of Privacy to Personal Blogs in the Blogosphere. International Journal of Internet Research Ethics 3 , ( 2010 ), 38 - 47 . Grodzinsky, F.S. and Tavani, H.T. Applying the \"Contextual Integrity\" Model of Privacy to Personal Blogs in the Blogosphere. International Journal of Internet Research Ethics 3, (2010), 38-47.","journal-title":"International Journal of Internet Research Ethics"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55415-5_38"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.01.017"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/2333696X.2008.10855845"},{"key":"e_1_3_2_1_13_1","volume-title":"Workplace Surveillance and the \"Transparency Paradox.\" The New York Times","author":"Lohr S.","year":"2014","unstructured":"Lohr , S. Workplace Surveillance and the \"Transparency Paradox.\" The New York Times , 2014 . http:\/\/bits.blogs.nytimes.com\/2014\/06\/21\/wo rkplace-surveillance-and-the-transparencyparadox\/?_r=0. Lohr, S. Workplace Surveillance and the \"Transparency Paradox.\" The New York Times, 2014. http:\/\/bits.blogs.nytimes.com\/2014\/06\/21\/wo rkplace-surveillance-and-the-transparencyparadox\/?_r=0."},{"key":"e_1_3_2_1_14_1","first-page":"4","volume":"14","author":"Mulligan D.K.","year":"2012","unstructured":"Mulligan , D.K. and King , J . Bridging The Gap Between Privacy And Design. University of Pennsylvania Journal of Constitutional Law 14 , 4 ( 2012 ), 989-1034. Mulligan, D.K. and King, J. Bridging The Gap Between Privacy And Design. University of Pennsylvania Journal of Constitutional Law 14, 4 (2012), 989-1034.","journal-title":"Bridging The Gap Between Privacy And Design. University of Pennsylvania Journal of Constitutional Law"},{"key":"e_1_3_2_1_15_1","first-page":"2","article-title":"Privacy in the USA","volume":"1","author":"Nippert-Eng C","year":"2007","unstructured":"Nippert-Eng , C . Privacy in the USA : Some Implications for Design. International Journal of Design 1 , 2 ( 2007 ), 1-11. Nippert-Eng, C. Privacy in the USA: Some Implications for Design. International Journal of Design 1, 2 (2007), 1-11.","journal-title":"Some Implications for Design. International Journal of Design"},{"key":"e_1_3_2_1_16_1","first-page":"3","article-title":"From Preemption to Circumvention","volume":"26","author":"Nissenbaum H","year":"2011","unstructured":"Nissenbaum , H . From Preemption to Circumvention . Berkeley Technology Law Journal 26 , 3 ( 2011 ), 1367-1386. Nissenbaum, H. From Preemption to Circumvention. Berkeley Technology Law Journal 26, 3 (2011), 1367-1386.","journal-title":"Berkeley Technology Law Journal"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1162\/DAED_a_00113"},{"key":"e_1_3_2_1_18_1","first-page":"3","article-title":"An Economic Theory of Privacy","volume":"2","author":"Posner R.A","year":"1978","unstructured":"Posner , R.A . An Economic Theory of Privacy . Regulation 2 , 3 ( 1978 ), 19-26. Posner, R.A. An Economic Theory of Privacy. Regulation 2, 3 (1978), 19-26.","journal-title":"Regulation"},{"key":"e_1_3_2_1_19_1","volume-title":"Anonymity, Privacy, and Security Online","author":"Rainie L.","year":"2013","unstructured":"Rainie , L. , Kiesler , S. , Kang , R. , and Madden , M . Anonymity, Privacy, and Security Online . Pew Research Center's Internet & American Life Project , Washington, D.C. , 2013 . Rainie, L., Kiesler, S., Kang, R., and Madden, M. Anonymity, Privacy, and Security Online. Pew Research Center's Internet & American Life Project, Washington, D.C., 2013."},{"key":"e_1_3_2_1_20_1","first-page":"1","volume-title":"Consumer Watchdog","author":"Simpson J.M.","year":"2013","unstructured":"Simpson , J.M. Google Tells Court You Cannot Expect Privacy When Sending Messages to Gmail . Consumer Watchdog , 2013 , 1 - 2 . http:\/\/www.consumerwatchdog.org\/newsrelea se\/google-tells-court-you-cannot-expectprivacy.html. Simpson, J.M. Google Tells Court You Cannot Expect Privacy When Sending Messages to Gmail. Consumer Watchdog, 2013, 1-2. http:\/\/www.consumerwatchdog.org\/newsrelea se\/google-tells-court-you-cannot-expectprivacy.html."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2015.1107167"},{"key":"e_1_3_2_1_23_1","volume-title":"Self Control, and Privacy in the Online World","author":"Strandburg K.J.","year":"2005","unstructured":"Strandburg , K.J. Social Norms , Self Control, and Privacy in the Online World . 2005 , 1-24. Strandburg, K.J. Social Norms, Self Control, and Privacy in the Online World. 2005, 1-24."},{"key":"e_1_3_2_1_24_1","first-page":"5","volume":"11","author":"Tene O.","year":"2013","unstructured":"Tene , O. and Polonetsky , J . Big Data for All: Privacy and User Control in the Age of Analytics. Northwestern Journal of Technology and Intellectual Property 11 , 5 ( 2013 ), 239- 273. Tene, O. and Polonetsky, J. Big Data for All: Privacy and User Control in the Age of Analytics. Northwestern Journal of Technology and Intellectual Property 11, 5 (2013), 239- 273.","journal-title":"Northwestern Journal of Technology and Intellectual Property"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00072"},{"key":"e_1_3_2_1_26_1","unstructured":"Privacy by Design in the Age of Big Data. 2012.  Privacy by Design in the Age of Big Data. 2012."},{"key":"e_1_3_2_1_27_1","unstructured":"Privacy by Design. Computing Community Consortium. http:\/\/cra.org\/ccc\/visioning\/visioningactivities\/2015-activities\/privacy-by-design\/.  Privacy by Design. Computing Community Consortium. http:\/\/cra.org\/ccc\/visioning\/visioningactivities\/2015-activities\/privacy-by-design\/."}],"event":{"name":"CHI'16: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"San Jose California USA","acronym":"CHI'16"},"container-title":["Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2851581.2856503","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2851581.2856503","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:54:24Z","timestamp":1750222464000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2851581.2856503"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,7]]},"references-count":27,"alternative-id":["10.1145\/2851581.2856503","10.1145\/2851581"],"URL":"https:\/\/doi.org\/10.1145\/2851581.2856503","relation":{},"subject":[],"published":{"date-parts":[[2016,5,7]]},"assertion":[{"value":"2016-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}