{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T20:35:16Z","timestamp":1773174916499,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,4,9]],"date-time":"2018-04-09T00:00:00Z","timestamp":1523232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EU H2020","award":["653454"],"award-info":[{"award-number":["653454"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,4,9]]},"DOI":"10.1145\/3167132.3167259","type":"proceedings-article","created":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T13:54:10Z","timestamp":1530626050000},"page":"1165-1174","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Helping john to make informed decisions on using social login"],"prefix":"10.1145","author":[{"given":"Farzaneh","family":"Karegar","sequence":"first","affiliation":[{"name":"Karlstad University"}]},{"given":"Nina","family":"Gerber","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt"}]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[{"name":"Karlstad University and Technische Universit\u00e4t Darmstadt"}]},{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[{"name":"Karlstad University"}]}],"member":"320","published-online":{"date-parts":[[2018,4,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Mohammad Maifi Hasan Khan, and Michael Fagan","author":"Albayram Yusuf","year":"2017"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435362"},{"key":"e_1_3_2_1_3_1","volume-title":"29 Data Protection Working Party","year":"2004"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517881.2517886"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753689"},{"key":"e_1_3_2_1_6_1","volume-title":"Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It","author":"Bravo-Lillo Cristian"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2817912.2817913"},{"key":"e_1_3_2_1_8_1","volume-title":"Canada","author":"Cavoukian Ann","year":"2009"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481328"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.28945\/1980"},{"key":"e_1_3_2_1_12_1","volume-title":"Investigating the Animation of Application Permission Dialogs: A Case Study of Facebook","author":"Javed Yousra"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1515\/popets-2017-0014","article-title":"Look Before You Authorize: Using Eye-Tracking to Enforce User Attention Towards Application Permissions","volume":"2","author":"Javed Yousra","year":"2017","journal-title":"PoPET"},{"key":"e_1_3_2_1_14_1","volume-title":"Tools and Management (ISD2017 Proceedings).","author":"Karegar Farzaneh","year":"2017"},{"key":"e_1_3_2_1_15_1","volume-title":"Jinjuan Heidi Feng, and Harry Hochheiser","author":"Lazar Jonathan","year":"2010"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_3_2_1_17_1","volume-title":"Patrick and Steve Kenny","author":"Andrew","year":"2003"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073007"},{"key":"e_1_3_2_1_19_1","volume-title":"Expecting the Unexpected: Understanding Mismatched Privacy Expectations Online","author":"Rao Ashwini"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660460.2660471"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466469"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0058603"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078833"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2532639"},{"key":"e_1_3_2_1_25_1","unstructured":"The European Parliament and the Council of the European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation). (2016).  The European Parliament and the Council of the European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation). (2016)."},{"key":"e_1_3_2_1_26_1","volume-title":"Privacy by Design: From Research and Policy to Practice-the Challenge of Multi-disciplinarity","author":"Tsormpatzoudi Pagona"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699131"},{"key":"e_1_3_2_1_28_1","unstructured":"Vetenskapsr\u00e5det. 2002. Forskningsetiska principer inom humanistisk-samh\u00e4llsvetenskaplig forskning.  Vetenskapsr\u00e5det. 2002. Forskningsetiska principer inom humanistisk-samh\u00e4llsvetenskaplig forskning."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441807"}],"event":{"name":"SAC 2018: Symposium on Applied Computing","location":"Pau France","acronym":"SAC 2018","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 33rd Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167132.3167259","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3167132.3167259","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:06Z","timestamp":1750213566000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167132.3167259"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,9]]},"references-count":28,"alternative-id":["10.1145\/3167132.3167259","10.1145\/3167132"],"URL":"https:\/\/doi.org\/10.1145\/3167132.3167259","relation":{},"subject":[],"published":{"date-parts":[[2018,4,9]]},"assertion":[{"value":"2018-04-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}