{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T15:06:06Z","timestamp":1773846366257,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T00:00:00Z","timestamp":1543968000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Office of the Privacy Commissioner Canada"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,5]]},"DOI":"10.1145\/3167996.3168002","type":"proceedings-article","created":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T18:42:31Z","timestamp":1547059351000},"page":"64-75","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Towards a comprehensive analytical framework for smart toy privacy practices"],"prefix":"10.1145","author":[{"given":"Moustafa","family":"Mahmoud","sequence":"first","affiliation":[{"name":"Concordia University, Montreal, Canada"}]},{"given":"Md Zakir","family":"Hossen","sequence":"additional","affiliation":[{"name":"Concordia University, Montreal, Canada"}]},{"given":"Hesham","family":"Barakat","sequence":"additional","affiliation":[{"name":"Concordia University, Montreal, Canada"}]},{"given":"Mohammad","family":"Mannan","sequence":"additional","affiliation":[{"name":"Concordia University, Montreal, Canada"}]},{"given":"Amr","family":"Youssef","sequence":"additional","affiliation":[{"name":"Concordia University, Montreal, Canada"}]}],"member":"320","published-online":{"date-parts":[[2018,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS'16)","author":"Alohaly Manar","year":"2016","unstructured":"Manar Alohaly and Hassan Takabi . 2016 . Better privacy indicators: a new approach to quantification of privacy policies . In Symposium on Usable Privacy and Security (SOUPS'16) . Denver, CO, USA. Manar Alohaly and Hassan Takabi. 2016. Better privacy indicators: a new approach to quantification of privacy policies. In Symposium on Usable Privacy and Security (SOUPS'16). Denver, CO, USA."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_3_1","volume-title":"Cross-device tracking: measurement and disclosures. Privacy Enhancing Technologies","author":"Brookman Justin","year":"2017","unstructured":"Justin Brookman , Phoebe Rouge , Aaron Alva , and Christina Yeung . 2017. Cross-device tracking: measurement and disclosures. Privacy Enhancing Technologies ( 2017 ). Justin Brookman, Phoebe Rouge, Aaron Alva, and Christina Yeung. 2017. Cross-device tracking: measurement and disclosures. Privacy Enhancing Technologies (2017)."},{"key":"e_1_3_2_1_4_1","unstructured":"Federal Trade Commission. 2012. Mobile apps for kids: current privacy disclosures are disappointing. https:\/\/www.ftc.gov\/sites\/default\/files\/documents\/reports\/mobile-apps-kids-current-privacy-disclosures-are-disappointing\/120216mobile_apps_kids.pdf. (Feb. 2012).  Federal Trade Commission. 2012. Mobile apps for kids: current privacy disclosures are disappointing. https:\/\/www.ftc.gov\/sites\/default\/files\/documents\/reports\/mobile-apps-kids-current-privacy-disclosures-are-disappointing\/120216mobile_apps_kids.pdf. (Feb. 2012)."},{"key":"e_1_3_2_1_5_1","unstructured":"Federal Trade Commission. 2012. Mobile apps for kids: disclosures still not making the grade. https:\/\/www.ftc.gov\/sites\/default\/files\/documents\/reports\/mobile-apps-kids-disclosures-still-not-making-grade\/121210mobilekidsappreport.pdf. (Dec. 2012).  Federal Trade Commission. 2012. Mobile apps for kids: disclosures still not making the grade. https:\/\/www.ftc.gov\/sites\/default\/files\/documents\/reports\/mobile-apps-kids-disclosures-still-not-making-grade\/121210mobilekidsappreport.pdf. (Dec. 2012)."},{"key":"e_1_3_2_1_6_1","unstructured":"Federal Trade Commission. 2015. Children's Online Privacy Protection Rule (\"COPPA\"). (2015). https:\/\/www.ftc.gov\/enforcement\/rules\/rulemaking-regulatory-reform-proceedings\/childrens-online-privacy-protection-rule  Federal Trade Commission. 2015. Children's Online Privacy Protection Rule (\"COPPA\"). (2015). https:\/\/www.ftc.gov\/enforcement\/rules\/rulemaking-regulatory-reform-proceedings\/childrens-online-privacy-protection-rule"},{"key":"e_1_3_2_1_7_1","volume-title":"Kids' apps disclosures revisited. https:\/\/www.ftc.gov\/news-events\/blogs\/business-blog\/2015\/09\/kids-apps-disclosures-revisited. (Sept","author":"Federal Trade Commission","year":"2015","unstructured":"Federal Trade Commission . 2015. Kids' apps disclosures revisited. https:\/\/www.ftc.gov\/news-events\/blogs\/business-blog\/2015\/09\/kids-apps-disclosures-revisited. (Sept . 2015 ). Federal Trade Commission. 2015. Kids' apps disclosures revisited. https:\/\/www.ftc.gov\/news-events\/blogs\/business-blog\/2015\/09\/kids-apps-disclosures-revisited. (Sept. 2015)."},{"key":"e_1_3_2_1_8_1","series-title":"Lecture Notes in Computer Science, vol 7731.","volume-title":"Data Privacy Management and Autonomous Spontaneous Security","author":"Costante Elisa","unstructured":"Elisa Costante , Jerry den Hartog , and Milan Petkovi\u0107 . 2013. What websites know about you . In Data Privacy Management and Autonomous Spontaneous Security . Lecture Notes in Computer Science, vol 7731. Elisa Costante, Jerry den Hartog, and Milan Petkovi\u0107. 2013. What websites know about you. In Data Privacy Management and Autonomous Spontaneous Security. Lecture Notes in Computer Science, vol 7731."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381979"},{"key":"e_1_3_2_1_10_1","volume-title":"Workshop on the Economics of Information Security (WEIS'13)","author":"Cranor Lorrie Faith","year":"2013","unstructured":"Lorrie Faith Cranor , Kelly Idouchi , Pedro Giovanni Leon , Manya Sleeper , and Blase Ur . 2013 . Are they actually any different? Comparing thousands of financial institutions' privacy practices . In Workshop on the Economics of Information Security (WEIS'13) . Washington, DC, USA. Lorrie Faith Cranor, Kelly Idouchi, Pedro Giovanni Leon, Manya Sleeper, and Blase Ur. 2013. Are they actually any different? Comparing thousands of financial institutions' privacy practices. In Workshop on the Economics of Information Security (WEIS'13). Washington, DC, USA."},{"key":"e_1_3_2_1_11_1","unstructured":"CTVNews. 201"},{"key":"e_1_3_2_1_13_1","unstructured":"European Union. 2016. General data protection regulation. http:\/\/ec.europa.eu\/justice\/data-protection\/reform\/files\/regulation_oj_en.pdf. (April 2016).  European Union. 2016. General data protection regulation. http:\/\/ec.europa.eu\/justice\/data-protection\/reform\/files\/regulation_oj_en.pdf. (April 2016)."},{"key":"e_1_3_2_1_14_1","volume-title":"https:\/\/www.export.gov\/safeharbor","author":"U.S.-EU","year":"2017","unstructured":"Export.gov. 2017. U.S.-EU & U.S.-Swiss safe harbor frameworks. ( 2017 ). https:\/\/www.export.gov\/safeharbor Export.gov. 2017. U.S.-EU & U.S.-Swiss safe harbor frameworks. (2017). https:\/\/www.export.gov\/safeharbor"},{"key":"e_1_3_2_1_15_1","unstructured":"Campaign for a Commercial Free Childhood. 2015. Hell no Barbie: 8 reasons to leave Hello Barbie on the shelf. http:\/\/www.commercialfreechildhood.org\/action\/hell-no-barbie-8-reasons-leave-hello-barbie-shelf. (2015).  Campaign for a Commercial Free Childhood. 2015. Hell no Barbie: 8 reasons to leave Hello Barbie on the shelf. http:\/\/www.commercialfreechildhood.org\/action\/hell-no-barbie-8-reasons-leave-hello-barbie-shelf. (2015)."},{"key":"e_1_3_2_1_16_1","unstructured":"Stacy Gray. 2016. Always on: privacy implications of microphone-enabled devices. In Future of privacy forum. https:\/\/fpf.org\/wp-content\/uploads\/2016\/04\/FPF_Always_On_WP.pdf  Stacy Gray. 2016. Always on: privacy implications of microphone-enabled devices. In Future of privacy forum. https:\/\/fpf.org\/wp-content\/uploads\/2016\/04\/FPF_Always_On_WP.pdf"},{"key":"e_1_3_2_1_17_1","unstructured":"HackerOne. 2017. ToyTalk: bug bounty program - get rewards through HackerOne. (2017). https:\/\/hackerone.com\/toytalk  HackerOne. 2017. ToyTalk: bug bounty program - get rewards through HackerOne. (2017). https:\/\/hackerone.com\/toytalk"},{"key":"e_1_3_2_1_18_1","volume-title":"Pedro Giovanni Leon, and Alyssa Au.","author":"Hoke Candice","year":"2015","unstructured":"Candice Hoke , Lorrie Faith Cranor , Pedro Giovanni Leon, and Alyssa Au. 2015 . Are they worth reading? An in-depth analysis of online trackers' privacy policies. I\/S : a journal of law and policy for the information society (2015). http:\/\/engagedscholarship.csuohio.edu\/fac_articles\/783\/ Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, and Alyssa Au. 2015. Are they worth reading? An in-depth analysis of online trackers' privacy policies. I\/S: a journal of law and policy for the information society (2015). http:\/\/engagedscholarship.csuohio.edu\/fac_articles\/783\/"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Leif-Erik Holtz Katharina Nocun and Marit Hansen. 2010. Towards displaying privacy information with icons. In IFIP PrimeLife International Summer School on Privacy and Identity Management for Life.  Leif-Erik Holtz Katharina Nocun and Marit Hansen. 2010. Towards displaying privacy information with icons. In IFIP PrimeLife International Summer School on Privacy and Identity Management for Life.","DOI":"10.1007\/978-3-642-20769-3_27"},{"key":"e_1_3_2_1_20_1","volume-title":"ADR services. https:\/\/www.jamsadr.com\/.","author":"JAMS.","year":"2017","unstructured":"JAMS. 2017. JAMS mediation, arbitration , ADR services. https:\/\/www.jamsadr.com\/. ( 2017 ). JAMS. 2017. JAMS mediation, arbitration, ADR services. https:\/\/www.jamsadr.com\/. (2017)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813689"},{"key":"e_1_3_2_1_23_1","volume-title":"Fingerprinting mobile devices using personalized configurations. Privacy Enhancing Technologies","author":"Kurtz Andreas","year":"2016","unstructured":"Andreas Kurtz , Hugo Gascon , Tobias Becker , Konrad Rieck , and Felix Freiling . 2016. Fingerprinting mobile devices using personalized configurations. Privacy Enhancing Technologies ( 2016 ). Andreas Kurtz, Hugo Gascon, Tobias Becker, Konrad Rieck, and Felix Freiling. 2016. Fingerprinting mobile devices using personalized configurations. Privacy Enhancing Technologies (2016)."},{"key":"e_1_3_2_1_24_1","unstructured":"Maaaaz. 2013. Androwarn. (Mar 2013). https:\/\/github.com\/maaaaz\/androwarn  Maaaaz. 2013. Androwarn. (Mar 2013). https:\/\/github.com\/maaaaz\/androwarn"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025735"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58469-0_36"},{"key":"e_1_3_2_1_27_1","volume-title":"One of the largest hacks yet exposes data on hundreds of thousands of kids. (2015). News article (Nov. 27","year":"2015","unstructured":"Motherboard.Vice.com. 2015. One of the largest hacks yet exposes data on hundreds of thousands of kids. (2015). News article (Nov. 27 , 2015 ). https:\/\/motherboard.vice.com\/en_us\/article\/yp3z5v\/one-of-the-largest-hacks-yet-exposes-data-on-hundreds-of-thousands-of-kids. Motherboard.Vice.com. 2015. One of the largest hacks yet exposes data on hundreds of thousands of kids. (2015). News article (Nov. 27, 2015). https:\/\/motherboard.vice.com\/en_us\/article\/yp3z5v\/one-of-the-largest-hacks-yet-exposes-data-on-hundreds-of-thousands-of-kids."},{"key":"e_1_3_2_1_28_1","volume-title":"Children's connected toys: data security and privacy concerns. (2016). Technical report (Dec. 14","author":"Nelson Bill","year":"2016","unstructured":"Bill Nelson . 2016. Children's connected toys: data security and privacy concerns. (2016). Technical report (Dec. 14 , 2016 ). US Senate Committee on Commerce, Science, and Transportation . https:\/\/www.hsdl.org\/?view&did=797394. Bill Nelson. 2016. Children's connected toys: data security and privacy concerns. (2016). Technical report (Dec. 14, 2016). US Senate Committee on Commerce, Science, and Transportation. https:\/\/www.hsdl.org\/?view&did=797394."},{"key":"e_1_3_2_1_29_1","unstructured":"The Usable Privacy Policy Research Project. 2016. Usable privacy. (2016). https:\/\/explore.usableprivacy.org\/  The Usable Privacy Policy Research Project. 2016. Usable privacy. (2016). https:\/\/explore.usableprivacy.org\/"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456413"},{"key":"e_1_3_2_1_31_1","volume-title":"Smart toy sales to grow threefold to exceed $15.5 billion by","author":"Research Juniper","year":"2022","unstructured":"Juniper Research . 2017. Smart toy sales to grow threefold to exceed $15.5 billion by 2022 . (2017). https:\/\/www.juniperresearch.com\/press\/press-releases\/smart-toy-sales-to-grow-threefold Juniper Research. 2017. Smart toy sales to grow threefold to exceed $15.5 billion by 2022. (2017). https:\/\/www.juniperresearch.com\/press\/press-releases\/smart-toy-sales-to-grow-threefold"},{"key":"e_1_3_2_1_32_1","volume-title":"Aleecia M. McDonald, Joel R. Reidenberg, Noah A. Smith, Fei Liu, N. Cameron Russell, Florian Schaub, and Shomir Wilson.","author":"Sadeh Norman","year":"2013","unstructured":"Norman Sadeh , Alessandro Acquisti , Travis D. Breaux , Lorrie Faith Cranor , Aleecia M. McDonald, Joel R. Reidenberg, Noah A. Smith, Fei Liu, N. Cameron Russell, Florian Schaub, and Shomir Wilson. 2013 . The usable privacy policy project. Technical Report CMU-ISR-13-119. Carnegie Mellon University . http:\/\/reports-archive.adm.cs.cmu.edu\/anon\/isr2013\/CMU-ISR-13-119.pdf Norman Sadeh, Alessandro Acquisti, Travis D. Breaux, Lorrie Faith Cranor, Aleecia M. McDonald, Joel R. Reidenberg, Noah A. Smith, Fei Liu, N. Cameron Russell, Florian Schaub, and Shomir Wilson. 2013. The usable privacy policy project. Technical Report CMU-ISR-13-119. Carnegie Mellon University. http:\/\/reports-archive.adm.cs.cmu.edu\/anon\/isr2013\/CMU-ISR-13-119.pdf"},{"key":"e_1_3_2_1_33_1","unstructured":"Somerset Recon Inc. 2016. Hello barbie security analysis. https:\/\/static1.squarespace.com\/static\/543effd8e4b095fba39dfe59\/t\/56a66d424bf1187ad34383b2\/1453747529070\/HelloBarbieSecurityAnalysis.pdf. (Jan. 2016).  Somerset Recon Inc. 2016. Hello barbie security analysis. https:\/\/static1.squarespace.com\/static\/543effd8e4b095fba39dfe59\/t\/56a66d424bf1187ad34383b2\/1453747529070\/HelloBarbieSecurityAnalysis.pdf. (Jan. 2016)."},{"key":"e_1_3_2_1_34_1","volume-title":"Smart toys that are the stuff of nightmares","author":"Taylor Emmeline","year":"2016","unstructured":"Emmeline Taylor and Katina Michael . 2016. Smart toys that are the stuff of nightmares . IEEE Technology and Society Magazine ( 2016 ). Emmeline Taylor and Katina Michael. 2016. Smart toys that are the stuff of nightmares. IEEE Technology and Society Magazine (2016)."},{"key":"e_1_3_2_1_35_1","volume-title":"CloudPets stuffed toys leak details of half a million users. (2017). News article (Feb. 28","year":"2017","unstructured":"TheGuardian.com. 2017. CloudPets stuffed toys leak details of half a million users. (2017). News article (Feb. 28 , 2017 ). https:\/\/www.theguardian.com\/technology\/2017\/feb\/28\/cloudpets-data-breach-leaks-details-of-500000-children-and-adults. TheGuardian.com. 2017. CloudPets stuffed toys leak details of half a million users. (2017). News article (Feb. 28, 2017). https:\/\/www.theguardian.com\/technology\/2017\/feb\/28\/cloudpets-data-breach-leaks-details-of-500000-children-and-adults."},{"key":"e_1_3_2_1_36_1","volume-title":"German parents told to destroy doll that can spy on children. (2017). News article (Feb. 17","year":"2017","unstructured":"TheGuardian.com. 2017. German parents told to destroy doll that can spy on children. (2017). News article (Feb. 17 , 2017 ). https:\/\/www.theguardian.com\/world\/2017\/feb\/17\/german-parents-told-to-destroy-my-friend-cayla-doll-spy-on-children. TheGuardian.com. 2017. German parents told to destroy doll that can spy on children. (2017). News article (Feb. 17, 2017). https:\/\/www.theguardian.com\/world\/2017\/feb\/17\/german-parents-told-to-destroy-my-friend-cayla-doll-spy-on-children."},{"key":"e_1_3_2_1_37_1","unstructured":"TRUSTe. 2017. Submit a report - watchdog. (2017). https:\/\/feedback-form.truste.com\/watchdog\/request  TRUSTe. 2017. Submit a report - watchdog. (2017). https:\/\/feedback-form.truste.com\/watchdog\/request"},{"key":"e_1_3_2_1_38_1","unstructured":"World Wide Web Consortium (W3C). 2007. P3P: The platform for privacy preferences. (2007). https:\/\/www.w3.org\/P3P\/  World Wide Web Consortium (W3C). 2007. P3P: The platform for privacy preferences. (2007). https:\/\/www.w3.org\/P3P\/"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Benjamin Yankson Farkhund Iqbal and Patrick CK Hung. 2017. Privacy preservation framework for smart connected toys. In Computing in Smart Toys.  Benjamin Yankson Farkhund Iqbal and Patrick CK Hung. 2017. Privacy preservation framework for smart connected toys. In Computing in Smart Toys.","DOI":"10.1007\/978-3-319-62072-5_9"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813669"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23034"}],"event":{"name":"STAST2017: 7th International Workshop on Socio-Technical Aspects in Security and Trust","location":"Orlando Florida USA","acronym":"STAST2017"},"container-title":["Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167996.3168002","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3167996.3168002","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:07Z","timestamp":1750213567000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167996.3168002"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,5]]},"references-count":40,"alternative-id":["10.1145\/3167996.3168002","10.1145\/3167996"],"URL":"https:\/\/doi.org\/10.1145\/3167996.3168002","relation":{},"subject":[],"published":{"date-parts":[[2018,12,5]]},"assertion":[{"value":"2018-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}