{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T10:39:04Z","timestamp":1753439944001,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,29]],"date-time":"2018-10-29T00:00:00Z","timestamp":1540771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,29]]},"DOI":"10.1145\/3293578.3293589","type":"proceedings-article","created":{"date-parts":[[2019,2,19]],"date-time":"2019-02-19T20:59:18Z","timestamp":1550609958000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Modularity is the Key A New Approach to Social Media Privacy Policies"],"prefix":"10.1145","author":[{"given":"Sanchari","family":"Das","sequence":"first","affiliation":[{"name":"Indiana University, Bloomington"}]},{"given":"Jayati","family":"Dev","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington"}]},{"given":"Kaushik","family":"Srinivasan","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington"}]}],"member":"320","published-online":{"date-parts":[[2018,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"volume-title":"Designing privacy enhancing technologies","author":"Berthold Oliver","key":"e_1_3_2_1_2_1","unstructured":"Oliver Berthold and Marit K\u00f6hntopp . 2001. Identity management based on P3P . In Designing privacy enhancing technologies . Springer , 141--160. Oliver Berthold and Marit K\u00f6hntopp. 2001. Identity management based on P3P. In Designing privacy enhancing technologies. Springer, 141--160."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Giovanni Buttarelli. 2016. The EU GDPR as a clarion call for a new global digital gold standard. (2016).  Giovanni Buttarelli. 2016. The EU GDPR as a clarion call for a new global digital gold standard. (2016).","DOI":"10.1093\/idpl\/ipw006"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.84"},{"key":"e_1_3_2_1_5_1","volume-title":"Canada","author":"Cavoukian Ann","year":"2009","unstructured":"Ann Cavoukian . 2009. Privacy by design. Take the challenge. Information and privacy commissioner of Ontario , Canada ( 2009 ). Ann Cavoukian. 2009. Privacy by design. Take the challenge. Information and privacy commissioner of Ontario, Canada (2009)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/345124.345168"},{"volume-title":"Designing personalized user experiences in eCommerce","author":"Cranor Lorrie Faith","key":"e_1_3_2_1_7_1","unstructured":"Lorrie Faith Cranor . 2004. I didnt buy it for myself . In Designing personalized user experiences in eCommerce . Springer , 57--73. Lorrie Faith Cranor. 2004. I didnt buy it for myself. In Designing personalized user experiences in eCommerce. Springer, 57--73."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165734.1165735"},{"key":"e_1_3_2_1_9_1","volume-title":"2018 International Conference on Financial Cryptography and Data Security (FC).","author":"Das Sanchari","year":"2018","unstructured":"Sanchari Das , Andrew Dingman , and L Jean Camp . 2018 . Why Johnny Doesn\u00e2\u0102&Zacute;t Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key . In 2018 International Conference on Financial Cryptography and Data Security (FC). Sanchari Das, Andrew Dingman, and L Jean Camp. 2018. Why Johnny Doesn\u00e2\u0102&Zacute;t Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key. In 2018 International Conference on Financial Cryptography and Data Security (FC)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01494.x"},{"key":"e_1_3_2_1_11_1","volume-title":"12th International Symposium on Human Aspects of Information Security Assurance (HAISA).","author":"Dev Jayati","year":"2018","unstructured":"Jayati Dev , Sanchari Das , and L Jean Camp . 2018 . Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India . In 12th International Symposium on Human Aspects of Information Security Assurance (HAISA). Jayati Dev, Sanchari Das, and L Jean Camp. 2018. Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India. In 12th International Symposium on Human Aspects of Information Security Assurance (HAISA)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002168.2002175"},{"key":"e_1_3_2_1_13_1","unstructured":"Martin Fishbein and Icek Ajzen. 1977. Belief attitude intention and behavior: An introduction to theory and research. (1977).  Martin Fishbein and Icek Ajzen. 1977. Belief attitude intention and behavior: An introduction to theory and research. (1977)."},{"key":"e_1_3_2_1_14_1","volume-title":"Mental workload dynamics in adaptive interface design","author":"Hancock Peter A","year":"1988","unstructured":"Peter A Hancock and Mark H Chignell . 1988. Mental workload dynamics in adaptive interface design . IEEE transactions on Systems, Man, and Cybernetics 18, 4 ( 1988 ), 647--658. Peter A Hancock and Mark H Chignell. 1988. Mental workload dynamics in adaptive interface design. IEEE transactions on Systems, Man, and Cybernetics 18, 4 (1988), 647--658."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011187500863"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/767193.767196"},{"key":"e_1_3_2_1_17_1","volume-title":"Cherry Mangat, Nam Huy Bui, Derek Joseph Halliday, and Arunsunai Anbukarasi Anbalagapandian.","author":"Mandal Ayan Kanti","year":"2015","unstructured":"Ayan Kanti Mandal , Yuan Xie , David Luke Richardson , Cherry Mangat, Nam Huy Bui, Derek Joseph Halliday, and Arunsunai Anbukarasi Anbalagapandian. 2015 . Mobile communication device display with graphical user interface comprising security and privacy advisor screens. (Jan. 6 2015). US Patent D720,766. Ayan Kanti Mandal, Yuan Xie, David Luke Richardson, Cherry Mangat, Nam Huy Bui, Derek Joseph Halliday, and Arunsunai Anbukarasi Anbalagapandian. 2015. Mobile communication device display with graphical user interface comprising security and privacy advisor screens. (Jan. 6 2015). US Patent D720,766."},{"key":"e_1_3_2_1_18_1","first-page":"543","article-title":"The cost of reading privacy policies","volume":"4","author":"McDonald Aleecia M","year":"2008","unstructured":"Aleecia M McDonald and Lorrie Faith Cranor . 2008 . The cost of reading privacy policies . ISJLP 4 (2008), 543 . Aleecia M McDonald and Lorrie Faith Cranor. 2008. The cost of reading privacy policies. ISJLP 4 (2008), 543.","journal-title":"ISJLP"},{"volume-title":"The design of everyday things: Revised and expanded edition","author":"Norman Don","key":"e_1_3_2_1_19_1","unstructured":"Don Norman . 2013. The design of everyday things: Revised and expanded edition . Basic Books . Don Norman. 2013. The design of everyday things: Revised and expanded edition. Basic Books."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1086\/688669"},{"key":"e_1_3_2_1_22_1","first-page":"809","article-title":"Intangible Privacy Rights: How Europe's GDPR Will Set a New Global Standard for Personal Data Protection","volume":"47","author":"Safari Beata A","year":"2016","unstructured":"Beata A Safari . 2016 . Intangible Privacy Rights: How Europe's GDPR Will Set a New Global Standard for Personal Data Protection . Seton Hall L. Rev. 47 (2016), 809 . Beata A Safari. 2016. Intangible Privacy Rights: How Europe's GDPR Will Set a New Global Standard for Personal Data Protection. Seton Hall L. Rev. 47 (2016), 809.","journal-title":"Seton Hall L. Rev."},{"volume-title":"Designing personalized user experiences in eCommerce","author":"Teltzrow Maximilian","key":"e_1_3_2_1_23_1","unstructured":"Maximilian Teltzrow and Alfred Kobsa . 2004. Impacts of user privacy preferences on personalized systems . In Designing personalized user experiences in eCommerce . Springer , 315--332. Maximilian Teltzrow and Alfred Kobsa. 2004. Impacts of user privacy preferences on personalized systems. In Designing personalized user experiences in eCommerce. Springer, 315--332."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27585-2_8"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Joseph Turow Michael Hennessy and Nora A Draper. 2015. The tradeoff fallacy: How marketers are misrepresenting American consumers and opening them up to exploitation. (2015).  Joseph Turow Michael Hennessy and Nora A Draper. 2015. The tradeoff fallacy: How marketers are misrepresenting American consumers and opening them up to exploitation. (2015).","DOI":"10.2139\/ssrn.2820060"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314418.1314426"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623705"}],"event":{"name":"MexIHC '18: 7th Mexican Conference on Human-Computer Interaction","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Merida Mexico","acronym":"MexIHC '18"},"container-title":["Proceedings of the 7th Mexican Conference on Human-Computer Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3293578.3293589","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3293578.3293589","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:01Z","timestamp":1750208521000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3293578.3293589"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,29]]},"references-count":26,"alternative-id":["10.1145\/3293578.3293589","10.1145\/3293578"],"URL":"https:\/\/doi.org\/10.1145\/3293578.3293589","relation":{},"subject":[],"published":{"date-parts":[[2018,10,29]]},"assertion":[{"value":"2018-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}