{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T16:21:34Z","timestamp":1756311694570,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":84,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1145\/3314058.3314066","type":"proceedings-article","created":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T12:45:07Z","timestamp":1561121107000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Situated information flow theory"],"prefix":"10.1145","author":[{"given":"Sebastian","family":"Benthall","sequence":"first","affiliation":[{"name":"New York University"}]}],"member":"320","published-online":{"date-parts":[[2019,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.plrev.2004.01.002"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"George A Akerlof. 1970. The market for \"lemons\": Quality uncertainty and the market mechanism. The quarterly journal of economics (1970) 488--500. George A Akerlof. 1970. The market for \"lemons\": Quality uncertainty and the market mechanism. The quarterly journal of economics (1970) 488--500.","DOI":"10.2307\/1879431"},{"key":"e_1_3_2_1_3_1","unstructured":"Edward C. Baig. 2017. Google stops secretly tracking cellular location info. https:\/\/www.usatoday.com\/story\/tech\/talkingtech\/2017\/11\/22\/google-stops-collecting-cellular-location-info-after-news-probe\/886345001\/ Edward C. Baig. 2017. Google stops secretly tracking cellular location info. https:\/\/www.usatoday.com\/story\/tech\/talkingtech\/2017\/11\/22\/google-stops-collecting-cellular-location-info-after-news-probe\/886345001\/"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.32"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.32"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2007.26"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009380.1009669"},{"key":"e_1_3_2_1_8_1","unstructured":"Gregory Bateson. 1972. Steps to an ecology of mind: Collected essays in anthropology psychiatry evolution and epistemology. University of Chicago Press. Gregory Bateson. 1972. Steps to an ecology of mind: Collected essays in anthropology psychiatry evolution and epistemology. University of Chicago Press."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Sebastian Benthall Seda G\u00fcrses Helen Nissenbaum etal 2017. Contextual Integrity through the Lens of Computer Science. Foundations and Trends\u00ae in Privacy and Security 2 1 (2017) 1--69. Sebastian Benthall Seda G\u00fcrses Helen Nissenbaum et al. 2017. Contextual Integrity through the Lens of Computer Science. Foundations and Trends \u00ae in Privacy and Security 2 1 (2017) 1--69.","DOI":"10.1561\/3300000016"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","DOI":"10.3138\/9781442687813","volume-title":"Cybersemiotics: Why information is not enough! University of Toronto Press.","author":"Brier S\u00f8ren","year":"2008"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Michael K Buckland. 1991. Information as thing. Journal of the American Society for Information Science (1986-1998) 42 5 (1991) 351. Michael K Buckland. 1991. Information as thing. Journal of the American Society for Information Science (1986-1998) 42 5 (1991) 351.","DOI":"10.1002\/(SICI)1097-4571(199106)42:5<351::AID-ASI5>3.0.CO;2-3"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951715622512"},{"key":"e_1_3_2_1_13_1","unstructured":"Carole Cadwalladr and E Graham-Harrison. 2018. The Cambridge Analytica Files. 'I made Steve Bannon's psyhological warfare tool': meet the data war whistleblower (2018). Carole Cadwalladr and E Graham-Harrison. 2018. The Cambridge Analytica Files. 'I made Steve Bannon's psyhological warfare tool': meet the data war whistleblower (2018)."},{"key":"e_1_3_2_1_14_1","first-page":"2017","article-title":"Google collects Android users' locations even when location services are disabled","volume":"21","author":"Collins Keith","year":"2017","journal-title":"Quartz Media"},{"key":"e_1_3_2_1_15_1","unstructured":"Thomas M Cover and Joy A Thomas. 2012. Elements of information theory. John Wiley & Sons. Thomas M Cover and Joy A Thomas. 2012. Elements of information theory. John Wiley & Sons."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.07.013"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04483-5_5"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25560-1_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134097"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2014.888458"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/14688417.2015.1072948"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-013-9326-1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866930"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866930"},{"key":"e_1_3_2_1_25_1","unstructured":"Finale Doshi-Velez and Been Kim. 2017. Towards a rigorous science of interpretable machine learning. arXiv preprint arXiv:1702.08608 (2017). Finale Doshi-Velez and Been Kim. 2017. Towards a rigorous science of interpretable machine learning. arXiv preprint arXiv:1702.08608 (2017)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951716665128"},{"key":"e_1_3_2_1_27_1","unstructured":"Fred Dretske. 1981. Knowledge and the Flow of Information. MIT Press. Fred Dretske. 1981. Knowledge and the Flow of Information. MIT Press."},{"volume-title":"The Stanford Encyclopedia of Philosophy (spring 2017 ed.), Edward N","author":"Floridi Luciano","key":"e_1_3_2_1_28_1"},{"volume-title":"Proceedings of the Fifteenth conference on Uncertainty in artificial intelligence. Morgan Kaufmann Publishers Inc., 196--205","year":"1999","author":"Friedman Nir","key":"e_1_3_2_1_29_1"},{"volume-title":"Proceedings of the Sixteenth conference on Uncertainty in artificial intelligence. Morgan Kaufmann Publishers Inc., 201--210","year":"2000","author":"Friedman Nir","key":"e_1_3_2_1_30_1"},{"volume-title":"Proceedings of the Fourteenth conference on Uncertainty in artificial intelligence. Morgan Kaufmann Publishers Inc., 139--147","year":"1998","author":"Friedman Nir","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01531004"},{"key":"e_1_3_2_1_33_1","unstructured":"James Gleick and Rob Shapiro. 2011. The information. Books on Tape. James Gleick and Rob Shapiro. 2011. The information. Books on Tape."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Clark Glymour. 2003. Learning prediction and causal Bayes nets. Trends in cognitive sciences 7 1 (2003) 43--48. Clark Glymour. 2003. Learning prediction and causal Bayes nets. Trends in cognitive sciences 7 1 (2003) 43--48.","DOI":"10.1016\/S1364-6613(02)00009-8"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Clark N Glymour. 2001. The mind's arrows: Bayes nets and graphical causal models in psychology. MIT press. Clark N Glymour. 2001. The mind's arrows: Bayes nets and graphical causal models in psychology. MIT press.","DOI":"10.7551\/mitpress\/4638.001.0001"},{"volume-title":"Proceedings of the IEEE Symposium on Security and Privacy. 11--20","author":"Joseph","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Alison Gopnik and Henry M Wellman. 2012. Reconstructing constructivism: Causal models Bayesian learning mechanisms and the theory theory. Psychological bulletin 138 6 (2012) 1085. Alison Gopnik and Henry M Wellman. 2012. Reconstructing constructivism: Causal models Bayesian learning mechanisms and the theory theory. Psychological bulletin 138 6 (2012) 1085.","DOI":"10.1037\/a0028044"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130769"},{"key":"e_1_3_2_1_39_1","unstructured":"Frances Grodzinsky and Herman T Tavani. 2010. Applying the \"Contextual Integrity\" Model of Privacy to Personal Blogs in the Blogoshere. (2010). Frances Grodzinsky and Herman T Tavani. 2010. Applying the \"Contextual Integrity\" Model of Privacy to Personal Blogs in the Blogoshere. (2010)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Mireille Hildebrandt. 2014. Location Data Purpose Binding and Contextual Integrity: What's the Message? In Protection of Information and the Right to Privacy-A New Equilibrium? Springer 31--62. Mireille Hildebrandt. 2014. Location Data Purpose Binding and Contextual Integrity: What's the Message? In Protection of Information and the Right to Privacy-A New Equilibrium? Springer 31--62.","DOI":"10.1007\/978-3-319-05720-0_3"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Mireille Hildebrandt. 2015. Smart technologies and the end (s) of law: novel entanglements of law and technology. Edward Elgar Publishing. Mireille Hildebrandt. 2015. Smart technologies and the end (s) of law: novel entanglements of law and technology. Edward Elgar Publishing.","DOI":"10.4337\/9781849808774.00016"},{"key":"e_1_3_2_1_42_1","unstructured":"K. Hill. 2012. How Target Figured Out A Teen Girl Was Pregnant Before Her Father Did. Forbes (2012). K. Hill. 2012. How Target Figured Out A Teen Girl Was Pregnant Before Her Father Did. Forbes (2012)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Eric Horvitz and Deirdre Mulligan. 2015. Data privacy and the greater good. Science 349 6245 (2015) 253--255. Eric Horvitz and Deirdre Mulligan. 2015. Data privacy and the greater good. Science 349 6245 (2015) 253--255.","DOI":"10.1126\/science.aac4520"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/2857070.2857120"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Edwin T Jaynes. 1957. Information theory and statistical mechanics. Physical review 106 4 (1957) 620. Edwin T Jaynes. 1957. Information theory and statistical mechanics. Physical review 106 4 (1957) 620.","DOI":"10.1103\/PhysRev.106.620"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23051"},{"volume-title":"Aegis: A semantic implementation of privacy as contextual integrity in social ecosystems. In Privacy, security and trust (pst)","year":"2013","author":"Kayes Imrul","key":"e_1_3_2_1_47_1"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Daphne Koller and Brian Milch. 2003. Multi-agent influence diagrams for representing and solving games. Games and economic behavior 45 1 (2003) 181--221. Daphne Koller and Brian Milch. 2003. Multi-agent influence diagrams for representing and solving games. Games and economic behavior 45 1 (2003) 181--221.","DOI":"10.1016\/S0899-8256(02)00544-4"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1218772110"},{"key":"e_1_3_2_1_50_1","unstructured":"Niklas Luhmann. 1995. Social systems. Stanford University Press. Niklas Luhmann. 1995. Social systems. Stanford University Press."},{"volume-title":"Proceedings of the AMIA Symposium. American Medical Informatics Association, 423","year":"2001","author":"Malin Bradley","key":"e_1_3_2_1_51_1"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Alice E Marwick and Danah Boyd. 2011. I tweet honestly I tweet passionately: Twitter users context collapse and the imagined audience. New media & society 13 1 (2011) 114--133. Alice E Marwick and Danah Boyd. 2011. I tweet honestly I tweet passionately: Twitter users context collapse and the imagined audience. New media & society 13 1 (2011) 114--133.","DOI":"10.1177\/1461444810365313"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA462529"},{"volume-title":"Proceedings of the Eleventh conference on Uncertainty in artificial intelligence. Morgan Kaufmann Publishers Inc., 411--418","year":"1995","author":"Meek Christopher","key":"e_1_3_2_1_54_1"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2016.0118"},{"key":"e_1_3_2_1_56_1","unstructured":"Arvind Narayanan and Vitaly Shmatikov. 2006. How to break anonymity of the netflix prize dataset. arXiv preprint cs\/0610105 (2006). Arvind Narayanan and Vitaly Shmatikov. 2006. How to break anonymity of the netflix prize dataset. arXiv preprint cs\/0610105 (2006)."},{"key":"e_1_3_2_1_57_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","journal-title":"Wash. L. Rev."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"crossref","unstructured":"Helen Nissenbaum. 2009. Privacy in context: Technology policy and the integrity of social life. Stanford University Press. Helen Nissenbaum. 2009. Privacy in context: Technology policy and the integrity of social life. Stanford University Press.","DOI":"10.1515\/9780804772891"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Helen Nissenbaum. 2009. Privacy in Context: Technology Policy and the Integrity of Social Life. Stanford University Press. Helen Nissenbaum. 2009. Privacy in Context: Technology Policy and the Integrity of Social Life. Stanford University Press.","DOI":"10.1515\/9780804772891"},{"volume-title":"Origin Privacy: Protecting Privacy in the Big-Data Era. Technical Report","year":"2018","author":"Nissenbaum Helen","key":"e_1_3_2_1_60_1"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20376-8_49"},{"key":"e_1_3_2_1_63_1","unstructured":"Geoffrey Nunberg. 1996. Farewell to the information age. The future of the book (1996) 103--138. Geoffrey Nunberg. 1996. Farewell to the information age. The future of the book (1996) 103--138."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"Frank Pasquale. 2015. The black box society: The secret algorithms that control money and information. Harvard University Press. Frank Pasquale. 2015. The black box society: The secret algorithms that control money and information. Harvard University Press.","DOI":"10.4159\/harvard.9780674736061"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"crossref","unstructured":"Judea Pearl. 1988. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. (1988). Judea Pearl. 1988. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. (1988).","DOI":"10.1016\/B978-0-08-051489-5.50008-4"},{"key":"e_1_3_2_1_66_1","first-page":"266","article-title":"{Bayesian Analysis in Expert Systems}: Comment","volume":"8","author":"Pearl Judea","year":"1993","journal-title":"Graphical Models, Causality and Intervention. Statist. Sci."},{"key":"e_1_3_2_1_67_1","unstructured":"Judea Pearl. 2009. Causality. Cambridge university press. Judea Pearl. 2009. Causality. Cambridge university press."},{"key":"e_1_3_2_1_68_1","unstructured":"Irwin Reyes Primal Wiesekera Abbas Razaghpanah Joel Reardon Narseo Vallina-Rodriguez Serge Egelman and Christian Kreibich. 2017. \"Is Our Children's Apps Learning?\" Automatically Detecting COPPA Violations. (2017). Irwin Reyes Primal Wiesekera Abbas Razaghpanah Joel Reardon Narseo Vallina-Rodriguez Serge Egelman and Christian Kreibich. 2017. \"Is Our Children's Apps Learning?\" Automatically Detecting COPPA Violations. (2017)."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-013-9329-y"},{"key":"e_1_3_2_1_71_1","first-page":"643","article-title":"Contextual expectations of privacy","volume":"35","author":"Selbst Andrew D","year":"2013","journal-title":"Cardozo L. Rev."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470660"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"crossref","unstructured":"Katie Shilton and Kirsten E Martin. 2013. Mobile privacy expectations in context. (2013). Katie Shilton and Kirsten E Martin. 2013. Mobile privacy expectations in context. (2013).","DOI":"10.2139\/ssrn.2238707"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"crossref","unstructured":"Steven Sloman. 2005. Causal models: How people think about the world and its alternatives. Oxford University Press. Steven Sloman. 2005. Causal models: How people think about the world and its alternatives. Oxford University Press.","DOI":"10.1093\/acprof:oso\/9780195183115.001.0001"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2015.13"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"crossref","unstructured":"Peter Spirtes Clark N Glymour Richard Scheines David Heckerman Christopher Meek Gregory Cooper and Thomas Richardson. 2000. Causation prediction and search. MIT press. Peter Spirtes Clark N Glymour Richard Scheines David Heckerman Christopher Meek Gregory Cooper and Thomas Richardson. 2000. Causation prediction and search. MIT press.","DOI":"10.7551\/mitpress\/1754.001.0001"},{"key":"e_1_3_2_1_78_1","unstructured":"Katherine J Strandburg. 2013. Free fall: The online market's consumer preference disconnect. U. Chi. Legal F. (2013) 95. Katherine J Strandburg. 2013. Free fall: The online market's consumer preference disconnect. U. Chi. Legal F. (2013) 95."},{"volume-title":"IAPP Privacy Perspectives","year":"2014","author":"Swire P","key":"e_1_3_2_1_79_1"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.40"},{"key":"e_1_3_2_1_81_1","unstructured":"Michael Carl Tschantz Shayak Sen and Anupam Datta. 2017. Differential Privacy as a Causal Property. arXiv preprint arXiv:1710.05899 (2017). Michael Carl Tschantz Shayak Sen and Anupam Datta. 2017. Differential Privacy as a Causal Property. arXiv preprint arXiv:1710.05899 (2017)."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"crossref","unstructured":"Zeynep Tufekci. 2014. Engineering the public: Big data surveillance and computational politics. First Monday 19 7 (2014). Zeynep Tufekci. 2014. Engineering the public: Big data surveillance and computational politics. First Monday 19 7 (2014).","DOI":"10.5210\/fm.v19i7.4901"},{"volume-title":"Machine Intelligence and Pattern Recognition.","author":"Verma Thomas","key":"e_1_3_2_1_83_1"},{"volume-title":"USENIX Security Symposium. 499--514","year":"2015","author":"Wijesekera Primal","key":"e_1_3_2_1_84_1"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physd.2008.03.040"}],"event":{"name":"HotSoS: Hot Topics in the Science of Security Symposium","sponsor":["National Security Agency National Security Agency"],"location":"Nashville Tennessee USA","acronym":"HotSoS"},"container-title":["Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314058.3314066","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314058.3314066","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:48Z","timestamp":1750202628000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314058.3314066"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":84,"alternative-id":["10.1145\/3314058.3314066","10.1145\/3314058"],"URL":"https:\/\/doi.org\/10.1145\/3314058.3314066","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]},"assertion":[{"value":"2019-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}