{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:08Z","timestamp":1750220768429,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T00:00:00Z","timestamp":1567900800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,8]]},"DOI":"10.1145\/3340764.3340790","type":"proceedings-article","created":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T12:20:31Z","timestamp":1568031631000},"page":"309-319","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Webtracking under the New Data Protection Law"],"prefix":"10.1145","author":[{"given":"Timo","family":"Jakobi","sequence":"first","affiliation":[{"name":"Wirtschaftsinformatik, insb. IT-Sicherheit und Datenschutz, University of Siegen, Siegen, NRW, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gunnar","family":"Stevens","sequence":"additional","affiliation":[{"name":"Wirtschaftsinformatik, insb. IT-Sicherheit und Datenschutz, University of Siegen, Siegen, NRW, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anna-Magdalena","family":"Seufert","sequence":"additional","affiliation":[{"name":"B\u00fcrgerliches Recht und Immaterialg\u00fcterrecht, University of Siegen, Siegen, NRW, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Max","family":"Becker","sequence":"additional","affiliation":[{"name":"B\u00fcrgerliches Recht und Immaterialg\u00fcterrecht, University of Siegen, Siegen, NRW, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2019,9,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"et al","author":"Achara J.P.","year":"2016","unstructured":"Achara , J.P. et al . 2016 . Mytrackingchoices : Pacifying the ad-block war by enforcing user privacy preferences. arXiv preprint arXiv:1604.04495. (2016). Achara, J.P. et al. 2016. Mytrackingchoices: Pacifying the ad-block war by enforcing user privacy preferences. arXiv preprint arXiv:1604.04495. (2016)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.84.5.888"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382268"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685221211219155"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808119"},{"key":"e_1_3_2_1_6_1","unstructured":"Beales H. 2010. The value of behavioral targeting. Network Advertising Initiative. 1 (2010).  Beales H. 2010. The value of behavioral targeting. Network Advertising Initiative. 1 (2010)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1628\/002268817X14845656323252"},{"key":"e_1_3_2_1_8_1","volume-title":"et al","author":"Brecht F.","year":"2012","unstructured":"Brecht , F. et al . 2012 . Communication Anonymizers : Personality, Internet Privacy Literacy and their Influence on Technology Acceptance. ECIS ( 2012), 214. Brecht, F. et al. 2012. Communication Anonymizers: Personality, Internet Privacy Literacy and their Influence on Technology Acceptance. ECIS (2012), 214."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2637878"},{"key":"e_1_3_2_1_10_1","volume-title":"Forthcoming.","author":"Calo R.","year":"2013","unstructured":"Calo , R. 2013. Digital Market Manipulation. George Washington Law Review , Forthcoming. ( 2013 ). Calo, R. 2013. Digital Market Manipulation. George Washington Law Review, Forthcoming. (2013)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685221211219155"},{"volume-title":"Advanced web metrics with Google Analytics","author":"Clifton B.","key":"e_1_3_2_1_12_1","unstructured":"Clifton , B. 2012. Advanced web metrics with Google Analytics . John Wiley & Sons . Clifton, B. 2012. Advanced web metrics with Google Analytics. John Wiley & Sons."},{"key":"e_1_3_2_1_13_1","unstructured":"Cookie Hinweis: Ben\u00f6tigt jede Webseite einen Cookie Hinweis? https:\/\/www.e-recht24.de\/artikel\/datenschutz\/8451-hinweispflicht-fuer-cookies.html. Accessed: 2019-04-05.  Cookie Hinweis: Ben\u00f6tigt jede Webseite einen Cookie Hinweis? https:\/\/www.e-recht24.de\/artikel\/datenschutz\/8451-hinweispflicht-fuer-cookies.html. Accessed: 2019-04-05."},{"volume-title":"Web privacy with P3P","author":"Cranor L.F.","key":"e_1_3_2_1_14_1","unstructured":"Cranor , L.F. 2002. Web privacy with P3P . O'Reilly Media, Inc. Cranor, L.F. 2002. Web privacy with P3P. O'Reilly Media, Inc."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings on privacy enhancing technologies. 2015","author":"Datta A.","year":"2015","unstructured":"Datta , A. et al. 2015. Automated experiments on ad privacy settings . Proceedings on privacy enhancing technologies. 2015 , 1 ( 2015 ), 92--112. Datta, A. et al. 2015. Automated experiments on ad privacy settings. Proceedings on privacy enhancing technologies. 2015, 1 (2015), 92--112."},{"key":"e_1_3_2_1_16_1","volume-title":"et al","author":"Degeling M.","year":"2018","unstructured":"Degeling , M. et al . 2018 . We Value Your Privacy... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy . arXiv preprint arXiv:1808.05096. (2018). Degeling, M. et al. 2018. We Value Your Privacy... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy. arXiv preprint arXiv:1808.05096. (2018)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_1_18_1","volume-title":"et al","author":"Ermakova T.","year":"2018","unstructured":"Ermakova , T. et al . 2018 . Web Tracking-A Literature Review on the State of Research . (2018). Ermakova, T. et al. 2018. Web Tracking-A Literature Review on the State of Research. (2018)."},{"key":"e_1_3_2_1_19_1","unstructured":"Europ\u00e4ische Kommission 2017. Vorschlag f\u00fcr eine VERORDNUNG DES EUROP\u00c4ISCHEN PARLAMENTS UND DES RATES \u00fcber die Achtung des Privatlebens und den Schutz personenbezogener Daten in der elektronischen Kommunikation und zur Aufhebung der Richtlinie 2002\/58\/EG (Verordnung \u00fcber Privatsph\u00e4re und elektronische Kommunikation).  Europ\u00e4ische Kommission 2017. Vorschlag f\u00fcr eine VERORDNUNG DES EUROP\u00c4ISCHEN PARLAMENTS UND DES RATES \u00fcber die Achtung des Privatlebens und den Schutz personenbezogener Daten in der elektronischen Kommunikation und zur Aufhebung der Richtlinie 2002\/58\/EG (Verordnung \u00fcber Privatsph\u00e4re und elektronische Kommunikation)."},{"key":"e_1_3_2_1_20_1","volume-title":"Official Journal of the European Union L 119\/2016","author":"European Parliament of the Council 2016. REGULATION (EU) 2016\/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL.","year":"2016","unstructured":"European Parliament of the Council 2016. REGULATION (EU) 2016\/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL. Official Journal of the European Union L 119\/2016 . Volume 59 , L119 ( May 2016 ). European Parliament of the Council 2016. REGULATION (EU) 2016\/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL. Official Journal of the European Union L 119\/2016. Volume 59, L119 (May 2016)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2240236.2240243"},{"key":"e_1_3_2_1_23_1","unstructured":"Internetpenetrationsrate weltweit 2021 | Prognose: https:\/\/de.statista.com\/statistik\/daten\/studie\/369362\/umfrage\/prognose-der-internetpenetrationsrate-weltweit\/. Accessed: 2019-04-05.  Internetpenetrationsrate weltweit 2021 | Prognose: https:\/\/de.statista.com\/statistik\/daten\/studie\/369362\/umfrage\/prognose-der-internetpenetrationsrate-weltweit\/. Accessed: 2019-04-05."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281444"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11623-018-1029-7"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/07370020903586662"},{"key":"e_1_3_2_1_27_1","first-page":"2608","article-title":"Die Entwicklung des Datenschutzrechts im ersten Halbjahr 2018","volume":"36","author":"Klug C.","year":"2018","unstructured":"Klug , C. and Golar , P. 2018 . Die Entwicklung des Datenschutzrechts im ersten Halbjahr 2018 . NJW. Heft 36 (2018), 2608 -- 2611 . Klug, C. and Golar, P. 2018. Die Entwicklung des Datenschutzrechts im ersten Halbjahr 2018. NJW. Heft 36 (2018), 2608--2611.","journal-title":"NJW."},{"key":"e_1_3_2_1_28_1","unstructured":"Kontaxis G. and Chew M. 2015. Tracking protection in firefox for privacy and performance. arXiv preprint arXiv:1506.04104. (2015).  Kontaxis G. and Chew M. 2015. Tracking protection in firefox for privacy and performance. arXiv preprint arXiv:1506.04104. (2015)."},{"key":"e_1_3_2_1_29_1","unstructured":"Kranig T. 2019. Digitale Dienste im Datenschutzcheck. Bayerisches Landesamt f\u00fcr Datenschutzaufsicht.  Kranig T. 2019. Digitale Dienste im Datenschutzcheck. Bayerisches Landesamt f\u00fcr Datenschutzaufsicht."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177088"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2015.01.004"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207759"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501611"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866929"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0009"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.26"},{"key":"e_1_3_2_1_38_1","unstructured":"M\u00fcller K. 2019. EuGH-Generalanwalt unterst\u00fctzt vzbv-Position zum Setzen von Cookies. Verbraucherzentrale Bundesverband.  M\u00fcller K. 2019. EuGH-Generalanwalt unterst\u00fctzt vzbv-Position zum Setzen von Cookies. Verbraucherzentrale Bundesverband."},{"key":"e_1_3_2_1_39_1","volume-title":"et al","author":"Nithyanand R.","year":"2016","unstructured":"Nithyanand , R. et al . 2016 . Adblocking and counter blocking: A slice of the arms race. 6th ${$USENIX$}$ Workshop on Free and Open Communications on the Internet ( ${$FOCI$}$ 16) (2016). Nithyanand, R. et al. 2016. Adblocking and counter blocking: A slice of the arms race. 6th ${$USENIX$}$ Workshop on Free and Open Communications on the Internet (${$FOCI$}$ 16) (2016)."},{"key":"e_1_3_2_1_40_1","unstructured":"Priebe A. 2018. Was nach der DSGVO-Panik bleibt: Kreative Strategien zur Einholung des Consents. OnlineMarketing.de.  Priebe A. 2018. Was nach der DSGVO-Panik bleibt: Kreative Strategien zur Einholung des Consents. OnlineMarketing.de."},{"key":"e_1_3_2_1_41_1","volume-title":"Web Tracking: Overview and applicability in digital investigations. it-Information Technology. 57, 6","author":"Pugliese G.","year":"2015","unstructured":"Pugliese , G. 2015 . Web Tracking: Overview and applicability in digital investigations. it-Information Technology. 57, 6 (2015), 366--375. Pugliese, G. 2015. Web Tracking: Overview and applicability in digital investigations. it-Information Technology. 57, 6 (2015), 366--375."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815705"},{"key":"e_1_3_2_1_43_1","volume-title":"et al","author":"Purcell K.","year":"2012","unstructured":"Purcell , K. et al . 2012 . Search engine use 2012. (2012). Purcell, K. et al. 2012. Search engine use 2012. (2012)."},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation","author":"Roesner F.","year":"2012","unstructured":"Roesner , F. et al. 2012. Detecting and defending against third-party tracking on the web . Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation ( 2012 ), 12--12. Roesner, F. et al. 2012. Detecting and defending against third-party tracking on the web. Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation (2012), 12--12."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1093\/jigpal\/jzw041"},{"key":"e_1_3_2_1_46_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS 2015)","author":"Schaub F.","year":"2015","unstructured":"Schaub , F. et al. 2015. A design space for effective privacy notices . Eleventh Symposium On Usable Privacy and Security (SOUPS 2015) ( 2015 ), 1--17. Schaub, F. et al. 2015. A design space for effective privacy notices. Eleventh Symposium On Usable Privacy and Security (SOUPS 2015) (2015), 1--17."},{"key":"e_1_3_2_1_47_1","volume-title":"NDSS workshop on usable security","author":"Schaub F.","year":"2016","unstructured":"Schaub , F. et al. 2016. Watching them watching me: Browser extensions impact on user privacy awareness and concern . NDSS workshop on usable security ( 2016 ). Schaub, F. et al. 2016. Watching them watching me: Browser extensions impact on user privacy awareness and concern. NDSS workshop on usable security (2016)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1561\/106.00000014"},{"key":"e_1_3_2_1_49_1","volume-title":"Datenschutzkonformes Webtracking nach Wegfall des TMG.Was bringen die DS-GVO und die ePrivacy-Verordnung? 10\/2017","author":"Schleipfer S.","year":"2017","unstructured":"Schleipfer , S. 2017. Datenschutzkonformes Webtracking nach Wegfall des TMG.Was bringen die DS-GVO und die ePrivacy-Verordnung? 10\/2017 ( 2017 ), 460--466. Schleipfer, S. 2017. Datenschutzkonformes Webtracking nach Wegfall des TMG.Was bringen die DS-GVO und die ePrivacy-Verordnung? 10\/2017 (2017), 460--466."},{"key":"e_1_3_2_1_50_1","volume-title":"Looking back at P3P: lessons for the future","author":"Schwartz A.","year":"2009","unstructured":"Schwartz , A. 2009. Looking back at P3P: lessons for the future . Center for Democracy & Technology , https:\/\/www.cdt.org\/files\/pdfs\/P3P_Retro_Final_0.pdf. ( 2009 ). Schwartz, A. 2009. Looking back at P3P: lessons for the future. Center for Democracy & Technology, https:\/\/www.cdt.org\/files\/pdfs\/P3P_Retro_Final_0.pdf. (2009)."},{"key":"e_1_3_2_1_51_1","volume-title":"Telemediengesetz: TMG mit Netzwerkdurchsetzungsgesetz (NetzDG). C.H.BECK.","author":"Spindler G.","year":"2018","unstructured":"Spindler , G. and Schmitz , P . 2018 . Telemediengesetz: TMG mit Netzwerkdurchsetzungsgesetz (NetzDG). C.H.BECK. Spindler, G. and Schmitz, P. 2018. Telemediengesetz: TMG mit Netzwerkdurchsetzungsgesetz (NetzDG). C.H.BECK."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11623-014-0180-z"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655188.1655190"},{"key":"e_1_3_2_1_54_1","volume-title":"et al","author":"Turow J.","year":"2009","unstructured":"Turow , J. et al . 2009 . Americans reject tailored advertising and three activities that enable it. Available at SSRN 1478214. (2009). Turow, J. et al. 2009. Americans reject tailored advertising and three activities that enable it. Available at SSRN 1478214. (2009)."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335362"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883028"},{"key":"e_1_3_2_1_57_1","unstructured":"Zuboff S. 2019. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs.   Zuboff S. 2019. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs."}],"event":{"name":"MuC'19: Mensch-und-Computer","acronym":"MuC'19","location":"Hamburg Germany"},"container-title":["Proceedings of Mensch und Computer 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340764.3340790","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3340764.3340790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:11Z","timestamp":1750200071000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340764.3340790"}},"subtitle":["Design Potentials at the Intersection of Jurisprudence and HCI"],"short-title":[],"issued":{"date-parts":[[2019,9,8]]},"references-count":57,"alternative-id":["10.1145\/3340764.3340790","10.1145\/3340764"],"URL":"https:\/\/doi.org\/10.1145\/3340764.3340790","relation":{},"subject":[],"published":{"date-parts":[[2019,9,8]]},"assertion":[{"value":"2019-09-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}