{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T23:10:01Z","timestamp":1769728201277,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,23]],"date-time":"2019-09-23T00:00:00Z","timestamp":1569196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Canada Research Chair","award":["950-231002-2016"],"award-info":[{"award-number":["950-231002-2016"]}]},{"name":"NSERC Discovery Grant","award":["RGPIN 06273-2017"],"award-info":[{"award-number":["RGPIN 06273-2017"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,23]]},"DOI":"10.1145\/3368860.3368865","type":"proceedings-article","created":{"date-parts":[[2020,1,15]],"date-time":"2020-01-15T19:41:45Z","timestamp":1579117305000},"page":"57-67","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Opt out of privacy or \"go home\""],"prefix":"10.1145","author":[{"given":"Fiona","family":"Westin","sequence":"first","affiliation":[{"name":"Carleton University, Ottawa, Canada"}]},{"given":"Sonia","family":"Chiasson","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, Canada"}]}],"member":"320","published-online":{"date-parts":[[2020,1,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ACM Code 2018 Task Force. 2018. ACM Code of Ethics and Professional Conduct. https:\/\/www.acm.org\/code-of-ethics.  ACM Code 2018 Task Force. 2018. ACM Code of Ethics and Professional Conduct. https:\/\/www.acm.org\/code-of-ethics."},{"key":"e_1_3_2_1_2_1","volume-title":"Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook","author":"Acquisti Alessandro","year":"2006","unstructured":"Alessandro Acquisti and Ralph Gross . 2006 . Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook . In Privacy Enhancing Technologies, George Danezis and Philippe Golle (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 36--58. Alessandro Acquisti and Ralph Gross. 2006. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. In Privacy Enhancing Technologies, George Danezis and Philippe Golle (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 36--58."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1257\/jel.54.2.442"},{"key":"e_1_3_2_1_5_1","volume-title":"A pattern language: towns, buildings, construction","author":"Alexander Christopher","unstructured":"Christopher Alexander . 1977. A pattern language: towns, buildings, construction . Oxford university press . Christopher Alexander. 1977. A pattern language: towns, buildings, construction. Oxford university press."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.02.057"},{"key":"e_1_3_2_1_7_1","volume-title":"Mark Zuckerberg has been talking about privacy for 15 years - here's almost everything he's said. CNBC (Mar","author":"Balakrishnan Anita","year":"2018","unstructured":"Anita Balakrishnan , Sara Salinas , and Matt Hunter . 2018. Mark Zuckerberg has been talking about privacy for 15 years - here's almost everything he's said. CNBC (Mar 2018 ). https:\/\/www.cnbc.com\/2018\/03\/21\/facebook-ceo-mark-zuckerbergs-statements-on-privacy-2003-2018.html Anita Balakrishnan, Sara Salinas, and Matt Hunter. 2018. Mark Zuckerberg has been talking about privacy for 15 years - here's almost everything he's said. CNBC (Mar 2018). https:\/\/www.cnbc.com\/2018\/03\/21\/facebook-ceo-mark-zuckerbergs-statements-on-privacy-2003-2018.html"},{"key":"e_1_3_2_1_8_1","volume-title":"Recent Advances in Intrusion Detection","author":"Balduzzi Marco","unstructured":"Marco Balduzzi , Christian Platzer , Thorsten Holz , Engin Kirda , Davide Balzarotti , and Christopher Kruegel . 2010. Abusing Social Networks for Automated User Profiling . In Recent Advances in Intrusion Detection , Somesh Jha, Robin Sommer, and Christian Kreibich (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 422--441. Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, and Christopher Kruegel. 2010. Abusing Social Networks for Automated User Profiling. In Recent Advances in Intrusion Detection, Somesh Jha, Robin Sommer, and Christian Kreibich (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 422--441."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2017.04.013"},{"key":"e_1_3_2_1_10_1","unstructured":"Diane Bartz. 2019. U.S. senators introduce social media bill to ban `dark patterns' tricks. https:\/\/www.reuters.com\/article\/us-usa-tech\/us-senators-introduce-social-media-bill-to-ban-dark-patterns-tricks-idUSKCN1RL25Q.  Diane Bartz. 2019. U.S. senators introduce social media bill to ban `dark patterns' tricks. https:\/\/www.reuters.com\/article\/us-usa-tech\/us-senators-introduce-social-media-bill-to-ban-dark-patterns-tricks-idUSKCN1RL25Q."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99605-9_15"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2017.04.039"},{"key":"e_1_3_2_1_13_1","volume-title":"Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data","author":"B\u00f6hme Rainer","year":"2012","unstructured":"Rainer B\u00f6hme and Stefanie P\u00f6tzsch . 2012 . Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data . In Financial Cryptography and Data Security, George Danezis (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg , 1--15. Rainer B\u00f6hme and Stefanie P\u00f6tzsch. 2012. Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data. In Financial Cryptography and Data Security, George Danezis (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1--15."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0038"},{"key":"e_1_3_2_1_15_1","volume-title":"Early Facebook and Google Employees Form Coalition to Fight What They Built. The New York Times (Feb","author":"Bowles Nellie","year":"2018","unstructured":"Nellie Bowles . 2018. Early Facebook and Google Employees Form Coalition to Fight What They Built. The New York Times (Feb 2018 ). https:\/\/nyti.ms\/2GJoKHg Nellie Bowles. 2018. Early Facebook and Google Employees Form Coalition to Fight What They Built. The New York Times (Feb 2018). https:\/\/nyti.ms\/2GJoKHg"},{"key":"e_1_3_2_1_16_1","unstructured":"Harry Brignull. [n.d.]. Dark Patterns Types of Dark Pattern. https:\/\/darkpatterns.org\/types-of-dark-pattern. Accessed: 2019-17-01.  Harry Brignull. [n.d.]. Dark Patterns Types of Dark Pattern. https:\/\/darkpatterns.org\/types-of-dark-pattern. Accessed: 2019-17-01."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444815590341"},{"key":"e_1_3_2_1_18_1","unstructured":"Ann Cavoukian. 2011. Privacy by Design: The 7 Foundational Principles.  Ann Cavoukian. 2011. Privacy by Design: The 7 Foundational Principles."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000018"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3217804.3217896"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12109"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167257"},{"key":"e_1_3_2_1_23_1","unstructured":"Michael Colesky Jaap-Henk Hoepman Christoph B\u00f6sch Frank Kargl Henning Kopp Patrick Mosby Daniel Le Metayer Inria Olha Drozd Jose M. del Alamo Yod Samuel Martin Julio C. Caiza Mohit Gupta and Nick Doty. [n.d.]. Privacy Patterns. https:\/\/privacypatterns.org\/. Accessed: 2018-17-12.  Michael Colesky Jaap-Henk Hoepman Christoph B\u00f6sch Frank Kargl Henning Kopp Patrick Mosby Daniel Le Metayer Inria Olha Drozd Jose M. del Alamo Yod Samuel Martin Julio C. Caiza Mohit Gupta and Nick Doty. [n.d.]. Privacy Patterns. https:\/\/privacypatterns.org\/. Accessed: 2018-17-12."},{"key":"e_1_3_2_1_24_1","volume-title":"You Deserve Privacy Online. Here's How You Could Actually Get It. Time (Jan","author":"Cook Tim","year":"2019","unstructured":"Tim Cook . 2019. You Deserve Privacy Online. Here's How You Could Actually Get It. Time (Jan 2019 ). http:\/\/time.com\/collection\/davos-2019\/5502591\/tim-cook-data-privacy\/ Tim Cook. 2019. You Deserve Privacy Online. Here's How You Could Actually Get It. Time (Jan 2019). http:\/\/time.com\/collection\/davos-2019\/5502591\/tim-cook-data-privacy\/"},{"key":"e_1_3_2_1_25_1","unstructured":"Norwegian Consumer Council. 2018. Deceived By Design: How tech companies use dark patterns to discourage us from exercising our rights to privacy. (2018). https:\/\/fil.forbrukerradet.no\/wp-content\/uploads\/2018\/06\/2018-06-27-deceived-by-design-final.pdf  Norwegian Consumer Council. 2018. Deceived By Design: How tech companies use dark patterns to discourage us from exercising our rights to privacy. (2018). https:\/\/fil.forbrukerradet.no\/wp-content\/uploads\/2018\/06\/2018-06-27-deceived-by-design-final.pdf"},{"key":"e_1_3_2_1_26_1","volume-title":"Intrinsic motivation and self-determination in human behavior","author":"Deci Edward","unstructured":"Edward Deci and Richard M Ryan . 1985. Intrinsic motivation and self-determination in human behavior . Springer Science & Business Media . Edward Deci and Richard M Ryan. 1985. Intrinsic motivation and self-determination in human behavior. Springer Science & Business Media."},{"key":"e_1_3_2_1_27_1","unstructured":"Nick Doty and Mohit Gupta. 2013. Privacy design patterns and anti-patterns patterns misapplied and unintended consequences. (2013).  Nick Doty and Mohit Gupta. 2013. Privacy design patterns and anti-patterns patterns misapplied and unintended consequences. (2013)."},{"key":"e_1_3_2_1_28_1","volume-title":"The process and affordances of platform-specific social media disconnection. Studies of Transition States and Societies 10, 2","author":"Dremljuga Ramona-Riin","year":"2018","unstructured":"Ramona-Riin Dremljuga . 2018. The process and affordances of platform-specific social media disconnection. Studies of Transition States and Societies 10, 2 ( 2018 ). Ramona-Riin Dremljuga. 2018. The process and affordances of platform-specific social media disconnection. Studies of Transition States and Societies 10, 2 (2018)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00367.x"},{"key":"e_1_3_2_1_31_1","unstructured":"Facebook. [n.d.]. What names are allowed on Facebook? https:\/\/www.facebook.com\/help\/112146705538576. Accessed: 2019-26-01.  Facebook. [n.d.]. What names are allowed on Facebook? https:\/\/www.facebook.com\/help\/112146705538576. Accessed: 2019-26-01."},{"key":"e_1_3_2_1_32_1","volume-title":"Canada's Global Player in the Privacy Debate. GOVERNING (May","author":"Farmer Liz","year":"2014","unstructured":"Liz Farmer . 2014. Canada's Global Player in the Privacy Debate. GOVERNING (May 2014 ). https:\/\/www.governing.com\/topics\/public-justice-safety\/gov-global-player-in-privacy-debate.html Liz Farmer. 2014. Canada's Global Player in the Privacy Debate. GOVERNING (May 2014). https:\/\/www.governing.com\/topics\/public-justice-safety\/gov-global-player-in-privacy-debate.html"},{"key":"e_1_3_2_1_33_1","volume-title":"Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies). Ubiquity 5","author":"Fogg BJ","year":"2002","unstructured":"BJ Fogg . 2002 . Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies). Ubiquity 5 (2002). BJ Fogg. 2002. Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies). Ubiquity 5 (2002)."},{"key":"e_1_3_2_1_34_1","volume-title":"The #DeleteFacebook movement has reached a fever pitch, as former Facebook insiders turn on the company. Business Insider (March","author":"Gilbert Ben","year":"2018","unstructured":"Ben Gilbert . 2018. The #DeleteFacebook movement has reached a fever pitch, as former Facebook insiders turn on the company. Business Insider (March 2018 ). https:\/\/www.businessinsider.com\/deletefacebook-facebook-movement-2018-3 Ben Gilbert. 2018. The #DeleteFacebook movement has reached a fever pitch, as former Facebook insiders turn on the company. Business Insider (March 2018). https:\/\/www.businessinsider.com\/deletefacebook-facebook-movement-2018-3"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397747"},{"key":"e_1_3_2_1_36_1","volume-title":"Center for Humane Technology","author":"Harris Tristan","unstructured":"Tristan Harris . [n.d.]. Center for Humane Technology . http:\/\/humanetech.com\/. Accessed: 2019-19-01. Tristan Harris. [n.d.]. Center for Humane Technology. http:\/\/humanetech.com\/. Accessed: 2019-19-01."},{"key":"e_1_3_2_1_37_1","volume-title":"How Google is fighting smartphone addiction with its next Android update. CNBC (May","author":"Haselton Todd","year":"2018","unstructured":"Todd Haselton . 2018. How Google is fighting smartphone addiction with its next Android update. CNBC (May 2018 ). https:\/\/www.cnbc.com\/2018\/05\/09\/google-fighting-smartphone-addiction-with-android-p-digital-wellness.html Todd Haselton. 2018. How Google is fighting smartphone addiction with its next Android update. CNBC (May 2018). https:\/\/www.cnbc.com\/2018\/05\/09\/google-fighting-smartphone-addiction-with-android-p-digital-wellness.html"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"e_1_3_2_1_39_1","volume-title":"Gifts, Commodities, and Social Reproduction in Facebook. Networked affect","author":"Jarrett Kylie","year":"2015","unstructured":"Kylie Jarrett . 2015. \" Let's Express Our Friendship by Sending Each Other Funny Links instead of Actually Talking\" : Gifts, Commodities, and Social Reproduction in Facebook. Networked affect ( 2015 ), 203--219. Kylie Jarrett. 2015. \"Let's Express Our Friendship by Sending Each Other Funny Links instead of Actually Talking\": Gifts, Commodities, and Social Reproduction in Facebook. Networked affect (2015), 203--219."},{"key":"e_1_3_2_1_40_1","unstructured":"Daniel Kahneman. 2011. Thinking Fast and Slow. Farrar Straus and Giroux.  Daniel Kahneman. 2011. Thinking Fast and Slow. Farrar Straus and Giroux."},{"key":"e_1_3_2_1_41_1","volume-title":"Time Well Spent' features are the Marlboro Lights of the tech industry. Mashable (August","author":"Kraus Rachel","year":"2018","unstructured":"Rachel Kraus . 2018. ` Time Well Spent' features are the Marlboro Lights of the tech industry. Mashable (August 2018 ). https:\/\/in.mashable.com\/tech\/319\/time-well-spent-features-are-the-marlboro-lights-of-the-tech-industry Accessed : 2019-04-07. Rachel Kraus. 2018. `Time Well Spent' features are the Marlboro Lights of the tech industry. Mashable (August 2018). https:\/\/in.mashable.com\/tech\/319\/time-well-spent-features-are-the-marlboro-lights-of-the-tech-industry Accessed: 2019-04-07."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.09.005"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2006.277727"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5414.2006.00133.x"},{"key":"e_1_3_2_1_45_1","unstructured":"Arunesh Mathur Gunes Acar Michael Friedman Elena Lucherini Jonathan Mayer Marshini Chetty and Arvind Narayanan. 2019. Dark Patterns at Scale: Findings from a Crawl of 11KShopping Websites. (2019). https:\/\/webtransparency.cs.princeton.edu\/dark-patterns\/assets\/dark-patterns-v2.pdf  Arunesh Mathur Gunes Acar Michael Friedman Elena Lucherini Jonathan Mayer Marshini Chetty and Arvind Narayanan. 2019. Dark Patterns at Scale: Findings from a Crawl of 11KShopping Websites. (2019). https:\/\/webtransparency.cs.princeton.edu\/dark-patterns\/assets\/dark-patterns-v2.pdf"},{"key":"e_1_3_2_1_46_1","unstructured":"Natasha Mathur. 2019. U.S. senators introduce a bipartisan bill that bans social media platforms from using `dark patterns' to trick its users. https:\/\/hub.packtpub.com\/u-s-senators-introduce-a-bipartisan-bill-that-bans-social-media-from-using-dark-patterns-to-trick-its-users\/.  Natasha Mathur. 2019. U.S. senators introduce a bipartisan bill that bans social media platforms from using `dark patterns' to trick its users. https:\/\/hub.packtpub.com\/u-s-senators-introduce-a-bipartisan-bill-that-bans-social-media-from-using-dark-patterns-to-trick-its-users\/."},{"key":"e_1_3_2_1_47_1","volume-title":"Report: 56% of Social Media Users Suffer From FOMO. Mashable (Jul","author":"Murphy Samantha","year":"2013","unstructured":"Samantha Murphy . 2013. Report: 56% of Social Media Users Suffer From FOMO. Mashable (Jul 2013 ). https:\/\/mashable.com\/2013\/07\/09\/fear-of-missing-out\/#83r7t4gHriq4 Samantha Murphy. 2013. Report: 56% of Social Media Users Suffer From FOMO. Mashable (Jul 2013). https:\/\/mashable.com\/2013\/07\/09\/fear-of-missing-out\/#83r7t4gHriq4"},{"key":"e_1_3_2_1_48_1","volume-title":"Digital Minimalism: Choosing a Focused Life in a Noisy World","author":"Newport Cal","year":"2019","unstructured":"Cal Newport . 2019 . Digital Minimalism: Choosing a Focused Life in a Noisy World . Penguin . Cal Newport. 2019. Digital Minimalism: Choosing a Focused Life in a Noisy World. Penguin."},{"key":"e_1_3_2_1_49_1","volume-title":"Google's new focus on well-being started five years ago with this presentation. The Verge (May","author":"Newton Casey","year":"2018","unstructured":"Casey Newton . 2018. Google's new focus on well-being started five years ago with this presentation. The Verge (May 2018 ). https:\/\/www.theverge.com\/2018\/5\/10\/17333574\/google-android-p-update-tristan-harris-design-ethics Casey Newton. 2018. Google's new focus on well-being started five years ago with this presentation. The Verge (May 2018). https:\/\/www.theverge.com\/2018\/5\/10\/17333574\/google-android-p-update-tristan-harris-design-ethics"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tourman.2012.05.005"},{"key":"e_1_3_2_1_52_1","unstructured":"Open Security Architecture (OSA). 2019. https:\/\/www.opensecurityarchitecture.org\/cms\/.  Open Security Architecture (OSA). 2019. https:\/\/www.opensecurityarchitecture.org\/cms\/."},{"key":"e_1_3_2_1_53_1","unstructured":"OpenDNS. 2019. PhishTank: out of the net into the tank. https:\/\/www.phishtank.com\/.  OpenDNS. 2019. PhishTank: out of the net into the tank. https:\/\/www.phishtank.com\/."},{"key":"e_1_3_2_1_54_1","unstructured":"Oxford Dictionary. [n.d.]. FOMO. https:\/\/en.oxforddictionaries.com\/definition\/fomo. Accessed: 2018-11-12.  Oxford Dictionary. [n.d.]. FOMO. https:\/\/en.oxforddictionaries.com\/definition\/fomo. Accessed: 2018-11-12."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1080\/1600910X.2018.1475289"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21521-6_7"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858381"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.02.014"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1415472.1415486"},{"key":"e_1_3_2_1_61_1","unstructured":"Yoel Roth. 2016. Gay data. (2016).  Yoel Roth. 2016. Gay data. (2016)."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.12.025"},{"key":"e_1_3_2_1_63_1","volume-title":"Opting-in': A Privacy Paradox. Washington Post","author":"Schwartz John","year":"2000","unstructured":"John Schwartz . 2000. ` Opting-in': A Privacy Paradox. Washington Post ( 2000 ). John Schwartz. 2000. `Opting-in': A Privacy Paradox. Washington Post (2000)."},{"key":"e_1_3_2_1_64_1","volume-title":"Why beating your phone addiction may come at a cost. The Guardian (March","author":"Schwartz Oscar","year":"2019","unstructured":"Oscar Schwartz . 2019. Why beating your phone addiction may come at a cost. The Guardian (March 2019 ). https:\/\/www.theguardian.com\/technology\/2019\/mar\/13\/digital-wellness-phone-addiction-tech Oscar Schwartz. 2019. Why beating your phone addiction may come at a cost. The Guardian (March 2019). https:\/\/www.theguardian.com\/technology\/2019\/mar\/13\/digital-wellness-phone-addiction-tech"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2855321.2855374"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2209249.2209263"},{"key":"e_1_3_2_1_67_1","volume-title":"Sun on Privacy: 'Get Over It'. Wired (Jan","author":"Sprenger Polly","year":"1999","unstructured":"Polly Sprenger . 1999. Sun on Privacy: 'Get Over It'. Wired (Jan 1999 ). https:\/\/www.wired.com\/1999\/01\/sun-on-privacy-get-over-it\/ Polly Sprenger. 1999. Sun on Privacy: 'Get Over It'. Wired (Jan 1999). https:\/\/www.wired.com\/1999\/01\/sun-on-privacy-get-over-it\/"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.5555\/1531514.1531530"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3306618.3314286"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3306006"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12052"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864363"},{"key":"e_1_3_2_1_73_1","unstructured":"The United States Department of Justice. [n.d.]. Entrapment---Elements. https:\/\/www.justice.gov\/jm\/criminal-resource-manual-645-entrapment-elements.  The United States Department of Justice. [n.d.]. Entrapment---Elements. https:\/\/www.justice.gov\/jm\/criminal-resource-manual-645-entrapment-elements."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1177\/0270467607311484"},{"key":"e_1_3_2_1_75_1","article-title":"The privacy paradox on social network sites revisited: The role of individual characteristics and group norms. Cyberpsychology","volume":"3","author":"Utz Sonja","year":"2009","unstructured":"Sonja Utz and Nicole C Kr\u00e4mer . 2009 . The privacy paradox on social network sites revisited: The role of individual characteristics and group norms. Cyberpsychology : Journal of Psychosocial Research on Cyberspace 3 , 2 (2009). Sonja Utz and Nicole C Kr\u00e4mer. 2009. The privacy paradox on social network sites revisited: The role of individual characteristics and group norms. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 3, 2 (2009).","journal-title":"Journal of Psychosocial Research on Cyberspace"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01474.x"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1177\/1329878X18783002"},{"key":"e_1_3_2_1_78_1","volume-title":"Designing Privacy-by-Design","author":"van Rest Jeroen","unstructured":"Jeroen van Rest , Daniel Boonstra , Maarten Everts , Martin van Rijn , and Ron van Paassen . 2014. Designing Privacy-by-Design . In Privacy Technologies and Policy, Bart Preneel and Demosthenes Ikonomou (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 55--72. Jeroen van Rest, Daniel Boonstra, Maarten Everts, Martin van Rijn, and Ron van Paassen. 2014. Designing Privacy-by-Design. In Privacy Technologies and Policy, Bart Preneel and Demosthenes Ikonomou (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 55--72."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444810378225"},{"key":"e_1_3_2_1_80_1","volume-title":"Warner and Deb Fischer","author":"Mark","year":"2019","unstructured":"Mark R. Warner and Deb Fischer . 2019 . Deceptive Experiences To Online Users Reduction (DETOUR) Act . https:\/\/www.scribd.com\/document\/405606873\/Detour-Act-Final. Mark R. Warner and Deb Fischer. 2019. Deceptive Experiences To Online Users Reduction (DETOUR) Act. https:\/\/www.scribd.com\/document\/405606873\/Detour-Act-Final."},{"key":"e_1_3_2_1_81_1","unstructured":"Lance Whitney. 2018. How to Use Screentime in Apple iOS 12. https:\/\/www.pcmag.com\/feature\/363837\/how-to-use-screen-time-in-apple-s-ios-12\/6. Accessed: 2019-26-01.  Lance Whitney. 2018. How to Use Screentime in Apple iOS 12. https:\/\/www.pcmag.com\/feature\/363837\/how-to-use-screen-time-in-apple-s-ios-12\/6. Accessed: 2019-26-01."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173842"},{"key":"e_1_3_2_1_83_1","volume-title":"Problematic smartphone use and relations with negative affect, fear of missing out, and fear of negative and positive evaluation. Psychiatry research 262","author":"Wolniewicz Claire A","year":"2018","unstructured":"Claire A Wolniewicz , Mojisola F Tiamiyu , Justin W Weeks , and Jon D Elhai . 2018. Problematic smartphone use and relations with negative affect, fear of missing out, and fear of negative and positive evaluation. Psychiatry research 262 ( 2018 ), 618--623. Claire A Wolniewicz, Mojisola F Tiamiyu, Justin W Weeks, and Jon D Elhai. 2018. Problematic smartphone use and relations with negative affect, fear of missing out, and fear of negative and positive evaluation. Psychiatry research 262 (2018), 618--623."},{"key":"e_1_3_2_1_84_1","volume-title":"A survey on security patterns. Progress in informatics 5, 5","author":"Yoshioka Nobukazu","year":"2008","unstructured":"Nobukazu Yoshioka , Hironori Washizaki , and Katsuhisa Maruyama . 2008. A survey on security patterns. Progress in informatics 5, 5 ( 2008 ), 35--47. Nobukazu Yoshioka, Hironori Washizaki, and Katsuhisa Maruyama. 2008. A survey on security patterns. Progress in informatics 5, 5 (2008), 35--47."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2013.777757"}],"event":{"name":"NSPW '19: New Security Paradigms Workshop","location":"San Carlos Costa Rica","acronym":"NSPW '19","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368860.3368865","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368860.3368865","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:50Z","timestamp":1750203890000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368860.3368865"}},"subtitle":["understanding reluctant privacy behaviours through the FoMO-centric design paradigm"],"short-title":[],"issued":{"date-parts":[[2019,9,23]]},"references-count":83,"alternative-id":["10.1145\/3368860.3368865","10.1145\/3368860"],"URL":"https:\/\/doi.org\/10.1145\/3368860.3368865","relation":{},"subject":[],"published":{"date-parts":[[2019,9,23]]},"assertion":[{"value":"2020-01-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}