{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:36Z","timestamp":1750220376644,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,6]],"date-time":"2020-09-06T00:00:00Z","timestamp":1599350400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9,6]]},"DOI":"10.1145\/3404983.3405588","type":"proceedings-article","created":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T16:17:12Z","timestamp":1606321032000},"page":"361-372","source":"Crossref","is-referenced-by-count":5,"title":["User-friendly formulation of data processing purposes of voice assistants"],"prefix":"10.1145","author":[{"given":"Timo","family":"Jakobi","sequence":"first","affiliation":[{"name":"Universit\u00e4t Siegen, Siegen, Deutschland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gunnar","family":"Stevens","sequence":"additional","affiliation":[{"name":"Universit\u00e4t Siegen, Siegen, Deutschland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Maximilian","family":"von Grafenstein","sequence":"additional","affiliation":[{"name":"Universit\u00e4t der K\u00fcnste Berlin, Berlin, Deutschland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dominik","family":"Pins","sequence":"additional","affiliation":[{"name":"Fraunhofer FIT, Sankt Augustin, Deutschland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alexander","family":"Boden","sequence":"additional","affiliation":[{"name":"Fraunhofer FIT, Sankt Augustin, Deutschland"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2020,9,6]]},"reference":[{"volume-title":"Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019)","year":"2019","author":"Abdi N.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"Acquisti A. 2009. Nudging privacy: The behavioral economics of personal information. IEEE security & privacy. 7 6 (2009) 82--85. 10.1109\/MSP.2009.163  Acquisti A. 2009. Nudging privacy: The behavioral economics of personal information. IEEE security & privacy. 7 6 (2009) 82--85. 10.1109\/MSP.2009.163"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_1_4_1","unstructured":"Adobe 2019. State of Voice Technology for Brands.  Adobe 2019. State of Voice Technology for Brands."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340764.3344913"},{"key":"e_1_3_2_1_6_1","unstructured":"Article 29 Data Protection Working Party. 2013. Opinion 03\/2013 on purpose limitation. Technical Report #00569\/13\/EN WP 203.  Article 29 Data Protection Working Party. 2013. Opinion 03\/2013 on purpose limitation. Technical Report #00569\/13\/EN WP 203."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327051HCI16234_05"},{"key":"e_1_3_2_1_8_1","unstructured":"Bodenh\u00f6fer X. 2018. Digitale Sprachassistenten als intelligente Helfer im Alltag. eresult.  Bodenh\u00f6fer X. 2018. Digitale Sprachassistenten als intelligente Helfer im Alltag. eresult."},{"volume-title":"Proceedings of the 2005 Symposium on Usable Privacy and Security","year":"2005","author":"Brodie C.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"Brouwer E.R. 2011. Legality and data protection law: The forgotten purpose of purpose limitation. (2011).  Brouwer E.R. 2011. Legality and data protection law: The forgotten purpose of purpose limitation. (2011)."},{"key":"e_1_3_2_1_11_1","unstructured":"Day M. Turner G. and Drozdiak N. 2019. Amazon Workers Are Listening to What You Tell Alexa. Bloomberg.com.  Day M. Turner G. and Drozdiak N. 2019. Amazon Workers Are Listening to What You Tell Alexa. Bloomberg.com."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Easwara Moorthy A. and Vu K.-P.L. 2014. Voice Activated Personal Assistant: Acceptability of Use in the Public Space. Human Interface and the Management of Information. Information and Knowledge in Applications and Services. S. Yamamoto ed. Springer International Publishing. 324--334. 10.1007\/978-3-319-07863-2_32  Easwara Moorthy A. and Vu K.-P.L. 2014. Voice Activated Personal Assistant: Acceptability of Use in the Public Space. Human Interface and the Management of Information. Information and Knowledge in Applications and Services. S. Yamamoto ed. Springer International Publishing. 324--334. 10.1007\/978-3-319-07863-2_32","DOI":"10.1007\/978-3-319-07863-2_32"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Forg\u00f3 N. H\u00e4nold S. and Sch\u00fctze B. 2017. The principle of purpose limitation and big data. New Technology Big Data and the Law. Springer. 17--42.  Forg\u00f3 N. H\u00e4nold S. and Sch\u00fctze B. 2017. The principle of purpose limitation and big data. New Technology Big Data and the Law. Springer. 17--42.","DOI":"10.1007\/978-981-10-5038-1_2"},{"volume-title":"Proceedings of An Interactive Workshop on the Human aspects of Smarthome Security and Privacy (WSSP)","year":"2018","author":"Gerber N.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0047"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174108"},{"key":"e_1_3_2_1_17_1","unstructured":"Hern A. 2019. Apple contractors \"regularly hear confidential details\" on Siri recordings. The Guardian.  Hern A. 2019. Apple contractors \"regularly hear confidential details\" on Siri recordings. The Guardian."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2007.03.005"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281444"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287049"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/STAST.2013.11"},{"key":"e_1_3_2_1_22_1","unstructured":"Karwatzki S. Trenz M. and Veit D. 2018. Yes firms have my data but what does it matter? measuring privacy risks. (2018).  Karwatzki S. Trenz M. and Veit D. 2018. Yes firms have my data but what does it matter? measuring privacy risks. (2018)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"volume-title":"Understanding the Role of Privacy and Trust in Intelligent Personal Assistant Adoption. Information in Contemporary Society (Cham","year":"2019","author":"Liao Y.","key":"e_1_3_2_1_25_1"},{"volume-title":"Symposium on Usable Privacy and Security","year":"2016","author":"Liu B.","key":"e_1_3_2_1_26_1"},{"volume-title":"Proceedings of the ACM on Human-Computer Interaction. 3, CSCW","year":"2019","author":"Mathur A.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Mayring P. 2010. Qualitative inhaltsanalyse. Handbuch qualitative Forschung in der Psychologie. Springer. 601--613.  Mayring P. 2010. Qualitative inhaltsanalyse. Handbuch qualitative Forschung in der Psychologie. Springer. 601--613.","DOI":"10.1007\/978-3-531-92052-8_42"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_3"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31205-2_10"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.25.2.238"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370224"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Pfitzmann A. 2001. Multilateral security: Enabling technologies and their evaluation. Informatics (2001) 50--62. 10.5555\/647348.724458  Pfitzmann A. 2001. Multilateral security: Enabling technologies and their evaluation. Informatics (2001) 50--62. 10.5555\/647348.724458","DOI":"10.1007\/3-540-44577-3_4"},{"key":"e_1_3_2_1_34_1","unstructured":"Pfitzmann A. Schill A. Westfeld A. and Wolf G. 2000. Mehrseitige Sicherheit in offenen Netzen. Grundlagen praktische Umsetzung und in Java implementierte Demonstrations-Software. (2000).  Pfitzmann A. Schill A. Westfeld A. and Wolf G. 2000. Mehrseitige Sicherheit in offenen Netzen. Grundlagen praktische Umsetzung und in Java implementierte Demonstrations-Software. (2000)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"P\u00f6tzsch S. 2009. Privacy awareness: A means to solve the privacy paradox? The future of identity in the information society. Springer. 226--236.  P\u00f6tzsch S. 2009. Privacy awareness: A means to solve the privacy paradox? The future of identity in the information society. Springer. 226--236.","DOI":"10.1007\/978-3-642-03315-5_17"},{"volume-title":"Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems - CHI '18 (Montreal QC","year":"2018","author":"Pradhan A.","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/366173.366208"},{"volume-title":"Contents and Concerns of Online Behavioral Profiles. PASSAT '14: Sixth ASE International Conference on Privacy, Security, Risk and Trust","year":"2015","author":"Rao A.","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Ravichander A. Black A.W. Wilson S. Norton T. and Sadeh N. 2019. Question Answering for Privacy Policies: Combining Computational and Legal Perspectives. arXiv preprint arXiv:1911.00841. (2019).  Ravichander A. Black A.W. Wilson S. Norton T. and Sadeh N. 2019. Question Answering for Privacy Policies: Combining Computational and Legal Perspectives. arXiv preprint arXiv:1911.00841. (2019).","DOI":"10.18653\/v1\/D19-1500"},{"key":"e_1_3_2_1_40_1","unstructured":"Sadeh N. Acquisti A. Breaux T.D. Cranor L.F. McDonald A.M. Reidenberg J.R. Smith N.A. Liu F. Russell N.C. and Schaub F. 2013. The usable privacy policy project. Technical report Technical Report CMU-ISR-13-119. (2013).  Sadeh N. Acquisti A. Breaux T.D. Cranor L.F. McDonald A.M. Reidenberg J.R. Smith N.A. Liu F. Russell N.C. and Schaub F. 2013. The usable privacy policy project. Technical report Technical Report CMU-ISR-13-119. (2013)."},{"volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS 2015)","year":"2015","author":"Schaub F.","key":"e_1_3_2_1_41_1"},{"key":"e_1_3_2_1_42_1","unstructured":"Siegle J. 2019. Google ermittelt wegen Illegalen Sprachaufzeichnungen. TechFieber.de.  Siegle J. 2019. Google ermittelt wegen Illegalen Sprachaufzeichnungen. TechFieber.de."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.4018\/jmhci.2011010104"},{"volume-title":"Accomplishing Transparency within the General Data Protection Regulation. 5th International Conference on Information Systems Security and Privacy. To appear","year":"2018","author":"Spagnuelo D.","key":"e_1_3_2_1_44_1"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.09.038"},{"key":"e_1_3_2_1_46_1","unstructured":"Stevens G. Bossauer P. Jakobi T. and Pakusch C. 2018. Mehrseitiges Vertrauen bei IoT-basierten Reputationssystemen. Mensch und Computer 2018-Workshopband. (2018).  Stevens G. Bossauer P. Jakobi T. and Pakusch C. 2018. Mehrseitiges Vertrauen bei IoT-basierten Reputationssystemen. Mensch und Computer 2018-Workshopband. (2018)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11623-014-0180-z"},{"volume-title":"Amsterdam Privacy Conference","year":"2012","author":"Trojer T.","key":"e_1_3_2_1_48_1"},{"key":"e_1_3_2_1_49_1","first-page":"407","article-title":"The EU as an emerging surveillance society: the function creep case study and challenges to privacy and data protection","author":"Tzanou M.","year":"2010","journal-title":"Vienna Online J. on Int'l Const."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230665"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Yankelovich N. 1996. How do users know what to say? interactions. 3 6 (1996) 32--43. 10.1145\/242485.242500  Yankelovich N. 1996. How do users know what to say? interactions. 3 6 (1996) 32--43. 10.1145\/242485.242500","DOI":"10.1145\/242485.242500"}],"event":{"name":"MuC'20: Mensch und Computer 2020","acronym":"MuC'20","location":"Magdeburg Germany"},"container-title":["Proceedings of the Conference on Mensch und Computer"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404983.3405588","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3404983.3405588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:45Z","timestamp":1750191465000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404983.3405588"}},"subtitle":["a user perspective on the principle of purpose limitation"],"short-title":[],"issued":{"date-parts":[[2020,9,6]]},"references-count":51,"alternative-id":["10.1145\/3404983.3405588","10.1145\/3404983"],"URL":"https:\/\/doi.org\/10.1145\/3404983.3405588","relation":{},"subject":[],"published":{"date-parts":[[2020,9,6]]}}}