{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T17:16:08Z","timestamp":1763226968326,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":106,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,3,14]],"date-time":"2021-03-14T00:00:00Z","timestamp":1615680000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,3,14]]},"DOI":"10.1145\/3406522.3446011","type":"proceedings-article","created":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T17:18:47Z","timestamp":1614446327000},"page":"51-61","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["My Mouse, My Rules"],"prefix":"10.1145","author":[{"given":"Luis A.","family":"Leiva","sequence":"first","affiliation":[{"name":"University of Luxembourg, Esch-sur-Alzette, Luxembourg"}]},{"given":"Ioannis","family":"Arapakis","sequence":"additional","affiliation":[{"name":"Telefonica Research, Barcelona, Spain"}]},{"given":"Costas","family":"Iordanou","sequence":"additional","affiliation":[{"name":"Cyprus University of Technology, Cyprus, Cyprus"}]}],"member":"320","published-online":{"date-parts":[[2021,3,14]]},"reference":[{"volume-title":"Proc. CCS.","author":"Acar G.","key":"e_1_3_2_1_1_1","unstructured":"G. Acar , C. Eubank , S. Englehardt , M. Juarez , A. Narayanan , and C. Diaz . 2014. The Web Never Forgets: Persistent Tracking Mechanisms in the Wild . In Proc. CCS. G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan, and C. Diaz. 2014. The Web Never Forgets: Persistent Tracking Mechanisms in the Wild. In Proc. CCS."},{"volume-title":"Proc. CCS.","author":"Acar G.","key":"e_1_3_2_1_2_1","unstructured":"G. Acar , M. Juarez , N. Nikiforakis , C. Diaz , S. G\u00fcrses , F. Piessens , and B. Preneel . 2013. FPDetective: Dusting the Web for Fingerprinters . In Proc. CCS. G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. G\u00fcrses, F. Piessens, and B. Preneel. 2013. FPDetective: Dusting the Web for Fingerprinters. In Proc. CCS."},{"key":"e_1_3_2_1_3_1","volume-title":"Law: Models for Trajectory-based HCI Tasks. In Proc. CHI.","author":"Accot J.","year":"1997","unstructured":"J. Accot and S. Zhai . 1997 . Beyond Fitts ? Law: Models for Trajectory-based HCI Tasks. In Proc. CHI. J. Accot and S. Zhai. 1997. Beyond Fitts? Law: Models for Trajectory-based HCI Tasks. In Proc. CHI."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23096"},{"volume-title":"Proc. CIKM.","author":"Arapakis I.","key":"e_1_3_2_1_5_1","unstructured":"I. Arapakis , M. Lalmas , and G. Valkanas . 2014. Understanding Within-Content Engagement Through Pattern Analysis of Mouse Gestures . In Proc. CIKM. I. Arapakis, M. Lalmas, and G. Valkanas. 2014. Understanding Within-Content Engagement Through Pattern Analysis of Mouse Gestures. In Proc. CIKM."},{"volume-title":"Proc. SIGIR.","author":"Arapakis I.","key":"e_1_3_2_1_6_1","unstructured":"I. Arapakis and L. A. Leiva . 2016. Predicting User Engagement with Direct Displays Using Mouse Cursor Information . In Proc. SIGIR. I. Arapakis and L. A. Leiva. 2016. Predicting User Engagement with Direct Displays Using Mouse Cursor Information. In Proc. SIGIR."},{"volume-title":"Proc. SIGIR.","author":"Arapakis I.","key":"e_1_3_2_1_7_1","unstructured":"I. Arapakis and L. A. Leiva . 2020. Learning Efficient Representations of Mouse Movements to Predict User Attention . In Proc. SIGIR. I. Arapakis and L. A. Leiva. 2020. Learning Efficient Representations of Mouse Movements to Predict User Attention. In Proc. SIGIR."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3374210"},{"volume-title":"Proc. CHI EA.","author":"Arroyo E.","key":"e_1_3_2_1_9_1","unstructured":"E. Arroyo , T. Selker , and W. Wei . 2006. Usability tool for analysis of web designs using mouse tracks . In Proc. CHI EA. E. Arroyo, T. Selker, and W. Wei. 2006. Usability tool for analysis of web designs using mouse tracks. In Proc. CHI EA."},{"volume-title":"Proc. WWW.","author":"Atterer R.","key":"e_1_3_2_1_10_1","unstructured":"R. Atterer , M. Wnuk , and A. Schmidt . 2006. Knowing the User's Every Move: User Activity Tracking for Website Usability Evaluation and Implicit Interaction . In Proc. WWW. R. Atterer, M. Wnuk, and A. Schmidt. 2006. Knowing the User's Every Move: User Activity Tracking for Website Usability Evaluation and Implicit Interaction. In Proc. WWW."},{"volume-title":"Proc. PRICAI.","author":"Azcarraga J.","key":"e_1_3_2_1_11_1","unstructured":"J. Azcarraga and M. T. Suarez . 2012. Predicting Academic Emotions Based on Brainwaves, Mouse Behaviour and Personality Profile . In Proc. PRICAI. J. Azcarraga and M. T. Suarez. 2012. Predicting Academic Emotions Based on Brainwaves, Mouse Behaviour and Personality Profile. In Proc. PRICAI."},{"key":"e_1_3_2_1_12_1","volume-title":"Regular Contents: Dissecting the Web Hosting Ecosystem. In Proc. IFIP Networking.","author":"Bangera P.","year":"2017","unstructured":"P. Bangera and S. Gorinsky . 2017 . Ads versus Regular Contents: Dissecting the Web Hosting Ecosystem. In Proc. IFIP Networking. P. Bangera and S. Gorinsky. 2017. Ads versus Regular Contents: Dissecting the Web Hosting Ecosystem. In Proc. IFIP Networking."},{"volume-title":"Proc. SEC.","author":"Bashir M.","key":"e_1_3_2_1_13_1","unstructured":"M. Bashir , S. Arshad , W. Robertson , and C. Wilson . 2016. Tracing Information Flows Between Ad Exchanges Using Retargeted Ads . In Proc. SEC. M. Bashir, S. Arshad, W. Robertson, and C. Wilson. 2016. Tracing Information Flows Between Ad Exchanges Using Retargeted Ads. In Proc. SEC."},{"key":"e_1_3_2_1_14_1","volume-title":"CHIIR '21","author":"Beals H.","year":"2010","unstructured":"H. Beals . 2010 . The value of behavioral targeting. Available at https:\/\/www.networkadvertising.org. CHIIR '21 , March 14-19, 2021, Canberra, ACT, Australia Luis A. Leiva, Ioannis Arapakis, and Costas Iordanou H. Beals. 2010. The value of behavioral targeting. Available at https:\/\/www.networkadvertising.org. CHIIR '21, March 14-19, 2021, Canberra, ACT, Australia Luis A. Leiva, Ioannis Arapakis, and Costas Iordanou"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"M. Bohan and A. Chaparro. 1998. Age-Related Differences in Performance Using a Mouse and Trackball. Hum. Factors 42 2 (1998).  M. Bohan and A. Chaparro. 1998. Age-Related Differences in Performance Using a Mouse and Trackball. Hum. Factors 42 2 (1998).","DOI":"10.1177\/154193129804200202"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2912124"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/792550.792552"},{"key":"e_1_3_2_1_18_1","unstructured":"T. I. A. Bureau. 2019. Standards Guidelines and Best Practices. Available at https:\/\/www.iab.com.  T. I. A. Bureau. 2019. Standards Guidelines and Best Practices. Available at https:\/\/www.iab.com."},{"key":"e_1_3_2_1_19_1","unstructured":"S. K. Card W. K. English and B. J. Burr. 1987. Evaluation of Mouse Ratecontrolled Isometric Joystick Step Keys and Text Keys for Text Selection on a CRT. In Human-computer Interaction R. M. Baecker and W. A. S. Buxton (Eds.). Taylor & Francis.  S. K. Card W. K. English and B. J. Burr. 1987. Evaluation of Mouse Ratecontrolled Isometric Joystick Step Keys and Text Keys for Text Selection on a CRT. In Human-computer Interaction R. M. Baecker and W. A. S. Buxton (Eds.). Taylor & Francis."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488406"},{"volume-title":"Proc. CoNEXT.","author":"Carrascosa J. M.","key":"e_1_3_2_1_21_1","unstructured":"J. M. Carrascosa , J. Mikians , R. Cuevas , V. Erramilli , and N. Laoutaris . 2015. I Always Feel Like Somebody's Watching Me: Measuring Online Behavioural Advertising . In Proc. CoNEXT. J. M. Carrascosa, J. Mikians, R. Cuevas, V. Erramilli, and N. Laoutaris. 2015. I Always Feel Like Somebody's Watching Me: Measuring Online Behavioural Advertising. In Proc. CoNEXT."},{"volume-title":"Proc. CHI EA.","author":"Chen M. C.","key":"e_1_3_2_1_22_1","unstructured":"M. C. Chen , J. R. Anderson , and M. H. Sohn . 2001. What Can a Mouse Cursor Tell Us More? Correlation of Eye\/Mouse Movements on Web Browsing . In Proc. CHI EA. M. C. Chen, J. R. Anderson, and M. H. Sohn. 2001. What Can a Mouse Cursor Tell Us More? Correlation of Eye\/Mouse Movements on Web Browsing. In Proc. CHI EA."},{"key":"e_1_3_2_1_23_1","volume-title":"The effect of gender-related difference on human-centred performance using a mass assessment method. IJCAT 32","author":"Chen R. C. C.","year":"2008","unstructured":"R. C. C. Chen and T.-K. Chen . 2008. The effect of gender-related difference on human-centred performance using a mass assessment method. IJCAT 32 ( 2008 ). R. C. C. Chen and T.-K. Chen. 2008. The effect of gender-related difference on human-centred performance using a mass assessment method. IJCAT 32 (2008)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2739151"},{"volume-title":"Proc. IUI.","author":"Claypool M.","key":"e_1_3_2_1_25_1","unstructured":"M. Claypool , P. Le , M. Wased , and D. Brown . 2001. Implicit Interest Indicators . In Proc. IUI. M. Claypool, P. Le, M. Wased, and D. Brown. 2001. Implicit Interest Indicators. In Proc. IUI."},{"key":"e_1_3_2_1_26_1","volume-title":"Fault tolerant operating systems. ACM Comput. Surv. 8, 4","author":"Denning P. J.","year":"1976","unstructured":"P. J. Denning . 1976. Fault tolerant operating systems. ACM Comput. Surv. 8, 4 ( 1976 ). P. J. Denning. 1976. Fault tolerant operating systems. ACM Comput. Surv. 8, 4 (1976)."},{"volume-title":"Proc. CIKM.","author":"Diaz F.","key":"e_1_3_2_1_27_1","unstructured":"F. Diaz , R. White , G. Buscher , and D. Liebling . 2013. Robust Models of Mouse Movement on Dynamic Web Search Results pages . In Proc. CIKM. F. Diaz, R. White, G. Buscher, and D. Liebling. 2013. Robust Models of Mouse Movement on Dynamic Web Search Results pages. In Proc. CIKM."},{"volume-title":"Proc. CIKM.","author":"Diriye A.","key":"e_1_3_2_1_28_1","unstructured":"A. Diriye , R. White , G. Buscher , and S. Dumais . 2012. Leaving So Soon? Understanding and Predicting Web Search Abandonment Rationales . In Proc. CIKM. A. Diriye, R. White, G. Buscher, and S. Dumais. 2012. Leaving So Soon? Understanding and Predicting Web Search Abandonment Rationales. In Proc. CIKM."},{"key":"e_1_3_2_1_29_1","unstructured":"S. Englehardt. 2017. No boundaries: Exfiltration of personal data by sessionreplay scripts. Available at https:\/\/freedom-to-tinker.com.  S. Englehardt. 2017. No boundaries: Exfiltration of personal data by sessionreplay scripts. Available at https:\/\/freedom-to-tinker.com."},{"volume-title":"Proc. SIGIR.","author":"Feild H. A.","key":"e_1_3_2_1_30_1","unstructured":"H. A. Feild , J. Allan , and R. Jones . 2010. Predicting Searcher Frustration . In Proc. SIGIR. H. A. Feild, J. Allan, and R. Jones. 2010. Predicting Searcher Frustration. In Proc. SIGIR."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"K. Z. Gajos K. Reinecke M. Donovan C. D. Stephen A. Y. Hung J. D. Schmahmann and A. S. Gupta. 2020. Computer mouse use captures ataxia and parkinsonism enabling accurate measurement and detection. Mov. Disord. 35 2 (2020).  K. Z. Gajos K. Reinecke M. Donovan C. D. Stephen A. Y. Hung J. D. Schmahmann and A. S. Gupta. 2020. Computer mouse use captures ataxia and parkinsonism enabling accurate measurement and detection. Mov. Disord. 35 2 (2020).","DOI":"10.1002\/mds.27915"},{"volume-title":"Proc. SIGIR.","author":"Guo Q.","key":"e_1_3_2_1_32_1","unstructured":"Q. Guo and E. Agichtein . 2008. Exploring Mouse Movements for Inferring Query Intent . In Proc. SIGIR. Q. Guo and E. Agichtein. 2008. Exploring Mouse Movements for Inferring Query Intent. In Proc. SIGIR."},{"volume-title":"Proc. SIGIR.","author":"Guo Q.","key":"e_1_3_2_1_33_1","unstructured":"Q. Guo and E. Agichtein . 2010. Ready to Buy or Just Browsing? Detecting Web Searcher Goals from Interaction Data . In Proc. SIGIR. Q. Guo and E. Agichtein. 2010. Ready to Buy or Just Browsing? Detecting Web Searcher Goals from Interaction Data. In Proc. SIGIR."},{"volume-title":"Proc. WWW.","author":"Guo Q.","key":"e_1_3_2_1_34_1","unstructured":"Q. Guo and E. Agichtein . 2012. Beyond Dwell Time: Estimating Document Relevance from Cursor Movements and Other Post-click Searcher Behavior . In Proc. WWW. Q. Guo and E. Agichtein. 2012. Beyond Dwell Time: Estimating Document Relevance from Cursor Movements and Other Post-click Searcher Behavior. In Proc. WWW."},{"volume-title":"Proc. SIGIR.","author":"Guo Q.","key":"e_1_3_2_1_35_1","unstructured":"Q. Guo , H. Jin , D. Lagun , S. Yuan , and E. Agichtein . 2013. Mining Touch Interaction Data on Mobile Devices to Predict Web Search Result Relevance . In Proc. SIGIR. Q. Guo, H. Jin, D. Lagun, S. Yuan, and E. Agichtein. 2013. Mining Touch Interaction Data on Mobile Devices to Predict Web Search Result Relevance. In Proc. SIGIR."},{"volume-title":"Proc. CIKM.","author":"Guo Q.","key":"e_1_3_2_1_36_1","unstructured":"Q. Guo , D. Lagun , and E. Agichtein . 2012. Predicting Web Search Success with Fine-grained Interaction Data . In Proc. CIKM. Q. Guo, D. Lagun, and E. Agichtein. 2012. Predicting Web Search Success with Fine-grained Interaction Data. In Proc. CIKM."},{"volume-title":"Proc. UMAP.","author":"Hauger D.","key":"e_1_3_2_1_37_1","unstructured":"D. Hauger , A. Paramythis , and S. Weibelzahl . 2011. Using browser interaction data to determine page reading behavior . In Proc. UMAP. D. Hauger, A. Paramythis, and S. Weibelzahl. 2011. Using browser interaction data to determine page reading behavior. In Proc. UMAP."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-8141(98)00013-4"},{"volume-title":"Proc. CHI.","author":"Huang J.","key":"e_1_3_2_1_39_1","unstructured":"J. Huang , R. White , and G. Buscher . 2012. User See, User Point: Gaze and Cursor Alignment in Web Search . In Proc. CHI. J. Huang, R. White, and G. Buscher. 2012. User See, User Point: Gaze and Cursor Alignment in Web Search. In Proc. CHI."},{"volume-title":"Proc. SIGIR.","author":"Huang J.","key":"e_1_3_2_1_40_1","unstructured":"J. Huang , R. W. White , G. Buscher , and K. Wang . 2012. Improving Searcher Models Using Mouse Cursor Activity . In Proc. SIGIR. J. Huang, R. W. White, G. Buscher, and K. Wang. 2012. Improving Searcher Models Using Mouse Cursor Activity. In Proc. SIGIR."},{"volume-title":"Proc. CHI.","author":"Huang J.","key":"e_1_3_2_1_41_1","unstructured":"J. Huang , R. W. White , and S. Dumais . 2011. No Clicks, No Problem: Using Cursor Movements to Understand and Improve Search . In Proc. CHI. J. Huang, R. W. White, and S. Dumais. 2011. No Clicks, No Problem: Using Cursor Movements to Understand and Improve Search. In Proc. CHI."},{"volume-title":"Proc. CCS.","author":"Huang L.-S.","key":"e_1_3_2_1_42_1","unstructured":"L.-S. Huang , Z. Weinberg , C. Evans , and C. Jackson . 2010. Protecting Browsers from Cross-origin CSS Attacks . In Proc. CCS. L.-S. Huang, Z. Weinberg, C. Evans, and C. Jackson. 2010. Protecting Browsers from Cross-origin CSS Attacks. In Proc. CCS."},{"key":"e_1_3_2_1_43_1","unstructured":"C. Iordanou G. Smaragdakis and N. Laoutaris. 2019. Who's Tracking Sensitive Domains? CoRR abs\/1908.02261 (2019).  C. Iordanou G. Smaragdakis and N. Laoutaris. 2019. Who's Tracking Sensitive Domains? CoRR abs\/1908.02261 (2019)."},{"volume-title":"Proc. IMC.","author":"Iordanou C.","key":"e_1_3_2_1_44_1","unstructured":"C. Iordanou , G. Smaragdakis , I. Poese , and N. Laoutaris . 2018. Tracing Cross Border Web Tracking . In Proc. IMC. C. Iordanou, G. Smaragdakis, I. Poese, and N. Laoutaris. 2018. Tracing Cross Border Web Tracking. In Proc. IMC."},{"volume-title":"Proc. WWW.","author":"Jackson C.","key":"e_1_3_2_1_45_1","unstructured":"C. Jackson , A. Bortz , D. Boneh , and J. C. Mitchell . 2006. Protecting Browser State from Web Privacy Attacks . In Proc. WWW. C. Jackson, A. Bortz, D. Boneh, and J. C. Mitchell. 2006. Protecting Browser State from Web Privacy Attacks. In Proc. WWW."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"B. J. Jansen and T. Mullen. 2008. Sponsored search: an overview of the concept history and technology. Int. J. Electronic Business 6 (2008).  B. J. Jansen and T. Mullen. 2008. Sponsored search: an overview of the concept history and technology. Int. J. Electronic Business 6 (2008).","DOI":"10.1504\/IJEB.2008.018068"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"T. Jastrzembski N. Charness P. Holley and J. Feddon. 2003. Input devices for web browsing: age and hand effects. Universal Access Inf. 4 (2003).  T. Jastrzembski N. Charness P. Holley and J. Feddon. 2003. Input devices for web browsing: age and hand effects. Universal Access Inf. 4 (2003).","DOI":"10.1007\/s10209-003-0083-5"},{"volume-title":"Proc. ICALT.","author":"Kaklauskas A.","key":"e_1_3_2_1_48_1","unstructured":"A. Kaklauskas , M. Krutinis , and M. Seniut . 2009. Biometric Mouse Intelligent System for Student's Emotional and Examination Process Analysis . In Proc. ICALT. A. Kaklauskas, M. Krutinis, and M. Seniut. 2009. Biometric Mouse Intelligent System for Student's Emotional and Examination Process Analysis. In Proc. ICALT."},{"key":"e_1_3_2_1_49_1","article-title":"Automatic Prediction of","volume":"65","author":"Kapoor A.","year":"2007","unstructured":"A. Kapoor , W. Burleson , and R. W. Picard . 2007 . Automatic Prediction of Frustration. Int. J. Hum.-Comput. Stud. 65 , 8 (2007). A. Kapoor, W. Burleson, and R. W. Picard. 2007. Automatic Prediction of Frustration. Int. J. Hum.-Comput. Stud. 65, 8 (2007).","journal-title":"Frustration. Int. J. Hum.-Comput. Stud."},{"volume-title":"Proc. WWW Companion.","author":"Kratky P.","key":"e_1_3_2_1_50_1","unstructured":"P. Kratky and D. Chuda . 2016. Estimating Gender and Age of Web Page Visitors from the Way They Use Their Mouse . In Proc. WWW Companion. P. Kratky and D. Chuda. 2016. Estimating Gender and Age of Web Page Visitors from the Way They Use Their Mouse. In Proc. WWW Companion."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-018-0500-0"},{"volume-title":"Proc. WSDM.","author":"Lagun D.","key":"e_1_3_2_1_52_1","unstructured":"D. Lagun , M. Ageev , Q. Guo , and E. Agichtein . 2014. Discovering Common Motifs in Cursor Movement Data for Improving Web Search . In Proc. WSDM. D. Lagun, M. Ageev, Q. Guo, and E. Agichtein. 2014. Discovering Common Motifs in Cursor Movement Data for Improving Web Search. In Proc. WSDM."},{"key":"e_1_3_2_1_53_1","volume-title":"Sex Differences in Decision and Movement Time. Percept. Mot. Skills 52, 1","author":"Landauer A. A.","year":"1981","unstructured":"A. A. Landauer . 1981. Sex Differences in Decision and Movement Time. Percept. Mot. Skills 52, 1 ( 1981 ). A. A. Landauer. 1981. Sex Differences in Decision and Movement Time. Percept. Mot. Skills 52, 1 (1981)."},{"key":"e_1_3_2_1_54_1","unstructured":"N. Laoutaris. 2016. Cows privacy and tragedy of the commons on the Web. Available at http:\/\/laoutaris.info.  N. Laoutaris. 2016. Cows privacy and tragedy of the commons on the Web. Available at http:\/\/laoutaris.info."},{"volume-title":"Proc. SEC.","author":"Lecuyer M.","key":"e_1_3_2_1_55_1","unstructured":"M. Lecuyer , G. Ducoffe , F. Lan , A. Papancea , T. Petsios , R. Spahn , A. Chaintreau , and R. Geambasu . 2014. XRay: Enhancing the Web's Transparency with Differential Correlation . In Proc. SEC. M. Lecuyer, G. Ducoffe, F. Lan, A. Papancea, T. Petsios, R. Spahn, A. Chaintreau, and R. Geambasu. 2014. XRay: Enhancing the Web's Transparency with Differential Correlation. In Proc. SEC."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2037373.2037467"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"L. A. Leiva and I. Arapakis. 2020. The Attentive Cursor Dataset. Front. Hum. Neurosci. 14 (2020).  L. A. Leiva and I. Arapakis. 2020. The Attentive Cursor Dataset. Front. Hum. Neurosci. 14 (2020).","DOI":"10.3389\/fnhum.2020.565664"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"crossref","unstructured":"L. A. Leiva and J. Huang. 2015. Building a better mousetrap: Compressing mouse cursor activity for web analytics. Inf. Process. Manag. 51 2 (2015).  L. A. Leiva and J. Huang. 2015. Building a better mousetrap: Compressing mouse cursor activity for web analytics. Inf. Process. Manag. 51 2 (2015).","DOI":"10.1016\/j.ipm.2014.10.005"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2529995.2529996"},{"key":"e_1_3_2_1_60_1","volume-title":"Lost Trackers: An Archaeological Study of Web Tracking from 1996 to","author":"Lerner A.","year":"2016","unstructured":"A. Lerner , A. K. Simpson , T. Kohno , and F. Roesner . 2016 . Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016. In Proc. SEC. A. Lerner, A. K. Simpson, T. Kohno, and F. Roesner. 2016. Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016. In Proc. SEC."},{"volume-title":"Proc. IMC.","author":"Leung C.","key":"e_1_3_2_1_61_1","unstructured":"C. Leung , J. Ren , D. Choffnes , and C. Wilson . 2016. Should You Use the App for That? Comparing the Privacy Implications of App- and Web-based Online Services . In Proc. IMC. C. Leung, J. Ren, D. Choffnes, and C. Wilson. 2016. Should You Use the App for That? Comparing the Privacy Implications of App- and Web-based Online Services. In Proc. IMC."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"crossref","unstructured":"T. Lindberg R. N\u00e4s\u00e4nen and K. M\u00fcller. 2006. How age affects the speed of perception of computer icons. Displays 27 4 (2006).  T. Lindberg R. N\u00e4s\u00e4nen and K. M\u00fcller. 2006. How age affects the speed of perception of computer icons. Displays 27 4 (2006).","DOI":"10.1016\/j.displa.2006.06.002"},{"volume-title":"Proc. SIGIR.","author":"Liu Y.","key":"e_1_3_2_1_63_1","unstructured":"Y. Liu , Y. Chen , J. Tang , J. Sun , M. Zhang , S. Ma , and X. Zhu . 2015. Different Users, Different Opinions: Predicting Search Satisfaction with Mouse Movement Information . In Proc. SIGIR. Y. Liu, Y. Chen, J. Tang, J. Sun, M. Zhang, S. Ma, and X. Zhu. 2015. Different Users, Different Opinions: Predicting Search Satisfaction with Mouse Movement Information. In Proc. SIGIR."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"H. Lu J. Rose Y. Liu A. Awad and L. Hou. 2017. Combining Mouse and Eye Movement Biometrics for User Authentication. In Information Security Practices I. Traor\u00e9 A. Awad and I. Woungang (Eds.). Springer.  H. Lu J. Rose Y. Liu A. Awad and L. Hou. 2017. Combining Mouse and Eye Movement Biometrics for User Authentication. In Information Security Practices I. Traor\u00e9 A. Awad and I. Woungang (Eds.). Springer.","DOI":"10.1007\/978-3-319-48947-6_5"},{"volume-title":"Proc. PASSAT.","author":"Malandrino D.","key":"e_1_3_2_1_65_1","unstructured":"D. Malandrino , V. Scarano , and R. Spinelli . 2013. How increased awareness can impact attitudes and behaviors toward online privacy protection . In Proc. PASSAT. D. Malandrino, V. Scarano, and R. Spinelli. 2013. How increased awareness can impact attitudes and behaviors toward online privacy protection. In Proc. PASSAT."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"crossref","unstructured":"D. Mart\u00edn-Albo L. A. Leiva J. Huang and R. Plamondon. 2016. Strokes of insight: User intent detection and kinematic compression of mouse cursor trails. Inf. Process. Manag. 52 6 (2016).  D. Mart\u00edn-Albo L. A. Leiva J. Huang and R. Plamondon. 2016. Strokes of insight: User intent detection and kinematic compression of mouse cursor trails. Inf. Process. Manag. 52 6 (2016).","DOI":"10.1016\/j.ipm.2016.04.005"},{"volume-title":"Proc. WPES.","author":"McDonald A. M.","key":"e_1_3_2_1_67_1","unstructured":"A. M. McDonald and L. F. Cranor . 2010. Americans? Attitudes About Internet Behavioral Advertising Practices . In Proc. WPES. A. M. McDonald and L. F. Cranor. 2010. Americans? Attitudes About Internet Behavioral Advertising Practices. In Proc. WPES."},{"volume-title":"Proc. TPRC.","author":"McDonald A. M.","key":"e_1_3_2_1_68_1","unstructured":"A. M. McDonald and L. F. Cranor . 2010. Beliefs and behaviors: Internet users? understanding of behavioral advertising . In Proc. TPRC. A. M. McDonald and L. F. Cranor. 2010. Beliefs and behaviors: Internet users? understanding of behavioral advertising. In Proc. TPRC."},{"key":"e_1_3_2_1_69_1","volume-title":"Customer Data: Designing for Transparency and Trust. Harvard Business Review.","author":"Morey T.","year":"2015","unstructured":"T. Morey , T. Forbath , and A. Schoop . 2015 . Customer Data: Designing for Transparency and Trust. Harvard Business Review. T. Morey, T. Forbath, and A. Schoop. 2015. Customer Data: Designing for Transparency and Trust. Harvard Business Review."},{"volume-title":"Proc. W2SP.","author":"Mowery K.","key":"e_1_3_2_1_70_1","unstructured":"K. Mowery , D. Bogenreif , S. Yilek , and H. Shacham . 2011. Fingerprinting Information in JavaScript Implementations . In Proc. W2SP. K. Mowery, D. Bogenreif, S. Yilek, and H. Shacham. 2011. Fingerprinting Information in JavaScript Implementations. In Proc. W2SP."},{"volume-title":"Proc. CHI EA.","author":"Mueller F.","key":"e_1_3_2_1_71_1","unstructured":"F. Mueller and A. Lockerd . 2001. Cheese: Tracking Mouse Movement Activity on Websites, a Tool for User Modeling . In Proc. CHI EA. F. Mueller and A. Lockerd. 2001. Cheese: Tracking Mouse Movement Activity on Websites, a Tool for User Modeling. In Proc. CHI EA."},{"volume-title":"Proc. WWW.","author":"Navalpakkam V.","key":"e_1_3_2_1_72_1","unstructured":"V. Navalpakkam , L. Jentzsch , R. Sayres , S. Ravi , A. Ahmed , and A. Smola . 2013. Measurement and Modeling of Eye-mouse Behavior in the Presence of Nonlinear Page Layouts . In Proc. WWW. V. Navalpakkam, L. Jentzsch, R. Sayres, S. Ravi, A. Ahmed, and A. Smola. 2013. Measurement and Modeling of Eye-mouse Behavior in the Presence of Nonlinear Page Layouts. In Proc. WWW."},{"key":"e_1_3_2_1_73_1","volume-title":"of California","author":"S.","year":"2018","unstructured":"S. of California . 2018 . California Consumer Privacy Act -- Assembly Bill No . 375. Available at https:\/\/leginfo.legislature.ca.gov. S. of California. 2018. California Consumer Privacy Act -- Assembly Bill No. 375. Available at https:\/\/leginfo.legislature.ca.gov."},{"key":"e_1_3_2_1_74_1","article-title":"Age- and Gender-Based Market Segmentation","volume":"3","author":"Oh H.","year":"2002","unstructured":"H. Oh , S. C. Parks , and F. J. Demicco . 2002 . Age- and Gender-Based Market Segmentation : A Structural Understanding. Int. J. Hosp. Tour. Adm. 3 , 1 (2002). H. Oh, S. C. Parks, and F. J. Demicco. 2002. Age- and Gender-Based Market Segmentation: A Structural Understanding. Int. J. Hosp. Tour. Adm. 3, 1 (2002).","journal-title":"A Structural Understanding. Int. J. Hosp. Tour. Adm."},{"volume-title":"Proc. HotPETs Workshop.","author":"Olejnik L.","key":"e_1_3_2_1_75_1","unstructured":"L. Olejnik , C. Castelluccia , and A. Janc . 2012. Why Johnny Can't Browse in Peace: On the Uniqueness of Web Browsing History Patterns . In Proc. HotPETs Workshop. L. Olejnik, C. Castelluccia, and A. Janc. 2012. Why Johnny Can't Browse in Peace: On the Uniqueness of Web Browsing History Patterns. In Proc. HotPETs Workshop."},{"volume-title":"Proc. IMC.","author":"Papadopoulos P.","key":"e_1_3_2_1_76_1","unstructured":"P. Papadopoulos , P. Rodriguez , N. Kourtellis , and N. Laoutaris . 2017. If you are not paying for it, you are the product: how much do advertisers pay to reach you? . In Proc. IMC. P. Papadopoulos, P. Rodriguez, N. Kourtellis, and N. Laoutaris. 2017. If you are not paying for it, you are the product: how much do advertisers pay to reach you?. In Proc. IMC."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"crossref","unstructured":"J. Parra-Arnau J. P. Achara and C. Castelluccia. 2017. MyAdChoices: Bringing Transparency and Control to Online Advertising. ACM Trans. Web 11 (2017).  J. Parra-Arnau J. P. Achara and C. Castelluccia. 2017. MyAdChoices: Bringing Transparency and Control to Online Advertising. ACM Trans. Web 11 (2017).","DOI":"10.1145\/2996466"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3099023.3099105"},{"volume-title":"Proc. USENIX Security.","author":"Plane A. C.","key":"e_1_3_2_1_79_1","unstructured":"A. C. Plane , E. M. Redmiles , M. M. Mazurek , and M. C. Tschantz . 2017. Exploring User Perceptions of Discrimination in Online Targeted Advertising . In Proc. USENIX Security. A. C. Plane, E. M. Redmiles, M. M. Mazurek, and M. C. Tschantz. 2017. Exploring User Perceptions of Discrimination in Online Targeted Advertising. In Proc. USENIX Security."},{"key":"e_1_3_2_1_80_1","volume-title":"My Rules CHIIR '21","author":"Pozen D. E.","year":"2016","unstructured":"D. E. Pozen . 2016 . Privacy-Privacy Tradeoffs. The University of Chicago Law Review 83, 1 (2016). My Mouse , My Rules CHIIR '21 , March 14-19, 2021, Canberra, ACT, Australia D. E. Pozen. 2016. Privacy-Privacy Tradeoffs. The University of Chicago Law Review 83, 1 (2016). My Mouse, My Rules CHIIR '21, March 14-19, 2021, Canberra, ACT, Australia"},{"volume-title":"Proc. CVPR.","author":"Prakash A.","key":"e_1_3_2_1_81_1","unstructured":"A. Prakash , N. Moran , S. Garber , A. DiLillo , and J. Storer . 2018. Deflecting Adversarial Attacks with Pixel Deflection . In Proc. CVPR. A. Prakash, N. Moran, S. Garber, A. DiLillo, and J. Storer. 2018. Deflecting Adversarial Attacks with Pixel Deflection. In Proc. CVPR."},{"volume-title":"Proc. IMC.","author":"Pujol E.","key":"e_1_3_2_1_82_1","unstructured":"E. Pujol , O. Hohlfeld , and A. Feldmann . 2015. Annoyed Users: Ads and Ad-Block Usage in the Wild . In Proc. IMC. E. Pujol, O. Hohlfeld, and A. Feldmann. 2015. Annoyed Users: Ads and Ad-Block Usage in the Wild. In Proc. IMC."},{"volume-title":"Proc. NDSS.","author":"Razaghpanah A.","key":"e_1_3_2_1_83_1","unstructured":"A. Razaghpanah , R. Nithyanand , N. Vallina-Rodriguez , S. Sundaresan , M. Allman , C. Kreibich , and P. Gill . 2018. Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem . In Proc. NDSS. A. Razaghpanah, R. Nithyanand, N. Vallina-Rodriguez, S. Sundaresan, M. Allman, C. Kreibich, and P. Gill. 2018. Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem. In Proc. NDSS."},{"volume-title":"Proc. MobiSys.","author":"Ren J.","key":"e_1_3_2_1_84_1","unstructured":"J. Ren , A. Rao , M. Lindorfer , A. Legout , and D. Choffnes . 2016. ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic . In Proc. MobiSys. J. Ren, A. Rao, M. Lindorfer, A. Legout, and D. Choffnes. 2016. ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic. In Proc. MobiSys."},{"volume-title":"Proc. USEC Workshop at NDSS.","author":"Schaub F.","key":"e_1_3_2_1_85_1","unstructured":"F. Schaub , A. Marella , P. Kalvani , B. Ur , C. Pan , E. Forney , and L. F. Cranor . 2016. Watching Them Watching Me: Browser Extensions? Impact on User Privacy Awareness and Concern . In Proc. USEC Workshop at NDSS. F. Schaub, A. Marella, P. Kalvani, B. Ur, C. Pan, E. Forney, and L. F. Cranor. 2016. Watching Them Watching Me: Browser Extensions? Impact on User Privacy Awareness and Concern. In Proc. USEC Workshop at NDSS."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1362\/026725700785100479"},{"volume-title":"Proc. SAC.","author":"Shapira B.","key":"e_1_3_2_1_87_1","unstructured":"B. Shapira , M. Taieb-Maimon , and A. Moskowitz . 2006. Study of the Usefulness of Known and New Implicit Indicators and Their Optimal Combination for Accurate Inference of Users Interests . In Proc. SAC. B. Shapira, M. Taieb-Maimon, and A. Moskowitz. 2006. Study of the Usefulness of Known and New Implicit Indicators and Their Optimal Combination for Accurate Inference of Users Interests. In Proc. SAC."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"crossref","unstructured":"M. W. Smith J. Sharit and S. J. Czaja. 1999. Aging Motor Control and the Performance of Computer Mouse Tasks. Hum. Factors 41 3 (1999).  M. W. Smith J. Sharit and S. J. Czaja. 1999. Aging Motor Control and the Performance of Computer Mouse Tasks. Hum. Factors 41 3 (1999).","DOI":"10.1518\/001872099779611102"},{"key":"e_1_3_2_1_89_1","volume-title":"Vibrate: A Cost-Benefit Approach to Improving Browser Security. In Proc. CCS.","author":"Snyder P.","year":"2017","unstructured":"P. Snyder , C. Taylor , and C. Kanich . 2017 . Most Websites Don't Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security. In Proc. CCS. P. Snyder, C. Taylor, and C. Kanich. 2017. Most Websites Don't Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security. In Proc. CCS."},{"volume-title":"Proc. CIKM.","author":"Speicher M.","key":"e_1_3_2_1_90_1","unstructured":"M. Speicher , A. Both , and M. Gaedke . 2013. TellMyRelevance! Predicting the Relevance of Web Search Results from Cursor Interactions . In Proc. CIKM. M. Speicher, A. Both, and M. Gaedke. 2013. TellMyRelevance! Predicting the Relevance of Web Search Results from Cursor Interactions. In Proc. CIKM."},{"volume-title":"Proc. PoPETs.","author":"Starov O.","key":"e_1_3_2_1_91_1","unstructured":"O. Starov , P. Gill , and N. Nikiforakis . 2016. Are You Sure You Want to Contact Us' Quantifying the Leakage of PII via Website Contact Forms . In Proc. PoPETs. O. Starov, P. Gill, and N. Nikiforakis. 2016. Are You Sure You Want to Contact Us' Quantifying the Leakage of PII via Website Contact Forms. In Proc. PoPETs."},{"volume-title":"Proc. CCS.","author":"Steven E.","key":"e_1_3_2_1_92_1","unstructured":"E. Steven and A. Narayanan . 2016. Online Tracking: A 1-million-site Measurement and Analysis . In Proc. CCS. E. Steven and A. Narayanan. 2016. Online Tracking: A 1-million-site Measurement and Analysis. In Proc. CCS."},{"key":"e_1_3_2_1_93_1","volume-title":"Discrimination in online ad delivery. Commun. ACM 56, 5","author":"Sweeney L.","year":"2013","unstructured":"L. Sweeney . 2013. Discrimination in online ad delivery. Commun. ACM 56, 5 ( 2013 ). L. Sweeney. 2013. Discrimination in online ad delivery. Commun. ACM 56, 5 (2013)."},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"crossref","unstructured":"J. Y. Tsai S. Egelman L. Cranor and A. Acquisti. 2011. The effect of online privacy information on purchasing behavior: An experimental study. Inf. Sys. Res. 22 2 (2011).  J. Y. Tsai S. Egelman L. Cranor and A. Acquisti. 2011. The effect of online privacy information on purchasing behavior: An experimental study. Inf. Sys. Res. 22 2 (2011).","DOI":"10.1287\/isre.1090.0260"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"crossref","unstructured":"J. Turow J. King C. J. Hoofnagle A. Bleakley and M. Hennessy. 2009. Americans Reject Tailored Advertising and Three Activities that Enable It. SSRN Electronic Journal.  J. Turow J. King C. J. Hoofnagle A. Bleakley and M. Hennessy. 2009. Americans Reject Tailored Advertising and Three Activities that Enable It. SSRN Electronic Journal.","DOI":"10.2139\/ssrn.1478214"},{"key":"e_1_3_2_1_96_1","unstructured":"E. Union. 2016. The EU General Data Protection Regulation. Available at http:\/\/eur-lex.europa.eu.  E. Union. 2016. The EU General Data Protection Regulation. Available at http:\/\/eur-lex.europa.eu."},{"volume-title":"Proc. SOUPS.","author":"Ur B.","key":"e_1_3_2_1_97_1","unstructured":"B. Ur , P. G. Leon , L. F. Cranor , R. Shay , and Y. Wang . 2012. Smart, useful, scary, creepy: Perceptions of online behavioral advertising . In Proc. SOUPS. B. Ur, P. G. Leon, L. F. Cranor, R. Shay, and Y. Wang. 2012. Smart, useful, scary, creepy: Perceptions of online behavioral advertising. In Proc. SOUPS."},{"key":"e_1_3_2_1_98_1","article-title":"Age-related differences in movement control: Adjusting submovement structure to optimize performance","volume":"52","author":"Walker N.","year":"1997","unstructured":"N. Walker , D. A. Philbin , and A. D. Fisk . 1997 . Age-related differences in movement control: Adjusting submovement structure to optimize performance . J. Gerontol. A Biol. Sci. Med. Sci. 52 , 1 (1997). N. Walker, D. A. Philbin, and A. D. Fisk. 1997. Age-related differences in movement control: Adjusting submovement structure to optimize performance. J. Gerontol. A Biol. Sci. Med. Sci. 52, 1 (1997).","journal-title":"J. Gerontol. A Biol. Sci. Med. Sci."},{"volume-title":"Proc. IMC.","author":"Walls R. J.","key":"e_1_3_2_1_99_1","unstructured":"R. J. Walls , E. D. Kilmer , N. Lageman , and P. D. McDaniel . 2015. Measuring the Impact and Perception of Acceptable Advertisements . In Proc. IMC. R. J. Walls, E. D. Kilmer, N. Lageman, and P. D. McDaniel. 2015. Measuring the Impact and Perception of Acceptable Advertisements. In Proc. IMC."},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"crossref","unstructured":"R. White P. Doraiswamy and E. Horvitz. 2018. Detecting neurodegenerative disorders from web search signals. npj Digital Med. 1 8 (2018).  R. White P. Doraiswamy and E. Horvitz. 2018. Detecting neurodegenerative disorders from web search signals. npj Digital Med. 1 8 (2018).","DOI":"10.1038\/s41746-018-0016-6"},{"volume-title":"Proc. WPES.","author":"Wills C. E.","key":"e_1_3_2_1_101_1","unstructured":"C. E. Wills and C. Tatar . 2012. Understanding What They Do with What They Know . In Proc. WPES. C. E. Wills and C. Tatar. 2012. Understanding What They Do with What They Know. In Proc. WPES."},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"crossref","unstructured":"C. E. Wills and M. Zeljkovic. 2010. A personalized approach to web privacy: Awareness attitudes and actions. Inform. Manag. Comput. Secur. 19 1 (2010).  C. E. Wills and M. Zeljkovic. 2010. A personalized approach to web privacy: Awareness attitudes and actions. Inform. Manag. Comput. Secur. 19 1 (2010).","DOI":"10.1108\/09685221111115863"},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACII.2013.72"},{"volume-title":"Proc. ICDMW.","author":"Yamauchi T.","key":"e_1_3_2_1_104_1","unstructured":"T. Yamauchi and C. Bowman . 2014. Mining Cursor Motions to Find the Gender, Experience, and Feelings of Computer Users . In Proc. ICDMW. T. Yamauchi and C. Bowman. 2014. Mining Cursor Motions to Find the Gender, Experience, and Feelings of Computer Users. In Proc. ICDMW."},{"key":"e_1_3_2_1_105_1","article-title":"Gender Differences in Mouse and Cursor","volume":"31","author":"Yamauchi T.","year":"2015","unstructured":"T. Yamauchi , J. H. Seo , N. Jett , G. Parks , and C. Bowman . 2015 . Gender Differences in Mouse and Cursor Movements. Int. J. Hum.-Comput. Interact. 31 , 12 (2015). T. Yamauchi, J. H. Seo, N. Jett, G. Parks, and C. Bowman. 2015. Gender Differences in Mouse and Cursor Movements. Int. J. Hum.-Comput. Interact. 31, 12 (2015).","journal-title":"Movements. Int. J. Hum.-Comput. Interact."},{"key":"e_1_3_2_1_106_1","doi-asserted-by":"crossref","unstructured":"P. Zimmermann S. Guttormsen B. Danuser and P. Gomez. 2003. Affective Computing -- A Rationale for Measuring Mood With Mouse and Keyboard. Int. J. Occup. Saf. Ergon. 9 (2003).  P. Zimmermann S. Guttormsen B. Danuser and P. Gomez. 2003. Affective Computing -- A Rationale for Measuring Mood With Mouse and Keyboard. Int. J. Occup. Saf. Ergon. 9 (2003).","DOI":"10.1080\/10803548.2003.11076589"}],"event":{"name":"CHIIR '21: ACM SIGIR Conference on Human Information Interaction and Retrieval","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Canberra ACT Australia","acronym":"CHIIR '21"},"container-title":["Proceedings of the 2021 Conference on Human Information Interaction and Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3406522.3446011","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3406522.3446011","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:19Z","timestamp":1750197799000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3406522.3446011"}},"subtitle":["Privacy Issues of Behavioral User Profiling via Mouse Tracking"],"short-title":[],"issued":{"date-parts":[[2021,3,14]]},"references-count":106,"alternative-id":["10.1145\/3406522.3446011","10.1145\/3406522"],"URL":"https:\/\/doi.org\/10.1145\/3406522.3446011","relation":{},"subject":[],"published":{"date-parts":[[2021,3,14]]},"assertion":[{"value":"2021-03-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}