{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:53:03Z","timestamp":1776124383375,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":133,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T00:00:00Z","timestamp":1620259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA8750-15-2-0277"],"award-info":[{"award-number":["FA8750-15-2-0277"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8750-15-2-0277"],"award-info":[{"award-number":["FA8750-15-2-0277"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1801316 & CNS-1914486"],"award-info":[{"award-number":["CNS-1801316 & CNS-1914486"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,6]]},"DOI":"10.1145\/3411764.3445148","type":"proceedings-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T04:26:17Z","timestamp":1620447977000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":97,"title":["A Design Space for Privacy Choices: Towards Meaningful Privacy Control in the Internet of Things"],"prefix":"10.1145","author":[{"given":"Yuanyuan","family":"Feng","sequence":"first","affiliation":[{"name":"School of Computer Science, Carnegie Mellon University, United States"}]},{"given":"Yaxing","family":"Yao","sequence":"additional","affiliation":[{"name":"School of Computer Science, Carnegie Mellon University, United States"}]},{"given":"Norman","family":"Sadeh","sequence":"additional","affiliation":[{"name":"School of Computer Science, Carnegie Mellon University, United States"}]}],"member":"320","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501613"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702210"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23039"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380262"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207727"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.32"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2002.994510"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293461"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-010-0346-0"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753689"},{"key":"e_1_3_2_1_13_1","unstructured":"John\u00a0J Borking BMA Van\u00a0Eck and P Siepel. 1999. Intelligent software agents and privacy. Registratiekamer The Hague.  John\u00a0J Borking BMA Van\u00a0Eck and P Siepel. 1999. Intelligent software agents and privacy. Registratiekamer The Hague."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501610"},{"key":"e_1_3_2_1_15_1","volume-title":"National Congress.","author":"Brazil","year":"2018","unstructured":"Brazil National Congress. 2018 . General Data Protection Law (English translation). https:\/\/iapp.org\/resources\/article\/brazils-general-data-protection-law-english-translation. Brazil National Congress. 2018. General Data Protection Law (English translation). https:\/\/iapp.org\/resources\/article\/brazils-general-data-protection-law-english-translation."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2011.85"},{"key":"e_1_3_2_1_17_1","volume-title":"The failure of fair information practice principles. Consumer protection in the age of the information economy","author":"Cate H","year":"2006","unstructured":"Fred\u00a0 H Cate . 2006. The failure of fair information practice principles. Consumer protection in the age of the information economy ( 2006 ). Fred\u00a0H Cate. 2006. The failure of fair information practice principles. Consumer protection in the age of the information economy (2006)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.84"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366612.3368122"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.12.001"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.4251118"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376389"},{"key":"e_1_3_2_1_23_1","volume-title":"Retrieved September 12th","year":"2019","unstructured":"CookieYes. 2019 . GDPR cookie consent banner examples . Retrieved September 12th , 2020 from https:\/\/www.cookieyes.com\/gdpr-cookie-consent-banner-examples\/ CookieYes. 2019. GDPR cookie consent banner examples. Retrieved September 12th, 2020 from https:\/\/www.cookieyes.com\/gdpr-cookie-consent-banner-examples\/"},{"key":"e_1_3_2_1_24_1","unstructured":"Council of European Union. 2016. General Data Protection Regulation. https:\/\/gdpr-infor.eu.  Council of European Union. 2016. General Data Protection Regulation. https:\/\/gdpr-infor.eu."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1253568"},{"key":"e_1_3_2_1_26_1","first-page":"273","article-title":"Necessary but not sufficient: Standardized mechanisms for privacy notice and choice","author":"Cranor Lorrie\u00a0Faith","year":"2012","unstructured":"Lorrie\u00a0Faith Cranor . 2012 . Necessary but not sufficient: Standardized mechanisms for privacy notice and choice . J. on Telecomm. & High Tech. L. 10 (2012), 273 . Lorrie\u00a0Faith Cranor. 2012. Necessary but not sufficient: Standardized mechanisms for privacy notice and choice. J. on Telecomm. & High Tech. L. 10 (2012), 273.","journal-title":"J. on Telecomm. & High Tech."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165734.1165735"},{"key":"e_1_3_2_1_28_1","volume-title":"Retrieved September 13th","author":"Cranor Lorrie\u00a0Faith","year":"2020","unstructured":"Lorrie\u00a0Faith Cranor , Hana Habib , Yixin Zou , Alessandro Acquisti , Joel Reidenberg , Norman Sadeh , and Florian Schaub . 2020 . Design and Evaluation of a Usable Icon and Tagline to Signal an Opt-Out of the Sale of Personal Information as Required by CCPA . Retrieved September 13th , 2020 from https:\/\/oag.ca.gov\/sites\/all\/files\/agweb\/pdfs\/privacy\/cranor-design-eval-usable-icon.pdf Lorrie\u00a0Faith Cranor, Hana Habib, Yixin Zou, Alessandro Acquisti, Joel Reidenberg, Norman Sadeh, and Florian Schaub. 2020. Design and Evaluation of a Usable Icon and Tagline to Signal an Opt-Out of the Sale of Personal Information as Required by CCPA. Retrieved September 13th, 2020 from https:\/\/oag.ca.gov\/sites\/all\/files\/agweb\/pdfs\/privacy\/cranor-design-eval-usable-icon.pdf"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the Twelfth Workshop on the Economics of Information Security, Vol.\u00a013","author":"Cranor Lorrie\u00a0Faith","year":"2013","unstructured":"Lorrie\u00a0Faith Cranor , Kelly Idouchi , Pedro\u00a0Giovanni Leon , Manya Sleeper , and Blase Ur . 2013 . Are they actually any different? Comparing thousands of financial institutions\u2019 privacy practices . In Proceedings of the Twelfth Workshop on the Economics of Information Security, Vol.\u00a013 . Lorrie\u00a0Faith Cranor, Kelly Idouchi, Pedro\u00a0Giovanni Leon, Manya Sleeper, and Blase Ur. 2013. Are they actually any different? Comparing thousands of financial institutions\u2019 privacy practices. In Proceedings of the Twelfth Workshop on the Economics of Information Security, Vol.\u00a013."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367733"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.181"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00287-019-01201-1"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376165"},{"key":"e_1_3_2_1_34_1","volume-title":"Retrieved September 13th","author":"Alliance Digital Advertising","year":"2009","unstructured":"Digital Advertising Alliance . 2009 . Self-regulatory principles for online behavioral advertising ,. Retrieved September 13th , 2020 from https:\/\/digitaladvertisingalliance.org\/principles Digital Advertising Alliance. 2009. Self-regulatory principles for online behavioral advertising,. Retrieved September 13th, 2020 from https:\/\/digitaladvertisingalliance.org\/principles"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1238"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/572020.572038"},{"key":"e_1_3_2_1_37_1","volume-title":"International Workshop on Privacy Enhancing Technologies. Springer, 167\u2013185","author":"Duan Yitao","year":"2004","unstructured":"Yitao Duan and John Canny . 2004 . Protecting user data in ubiquitous computing: Towards trustworthy environments . In International Workshop on Privacy Enhancing Technologies. Springer, 167\u2013185 . Yitao Duan and John Canny. 2004. Protecting user data in ubiquitous computing: Towards trustworthy environments. In International Workshop on Privacy Enhancing Technologies. Springer, 167\u2013185."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518752"},{"key":"e_1_3_2_1_39_1","volume-title":"Retrieved September 7th","author":"Elshof Marc","year":"2019","unstructured":"Marc Elshof . 2019 . GDPR Update - EDPB video surveillance guidelines . Retrieved September 7th , 2020 from https:\/\/www.jdsupra.com\/legalnews\/gdpr-update-edpb-video-surveillance-94566\/ Marc Elshof. 2019. GDPR Update - EDPB video surveillance guidelines. Retrieved September 7th, 2020 from https:\/\/www.jdsupra.com\/legalnews\/gdpr-update-edpb-video-surveillance-94566\/"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Pardis Emami-Naeini Yuvraj Agarwal Lorrie\u00a0Faith Cranor and Hanan Hibshi. 2020. Ask the Experts: What Should Be on an IoT Privacy and Security Label?(2020). arXiv:2002.04631  Pardis Emami-Naeini Yuvraj Agarwal Lorrie\u00a0Faith Cranor and Hanan Hibshi. 2020. Ask the Experts: What Should Be on an IoT Privacy and Security Label?(2020). arXiv:2002.04631","DOI":"10.1109\/SP40000.2020.00043"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.12.016"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106426.3106427"},{"key":"e_1_3_2_1_43_1","volume-title":"The Applications of Machine Learning in Privacy Notice and Choice. In 2019 11th International Conference on Communication Systems & Networks (COMSNETS). IEEE, 118\u2013124","author":"Fawaz Kassem","year":"2019","unstructured":"Kassem Fawaz , Thomas Linden , and Hamza Harkous . 2019 . The Applications of Machine Learning in Privacy Notice and Choice. In 2019 11th International Conference on Communication Systems & Networks (COMSNETS). IEEE, 118\u2013124 . Kassem Fawaz, Thomas Linden, and Hamza Harkous. 2019. The Applications of Machine Learning in Privacy Notice and Choice. In 2019 11th International Conference on Communication Systems & Networks (COMSNETS). IEEE, 118\u2013124."},{"key":"e_1_3_2_1_44_1","unstructured":"Federal Trade Commission. 2013. Mobile Privacy Disclosures: Building Trust Through Transparency (FTC Staff Report). https:\/\/www.ftc.gov\/reports\/mobile-privacy-disclosures-building-trust-through-transparency-federal-trade-commission.  Federal Trade Commission. 2013. Mobile Privacy Disclosures: Building Trust Through Transparency (FTC Staff Report). https:\/\/www.ftc.gov\/reports\/mobile-privacy-disclosures-building-trust-through-transparency-federal-trade-commission."},{"key":"e_1_3_2_1_45_1","unstructured":"Federal Trade Commission. 2015. Internet of Things: Privacy & Security in a Connected World (FTC Staff Report). https:\/\/www.ftc.gov\/reports\/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things.  Federal Trade Commission. 2015. Internet of Things: Privacy & Security in a Connected World (FTC Staff Report). https:\/\/www.ftc.gov\/reports\/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/2372387.2372394"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2018.476"},{"key":"e_1_3_2_1_48_1","volume-title":"Twelfth Symposium on Usable Privacy and Security ({SOUPS}","author":"Gluck Joshua","year":"2016","unstructured":"Joshua Gluck , Florian Schaub , Amy Friedman , Hana Habib , Norman Sadeh , Lorrie\u00a0Faith Cranor , and Yuvraj Agarwal . 2016 . How short is too short? Implications of length and framing on the effectiveness of privacy notices . In Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016). 321\u2013340. Joshua Gluck, Florian Schaub, Amy Friedman, Hana Habib, Norman Sadeh, Lorrie\u00a0Faith Cranor, and Yuvraj Agarwal. 2016. How short is too short? Implications of length and framing on the effectiveness of privacy notices. In Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016). 321\u2013340."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240720"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1001\/jama.285.23.3015"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376511"},{"key":"e_1_3_2_1_52_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Habib Hana","year":"2019","unstructured":"Hana Habib , Yixin Zou , Aditi Jannu , Neha Sridhar , Chelse Swoopes , Alessandro Acquisti , Lorrie\u00a0Faith Cranor , Norman Sadeh , and Florian Schaub . 2019 . An empirical analysis of data deletion and opt-out choices on 150 websites . In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019). Hana Habib, Yixin Zou, Aditi Jannu, Neha Sridhar, Chelse Swoopes, Alessandro Acquisti, Lorrie\u00a0Faith Cranor, Norman Sadeh, and Florian Schaub. 2019. An empirical analysis of data deletion and opt-out choices on 150 websites. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445387"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556978"},{"key":"e_1_3_2_1_55_1","volume-title":"Retrieved September 13th, 2020","author":"Harwell Drew","year":"2018","unstructured":"Drew Harwell and Abha Bhattarai . 2018 . Inside Amazon Go: The camera-filled convenience store that watches you back . Retrieved September 13th, 2020 from https:\/\/www.washingtonpost.com\/news\/business\/wp\/2018\/01\/22\/inside-amazon-go-the-camera-filled-convenience-store-that-watches-you-back\/ Drew Harwell and Abha Bhattarai. 2018. Inside Amazon Go: The camera-filled convenience store that watches you back. Retrieved September 13th, 2020 from https:\/\/www.washingtonpost.com\/news\/business\/wp\/2018\/01\/22\/inside-amazon-go-the-camera-filled-convenience-store-that-watches-you-back\/"},{"key":"e_1_3_2_1_56_1","volume-title":"Design science in information systems research. MIS quarterly","author":"Hevner R","year":"2004","unstructured":"Alan\u00a0 R Hevner , Salvatore\u00a0 T March , Jinsoo Park , and Sudha Ram . 2004. Design science in information systems research. MIS quarterly ( 2004 ), 75\u2013105. Alan\u00a0R Hevner, Salvatore\u00a0T March, Jinsoo Park, and Sudha Ram. 2004. Design science in information systems research. MIS quarterly (2004), 75\u2013105."},{"key":"e_1_3_2_1_57_1","volume-title":"Retrieved September 15th","author":"Hoffman Chris","year":"2020","unstructured":"Chris Hoffman . 2020 . Why Your iPhone Keeps Asking About Background Location Use . Retrieved September 15th , 2020 from https:\/\/www.howtogeek.com\/563557\/why-your-iphone-keeps-asking-you-about-background-location-use\/ Chris Hoffman. 2020. Why Your iPhone Keeps Asking About Background Location Use. Retrieved September 15th, 2020 from https:\/\/www.howtogeek.com\/563557\/why-your-iphone-keeps-asking-you-about-background-location-use\/"},{"key":"e_1_3_2_1_58_1","volume-title":"End-user privacy in human-computer interaction. Vol.\u00a01","author":"Iachello Giovanni","unstructured":"Giovanni Iachello and Jason Hong . 2007. End-user privacy in human-computer interaction. Vol.\u00a01 . Now Publishers Inc . Giovanni Iachello and Jason Hong. 2007. End-user privacy in human-computer interaction. Vol.\u00a01. Now Publishers Inc."},{"key":"e_1_3_2_1_59_1","first-page":"385","article-title":"Big Bird Meets Big Brother: A Look at the Children\u2019s Online Privacy Protection Act","volume":"16","author":"Jamtgaard Laurel","year":"2000","unstructured":"Laurel Jamtgaard . 2000 . Big Bird Meets Big Brother: A Look at the Children\u2019s Online Privacy Protection Act . Santa Clara High Technology Law Journal 16 , 2 (2000), 385 . Laurel Jamtgaard. 2000. Big Bird Meets Big Brother: A Look at the Children\u2019s Online Privacy Protection Act. Santa Clara High Technology Law Journal 16, 2 (2000), 385.","journal-title":"Santa Clara High Technology Law Journal"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372296"},{"key":"e_1_3_2_1_61_1","volume-title":"International Conference on Information Systems (ICIS","author":"Keith J","year":"2014","unstructured":"Mark\u00a0 J Keith , Courtenay Maynes , Paul\u00a0Benjamin Lowry , and Jeffry Babb . 2014 . Privacy fatigue: The effect of privacy control complexity on consumer electronic information disclosure . In International Conference on Information Systems (ICIS 2014), Auckland, New Zealand, December. 14\u201317. Mark\u00a0J Keith, Courtenay Maynes, Paul\u00a0Benjamin Lowry, and Jeffry Babb. 2014. Privacy fatigue: The effect of privacy control complexity on consumer electronic information disclosure. In International Conference on Information Systems (ICIS 2014), Auckland, New Zealand, December. 14\u201317."},{"key":"e_1_3_2_1_62_1","volume-title":"Financial Cryptography and Data Security, Jim Blyth, Sven Dietrich, and L.\u00a0Jean Camp (Eds.)","author":"Kelley Patrick\u00a0Gage","unstructured":"Patrick\u00a0Gage Kelley , Sunny Consolvo , Lorrie\u00a0Faith Cranor , Jaeyeon Jung , Norman Sadeh , and David Wetherall . 2012. A Conundrum of Permissions: Installing Applications on an Android Smartphone . In Financial Cryptography and Data Security, Jim Blyth, Sven Dietrich, and L.\u00a0Jean Camp (Eds.) . Springer Berlin Heidelberg , Berlin, Heidelberg , 68\u201379. Patrick\u00a0Gage Kelley, Sunny Consolvo, Lorrie\u00a0Faith Cranor, Jaeyeon Jung, Norman Sadeh, and David Wetherall. 2012. A Conundrum of Permissions: Installing Applications on an Android Smartphone. In Financial Cryptography and Data Security, Jim Blyth, Sven Dietrich, and L.\u00a0Jean Camp (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 68\u201379."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466466"},{"key":"e_1_3_2_1_64_1","volume-title":"Control and Affect. In Sixteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Kitkowska Agnieszka","year":"2020","unstructured":"Agnieszka Kitkowska , Mark Warner , Yefim Shulman , Erik W\u00e4stlund , and Leonardo\u00a0 A Martucci . 2020 . Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity , Control and Affect. In Sixteenth Symposium on Usable Privacy and Security ({SOUPS} 2020). 437\u2013456. Agnieszka Kitkowska, Mark Warner, Yefim Shulman, Erik W\u00e4stlund, and Leonardo\u00a0A Martucci. 2020. Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affect. In Sixteenth Symposium on Usable Privacy and Security ({SOUPS} 2020). 437\u2013456."},{"key":"e_1_3_2_1_65_1","first-page":"603","article-title":"Adchoices-compliance with online behavioral advertising notice and choice requirements","volume":"7","author":"Komanduri Saranga","year":"2011","unstructured":"Saranga Komanduri , Richard Shay , Greg Norcie , and Blase Ur . 2011 . Adchoices-compliance with online behavioral advertising notice and choice requirements . ISJLP 7 (2011), 603 . Saranga Komanduri, Richard Shay, Greg Norcie, and Blase Ur. 2011. Adchoices-compliance with online behavioral advertising notice and choice requirements. ISJLP 7(2011), 603.","journal-title":"ISJLP"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2494091.2494115"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2677972.2677978"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98385-1_1"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45427-6_23"},{"key":"e_1_3_2_1_70_1","volume-title":"Automated consent through privacy agents: Legal requirements and technical architecture. Computer law & Security review 25, 2","author":"Le\u00a0M\u00e9tayer Daniel","year":"2009","unstructured":"Daniel Le\u00a0M\u00e9tayer and Shara Monteleone . 2009. Automated consent through privacy agents: Legal requirements and technical architecture. Computer law & Security review 25, 2 ( 2009 ), 136\u2013144. Daniel Le\u00a0M\u00e9tayer and Shara Monteleone. 2009. Automated consent through privacy agents: Legal requirements and technical architecture. Computer law & Security review 25, 2 (2009), 136\u2013144."},{"key":"e_1_3_2_1_71_1","volume-title":"Retrieved September 16th, 2020","author":"Lee Nicole","year":"2019","unstructured":"Nicole Lee . 2019 . You can now ask Alexa to delete your voice history . Retrieved September 16th, 2020 from https:\/\/www.engadget.com\/2019-05-29-amazon-alexa-voice-deletion.html Nicole Lee. 2019. You can now ask Alexa to delete your voice history. Retrieved September 16th, 2020 from https:\/\/www.engadget.com\/2019-05-29-amazon-alexa-voice-deletion.html"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207759"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381970"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2007.10.006"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0610-6"},{"key":"e_1_3_2_1_77_1","volume-title":"Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security","author":"Liu Bin","year":"2016","unstructured":"Bin Liu , Mads\u00a0Schaarup Andersen , Florian Schaub , Hazim Almuhimedi , Shikun Zhang , Norman Sadeh , Alessandro Acquisti , and Yuvraj Agarwal . 2016 . Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions . In Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security ( Denver, CO, USA) (SOUPS \u201916). USENIX Association, USA, 27\u201341. Bin Liu, Mads\u00a0Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Zhang, Norman Sadeh, Alessandro Acquisti, and Yuvraj Agarwal. 2016. Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. In Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security (Denver, CO, USA) (SOUPS \u201916). USENIX Association, USA, 27\u201341."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568035"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(02)00028-5"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/585597.585616"},{"key":"e_1_3_2_1_81_1","volume-title":"options, and criteria: Elements of design space analysis. Human\u2013computer interaction 6, 3-4","author":"MacLean Allan","year":"1991","unstructured":"Allan MacLean , Richard\u00a0 M Young , Victoria\u00a0 ME Bellotti , and Thomas\u00a0 P Moran . 1991. Questions , options, and criteria: Elements of design space analysis. Human\u2013computer interaction 6, 3-4 ( 1991 ), 201\u2013250. Allan MacLean, Richard\u00a0M Young, Victoria\u00a0ME Bellotti, and Thomas\u00a0P Moran. 1991. Questions, options, and criteria: Elements of design space analysis. Human\u2013computer interaction 6, 3-4 (1991), 201\u2013250."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1108\/JICES-08-2013-0030"},{"key":"e_1_3_2_1_83_1","first-page":"540","article-title":"The cost of reading privacy policies","volume":"4","author":"McDonald M","year":"2008","unstructured":"Aleecia\u00a0 M McDonald and Lorrie\u00a0Faith Cranor . 2008 . The cost of reading privacy policies . I\/S: A Journal of Law and Policy for the Information Society 4 (2008), 540 \u2013 565 . Aleecia\u00a0M McDonald and Lorrie\u00a0Faith Cranor. 2008. The cost of reading privacy policies. I\/S: A Journal of Law and Policy for the Information Society 4 (2008), 540\u2013565.","journal-title":"I\/S: A Journal of Law and Policy for the Information Society"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866929"},{"key":"e_1_3_2_1_85_1","volume-title":"A Comparative Study of Online Privacy Policies and Formats","author":"McDonald M.","unstructured":"Aleecia\u00a0 M. McDonald , Robert\u00a0 W. Reeder , Patrick\u00a0Gage Kelley , and Lorrie\u00a0Faith Cranor . 2009. A Comparative Study of Online Privacy Policies and Formats . In Privacy Enhancing Technologies, Ian Goldberg and Mikhail\u00a0J. Atallah (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 37\u201355. Aleecia\u00a0M. McDonald, Robert\u00a0W. Reeder, Patrick\u00a0Gage Kelley, and Lorrie\u00a0Faith Cranor. 2009. A Comparative Study of Online Privacy Policies and Formats. In Privacy Enhancing Technologies, Ian Goldberg and Mikhail\u00a0J. Atallah (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 37\u201355."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/0142-694X(94)90026-4"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2016.7457158"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.25.2.238"},{"key":"e_1_3_2_1_89_1","volume-title":"Mozilla. Retrieved September 15th","author":"Wiki Mozilla","year":"2011","unstructured":"Mozilla Wiki . 2011 . Privacy icons . Mozilla. Retrieved September 15th , 2020 from https:\/\/wiki.mozilla.org\/Privacy_Icons Mozilla Wiki. 2011. Privacy icons. Mozilla. Retrieved September 15th, 2020 from https:\/\/wiki.mozilla.org\/Privacy_Icons"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/97243.97281"},{"key":"e_1_3_2_1_91_1","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"Nissenbaum Helen","unstructured":"Helen Nissenbaum . 2009. Privacy in context: Technology, policy, and the integrity of social life . Stanford University Press . Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press."},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376321"},{"key":"e_1_3_2_1_93_1","unstructured":"Office of the California Attorney General. 2020. California Consumer Privacy Act (CCPA): First Modified Regulations. https:\/\/oag.ca.gov\/sites\/all\/files\/agweb\/pdfs\/privacy\/ccpa-text-of-mod-clean-020720.pdf.  Office of the California Attorney General. 2020. California Consumer Privacy Act (CCPA): First Modified Regulations. https:\/\/oag.ca.gov\/sites\/all\/files\/agweb\/pdfs\/privacy\/ccpa-text-of-mod-clean-020720.pdf."},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.05.008"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2019.8935047"},{"key":"e_1_3_2_1_96_1","first-page":"596","article-title":"Initializing camera subsystem for face detection based on sensor inputs","volume":"9","author":"Papakipos Matthew\u00a0Nicholas","year":"2017","unstructured":"Matthew\u00a0Nicholas Papakipos and David\u00a0Harry Garcia . 2017 . Initializing camera subsystem for face detection based on sensor inputs . US Patent 9 , 596 ,084. Matthew\u00a0Nicholas Papakipos and David\u00a0Harry Garcia. 2017. Initializing camera subsystem for face detection based on sensor inputs. US Patent 9,596,084.","journal-title":"US Patent"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2017.52"},{"key":"e_1_3_2_1_98_1","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 1415\u20131418","author":"Patil Sameer","year":"2015","unstructured":"Sameer Patil , Roberto Hoyle , Roman Schlegel , Apu Kapadia , and Adam\u00a0 J Lee . 2015 . Interrupt now or inform later? Comparing immediate and delayed privacy feedback . In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 1415\u20131418 . Sameer Patil, Roberto Hoyle, Roman Schlegel, Apu Kapadia, and Adam\u00a0J Lee. 2015. Interrupt now or inform later? Comparing immediate and delayed privacy feedback. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 1415\u20131418."},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557121"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240302"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2015.34"},{"key":"e_1_3_2_1_102_1","volume-title":"Context aware computing for the internet of things: A survey","author":"Perera Charith","year":"2013","unstructured":"Charith Perera , Arkady Zaslavsky , Peter Christen , and Dimitrios Georgakopoulos . 2013. Context aware computing for the internet of things: A survey . IEEE communications surveys & tutorials 16, 1 ( 2013 ), 414\u2013454. Charith Perera, Arkady Zaslavsky, Peter Christen, and Dimitrios Georgakopoulos. 2013. Context aware computing for the internet of things: A survey. IEEE communications surveys & tutorials 16, 1 (2013), 414\u2013454."},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/2638728.2641707"},{"key":"e_1_3_2_1_104_1","first-page":"39","article-title":"Disagreeable privacy policies: Mismatches between meaning and users\u2019 understanding","volume":"30","author":"Reidenberg R","year":"2015","unstructured":"Joel\u00a0 R Reidenberg , Travis Breaux , Lorrie\u00a0Faith Cranor , Brian French , Amanda Grannis , James\u00a0 T Graves , Fei Liu , Aleecia McDonald , Thomas\u00a0 B Norton , Rohan Ramanath , Cameron Russell , Norman Sadeh , and Florian Schaub . 2015 . Disagreeable privacy policies: Mismatches between meaning and users\u2019 understanding . Berkeley Technology Law Journal 30 (2015), 39 . Joel\u00a0R Reidenberg, Travis Breaux, Lorrie\u00a0Faith Cranor, Brian French, Amanda Grannis, James\u00a0T Graves, Fei Liu, Aleecia McDonald, Thomas\u00a0B Norton, Rohan Ramanath, Cameron Russell, Norman Sadeh, and Florian Schaub. 2015. Disagreeable privacy policies: Mismatches between meaning and users\u2019 understanding. Berkeley Technology Law Journal 30 (2015), 39.","journal-title":"Berkeley Technology Law Journal"},{"key":"e_1_3_2_1_105_1","first-page":"485","article-title":"Privacy harms and the effectiveness of the notice and choice framework","volume":"11","author":"Reidenberg R","year":"2015","unstructured":"Joel\u00a0 R Reidenberg , N\u00a0Cameron Russell , Alexander\u00a0 J Callen , Sophia Qasir , and Thomas\u00a0 B Norton . 2015 . Privacy harms and the effectiveness of the notice and choice framework . ISJLP 11 (2015), 485 . Joel\u00a0R Reidenberg, N\u00a0Cameron Russell, Alexander\u00a0J Callen, Sophia Qasir, and Thomas\u00a0B Norton. 2015. Privacy harms and the effectiveness of the notice and choice framework. ISJLP 11(2015), 485.","journal-title":"ISJLP"},{"key":"e_1_3_2_1_106_1","first-page":"1409","article-title":"Trustworthy Privacy Indicators: Grades, Labels, Certifications, and Dashboards","volume":"96","author":"Reidenberg R","year":"2018","unstructured":"Joel\u00a0 R Reidenberg , N\u00a0Cameron Russell , Vlad Herta , William Sierra-Rocafort , and Thomas\u00a0 B Norton . 2018 . Trustworthy Privacy Indicators: Grades, Labels, Certifications, and Dashboards . Washington University Law Review 96 (2018), 1409 . Joel\u00a0R Reidenberg, N\u00a0Cameron Russell, Vlad Herta, William Sierra-Rocafort, and Thomas\u00a0B Norton. 2018. Trustworthy Privacy Indicators: Grades, Labels, Certifications, and Dashboards. Washington University Law Review 96 (2018), 1409.","journal-title":"Washington University Law Review"},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.18"},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1368897"},{"key":"e_1_3_2_1_109_1","unstructured":"Jeffrey Rosen. 2012. The Right to Be Forgotten. Stanford Law Review 64(2012).  Jeffrey Rosen. 2012. The Right to Be Forgotten. Stanford Law Review 64(2012)."},{"key":"e_1_3_2_1_110_1","first-page":"181","article-title":"DaPIS: a Data Protection Icon Set to Improve Information Transparency under the GDPR. Knowledge of the Law in the Big Data Age","volume":"252","author":"Rossi Arianna","year":"2019","unstructured":"Arianna Rossi and Monica Palmirani . 2019 . DaPIS: a Data Protection Icon Set to Improve Information Transparency under the GDPR. Knowledge of the Law in the Big Data Age . Frontiers 252 (2019), 181 \u2013 195 . Arianna Rossi and Monica Palmirani. 2019. DaPIS: a Data Protection Icon Set to Improve Information Transparency under the GDPR. Knowledge of the Law in the Big Data Age. Frontiers 252 (2019), 181\u2013195.","journal-title":"Frontiers"},{"key":"e_1_3_2_1_111_1","first-page":"559","article-title":"Against Notice and Choice: The Manifest Failure of the Proceduralist Paradigm to Protect Privacy Online (or Anywhere Else)","volume":"66","author":"Rothchild A","year":"2018","unstructured":"John\u00a0 A Rothchild . 2018 . Against Notice and Choice: The Manifest Failure of the Proceduralist Paradigm to Protect Privacy Online (or Anywhere Else) . Cleveland State Law Review 66 , 3 (2018), 559 . John\u00a0A Rothchild. 2018. Against Notice and Choice: The Manifest Failure of the Proceduralist Paradigm to Protect Privacy Online (or Anywhere Else). Cleveland State Law Review 66, 3 (2018), 559.","journal-title":"Cleveland State Law Review"},{"key":"e_1_3_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329806"},{"key":"e_1_3_2_1_113_1","volume-title":"Designing effective privacy notices and controls","author":"Schaub Florian","year":"2017","unstructured":"Florian Schaub , Rebecca Balebako , and Lorrie\u00a0Faith Cranor . 2017. Designing effective privacy notices and controls . IEEE Internet Computing( 2017 ). Florian Schaub, Rebecca Balebako, and Lorrie\u00a0Faith Cranor. 2017. Designing effective privacy notices and controls. IEEE Internet Computing(2017)."},{"key":"e_1_3_2_1_114_1","volume-title":"Eleventh Symposium On Usable Privacy and Security ({SOUPS}","author":"Schaub Florian","year":"2015","unstructured":"Florian Schaub , Rebecca Balebako , Adam\u00a0 L Durity , and Lorrie\u00a0Faith Cranor . 2015 . A design space for effective privacy notices . In Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015). 1\u201317. Florian Schaub, Rebecca Balebako, Adam\u00a0L Durity, and Lorrie\u00a0Faith Cranor. 2015. A design space for effective privacy notices. In Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015). 1\u201317."},{"key":"e_1_3_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2015.5"},{"key":"e_1_3_2_1_116_1","volume-title":"Protecting Privacy in Video Surveillance","author":"Schiff Jeremy","unstructured":"Jeremy Schiff , Marci Meingast , Deirdre\u00a0 K Mulligan , Shankar Sastry , and Ken Goldberg . 2009. Respectful cameras: Detecting visual markers in real-time to address privacy concerns . In Protecting Privacy in Video Surveillance . Springer , 65\u201389. Jeremy Schiff, Marci Meingast, Deirdre\u00a0K Mulligan, Shankar Sastry, and Ken Goldberg. 2009. Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In Protecting Privacy in Video Surveillance. Springer, 65\u201389."},{"key":"e_1_3_2_1_117_1","first-page":"1607","article-title":"Privacy and Democracy in Cyberspace","volume":"52","author":"Schwartz M","year":"1999","unstructured":"Paul\u00a0 M Schwartz . 1999 . Privacy and Democracy in Cyberspace . Vanderbilt Law Review 52 , 6 (1999), 1607 . Paul\u00a0M Schwartz. 1999. Privacy and Democracy in Cyberspace. Vanderbilt Law Review 52, 6 (1999), 1607.","journal-title":"Vanderbilt Law Review"},{"key":"e_1_3_2_1_118_1","volume-title":"Notice & Choice. In The Second NPLAN\/BMSG Meeting on Digital Media and Marketing to Children.","author":"Schwartz M","year":"2009","unstructured":"Paul\u00a0 M Schwartz and Daniel Solove . 2009 . Notice & Choice. In The Second NPLAN\/BMSG Meeting on Digital Media and Marketing to Children. Paul\u00a0M Schwartz and Daniel Solove. 2009. Notice & Choice. In The Second NPLAN\/BMSG Meeting on Digital Media and Marketing to Children."},{"key":"e_1_3_2_1_119_1","volume-title":"Computers, and the Rights of Citizens: Report","author":"Secretary\u2019s Advisory Committee on Automated Personal Data Systems. 1973. Records","unstructured":"Secretary\u2019s Advisory Committee on Automated Personal Data Systems. 1973. Records , Computers, and the Rights of Citizens: Report . US Department of Health , Education & Welfare. Secretary\u2019s Advisory Committee on Automated Personal Data Systems. 1973. Records, Computers, and the Rights of Citizens: Report. US Department of Health, Education & Welfare."},{"key":"e_1_3_2_1_120_1","first-page":"370","article-title":"Beyond notice and choice: Privacy, norms, and consent","volume":"14","author":"Sloan H","year":"2014","unstructured":"Robert\u00a0 H Sloan and Richard Warner . 2014 . Beyond notice and choice: Privacy, norms, and consent . The Journal of High Technology Law 14 (2014), 370 . Robert\u00a0H Sloan and Richard Warner. 2014. Beyond notice and choice: Privacy, norms, and consent. The Journal of High Technology Law 14 (2014), 370.","journal-title":"The Journal of High Technology Law"},{"key":"e_1_3_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0011"},{"key":"e_1_3_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2006.118"},{"key":"e_1_3_2_1_123_1","volume-title":"How many smartphones are in the world?Retrieved September 10th","author":"Turner Ash","year":"2020","unstructured":"Ash Turner . 2020. How many smartphones are in the world?Retrieved September 10th , 2020 from https:\/\/www.bankmycell.com\/blog\/how-many-phones-are-in-the-world Ash Turner. 2020. How many smartphones are in the world?Retrieved September 10th, 2020 from https:\/\/www.bankmycell.com\/blog\/how-many-phones-are-in-the-world"},{"key":"e_1_3_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335362"},{"key":"e_1_3_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354212"},{"key":"e_1_3_2_1_126_1","article-title":"Privacy, notice, and design","volume":"21","author":"Waldman Ari\u00a0Ezra","year":"2018","unstructured":"Ari\u00a0Ezra Waldman . 2018 . Privacy, notice, and design . Stanford Technology Law Review 21 , 1 (2018). Ari\u00a0Ezra Waldman. 2018. Privacy, notice, and design. Stanford Technology Law Review 21, 1 (2018).","journal-title":"Stanford Technology Law Review"},{"key":"e_1_3_2_1_127_1","volume-title":"Cognitive biases, dark patterns, and the \u2018privacy paradox\u2019. Current opinion in psychology 31","author":"Waldman Ari\u00a0Ezra","year":"2020","unstructured":"Ari\u00a0Ezra Waldman . 2020. Cognitive biases, dark patterns, and the \u2018privacy paradox\u2019. Current opinion in psychology 31 ( 2020 ), 105\u2013109. Ari\u00a0Ezra Waldman. 2020. Cognitive biases, dark patterns, and the \u2018privacy paradox\u2019. Current opinion in psychology 31 (2020), 105\u2013109."},{"key":"e_1_3_2_1_128_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3209659","article-title":"Enabling live video analytics with a scalable and privacy-aware framework","volume":"14","author":"Wang Junjue","year":"2018","unstructured":"Junjue Wang , Brandon Amos , Anupam Das , Padmanabhan Pillai , Norman Sadeh , and Mahadev Satyanarayanan . 2018 . Enabling live video analytics with a scalable and privacy-aware framework . ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 14 , 3s (2018), 1 \u2013 24 . Junjue Wang, Brandon Amos, Anupam Das, Padmanabhan Pillai, Norman Sadeh, and Mahadev Satyanarayanan. 2018. Enabling live video analytics with a scalable and privacy-aware framework. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 14, 3s (2018), 1\u201324.","journal-title":"ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM)"},{"key":"e_1_3_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1145\/2811257"},{"key":"e_1_3_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1145\/159544.159617"},{"key":"e_1_3_2_1_131_1","volume-title":"Retrieved September 12th, 2020","author":"Whittaker Zack","year":"2019","unstructured":"Zack Whittaker . 2019 . iOS 13 will let you limit app location access to \u201djust once \u201d. Retrieved September 12th, 2020 from https:\/\/techcrunch.com\/2019\/06\/03\/apple-ios-13-location-privacy\/ Zack Whittaker. 2019. iOS 13 will let you limit app location access to \u201djust once\u201d. Retrieved September 12th, 2020 from https:\/\/techcrunch.com\/2019\/06\/03\/apple-ios-13-location-privacy\/"},{"key":"e_1_3_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0003-6870(02)00009-1"},{"key":"e_1_3_2_1_133_1","volume-title":"A value sensitive design investigation of privacy enhancing tools in web browsers. Decision support systems 54, 1","author":"Xu Heng","year":"2012","unstructured":"Heng Xu , Robert\u00a0 E Crossler , and France B\u00e9Langer . 2012. A value sensitive design investigation of privacy enhancing tools in web browsers. Decision support systems 54, 1 ( 2012 ), 424\u2013433. Heng Xu, Robert\u00a0E Crossler, and France B\u00e9Langer. 2012. A value sensitive design investigation of privacy enhancing tools in web browsers. Decision support systems 54, 1 (2012), 424\u2013433."},{"key":"e_1_3_2_1_134_1","volume-title":"Retrieved September 15th, 2020","author":"Yueh Jedidiah","year":"2018","unstructured":"Jedidiah Yueh . 2018 . GDPR will make big tech even bigger . Retrieved September 15th, 2020 from https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2018\/06\/26\/gdpr-will-make-big-tech-even-bigger\/#77a24cf82592 Jedidiah Yueh. 2018. GDPR will make big tech even bigger. Retrieved September 15th, 2020 from https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2018\/06\/26\/gdpr-will-make-big-tech-even-bigger\/#77a24cf82592"}],"event":{"name":"CHI '21: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '21","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445148","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445148","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445148","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:42Z","timestamp":1750195722000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445148"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,6]]},"references-count":133,"alternative-id":["10.1145\/3411764.3445148","10.1145\/3411764"],"URL":"https:\/\/doi.org\/10.1145\/3411764.3445148","relation":{},"subject":[],"published":{"date-parts":[[2021,5,6]]},"assertion":[{"value":"2021-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}