{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:22:21Z","timestamp":1776122541913,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":121,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T00:00:00Z","timestamp":1620259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Innovators Network Foundation"},{"name":"Defense Advanced Research Projects Agency and Air Force Research Laboratory","award":["FA8750-15-2-027"],"award-info":[{"award-number":["FA8750-15-2-027"]}]},{"DOI":"10.13039\/100000308","name":"Carnegie Corporation of New York","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000308","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NortonLifeLock"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1330596, CNS-180131, CNS-191448"],"award-info":[{"award-number":["CNS-1330596, CNS-180131, CNS-191448"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,6]]},"DOI":"10.1145\/3411764.3445387","type":"proceedings-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T04:26:17Z","timestamp":1620447977000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":65,"title":["Toggles, Dollar Signs, and Triangles: How to (In)Effectively Convey Privacy Choices with Icons and Link Texts"],"prefix":"10.1145","author":[{"given":"Hana","family":"Habib","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, United States"}]},{"given":"Yixin","family":"Zou","sequence":"additional","affiliation":[{"name":"School of Information University of Michigan, United States"}]},{"given":"Yaxing","family":"Yao","sequence":"additional","affiliation":[{"name":"School of Computer Science Carnegie Mellon University, United States"}]},{"given":"Alessandro","family":"Acquisti","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, United States"}]},{"given":"Lorrie","family":"Cranor","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, United States"}]},{"given":"Joel","family":"Reidenberg","sequence":"additional","affiliation":[{"name":"Fordham University, United States"}]},{"given":"Norman","family":"Sadeh","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, United States"}]},{"given":"Florian","family":"Schaub","sequence":"additional","affiliation":[{"name":"School of Information University of Michigan, United States"}]}],"member":"320","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.2000.0441"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1281243"},{"key":"e_1_3_2_2_3_1","unstructured":"Apple Inc.2021. App privacy details on the App Store. https:\/\/developer.apple.com\/app-store\/app-privacy-details\/.  Apple Inc.2021. App privacy details on the App Store. https:\/\/developer.apple.com\/app-store\/app-privacy-details\/."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1111\/opo.12131"},{"key":"e_1_3_2_2_5_1","unstructured":"Babich Nick. 2016. UX Design: Checkbox and Toggle in Forms. https:\/\/uxplanet.org\/checkbox-and-toggle-in-forms-f0de6086ac41.  Babich Nick. 2016. UX Design: Checkbox and Toggle in Forms. https:\/\/uxplanet.org\/checkbox-and-toggle-in-forms-f0de6086ac41."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23039"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380262"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0066"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293461"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1093\/pan"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2016.20"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3404983.3405518"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1037\/14805-009"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_20"},{"key":"e_1_3_2_2_15_1","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen Jacob","unstructured":"Jacob Cohen . 2013. Statistical Power Analysis for the Behavioral Sciences . Academic press . Jacob Cohen. 2013. Statistical Power Analysis for the Behavioral Sciences. Academic press."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376389"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1300\/J079v16n01_09"},{"key":"e_1_3_2_2_18_1","first-page":"273","article-title":"Necessary But Not Sufficient: Standardized Mechanisms for Privacy Notice and Choice","volume":"10","author":"Cranor Lorrie\u00a0Faith","year":"2012","unstructured":"Lorrie\u00a0Faith Cranor . 2012 . Necessary But Not Sufficient: Standardized Mechanisms for Privacy Notice and Choice . Journal on on Telecomm. & High Tech. Law 10 (2012), 273 . Lorrie\u00a0Faith Cranor. 2012. Necessary But Not Sufficient: Standardized Mechanisms for Privacy Notice and Choice. Journal on on Telecomm. & High Tech. Law 10 (2012), 273.","journal-title":"Journal on on Telecomm. & High Tech. Law"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367733"},{"key":"e_1_3_2_2_21_1","unstructured":"Wendy Davis. 2016. Ad Industry Launches Campaign Promoting AdChoices Icon. https:\/\/www.mediapost.com\/publications\/article\/270904\/ad-industry-launches-campaign-promoting-adchoices.html.  Wendy Davis. 2016. Ad Industry Launches Campaign Promoting AdChoices Icon. https:\/\/www.mediapost.com\/publications\/article\/270904\/ad-industry-launches-campaign-promoting-adchoices.html."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23378"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376165"},{"key":"e_1_3_2_2_24_1","unstructured":"Digital Advertising Alliance. 2009. Self-Regulatory Principles for Online Behavioral Advertising. http:\/\/digitaladvertisingalliance.org\/principles.  Digital Advertising Alliance. 2009. Self-Regulatory Principles for Online Behavioral Advertising. http:\/\/digitaladvertisingalliance.org\/principles."},{"key":"e_1_3_2_2_25_1","unstructured":"Digital Advertising Alliance. 2012. Campaign Informs Consumers About Interest-Based Advertising And Encourages Them to Take Control of Their Online Privacy. https:\/\/digitaladvertisingalliance.org\/press-release\/digital-advertising-alliance-daa-announces-%E2%80%98your-adchoices%E2%80%99-consumer-education.  Digital Advertising Alliance. 2012. Campaign Informs Consumers About Interest-Based Advertising And Encourages Them to Take Control of Their Online Privacy. https:\/\/digitaladvertisingalliance.org\/press-release\/digital-advertising-alliance-daa-announces-%E2%80%98your-adchoices%E2%80%99-consumer-education."},{"key":"e_1_3_2_2_26_1","unstructured":"Digital Advertising Alliance. 2020. DAA Participating Companies & Organizations. https:\/\/youradchoices.com\/participating.  Digital Advertising Alliance. 2020. DAA Participating Companies & Organizations. https:\/\/youradchoices.com\/participating."},{"key":"e_1_3_2_2_27_1","unstructured":"Disconnect Inc.2014. Disconnect Privacy Icons. https:\/\/github.com\/disconnectme\/privacy-icons.  Disconnect Inc.2014. Disconnect Privacy Icons. https:\/\/github.com\/disconnectme\/privacy-icons."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702251"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518752"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/sp40000.2020.00043"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46963-8_4"},{"key":"e_1_3_2_2_33_1","unstructured":"European Parliament. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679.  European Parliament. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106426.3106427"},{"key":"e_1_3_2_2_35_1","unstructured":"Federal Trade Commission. 2009. CAN-SPAM Act: A Compliance Guide for Business. https:\/\/www.ftc.gov\/tips-advice\/business-center\/guidance\/can-spam-act-compliance-guide-business.  Federal Trade Commission. 2009. CAN-SPAM Act: A Compliance Guide for Business. https:\/\/www.ftc.gov\/tips-advice\/business-center\/guidance\/can-spam-act-compliance-guide-business."},{"key":"e_1_3_2_2_36_1","unstructured":"Federal Trade Commission. 2017. Children\u2019s Online Privacy Protection Rule: A Six-Step Compliance Plan for Your Business. https:\/\/www.ftc.gov\/tips-advice\/business-center\/guidance\/childrens-online-privacy-protection-rule-six-step-compliance.  Federal Trade Commission. 2017. Children\u2019s Online Privacy Protection Rule: A Six-Step Compliance Plan for Your Business. https:\/\/www.ftc.gov\/tips-advice\/business-center\/guidance\/childrens-online-privacy-protection-rule-six-step-compliance."},{"key":"e_1_3_2_2_37_1","volume-title":"Rethinking Connection Security Indicators. In Symposium on Usable Privacy and Security (SOUPS). USENIX, 1\u201314","author":"Felt Adrienne\u00a0Porter","year":"2016","unstructured":"Adrienne\u00a0Porter Felt , Robert\u00a0 W Reeder , Alex Ainslie , Helen Harris , Max Walker , Christopher Thompson , Mustafa\u00a0Embre Acer , Elisabeth Morant , and Sunny Consolvo . 2016 . Rethinking Connection Security Indicators. In Symposium on Usable Privacy and Security (SOUPS). USENIX, 1\u201314 . https:\/\/www.usenix.org\/system\/files\/conference\/soups2016\/soups2016-paper-porter-felt.pdf. Adrienne\u00a0Porter Felt, Robert\u00a0W Reeder, Alex Ainslie, Helen Harris, Max Walker, Christopher Thompson, Mustafa\u00a0Embre Acer, Elisabeth Morant, and Sunny Consolvo. 2016. Rethinking Connection Security Indicators. In Symposium on Usable Privacy and Security (SOUPS). USENIX, 1\u201314. https:\/\/www.usenix.org\/system\/files\/conference\/soups2016\/soups2016-paper-porter-felt.pdf."},{"key":"e_1_3_2_2_38_1","unstructured":"Simone Fischer-H\u00fcbner Erik W\u00e4stlund and Harald Zwingelberg. 2010. UI Prototypes: Policy Administration and Presentation\u2013Version 1. (2010). http:\/\/primelife.ercim.eu\/images\/stories\/deliverables\/d4.3.1-ui_prototypes-policy_administration_and_presentation_v1.pdf.  Simone Fischer-H\u00fcbner Erik W\u00e4stlund and Harald Zwingelberg. 2010. UI Prototypes: Policy Administration and Presentation\u2013Version 1. (2010). http:\/\/primelife.ercim.eu\/images\/stories\/deliverables\/d4.3.1-ui_prototypes-policy_administration_and_presentation_v1.pdf."},{"key":"e_1_3_2_2_39_1","unstructured":"Kim Flaherty. 2018. Top 10 Design Mistakes in the Unsubscribe Experience. https:\/\/www.nngroup.com\/articles\/unsubscribe-mistakes\/.  Kim Flaherty. 2018. Top 10 Design Mistakes in the Unsubscribe Experience. https:\/\/www.nngroup.com\/articles\/unsubscribe-mistakes\/."},{"key":"e_1_3_2_2_40_1","volume-title":"Statistical Methods for Rates and Proportions","author":"Fleiss L","unstructured":"Joseph\u00a0 L Fleiss , Bruce Levin , and Myunghee\u00a0Cho Paik . 2013. Statistical Methods for Rates and Proportions . John Wiley & Sons . Joseph\u00a0L Fleiss, Bruce Levin, and Myunghee\u00a0Cho Paik. 2013. Statistical Methods for Rates and Proportions. John Wiley & Sons."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/506443.506577"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.24251\/hicss.2018.476"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2012.01226.x"},{"key":"e_1_3_2_2_44_1","volume-title":"Ghostery: Online Privacy Made Easy. https:\/\/www.ghostery.com.","year":"2017","unstructured":"Ghostery. 2017 . Ghostery: Online Privacy Made Easy. https:\/\/www.ghostery.com. Ghostery. 2017. Ghostery: Online Privacy Made Easy. https:\/\/www.ghostery.com."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143137"},{"key":"e_1_3_2_2_46_1","unstructured":"Global Privacy Enforcement Network. 2017. User Controls Over Personal information. http:\/\/www.astrid-online.it\/static\/upload\/2017\/2017-gpen-sweep---international-report1.pdf.  Global Privacy Enforcement Network. 2017. User Controls Over Personal information. http:\/\/www.astrid-online.it\/static\/upload\/2017\/2017-gpen-sweep---international-report1.pdf."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376511"},{"key":"e_1_3_2_2_48_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS). USENIX, 387\u2013406","author":"Habib Hana","year":"2019","unstructured":"Hana Habib , Yixin Zou , Aditi Jannu , Neha Sridhar , Chelse Swoopes , Alessandro Acquisti , Lorrie\u00a0Faith Cranor , Norman Sadeh , and Florian Schaub . 2019 . An Empirical Analysis of Data Deletion and Opt-out Choices on 150 Websites . In Symposium on Usable Privacy and Security (SOUPS). USENIX, 387\u2013406 . https:\/\/www.usenix.org\/system\/files\/soups2019-habib.pdf. Hana Habib, Yixin Zou, Aditi Jannu, Neha Sridhar, Chelse Swoopes, Alessandro Acquisti, Lorrie\u00a0Faith Cranor, Norman Sadeh, and Florian Schaub. 2019. An Empirical Analysis of Data Deletion and Opt-out Choices on 150 Websites. In Symposium on Usable Privacy and Security (SOUPS). USENIX, 387\u2013406. https:\/\/www.usenix.org\/system\/files\/soups2019-habib.pdf."},{"key":"e_1_3_2_2_49_1","volume-title":"Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. In USENIX Security Symposium. 531\u2013548","author":"Harkous Hamza","year":"2018","unstructured":"Hamza Harkous , Kassem Fawaz , R\u00e9mi Lebret , Florian Schaub , Kang\u00a0 G. Shin , and Karl Aberer . 2018 . Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. In USENIX Security Symposium. 531\u2013548 . https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity18\/sec18-harkous.pdf Hamza Harkous, Kassem Fawaz, R\u00e9mi Lebret, Florian Schaub, Kang\u00a0G. Shin, and Karl Aberer. 2018. Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. In USENIX Security Symposium. 531\u2013548. https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity18\/sec18-harkous.pdf"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20769-3_27"},{"key":"e_1_3_2_2_51_1","volume-title":"The Icon Book: Visual Symbols for Computer Systems and Documentation","author":"Horton K","unstructured":"William\u00a0 K Horton . 1994. The Icon Book: Visual Symbols for Computer Systems and Documentation . John Wiley & Sons, Inc. William\u00a0K Horton. 1994. The Icon Book: Visual Symbols for Computer Systems and Documentation. John Wiley & Sons, Inc."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053168015604648"},{"key":"e_1_3_2_2_53_1","unstructured":"IAB Europe. 2011. IAB EU Framework for Online Behavioural Advertising. https:\/\/www.edaa.eu\/wp-content\/uploads\/2012\/10\/2013-11-11-IAB-Europe-OBA-Framework_.pdf.  IAB Europe. 2011. IAB EU Framework for Online Behavioural Advertising. https:\/\/www.edaa.eu\/wp-content\/uploads\/2012\/10\/2013-11-11-IAB-Europe-OBA-Framework_.pdf."},{"key":"e_1_3_2_2_54_1","unstructured":"IAB Europe. 2019. GDPR Transparency and Consent Framework. https:\/\/iabtechlab.com\/standards\/gdpr-transparency-and-consent-framework\/.  IAB Europe. 2019. GDPR Transparency and Consent Framework. https:\/\/iabtechlab.com\/standards\/gdpr-transparency-and-consent-framework\/."},{"key":"e_1_3_2_2_55_1","volume-title":"Privacy Awareness: Icons and Expression for Social Networks. In International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods. Article 1, 15\u00a0pages","author":"Iannella Renato","year":"2010","unstructured":"Renato Iannella and Adam Finden . 2010 . Privacy Awareness: Icons and Expression for Social Networks. In International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods. Article 1, 15\u00a0pages . http:\/\/virtualgoods.org\/2010\/VirtualGoodsBook2010_13.pdf. Renato Iannella and Adam Finden. 2010. Privacy Awareness: Icons and Expression for Social Networks. In International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods. Article 1, 15\u00a0pages. http:\/\/virtualgoods.org\/2010\/VirtualGoodsBook2010_13.pdf."},{"key":"e_1_3_2_2_56_1","unstructured":"Information Commissioner\u2019s Office. 2019. Guide to the General Data Protection Regulation (GDPR). https:\/\/ico.org.uk\/for-organisations\/guide-to-data-protection\/guide-to-the-general-data-protection-regulation-gdpr\/.  Information Commissioner\u2019s Office. 2019. Guide to the General Data Protection Regulation (GDPR). https:\/\/ico.org.uk\/for-organisations\/guide-to-data-protection\/guide-to-the-general-data-protection-regulation-gdpr\/."},{"key":"e_1_3_2_2_57_1","unstructured":"Information Commissioner\u2019s Office. 2019. What is valid consent?https:\/\/ico.org.uk\/for-organisations\/guide-to-data-protection\/guide-to-the-general-data-protection-regulation-gdpr\/consent\/what-is-valid-consent\/.  Information Commissioner\u2019s Office. 2019. What is valid consent?https:\/\/ico.org.uk\/for-organisations\/guide-to-data-protection\/guide-to-the-general-data-protection-regulation-gdpr\/consent\/what-is-valid-consent\/."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1518\/001872007X200102"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985752"},{"key":"e_1_3_2_2_60_1","unstructured":"Penny Jones and Jerry Powell. 1999. Gary Anderson Has Been Found!Resource Recycling 18(1999) 25\u201327. https:\/\/discardstudies.com\/wp-content\/uploads\/2012\/07\/garyandersonfound.pdf.  Penny Jones and Jerry Powell. 1999. Gary Anderson Has Been Found!Resource Recycling 18(1999) 25\u201327. https:\/\/discardstudies.com\/wp-content\/uploads\/2012\/07\/garyandersonfound.pdf."},{"key":"e_1_3_2_2_61_1","volume-title":"Terms of Service","author":"Jong Michiel\u00a0de","unstructured":"Michiel\u00a0de Jong , Jan-Christoph Borchardt , Hugo Roy , Ian McGowan , Jimm Stout , Suzanne Azmayesh , Christopher Talib , Vincent Tunru , Madeline O\u2019Leary , and Evan Mullen . 2020. Terms of Service ; Didn\u2019t Read . https:\/\/tosdr.org\/en\/frontpage. Michiel\u00a0de Jong, Jan-Christoph Borchardt, Hugo Roy, Ian McGowan, Jimm Stout, Suzanne Azmayesh, Christopher Talib, Vincent Tunru, Madeline O\u2019Leary, and Evan Mullen. 2020. Terms of Service; Didn\u2019t Read. https:\/\/tosdr.org\/en\/frontpage."},{"key":"e_1_3_2_2_62_1","volume-title":"Proceedings of the Annual Meeting of the Cognitive Science Society, Vol.\u00a032","author":"Karanam Saraschandra","year":"2010","unstructured":"Saraschandra Karanam , Janhavi Viswanathan , Anand Theertha , Bipin Indurkhya , and Herre Van\u00a0Oostendorp . 2010 . Impact of Placing Icons Next to Hyperlinks on Information-Retrieval Tasks on the Web . In Proceedings of the Annual Meeting of the Cognitive Science Society, Vol.\u00a032 . eScholarship, 2834\u20132839. https:\/\/escholarship.org\/content\/qt27w0n9kc\/qt27w0n9kc.pdf. Saraschandra Karanam, Janhavi Viswanathan, Anand Theertha, Bipin Indurkhya, and Herre Van\u00a0Oostendorp. 2010. Impact of Placing Icons Next to Hyperlinks on Information-Retrieval Tasks on the Web. In Proceedings of the Annual Meeting of the Cognitive Science Society, Vol.\u00a032. eScholarship, 2834\u20132839. https:\/\/escholarship.org\/content\/qt27w0n9kc\/qt27w0n9kc.pdf."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753561"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466466"},{"key":"e_1_3_2_2_66_1","volume-title":"CCPA Comments","author":"King Jennifer","year":"2020","unstructured":"Jennifer King . 2020. CCPA Comments , Round Two : The Battle of the Do-Not-Sell Button . https:\/\/cyberlaw.stanford.edu\/blog\/ 2020 \/02\/ccpa-comments-round-two-battle-do-not-sell-button. Jennifer King. 2020. CCPA Comments, Round Two: The Battle of the Do-Not-Sell Button. https:\/\/cyberlaw.stanford.edu\/blog\/2020\/02\/ccpa-comments-round-two-battle-do-not-sell-button."},{"key":"e_1_3_2_2_67_1","first-page":"603","article-title":"AdChoices? Compliance with Online Behavioral Advertising Notice and Choice Requirements","volume":"7","author":"Komanduri Saranga","year":"2011","unstructured":"Saranga Komanduri , Richard Shay , Greg Norcie , and Blase Ur . 2011 . AdChoices? Compliance with Online Behavioral Advertising Notice and Choice Requirements . ISJLP 7 (2011), 603 . Saranga Komanduri, Richard Shay, Greg Norcie, and Blase Ur. 2011. AdChoices? Compliance with Online Behavioral Advertising Notice and Choice Requirements. ISJLP 7(2011), 603.","journal-title":"ISJLP"},{"key":"e_1_3_2_2_68_1","volume-title":"Too Much Choice: End-user Privacy Decisions in the Context of Choice Proliferation. In Symposium On Usable Privacy and Security (SOUPS). USENIX, 69\u201387","author":"Korff Stefan","year":"2014","unstructured":"Stefan Korff and Rainer B\u00f6hme . 2014 . Too Much Choice: End-user Privacy Decisions in the Context of Choice Proliferation. In Symposium On Usable Privacy and Security (SOUPS). USENIX, 69\u201387 . https:\/\/www.usenix.org\/system\/files\/soups14-paper-korff.pdf. Stefan Korff and Rainer B\u00f6hme. 2014. Too Much Choice: End-user Privacy Decisions in the Context of Choice Proliferation. In Symposium On Usable Privacy and Security (SOUPS). USENIX, 69\u201387. https:\/\/www.usenix.org\/system\/files\/soups14-paper-korff.pdf."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1177\/0273475319828788"},{"key":"e_1_3_2_2_70_1","unstructured":"Jonathan Lazar Jinjuan\u00a0Heidi Feng and Harry Hochheiser. 2017. Research Methods in Human-Computer Interaction. Morgan Kaufmann.  Jonathan Lazar Jinjuan\u00a0Heidi Feng and Harry Hochheiser. 2017. Research Methods in Human-Computer Interaction. Morgan Kaufmann."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381970"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979244"},{"key":"e_1_3_2_2_73_1","volume-title":"Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. In Symposium on Usable Privacy and Security (SOUPS). USENIX, 27\u201341","author":"Liu Bin","year":"2016","unstructured":"Bin Liu , Mads\u00a0Schaarup Andersen , Florian Schaub , Hazim Almuhimedi , Shikun\u00a0Aerin Zhang , Norman Sadeh , Yuvraj Agarwal , and Alessandro Acquisti . 2016 . Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. In Symposium on Usable Privacy and Security (SOUPS). USENIX, 27\u201341 . https:\/\/www.usenix.org\/system\/files\/conference\/soups2016\/soups2016-paper-liu.pdf. Bin Liu, Mads\u00a0Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun\u00a0Aerin Zhang, Norman Sadeh, Yuvraj Agarwal, and Alessandro Acquisti. 2016. Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. In Symposium on Usable Privacy and Security (SOUPS). USENIX, 27\u201341. https:\/\/www.usenix.org\/system\/files\/conference\/soups2016\/soups2016-paper-liu.pdf."},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0037"},{"key":"e_1_3_2_2_76_1","volume-title":"Drawing, Communicating","author":"Massironi Manfredo","unstructured":"Manfredo Massironi . 2001. The Psychology of Graphic Images: Seeing , Drawing, Communicating . Psychology Press . Manfredo Massironi. 2001. The Psychology of Graphic Images: Seeing, Drawing, Communicating. Psychology Press."},{"key":"e_1_3_2_2_77_1","first-page":"543","article-title":"The Cost of Reading Privacy Policies","volume":"4","author":"McDonald M","year":"2008","unstructured":"Aleecia\u00a0 M McDonald and Lorrie\u00a0Faith Cranor . 2008 . The Cost of Reading Privacy Policies . I\/S: A Journal of Law and Policy for the Information Society 4 (2008), 543 . Aleecia\u00a0M McDonald and Lorrie\u00a0Faith Cranor. 2008. The Cost of Reading Privacy Policies. I\/S: A Journal of Law and Policy for the Information Society 4 (2008), 543.","journal-title":"I\/S: A Journal of Law and Policy for the Information Society"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866929"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_3"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1002\/dir.20009"},{"key":"e_1_3_2_2_81_1","unstructured":"Mozilla. 2020. Privacy Icons. https:\/\/wiki.mozilla.org\/Privacy_Icons.  Mozilla. 2020. Privacy Icons. https:\/\/wiki.mozilla.org\/Privacy_Icons."},{"key":"e_1_3_2_2_82_1","unstructured":"Network Advertising Initiative. 2018. NAI Code of Conduct. https:\/\/www.networkadvertising.org\/sites\/default\/files\/nai_code2018.pdf.  Network Advertising Initiative. 2018. NAI Code of Conduct. https:\/\/www.networkadvertising.org\/sites\/default\/files\/nai_code2018.pdf."},{"key":"e_1_3_2_2_83_1","unstructured":"Don Norman. 2013. The Design of Everyday Things. Basic books.  Don Norman. 2013. The Design of Everyday Things. Basic books."},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376321"},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0029"},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1486870"},{"key":"e_1_3_2_2_87_1","unstructured":"Sean O\u2019Connor Ryan Nurwono and Eleanor Birrell. 2020. (Un)clear and (In)conspicuous: The right to opt-out of sale under CCPA. arXiv preprint:2009.07884(2020).  Sean O\u2019Connor Ryan Nurwono and Eleanor Birrell. 2020. (Un)clear and (In)conspicuous: The right to opt-out of sale under CCPA. arXiv preprint:2009.07884(2020)."},{"key":"e_1_3_2_2_88_1","unstructured":"Office of the California Attorney General. 2019. California Consumer Privacy Act (CCPA): Proposed Text of Regulations. https:\/\/www.oag.ca.gov\/sites\/all\/files\/agweb\/pdfs\/privacy\/ccpa-proposed-regs.pdf.  Office of the California Attorney General. 2019. California Consumer Privacy Act (CCPA): Proposed Text of Regulations. https:\/\/www.oag.ca.gov\/sites\/all\/files\/agweb\/pdfs\/privacy\/ccpa-proposed-regs.pdf."},{"key":"e_1_3_2_2_89_1","volume-title":"The California Privacy Rights and Enforcement Act of","author":"California Attorney General Office","year":"2020","unstructured":"Office of the California Attorney General . 2019. The California Privacy Rights and Enforcement Act of 2020 . https:\/\/oag.ca.gov\/system\/files\/initiatives\/pdfs\/19-0017%20%28Consumer%20Privacy%20%29.pdf. Office of the California Attorney General. 2019. The California Privacy Rights and Enforcement Act of 2020. https:\/\/oag.ca.gov\/system\/files\/initiatives\/pdfs\/19-0017%20%28Consumer%20Privacy%20%29.pdf."},{"key":"e_1_3_2_2_90_1","unstructured":"Office of the California Attorney General. 2020. California Consumer Privacy Act (CCPA): Final Text of Proposed Regulations. https:\/\/oag.ca.gov\/sites\/all\/files\/agweb\/pdfs\/privacy\/oal-sub-final-text-of-regs.pdf.  Office of the California Attorney General. 2020. California Consumer Privacy Act (CCPA): Final Text of Proposed Regulations. https:\/\/oag.ca.gov\/sites\/all\/files\/agweb\/pdfs\/privacy\/oal-sub-final-text-of-regs.pdf."},{"key":"e_1_3_2_2_91_1","unstructured":"Office of the California Attorney General. 2020. California Consumer Privacy Act (CCPA): First Set of Modified Regulations. https:\/\/oag.ca.gov\/sites\/all\/files\/agweb\/pdfs\/privacy\/ccpa-text-of-mod-clean-020720.pdf.  Office of the California Attorney General. 2020. California Consumer Privacy Act (CCPA): First Set of Modified Regulations. https:\/\/oag.ca.gov\/sites\/all\/files\/agweb\/pdfs\/privacy\/ccpa-text-of-mod-clean-020720.pdf."},{"key":"e_1_3_2_2_92_1","unstructured":"Office of the California Attorney General. 2020. California Consumer Privacy Act (CCPA): Fourth Set of Modified Regulations. https:\/\/oag.ca.gov\/sites\/all\/files\/agweb\/pdfs\/privacy\/ccpa-prop-mods-text-of-regs-4th.pdf.  Office of the California Attorney General. 2020. California Consumer Privacy Act (CCPA): Fourth Set of Modified Regulations. https:\/\/oag.ca.gov\/sites\/all\/files\/agweb\/pdfs\/privacy\/ccpa-prop-mods-text-of-regs-4th.pdf."},{"key":"e_1_3_2_2_93_1","unstructured":"Office of the California Attorney General. 2021. California Consumer Privacy Act (CCPA) Current Rulemaking Activities. https:\/\/oag.ca.gov\/privacy\/ccpa\/regs.  Office of the California Attorney General. 2021. California Consumer Privacy Act (CCPA) Current Rulemaking Activities. https:\/\/oag.ca.gov\/privacy\/ccpa\/regs."},{"key":"e_1_3_2_2_94_1","unstructured":"Online Trust Alliance. 2018. Email Marketing & Unsubscribe Audit. https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/04\/2018-email-unsubscribe-report.pdf.  Online Trust Alliance. 2018. Email Marketing & Unsubscribe Audit. https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/04\/2018-email-unsubscribe-report.pdf."},{"key":"e_1_3_2_2_95_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20898-5_33"},{"key":"e_1_3_2_2_96_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0895-4356(96)00236-3"},{"key":"e_1_3_2_2_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702164"},{"key":"e_1_3_2_2_98_1","unstructured":"PrivacyGrade.org. 2020. PrivacyGrade.org. http:\/\/privacygrade.org\/home.  PrivacyGrade.org. 2020. PrivacyGrade.org. http:\/\/privacygrade.org\/home."},{"key":"e_1_3_2_2_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00014"},{"key":"e_1_3_2_2_100_1","doi-asserted-by":"publisher","DOI":"10.15779\/Z384K33"},{"key":"e_1_3_2_2_101_1","volume-title":"Labels, Certifications, and Dashboards","author":"Reidenberg R","year":"2018","unstructured":"Joel\u00a0 R Reidenberg , N\u00a0Cameron Russell , Vlad Herta , William Sierra-Rocafort , and Thomas\u00a0 B Norton . 2018. Trustworthy Privacy Indicators: Grades , Labels, Certifications, and Dashboards . Washington University Law Review 96, Article 1409( 2018 ). Joel\u00a0R Reidenberg, N\u00a0Cameron Russell, Vlad Herta, William Sierra-Rocafort, and Thomas\u00a0B Norton. 2018. Trustworthy Privacy Indicators: Grades, Labels, Certifications, and Dashboards. Washington University Law Review 96, Article 1409(2018)."},{"key":"e_1_3_2_2_102_1","first-page":"181","article-title":"DaPIS: a Data Protection Icon Set to Improve Information Transparency under the GDPR","volume":"252","author":"Rossi Arianna","year":"2019","unstructured":"Arianna Rossi and Monica Palmirani . 2019 . DaPIS: a Data Protection Icon Set to Improve Information Transparency under the GDPR . Knowledge of the Law in the Big Data Age 252 (2019), 181 \u2013 195 . Arianna Rossi and Monica Palmirani. 2019. DaPIS: a Data Protection Icon Set to Improve Information Transparency under the GDPR. Knowledge of the Law in the Big Data Age 252 (2019), 181\u2013195.","journal-title":"Knowledge of the Law in the Big Data Age"},{"key":"e_1_3_2_2_103_1","doi-asserted-by":"publisher","DOI":"10.3758\/s13423-016-1026-5"},{"key":"e_1_3_2_2_104_1","volume-title":"The Coding Manual for Qualitative Researchers","author":"Salda\u00f1a Johnny","unstructured":"Johnny Salda\u00f1a . 2015. The Coding Manual for Qualitative Researchers . Sage . Johnny Salda\u00f1a. 2015. The Coding Manual for Qualitative Researchers. Sage."},{"key":"e_1_3_2_2_105_1","volume-title":"Symposium On Usable Privacy and Security (SOUPS). USENIX, Article 1, 17\u00a0pages. https:\/\/www.usenix.org\/system\/files\/conference\/soups2015\/soups15-paper-schaub.pdf.","author":"Schaub Florian","year":"2015","unstructured":"Florian Schaub , Rebecca Balebako , Adam\u00a0 L. Durity , and Lorrie\u00a0Faith Cranor . 2015 . A Design Space for Effective Privacy Notices . In Symposium On Usable Privacy and Security (SOUPS). USENIX, Article 1, 17\u00a0pages. https:\/\/www.usenix.org\/system\/files\/conference\/soups2015\/soups15-paper-schaub.pdf. Florian Schaub, Rebecca Balebako, Adam\u00a0L. Durity, and Lorrie\u00a0Faith Cranor. 2015. A Design Space for Effective Privacy Notices. In Symposium On Usable Privacy and Security (SOUPS). USENIX, Article 1, 17\u00a0pages. https:\/\/www.usenix.org\/system\/files\/conference\/soups2015\/soups15-paper-schaub.pdf."},{"key":"e_1_3_2_2_106_1","unstructured":"Florian Schaub and Lorrie\u00a0Faith Cranor. 2020. Usable and Useful Privacy Interfaces. In An Introduction to Privacy for Technology Professionals Travis Breaux (Ed.). IAPP 176\u2013299.  Florian Schaub and Lorrie\u00a0Faith Cranor. 2020. Usable and Useful Privacy Interfaces. In An Introduction to Privacy for Technology Professionals Travis Breaux (Ed.). IAPP 176\u2013299."},{"key":"e_1_3_2_2_107_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2016.23017"},{"key":"e_1_3_2_2_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.35"},{"key":"e_1_3_2_2_109_1","first-page":"32","article-title":"Targeting or Tailoring? Maximizing Resources to Create Effective Health Communications","volume":"28","author":"Schmid L","year":"2008","unstructured":"Kristina\u00a0 L Schmid , Susan\u00a0 E Rivers , Amy\u00a0 E Latimer , and Peter Salovey . 2008 . Targeting or Tailoring? Maximizing Resources to Create Effective Health Communications . Marketing Health Services 28 , 1 (2008), 32 . Kristina\u00a0L Schmid, Susan\u00a0E Rivers, Amy\u00a0E Latimer, and Peter Salovey. 2008. Targeting or Tailoring? Maximizing Resources to Create Effective Health Communications. Marketing Health Services 28, 1 (2008), 32.","journal-title":"Marketing Health Services"},{"key":"e_1_3_2_2_110_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2017.07.014"},{"key":"e_1_3_2_2_111_1","unstructured":"Stanford Legal Design Lab. 2020. Icons for legal help. https:\/\/betterinternet.law.stanford.edu\/design-guide\/icons-for-legal-help\/.  Stanford Legal Design Lab. 2020. Icons for legal help. https:\/\/betterinternet.law.stanford.edu\/design-guide\/icons-for-legal-help\/."},{"key":"e_1_3_2_2_112_1","unstructured":"The Digital Advertising Alliance. 2020. License the Privacy Rights Icon. https:\/\/digitaladvertisingalliance.org\/license-pricon.  The Digital Advertising Alliance. 2020. License the Privacy Rights Icon. https:\/\/digitaladvertisingalliance.org\/license-pricon."},{"key":"e_1_3_2_2_113_1","unstructured":"The Digital Advertising Alliance. 2020. Your AdChoices. https:\/\/youradchoices.com\/.  The Digital Advertising Alliance. 2020. Your AdChoices. https:\/\/youradchoices.com\/."},{"key":"e_1_3_2_2_114_1","unstructured":"The Federal Trade Commission. 2012. Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers. https:\/\/www.ftc.gov\/sites\/default\/files\/documents\/reports\/federal-trade-commission-report-protecting-consumer-privacy-era-rapid-change-recommendations\/120326privacyreport.pdf.  The Federal Trade Commission. 2012. Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers. https:\/\/www.ftc.gov\/sites\/default\/files\/documents\/reports\/federal-trade-commission-report-protecting-consumer-privacy-era-rapid-change-recommendations\/120326privacyreport.pdf."},{"key":"e_1_3_2_2_115_1","unstructured":"The Federal Trade Commission. 2013. .com Disclosures: How to Make Effective Disclosures in Digital Advertising. https:\/\/www.ftc.gov\/sites\/default\/files\/attachments\/press-releases\/ftc-staff-revises-online-advertising-disclosure-guidelines\/130312dotcomdisclosures.pdf.  The Federal Trade Commission. 2013. .com Disclosures: How to Make Effective Disclosures in Digital Advertising. https:\/\/www.ftc.gov\/sites\/default\/files\/attachments\/press-releases\/ftc-staff-revises-online-advertising-disclosure-guidelines\/130312dotcomdisclosures.pdf."},{"key":"e_1_3_2_2_116_1","unstructured":"TrustArc. 2013. EDAA rolls out pan-European consumer education campaign on OBA. https:\/\/trustarc.com\/blog\/2013\/06\/13\/edaa-rolls-out-pan-european-consumer-education-campaign-on-oba\/.  TrustArc. 2013. EDAA rolls out pan-European consumer education campaign on OBA. https:\/\/trustarc.com\/blog\/2013\/06\/13\/edaa-rolls-out-pan-european-consumer-education-campaign-on-oba\/."},{"key":"e_1_3_2_2_117_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0260"},{"key":"e_1_3_2_2_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335362"},{"key":"e_1_3_2_2_119_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354212"},{"key":"e_1_3_2_2_120_1","first-page":"74","article-title":"Privacy, Notice, and Design","volume":"21","author":"Waldman Ari\u00a0Ezra","year":"2018","unstructured":"Ari\u00a0Ezra Waldman . 2018 . Privacy, Notice, and Design . Stanford Technology Law Review 21 (2018), 74 . Ari\u00a0Ezra Waldman. 2018. Privacy, Notice, and Design. Stanford Technology Law Review 21 (2018), 74.","journal-title":"Stanford Technology Law Review"},{"key":"e_1_3_2_2_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338498.3358656"},{"key":"e_1_3_2_2_122_1","doi-asserted-by":"publisher","DOI":"10.1080\/014492999119129"},{"key":"e_1_3_2_2_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230665"}],"event":{"name":"CHI '21: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '21","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445387","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445387","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:34Z","timestamp":1750195714000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445387"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,6]]},"references-count":121,"alternative-id":["10.1145\/3411764.3445387","10.1145\/3411764"],"URL":"https:\/\/doi.org\/10.1145\/3411764.3445387","relation":{},"subject":[],"published":{"date-parts":[[2021,5,6]]},"assertion":[{"value":"2021-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}