{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T23:56:27Z","timestamp":1773100587483,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:00:00Z","timestamp":1603756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["894700"],"award-info":[{"award-number":["894700"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,27]]},"DOI":"10.1145\/3419394.3423647","type":"proceedings-article","created":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T20:30:22Z","timestamp":1603398622000},"page":"317-332","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["Measuring the Emergence of Consent Management on the Web"],"prefix":"10.1145","author":[{"given":"Maximilian","family":"Hils","sequence":"first","affiliation":[{"name":"University of Innsbruck"}]},{"given":"Daniel W.","family":"Woods","sequence":"additional","affiliation":[{"name":"University of Innsbruck"}]},{"given":"Rainer","family":"B\u00f6hme","sequence":"additional","affiliation":[{"name":"University of Innsbruck"}]}],"member":"320","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501613"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"John Perry Barlow. 1996. A Declaration of the Independence of Cyberspace.","DOI":"10.37514\/RNT-J.1996.3.6.21"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1053291.1053295"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753689"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6967-5_8"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3285002.3285006"},{"key":"e_1_3_2_1_8_1","volume-title":"Concentrating Correctly on Cybercrime Concentration. In 14th Annual Workshop on the Economics of Information Security, WEIS.","author":"Clayton Richard","year":"2015","unstructured":"Richard Clayton, Tyler Moore, and Nicolas Christin. 2015. Concentrating Correctly on Cybercrime Concentration. In 14th Annual Workshop on the Economics of Information Security, WEIS."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1253568"},{"key":"e_1_3_2_1_10_1","unstructured":"Commission Nationale de l'Informatique et des Libert\u00e9s (CNIL). 2019. Guidelines on cookies and tracking devices. https:\/\/www.cnil.fr\/en\/cookies-and-other-tracking-devices-cnil-publishes-new-guidelines"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23378"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"key":"e_1_3_2_1_13_1","unstructured":"Mozilla Foundation.2007--2020. Public Suffix List. https:\/\/publicsuffix.org\/"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504768"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444809342738"},{"key":"e_1_3_2_1_16_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS '19)","author":"Habib Hana","year":"2019","unstructured":"Hana Habib, Yixin Zou, Aditi Jannu, Neha Sridhar, Chelse Swoopes, Alessandro Acquisti, Lorrie Faith Cranor, Norman M. Sadeh, and Florian Schaub. 2019. An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites. In Fifteenth Symposium on Usable Privacy and Security (SOUPS '19). USENIX. https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/habib"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.69554\/TCFN5165"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-5784-2_12"},{"key":"e_1_3_2_1_19_1","unstructured":"IAB Europe. 2020. CMP List. https:\/\/iabeurope.eu\/cmp-list\/"},{"key":"e_1_3_2_1_20_1","unstructured":"IAB Europe. 2020. What is the Transparency and Consent Framework (TCF)? https:\/\/iabeurope.eu\/transparency-consent-framework\/"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987471"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278561"},{"key":"e_1_3_2_1_23_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS '15)","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara B. Kiesler. 2015. \"My Data Just Goes Everywhere:\" User Mental Models of the Internet and Implications for Privacy and Security. In Eleventh Symposium On Usable Privacy and Security (SOUPS '15). USENIX, 39--52. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/kang"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372296"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278570"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/502152.502153"},{"key":"e_1_3_2_1_27_1","volume-title":"Workshop on Usable IT Security Management: 3rd Symposium on Usable Privacy and Security, ACM (USM '07)","author":"Kumaraguru Ponnurangam","year":"2007","unstructured":"Ponnurangam Kumaraguru, Lorrie Cranor, Jorge Lobo, and Seraphin Calo. 2007. A Survey of Privacy Policy Languages. In Workshop on Usable IT Security Management: 3rd Symposium on Usable Privacy and Security, ACM (USM '07)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125170.1125230"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386040"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0037"},{"key":"e_1_3_2_1_31_1","volume-title":"Cardpliance: PCI DSS Compliance of Android Applications. In 29th USENIX Security Symposium (USENIX '20)","author":"Mahmud Samin Yaseer","year":"2020","unstructured":"Samin Yaseer Mahmud, Akhil Acharya, Benjamin Andow, William Enck, and Bradley Reaves. 2020. Cardpliance: PCI DSS Compliance of Android Applications. In 29th USENIX Security Symposium (USENIX '20).1517--1533. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/mahmud"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00076"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-55196-4_10"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382285"},{"key":"e_1_3_2_1_36_1","first-page":"543","article-title":"The cost of reading privacy policies","volume":"4","author":"McDonald Aleecia M","year":"2008","unstructured":"Aleecia M McDonald and Lorrie Faith Cranor. 2008. The cost of reading privacy policies. Journal of Law and Policy for the Information Society 4 (2008), 543.","journal-title":"Journal of Law and Policy for the Information Society"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/365024.365034"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376321"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1057073"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987489"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355582"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131397"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815705"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363195"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.69554\/JVII4684"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329806"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278574"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313524"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-015-0191-0"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133971"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0023"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335362"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380203"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354212"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355583"},{"key":"e_1_3_2_1_58_1","volume-title":"Workshop on Technology and Consumer Protection (ConPro'19)","author":"Eijk Rob Van","year":"2019","unstructured":"Rob Van Eijk, Hadi Asghari, Philipp Winter, and Arvind Narayanan. 2019. The Impact of User Location on Cookie Notices (Inside and Outside of the European Union). In Workshop on Technology and Consumer Protection (ConPro'19)."},{"key":"e_1_3_2_1_59_1","volume-title":"The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings. In Fifteenth Symposium on Usable Privacy and Security (SOUPS '19)","author":"Vance Anthony","year":"2019","unstructured":"Anthony Vance, David Eargle, Jeffrey L. Jenkins, C. Brock Kirwan, and Bonnie Brinton Anderson. 2019. The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings. In Fifteenth Symposium on Usable Privacy and Security (SOUPS '19). USENIX. https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/vance"},{"key":"e_1_3_2_1_60_1","volume-title":"The Commodification of Consent. In 20th Annual Workshop on the Economics of Information Security, WEIS.","author":"Woods Daniel W","year":"2020","unstructured":"Daniel W Woods and Rainer B\u00f6hme. 2020. The Commodification of Consent. In 20th Annual Workshop on the Economics of Information Security, WEIS."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-017-3553-z"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278550"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131390"}],"event":{"name":"IMC '20: ACM Internet Measurement Conference","location":"Virtual Event USA","acronym":"IMC '20","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"]},"container-title":["Proceedings of the ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423647","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419394.3423647","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T23:35:36Z","timestamp":1765841736000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423647"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,27]]},"references-count":63,"alternative-id":["10.1145\/3419394.3423647","10.1145\/3419394"],"URL":"https:\/\/doi.org\/10.1145\/3419394.3423647","relation":{},"subject":[],"published":{"date-parts":[[2020,10,27]]},"assertion":[{"value":"2020-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}