{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T16:42:25Z","timestamp":1776530545425,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":85,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,19]],"date-time":"2021-04-19T00:00:00Z","timestamp":1618790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,19]]},"DOI":"10.1145\/3442381.3450048","type":"proceedings-article","created":{"date-parts":[[2021,6,3]],"date-time":"2021-06-03T19:37:45Z","timestamp":1622749065000},"page":"2165-2176","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":76,"title":["Privacy Policies over Time: Curation and Analysis of a Million-Document Dataset"],"prefix":"10.1145","author":[{"given":"Ryan","family":"Amos","sequence":"first","affiliation":[{"name":"Princeton University, USA"}]},{"given":"Gunes","family":"Acar","sequence":"additional","affiliation":[{"name":"Katholieke Universiteit Leuven, Belgium"}]},{"given":"Eli","family":"Lucherini","sequence":"additional","affiliation":[{"name":"Princeton University, USA"}]},{"given":"Mihir","family":"Kshirsagar","sequence":"additional","affiliation":[{"name":"Princeton University, USA"}]},{"given":"Arvind","family":"Narayanan","sequence":"additional","affiliation":[{"name":"Princeton University, USA"}]},{"given":"Jonathan","family":"Mayer","sequence":"additional","affiliation":[{"name":"Princeton University, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[1] California Civil Code\u00a0\u00a7\u00a7 1798.100-1798.199.100.\u00a0."},{"key":"e_1_3_2_1_2_1","volume-title":"polyglot. Retrieved 2","author":"Al-Rfou Rami","year":"2020","unstructured":"Rami Al-Rfou. 2020. polyglot. Retrieved 2. Apr. 2020 from https:\/\/pypi.org\/project\/polyglot"},{"key":"e_1_3_2_1_3_1","volume-title":"html2text. Retrieved 25","year":"2020","unstructured":"Alir3z4. 2020. html2text. Retrieved 25. Feb. 2020 from https:\/\/github.com\/Alir3z4\/html2text"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.7"},{"key":"e_1_3_2_1_5_1","volume-title":"Wayback Machine General Information. Retrieved 13","author":"Archive Internet","year":"2021","unstructured":"Internet Archive. 2018. Wayback Machine General Information. Retrieved 13. Feb. 2021 from https:\/\/help.archive.org\/hc\/en-us\/articles\/360004716091-Wayback-Machine-General-Information"},{"key":"e_1_3_2_1_6_1","volume-title":"wayback. Retrieved 24","author":"Archive Internet","year":"2020","unstructured":"Internet Archive. 2020. wayback. Retrieved 24. Feb. 2020 from https:\/\/github.com\/internetarchive\/wayback\/tree\/master\/wayback-cdx-server"},{"key":"e_1_3_2_1_7_1","unstructured":"Internet Archive. 2020. Wayback Stats. Retrieved 5. May 2020 from https:\/\/analytics0.archive.org\/stats\/wb.php"},{"key":"e_1_3_2_1_8_1","volume-title":"pdftitle. Retrieved 8","author":"Balci Mete","year":"2020","unstructured":"Mete Balci. 2020. pdftitle. Retrieved 8. Apr. 2020 from https:\/\/pypi.org\/project\/pdftitle"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380262"},{"key":"e_1_3_2_1_10_1","volume-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS","author":"Bowers Jasmine","year":"2017","unstructured":"Jasmine Bowers, Bradley Reaves, Imani\u00a0N. Sherman, Patrick Traynor, and Kevin Butler. 2017. Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, Santa Clara, CA, 97\u2013114."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00799-015-0150-6"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00799-015-0140-8"},{"key":"e_1_3_2_1_13_1","unstructured":"[13] California Business and Professions Code\u00a0\u00a7\u00a7 22575-22579.\u00a0."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2882991"},{"key":"e_1_3_2_1_15_1","volume-title":"fuzzywuzzy. Retrieved 1","author":"Cohen Adam","year":"2020","unstructured":"Adam Cohen. 2020. fuzzywuzzy. Retrieved 1. Apr. 2020 from https:\/\/pypi.org\/project\/fuzzywuzzy"},{"key":"e_1_3_2_1_16_1","volume-title":"Privacy Online: A Report to Congress. Retrieved 13.","author":"Federal\u00a0Trade Commission","year":"1998","unstructured":"Federal\u00a0Trade Commission. 1998. Privacy Online: A Report to Congress. Retrieved 13. Feb. 2021 from https:\/\/www.ftc.gov\/sites\/default\/files\/documents\/reports\/privacy-online-report-congress\/priv-23a.pdf"},{"key":"e_1_3_2_1_17_1","volume-title":"Privacy Online: Fair Information Practices in the Electronic Marketplace.","author":"Federal\u00a0Trade Commission","year":"2000","unstructured":"Federal\u00a0Trade Commission. 2000. Privacy Online: Fair Information Practices in the Electronic Marketplace."},{"key":"e_1_3_2_1_18_1","volume-title":"Cavnvas Fingerprinting - Wikipedia. Retrieved 15","author":"Contributors","year":"2020","unstructured":"Contributors to Wikimedia projects. 2020. Cavnvas Fingerprinting - Wikipedia. Retrieved 15. Oct 2020 from https:\/\/en.wikipedia.org\/wiki\/Canvas_fingerprinting"},{"key":"e_1_3_2_1_19_1","volume-title":"Device Fingerprint - Wikipedia. Retrieved 15","author":"Contributors","year":"2020","unstructured":"Contributors to Wikimedia projects. 2020. Device Fingerprint - Wikipedia. Retrieved 15. Oct 2020 from https:\/\/en.wikipedia.org\/wiki\/Device_fingerprint"},{"key":"e_1_3_2_1_20_1","unstructured":"Contributors to Wikimedia projects. 2020. Evercookie - Wikipedia. Retrieved 15. Oct 2020 from https:\/\/en.wikipedia.org\/wiki\/Evercookie"},{"key":"e_1_3_2_1_21_1","volume-title":"HTTP Cookie - Wikipedia. Retrieved 15","author":"Contributors","year":"2020","unstructured":"Contributors to Wikimedia projects. 2020. HTTP Cookie - Wikipedia. Retrieved 15. Oct 2020 from https:\/\/en.wikipedia.org\/wiki\/HTTP_cookie"},{"key":"e_1_3_2_1_22_1","volume-title":"Local Shared Object - Wikipedia. Retrieved 15","author":"Contributors","year":"2020","unstructured":"Contributors to Wikimedia projects. 2020. Local Shared Object - Wikipedia. Retrieved 15. Oct 2020 from https:\/\/en.wikipedia.org\/wiki\/Local_shared_object"},{"key":"e_1_3_2_1_23_1","unstructured":"Contributors to Wikimedia projects. 2020. WebBeacon - Wikipedia. Retrieved 15. Oct 2020 from https:\/\/en.wikipedia.org\/wiki\/Web_beacon"},{"key":"e_1_3_2_1_24_1","volume-title":"Protecting privacy online: Is self-regulation working?Journal of Public Policy & Marketing 19, 1","author":"Culnan J","year":"2000","unstructured":"Mary\u00a0J Culnan. 2000. Protecting privacy online: Is self-regulation working?Journal of Public Policy & Marketing 19, 1 (2000), 20\u201326."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00287-019-01201-1"},{"key":"e_1_3_2_1_26_1","unstructured":"Carmine DiMAscio. 2020. py-readability-metrics."},{"key":"e_1_3_2_1_27_1","volume-title":"DuckDuckGo Tracker Radar Exposes Hidden Tracking. Retrieved 13","author":"Go.","year":"2021","unstructured":"DuckDuckGo. 2020. DuckDuckGo Tracker Radar Exposes Hidden Tracking. Retrieved 13. Feb. 2021 from https:\/\/spreadprivacy.com\/duckduckgo-tracker-radar\/"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106426.3106427"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0038"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376511"},{"key":"e_1_3_2_1_32_1","volume-title":"27th USENIX Security Symposium USENIX Security 18","author":"Harkous Hamza","year":"2018","unstructured":"Hamza Harkous, Kassem Fawaz, R\u00e9mi Lebret, Florian Schaub, Kang\u00a0G Shin, and Karl Aberer. 2018. Polisis: Automated analysis and presentation of privacy policies using deep learning. In 27th USENIX Security Symposium USENIX Security 18. 531\u2013548."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","unstructured":"Matthew Honnibal Ines Montani Sofie Van\u00a0Landeghem and Adriane Boyd. 2020. spaCy: Industrial-strength Natural Language Processing in Python. https:\/\/doi.org\/10.5281\/zenodo.1212303","DOI":"10.5281\/zenodo.1212303"},{"key":"e_1_3_2_1_34_1","unstructured":"ICANN. 2020. ICANN | Descriptions and Contact Information for ICANN-Accredited Registrars. Retrieved 27. May 2020 from https:\/\/www.icann.org\/registrar-reports\/accreditation-qualified-list.html"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985752"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2012.737745"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"J\u00a0Peter Kincaid Robert\u00a0P Fishburne\u00a0Jr Richard\u00a0L Rogers and Brad\u00a0S Chissom. 1975. Derivation of new readability formulas (automated readability index fog count and flesch reading ease formula) for navy enlisted personnel. (1975).","DOI":"10.21236\/ADA006655"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_1"},{"key":"e_1_3_2_1_39_1","volume-title":"Technical Report TR-HGI-2014-002 - Paint it black: Evaluating the effectiveness of malware blacklists.","author":"K\u00fchrer Marc","year":"2014","unstructured":"Marc K\u00fchrer, Christian Rossow, and Thorsten Holz. 2014. Technical Report TR-HGI-2014-002 - Paint it black: Evaluating the effectiveness of malware blacklists. (2014), 1\u201328."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134042"},{"key":"e_1_3_2_1_41_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Lerner Adam","year":"2016","unstructured":"Adam Lerner, Anna\u00a0Kornfeld Simpson, Tadayoshi Kohno, and Franziska Roesner. 2016. Internet jones and the raiders of the lost trackers: An archaeological study of web tracking from 1996 to 2016. In 25th USENIX Security Symposium (USENIX Security 16)."},{"key":"e_1_3_2_1_42_1","first-page":"5","article-title":"Online privacy policy of the thirty Dow Jones corporations: Compliance with FTC Fair Information Practice Principles and readability assessment","volume":"12","author":"Li Yuanxiang","year":"2012","unstructured":"Yuanxiang Li, Walter Stweart, Jake Zhu, and Anna Ni. 2012. Online privacy policy of the thirty Dow Jones corporations: Compliance with FTC Fair Information Practice Principles and readability assessment. Communications of the IIMA 12, 3 (2012), 5.","journal-title":"Communications of the IIMA"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186087"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0004"},{"key":"e_1_3_2_1_45_1","unstructured":"[45] Mark Graham.2020. Personal communication. https:\/\/twitter.com\/MarkGraham\/status\/1237439729429180416"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1086\/689753"},{"key":"e_1_3_2_1_47_1","volume-title":"Third-Party Web Tracking: Policy and Technology","author":"Mayer R.","year":"2012","unstructured":"Jonathan\u00a0R. Mayer and John\u00a0C. Mitchell. 2012. Third-Party Web Tracking: Policy and Technology. IEEE Security & Privacy(2012), 413\u2013427."},{"key":"e_1_3_2_1_48_1","first-page":"543","article-title":"The cost of reading privacy policies","volume":"4","author":"McDonald M.","year":"2008","unstructured":"Aleecia\u00a0M. McDonald and Lorrie\u00a0Faith Cranor. 2008. The cost of reading privacy policies. I\/S: A Journal of Law and Policy for the Information Society 4 (2008), 543.","journal-title":"I\/S: A Journal of Law and Policy for the Information Society"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572586"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240290108168"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1002\/dir.20009"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.25.2.238"},{"key":"e_1_3_2_1_53_1","volume-title":"readability. Retrieved 25","year":"2020","unstructured":"Mozilla. 2019. readability. Retrieved 25. Feb. 2020 from https:\/\/github.com\/mozilla\/readability"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1294"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355598"},{"key":"e_1_3_2_1_56_1","volume-title":"A framework for global electronic commerce","author":"United States. White\u00a0House Office. 1997.","unstructured":"United States. White\u00a0House Office. 1997. A framework for global electronic commerce. White House."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretai.2006.08.006"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Dominique Picard. 1985. Testing and estimating change-points in time series. Advances in applied probability(1985) 841\u2013867.","DOI":"10.2307\/1427090"},{"key":"e_1_3_2_1_60_1","volume-title":"miyakogi\/pyppeteer: Headless chrome\/chromium automation library (unofficial port of puppeteer). Retrieved 15","year":"2020","unstructured":"Pyppeteer. 2019. miyakogi\/pyppeteer: Headless chrome\/chromium automation library (unofficial port of puppeteer). Retrieved 15. Apr. 2020 from https:\/\/github.com\/miyakogi\/pyppeteer"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-2099"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1086\/688669"},{"key":"e_1_3_2_1_63_1","first-page":"39","article-title":"Disagreeable Privacy Policies: Mismatches Between Meaning and Users\u2019 Understanding","volume":"30","author":"Reidenberg R.","year":"2015","unstructured":"Joel\u00a0R. Reidenberg, Travis Breaux, Lorrie\u00a0Faith Cranor, Brian French, Amanda Grannis, James\u00a0T. Graves, Fei Liu, Aleecia McDonald, Thomas\u00a0B. Norton, Rohan Ramanath, N.\u00a0Cameron Russell, Norman Sadeh, and Florian Schaub. 2015. Disagreeable Privacy Policies: Mismatches Between Meaning and Users\u2019 Understanding. Berkeley Technology Law Journal 30, 1 (2015), 39\u201388.","journal-title":"Berkeley Technology Law Journal"},{"key":"e_1_3_2_1_64_1","volume-title":"requests \u00b7 PyPI. Retrieved 15","author":"Reitz Kenneth","year":"2020","unstructured":"Kenneth Reitz. 2020. requests \u00b7 PyPI. Retrieved 15. Apr. 2020 from https:\/\/pypi.org\/project\/requests"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ips037"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884855"},{"key":"e_1_3_2_1_67_1","first-page":"583","article-title":"The FTC and the new common law of privacy","volume":"114","author":"Solove J","year":"2014","unstructured":"Daniel\u00a0J Solove and Woodrow Hartzog. 2014. The FTC and the new common law of privacy. Colum. L. Rev. 114(2014), 583.","journal-title":"Colum. L. Rev."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"crossref","unstructured":"Mukund Srinath Shomir Wilson and C\u00a0Lee Giles. 2020. Privacy at scale: Introducing the privaseer corpus of web privacy policies. arXiv preprint arXiv:2004.11131(2020).","DOI":"10.18653\/v1\/2021.acl-long.532"},{"key":"e_1_3_2_1_69_1","volume-title":"S2","author":"Strahilevitz Lior\u00a0Jacob","year":"2016","unstructured":"Lior\u00a0Jacob Strahilevitz and Matthew\u00a0B. Kugler. 2016. Is Privacy Policy Language Irrelevant to Consumers?The Journal of Legal Studies 45, S2 (2016), S69\u2013S95."},{"key":"e_1_3_2_1_70_1","article-title":"Availability and quality of mobile health app privacy policies","volume":"22","author":"Sunyaev Ali","year":"2014","unstructured":"Ali Sunyaev, Tobias Dehling, Patrick\u00a0L Taylor, and Kenneth\u00a0D Mandl. 2014. Availability and quality of mobile health app privacy policies. Journal of the American Medical Informatics Association 22, e1 (08 2014), e28\u2013e33.","journal-title":"Journal of the American Medical Informatics Association"},{"key":"e_1_3_2_1_71_1","volume-title":"in Privacy and Self-Regulation in the Information Age by the US Department of Commerce.Privacy and Self-Regulation in the Information Age by the US Department of Commerce","author":"Swire Peter","year":"1997","unstructured":"Peter Swire. 1997. Markets, Self-Regulation, and Government Enforcement in the Protection of Personal Information, in Privacy and Self-Regulation in the Information Age by the US Department of Commerce.Privacy and Self-Regulation in the Information Age by the US Department of Commerce (1997)."},{"key":"e_1_3_2_1_72_1","unstructured":"Sebastian Thiel and Michael Trier. 2020. GitPython. Retrieved 31. May 2020 from https:\/\/pypi.org\/project\/GitPython"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"crossref","unstructured":"TOS;DR. 2020. TOSBack | The Terms-Of-Service Tracker. Retrieved 31. May 2020 from https:\/\/tosback.org","DOI":"10.1255\/tosf.124"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.107299"},{"key":"e_1_3_2_1_75_1","volume-title":"Study of Compliance with the Data Protection Act 1998 by UK Based Websites. Retrieved 13","author":"UMIST and the Office of\u00a0the Information\u00a0Commission","year":"2021","unstructured":"UMIST and the Office of\u00a0the Information\u00a0Commissioner. 2002. Study of Compliance with the Data Protection Act 1998 by UK Based Websites. Retrieved 13. Feb. 2021 from http:\/\/www.lindamacaulay.com\/upload\/resource\/9_1dpacompliancereport.pdf"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2008.922634"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23053"},{"key":"e_1_3_2_1_78_1","first-page":"31","article-title":"Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting.","volume":"6","author":"Wang Yi-Min","year":"2006","unstructured":"Yi-Min Wang, Doug Beck, Jeffrey Wang, Chad Verbowski, and Brad Daniels. 2006. Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting.SRUTI 6, 31-36 (2006), 2\u20132.","journal-title":"SRUTI"},{"key":"e_1_3_2_1_79_1","unstructured":"Webshrinker. 2020. Domain Category API."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1126"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"crossref","unstructured":"Shomir Wilson Florian Schaub Rohan Ramanath Norman Sadeh Fei Liu Noah\u00a0A. Smith and Frederick Liu. 2016. Crowdsourcing Annotations for Websites\u2019 Privacy Policies: Can It Really Work?. In Proceedings of the 25th International Conference on World Wide Web (Montr\u00e9al Qu\u00e9bec Canada) (WWW \u201916). International World Wide Web Conferences Steering Committee Republic and Canton of Geneva CHE 133\u2013143.","DOI":"10.1145\/2872427.2883035"},{"key":"e_1_3_2_1_82_1","unstructured":"Hsiaoming Yang. 2020. Mistune."},{"key":"e_1_3_2_1_83_1","volume-title":"A Large Publicly Available Corpus of Website Privacy Policies Based on DMOZ. Retrieved 02","author":"Zaeem Razieh\u00a0Nokhbeh","year":"2021","unstructured":"Razieh\u00a0Nokhbeh Zaeem and K\u00a0Suzanne Barber. 2020. A Large Publicly Available Corpus of Website Privacy Policies Based on DMOZ. Retrieved 02. Feb. 2021 from https:\/\/identity.utexas.edu\/sites\/default\/files\/2020-12\/A%20Large%20Publicly%20Available%20Corpus%20ofWebsite%20Privacy%20Policies.pdf"},{"key":"e_1_3_2_1_84_1","volume-title":"Privee: An Architecture for Automatically Analyzing Web Privacy Policies. In 23rd USENIX Security Symposium (USENIX Security 14)","author":"Zimmeck Sebastian","year":"2014","unstructured":"Sebastian Zimmeck and Steven\u00a0M. Bellovin. 2014. Privee: An Architecture for Automatically Analyzing Web Privacy Policies. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 1\u201316."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0037"}],"event":{"name":"WWW '21: The Web Conference 2021","location":"Ljubljana Slovenia","acronym":"WWW '21","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the Web Conference 2021"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3442381.3450048","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3442381.3450048","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:45Z","timestamp":1750195485000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3442381.3450048"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,19]]},"references-count":85,"alternative-id":["10.1145\/3442381.3450048","10.1145\/3442381"],"URL":"https:\/\/doi.org\/10.1145\/3442381.3450048","relation":{},"subject":[],"published":{"date-parts":[[2021,4,19]]},"assertion":[{"value":"2021-06-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}