{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:47:19Z","timestamp":1757310439423,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T00:00:00Z","timestamp":1624233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,21]]},"DOI":"10.1145\/3447535.3462493","type":"proceedings-article","created":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T19:32:12Z","timestamp":1624390332000},"page":"262-271","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Social acceptability of personal data utilization business according to data controllers and purposes"],"prefix":"10.1145","author":[{"given":"Soichiro","family":"Morishita","sequence":"first","affiliation":[{"name":"CyberAgent, Inc., Japan"}]},{"given":"Masanori","family":"Takano","sequence":"additional","affiliation":[{"name":"CyberAgent, Inc., Japan"}]},{"given":"Hideaki","family":"Takeda","sequence":"additional","affiliation":[{"name":"National Institute of Informatics, Japan"}]},{"given":"Faiza","family":"Mahdaoui","sequence":"additional","affiliation":[{"name":"INP-Toulouse, France"}]},{"given":"Fumiaki","family":"Taka","sequence":"additional","affiliation":[{"name":"Kanagawa University, Japan"}]},{"given":"Yuki","family":"Ogawa","sequence":"additional","affiliation":[{"name":"Ritsumeikan University, Japan"}]}],"member":"320","published-online":{"date-parts":[[2021,6,22]]},"reference":[{"volume-title":"The logic and limits of trust","author":"Barber Bernard","key":"e_1_3_2_2_1_1","unstructured":"Bernard Barber . 1983. The logic and limits of trust . Rutgers University Press . Bernard Barber. 1983. The logic and limits of trust. Rutgers University Press."},{"key":"e_1_3_2_2_2_1","volume-title":"The Association Between Threat and Politics Depends on the Type of Threat, the Political Domain, and the Country. Personality and Social Psychology Bulletin (Aug","author":"Brandt J.","year":"2020","unstructured":"Mark\u00a0 J. Brandt , Felicity\u00a0 M. Turner-Zwinkels , Beste Karapirinler , Florian Van\u00a0Leeuwen , Michael Bender , Yvette van Osch , and Byron Adams . 2020. The Association Between Threat and Politics Depends on the Type of Threat, the Political Domain, and the Country. Personality and Social Psychology Bulletin (Aug . 2020 ), 0146167220946187. https:\/\/doi.org\/10.1177\/0146167220946187 Publisher : SAGE Publications Inc . 10.1177\/0146167220946187 Mark\u00a0J. Brandt, Felicity\u00a0M. Turner-Zwinkels, Beste Karapirinler, Florian Van\u00a0Leeuwen, Michael Bender, Yvette van Osch, and Byron Adams. 2020. The Association Between Threat and Politics Depends on the Type of Threat, the Political Domain, and the Country. Personality and Social Psychology Bulletin (Aug. 2020), 0146167220946187. https:\/\/doi.org\/10.1177\/0146167220946187 Publisher: SAGE Publications Inc."},{"key":"e_1_3_2_2_3_1","unstructured":"Gilles Deleuze. 1992. Postscript on the Societies of Control. October 59(1992) 3\u20137. https:\/\/www.jstor.org\/stable\/778828 Publisher: The MIT Press.  Gilles Deleuze. 1992. Postscript on the Societies of Control. October 59(1992) 3\u20137. https:\/\/www.jstor.org\/stable\/778828 Publisher: The MIT Press."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1198\/016214501753382273"},{"key":"e_1_3_2_2_5_1","unstructured":"Kudo Fumiko Hiromi Arai and Arisa Ema. 2020. Ethical Issues Regarding the Use of AI Profiling Services for Recruiting: The Japanese Rikunabi Data Scandal.  Kudo Fumiko Hiromi Arai and Arisa Ema. 2020. Ethical Issues Regarding the Use of AI Profiling Services for Recruiting: The Japanese Rikunabi Data Scandal."},{"key":"#cr-split#-e_1_3_2_2_6_1.1","doi-asserted-by":"crossref","unstructured":"J. Holvast. 2008. History of Privacy. In FIDIS. https:\/\/doi.org\/10.1007\/978-3-642-03315-5_2 10.1007\/978-3-642-03315-5_2","DOI":"10.1007\/978-3-642-03315-5_2"},{"key":"#cr-split#-e_1_3_2_2_6_1.2","doi-asserted-by":"crossref","unstructured":"J. Holvast. 2008. History of Privacy. In FIDIS. https:\/\/doi.org\/10.1007\/978-3-642-03315-5_2","DOI":"10.1007\/978-3-642-03315-5_2"},{"key":"e_1_3_2_2_7_1","first-page":"169","article-title":"The merits and demerits of credit risk management based on prediction algorithms: Focusing on the impact on life opportunities and the effectiveness of countermeasures","volume":"8","author":"Horiuchi Shinnosuke","year":"2019","unstructured":"Shinnosuke Horiuchi . 2019 . The merits and demerits of credit risk management based on prediction algorithms: Focusing on the impact on life opportunities and the effectiveness of countermeasures . Socio-Informatics 8 , 2 (2019), 169 \u2013 185 . http:\/\/www.ssi.or.jp\/journal\/pdf\/Vol8No2_12.pdf in Japanese. Shinnosuke Horiuchi. 2019. The merits and demerits of credit risk management based on prediction algorithms: Focusing on the impact on life opportunities and the effectiveness of countermeasures. Socio-Informatics 8, 2 (2019), 169\u2013185. http:\/\/www.ssi.or.jp\/journal\/pdf\/Vol8No2_12.pdf in Japanese.","journal-title":"Socio-Informatics"},{"key":"e_1_3_2_2_8_1","volume-title":"The adoption of contact tracing applications of COVID-19 by European governments. Policy Design and Practice 0, 0 (Nov","author":"Jacob Steve","year":"2020","unstructured":"Steve Jacob and Justin Lawaree . 2020. The adoption of contact tracing applications of COVID-19 by European governments. Policy Design and Practice 0, 0 (Nov . 2020 ), 1\u201315. https:\/\/doi.org\/10.1080\/25741292.2020.1850404 Publisher : Routledge _eprint: https:\/\/doi.org\/10.1080\/25741292.2020.1850404. 10.1080\/25741292.2020.1850404 Steve Jacob and Justin Lawaree. 2020. The adoption of contact tracing applications of COVID-19 by European governments. Policy Design and Practice 0, 0 (Nov. 2020), 1\u201315. https:\/\/doi.org\/10.1080\/25741292.2020.1850404 Publisher: Routledge _eprint: https:\/\/doi.org\/10.1080\/25741292.2020.1850404."},{"key":"e_1_3_2_2_9_1","volume-title":"Self-interest and data protection drive the adoption and moral acceptability of big data technologies: A conjoint analysis approach. Computers in Human Behavior 108 (July","author":"Kodapanakkal I.","year":"2020","unstructured":"Rabia\u00a0 I. Kodapanakkal , Mark\u00a0 J. Brandt , Christoph Kogler , and Ilja van Beest . 2020. Self-interest and data protection drive the adoption and moral acceptability of big data technologies: A conjoint analysis approach. Computers in Human Behavior 108 (July 2020 ), 106303. https:\/\/doi.org\/10.1016\/j.chb.2020.106303 10.1016\/j.chb.2020.106303 Rabia\u00a0I. Kodapanakkal, Mark\u00a0J. Brandt, Christoph Kogler, and Ilja van Beest. 2020. Self-interest and data protection drive the adoption and moral acceptability of big data technologies: A conjoint analysis approach. Computers in Human Behavior 108 (July 2020), 106303. https:\/\/doi.org\/10.1016\/j.chb.2020.106303"},{"key":"e_1_3_2_2_10_1","volume-title":"The Oxford Handbook of Information and Communication Technologies","author":"Lyon David","year":"1995","unstructured":"David Lyon . 2009. Surveillance , power, and everyday life . In The Oxford Handbook of Information and Communication Technologies . Oxford University Press , Oxford . https:\/\/doi.org\/10.1093\/oxfordhb\/9780 1995 48798.003.0019 ISBN: 9780199548798. 10.1093\/oxfordhb David Lyon. 2009. Surveillance, power, and everyday life. In The Oxford Handbook of Information and Communication Technologies. Oxford University Press, Oxford. https:\/\/doi.org\/10.1093\/oxfordhb\/9780199548798.003.0019 ISBN: 9780199548798."},{"key":"e_1_3_2_2_11_1","unstructured":"Madhumita Murgia and Max Harlow. 2019. How top health websites are sharing sensitive data with advertisers. https:\/\/www.ft.com\/content\/0fbf4d8e-022b-11ea-be59-e49b2a136b8d  Madhumita Murgia and Max Harlow. 2019. How top health websites are sharing sensitive data with advertisers. https:\/\/www.ft.com\/content\/0fbf4d8e-022b-11ea-be59-e49b2a136b8d"},{"key":"#cr-split#-e_1_3_2_2_12_1.1","doi-asserted-by":"crossref","unstructured":"Harshvardhan Pandit Christophe Debruyne Declan O'Sullivan and David Lewis. 2019. GConsent - A Consent Ontology Based on the GDPR. 270-282. https:\/\/doi.org\/10.1007\/978-3-030-21348-0_18 10.1007\/978-3-030-21348-0_18","DOI":"10.1007\/978-3-030-21348-0_18"},{"key":"#cr-split#-e_1_3_2_2_12_1.2","doi-asserted-by":"crossref","unstructured":"Harshvardhan Pandit Christophe Debruyne Declan O'Sullivan and David Lewis. 2019. GConsent - A Consent Ontology Based on the GDPR. 270-282. https:\/\/doi.org\/10.1007\/978-3-030-21348-0_18","DOI":"10.1007\/978-3-030-21348-0_18"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380195"},{"key":"e_1_3_2_2_14_1","volume-title":"Big data analytics in healthcare: promise and potential. Health Information Science and Systems 2 (Feb","author":"Raghupathi Wullianallur","year":"2014","unstructured":"Wullianallur Raghupathi and Viju Raghupathi . 2014. Big data analytics in healthcare: promise and potential. Health Information Science and Systems 2 (Feb . 2014 ). https:\/\/doi.org\/10.1186\/2047-2501-2-3 10.1186\/2047-2501-2-3 Wullianallur Raghupathi and Viju Raghupathi. 2014. Big data analytics in healthcare: promise and potential. Health Information Science and Systems 2 (Feb. 2014). https:\/\/doi.org\/10.1186\/2047-2501-2-3"},{"key":"e_1_3_2_2_15_1","volume-title":"E-Commerce Recommendation Applications. 5 (Aug","author":"Schafer Ben","year":"2000","unstructured":"Ben Schafer , Joseph Konstan , and John Riedl . 2000. E-Commerce Recommendation Applications. 5 (Aug . 2000 ). https:\/\/doi.org\/10.1023\/A:1009804230409 10.1023\/A:1009804230409 Ben Schafer, Joseph Konstan, and John Riedl. 2000. E-Commerce Recommendation Applications. 5 (Aug. 2000). https:\/\/doi.org\/10.1023\/A:1009804230409"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/dir.1011"},{"key":"e_1_3_2_2_17_1","volume-title":"Solomon and Fernando Flores","author":"C.","year":"2001","unstructured":"Robert\u00a0 C. Solomon and Fernando Flores . 2001 . Building Trust. Oxford University Press . Robert\u00a0C. Solomon and Fernando Flores. 2001. Building Trust. Oxford University Press."},{"key":"e_1_3_2_2_18_1","volume-title":"Social Benefit versus Technological Risk. Science 165, 3899 (Sept","author":"Starr Chauncey","year":"1969","unstructured":"Chauncey Starr . 1969. Social Benefit versus Technological Risk. Science 165, 3899 (Sept . 1969 ), 1232\u20131238. https:\/\/doi.org\/10.1126\/science.165.3899.1232 Publisher : American Association for the Advancement of Science Section: Articles. 10.1126\/science.165.3899.1232 Chauncey Starr. 1969. Social Benefit versus Technological Risk. Science 165, 3899 (Sept. 1969), 1232\u20131238. https:\/\/doi.org\/10.1126\/science.165.3899.1232 Publisher: American Association for the Advancement of Science Section: Articles."},{"key":"e_1_3_2_2_19_1","unstructured":"UC Berkeley Committee for the Protection of Human Subjects. 2020. Mechanical Turk (MTurk) for Online Research. https:\/\/cphs.berkeley.edu\/mechanicalturk.pdf  UC Berkeley Committee for the Protection of Human Subjects. 2020. Mechanical Turk (MTurk) for Online Research. https:\/\/cphs.berkeley.edu\/mechanicalturk.pdf"},{"key":"e_1_3_2_2_20_1","first-page":"1","article-title":"Significance and the Structure of Trust \u2014Theoretical and Empirical Research on Trust and Commitment Relations\u2014","volume":"2","author":"Yamagishi Toshio","year":"1995","unstructured":"Toshio Yamagishi and Hisashi Komiyama . 1995 . Significance and the Structure of Trust \u2014Theoretical and Empirical Research on Trust and Commitment Relations\u2014 . INNS Journal 2 (1995), 1 \u2013 59 . in Japanese. Toshio Yamagishi and Hisashi Komiyama. 1995. Significance and the Structure of Trust \u2014Theoretical and Empirical Research on Trust and Commitment Relations\u2014. INNS Journal 2(1995), 1\u201359. in Japanese.","journal-title":"INNS Journal"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1198\/016214506000000735"}],"event":{"name":"WebSci '21: WebSci '21 13th ACM Web Science Conference 2021","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Virtual Event United Kingdom","acronym":"WebSci '21"},"container-title":["13th ACM Web Science Conference 2021"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447535.3462493","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447535.3462493","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:19:04Z","timestamp":1750191544000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447535.3462493"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,21]]},"references-count":23,"alternative-id":["10.1145\/3447535.3462493","10.1145\/3447535"],"URL":"https:\/\/doi.org\/10.1145\/3447535.3462493","relation":{},"subject":[],"published":{"date-parts":[[2021,6,21]]},"assertion":[{"value":"2021-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}