{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:07Z","timestamp":1750220347224,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,7,21]],"date-time":"2021-07-21T00:00:00Z","timestamp":1626825600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ETH Zurich Center for Law and Economics","award":["N\/A"],"award-info":[{"award-number":["N\/A"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,7,21]]},"DOI":"10.1145\/3461702.3462582","type":"proceedings-article","created":{"date-parts":[[2021,7,31]],"date-time":"2021-07-31T01:21:32Z","timestamp":1627694492000},"page":"807-813","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Measuring Lay Reactions to Personal Data Markets"],"prefix":"10.1145","author":[{"given":"Aileen","family":"Nielsen","sequence":"first","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2021,7,30]]},"reference":[{"volume-title":"Proceedings of the Third ACM Conference on Electronic Commerce, edited by Michael P. Wellman and Yoav Shoham. New York: Association for Computing Machinery.","key":"e_1_3_2_1_1_1","unstructured":"2001. E-Privacy in Second Generation E-Commerce: Privacy Preferences versus Actual Behavior . Proceedings of the Third ACM Conference on Electronic Commerce, edited by Michael P. Wellman and Yoav Shoham. New York: Association for Computing Machinery. 2001. E-Privacy in Second Generation E-Commerce: Privacy Preferences versus Actual Behavior. Proceedings of the Third ACM Conference on Electronic Commerce, edited by Michael P. Wellman and Yoav Shoham. New York: Association for Computing Machinery."},{"volume-title":"2019 IEEE Symposium on Security and Privacy.","key":"e_1_3_2_1_2_1","unstructured":"2019. How well do my results generalize? comparing security and privacy survey results from mturk, web, and telephone samples . 2019 IEEE Symposium on Security and Privacy. 2019. How well do my results generalize? comparing security and privacy survey results from mturk, web, and telephone samples. 2019 IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa1465"},{"key":"e_1_3_2_1_4_1","volume-title":"Retrieved","author":"Crawford K","year":"2021","unstructured":"K Crawford and T Paglen . [n.d.]. Excavating AI : The Politics of Training Sets for Machine Learning . Retrieved January 15, 2021 from https:\/\/excavating.ail K Crawford and T Paglen. [n.d.]. Excavating AI: The Politics of Training Sets for Machine Learning. Retrieved January 15, 2021 from https:\/\/excavating.ail"},{"key":"e_1_3_2_1_5_1","first-page":"663","article-title":"Contracting for Personal Data","volume":"94","author":"Davis KE","year":"2019","unstructured":"KE Davis and F Marotta-Wurgler . 2019 . Contracting for Personal Data . New York University Law Review 94 , 4 (2019), 663 . KE Davis and F Marotta-Wurgler. 2019. Contracting for Personal Data. New York University Law Review 94, 4 (2019), 663.","journal-title":"New York University Law Review"},{"key":"e_1_3_2_1_6_1","volume-title":"FTC's 5 billion Facebook settlement: Record-breaking and history-making. Retrieved","author":"Fair L","year":"2020","unstructured":"L Fair . [n.d.]. FTC's 5 billion Facebook settlement: Record-breaking and history-making. Retrieved May 1, 2020 from https:\/\/www.ftc.gov\/newsevents\/blogs\/business-blog\/2019\/07\/ftcs-5-billion-facebook-settlement-recordbreaking-history L Fair. [n.d.]. FTC's 5 billion Facebook settlement: Record-breaking and history-making. Retrieved May 1, 2020 from https:\/\/www.ftc.gov\/newsevents\/blogs\/business-blog\/2019\/07\/ftcs-5-billion-facebook-settlement-recordbreaking-history"},{"key":"e_1_3_2_1_7_1","volume-title":"Presidential hopeful Andrew Yang wants your data to be your property. Retrieved","author":"Fisher C","year":"2020","unstructured":"C Fisher . [n.d.]. Presidential hopeful Andrew Yang wants your data to be your property. Retrieved May 1, 2020 from https:\/\/www.engadget.com\/2019--11--14- andrew-yang-2020-tech-policy.html C Fisher. [n.d.]. Presidential hopeful Andrew Yang wants your data to be your property. Retrieved May 1, 2020 from https:\/\/www.engadget.com\/2019--11--14- andrew-yang-2020-tech-policy.html"},{"volume-title":"Structures of social life: The four elementary forms of social relations","author":"Fiske AP","key":"e_1_3_2_1_8_1","unstructured":"AP Fiske . 1991. Structures of social life: The four elementary forms of social relations . Free Press . AP Fiske. 1991. Structures of social life: The four elementary forms of social relations. Free Press."},{"key":"e_1_3_2_1_9_1","volume-title":"How the tragic death of Do Not Track ruined the web for everyone. Retrieved","author":"Fleishman G","year":"2020","unstructured":"G Fleishman . [n.d.]. How the tragic death of Do Not Track ruined the web for everyone. Retrieved May 1, 2020 from https:\/\/www.fastcompany.com\/90308068\/ how-the-tragic-death-of-do-not-track-ruined-the-web-for-everyon G Fleishman. [n.d.]. How the tragic death of Do Not Track ruined the web for everyone. Retrieved May 1, 2020 from https:\/\/www.fastcompany.com\/90308068\/ how-the-tragic-death-of-do-not-track-ruined-the-web-for-everyon"},{"key":"e_1_3_2_1_10_1","volume-title":"Doesn't do Anything. Retrieved","author":"Hill K","year":"2020","unstructured":"K Hill . [n.d.]. ' Do Not Track' , The Privacy Tool Used by Millions of People , Doesn't do Anything. Retrieved May 1, 2020 from https:\/\/gizmodo.com\/do-not-trackthe- privacy-tool-used-by-millions-of-peop-1828868324 K Hill. [n.d.]. 'Do Not Track', The Privacy Tool Used by Millions of People, Doesn't do Anything. Retrieved May 1, 2020 from https:\/\/gizmodo.com\/do-not-trackthe- privacy-tool-used-by-millions-of-peop-1828868324"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1086\/467659"},{"key":"e_1_3_2_1_12_1","volume-title":"Revealed Privacy Preferences: Are Privacy Choices Rational. Retrieved","author":"Lee Y.","year":"2020","unstructured":"Y. Lee and R Weber . [n.d.]. Revealed Privacy Preferences: Are Privacy Choices Rational. Retrieved May 1, 2020 from https:\/\/drive.google.com\/file\/ d\/1fWr8duoLlnU6YlVY69_6BRBlfQwg80xa\/view Y. Lee and R Weber. [n.d.]. Revealed Privacy Preferences: Are Privacy Choices Rational. Retrieved May 1, 2020 from https:\/\/drive.google.com\/file\/ d\/1fWr8duoLlnU6YlVY69_6BRBlfQwg80xa\/view"},{"key":"e_1_3_2_1_13_1","volume-title":"The Gift: The Form and Reason for Exchange in Archaic Societies.","author":"Mauss M","year":"1925","unstructured":"M Mauss . 1925 . The Gift: The Form and Reason for Exchange in Archaic Societies. M Mauss. 1925. The Gift: The Form and Reason for Exchange in Archaic Societies."},{"key":"e_1_3_2_1_14_1","volume-title":"Congress and Trump Agreed They Want a National Privacy Law. It Is Nowhere in Sight. Retrieved","author":"McCabe D","year":"2021","unstructured":"D McCabe . [n.d.]. Congress and Trump Agreed They Want a National Privacy Law. It Is Nowhere in Sight. Retrieved January 10, 2021 from https:\/\/www.nytimes. com\/2019\/10\/01\/technology\/national-privacy-law.html D McCabe. [n.d.]. Congress and Trump Agreed They Want a National Privacy Law. It Is Nowhere in Sight. Retrieved January 10, 2021 from https:\/\/www.nytimes. com\/2019\/10\/01\/technology\/national-privacy-law.html"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327663jcp1501_2"},{"volume-title":"Privacy in Context","author":"Nissenbaum H","key":"e_1_3_2_1_16_1","unstructured":"H Nissenbaum . 2010. Privacy in Context . Standard Law Books . H Nissenbaum. 2010. Privacy in Context. Standard Law Books."},{"key":"e_1_3_2_1_17_1","volume-title":"Radical Markets: Uprooting Capitalism and Democracy for a Just Society","author":"Posner R.A.","year":"2018","unstructured":"R.A. Posner and E.G. Weyl . 2018 . Radical Markets: Uprooting Capitalism and Democracy for a Just Society . Princeton University Press . R.A. Posner and E.G. Weyl. 2018. Radical Markets: Uprooting Capitalism and Democracy for a Just Society. Princeton University Press."},{"key":"e_1_3_2_1_18_1","volume-title":"Is Changing People's Minds About AI. Retrieved","author":"Rea N","year":"2021","unstructured":"N Rea . [n.d.]. ow ImageNet Roulette, an Art Project That Went Viral by Exposing Facial Recognition's Biases , Is Changing People's Minds About AI. Retrieved January 5, 2021 from https:\/\/news.artnet.com\/art-world\/imagenet-roulette-trevorpaglen- kate-crawford-1658305l N Rea. [n.d.]. ow ImageNet Roulette, an Art Project That Went Viral by Exposing Facial Recognition's Biases, Is Changing People's Minds About AI. Retrieved January 5, 2021 from https:\/\/news.artnet.com\/art-world\/imagenet-roulette-trevorpaglen- kate-crawford-1658305l"},{"key":"e_1_3_2_1_19_1","first-page":"431","article-title":"Taking Trust Seriously in Privacy Law","volume":"19","author":"Richards N.","year":"2005","unstructured":"N. Richards and W. Hartzog . 2005 . Taking Trust Seriously in Privacy Law . Stanford Technology Law Review 19 , 1 (2005), 431 -- 472 . N. Richards andW. Hartzog. 2005. Taking Trust Seriously in Privacy Law. Stanford Technology Law Review 19, 1 (2005), 431--472.","journal-title":"Stanford Technology Law Review"},{"key":"e_1_3_2_1_20_1","first-page":"2007","article-title":"Reunifying Privacy Law","volume":"98","author":"Strahilevitz L.J.","year":"2010","unstructured":"L.J. Strahilevitz . 2010 . Reunifying Privacy Law . California Law Review 98 , 6 (2010), 2007 -- 2048 . L.J. Strahilevitz. 2010. Reunifying Privacy Law. California Law Review 98, 6 (2010), 2007--2048.","journal-title":"California Law Review"},{"key":"e_1_3_2_1_21_1","first-page":"23","article-title":"Why do people avoid information about privacy","volume":"2","author":"Svirsky D.","year":"2019","unstructured":"D. Svirsky . 2019 . Why do people avoid information about privacy ? Journal of Law Innovation 2 , 23 (2019), 23 -- 46 . D. Svirsky. 2019. Why do people avoid information about privacy? Journal of Law Innovation 2, 23 (2019), 23--46.","journal-title":"Journal of Law Innovation"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.2307\/1593765"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.78.5.853"},{"volume-title":"The Gift Relationship: From Human Blood to Social Policy","author":"Titmuss R.","key":"e_1_3_2_1_24_1","unstructured":"R. Titmuss . 1997. The Gift Relationship: From Human Blood to Social Policy . The New Press . R. Titmuss. 1997. The Gift Relationship: From Human Blood to Social Policy. The New Press."},{"key":"e_1_3_2_1_25_1","volume-title":"The Tradeoff Fallacy: How Marketers are Misrepresenting American Consumers and Opening Them Up to Exploitation. A Report from the Annenberg School for Communication","author":"Turow J","year":"2020","unstructured":"J Turow , M Hennessey , and N Draper . [n.d.]. The Tradeoff Fallacy: How Marketers are Misrepresenting American Consumers and Opening Them Up to Exploitation. A Report from the Annenberg School for Communication , University of Pennsylvania . Retrieved May 1, 2020 from https:\/\/www.asc.upenn.edu\/sites\/default\/files\/TradeoffFallacy_1.pdf J Turow, M Hennessey, and N Draper. [n.d.]. The Tradeoff Fallacy: How Marketers are Misrepresenting American Consumers and Opening Them Up to Exploitation. A Report from the Annenberg School for Communication, University of Pennsylvania. Retrieved May 1, 2020 from https:\/\/www.asc.upenn.edu\/sites\/default\/files\/TradeoffFallacy_1.pdf"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10603-019-09419-y"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Shoshana Zuboff. 2019. The Age of Surveillance Capitalism. Public Affairs.  Shoshana Zuboff. 2019. The Age of Surveillance Capitalism. Public Affairs.","DOI":"10.24908\/ss.v17i1\/2.13238"}],"event":{"name":"AIES '21: AAAI\/ACM Conference on AI, Ethics, and Society","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","AAAI"],"location":"Virtual Event USA","acronym":"AIES '21"},"container-title":["Proceedings of the 2021 AAAI\/ACM Conference on AI, Ethics, and Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3461702.3462582","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3461702.3462582","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:05Z","timestamp":1750191425000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3461702.3462582"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,21]]},"references-count":27,"alternative-id":["10.1145\/3461702.3462582","10.1145\/3461702"],"URL":"https:\/\/doi.org\/10.1145\/3461702.3462582","relation":{},"subject":[],"published":{"date-parts":[[2021,7,21]]},"assertion":[{"value":"2021-07-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}