{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:42:56Z","timestamp":1774946576880,"version":"3.50.1"},"reference-count":57,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T00:00:00Z","timestamp":1631145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA8750-15-2-0281"],"award-info":[{"award-number":["FA8750-15-2-0281"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1801472"],"award-info":[{"award-number":["CNS-1801472"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2021,9,9]]},"abstract":"<jats:p>In-app privacy notices can help smartphone users make informed privacy decisions. However, they are rarely used in real-world apps, since developers often lack the knowledge, time, and resources to design and implement them well. We present Honeysuckle, a programming tool that helps Android developers build in-app privacy notices using an annotation-based code generation approach facilitated by an IDE plugin, a build system plugin, and a library. We conducted a within-subjects study with 12 Android developers to evaluate Honeysuckle. Each participant was asked to implement privacy notices for two popular open-source apps using the Honeysuckle library as a baseline as well as the annotation-based approach. Our results show that the annotation-based approach helps developers accomplish the task faster with significantly lower cognitive load. Developers preferred the annotation-based approach over the library approach because it was much easier to learn and use and allowed developers to achieve various types of privacy notices using a unified code format, which can enhance code readability and benefit team collaboration.<\/jats:p>","DOI":"10.1145\/3478097","type":"journal-article","created":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T22:48:23Z","timestamp":1631659703000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Honeysuckle"],"prefix":"10.1145","volume":"5","author":[{"given":"Tianshi","family":"Li","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, USA"}]},{"given":"Elijah B.","family":"Neundorfer","sequence":"additional","affiliation":[{"name":"Columbus State University, Columbus, USA"}]},{"given":"Yuvraj","family":"Agarwal","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, USA"}]},{"given":"Jason I.","family":"Hong","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,9,14]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"2020. Chapter 20. California Consumer Privacy Act Regulations (Feb 2020 revision). https:\/\/web.archive.org\/web\/20200619170238\/https:\/\/www.oag.ca.gov\/sites\/all\/files\/agweb\/pdfs\/privacy\/ccpa-text-of-mod-redline-020720.pdf. (Accessed on 09\/13\/2020).  2020. Chapter 20. California Consumer Privacy Act Regulations (Feb 2020 revision). https:\/\/web.archive.org\/web\/20200619170238\/https:\/\/www.oag.ca.gov\/sites\/all\/files\/agweb\/pdfs\/privacy\/ccpa-text-of-mod-redline-020720.pdf. (Accessed on 09\/13\/2020)."},{"key":"e_1_2_1_2_1","unstructured":"2021. GitHub - permissions-dispatcher\/PermissionsDispatcher: A declarative and comprehensive API to handle Android runtime permissions. https:\/\/web.archive.org\/web\/20201205195815\/https:\/\/github.com\/permissions-dispatcher\/PermissionsDispatcher. (Accessed on 02\/13\/2021).  2021. GitHub - permissions-dispatcher\/PermissionsDispatcher: A declarative and comprehensive API to handle Android runtime permissions. https:\/\/web.archive.org\/web\/20201205195815\/https:\/\/github.com\/permissions-dispatcher\/PermissionsDispatcher. (Accessed on 02\/13\/2021)."},{"key":"e_1_2_1_3_1","unstructured":"2021. Privacy - Features - Apple. https:\/\/web.archive.org\/web\/20210126192113\/https:\/\/www.apple.com\/privacy\/features\/. (Accessed on 01\/29\/2021).  2021. Privacy - Features - Apple. https:\/\/web.archive.org\/web\/20210126192113\/https:\/\/www.apple.com\/privacy\/features\/. (Accessed on 01\/29\/2021)."},{"key":"e_1_2_1_4_1","unstructured":"2021. Privacy in Android 11 | Android Developers. https:\/\/web.archive.org\/web\/20210129195758\/https:\/\/developer.android.com\/about\/versions\/11\/privacy. (Accessed on 01\/29\/2021).  2021. Privacy in Android 11 | Android Developers. https:\/\/web.archive.org\/web\/20210129195758\/https:\/\/developer.android.com\/about\/versions\/11\/privacy. (Accessed on 01\/29\/2021)."},{"key":"e_1_2_1_5_1","unstructured":"2021. Requesting Consent from European Users | Android | Google Developers. https:\/\/web.archive.org\/web\/20201109005634\/https:\/\/developers.google.com\/admob\/android\/eu-consent. (Accessed on 02\/13\/2021).  2021. Requesting Consent from European Users | Android | Google Developers. https:\/\/web.archive.org\/web\/20201109005634\/https:\/\/developers.google.com\/admob\/android\/eu-consent. (Accessed on 02\/13\/2021)."},{"key":"e_1_2_1_6_1","volume-title":"Proceeding of the 11th annual international conference on Mobile systems, applications, and services - MobiSys '13","author":"Agarwal Yuvraj","unstructured":"Yuvraj Agarwal and Malcolm Hall . 2013. ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing . In Proceeding of the 11th annual international conference on Mobile systems, applications, and services - MobiSys '13 . ACM Press . https:\/\/doi.org\/10.1145\/2462456.2464460 Yuvraj Agarwal and Malcolm Hall. 2013. ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing. In Proceeding of the 11th annual international conference on Mobile systems, applications, and services - MobiSys '13. ACM Press. https:\/\/doi.org\/10.1145\/2462456.2464460"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702210"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.70"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501616"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23006"},{"key":"e_1_2_1_13_1","volume-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS","author":"Bonn\u00e9 Bram","year":"2017","unstructured":"Bram Bonn\u00e9 , Sai Teja Peddinti , Igor Bilogrevic , and Nina Taft . 2017 . Exploring decision making with Android's runtime permission dialogs using in-context surveys . In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). 195--210. Bram Bonn\u00e9, Sai Teja Peddinti, Igor Bilogrevic, and Nina Taft. 2017. Exploring decision making with Android's runtime permission dialogs using in-context surveys. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). 195--210."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132029"},{"key":"e_1_2_1_16_1","unstructured":"Federal Trade Commission. 2013. Mobile privacy disclosures: Building trust through transparency: a federal trade commission staff report. https:\/\/www.ftc.gov\/sites\/default\/files\/documents\/reports\/mobile-privacy-disclosures-building-trust-through-transparency-federal-trade-commission-staff-report\/130201mobileprivacyreport.pdf. (Accessed on 08\/02\/2021).  Federal Trade Commission. 2013. Mobile privacy disclosures: Building trust through transparency: a federal trade commission staff report. https:\/\/www.ftc.gov\/sites\/default\/files\/documents\/reports\/mobile-privacy-disclosures-building-trust-through-transparency-federal-trade-commission-staff-report\/130201mobileprivacyreport.pdf. (Accessed on 08\/02\/2021)."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"e_1_2_1_18_1","unstructured":"Android Developer Document. 2020. App permissions best practices | Android Developers. https:\/\/developer.android.com\/training\/permissions\/usage-notes. (Accessed on 09\/17\/2020).  Android Developer Document. 2020. App permissions best practices | Android Developers. https:\/\/developer.android.com\/training\/permissions\/usage-notes. (Accessed on 09\/17\/2020)."},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM. https:\/\/doi.org\/10","author":"Ernst Michael D.","unstructured":"Michael D. Ernst , Ren\u00e9 Just , Suzanne Millstein , Werner Dietl , Stuart Pernsteiner , Franziska Roesner , Karl Koscher , Paulo Barros Barros , Ravi Bhoraskar , Seungyeop Han , Paul Vines , and Edward X. Wu . 2014. Collaborative Verification of Information Flow for a High-Assurance App Store . In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM. https:\/\/doi.org\/10 .1145\/2660267.2660343 Michael D. Ernst, Ren\u00e9 Just, Suzanne Millstein, Werner Dietl, Stuart Pernsteiner, Franziska Roesner, Karl Koscher, Paulo Barros Barros, Ravi Bhoraskar, Seungyeop Han, Paul Vines, and Edward X. Wu. 2014. Collaborative Verification of Information Flow for a High-Assurance App Store. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM. https:\/\/doi.org\/10.1145\/2660267.2660343"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106426.3106427"},{"key":"e_1_2_1_21_1","volume-title":"Trust and Trustworthy Computing","author":"Gibler Clint","unstructured":"Clint Gibler , Jonathan Crussell , Jeremy Erickson , and Hao Chen . 2012. AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale . In Trust and Trustworthy Computing . Springer Berlin Heidelberg , 291--307. https:\/\/doi.org\/10.1007\/978-3-642-30921-2_17 Clint Gibler, Jonathan Crussell, Jeremy Erickson, and Hao Chen. 2012. AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale. In Trust and Trustworthy Computing. Springer Berlin Heidelberg, 291--307. https:\/\/doi.org\/10.1007\/978-3-642-30921-2_17"},{"key":"e_1_2_1_22_1","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS","author":"Gluck Joshua","year":"2016","unstructured":"Joshua Gluck , Florian Schaub , Amy Friedman , Hana Habib , Norman Sadeh , Lorrie Faith Cranor , and Yuvraj Agarwal . 2016 . How short is too short? implications of length and framing on the effectiveness of privacy notices . In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). 321--340. Joshua Gluck, Florian Schaub, Amy Friedman, Hana Habib, Norman Sadeh, Lorrie Faith Cranor, and Yuvraj Agarwal. 2016. How short is too short? implications of length and framing on the effectiveness of privacy notices. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). 321--340."},{"key":"e_1_2_1_23_1","first-page":"1","article-title":"Privacy by designers: software developers' privacy mindset","volume":"23","author":"Hadar Irit","year":"2017","unstructured":"Irit Hadar , Tomer Hasson , Oshrat Ayalon , Eran Toch , Michael Birnhack , Sofia Sherman , and Arod Balissa . 2017 . Privacy by designers: software developers' privacy mindset . Empirical Software Engineering 23 , 1 (apr 2017), 259--289. https:\/\/doi.org\/10.1007\/s10664-017-9517-1 Irit Hadar, Tomer Hasson, Oshrat Ayalon, Eran Toch, Michael Birnhack, Sofia Sherman, and Arod Balissa. 2017. Privacy by designers: software developers' privacy mindset. Empirical Software Engineering 23, 1 (apr 2017), 259--289. https:\/\/doi.org\/10.1007\/s10664-017-9517-1","journal-title":"Empirical Software Engineering"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556978"},{"key":"e_1_2_1_25_1","volume-title":"Staveland","author":"Hart Sandra G.","year":"1988","unstructured":"Sandra G. Hart and Lowell E . Staveland . 1988 . Development of NASA-TLX (Task Load Index): Results of Empirical and Theoretical Research. In Advances in Psychology. Elsevier , 139--183. https:\/\/doi.org\/10.1016\/s0166-4115(08)62386-9 Sandra G. Hart and Lowell E. Staveland. 1988. Development of NASA-TLX (Task Load Index): Results of Empirical and Theoretical Research. In Advances in Psychology. Elsevier, 139--183. https:\/\/doi.org\/10.1016\/s0166-4115(08)62386-9"},{"key":"e_1_2_1_26_1","volume-title":"SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps. In 24th USENIX Security Symposium (USENIX Security 15)","author":"Huang Jianjun","year":"2015","unstructured":"Jianjun Huang , Zhichun Li , Xusheng Xiao , Zhenyu Wu , Kangjie Lu , Xiangyu Zhang , and Guofei Jiang . 2015 . SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps. In 24th USENIX Security Symposium (USENIX Security 15) . 977--992. Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, and Guofei Jiang. 2015. SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps. In 24th USENIX Security Symposium (USENIX Security 15). 977--992."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372296"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432205"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287056"},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 4, CSCW3 (jan","author":"Li Tianshi","year":"2021","unstructured":"Tianshi Li , Elizabeth Louie , Laura Dabbish , and Jason I. Hong . 2021. How Developers Talk About Personal Data and What It Means for User Privacy: A Case Study of a Developer Forum on Reddit . Proceedings of the ACM on Human-Computer Interaction 4, CSCW3 (jan 2021 ), 1--28. https:\/\/doi.org\/10.1145\/3432919 Tianshi Li, Elizabeth Louie, Laura Dabbish, and Jason I. Hong. 2021. How Developers Talk About Personal Data and What It Means for User Privacy: A Case Study of a Developer Forum on Reddit. Proceedings of the ACM on Human-Computer Interaction 4, CSCW3 (jan 2021), 1--28. https:\/\/doi.org\/10.1145\/3432919"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130941"},{"key":"e_1_2_1_32_1","volume-title":"10th Symposium On Usable Privacy and Security (SOUPS","author":"Lin Jialiu","year":"2014","unstructured":"Jialiu Lin , Bin Liu , Norman Sadeh , and Jason I Hong . 2014 . Modeling users' mobile app privacy preferences: Restoring usability in a sea of permission settings . In 10th Symposium On Usable Privacy and Security (SOUPS 2014). 199--212. Jialiu Lin, Bin Liu, Norman Sadeh, and Jason I Hong. 2014. Modeling users' mobile app privacy preferences: Restoring usability in a sea of permission settings. In 10th Symposium On Usable Privacy and Security (SOUPS 2014). 199--212."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_2_1_34_1","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS","author":"Liu Bin","year":"2016","unstructured":"Bin Liu , Mads Schaarup Andersen , Florian Schaub , Hazim Almuhimedi , Shikun Aerin Zhang , Norman Sadeh , Yuvraj Agarwal , and Alessandro Acquisti . 2016 . Follow my recommendations: A personalized privacy assistant for mobile app permissions . In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). 27--41. Bin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Aerin Zhang, Norman Sadeh, Yuvraj Agarwal, and Alessandro Acquisti. 2016. Follow my recommendations: A personalized privacy assistant for mobile app permissions. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). 27--41."},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the 32nd Annual ACM Symposium on User Interface Software and Technology. ACM. https:\/\/doi.org\/10","author":"Liu Michael Xieyang","unstructured":"Michael Xieyang Liu , Jane Hsieh , Nathan Hahn , Angelina Zhou , Emily Deng , Shaun Burley , Cynthia Taylor , Aniket Kittur , and Brad A. Myers . 2019. Unakite: Scaffolding Developers' Decision-Making Using the Web . In Proceedings of the 32nd Annual ACM Symposium on User Interface Software and Technology. ACM. https:\/\/doi.org\/10 .1145\/3332165.3347908 Michael Xieyang Liu, Jane Hsieh, Nathan Hahn, Angelina Zhou, Emily Deng, Shaun Burley, Cynthia Taylor, Aniket Kittur, and Brad A. Myers. 2019. Unakite: Scaffolding Developers' Decision-Making Using the Web. In Proceedings of the 32nd Annual ACM Symposium on User Interface Software and Technology. ACM. https:\/\/doi.org\/10.1145\/3332165.3347908"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2018.8506574"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23287"},{"key":"e_1_2_1_38_1","first-page":"543","article-title":"The cost of reading privacy policies","volume":"4","author":"McDonald Aleecia M","year":"2008","unstructured":"Aleecia M McDonald and Lorrie Faith Cranor . 2008 . The cost of reading privacy policies . I\/S: A Journal of Law and Policy for the Information Society 4 (2008), 543 . Aleecia M McDonald and Lorrie Faith Cranor. 2008. The cost of reading privacy policies. I\/S: A Journal of Law and Policy for the Information Society 4 (2008), 543.","journal-title":"I\/S: A Journal of Law and Policy for the Information Society"},{"key":"e_1_2_1_39_1","volume-title":"icom 10, 3 (nov","author":"Meixner Gerrit","year":"2011","unstructured":"Gerrit Meixner , Fabio Patern\u00f2 , and Jean Vanderdonckt . 2011. Past, Present, and Future of Model-Based User Interface Development . icom 10, 3 (nov 2011 ), 2--11. https:\/\/doi.org\/10.1524\/icom.2011.0026 Gerrit Meixner, Fabio Patern\u00f2, and Jean Vanderdonckt. 2011. Past, Present, and Future of Model-Based User Interface Development. icom 10, 3 (nov 2011), 2--11. https:\/\/doi.org\/10.1524\/icom.2011.0026"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369821"},{"key":"e_1_2_1_41_1","volume-title":"Interactive Systems: Design, Specification, and Verification","author":"Mueller Andreas","unstructured":"Andreas Mueller , Peter Forbrig , and Clemens Cap . 2001. Model-Based User Interface Design Using Markup Concepts . In Interactive Systems: Design, Specification, and Verification . Springer Berlin Heidelberg , 16--27. https:\/\/doi.org\/10.1007\/3-540-45522-1_2 Andreas Mueller, Peter Forbrig, and Clemens Cap. 2001. Model-Based User Interface Design Using Markup Concepts. In Interactive Systems: Design, Specification, and Verification. Springer Berlin Heidelberg, 16--27. https:\/\/doi.org\/10.1007\/3-540-45522-1_2"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376321"},{"key":"e_1_2_1_43_1","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS","author":"Rao Ashwini","year":"2016","unstructured":"Ashwini Rao , Florian Schaub , Norman Sadeh , Alessandro Acquisti , and Ruogu Kang . 2016 . Expecting the unexpected: Understanding mismatched privacy expectations online . In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). 77--96. Ashwini Rao, Florian Schaub, Norman Sadeh, Alessandro Acquisti, and Ruogu Kang. 2016. Expecting the unexpected: Understanding mismatched privacy expectations online. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). 77--96."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23039"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906392"},{"key":"e_1_2_1_46_1","volume-title":"Designing Effective Privacy Notices and Controls","author":"Schaub Florian","year":"2017","unstructured":"Florian Schaub , Rebecca Balebako , and Lorrie Faith Cranor . 2017. Designing Effective Privacy Notices and Controls . IEEE Internet Computing ( 2017 ), 1--1. https:\/\/doi.org\/10.1109\/mic.2017.265102930 Florian Schaub, Rebecca Balebako, and Lorrie Faith Cranor. 2017. Designing Effective Privacy Notices and Controls. IEEE Internet Computing (2017), 1--1. https:\/\/doi.org\/10.1109\/mic.2017.265102930"},{"key":"e_1_2_1_47_1","volume-title":"A Design Space for Effective Privacy Notices","author":"Schaub Florian","year":"1960","unstructured":"Florian Schaub , Rebecca Balebako , Adam L. Durity , and Lorrie Faith Cranor . [n.d.]. A Design Space for Effective Privacy Notices . In The Cambridge Handbook of Consumer Privacy. Cambridge University Press , 365--393. https:\/\/doi.org\/10.1017\/978131683 1960 .021 Florian Schaub, Rebecca Balebako, Adam L. Durity, and Lorrie Faith Cranor. [n.d.]. A Design Space for Effective Privacy Notices. In The Cambridge Handbook of Consumer Privacy. Cambridge University Press, 365--393. https:\/\/doi.org\/10.1017\/9781316831960.021"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568244"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808120"},{"key":"e_1_2_1_50_1","volume-title":"Saksham Chitkara, Kevin Ku, Matt Fredrikson, Jason Hong, and Yuvraj Agarwal.","author":"Srivastava Gaurav","year":"2017","unstructured":"Gaurav Srivastava , Kunal Bhuwalka , Swarup Kumar Sahoo , Saksham Chitkara, Kevin Ku, Matt Fredrikson, Jason Hong, and Yuvraj Agarwal. 2017 . PrivacyProxy: Leveraging Crowdsourcing and In Situ Traffic Analysis to Detect and Mitigate Information Leakage . arXiv preprint arXiv:1708.06384 (2017). Gaurav Srivastava, Kunal Bhuwalka, Swarup Kumar Sahoo, Saksham Chitkara, Kevin Ku, Matt Fredrikson, Jason Hong, and Yuvraj Agarwal. 2017. PrivacyProxy: Leveraging Crowdsourcing and In Situ Traffic Analysis to Detect and Mitigate Information Leakage. arXiv preprint arXiv:1708.06384 (2017)."},{"key":"e_1_2_1_51_1","volume-title":"Workshop on Mobile Security Technologies (MoST)","volume":"10","author":"Stevens Ryan","year":"2012","unstructured":"Ryan Stevens , Clint Gibler , Jon Crussell , Jeremy Erickson , and Hao Chen . 2012 . Investigating user privacy in android ad libraries . In Workshop on Mobile Security Technologies (MoST) , Vol. 10 . Citeseer. Ryan Stevens, Clint Gibler, Jon Crussell, Jeremy Erickson, and Hao Chen. 2012. Investigating user privacy in android ad libraries. In Workshop on Mobile Security Technologies (MoST), Vol. 10. Citeseer."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/192426.192479"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557400"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369819"},{"key":"e_1_2_1_55_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3314415","article-title":"LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications","volume":"3","author":"Wang Xiaolei","year":"2019","unstructured":"Xiaolei Wang , Andrea Continella , Yuexiang Yang , Yongzhong He , and Sencun Zhu . 2019 . LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications . Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3 , 1 (mar 2019), 1--25. https:\/\/doi.org\/10.1145\/3314415 Xiaolei Wang, Andrea Continella, Yuexiang Yang, Yongzhong He, and Sencun Zhu. 2019. LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 1 (mar 2019), 1--25. https:\/\/doi.org\/10.1145\/3314415","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173842"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2910516"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3478097","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3478097","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3478097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:32Z","timestamp":1750188692000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3478097"}},"subtitle":["Annotation-Guided Code Generation of In-App Privacy Notices"],"short-title":[],"issued":{"date-parts":[[2021,9,9]]},"references-count":57,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,9,9]]}},"alternative-id":["10.1145\/3478097"],"URL":"https:\/\/doi.org\/10.1145\/3478097","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,9]]},"assertion":[{"value":"2021-09-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}