{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T16:42:22Z","timestamp":1776530542997,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T00:00:00Z","timestamp":1651190400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Air Force Research Laboratory","award":["FA8750-15-2-0281"],"award-info":[{"award-number":["FA8750-15-2-0281"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1801472"],"award-info":[{"award-number":["CNS-1801472"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,29]]},"DOI":"10.1145\/3491102.3502012","type":"proceedings-article","created":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T16:34:58Z","timestamp":1651163698000},"page":"1-24","source":"Crossref","is-referenced-by-count":47,"title":["Understanding Challenges for Developers to Create Accurate Privacy Nutrition Labels"],"prefix":"10.1145","author":[{"given":"Tianshi","family":"Li","sequence":"first","affiliation":[{"name":"Human-Computer Interaction Institute, Carnegie Mellon University, United States"}]},{"given":"Kayla","family":"Reiman","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, United States"}]},{"given":"Yuvraj","family":"Agarwal","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, United States"}]},{"given":"Lorrie Faith","family":"Cranor","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, United States"}]},{"given":"Jason I.","family":"Hong","sequence":"additional","affiliation":[{"name":"Human-Computer Interaction Institute, Carnegie Mellon University, United States"}]}],"member":"320","published-online":{"date-parts":[[2022,4,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.25"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceeding of the 11th annual international conference on Mobile systems, applications, and services - MobiSys '13","author":"Agarwal Yuvraj","unstructured":"Yuvraj Agarwal and Malcolm Hall . 2013. ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing . In Proceeding of the 11th annual international conference on Mobile systems, applications, and services - MobiSys '13 . ACM Press . https:\/\/doi.org\/10.1145\/2462456.2464460 Yuvraj Agarwal and Malcolm Hall. 2013. ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing. In Proceeding of the 11th annual international conference on Mobile systems, applications, and services - MobiSys '13. ACM Press. https:\/\/doi.org\/10.1145\/2462456.2464460"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445677"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.70"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23006"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808119"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23039"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.29"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132029"},{"key":"e_1_3_2_1_10_1","first-page":"273","article-title":"Necessary but not sufficient: Standardized mechanisms for privacy notice and choice","author":"Cranor Lorrie\u00a0Faith","year":"2012","unstructured":"Lorrie\u00a0Faith Cranor . 2012 . Necessary but not sufficient: Standardized mechanisms for privacy notice and choice . J. on Telecomm. & High Tech. L. 10 (2012), 273 . Lorrie\u00a0Faith Cranor. 2012. Necessary but not sufficient: Standardized mechanisms for privacy notice and choice. J. on Telecomm. & High Tech. L. 10 (2012), 273.","journal-title":"J. on Telecomm. & High Tech."},{"key":"e_1_3_2_1_11_1","unstructured":"Manuel Egele Christopher Kruegel Engin Kirda and Giovanni Vigna. 2011. PiOS: Detecting Privacy Leaks in iOS Applications.. In NDSS. 177\u2013183.  Manuel Egele Christopher Kruegel Engin Kirda and Giovanni Vigna. 2011. PiOS: Detecting Privacy Leaks in iOS Applications.. In NDSS. 177\u2013183."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518752"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00043"},{"key":"e_1_3_2_1_14_1","first-page":"4","article-title":"Platform privacies: Governance, collaboration, and the different meanings of \u201cprivacy\u201d in iOS and Android development","volume":"20","author":"Greene Daniel","year":"2017","unstructured":"Daniel Greene and Katie Shilton . 2017 . Platform privacies: Governance, collaboration, and the different meanings of \u201cprivacy\u201d in iOS and Android development . New Media & Society 20 , 4 (apr 2017), 1640\u20131657. https:\/\/doi.org\/10.1177\/1461444817702397 Daniel Greene and Katie Shilton. 2017. Platform privacies: Governance, collaboration, and the different meanings of \u201cprivacy\u201d in iOS and Android development. New Media & Society 20, 4 (apr 2017), 1640\u20131657. https:\/\/doi.org\/10.1177\/1461444817702397","journal-title":"New Media & Society"},{"key":"e_1_3_2_1_15_1","first-page":"1","article-title":"Privacy by designers: software developers\u2019 privacy mindset","volume":"23","author":"Hadar Irit","year":"2017","unstructured":"Irit Hadar , Tomer Hasson , Oshrat Ayalon , Eran Toch , Michael Birnhack , Sofia Sherman , and Arod Balissa . 2017 . Privacy by designers: software developers\u2019 privacy mindset . Empirical Software Engineering 23 , 1 (apr 2017), 259\u2013289. https:\/\/doi.org\/10.1007\/s10664-017-9517-1 Irit Hadar, Tomer Hasson, Oshrat Ayalon, Eran Toch, Michael Birnhack, Sofia Sherman, and Arod Balissa. 2017. Privacy by designers: software developers\u2019 privacy mindset. Empirical Software Engineering 23, 1 (apr 2017), 259\u2013289. https:\/\/doi.org\/10.1007\/s10664-017-9517-1","journal-title":"Empirical Software Engineering"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985752"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753561"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466466"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287056"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432919"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3478097"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_3_2_1_24_1","first-page":"543","article-title":"The cost of reading privacy policies","volume":"4","author":"McDonald M","year":"2008","unstructured":"Aleecia\u00a0 M McDonald and Lorrie\u00a0Faith Cranor . 2008 . The cost of reading privacy policies . I\/S: A Journal of Law and Policy for the Information Society 4 (2008), 543 . Aleecia\u00a0M McDonald and Lorrie\u00a0Faith Cranor. 2008. The cost of reading privacy policies. I\/S: A Journal of Law and Policy for the Information Society 4 (2008), 543.","journal-title":"I\/S: A Journal of Law and Policy for the Information Society"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572586"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_3_2_1_27_1","volume-title":"App Developers","author":"Mhaidli H.","unstructured":"Abraham\u00a0 H. Mhaidli , Yixin Zou , and Florian Schaub . 2019. \u201d We Can\u2019t Live without Them! \u201d App Developers \u2019 Adoption of Ad Networks and Their Considerations of Consumer Risks(SOUPS\u201919). USENIX Association , USA, 225\u2013244. Abraham\u00a0H. Mhaidli, Yixin Zou, and Florian Schaub. 2019. \u201dWe Can\u2019t Live without Them!\u201d App Developers\u2019 Adoption of Ad Networks and Their Considerations of Consumer Risks(SOUPS\u201919). USENIX Association, USA, 225\u2013244."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411497.3420216"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133977"},{"key":"e_1_3_2_1_30_1","volume-title":"The coding manual for qualitative researchers","author":"Salda\u00f1a Johnny","unstructured":"Johnny Salda\u00f1a . 2015. The coding manual for qualitative researchers . Sage . Johnny Salda\u00f1a. 2015. The coding manual for qualitative researchers. Sage."},{"key":"e_1_3_2_1_31_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS 2015","author":"Schaub Florian","year":"2015","unstructured":"Florian Schaub , Rebecca Balebako , Adam\u00a0 L. Durity , and Lorrie\u00a0Faith Cranor . 2015 . A Design Space for Effective Privacy Notices . In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015 ). USENIX Association, Ottawa, 1\u201317. https:\/\/www.usenix.org\/conference\/soups 2015\/proceedings\/presentation\/schaub Florian Schaub, Rebecca Balebako, Adam\u00a0L. Durity, and Lorrie\u00a0Faith Cranor. 2015. A Design Space for Effective Privacy Notices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, 1\u201317. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/schaub"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering","author":"Senarath Awanthika","year":"2018","unstructured":"Awanthika Senarath and Nalin A . \u00a0G. Arachchilage. 2018. Why developers cannot embed privacy into software systems?: An empirical investigation . In Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering 2018 . ACM. https:\/\/doi.org\/10.1145\/3210459.3210484 Awanthika Senarath and Nalin A.\u00a0G. Arachchilage. 2018. Why developers cannot embed privacy into software systems?: An empirical investigation. In Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering 2018. ACM. https:\/\/doi.org\/10.1145\/3210459.3210484"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568244"},{"key":"e_1_3_2_1_34_1","volume-title":"Protecting Consumer Privacy in an Era of Rapid Change\u2013A Proposed Framework for Businesses and Policymakers. Journal of Privacy and Confidentiality (jun","author":"Staff FTC","year":"2011","unstructured":"FTC Staff . 2011. Protecting Consumer Privacy in an Era of Rapid Change\u2013A Proposed Framework for Businesses and Policymakers. Journal of Privacy and Confidentiality (jun 2011 ). https:\/\/doi.org\/10.29012\/jpc.v3i1.596 FTC Staff. 2011. Protecting Consumer Privacy in an Era of Rapid Change\u2013A Proposed Framework for Businesses and Policymakers. Journal of Privacy and Confidentiality (jun 2011). https:\/\/doi.org\/10.29012\/jpc.v3i1.596"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0038"},{"key":"e_1_3_2_1_36_1","volume-title":"Understanding Privacy-Related Questions on Stack Overflow","author":"Tahaei Mohammad","unstructured":"Mohammad Tahaei , Kami Vaniea , and Naomi Saphra . 2020. Understanding Privacy-Related Questions on Stack Overflow . Association for Computing Machinery , New York, NY, USA , 1\u201314. https:\/\/doi.org\/10.1145\/3313831.3376768 Mohammad Tahaei, Kami Vaniea, and Naomi Saphra. 2020. Understanding Privacy-Related Questions on Stack Overflow. Association for Computing Machinery, New York, NY, USA, 1\u201314. https:\/\/doi.org\/10.1145\/3313831.3376768"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24100"}],"event":{"name":"CHI '22: CHI Conference on Human Factors in Computing Systems","location":"New Orleans LA USA","acronym":"CHI '22","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491102.3502012","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491102.3502012","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491102.3502012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:06Z","timestamp":1750188666000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491102.3502012"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,29]]},"references-count":37,"alternative-id":["10.1145\/3491102.3502012","10.1145\/3491102"],"URL":"https:\/\/doi.org\/10.1145\/3491102.3502012","relation":{},"subject":[],"published":{"date-parts":[[2022,4,29]]}}}