{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:21Z","timestamp":1750220001453,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,7]],"date-time":"2022-09-07T00:00:00Z","timestamp":1662508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,7]]},"DOI":"10.1145\/3524458.3547231","type":"proceedings-article","created":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T16:14:00Z","timestamp":1661271240000},"page":"24-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-aware Snippets: Enhancing Assessment of Balance between Privacy Risks and Benefits in Web Search"],"prefix":"10.1145","author":[{"given":"Yusuke","family":"Shimizu","sequence":"first","affiliation":[{"name":"Shizuoka University, Japan"}]},{"given":"Tetsushi","family":"Ohki","sequence":"additional","affiliation":[{"name":"Shizuoka University, Japan"}]},{"given":"Yusuke","family":"Yamamoto","sequence":"additional","affiliation":[{"name":"Shizuoka University, Japan"}]}],"member":"320","published-online":{"date-parts":[[2022,9,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"e_1_3_2_1_2_1","first-page":"1476","article-title":"A Survey on Web Tracking","volume":"105","author":"Bujlow Tomasz","year":"2017","unstructured":"Tomasz Bujlow , Valent\u00edn Carela-Espa\u00f1ol , Josep Sol\u00e9-Pareta , and Pere Barlet-Ros . 2017 . A Survey on Web Tracking : Mechanisms, Implications, and Defenses. Proc. IEEE 105 , 8 (2017), 1476 \u2013 1510 . Tomasz Bujlow, Valent\u00edn Carela-Espa\u00f1ol, Josep Sol\u00e9-Pareta, and Pere Barlet-Ros. 2017. A Survey on Web Tracking: Mechanisms, Implications, and Defenses. Proc. IEEE 105, 8 (2017), 1476\u20131510.","journal-title":"Mechanisms, Implications, and Defenses. Proc. IEEE"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 11th USENIX Symposium On Usable Privacy and Security (SOUPS","author":"Chanchary Farah","year":"2015","unstructured":"Farah Chanchary and Sonia Chiasson . 2015 . User Perceptions of Sharing, Advertising, and Tracking . In Proceedings of the 11th USENIX Symposium On Usable Privacy and Security (SOUPS 2015). 53\u201367. Farah Chanchary and Sonia Chiasson. 2015. User Perceptions of Sharing, Advertising, and Tracking. In Proceedings of the 11th USENIX Symposium On Usable Privacy and Security (SOUPS 2015). 53\u201367."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741679"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556978"},{"key":"e_1_3_2_1_6_1","volume-title":"C (jan","author":"Kokolakis Spyros","year":"2017","unstructured":"Spyros Kokolakis . 2017. Privacy Attitudes and Privacy Behaviour. Comput. Secur. 64 , C (jan 2017 ), 122\u2013134. Spyros Kokolakis. 2017. Privacy Attitudes and Privacy Behaviour. Comput. Secur. 64, C (jan 2017), 122\u2013134."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3406522.3446011"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501611"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 14th USENIX Symposium on Usable Privacy and Security (SOUPS","author":"Mathur Arunesh","year":"2018","unstructured":"Arunesh Mathur , Jessica Vitak , Arvind Narayanan , and Marshini Chetty . 2018 . Characterizing the Use of Browser-Based Blocking Extensions to Prevent Online Tracking . In Proceedings of the 14th USENIX Symposium on Usable Privacy and Security (SOUPS 2018). 103\u2013116. Arunesh Mathur, Jessica Vitak, Arvind Narayanan, and Marshini Chetty. 2018. Characterizing the Use of Browser-Based Blocking Extensions to Prevent Online Tracking. In Proceedings of the 14th USENIX Symposium on Usable Privacy and Security (SOUPS 2018). 103\u2013116."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3099023.3101411"},{"key":"e_1_3_2_1_11_1","volume-title":"The biggest lie on the Internet: ignoring the privacy policies and terms of service policies of social networking services. Information","author":"Obar Jonathan","year":"2018","unstructured":"Jonathan Obar and Anne Oeldorf-Hirsch . 2018. The biggest lie on the Internet: ignoring the privacy policies and terms of service policies of social networking services. Information , Communication & Society 23 (07 2018 ), 1\u201320. Jonathan Obar and Anne Oeldorf-Hirsch. 2018. The biggest lie on the Internet: ignoring the privacy policies and terms of service policies of social networking services. Information, Communication & Society 23 (07 2018), 1\u201320."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.27.16941"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2418297"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3102\/10769986027001077"},{"key":"e_1_3_2_1_15_1","volume-title":"The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. Information Systems Research 22 (01","author":"Tsai Janice","year":"2011","unstructured":"Janice Tsai , Serge Egelman , Lorrie Cranor , and Alessandro Acquisti . 2011. The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. Information Systems Research 22 (01 2011 ), 254\u2013268. Janice Tsai, Serge Egelman, Lorrie Cranor, and Alessandro Acquisti. 2011. The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. Information Systems Research 22 (01 2011), 254\u2013268."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335362"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00008"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557413"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3383583.3398519"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3295750.3298952"}],"event":{"name":"GoodIT 2022: ACM International Conference on Information Technology for Social Good","sponsor":["SIGCAS ACM Special Interest Group on Computers and Society"],"location":"Limassol Cyprus","acronym":"GoodIT 2022"},"container-title":["Proceedings of the 2022 ACM Conference on Information Technology for Social Good"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524458.3547231","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3524458.3547231","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:50:58Z","timestamp":1750182658000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524458.3547231"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,7]]},"references-count":20,"alternative-id":["10.1145\/3524458.3547231","10.1145\/3524458"],"URL":"https:\/\/doi.org\/10.1145\/3524458.3547231","relation":{},"subject":[],"published":{"date-parts":[[2022,9,7]]},"assertion":[{"value":"2022-09-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}