{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:48:49Z","timestamp":1776109729784,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T00:00:00Z","timestamp":1655683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Google Open Source"},{"name":"MassMutual Center of Excellence in Complex Systems and Data Science"},{"name":"Sentinelle Nord program from the Canada First Research Excellence Fund"},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,21]]},"DOI":"10.1145\/3531146.3534640","type":"proceedings-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T14:27:10Z","timestamp":1655735230000},"page":"2251-2262","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Limits of Individual Consent and Models of Distributed Consent in Online Social Networks"],"prefix":"10.1145","author":[{"given":"Juniper L.","family":"Lovato","sequence":"first","affiliation":[{"name":"Vermont Complex Systems Center, University of Vermont, USA"}]},{"given":"Antoine","family":"Allard","sequence":"additional","affiliation":[{"name":"D\u00e9partement de physique, de g\u00e9nie physique et d\u2019optique and Centre interdisciplinaire en mod\u00e9lisation math\u00e9matique, Universit\u00e9 Laval, Canada"}]},{"given":"Randall","family":"Harp","sequence":"additional","affiliation":[{"name":"Department of Philosophy, University of Vermont, USA"}]},{"given":"Jeremiah","family":"Onaolapo","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Vermont, USA"}]},{"given":"Laurent","family":"H\u00e9bert-Dufresne","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Vermont, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1086\/671754"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1017\/s1352325200000471"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.89.022801"},{"key":"e_1_3_2_1_4_1","volume-title":"Privacy regulation: Culturally universal or culturally specific?Journal of social issues 33, 3","author":"Altman Irwin","year":"1977","unstructured":"Irwin Altman. 1977. Privacy regulation: Culturally universal or culturally specific?Journal of social issues 33, 3 (1977), 66\u201384."},{"key":"e_1_3_2_1_5_1","first-page":"1","article-title":"The disconnective power of disinformation campaigns","volume":"71","author":"Asmolov Gregory","year":"2018","unstructured":"Gregory Asmolov. 2018. The disconnective power of disinformation campaigns. Journal of International Affairs 71, 1.5 (2018), 69\u201376.","journal-title":"Journal of International Affairs"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41562-018-0510-5"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380262"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Susan\u00a0B. Barnes. 2006. A privacy paradox: Social networking in the United States. First Monday 11i9(2006).","DOI":"10.5210\/fm.v11i9.1394"},{"key":"e_1_3_2_1_9_1","volume-title":"A History and Theory of Informed Consent","author":"Beauchamp L.","unstructured":"Tom\u00a0L. Beauchamp and Ruth\u00a0R. Faden. 1986. A History and Theory of Informed Consent. Oxford University Press, Oxford, United Kingdom."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2015.12.013"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.34"},{"key":"e_1_3_2_1_12_1","first-page":"1027","article-title":"Against notice skepticism in privacy (and elsewhere)","volume":"87","author":"Calo Ryan","year":"2011","unstructured":"Ryan Calo. 2011. Against notice skepticism in privacy (and elsewhere). Notre Dame L. Rev. 87(2011), 1027.","journal-title":"Notre Dame L. Rev."},{"key":"e_1_3_2_1_13_1","first-page":"877","article-title":"Principles of internet privacy","volume":"32","author":"Cate H","year":"1999","unstructured":"Fred\u00a0H Cate. 1999. Principles of internet privacy. Conn. L. Rev. 32(1999), 877.","journal-title":"Conn. L. Rev."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.2307\/1229517"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376389"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-021-27714-6"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.2966\/scrip.100113.1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11098-013-0230-7"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-3582-2_12"},{"key":"e_1_3_2_1_21_1","volume-title":"Hyperbolic discounting is rational: Valuing the far future with uncertain discount rates","author":"Farmer J\u00a0Doyne","year":"2009","unstructured":"J\u00a0Doyne Farmer and John Geanakoplos. 2009. Hyperbolic discounting is rational: Valuing the far future with uncertain discount rates. Cowles Foundation Discussion Paper No. 1719 (2009)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2016.0112"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","unstructured":"Nancy Fraser. 1990. Rethinking the Public Sphere: A Contribution to the Critique of Actually Existing Democracy. Soc. Text 25\/26(1990) 56\u201380. https:\/\/doi.org\/10.2307\/466240","DOI":"10.2307\/466240"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.1701172"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445925"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-06343-6"},{"key":"e_1_3_2_1_27_1","first-page":"13","article-title":"A classification of SQL-injection attacks and countermeasures, In Proceedings of the IEEE international symposium on secure software engineering","volume":"1","author":"Halfond G","year":"2006","unstructured":"William\u00a0G Halfond, Jeremy Viegas, Alessandro Orso, 2006. A classification of SQL-injection attacks and countermeasures, In Proceedings of the IEEE international symposium on secure software engineering. IEEE 1, 13\u201315.","journal-title":"IEEE"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1352325200000434"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1177\/0196859916667731"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12185"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/00455091.1982.10715825"},{"key":"e_1_3_2_1_32_1","volume-title":"One Man\u2019s Obsessive Fight to Reclaim His Cambridge Analytica Data. Retrieved","author":"Lapowsky Issie","year":"2020","unstructured":"Issie Lapowsky. 2019. One Man\u2019s Obsessive Fight to Reclaim His Cambridge Analytica Data. Retrieved October 5, 2020 from https:\/\/www.wired.com\/story\/one-mans-obsessive-fight-to-reclaim-his-cambridge-analytica-data\/"},{"key":"e_1_3_2_1_33_1","volume-title":"Fairness, Transparency and Discrimination. SSRN Electronic Journal 941 (April","author":"Leonard G.","year":"2018","unstructured":"Peter\u00a0G. Leonard. 2018. Emerging Concerns for Responsible Data Analytics: Trust, Fairness, Transparency and Discrimination. SSRN Electronic Journal 941 (April 2018), 151\u2013168. https:\/\/ssrn.com\/abstract=3154269"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2008.01432.x"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10506-019-09243-2"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10603-015-9303-7"},{"key":"e_1_3_2_1_37_1","volume-title":"Networked privacy: How teenagers negotiate context in social media. New media & society 16, 7","author":"Marwick E","year":"2014","unstructured":"Alice\u00a0E Marwick and Danah Boyd. 2014. Networked privacy: How teenagers negotiate context in social media. New media & society 16, 7 (2014), 1051\u20131067."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1108\/jices-08-2013-0030"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","unstructured":"Gibson Mba Jeremiah Onaolapo Gianluca Stringhini and Lorenzo Cavallaro. 2017. Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable. In Proceedings of the 26th International Conference on World Wide Web Companion (Perth Australia) (WWW \u201917 Companion). International World Wide Web Conferences Steering Committee Republic and Canton of Geneva CHE 1301\u20131310. https:\/\/doi.org\/10.1145\/3041021.3053892","DOI":"10.1145\/3041021.3053892"},{"key":"e_1_3_2_1_40_1","first-page":"543","article-title":"The cost of reading privacy policies","volume":"4","author":"McDonald M","year":"2008","unstructured":"Aleecia\u00a0M McDonald and Lorrie\u00a0Faith Cranor. 2008. The cost of reading privacy policies. Isjlp 4(2008), 543.","journal-title":"Isjlp"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10603-017-9353-0"},{"key":"e_1_3_2_1_42_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79(2004), 119.","journal-title":"Wash. L. Rev."},{"key":"e_1_3_2_1_43_1","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"Nissenbaum Helen","unstructured":"Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press, Stanford, CA, USA."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097286.3097336"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.3233\/SW-170283"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.87.925"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJCC.2014.058832"},{"key":"e_1_3_2_1_48_1","volume-title":"Communication boundary management: A theoretical model of managing disclosure of private information between marital couples. Communication theory 1, 4","author":"Petronio Sandra","year":"1991","unstructured":"Sandra Petronio. 1991. Communication boundary management: A theoretical model of managing disclosure of private information between marital couples. Communication theory 1, 4 (1991), 311\u2013335."},{"key":"e_1_3_2_1_49_1","unstructured":"Kevin Ponniah. 2020. How a Chinese agent used LinkedIn to hunt for targets. Retrieved Accessed: 2021-10-29 from https:\/\/www.bbc.com\/news\/world-asia-53544505"},{"key":"e_1_3_2_1_50_1","volume-title":"Reinventing Data Protection?, Serge Gutwirth, Yves Poullet, Paul De\u00a0Hert, C\u00e9cile de\u00a0Terwangne","author":"Rouvroy Antoinette","unstructured":"Antoinette Rouvroy and Yves Poullet. 2009. The Right to Informational Self-Determination and the Value of Self-Development: Reassessing the Importance of Privacy for Democracy. In Reinventing Data Protection?, Serge Gutwirth, Yves Poullet, Paul De\u00a0Hert, C\u00e9cile de\u00a0Terwangne, and Sjaak Nouwt (Eds.). Springer Netherlands, Dordrecht, 45\u201376."},{"key":"e_1_3_2_1_51_1","volume-title":"Consent Management Platforms Under the GDPR: Processors and\/or Controllers?","author":"Santos Cristiana","unstructured":"Cristiana Santos, Midas Nouwens, Michael Toth, Nataliia Bielova, and Vincent Roca. 2021. Consent Management Platforms Under the GDPR: Processors and\/or Controllers?. In Privacy Technologies and Policy, Nils Gruschka, Lu\u00eds Filipe\u00a0Coelho Antunes, Kai Rannenberg, and Prokopios Drogkaris (Eds.). Springer International Publishing, Cham, 47\u201369."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660460.2660470"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-014-9343-8"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.229011"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173644"},{"key":"e_1_3_2_1_56_1","first-page":"370","article-title":"Beyond notice and choice: Privacy, norms, and consent","author":"Sloan H","year":"2014","unstructured":"Robert\u00a0H Sloan and Richard Warner. 2014. Beyond notice and choice: Privacy, norms, and consent. J. High Tech. L. 14(2014), 370.","journal-title":"J. High Tech."},{"key":"e_1_3_2_1_57_1","volume-title":"The Digital Person: Technology and Privacy in the Information Age","author":"Solove J.","unstructured":"Daniel\u00a0J. Solove. 2004. The Digital Person: Technology and Privacy in the Information Age.New York University Press, New York, NY, USA."},{"key":"e_1_3_2_1_58_1","volume-title":"Introduction to percolation theory","author":"Stauffer Dietrich","unstructured":"Dietrich Stauffer and Ammon Aharony. 2018. Introduction to percolation theory. Taylor & Francis, London."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653738"},{"key":"e_1_3_2_1_60_1","unstructured":"Sam Thielman. 2015. Surveillance reform explainer: can the FBI still listen to my phone calls. Retrieved Accessed: 2021-09-29 from https:\/\/www.theguardian.com\/world\/2015\/jun\/03\/surveillance-reform-freedom-act-explainer-fbi-phone-calls-privacy"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2011.12.021"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1177\/0270467607311484"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076444.2076448"},{"key":"e_1_3_2_1_64_1","volume-title":"The logic of consent: The diversity and deceptiveness of consent as a defense to criminal conduct","author":"Westen Peter","unstructured":"Peter Westen. 2017. The logic of consent: The diversity and deceptiveness of consent as a defense to criminal conduct. Routledge, Oxfordshire, England, UK."},{"key":"e_1_3_2_1_65_1","volume-title":"Cambridge Analytica and the Plot to Break America","author":"Wylie Christopher","unstructured":"Christopher Wylie. 2019. Mindf*ck: Cambridge Analytica and the Plot to Break America. Random House, New York, NY."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.109.258701"},{"key":"e_1_3_2_1_67_1","volume-title":"The age of surveillance capitalism: the fight for a human future at the new frontier of power. Public Affairs","author":"Zuboff Shoshana","unstructured":"Shoshana Zuboff. 2019. The age of surveillance capitalism: the fight for a human future at the new frontier of power. Public Affairs, Boston, MA, USA."}],"event":{"name":"FAccT '22: 2022 ACM Conference on Fairness, Accountability, and Transparency","location":"Seoul Republic of Korea","acronym":"FAccT '22","sponsor":["ACM Association for Computing Machinery"]},"container-title":["2022 ACM Conference on Fairness Accountability and Transparency"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531146.3534640","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3531146.3534640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:31Z","timestamp":1750188691000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531146.3534640"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,20]]},"references-count":67,"alternative-id":["10.1145\/3531146.3534640","10.1145\/3531146"],"URL":"https:\/\/doi.org\/10.1145\/3531146.3534640","relation":{},"subject":[],"published":{"date-parts":[[2022,6,20]]},"assertion":[{"value":"2022-06-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}