{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:15:36Z","timestamp":1763968536367,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T00:00:00Z","timestamp":1682812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,30]]},"DOI":"10.1145\/3543507.3583534","type":"proceedings-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T23:30:25Z","timestamp":1682551825000},"page":"3132-3141","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Are Mobile Advertisements in Compliance with App\u2019s Age Group?"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8793-5367","authenticated-orcid":false,"given":"Yanjie","family":"Zhao","sequence":"first","affiliation":[{"name":"School of Software, Beihang University, China and Monash University, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5216-933X","authenticated-orcid":false,"given":"Tianming","family":"Liu","sequence":"additional","affiliation":[{"name":"Monash University, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1100-8633","authenticated-orcid":false,"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8147-8126","authenticated-orcid":false,"given":"Yepang","family":"Liu","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4928-7076","authenticated-orcid":false,"given":"John","family":"Grundy","sequence":"additional","affiliation":[{"name":"Monash University, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2990-1614","authenticated-orcid":false,"given":"Li","family":"Li","sequence":"additional","affiliation":[{"name":"School of Software, Beihang University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,4,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2022. AccessibilityService | Android Developers. https:\/\/developer.android.com\/reference\/android\/accessibilityservice\/AccessibilityService."},{"key":"e_1_3_2_1_2_1","unstructured":"2022. Hong Kong Society for the Protection of Children (HKSPC). https:\/\/www.hkspc.org\/php\/webcms_en\/public\/index.php3?refid=109&mode=published."},{"key":"e_1_3_2_1_3_1","unstructured":"2022. Neutral age screen - Manage target audience and app content settings. https:\/\/support.google.com\/googleplay\/android-developer\/answer\/9867159?visit_id=638009215648103129-3811598826&rd=1#neutral-agescreen."},{"key":"e_1_3_2_1_4_1","unstructured":"2022. Summaries of Updates to Google Play Policies. https:\/\/support.google.com\/googleplay\/android-developer\/answer\/9876714?hl=en&ref_topic=9877065."},{"key":"e_1_3_2_1_5_1","volume-title":"Studying ad library integration strategies of top free-to-download apps","author":"Ahasanuzzaman Md","year":"2020","unstructured":"Md Ahasanuzzaman, Safwat Hassan, and Ahmed\u00a0E Hassan. 2020. Studying ad library integration strategies of top free-to-download apps. IEEE Transactions on Software Engineering (2020)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"e_1_3_2_1_7_1","unstructured":"AppBrain. 2022. Android widgets and UI libraries. https:\/\/www.appbrain.com\/stats\/libraries\/tag\/ui-component\/android-widgets-and-ui-libraries."},{"key":"e_1_3_2_1_8_1","unstructured":"Pew\u00a0Research Center. 2020. Children\u2019s engagement with digital devices screen time. https:\/\/www.pewresearch.org\/internet\/2020\/07\/28\/childrens-engagement-with-digital-devices-screen-time\/."},{"key":"e_1_3_2_1_9_1","volume-title":"Revisiting Mobile Advertising Threats with MAdLife. In The World Wide Web Conference. ACM, 207\u2013217","author":"Chen Gong","year":"2019","unstructured":"Gong Chen, Wei Meng, and John Copeland. 2019. Revisiting Mobile Advertising Threats with MAdLife. In The World Wide Web Conference. ACM, 207\u2013217."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2013.36"},{"key":"e_1_3_2_1_11_1","unstructured":"Federal\u00a0Trade Commission. 2020. Children\u2019s Privacy. https:\/\/www.ftc.gov\/tips-advice\/business-center\/privacy-and-security\/children\u2019s-privacy."},{"key":"e_1_3_2_1_12_1","unstructured":"Federal\u00a0Trade Commission. 2022. Children\u2019s Online Privacy Protection Rule. https:\/\/www.ftc.gov\/enforcement\/rules\/rulemaking-regulatory-reform-proceedings\/childrens-online-privacy-protection-rule."},{"key":"e_1_3_2_1_13_1","unstructured":"Federal\u00a0Trade Commission. 2022. Complying with COPPA: Frequently Asked Questions. https:\/\/www.ftc.gov\/tips-advice\/business-center\/guidance\/complying-coppa-frequently-asked-questions-0."},{"key":"e_1_3_2_1_14_1","volume-title":"FraudDroid: Automated Ad Fraud Detection for Android Apps. In The 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE","author":"Dong Feng","year":"2018","unstructured":"Feng Dong, Haoyu Wang, Li Li, Yao Guo, Tegawend\u00e9\u00a0F Bissyand\u00e9, Tianming Liu, Guoai Xu, and Jacques Klein. 2018. FraudDroid: Automated Ad Fraud Detection for Android Apps. In The 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE 2018)."},{"key":"e_1_3_2_1_15_1","volume-title":"Advertising Literacy While Using Mobile Phones.","author":"Feijoo Beatriz","year":"2022","unstructured":"Beatriz Feijoo and Charo S\u00e1daba. 2022. When Ads Become Invisible: Minors\u2019 Advertising Literacy While Using Mobile Phones. (2022)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243218.3243221"},{"key":"e_1_3_2_1_17_1","unstructured":"General Data Protection\u00a0Regulation (GDPR). 2022. Conditions applicable to child\u2019s consent in relation to information society services. https:\/\/gdpr-info.eu\/art-8-gdpr\/."},{"key":"e_1_3_2_1_18_1","unstructured":"General Data Protection\u00a0Regulation (GDPR). 2022. General Data Protection Regulation (GDPR) Compliance Guidelines. https:\/\/gdpr.eu\/."},{"key":"e_1_3_2_1_19_1","unstructured":"Gio. 2021. Google Play removed Startapp SDK from family program. https:\/\/community.kodular.io\/t\/google-play-removed-startapp-sdk-from-family-program\/108718."},{"key":"e_1_3_2_1_20_1","unstructured":"Google Play\u00a0Console Help. 2022. Ads and Monetization. https:\/\/support.google.com\/googleplay\/android-developer\/answer\/9898834\/."},{"key":"e_1_3_2_1_21_1","unstructured":"Google Play\u00a0Console Help. 2022. Google Play Families Policies - Examples of common violations. https:\/\/support.google.com\/googleplay\/android-developer\/answer\/9893335#zippy=%2Cexamples-of-common-violations."},{"key":"e_1_3_2_1_22_1","unstructured":"Google Play\u00a0Console Help. 2022. Participate in the Families Ads Program. https:\/\/support.google.com\/googleplay\/android-developer\/answer\/9283445\/."},{"key":"e_1_3_2_1_23_1","unstructured":"Asraful Islam. 2021. What Can I Do? Violation of Families Policy Requirements. https:\/\/community.kodular.io\/t\/what-can-i-do-violation-of-families-policy-requirements\/130767."},{"key":"e_1_3_2_1_24_1","volume-title":"Madlens: Investigating into android in-app ad practice at api granularity","author":"Jin Ling","year":"2019","unstructured":"Ling Jin, Boyuan He, Guangyao Weng, Haitao Xu, Yan Chen, and Guanyu Guo. 2019. Madlens: Investigating into android in-app ad practice at api granularity. IEEE Transactions on Mobile Computing (2019)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873597"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380242"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2982248"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889178"},{"key":"e_1_3_2_1_29_1","unstructured":"Brian Pia. 2017. Sexually suggestive ads appearing on children\u2019s apps. https:\/\/abc3340.com\/archive\/sexually-suggestive-ads-appearing-on-childrens-apps."},{"key":"e_1_3_2_1_30_1","unstructured":"Google Play. 2021. Berita Bola Terkini. https:\/\/play.google.com\/store\/apps\/details?id=com.berita.bola.terkini.update."},{"key":"e_1_3_2_1_31_1","unstructured":"Google Play. 2022. Apps & Games content ratings on Google Play. https:\/\/support.google.com\/googleplay\/answer\/6209544."},{"key":"e_1_3_2_1_32_1","unstructured":"Google Play. 2022. HD Background Photo Editing. https:\/\/play.google.com\/store\/apps\/details?id=com.roniit.hdqualitybackground."},{"key":"e_1_3_2_1_33_1","unstructured":"Google Play. 2022. MoreinLive. https:\/\/play.google.com\/store\/apps\/details?id=com.acfantastic.moreinlive."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Vaibhav Rastogi Rui Shao Yan Chen Xiang Pan Shihong Zou and Ryan Riley. 2016. Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces.. In NDSS.","DOI":"10.14722\/ndss.2016.23234"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0021"},{"key":"e_1_3_2_1_36_1","unstructured":"Elena Root and Bogdan Melnykov. 2018. Malware Displaying Porn Ads Discovered in Game Apps on Google Play. https:\/\/research.checkpoint.com\/malware-displaying-porn-ads-discovered-in-game-apps-on-google-play\/."},{"key":"e_1_3_2_1_37_1","unstructured":"Mikey Smith. 2015. Porn advert shown in children\u2019s smartphone game to kids as young as five. https:\/\/www.mirror.co.uk\/news\/uk-news\/porn-advert-shown-childrens-smartphone-5855008."},{"key":"e_1_3_2_1_38_1","unstructured":"Jeff Stone. 2020. Scammers are abusing mobile ad networks in an attempt to phish Android app users. https:\/\/www.cyberscoop.com\/ad-network-malware-android-startapp-adsalsa-wandera\/."},{"key":"e_1_3_2_1_39_1","unstructured":"Ash Turner. 2022. How many smartphones are in the world?https:\/\/www.bankmycell.com\/blog\/how-many-phones-are-in-the-world."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1925805.1925818"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00024"},{"key":"e_1_3_2_1_42_1","unstructured":"Wikipedia. 2020. Elsagate. https:\/\/en.wikipedia.org\/wiki\/Elsagate."},{"key":"e_1_3_2_1_43_1","unstructured":"Wikipedia. 2022. Elsa (Frozen). https:\/\/en.wikipedia.org\/wiki\/Elsa_(Frozen)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416582"},{"key":"e_1_3_2_1_45_1","volume-title":"A Systematic Assessment on Android Third-party Library Detection Tools","author":"Zhan Xian","year":"2021","unstructured":"Xian Zhan, Tianming Liu, Yepang Liu, Yang Liu, Li Li, Haoyu Wang, and Xiapu Luo. 2021. A Systematic Assessment on Android Third-party Library Detection Tools. IEEE Transactions on Software Engineering (2021)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00048"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00054"}],"event":{"name":"WWW '23: The ACM Web Conference 2023","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Austin TX USA","acronym":"WWW '23"},"container-title":["Proceedings of the ACM Web Conference 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583534","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543507.3583534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:03Z","timestamp":1750178823000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583534"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,30]]},"references-count":47,"alternative-id":["10.1145\/3543507.3583534","10.1145\/3543507"],"URL":"https:\/\/doi.org\/10.1145\/3543507.3583534","relation":{},"subject":[],"published":{"date-parts":[[2023,4,30]]},"assertion":[{"value":"2023-04-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}