{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T16:05:32Z","timestamp":1773158732578,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3559613.3563196","type":"proceedings-article","created":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T22:13:51Z","timestamp":1667340831000},"page":"159-173","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Privacy and Security Evaluation of Mobile Payment Applications Through User-Generated Reviews"],"prefix":"10.1145","author":[{"given":"Urvashi","family":"Kishnani","sequence":"first","affiliation":[{"name":"University of Denver, Denver, CO, USA"}]},{"given":"Naheem","family":"Noah","sequence":"additional","affiliation":[{"name":"University of Denver, Denver, CA, USA"}]},{"given":"Sanchari","family":"Das","sequence":"additional","affiliation":[{"name":"University of Denver, Denver, CO, USA"}]},{"given":"Rinku","family":"Dewri","sequence":"additional","affiliation":[{"name":"University of Denver, Denver, CO, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Aijn Abraham D Schlecht G Ma M Dobrushin and V Nadal. 2016. Mobile security framework (MobSF).  Aijn Abraham D Schlecht G Ma M Dobrushin and V Nadal. 2016. Mobile security framework (MobSF)."},{"key":"e_1_3_2_1_2_1","volume-title":"You are not your developer, either: A research agenda for usable security and privacy research beyond end users. 2016 IEEE Cybersecurity Development (SecDev)","author":"Acar Yasemin","year":"2016","unstructured":"Yasemin Acar , Sascha Fahl , and Michelle L Mazurek . 2016. You are not your developer, either: A research agenda for usable security and privacy research beyond end users. 2016 IEEE Cybersecurity Development (SecDev) ( 2016 ), 3--8. Yasemin Acar, Sascha Fahl, and Michelle L Mazurek. 2016. You are not your developer, either: A research agenda for usable security and privacy research beyond end users. 2016 IEEE Cybersecurity Development (SecDev) (2016), 3--8."},{"key":"e_1_3_2_1_3_1","volume-title":"Security issues in mobile payment systems","author":"Agarwal Shivani","year":"2007","unstructured":"Shivani Agarwal , Mitesh Khapra , Bernard Menezes , and Nirav Uchat . 2007. Security issues in mobile payment systems . Computer Society of India ( 2007 ), 142--152. Shivani Agarwal, Mitesh Khapra, Bernard Menezes, and Nirav Uchat. 2007. Security issues in mobile payment systems. Computer Society of India (2007), 142--152."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702210"},{"key":"e_1_3_2_1_5_1","volume-title":"The economics of mobile payments: Understanding stakeholder issues for an emerging financial technology application. Electronic commerce research and applications 7, 2","author":"Au Yoris A","year":"2008","unstructured":"Yoris A Au and Robert J Kauffman . 2008. The economics of mobile payments: Understanding stakeholder issues for an emerging financial technology application. Electronic commerce research and applications 7, 2 ( 2008 ), 141--164. Yoris A Au and Robert J Kauffman. 2008. The economics of mobile payments: Understanding stakeholder issues for an emerging financial technology application. Electronic commerce research and applications 7, 2 (2008), 141--164."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Rebecca Balebako Abigail Marsh Jialiu Lin Jason I Hong and Lorrie Faith Cranor. 2014. The privacy and security behaviors of smartphone app developers. (2014).  Rebecca Balebako Abigail Marsh Jialiu Lin Jason I Hong and Lorrie Faith Cranor. 2014. The privacy and security behaviors of smartphone app developers. (2014).","DOI":"10.14722\/usec.2014.23006"},{"key":"e_1_3_2_1_7_1","first-page":"127","article-title":"The future of the mobile payment as electronic payment system","volume":"8","author":"Bezovski Zlatko","year":"2016","unstructured":"Zlatko Bezovski . 2016 . The future of the mobile payment as electronic payment system . European Journal of Business and Management 8 , 8 (2016), 127 -- 132 . Zlatko Bezovski. 2016. The future of the mobile payment as electronic payment system. European Journal of Business and Management 8, 8 (2016), 127--132.","journal-title":"European Journal of Business and Management"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134663"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974010.74"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07302-5"},{"key":"e_1_3_2_1_11_1","volume-title":"Cybercrime to cost the world 10.5 trillion annually by","year":"2025","unstructured":"Cybercrimemag. 2021. Cybercrime to cost the world 10.5 trillion annually by 2025 . https:\/\/cybersecurityventures.com\/hackerpocalypse-cybercrime-report-2016\/ Cybercrimemag. 2021. Cybercrime to cost the world 10.5 trillion annually by 2025. https:\/\/cybersecurityventures.com\/hackerpocalypse-cybercrime-report-2016\/"},{"key":"e_1_3_2_1_12_1","volume-title":"present and future of mobile payments research: A literature review. Electronic commerce research and applications 7, 2","author":"Dahlberg Tomi","year":"2008","unstructured":"Tomi Dahlberg , Niina Mallat , Jan Ondrus , and Agnieszka Zmijewska . 2008. Past , present and future of mobile payments research: A literature review. Electronic commerce research and applications 7, 2 ( 2008 ), 165--181. Tomi Dahlberg, Niina Mallat, Jan Ondrus, and Agnieszka Zmijewska. 2008. Past, present and future of mobile payments research: A literature review. Electronic commerce research and applications 7, 2 (2008), 165--181."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_9"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the Human Factors and Ergonomics Society Annual Meeting","volume":"64","author":"Das Sanchari","year":"2020","unstructured":"Sanchari Das , Robert S Gutzwiller , Rod D Roscoe , Prashanth Rajivan , YangWang, L Jean Camp , and Roberto Hoyle . 2020 . Humans and technology for inclusive privacy and security . In Proceedings of the Human Factors and Ergonomics Society Annual Meeting , Vol. 64 . SAGE Publications Sage CA: Los Angeles, CA, 461--464. Sanchari Das, Robert S Gutzwiller, Rod D Roscoe, Prashanth Rajivan, YangWang, L Jean Camp, and Roberto Hoyle. 2020. Humans and technology for inclusive privacy and security. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 64. SAGE Publications Sage CA: Los Angeles, CA, 461--464."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA","author":"Das Sanchari","year":"2019","unstructured":"Sanchari Das , Bingxing Wang , Zachary Tingle , and L Jean Camp . 2019 . Evaluating User Perception of Multi-Factor Authentication: A Systematic Review . In Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019). Sanchari Das, Bingxing Wang, Zachary Tingle, and L Jean Camp. 2019. Evaluating User Perception of Multi-Factor Authentication: A Systematic Review. In Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10161999"},{"key":"e_1_3_2_1_17_1","unstructured":"Jayati Dev Sanchari Das and Linda Jean Camp. 2018. Privacy Practices Preferences and Compunctions: WhatsApp Users in India.. In HAISA. 135--146.  Jayati Dev Sanchari Das and Linda Jean Camp. 2018. Privacy Practices Preferences and Compunctions: WhatsApp Users in India.. In HAISA. 135--146."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2648.2001.01897.x"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766506"},{"key":"e_1_3_2_1_21_1","first-page":"4","article-title":"The privacy calculus: Mobile apps and user perceptions of privacy and security","volume":"2012","author":"Fife Elizabeth","year":"2012","unstructured":"Elizabeth Fife and Juan Orjuela . 2012 . The privacy calculus: Mobile apps and user perceptions of privacy and security . International Journal of Engineering Business Management 4, Godi?te 2012 (2012), 4 -- 11 . Elizabeth Fife and Juan Orjuela. 2012. The privacy calculus: Mobile apps and user perceptions of privacy and security. International Journal of Engineering Business Management 4, Godi?te 2012 (2012), 4--11.","journal-title":"International Journal of Engineering Business Management 4, Godi?te"},{"key":"e_1_3_2_1_22_1","volume-title":"Bruce Roberts, Winston Armstrong, Mark A Miller, Michael L Hultner, Anthony P Castillo, Jean-Christophe Ducom, Eric J Topol, and Steven R Steinhubl.","author":"Filkins Barbara L","year":"2016","unstructured":"Barbara L Filkins , Ju Young Kim , Bruce Roberts, Winston Armstrong, Mark A Miller, Michael L Hultner, Anthony P Castillo, Jean-Christophe Ducom, Eric J Topol, and Steven R Steinhubl. 2016 . Privacy and security in the era of digital health: what should translational researchers know and do about it? American journal of translational research 8, 3 (2016), 1560. Barbara L Filkins, Ju Young Kim, Bruce Roberts, Winston Armstrong, Mark A Miller, Michael L Hultner, Anthony P Castillo, Jean-Christophe Ducom, Eric J Topol, and Steven R Steinhubl. 2016. Privacy and security in the era of digital health: what should translational researchers know and do about it? American journal of translational research 8, 3 (2016), 1560."},{"key":"e_1_3_2_1_23_1","volume-title":"Precision-recall-gain curves: PR analysis done right. Advances in neural information processing systems 28","author":"Flach Peter","year":"2015","unstructured":"Peter Flach and Meelis Kull . 2015. Precision-recall-gain curves: PR analysis done right. Advances in neural information processing systems 28 ( 2015 ). Peter Flach and Meelis Kull. 2015. Precision-recall-gain curves: PR analysis done right. Advances in neural information processing systems 28 (2015)."},{"key":"e_1_3_2_1_24_1","volume-title":"Chongyang Chen, Christy MK Cheung, and Matthew KO Lee.","author":"Gong Xiang","year":"2019","unstructured":"Xiang Gong , Kem ZK Zhang , Chongyang Chen, Christy MK Cheung, and Matthew KO Lee. 2019 . What drives self-disclosure in mobile payment applications? The effect of privacy assurance approaches, network externality, and technology complementarity. Information Technology & People ( 2019). Xiang Gong, Kem ZK Zhang, Chongyang Chen, Christy MK Cheung, and Matthew KO Lee. 2019. What drives self-disclosure in mobile payment applications? The effect of privacy assurance approaches, network externality, and technology complementarity. Information Technology & People (2019)."},{"key":"e_1_3_2_1_25_1","unstructured":"Android Developers Guide. [n.d.]. App Security Best Practices: Android Developers. https:\/\/developer.android.com\/topic\/security\/best-practices  Android Developers Guide. [n.d.]. App Security Best Practices: Android Developers. https:\/\/developer.android.com\/topic\/security\/best-practices"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJES.2016.073752"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIII.2012.6339927"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3282894.3282895"},{"key":"e_1_3_2_1_29_1","volume-title":"Secure mobile payment systems. It professional 16, 3","author":"Isaac Jes\u00fas T\u00e9llez","year":"2014","unstructured":"Jes\u00fas T\u00e9llez Isaac and Zeadally Sherali . 2014. Secure mobile payment systems. It professional 16, 3 ( 2014 ), 36--43. Jes\u00fas T\u00e9llez Isaac and Zeadally Sherali. 2014. Secure mobile payment systems. It professional 16, 3 (2014), 36--43."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.10.035"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSC.2015.7050801"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijitcs.2015.10.05"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijieeb.2015.05.06"},{"key":"e_1_3_2_1_34_1","volume-title":"Adil Ahmad Langoo, and Shahul Assad.","author":"Islam Khan Burhan Ul","year":"2017","unstructured":"Burhan Ul Islam Khan , Rashidah F Olanrewaju , Asifa Mehraj Baba , Adil Ahmad Langoo, and Shahul Assad. 2017 . A compendious study of online payment systems: Past developments, present impact, and future considerations. International journal of advanced computer science and applications 8, 5 (2017). Burhan Ul Islam Khan, Rashidah F Olanrewaju, Asifa Mehraj Baba, Adil Ahmad Langoo, and Shahul Assad. 2017. A compendious study of online payment systems: Past developments, present impact, and future considerations. International journal of advanced computer science and applications 8, 5 (2017)."},{"key":"e_1_3_2_1_35_1","volume-title":"Emiliano De Cristofaro, and M Angela Sasse","author":"Krol Kat","year":"2015","unstructured":"Kat Krol , Eleni Philippou , Emiliano De Cristofaro, and M Angela Sasse . 2015 . \"They brought in the horrible key ring thing!\" Analysing the Usability of Two- Factor Authentication in UK Online Banking . arXiv preprint arXiv:1501.04434 (2015). Kat Krol, Eleni Philippou, Emiliano De Cristofaro, and M Angela Sasse. 2015. \"They brought in the horrible key ring thing!\" Analysing the Usability of Two- Factor Authentication in UK Online Banking. arXiv preprint arXiv:1501.04434 (2015)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11628-017-0336-7"},{"key":"e_1_3_2_1_37_1","volume-title":"Androbugs framework: An android application security vulnerability scanner. Blackhat Europe 2015","author":"Lin Yu-Cheng","year":"2015","unstructured":"Yu-Cheng Lin . 2015. Androbugs framework: An android application security vulnerability scanner. Blackhat Europe 2015 ( 2015 ). Yu-Cheng Lin. 2015. Androbugs framework: An android application security vulnerability scanner. Blackhat Europe 2015 (2015)."},{"key":"e_1_3_2_1_38_1","volume-title":"IEEE Symposium on Security and Privacy. 268--285","author":"Lyastani Sanam Ghorbani","year":"2020","unstructured":"Sanam Ghorbani Lyastani , Michael Schilling , Michaela Neumayr , Michael Backes , and Sven Bugiel . 2020 . Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication .. In IEEE Symposium on Security and Privacy. 268--285 . Sanam Ghorbani Lyastani, Michael Schilling, Michaela Neumayr, Michael Backes, and Sven Bugiel. 2020. Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication.. In IEEE Symposium on Security and Privacy. 268--285."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.30537\/sjcms.v5i2.883"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2007.08.001"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9375-7"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58469-0_36"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2938445"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2004.1431506"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2012.6334930"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4173372"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300698"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355584"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.85"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICoIA.2013.6650270"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2015.11.004"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103163"},{"key":"e_1_3_2_1_53_1","volume-title":"Ghada El Haddad, and Rodrigue Sokoudjou","author":"Sahnoune Zakaria","year":"2015","unstructured":"Zakaria Sahnoune , Esma A\u00efmeur , Ghada El Haddad, and Rodrigue Sokoudjou . 2015 . Watch your mobile payment: an empirical study of privacy disclosure. In 2015 IEEE Trustcom\/BigDataSE\/ISPA, Vol. 1 . IEEE , 934--941. Zakaria Sahnoune, Esma A\u00efmeur, Ghada El Haddad, and Rodrigue Sokoudjou. 2015. Watch your mobile payment: an empirical study of privacy disclosure. In 2015 IEEE Trustcom\/BigDataSE\/ISPA, Vol. 1. IEEE, 934--941."},{"key":"e_1_3_2_1_54_1","unstructured":"Maria Shitkova Justus Holler Tobias Heide Nico Clever and J\u00f6rg Becker. 2015. Towards usability guidelines for mobile websites and applications. (2015).  Maria Shitkova Justus Holler Tobias Heide Nico Clever and J\u00f6rg Becker. 2015. Towards usability guidelines for mobile websites and applications. (2015)."},{"key":"e_1_3_2_1_55_1","volume-title":"AIP conference proceedings","volume":"2016","author":"Sofian Nadiah Mohamad","year":"2018","unstructured":"Nadiah Mohamad Sofian , Ahmad Sobri Hashim , and Wan Fatimah Wan Ahmad . 2018 . A review on usability guidelines for designing mobile apps user interface for children with autism . In AIP conference proceedings , Vol. 2016 . AIP Publishing LLC, 0 20094. Nadiah Mohamad Sofian, Ahmad Sobri Hashim, and Wan Fatimah Wan Ahmad. 2018. A review on usability guidelines for designing mobile apps user interface for children with autism. In AIP conference proceedings, Vol. 2016. AIP Publishing LLC, 020094."},{"key":"e_1_3_2_1_56_1","unstructured":"Statista. [n.d.]. Digital payments - worldwide: Statista market forecast. https: \/\/www.statista.com\/outlook\/dmo\/fintech\/digital-payments\/worldwide  Statista. [n.d.]. Digital payments - worldwide: Statista market forecast. https: \/\/www.statista.com\/outlook\/dmo\/fintech\/digital-payments\/worldwide"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106290"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180445.3180447"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414536.2414577"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2021.102743"},{"key":"e_1_3_2_1_61_1","volume-title":"Proceedings of the Web","volume":"2","author":"Vidas Timothy","year":"2011","unstructured":"Timothy Vidas , Nicolas Christin , and Lorrie Cranor . 2011 . Curbing android permission creep . In Proceedings of the Web , Vol. 2 . Timothy Vidas, Nicolas Christin, and Lorrie Cranor. 2011. Curbing android permission creep. In Proceedings of the Web, Vol. 2."},{"key":"e_1_3_2_1_62_1","volume-title":"Mobile payment security, threats, and challenges. In 2016 second international conference on mobile and secure services (MobiSecServ)","author":"Hahn Christen","unstructured":"YongWang, Christen Hahn , and Kruttika Sutrave . 2016. Mobile payment security, threats, and challenges. In 2016 second international conference on mobile and secure services (MobiSecServ) . IEEE , 1--5. YongWang, Christen Hahn, and Kruttika Sutrave. 2016. Mobile payment security, threats, and challenges. In 2016 second international conference on mobile and secure services (MobiSecServ). IEEE, 1--5."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420956"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aci.2016.10.001"},{"key":"e_1_3_2_1_65_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Weir Charles","year":"2020","unstructured":"Charles Weir , Ben Hermann , and Sascha Fahl . 2020 . From needs to actions to secure apps? the effect of requirements and developer practices on app security . In 29th USENIX Security Symposium (USENIX Security 20) . 289--305. Charles Weir, Ben Hermann, and Sascha Fahl. 2020. From needs to actions to secure apps? the effect of requirements and developer practices on app security. In 29th USENIX Security Symposium (USENIX Security 20). 289--305."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.102065"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"crossref","unstructured":"Razieh Nokhbeh Zaeem Ahmad Ahbab Josh Bestor Hussam H Djadi Sunny Kharel Victor Lai Nick Wang and K Suzanne Barber. 2022. PrivacyCheck v3: Empowering Users with Higher-Level Understanding of Privacy Policies. In WSDM. 1593--1596.  Razieh Nokhbeh Zaeem Ahmad Ahbab Josh Bestor Hussam H Djadi Sunny Kharel Victor Lai Nick Wang and K Suzanne Barber. 2022. PrivacyCheck v3: Empowering Users with Higher-Level Understanding of Privacy Policies. In WSDM. 1593--1596.","DOI":"10.1145\/3488560.3502184"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623705"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 21st Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3559613.3563196","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3559613.3563196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:47Z","timestamp":1750186847000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3559613.3563196"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":68,"alternative-id":["10.1145\/3559613.3563196","10.1145\/3559613"],"URL":"https:\/\/doi.org\/10.1145\/3559613.3563196","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}