{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:26:41Z","timestamp":1772908001593,"version":"3.50.1"},"reference-count":109,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW1","license":[{"start":{"date-parts":[[2023,4,14]],"date-time":"2023-04-14T00:00:00Z","timestamp":1681430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100019827","name":"Meta","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100019827","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2023,4,14]]},"abstract":"<jats:p>Power exercised by large technology companies has led to concerns over privacy and data protection, evidenced by the passage of legislation including the EU's General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). While much privacy research has focused on how users perceive privacy and interact with companies, we focus on how privacy legislation is discussed among a different set of relationships-those between companies and investors. This paper investigates how companies translate the GDPR and CCPA into business risks in documents created for investors. We conduct a qualitative document analysis of annual regulatory filings (Form 10-K) from nine major technology companies. We outline five ways that technology companies consider GDPR and CCPA as business risks, describing both direct and indirect ways that the legislation may affect their businesses. We highlight how these findings are relevant for the broader CSCW and privacy research communities in research, design, and practice. Creating meaningful privacy changes within existing institutional structures requires some understanding of the dynamics of these companies' decision-making processes and the role of capital.<\/jats:p>","DOI":"10.1145\/3579515","type":"journal-article","created":{"date-parts":[[2023,4,16]],"date-time":"2023-04-16T17:23:07Z","timestamp":1681665787000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["Privacy Legislation as Business Risks: How GDPR and CCPA are Represented in Technology Companies' Investment Risk Disclosures"],"prefix":"10.1145","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8613-0380","authenticated-orcid":false,"given":"Richmond Y.","family":"Wong","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1085-0140","authenticated-orcid":false,"given":"Andrew","family":"Chong","sequence":"additional","affiliation":[{"name":"University of California Berkeley, Berkeley, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7553-3221","authenticated-orcid":false,"given":"R. Cooper","family":"Aspegren","sequence":"additional","affiliation":[{"name":"New York University, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,4,16]]},"reference":[{"key":"e_1_2_1_2_1","first-page":"193","article-title":"The Securities and Exchange Commission and the Growing Need for Cybersecurity in Modern Corporate America","volume":"54","author":"Avellan Norah C.","year":"2014","unstructured":"Norah C. Avellan. 2014. The Securities and Exchange Commission and the Growing Need for Cybersecurity in Modern Corporate America. Washburn Law Journal 54, 1 (2014), 193--226.","journal-title":"Washburn Law Journal"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3272973.3273012"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2014.1930"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/03085140600844902"},{"key":"e_1_2_1_6_1","unstructured":"Mark Bergen. 2021. Microsoft Will Allow More Repair Shops After Activist Protests. https:\/\/www.bloomberg.com\/news\/articles\/2021--10-07\/microsoft-will-allow-more-repair-shops-after-activist-protests"},{"key":"e_1_2_1_7_1","volume-title":"The tectonic shift to sustainable investing. https:\/\/www.blackrock.com\/institutions\/en-us\/insights\/investment-actions\/sustainable-investing-shift [Online","year":"2022","unstructured":"BlackRock. 2021. The tectonic shift to sustainable investing. https:\/\/www.blackrock.com\/institutions\/en-us\/insights\/investment-actions\/sustainable-investing-shift [Online; accessed 2022-07--15]."},{"key":"e_1_2_1_8_1","first-page":"117","article-title":"Theories of corporate governance","volume":"23","author":"Borlea Sorin Nicolae","year":"2013","unstructured":"Sorin Nicolae Borlea and Monica-Violeta Achim. 2013. Theories of corporate governance. Economics Series 23, 1 (2013), 117--128.","journal-title":"Economics Series"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--1--4020--9789--8_5"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/1525822X08329699"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359240"},{"key":"e_1_2_1_12_1","first-page":"1027","article-title":"Against Notice Skepticism in Privacy (and Elsewhere)","volume":"87","author":"Calo M. Ryan","year":"2012","unstructured":"M. Ryan Calo. 2012. Against Notice Skepticism in Privacy (and Elsewhere). Notre Dame Law Review 87, 3 (2012), 1027--1072.","journal-title":"Notre Dame Law Review"},{"key":"e_1_2_1_13_1","unstructured":"Robyn Caplan Meredith Clark and William Partin. 2020. Against Platform Determinism: A Critical Orientation. https:\/\/points.datasociety.net\/against-platform-determinism-899acdf88a3d"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820069"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461702.3462622"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376459"},{"key":"e_1_2_1_17_1","unstructured":"Privacy Rights Clearinghouse. 2020. California Consumer Privacy Act Basics."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/1475--679X.00011"},{"key":"e_1_2_1_19_1","volume-title":"Why You Shouldn't Use Google Chrome After New Privacy Disclosure. Forbes (20","author":"Doffman Zak","year":"2021","unstructured":"Zak Doffman. 2021. Why You Shouldn't Use Google Chrome After New Privacy Disclosure. Forbes (20 March 2021). https:\/\/www.forbes.com\/sites\/zakdoffman\/2021\/03\/20\/stop-using-google-chrome-on-apple-iphone-12-pro-max-ipad-and-macbook-pro\/"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858343"},{"key":"e_1_2_1_21_1","volume-title":"How Facebook Undermines Privacy Protections for Its 2 Billion WhatsApp Users. ProPublica (7","author":"Elkind Peter","year":"2021","unstructured":"Peter Elkind, Jack Gillum, and Craig Silverman. 2021. How Facebook Undermines Privacy Protections for Its 2 Billion WhatsApp Users. ProPublica (7 Sept. 2021). https:\/\/www.propublica.org\/article\/how-facebook-undermines-privacy-protections-for-its-2-billion-whatsapp-users"},{"key":"e_1_2_1_22_1","first-page":"49","article-title":"Mobile Privacy and Business-to-Platform Dependencies: An Analysis of SEC Disclosures","volume":"14","author":"Fathaigh Ronan O","year":"2018","unstructured":"Ronan O Fathaigh, Joris van Hoboken, and Nico van Eijk. 2018. Mobile Privacy and Business-to-Platform Dependencies: An Analysis of SEC Disclosures. Journal of Business and Technology Law 14, 1 (2018), 49--105.","journal-title":"Journal of Business and Technology Law"},{"key":"e_1_2_1_23_1","article-title":"Groundbreaking\" or Broken? An Analysis of SEC Cybersecurity Disclosure Guidance, its Effectiveness, and Implications","volume":"77","author":"Ferraro Matthew F.","year":"2014","unstructured":"Matthew F. Ferraro. 2014. \"Groundbreaking\" or Broken? An Analysis of SEC Cybersecurity Disclosure Guidance, its Effectiveness, and Implications. Albany Law Review 77 (2014), 51 pages.","journal-title":"Albany Law Review"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3370271"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3375157"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300723"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.2307\/41165018"},{"key":"e_1_2_1_29_1","volume-title":"A Friedman doctrine - The Social Responsibility of Business Is to Increase Its Profits. New York Times Magazine (13","author":"Friedman Milton","year":"1970","unstructured":"Milton Friedman. 1970. A Friedman doctrine - The Social Responsibility of Business Is to Increase Its Profits. New York Times Magazine (13 Sept. 1970)."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2020.100468"},{"key":"e_1_2_1_33_1","unstructured":"Jacob Greenspon. 2019. Big a Problem Is It That a Few Shareholders Own Stock in So Many Competing Companies. https:\/\/hbr.org\/2019\/02\/how-big-a-problem-is-it-that-a-few-shareholders-own-stock-in-so-many-competing-companies [Online; accessed 2022-07-09]."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311957.3358610"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.31235\/osf.io"},{"key":"e_1_2_1_36_1","volume-title":"Doorbell-camera firm Ring has partnered with 400 police forces, extending surveillance concerns. The Washington Post (28 8","author":"Harwell Drew","year":"2019","unstructured":"Drew Harwell. 2019. Doorbell-camera firm Ring has partnered with 400 police forces, extending surveillance concerns. The Washington Post (28 8 2019)."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444820958725"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316411292.007"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/13600834.2019.1573501"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858470"},{"key":"e_1_2_1_41_1","volume-title":"GRI Standards - English. https:\/\/www.globalreporting.org\/how-to-use-the-gri-standards\/gri-standards-english-language\/ [Online","author":"Initiative Global Reporting","year":"2022","unstructured":"Global Reporting Initiative. 0. GRI Standards - English. https:\/\/www.globalreporting.org\/how-to-use-the-gri-standards\/gri-standards-english-language\/ [Online; accessed 2022-07-09]."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.28968\/cftt.v4i1.29638"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470742"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v12i6.1904"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531674"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557332"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441902"},{"key":"e_1_2_1_48_1","volume-title":"CCPA and GDPR Comparison Chart. https:\/\/iapp.org\/media\/pdf\/resource_center\/CCPA_GDPR_Chart_PracticalLaw_2019.pdf [Online","author":"Jehl Laura","year":"2022","unstructured":"Laura Jehl and Alan Friel. 2019. CCPA and GDPR Comparison Chart. https:\/\/iapp.org\/media\/pdf\/resource_center\/CCPA_GDPR_Chart_PracticalLaw_2019.pdf [Online; accessed 2022-01--11]."},{"key":"e_1_2_1_49_1","volume-title":"Institutional Investors Are Flexing Their ESG Muscles. https:\/\/www.bloomberg.com\/opinion\/articles\/2022-04--13\/institutional-investors-are-flexing-their-esg-muscles [Online","author":"Kaissar Nir","year":"2022","unstructured":"Nir Kaissar. 2022. Institutional Investors Are Flexing Their ESG Muscles. https:\/\/www.bloomberg.com\/opinion\/articles\/2022-04--13\/institutional-investors-are-flexing-their-esg-muscles [Online; accessed 2022-07-09]."},{"key":"e_1_2_1_50_1","volume-title":"Comparing Enforcement: GDPR vs. CCPA vs. CPRA. https:\/\/tomkemp.blog\/2020\/06\/04\/comparing-enforcement-gdpr-vs-ccpa-vs-cpra\/ [Online","author":"Kemp Tom","year":"2020","unstructured":"Tom Kemp. 2020. Comparing Enforcement: GDPR vs. CCPA vs. CPRA. https:\/\/tomkemp.blog\/2020\/06\/04\/comparing-enforcement-gdpr-vs-ccpa-vs-cpra\/ [Online; accessed 2022-01--10]."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359310"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359260"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274361"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702548"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2018.06.003"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134705"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274378"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bar.2006.05.002"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1177\/0042098017736713"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3512899"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376445"},{"key":"e_1_2_1_62_1","first-page":"543","article-title":"The Cost of Reading Privacy Policies","volume":"4","author":"McDonald Aleecia M","year":"2008","unstructured":"Aleecia M McDonald and Lorrie Faith Cranor. 2008. The Cost of Reading Privacy Policies. I\/S: A Journal of Law and Policy for the Information Society 4, 3 (2008), 543--568.","journal-title":"I\/S: A Journal of Law and Policy for the Information Society"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3375174"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376167"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479565"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1353\/sor.2019.0022"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492853"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415186"},{"key":"e_1_2_1_69_1","unstructured":"Michael Muller. 2014. Whose Values? Whose Design? (2014). http:\/\/ethicsworkshopcscw2014.files.wordpress.com\/2013\/10\/muller-whose-values.pdf"},{"key":"e_1_2_1_70_1","volume-title":"Privacy Impact Assessments: The Privacy Office Official Guidance (June","author":"U.S. Department of Homeland Security. 2010.","year":"2010","unstructured":"U.S. Department of Homeland Security. 2010. Privacy Impact Assessments: The Privacy Office Official Guidance (June 2010). https:\/\/www.dhs.gov\/sites\/default\/files\/publications\/privacy_pia_guidance_june2010_0.pdf [Online; accessed 2017-01-01]."},{"key":"e_1_2_1_71_1","first-page":"595","article-title":"False forward-looking statements and the PSLRA's safe harbor","volume":"86","author":"Olaz\u00e1bal Ann Morales","year":"2011","unstructured":"Ann Morales Olaz\u00e1bal. 2011. False forward-looking statements and the PSLRA's safe harbor. Indiana Law Journal 86, 2 (2011), 595--643.","journal-title":"Indiana Law Journal"},{"key":"e_1_2_1_72_1","first-page":"1","article-title":"Voluntary risk disclosure in corporate annual reports: An empirical review","volume":"6","author":"Onoja Anthony","year":"2015","unstructured":"Anthony Onoja and Godwin O Agada. 2015. Voluntary risk disclosure in corporate annual reports: An empirical review. Research Journal of Finance and Accounting 6, 17 (2015), 1--8.","journal-title":"Research Journal of Finance and Accounting"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274405"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951720939605"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3325480.3329181"},{"key":"e_1_2_1_76_1","first-page":"1535","article-title":"From Securities to Cybersecurity: The SEC Zeroes In on Cybersecurity","volume":"61","author":"Rabinowitz Rebecca","year":"2020","unstructured":"Rebecca Rabinowitz. 2020. From Securities to Cybersecurity: The SEC Zeroes In on Cybersecurity. Boston College Law Review 61, 4 (2020), 1535.","journal-title":"Boston College Law Review"},{"key":"e_1_2_1_77_1","volume-title":"2020 RDR Index methodology. https:\/\/rankingdigitalrights.org\/index2020\/methodology [Online","author":"Rights Ranking Digital","year":"2022","unstructured":"Ranking Digital Rights. 2020. 2020 RDR Index methodology. https:\/\/rankingdigitalrights.org\/index2020\/methodology [Online; accessed 2022-07-09]."},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987592.2987608"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531692"},{"key":"e_1_2_1_80_1","volume-title":"Investigating the Compliance of Android App Developers with the CCPA. Technical Report. Workshop on Technology and Consumer Protection (ConPro '21)","author":"Samarin Nikita","year":"2021","unstructured":"Nikita Samarin, Shayna Kothari, Zaina Siyed, Primal Wijesekera, and Jordan Fischer. 2021. Investigating the Compliance of Android App Developers with the CCPA. Technical Report. Workshop on Technology and Consumer Protection (ConPro '21). https:\/\/www.ieee-security.org\/TC\/SPW2021\/ConPro\/papers\/samarin-conpro21.pdf"},{"key":"e_1_2_1_81_1","first-page":"97","article-title":"Human Rights Meets Securities Regulation","volume":"54","author":"Sarfaty Galit","year":"2013","unstructured":"Galit Sarfaty. 2013. Human Rights Meets Securities Regulation. Virginia Journal of International Law 54 (2013), 97--126.","journal-title":"Virginia Journal of International Law"},{"key":"e_1_2_1_82_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS 2015)","author":"Schaub Florian","year":"2015","unstructured":"Florian Schaub, Rebecca Balebako, Adam L Durity, and Lorrie Faith Cranor. 2015. A Design Space for Effective Privacy Notices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015) (2015). 1--17."},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--28036--8"},{"key":"e_1_2_1_84_1","volume-title":"CF Disclosure Guidance: Topic No. 2: Cybersecurity. https:\/\/www.sec.gov\/divisions\/corpfin\/guidance\/cfguidance-topic2.htm [Online","author":"US Securities and Exchange Commission","year":"2021","unstructured":"US Securities and Exchange Commission. 2011. CF Disclosure Guidance: Topic No. 2: Cybersecurity. https:\/\/www.sec.gov\/divisions\/corpfin\/guidance\/cfguidance-topic2.htm [Online; accessed 2021-02--16]."},{"key":"e_1_2_1_85_1","unstructured":"US Securities and Exchange Commission. 2018. Commission Statement and Guidance on Public Company Cybersecurity Disclosures. https:\/\/www.sec.gov\/rules\/interp\/2018\/33--10459.pdf"},{"key":"e_1_2_1_86_1","unstructured":"US Securities and Exchange Commission. 2019. Division of Enforcement 2019 Annual Report. https:\/\/www.sec.gov\/files\/enforcement-annual-report-2019.pdf"},{"key":"e_1_2_1_87_1","volume-title":"Legal Proceedings, and Risk Factors Under Regulation S-K. https:\/\/www.sec.gov\/news\/press-release\/2020--192 [Online; accessed 2022-07-09].","author":"US Securities and Exchange Commission","year":"2020","unstructured":"US Securities and Exchange Commission. 2020. SEC Adopts Rule Amendments to Modernize Disclosures of Business, Legal Proceedings, and Risk Factors Under Regulation S-K. https:\/\/www.sec.gov\/news\/press-release\/2020--192 [Online; accessed 2022-07-09]."},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449195"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1561\/1100000073"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531625"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/3148330.3149407"},{"key":"e_1_2_1_92_1","first-page":"1880","article-title":"Privacy Self-Management and the Consent Dilemma","volume":"126","author":"Solove Daniel J","year":"2013","unstructured":"Daniel J Solove. 2013. Privacy Self-Management and the Consent Dilemma. Harvard Law Review 126 (2013), 1880--1903.","journal-title":"Harvard Law Review"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.21428\/93b2c832.e3a8d187"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.7.1.111"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--56286--1_9"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2856503"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858420"},{"key":"e_1_2_1_98_1","volume-title":"The shareholder fight that forced Apple's hand on repair rights. The Verge (17","author":"Stone Maddie","year":"2021","unstructured":"Maddie Stone. 2021. The shareholder fight that forced Apple's hand on repair rights. The Verge (17 Nov. 2021). https:\/\/www.theverge.com\/2021\/11\/17\/22787336\/apple-right-to-repair-self-service-diy-reason-microsoft"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00749282"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445768"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958906"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/3462204.3481724"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/3171533.3171538"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/3532106.3533559"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1093\/idpl"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479499"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3406865.3418590"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675229"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376515"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579621"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300492"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134746"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311957.3359430"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579515","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3579515","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:24Z","timestamp":1750182684000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579515"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,14]]},"references-count":109,"journal-issue":{"issue":"CSCW1","published-print":{"date-parts":[[2023,4,14]]}},"alternative-id":["10.1145\/3579515"],"URL":"https:\/\/doi.org\/10.1145\/3579515","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,14]]},"assertion":[{"value":"2023-04-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}