{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T11:09:12Z","timestamp":1762254552850,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"CSIRO's Data61"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3579856.3590335","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:52:13Z","timestamp":1688568733000},"page":"65-79","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Investigating Users\u2019 Understanding of Privacy Policies of Virtual Personal Assistant Applications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-7336-5144","authenticated-orcid":false,"given":"Baiqi","family":"Chen","sequence":"first","affiliation":[{"name":"University of Queensland, Australia and CSIRO\u2019s Data61, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0626-3576","authenticated-orcid":false,"given":"Tingmin","family":"Wu","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5611-3483","authenticated-orcid":false,"given":"Yanjun","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6138-7742","authenticated-orcid":false,"given":"Mohan Baruwal","family":"Chhetri","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6390-9890","authenticated-orcid":false,"given":"Guangdong","family":"Bai","sequence":"additional","affiliation":[{"name":"University of Queensland, Australia"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1998. Children\u2019s Online Privacy Protection Rule (\"COPPA\"). https:\/\/www.ftc.gov\/legal-library\/browse\/rules\/childrens-online-privacy-protection-rule-coppa  1998. Children\u2019s Online Privacy Protection Rule (\"COPPA\"). https:\/\/www.ftc.gov\/legal-library\/browse\/rules\/childrens-online-privacy-protection-rule-coppa"},{"key":"e_1_3_2_1_2_1","unstructured":"2016. General Data Protection Regulation (GDPR) - Official Legal Text. https:\/\/gdpr-info.eu  2016. General Data Protection Regulation (GDPR) - Official Legal Text. https:\/\/gdpr-info.eu"},{"key":"e_1_3_2_1_3_1","unstructured":"2018. Amazon Mechanical Turk. https:\/\/www.mturk.com\/  2018. Amazon Mechanical Turk. https:\/\/www.mturk.com\/"},{"key":"e_1_3_2_1_4_1","unstructured":"2020. fuzzywuzzy PyPI. https:\/\/pypi.org\/project\/fuzzywuzzy\/  2020. fuzzywuzzy PyPI. https:\/\/pypi.org\/project\/fuzzywuzzy\/"},{"key":"e_1_3_2_1_5_1","unstructured":"2022. Amazon Alexa Console. https:\/\/developer.amazon.com\/alexa\/console\/ask  2022. Amazon Alexa Console. https:\/\/developer.amazon.com\/alexa\/console\/ask"},{"key":"e_1_3_2_1_6_1","unstructured":"2022. Amazon.com: Ultimate HISTORY Quiz : Alexa Skills. https:\/\/www.amazon.com\/Television-Networks-Mobile-Ultimate-HISTORY\/dp\/B075ZS916K  2022. Amazon.com: Ultimate HISTORY Quiz : Alexa Skills. https:\/\/www.amazon.com\/Television-Networks-Mobile-Ultimate-HISTORY\/dp\/B075ZS916K"},{"key":"e_1_3_2_1_7_1","unstructured":"2022. California Consumer Privacy Act (CCPA) | State of California - Department of Justice - Office of the Attorney General. https:\/\/oag.ca.gov\/privacy\/ccpa  2022. California Consumer Privacy Act (CCPA) | State of California - Department of Justice - Office of the Attorney General. https:\/\/oag.ca.gov\/privacy\/ccpa"},{"key":"e_1_3_2_1_8_1","unstructured":"Apple. 2022. Dictionary User Guide for Mac. https:\/\/support.apple.com\/en-au\/guide\/dictionary\/dic34880\/mac  Apple. 2022. Dictionary User Guide for Mac. https:\/\/support.apple.com\/en-au\/guide\/dictionary\/dic34880\/mac"},{"key":"e_1_3_2_1_9_1","volume-title":"Integrating textual and pictorial information via pop-up windows: An experimental study. Behaviour & information technology 17, 5","author":"B\u00e9trancourt Mireille","year":"1998","unstructured":"Mireille B\u00e9trancourt and Andr\u00e9 Bisseret . 1998. Integrating textual and pictorial information via pop-up windows: An experimental study. Behaviour & information technology 17, 5 ( 1998 ), 263\u2013273. Mireille B\u00e9trancourt and Andr\u00e9 Bisseret. 1998. Integrating textual and pictorial information via pop-up windows: An experimental study. Behaviour & information technology 17, 5 (1998), 263\u2013273."},{"key":"e_1_3_2_1_10_1","volume-title":"Privacy policies for apps targeted toward youth: descriptive analysis of readability. JMIR mHealth and uHealth 6, 1","author":"Das Gitanjali","year":"2018","unstructured":"Gitanjali Das , Cynthia Cheung , Camille Nebeker , Matthew Bietz , Cinnamon Bloss , 2018. Privacy policies for apps targeted toward youth: descriptive analysis of readability. JMIR mHealth and uHealth 6, 1 ( 2018 ), e7626. Gitanjali Das, Cynthia Cheung, Camille Nebeker, Matthew Bietz, Cinnamon Bloss, 2018. Privacy policies for apps targeted toward youth: descriptive analysis of readability. JMIR mHealth and uHealth 6, 1 (2018), e7626."},{"key":"e_1_3_2_1_11_1","unstructured":"dvnc. 2015. dvnc\/annotator. https:\/\/github.com\/dvnc\/annotator  dvnc. 2015. dvnc\/annotator. https:\/\/github.com\/dvnc\/annotator"},{"key":"e_1_3_2_1_12_1","volume-title":"SkillVet: Automated Traceability Analysis of Amazon Alexa Skills","author":"Edu Jide","year":"2021","unstructured":"Jide Edu , Xavi\u00a0Ferrer Aran , Jose Such , and Guillermo Suarez-Tangil . 2021. SkillVet: Automated Traceability Analysis of Amazon Alexa Skills . IEEE Transactions on Dependable and Secure Computing ( 2021 ). Jide Edu, Xavi\u00a0Ferrer Aran, Jose Such, and Guillermo Suarez-Tangil. 2021. SkillVet: Automated Traceability Analysis of Amazon Alexa Skills. IEEE Transactions on Dependable and Secure Computing (2021)."},{"volume-title":"Privacy policies and users","author":"Ermakova Tatiana","key":"e_1_3_2_1_13_1","unstructured":"Tatiana Ermakova , Annika Baumann , Benjamin Fabian , and Hanna Krasnova . 2014. Privacy policies and users \u2019 trust: does readability matter?. In AMCIS. Tatiana Ermakova, Annika Baumann, Benjamin Fabian, and Hanna Krasnova. 2014. Privacy policies and users\u2019 trust: does readability matter?. In AMCIS."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106426.3106427"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1177\/1524839919899924"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.12.004"},{"key":"e_1_3_2_1_18_1","volume-title":"Overview of the Transformer-based Models for NLP Tasks. In 2020 15th Conference on Computer Science and Information Systems (FedCSIS). IEEE, 179\u2013183","author":"Gillioz Anthony","year":"2020","unstructured":"Anthony Gillioz , Jacky Casas , Elena Mugellini , and Omar Abou\u00a0Khaled . 2020 . Overview of the Transformer-based Models for NLP Tasks. In 2020 15th Conference on Computer Science and Information Systems (FedCSIS). IEEE, 179\u2013183 . Anthony Gillioz, Jacky Casas, Elena Mugellini, and Omar Abou\u00a0Khaled. 2020. Overview of the Transformer-based Models for NLP Tasks. In 2020 15th Conference on Computer Science and Information Systems (FedCSIS). IEEE, 179\u2013183."},{"key":"e_1_3_2_1_19_1","volume-title":"Twelfth symposium on usable privacy and security (SOUPS","author":"Gluck Joshua","year":"2016","unstructured":"Joshua Gluck , Florian Schaub , Amy Friedman , Hana Habib , Norman Sadeh , Lorrie\u00a0Faith Cranor , and Yuvraj Agarwal . 2016 . How short is too short? implications of length and framing on the effectiveness of privacy notices . In Twelfth symposium on usable privacy and security (SOUPS 2016). 321\u2013340. Joshua Gluck, Florian Schaub, Amy Friedman, Hana Habib, Norman Sadeh, Lorrie\u00a0Faith Cranor, and Yuvraj Agarwal. 2016. How short is too short? implications of length and framing on the effectiveness of privacy notices. In Twelfth symposium on usable privacy and security (SOUPS 2016). 321\u2013340."},{"key":"e_1_3_2_1_20_1","unstructured":"Google. 2021. Google Dictionary (by Google). https:\/\/chrome.google.com\/webstore\/detail\/google-dictionary-by-goog\/mgijmajocgfcbeboacabfgobmjgjcoja?hl=en  Google. 2021. Google Dictionary (by Google). https:\/\/chrome.google.com\/webstore\/detail\/google-dictionary-by-goog\/mgijmajocgfcbeboacabfgobmjgjcoja?hl=en"},{"key":"e_1_3_2_1_21_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Guo Zhixiu","year":"2020","unstructured":"Zhixiu Guo , Zijin Lin , Pan Li , and Kai Chen . 2020 . { SkillExplorer} : Understanding the Behavior of Skills in Large Scale . In 29th USENIX Security Symposium (USENIX Security 20) . 2649\u20132666. Zhixiu Guo, Zijin Lin, Pan Li, and Kai Chen. 2020. { SkillExplorer} : Understanding the Behavior of Skills in Large Scale. In 29th USENIX Security Symposium (USENIX Security 20). 2649\u20132666."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"e_1_3_2_1_23_1","volume-title":"VITAS: Guided Model-based VUI Testing of VPA Apps. In 37th IEEE\/ACM International Conference on Automated Software Engineering. 1\u201312","author":"Li Suwan","year":"2022","unstructured":"Suwan Li , Lei Bu , Guangdong Bai , Zhixiu Guo , Kai Chen , and Hanlin Wei . 2022 . VITAS: Guided Model-based VUI Testing of VPA Apps. In 37th IEEE\/ACM International Conference on Automated Software Engineering. 1\u201312 . Suwan Li, Lei Bu, Guangdong Bai, Zhixiu Guo, Kai Chen, and Hanlin Wei. 2022. VITAS: Guided Model-based VUI Testing of VPA Apps. In 37th IEEE\/ACM International Conference on Automated Software Engineering. 1\u201312."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2021.3082474"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0004"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3560436"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464838"},{"key":"e_1_3_2_1_28_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Manandhar Sunil","year":"2022","unstructured":"Sunil Manandhar , Kaushal Kafle , Benjamin Andow , Kapil Singh , and Adwait Nadkarni . 2022 . Smart Home Privacy Policies Demystified: A Study of Availability, Content, and Coverage . In 31st USENIX Security Symposium (USENIX Security 22) . 3521\u20133538. Sunil Manandhar, Kaushal Kafle, Benjamin Andow, Kapil Singh, and Adwait Nadkarni. 2022. Smart Home Privacy Policies Demystified: A Study of Availability, Content, and Coverage. In 31st USENIX Security Symposium (USENIX Security 22). 3521\u20133538."},{"key":"e_1_3_2_1_29_1","unstructured":"Medium. 2014. Read Time and You. https:\/\/blog.medium.com\/read-time-and-you-bc2048ab620c  Medium. 2014. Read Time and You. https:\/\/blog.medium.com\/read-time-and-you-bc2048ab620c"},{"key":"e_1_3_2_1_30_1","volume-title":"The Network and Distributed System Security Symposium (NDSS).","author":"Meng Mark\u00a0Huasong","year":"2023","unstructured":"Mark\u00a0Huasong Meng , Qing Zhang , Guangshuai Xia , Yuwei Zheng , Yanjun Zhang , Guangdong Bai , Zhi Liu , Sin\u00a0 G Teo , and Jin\u00a0Song Dong . 2023 . Post-GDPR threat hunting on android phones: dissecting OS-level safeguards of user-unresettable identifiers . In The Network and Distributed System Security Symposium (NDSS). Mark\u00a0Huasong Meng, Qing Zhang, Guangshuai Xia, Yuwei Zheng, Yanjun Zhang, Guangdong Bai, Zhi Liu, Sin\u00a0G Teo, and Jin\u00a0Song Dong. 2023. Post-GDPR threat hunting on android phones: dissecting OS-level safeguards of user-unresettable identifiers. In The Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1177\/0270467610365355"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.4018\/jmhci.2011010104"},{"key":"e_1_3_2_1_33_1","unstructured":"Douglas\u00a0C Montgomery and George\u00a0C Runger. 2010. Applied statistics and probability for engineers. John wiley & sons.  Douglas\u00a0C Montgomery and George\u00a0C Runger. 2010. Applied statistics and probability for engineers. John wiley & sons."},{"key":"e_1_3_2_1_34_1","volume-title":"Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46, 4","author":"Peer Eyal","year":"2014","unstructured":"Eyal Peer , Joachim Vosgerau , and Alessandro Acquisti . 2014. Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46, 4 ( 2014 ), 1023\u20131031. Eyal Peer, Joachim Vosgerau, and Alessandro Acquisti. 2014. Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46, 4 (2014), 1023\u20131031."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1604683.1604686"},{"key":"e_1_3_2_1_36_1","volume-title":"Disagreeable Privacy Policies: Mismatches Between Meaning and Users","author":"Reidenberg R","year":"2015","unstructured":"Joel\u00a0 R Reidenberg , Travis Breaux , Lorrie\u00a0Faith Cranor , Brian French , Amanda Grannis , James\u00a0 T Graves , Fei Liu , Aleecia McDonald , Thomas\u00a0 B Norton , Rohan Ramanath , 2015. Disagreeable Privacy Policies: Mismatches Between Meaning and Users \u2019 Understanding. Berkeley Technology Law Journal ( 2015 ), 39\u201388. Joel\u00a0R Reidenberg, Travis Breaux, Lorrie\u00a0Faith Cranor, Brian French, Amanda Grannis, James\u00a0T Graves, Fei Liu, Aleecia McDonald, Thomas\u00a0B Norton, Rohan Ramanath, 2015. Disagreeable Privacy Policies: Mismatches Between Meaning and Users\u2019 Understanding. Berkeley Technology Law Journal (2015), 39\u201388."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.invent.2019.100243"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/j.wasman.2022.07.022","article-title":"The responsibility of waste production: comparison of European waste statistics regulation and dutch national waste registry","volume":"151","author":"Sileryte Rusne","year":"2022","unstructured":"Rusne Sileryte , Alexander Wandl , and Arjan van Timmeren . 2022 . The responsibility of waste production: comparison of European waste statistics regulation and dutch national waste registry . Waste Management 151 (2022), 171 \u2013 180 . Rusne Sileryte, Alexander Wandl, and Arjan van Timmeren. 2022. The responsibility of waste production: comparison of European waste statistics regulation and dutch national waste registry. Waste Management 151 (2022), 171\u2013180.","journal-title":"Waste Management"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-010-9228-2"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2021.101592"},{"key":"e_1_3_2_1_41_1","unstructured":"Donna Spencer. 2009. Card sorting: Designing usable categories. Rosenfeld Media.  Donna Spencer. 2009. Card sorting: Designing usable categories. Rosenfeld Media."},{"key":"e_1_3_2_1_42_1","volume-title":"Are Online Privacy Policies Readable?International Journal of Information Security and Privacy 4, 1","author":"Sumeeth M","year":"2010","unstructured":"M Sumeeth , RI Singh , and J Miller . 2010. Are Online Privacy Policies Readable?International Journal of Information Security and Privacy 4, 1 ( 2010 ), 93\u2013116. M Sumeeth, RI Singh, and J Miller. 2010. Are Online Privacy Policies Readable?International Journal of Information Security and Privacy 4, 1 (2010), 93\u2013116."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0038"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2008.922634"},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing. 10837\u201310851","author":"Wang Shufan","year":"2021","unstructured":"Shufan Wang , Laure Thompson , and Mohit Iyyer . 2021 . Phrase-BERT: Improved Phrase Embeddings from BERT with an Application to Corpus Exploration . In Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing. 10837\u201310851 . Shufan Wang, Laure Thompson, and Mohit Iyyer. 2021. Phrase-BERT: Improved Phrase Embeddings from BERT with an Application to Corpus Exploration. In Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing. 10837\u201310851."},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1\u201312","author":"Wolf Flynn","year":"2019","unstructured":"Flynn Wolf , Ravi Kuber , and Adam\u00a0 J Aviv . 2019 . \" Pretty Close to a Must-Have\" Balancing Usability Desire and Security Concern in Biometric Adoption . In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1\u201312 . Flynn Wolf, Ravi Kuber, and Adam\u00a0J Aviv. 2019. \" Pretty Close to a Must-Have\" Balancing Usability Desire and Security Concern in Biometric Adoption. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1\u201312."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384761"},{"key":"e_1_3_2_1_48_1","volume-title":"International Conference on Advanced Data Mining and Applications. Springer, 159\u2013173","author":"Xie Fuman","year":"2022","unstructured":"Fuman Xie , Yanjun Zhang , Hanlin Wei , and Guangdong Bai . 2022 . UQ-AAS21: A Comprehensive Dataset of Amazon Alexa Skills . In International Conference on Advanced Data Mining and Applications. Springer, 159\u2013173 . Fuman Xie, Yanjun Zhang, Hanlin Wei, and Guangdong Bai. 2022. UQ-AAS21: A Comprehensive Dataset of Amazon Alexa Skills. In International Conference on Advanced Data Mining and Applications. Springer, 159\u2013173."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3560416"},{"key":"e_1_3_2_1_50_1","unstructured":"Zarul\u00a0Fitri Zaaba Steven Furnell and Paul Dowland. 2011. End-User Perception and Usability of Information Security.. In HAISA. 97\u2013107.  Zarul\u00a0Fitri Zaaba Steven Furnell and Paul Dowland. 2011. End-User Perception and Usability of Information Security.. In HAISA. 97\u2013107."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3389685"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00016"}],"event":{"name":"ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Melbourne VIC Australia","acronym":"ASIA CCS '23"},"container-title":["Proceedings of the ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3590335","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:16Z","timestamp":1750183696000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3590335"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":52,"alternative-id":["10.1145\/3579856.3590335","10.1145\/3579856"],"URL":"https:\/\/doi.org\/10.1145\/3579856.3590335","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}