{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T11:44:28Z","timestamp":1750765468640,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":126,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T00:00:00Z","timestamp":1686528000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/R513295\/1"],"award-info":[{"award-number":["EP\/R513295\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Carlsberg Foundation","award":["CF20-0678"],"award-info":[{"award-number":["CF20-0678"]}]},{"DOI":"10.13039\/501100004211","name":"Oxford Martin School, University of Oxford","doi-asserted-by":"publisher","award":["EWADA Programme"],"award-info":[{"award-number":["EWADA Programme"]}],"id":[{"id":"10.13039\/501100004211","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,12]]},"DOI":"10.1145\/3593013.3593973","type":"proceedings-article","created":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T14:40:46Z","timestamp":1686580846000},"page":"22-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["\u2018We are adults and deserve control of our phones\u2019: Examining the risks and opportunities of a right to repair for mobile apps"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7412-8731","authenticated-orcid":false,"given":"Konrad","family":"Kollnig","sequence":"first","affiliation":[{"name":"University of Oxford, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1504-1096","authenticated-orcid":false,"given":"Siddhartha","family":"Datta","sequence":"additional","affiliation":[{"name":"University of Oxford, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0678-3996","authenticated-orcid":false,"given":"Thomas","family":"Serban Von Davier","sequence":"additional","affiliation":[{"name":"University of Oxford, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3873-6366","authenticated-orcid":false,"given":"Max","family":"Van Kleek","sequence":"additional","affiliation":[{"name":"University of Oxford, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8272-5667","authenticated-orcid":false,"given":"Reuben","family":"Binns","sequence":"additional","affiliation":[{"name":"University of Oxford, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9960-1436","authenticated-orcid":false,"given":"Ulrik","family":"Lyngs","sequence":"additional","affiliation":[{"name":"University of Oxford, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5085-9724","authenticated-orcid":false,"given":"Nigel","family":"Shadbolt","sequence":"additional","affiliation":[{"name":"University of Oxford, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2023,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Statista & 42matters. 2022. Distribution of free and paid apps in the Apple App Store and Google Play. https:\/\/www.statista.com\/statistics\/263797\/number-of-applications-for-mobile-phones\/  Statista & 42matters. 2022. Distribution of free and paid apps in the Apple App Store and Google Play. https:\/\/www.statista.com\/statistics\/263797\/number-of-applications-for-mobile-phones\/"},{"key":"e_1_3_2_1_2_1","unstructured":"AdGuard. [n. d.]. AdGuard. https:\/\/adguard.com\/  AdGuard. [n. d.]. AdGuard. https:\/\/adguard.com\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464460"},{"key":"e_1_3_2_1_4_1","unstructured":"Agriland. 2022. John Deere to face lawsuits over right to repair. https:\/\/www.agriland.co.uk\/farming-news\/john-deere-to-face-lawsuits-over-right-to-repair\/  Agriland. 2022. John Deere to face lawsuits over right to repair. https:\/\/www.agriland.co.uk\/farming-news\/john-deere-to-face-lawsuits-over-right-to-repair\/"},{"key":"e_1_3_2_1_5_1","unstructured":"Alphabet. 2020. FORM 10-K. https:\/\/abc.xyz\/investor\/static\/pdf\/20210203_alphabet_10K.pdf?cache=b44182d  Alphabet. 2020. FORM 10-K. https:\/\/abc.xyz\/investor\/static\/pdf\/20210203_alphabet_10K.pdf?cache=b44182d"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380392"},{"key":"e_1_3_2_1_7_1","unstructured":"apktool: GitHub Issue Tracker. [n. d.]. decompiling latest Facebook APK. https:\/\/github.com\/iBotPeaches\/Apktool\/issues\/1719  apktool: GitHub Issue Tracker. [n. d.]. decompiling latest Facebook APK. https:\/\/github.com\/iBotPeaches\/Apktool\/issues\/1719"},{"key":"e_1_3_2_1_8_1","volume-title":"Patch Review Processes in Open Source Software Development Communities: A Comparative Case Study. In 2007 40th Annual Hawaii International Conference on System Sciences (HICSS\u201907)","author":"Asundi Jai","year":"2007","unstructured":"Jai Asundi and Rajiv Jayant . 2007 . Patch Review Processes in Open Source Software Development Communities: A Comparative Case Study. In 2007 40th Annual Hawaii International Conference on System Sciences (HICSS\u201907) . 166c\u2013166c. https:\/\/doi.org\/10.1109\/HICSS.2007.426 10.1109\/HICSS.2007.426 Jai Asundi and Rajiv Jayant. 2007. Patch Review Processes in Open Source Software Development Communities: A Comparative Case Study. In 2007 40th Annual Hawaii International Conference on System Sciences (HICSS\u201907). 166c\u2013166c. https:\/\/doi.org\/10.1109\/HICSS.2007.426"},{"key":"e_1_3_2_1_9_1","volume-title":"Partial Decision D155.027","author":"Protection Authority Austrian Data","year":"2021","unstructured":"Austrian Data Protection Authority . 2021. Partial Decision D155.027 , 2021 -0.586.257. https:\/\/noyb.eu\/sites\/default\/files\/2022-01\/E-DSB%20-%20Google%20Analytics_EN_bk.pdf Austrian Data Protection Authority. 2021. Partial Decision D155.027, 2021-0.586.257. https:\/\/noyb.eu\/sites\/default\/files\/2022-01\/E-DSB%20-%20Google%20Analytics_EN_bk.pdf"},{"key":"e_1_3_2_1_10_1","series-title":"Lecture Notes in Computer Science","volume-title":"AppGuard \u2013 Fine-Grained Policy Enforcement for Untrusted Android Applications","author":"Backes Michael","unstructured":"Michael Backes , Sebastian Gerling , Christian Hammer , Matteo Maffei , and Philipp von Styp-Rekowsky . 2014. AppGuard \u2013 Fine-Grained Policy Enforcement for Untrusted Android Applications . In Data Privacy Management and Autonomous Spontaneous Security, Joaquin Garcia-Alfaro, Georgios Lioudakis, Nora Cuppens-Boulahia, Simon Foley, and William M. Fitzgerald (Eds.). Lecture Notes in Computer Science , Vol. 8247 . Springer Berlin Heidelberg , Berlin, Heidelberg , 213\u2013231. https:\/\/doi.org\/10.1007\/978-3-642-54568-9_14 10.1007\/978-3-642-54568-9_14 Michael Backes, Sebastian Gerling, Christian Hammer, Matteo Maffei, and Philipp von Styp-Rekowsky. 2014. AppGuard \u2013 Fine-Grained Policy Enforcement for Untrusted Android Applications. In Data Privacy Management and Autonomous Spontaneous Security, Joaquin Garcia-Alfaro, Georgios Lioudakis, Nora Cuppens-Boulahia, Simon Foley, and William M. Fitzgerald (Eds.). Lecture Notes in Computer Science, Vol. 8247. Springer Berlin Heidelberg, Berlin, Heidelberg, 213\u2013231. https:\/\/doi.org\/10.1007\/978-3-642-54568-9_14"},{"key":"e_1_3_2_1_11_1","volume-title":"Engineering Privacy by Design: Are engineers ready to live up to the challenge?Information Society 35, 3 (5","author":"Bednar Kathrin","year":"2019","unstructured":"Kathrin Bednar , Sarah Spiekermann , and Marc Langheinrich . 2019. Engineering Privacy by Design: Are engineers ready to live up to the challenge?Information Society 35, 3 (5 2019 ), 122\u2013142. https:\/\/doi.org\/10.1080\/01972243.2019.1583296 10.1080\/01972243.2019.1583296 Kathrin Bednar, Sarah Spiekermann, and Marc Langheinrich. 2019. Engineering Privacy by Design: Are engineers ready to live up to the challenge?Information Society 35, 3 (5 2019), 122\u2013142. https:\/\/doi.org\/10.1080\/01972243.2019.1583296"},{"volume-title":"Race after Technology: Abolitionist Tools for the New Jim Code","author":"Benjamin Ruha","key":"e_1_3_2_1_12_1","unstructured":"Ruha Benjamin . 2019. Race after Technology: Abolitionist Tools for the New Jim Code . Polity , Cambridge, United Kingdom. Ruha Benjamin. 2019. Race after Technology: Abolitionist Tools for the New Jim Code. Polity, Cambridge, United Kingdom."},{"volume-title":"The Wealth of Networks: How Social Production Transforms Markets and Freedom","author":"Benkler Yochai","key":"e_1_3_2_1_13_1","unstructured":"Yochai Benkler . 2006. The Wealth of Networks: How Social Production Transforms Markets and Freedom . Yale University Press . Yochai Benkler. 2006. The Wealth of Networks: How Social Production Transforms Markets and Freedom. Yale University Press."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/1044207317702070"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","first-page":"105369","DOI":"10.1016\/j.clsr.2019.105369","article-title":"Dissolving privacy, one merger at a time: Competition, data and third party tracking","volume":"36","author":"Binns Reuben","year":"2020","unstructured":"Reuben Binns and Elettra Bietti . 2020 . Dissolving privacy, one merger at a time: Competition, data and third party tracking . Computer Law & Security Review 36 (2020), 105369 . https:\/\/doi.org\/10.1016\/j.clsr.2019.105369 10.1016\/j.clsr.2019.105369 Reuben Binns and Elettra Bietti. 2020. Dissolving privacy, one merger at a time: Competition, data and third party tracking. Computer Law & Security Review 36 (2020), 105369. https:\/\/doi.org\/10.1016\/j.clsr.2019.105369","journal-title":"Computer Law & Security Review"},{"key":"e_1_3_2_1_16_1","volume-title":"How Could Equality and Data Protection Law Shape AI Fairness for People with Disabilities?","author":"Binns Reuben","year":"2021","unstructured":"Reuben Binns and Reuben Kirkham . 2021. How Could Equality and Data Protection Law Shape AI Fairness for People with Disabilities? ( 2021 ), 37. Reuben Binns and Reuben Kirkham. 2021. How Could Equality and Data Protection Law Shape AI Fairness for People with Disabilities? (2021), 37."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3201064.3201089"},{"key":"e_1_3_2_1_18_1","volume-title":"End-User Perspective. In Designing Interactive Systems Conference","author":"Bongard-Blanchy Kerstin","year":"2021","unstructured":"Kerstin Bongard-Blanchy , Arianna Rossi , Salvador Rivas , Sophie Doublet , Vincent Koenig , and Gabriele Lenzini . 2021 . \u201d I am Definitely Manipulated, Even When I am Aware of it. It\u2019s Ridiculous!\u201d-Dark Patterns from the End-User Perspective. In Designing Interactive Systems Conference 2021. 763\u2013776. Kerstin Bongard-Blanchy, Arianna Rossi, Salvador Rivas, Sophie Doublet, Vincent Koenig, and Gabriele Lenzini. 2021. \u201d I am Definitely Manipulated, Even When I am Aware of it. It\u2019s Ridiculous!\u201d-Dark Patterns from the End-User Perspective. In Designing Interactive Systems Conference 2021. 763\u2013776."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0020476"},{"key":"e_1_3_2_1_20_1","unstructured":"Bundeskartellamt. 2019. B6-22\/16 (Facebook v Bundeskartellamt).  Bundeskartellamt. 2019. B6-22\/16 (Facebook v Bundeskartellamt)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134636"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.007"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2932228"},{"volume-title":"MED 2018-042 du 30 octobre 2018 mettant en demeure la soci\u00e9t\u00e9 X. https:\/\/www.legifrance.gouv.fr\/cnil\/id\/CNILTEXT000037594451\/","author":"Commission","key":"e_1_3_2_1_24_1","unstructured":"Commission Nationale de l\u2019Informatique et des Libert\u00e9s. 2018. D\u00e9cision n\u00b0 MED 2018-042 du 30 octobre 2018 mettant en demeure la soci\u00e9t\u00e9 X. https:\/\/www.legifrance.gouv.fr\/cnil\/id\/CNILTEXT000037594451\/ Commission Nationale de l\u2019Informatique et des Libert\u00e9s. 2018. D\u00e9cision n\u00b0 MED 2018-042 du 30 octobre 2018 mettant en demeure la soci\u00e9t\u00e9 X. https:\/\/www.legifrance.gouv.fr\/cnil\/id\/CNILTEXT000037594451\/"},{"key":"e_1_3_2_1_25_1","volume-title":"D\u00e9lib\u00e9ration SAN-2019-001 du 21 janvier","author":"Commission Nationale de l\u2019Informatique et des Libert\u00e9s. 2019.","year":"2019","unstructured":"Commission Nationale de l\u2019Informatique et des Libert\u00e9s. 2019. D\u00e9lib\u00e9ration SAN-2019-001 du 21 janvier 2019 . https:\/\/www.legifrance.gouv.fr\/cnil\/id\/CNILTEXT000038032552\/ Commission Nationale de l\u2019Informatique et des Libert\u00e9s. 2019. D\u00e9lib\u00e9ration SAN-2019-001 du 21 janvier 2019. https:\/\/www.legifrance.gouv.fr\/cnil\/id\/CNILTEXT000038032552\/"},{"key":"e_1_3_2_1_26_1","volume-title":"D\u00e9lib\u00e9ration SAN-2020-012 du 7 d\u00e9cembre","author":"Commission Nationale de l\u2019Informatique et des Libert\u00e9s. 2020.","year":"2020","unstructured":"Commission Nationale de l\u2019Informatique et des Libert\u00e9s. 2020. D\u00e9lib\u00e9ration SAN-2020-012 du 7 d\u00e9cembre 2020 . https:\/\/www.legifrance.gouv.fr\/cnil\/id\/CNILTEXT000042635706 Commission Nationale de l\u2019Informatique et des Libert\u00e9s. 2020. D\u00e9lib\u00e9ration SAN-2020-012 du 7 d\u00e9cembre 2020. https:\/\/www.legifrance.gouv.fr\/cnil\/id\/CNILTEXT000042635706"},{"key":"e_1_3_2_1_27_1","unstructured":"Commission Nationale de l\u2019Informatique et des Libert\u00e9s. 2022. Use of Google Analytics and data transfers to the United States: the CNIL orders a website manager\/operator to comply. https:\/\/www.cnil.fr\/en\/use-google-analytics-and-data-transfers-united-states-cnil-orders-website-manageroperator-comply  Commission Nationale de l\u2019Informatique et des Libert\u00e9s. 2022. Use of Google Analytics and data transfers to the United States: the CNIL orders a website manager\/operator to comply. https:\/\/www.cnil.fr\/en\/use-google-analytics-and-data-transfers-united-states-cnil-orders-website-manageroperator-comply"},{"key":"e_1_3_2_1_28_1","unstructured":"Competition and Markets Authority. 2020. Online Platforms and Digital Advertising.  Competition and Markets Authority. 2020. Online Platforms and Digital Advertising."},{"key":"e_1_3_2_1_29_1","unstructured":"Connor Tumbleson. [n. d.]. Apktool. https:\/\/ibotpeaches.github.io\/Apktool\/  Connor Tumbleson. [n. d.]. Apktool. https:\/\/ibotpeaches.github.io\/Apktool\/"},{"key":"e_1_3_2_1_30_1","unstructured":"Court of Justice of the European Union. 2020. Data Protection Commissioner v Facebook Ireland and Maximillian Schrems. https:\/\/curia.europa.eu\/juris\/documents.jsf?num=C-311\/18  Court of Justice of the European Union. 2020. Data Protection Commissioner v Facebook Ireland and Maximillian Schrems. https:\/\/curia.europa.eu\/juris\/documents.jsf?num=C-311\/18"},{"key":"e_1_3_2_1_31_1","volume-title":"Mind-proofing Your Phone: Navigating the Digital Minefield with GreaseTerminator. CoRR abs\/2112.10699","author":"Datta Siddhartha","year":"2021","unstructured":"Siddhartha Datta , Konrad Kollnig , and Nigel Shadbolt . 2021. Mind-proofing Your Phone: Navigating the Digital Minefield with GreaseTerminator. CoRR abs\/2112.10699 ( 2021 ), 22 pages. arXiv:2112.10699https:\/\/arxiv.org\/abs\/2112.10699 Siddhartha Datta, Konrad Kollnig, and Nigel Shadbolt. 2021. Mind-proofing Your Phone: Navigating the Digital Minefield with GreaseTerminator. CoRR abs\/2112.10699 (2021), 22 pages. arXiv:2112.10699https:\/\/arxiv.org\/abs\/2112.10699"},{"key":"#cr-split#-e_1_3_2_1_32_1.1","doi-asserted-by":"crossref","unstructured":"Siddhartha Datta Konrad Kollnig and Nigel Shadbolt. 2022. GreaseVision: Rewriting the Rules of the Interface. https:\/\/doi.org\/10.48550\/ARXIV.2204.03731 10.48550\/ARXIV.2204.03731","DOI":"10.18653\/v1\/2022.dadc-1.2"},{"key":"#cr-split#-e_1_3_2_1_32_1.2","doi-asserted-by":"crossref","unstructured":"Siddhartha Datta Konrad Kollnig and Nigel Shadbolt. 2022. GreaseVision: Rewriting the Rules of the Interface. https:\/\/doi.org\/10.48550\/ARXIV.2204.03731","DOI":"10.18653\/v1\/2022.dadc-1.2"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464462"},{"key":"e_1_3_2_1_34_1","volume-title":"In Proceedings of the Mobile Security Technologies","author":"Davis Benjamin","year":"2012","unstructured":"Benjamin Davis , Ben S, Armen Khodaverdian , and Hao Chen . 2012 . I-ARM-Droid: A rewriting framework for in-app reference monitors for android applications . In In Proceedings of the Mobile Security Technologies 2012, MOST \u201912.IEEE, New York, NY, United States, 1\u20139. Benjamin Davis, Ben S, Armen Khodaverdian, and Hao Chen. 2012. I-ARM-Droid: A rewriting framework for in-app reference monitors for android applications. In In Proceedings of the Mobile Security Technologies 2012, MOST \u201912.IEEE, New York, NY, United States, 1\u20139."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2700270"},{"volume-title":"Interfaces for Scripting: Making Greasemonkey Scripts Resilient to Website Upgrades","author":"D\u00edaz Oscar","key":"e_1_3_2_1_36_1","unstructured":"Oscar D\u00edaz , Crist\u00f3bal Arellano , and Jon Iturrioz . 2010. Interfaces for Scripting: Making Greasemonkey Scripts Resilient to Website Upgrades . In Web Engineering, David Hutchison, Takeo Kanade, Josef Kittler, Jon M. Kleinberg, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Madhu Sudan, Demetri Terzopoulos, Doug Tygar, Moshe Y. Vardi, Gerhard Weikum, Boualem Benatallah, Fabio Casati, Gerti Kappel, and Gustavo Rossi (Eds.). Vol. 6189 . Springer Berlin Heidelberg , Berlin, Heidelberg , 233\u2013247. https:\/\/doi.org\/10.1007\/978-3-642-13911-6_16 10.1007\/978-3-642-13911-6_16 Oscar D\u00edaz, Crist\u00f3bal Arellano, and Jon Iturrioz. 2010. Interfaces for Scripting: Making Greasemonkey Scripts Resilient to Website Upgrades. In Web Engineering, David Hutchison, Takeo Kanade, Josef Kittler, Jon M. Kleinberg, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Madhu Sudan, Demetri Terzopoulos, Doug Tygar, Moshe Y. Vardi, Gerhard Weikum, Boualem Benatallah, Fabio Casati, Gerti Kappel, and Gustavo Rossi (Eds.). Vol. 6189. Springer Berlin Heidelberg, Berlin, Heidelberg, 233\u2013247. https:\/\/doi.org\/10.1007\/978-3-642-13911-6_16"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3446789"},{"key":"e_1_3_2_1_38_1","volume-title":"Better Privacy in Children\u2019s Apps From Developers\u2019 Perspectives. In Conference on Human Factors in Computing Systems (CHI \u201921)","author":"Ekambaranathan Anirudh","year":"2021","unstructured":"Anirudh Ekambaranathan , Jun Zhao , and Max Van Kleek . 2021 . \u201c Money makes the world go around\u201d: Identifying Barriers to Better Privacy in Children\u2019s Apps From Developers\u2019 Perspectives. In Conference on Human Factors in Computing Systems (CHI \u201921) (Yokohama, Japan , 2021). ACM Press, 1\u201324. https:\/\/doi.org\/10.1145\/3411764.3445599 10.1145\/3411764.3445599 Anirudh Ekambaranathan, Jun Zhao, and Max Van Kleek. 2021. \u201cMoney makes the world go around\u201d: Identifying Barriers to Better Privacy in Children\u2019s Apps From Developers\u2019 Perspectives. In Conference on Human Factors in Computing Systems (CHI \u201921) (Yokohama, Japan, 2021). ACM Press, 1\u201324. https:\/\/doi.org\/10.1145\/3411764.3445599"},{"key":"e_1_3_2_1_39_1","volume-title":"Automated Accessibility Testing of Mobile Apps. In 2018 IEEE 11th International Conference on Software Testing, Verification and Validation (ICST). 116\u2013126","author":"Eler Marcelo Medeiros","year":"2018","unstructured":"Marcelo Medeiros Eler , Jose Miguel Rojas , Yan Ge , and Gordon Fraser . 2018 . Automated Accessibility Testing of Mobile Apps. In 2018 IEEE 11th International Conference on Software Testing, Verification and Validation (ICST). 116\u2013126 . https:\/\/doi.org\/10.1109\/ICST.2018.00021 10.1109\/ICST.2018.00021 Marcelo Medeiros Eler, Jose Miguel Rojas, Yan Ge, and Gordon Fraser. 2018. Automated Accessibility Testing of Mobile Apps. In 2018 IEEE 11th International Conference on Software Testing, Verification and Validation (ICST). 116\u2013126. https:\/\/doi.org\/10.1109\/ICST.2018.00021"},{"key":"e_1_3_2_1_40_1","unstructured":"eMarketer. 2016. Mobile Moves to Majority Share of Google\u2019s Worldwide Ad Revenues. https:\/\/www.emarketer.com\/Article\/Mobile-Moves-Majority-Share-of-Googles-Worldwide-Ad-Revenues\/1014633  eMarketer. 2016. Mobile Moves to Majority Share of Google\u2019s Worldwide Ad Revenues. https:\/\/www.emarketer.com\/Article\/Mobile-Moves-Majority-Share-of-Googles-Worldwide-Ad-Revenues\/1014633"},{"volume-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation(OSDI\u201910)","author":"Enck William","key":"e_1_3_2_1_41_1","unstructured":"William Enck , Peter Gilbert , Byung-Gon Chun , Landon P. Cox , Jaeyeon Jung , Patrick McDaniel , and Anmol N. Sheth . 2010. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones . In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation(OSDI\u201910) . USENIX Association, Berkeley, CA, United States, 393\u2013407. William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. 2010. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation(OSDI\u201910). USENIX Association, Berkeley, CA, United States, 393\u2013407."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025635"},{"key":"e_1_3_2_1_43_1","unstructured":"European Data Protection Supervisor. 2022. Decision of the European Data Protection Supervisor in complaint case 2020-1013 submitted by Members of the Parliament against the European Parliament. https:\/\/noyb.eu\/sites\/default\/files\/2022-01\/Case%202020-1013%20-%20EDPS%20Decision_bk.pdf  European Data Protection Supervisor. 2022. Decision of the European Data Protection Supervisor in complaint case 2020-1013 submitted by Members of the Parliament against the European Parliament. https:\/\/noyb.eu\/sites\/default\/files\/2022-01\/Case%202020-1013%20-%20EDPS%20Decision_bk.pdf"},{"key":"e_1_3_2_1_44_1","unstructured":"evilwombat. [n. d.]. A de-bullshified version of Facebook (less ads less clutter less crap). https:\/\/forum.xda-developers.com\/t\/a-de-bullshified-version-of-facebook-less-ads-less-clutter-less-crap.3586318\/  evilwombat. [n. d.]. A de-bullshified version of Facebook (less ads less clutter less crap). https:\/\/forum.xda-developers.com\/t\/a-de-bullshified-version-of-facebook-less-ads-less-clutter-less-crap.3586318\/"},{"key":"e_1_3_2_1_45_1","unstructured":"Exodus. [n. d.]. Reports. https:\/\/reports.exodus-privacy.eu.org\/en\/reports\/  Exodus. [n. d.]. Reports. https:\/\/reports.exodus-privacy.eu.org\/en\/reports\/"},{"key":"e_1_3_2_1_46_1","unstructured":"flxapps. [n. d.]. DetoxDroid. https:\/\/github.com\/flxapps\/DetoxDroid  flxapps. [n. d.]. DetoxDroid. https:\/\/github.com\/flxapps\/DetoxDroid"},{"key":"e_1_3_2_1_47_1","unstructured":"Jay Freeman. [n. d.]. Cydia Substrate. http:\/\/www.cydiasubstrate.com\/  Jay Freeman. [n. d.]. Cydia Substrate. http:\/\/www.cydiasubstrate.com\/"},{"key":"e_1_3_2_1_48_1","unstructured":"Gadgets Now. 2022. 10 things you should not do to avoid getting banned on WhatsApp. https:\/\/www.gadgetsnow.com\/slideshows\/10-things-that-may-land-you-in-trouble-on-whatsapp\/photolist\/89733017.cms  Gadgets Now. 2022. 10 things you should not do to avoid getting banned on WhatsApp. https:\/\/www.gadgetsnow.com\/slideshows\/10-things-that-may-land-you-in-trouble-on-whatsapp\/photolist\/89733017.cms"},{"key":"e_1_3_2_1_49_1","unstructured":"German Federal Court of Justice. 2018. Ruling in case I ZR 154\/16. https:\/\/juris.bundesgerichtshof.de\/cgi-bin\/rechtsprechung\/document.py?Gericht=bgh&Art=en&Datum=Aktuell&anz=1&pos=0&nr=82856&linked=pm&Blank=1.  German Federal Court of Justice. 2018. Ruling in case I ZR 154\/16. https:\/\/juris.bundesgerichtshof.de\/cgi-bin\/rechtsprechung\/document.py?Gericht=bgh&Art=en&Datum=Aktuell&anz=1&pos=0&nr=82856&linked=pm&Blank=1."},{"key":"e_1_3_2_1_50_1","volume-title":"HabitLab: In-The-Wild Behavior Change Experiments at Scale. Stanford Department of Computer Science","author":"Geza Kovacs","year":"2019","unstructured":"Kovacs Geza . 2019. HabitLab: In-The-Wild Behavior Change Experiments at Scale. Stanford Department of Computer Science ( 2019 ). https:\/\/stacks.stanford.edu\/file\/druid:qq438qv1791\/Thesis-augmented.pdf Kovacs Geza. 2019. HabitLab: In-The-Wild Behavior Change Experiments at Scale. Stanford Department of Computer Science (2019). https:\/\/stacks.stanford.edu\/file\/druid:qq438qv1791\/Thesis-augmented.pdf"},{"key":"e_1_3_2_1_51_1","unstructured":"Vegard IT GmbH. [n. d.]. Gray-Switch. https:\/\/play.google.com\/store\/apps\/details?id=com.vegardit.grayswitch  Vegard IT GmbH. [n. d.]. Gray-Switch. https:\/\/play.google.com\/store\/apps\/details?id=com.vegardit.grayswitch"},{"key":"e_1_3_2_1_52_1","first-page":"941","article-title":"Considering a Right to Repair Software","volume":"37","author":"Gomulkiewicz Robert W.","year":"2023","unstructured":"Robert W. Gomulkiewicz . 2023 . Considering a Right to Repair Software . Berkeley Technology Law Journal 37 (2023), 941 \u2013 986 . Robert W. Gomulkiewicz. 2023. Considering a Right to Repair Software. Berkeley Technology Law Journal 37 (2023), 941\u2013986.","journal-title":"Berkeley Technology Law Journal"},{"key":"e_1_3_2_1_53_1","unstructured":"Google. [n. d.]. Android Accessibility Suite. https:\/\/play.google.com\/store\/apps\/details?id=com.google.android.marvin.talkback  Google. [n. d.]. Android Accessibility Suite. https:\/\/play.google.com\/store\/apps\/details?id=com.google.android.marvin.talkback"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479516"},{"volume-title":"Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI \u201918)","author":"Gray Colin M.","key":"e_1_3_2_1_55_1","unstructured":"Colin M. Gray , Yubo Kou , Bryan Battles , Joseph Hoggatt , and Austin L. Toombs . 2018. The Dark (Patterns) Side of UX Design . In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI \u201918) . Association for Computing Machinery, New York, NY, USA, 1\u201314. https:\/\/doi.org\/10.1145\/3173574.3174108 10.1145\/3173574.3174108 Colin M. Gray, Yubo Kou, Bryan Battles, Joseph Hoggatt, and Austin L. Toombs. 2018. The Dark (Patterns) Side of UX Design. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI \u201918). Association for Computing Machinery, New York, NY, USA, 1\u201314. https:\/\/doi.org\/10.1145\/3173574.3174108"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/638249.638277"},{"key":"e_1_3_2_1_57_1","first-page":"43","article-title":"Spyware vs. Spyware: Software Conflicts and User Autonomy","volume":"16","author":"Grimmelmann James","year":"2022","unstructured":"James Grimmelmann . 2022 . Spyware vs. Spyware: Software Conflicts and User Autonomy . Ohio State Technology Law Journal 16 (2022), 43 . James Grimmelmann. 2022. Spyware vs. Spyware: Software Conflicts and User Autonomy. Ohio State Technology Law Journal 16 (2022), 43.","journal-title":"Ohio State Technology Law Journal"},{"key":"#cr-split#-e_1_3_2_1_58_1.1","doi-asserted-by":"crossref","unstructured":"Kathrin Grosse Nicolas Papernot Praveen Manoharan Michael Backes and Patrick McDaniel. 2017. Adversarial examples for malware detection. In Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security Proceedings(Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)) Simon N. Foley Dieter Gollmann and Einar Snekkenes (Eds.). Springer Verlag Germany 62-79. https:\/\/doi.org\/10.1007\/978-3-319-66399-9_4 10.1007\/978-3-319-66399-9_4","DOI":"10.1007\/978-3-319-66399-9_4"},{"key":"#cr-split#-e_1_3_2_1_58_1.2","doi-asserted-by":"crossref","unstructured":"Kathrin Grosse Nicolas Papernot Praveen Manoharan Michael Backes and Patrick McDaniel. 2017. Adversarial examples for malware detection. In Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security Proceedings(Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)) Simon N. Foley Dieter Gollmann and Einar Snekkenes (Eds.). Springer Verlag Germany 62-79. https:\/\/doi.org\/10.1007\/978-3-319-66399-9_4","DOI":"10.1007\/978-3-319-66399-9_4"},{"key":"e_1_3_2_1_59_1","volume-title":"Influencing technology adoption by older adults. Interacting with Computers 22, 6 (09","author":"Hanson Vicki L.","year":"2010","unstructured":"Vicki L. Hanson . 2010. Influencing technology adoption by older adults. Interacting with Computers 22, 6 (09 2010 ), 502\u2013509. https:\/\/doi.org\/10.1016\/j.intcom.2010.09.001 arXiv:https:\/\/academic.oup.com\/iwc\/article-pdf\/22\/6\/502\/2241774\/iwc22-0502.pdf 10.1016\/j.intcom.2010.09.001 Vicki L. Hanson. 2010. Influencing technology adoption by older adults. Interacting with Computers 22, 6 (09 2010), 502\u2013509. https:\/\/doi.org\/10.1016\/j.intcom.2010.09.001 arXiv:https:\/\/academic.oup.com\/iwc\/article-pdf\/22\/6\/502\/2241774\/iwc22-0502.pdf"},{"key":"e_1_3_2_1_60_1","volume-title":"Sample sizes for saturation in qualitative research: A systematic review of empirical tests. Social Science & Medicine","author":"Hennink Monique","year":"2021","unstructured":"Monique Hennink and Bonnie N Kaiser . 2021. Sample sizes for saturation in qualitative research: A systematic review of empirical tests. Social Science & Medicine ( 2021 ), 114523. Monique Hennink and Bonnie N Kaiser. 2021. Sample sizes for saturation in qualitative research: A systematic review of empirical tests. Social Science & Medicine (2021), 114523."},{"key":"e_1_3_2_1_61_1","unstructured":"Niklas Higi. [n. d.]. apk-mitm. https:\/\/github.com\/shroudedcode\/apk-mitm\/  Niklas Higi. [n. d.]. apk-mitm. https:\/\/github.com\/shroudedcode\/apk-mitm\/"},{"key":"e_1_3_2_1_62_1","volume-title":"Online Harms White Paper. Government Report on Transparency Reporting","author":"Government HM.","year":"2019","unstructured":"Government HM. 2019. Online Harms White Paper. Government Report on Transparency Reporting ( 2019 ). https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/793360\/Online_Harms_White_Paper.pdf Government HM. 2019. Online Harms White Paper. Government Report on Transparency Reporting (2019). https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/793360\/Online_Harms_White_Paper.pdf"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIW.2016.040"},{"key":"e_1_3_2_1_64_1","volume-title":"2019 APWG Symposium on Electronic Crime Research (eCrime). IEEE","author":"Hughes Jack","year":"2019","unstructured":"Jack Hughes , Ben Collier , and Alice Hutchings . 2019 . From Playing Games to Committing Crimes: A Multi-Technique Approach to Predicting Key Actors on an Online Gaming Forum . In 2019 APWG Symposium on Electronic Crime Research (eCrime). IEEE , Pittsburgh, PA, USA, 1\u201312. https:\/\/doi.org\/10.1109\/eCrime47957. 2019.9037586 10.1109\/eCrime47957.2019.9037586 Jack Hughes, Ben Collier, and Alice Hutchings. 2019. From Playing Games to Committing Crimes: A Multi-Technique Approach to Predicting Key Actors on an Online Gaming Forum. In 2019 APWG Symposium on Electronic Crime Research (eCrime). IEEE, Pittsburgh, PA, USA, 1\u201312. https:\/\/doi.org\/10.1109\/eCrime47957.2019.9037586"},{"key":"e_1_3_2_1_65_1","unstructured":"Panagiotis G Ipeirotis. 2010. Demographics of Mechanical Turk. (2010).  Panagiotis G Ipeirotis. 2010. Demographics of Mechanical Turk. (2010)."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381938"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2013.03.002"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.007"},{"key":"e_1_3_2_1_69_1","volume-title":"Computer Security \u2013 ESORICS","author":"Karkallis Panicos","year":"2021","unstructured":"Panicos Karkallis , Jorge Blasco , Guillermo Suarez-Tangil , and Sergio Pastrana . 2021. Detecting Video-Game Injectors Exchanged in Game Cheating Communities . In Computer Security \u2013 ESORICS 2021 , Elisa Bertino, Haya Shulman , and Michael Waidner (Eds.). Vol. 12972 . Springer International Publishing , Cham, 305\u2013324. https:\/\/doi.org\/10.1007\/978-3-030-88418-5_15 10.1007\/978-3-030-88418-5_15 Panicos Karkallis, Jorge Blasco, Guillermo Suarez-Tangil, and Sergio Pastrana. 2021. Detecting Video-Game Injectors Exchanged in Game Cheating Communities. In Computer Security \u2013 ESORICS 2021, Elisa Bertino, Haya Shulman, and Michael Waidner (Eds.). Vol. 12972. Springer International Publishing, Cham, 305\u2013324. https:\/\/doi.org\/10.1007\/978-3-030-88418-5_15"},{"key":"e_1_3_2_1_70_1","volume-title":"Ulrik Lyngs, Jun Zhao, Claudine Tinsman, and Nigel Shadbolt.","author":"Kollnig Konrad","year":"2021","unstructured":"Konrad Kollnig , Reuben Binns , Max Van Kleek , Ulrik Lyngs, Jun Zhao, Claudine Tinsman, and Nigel Shadbolt. 2021 . Before and after GDPR : Tracking in Mobile Apps . 10, 4 (2021). https:\/\/doi.org\/10.14763\/2021.4.1611 10.14763\/2021.4.1611 Konrad Kollnig, Reuben Binns, Max Van Kleek, Ulrik Lyngs, Jun Zhao, Claudine Tinsman, and Nigel Shadbolt. 2021. Before and after GDPR: Tracking in Mobile Apps. 10, 4 (2021). https:\/\/doi.org\/10.14763\/2021.4.1611"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451632"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.21105\/joss.04270"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"crossref","unstructured":"Anastasia Kozyreva Sam Wineburg Stephan Lewandowsky and Ralph Hertwig. 0. Critical Ignoring as a Core Competence for Digital Citizens. Current Directions in Psychological Science 0 0 (0) 09637214221121570. https:\/\/doi.org\/10.1177\/09637214221121570 arXiv:https:\/\/doi.org\/10.1177\/09637214221121570    10.1177\/09637214221121570\nAnastasia Kozyreva Sam Wineburg Stephan Lewandowsky and Ralph Hertwig. 0. Critical Ignoring as a Core Competence for Digital Citizens. Current Directions in Psychological Science 0 0 (0) 09637214221121570. https:\/\/doi.org\/10.1177\/09637214221121570 arXiv:https:\/\/doi.org\/10.1177\/09637214221121570","DOI":"10.1177\/09637214221121570"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1080\/1034912X.2015.1029877","article-title":"Disability, Stigma and Otherness: Perspectives of Parents and Teachers","volume":"62","author":"Lalvani Priya","year":"2015","unstructured":"Priya Lalvani . 2015 . Disability, Stigma and Otherness: Perspectives of Parents and Teachers . International Journal of Disability, Development and Education 62 , 4 (2015), 379 \u2013 393 . https:\/\/doi.org\/10.1080\/1034912X.2015.1029877 arXiv:https:\/\/doi.org\/10.1080\/1034912X.2015.1029877 10.1080\/1034912X.2015.1029877 Priya Lalvani. 2015. Disability, Stigma and Otherness: Perspectives of Parents and Teachers. International Journal of Disability, Development and Education 62, 4 (2015), 379\u2013393. https:\/\/doi.org\/10.1080\/1034912X.2015.1029877 arXiv:https:\/\/doi.org\/10.1080\/1034912X.2015.1029877","journal-title":"International Journal of Disability, Development and Education"},{"key":"e_1_3_2_1_75_1","unstructured":"Lawence Lessig. 2006. Code 2.0 (1 ed.). Basic Books.  Lawence Lessig. 2006. Code 2.0 (1 ed.). Basic Books."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004891"},{"key":"e_1_3_2_1_77_1","unstructured":"LuckyPatcher. [n. d.]. Lucky Patcher. https:\/\/www.luckypatchers.com\/  LuckyPatcher. [n. d.]. Lucky Patcher. https:\/\/www.luckypatchers.com\/"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300361"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376672"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1515\/til-2019-0007","article-title":"Grappling with \u201cData Power\u201d: Normative Nudges from Data Protection and Privacy","volume":"20","author":"Lynskey Orla","year":"2019","unstructured":"Orla Lynskey . 2019 . Grappling with \u201cData Power\u201d: Normative Nudges from Data Protection and Privacy . Theoretical Inquiries in Law 20 , 1 (2019), 189 \u2013 220 . https:\/\/doi.org\/10.1515\/til-2019-0007 10.1515\/til-2019-0007 Orla Lynskey. 2019. Grappling with \u201cData Power\u201d: Normative Nudges from Data Protection and Privacy. Theoretical Inquiries in Law 20, 1 (2019), 189\u2013220. https:\/\/doi.org\/10.1515\/til-2019-0007","journal-title":"Theoretical Inquiries in Law"},{"key":"e_1_3_2_1_81_1","unstructured":"MacRumours. [n. d.]. Apple Fails in Bid to Dismiss Cydia Creator\u2019s Amended Antitrust Lawsuit. https:\/\/www.macrumors.com\/2022\/05\/30\/judge-allows-cydia-lawsuit-against-apple\/  MacRumours. [n. d.]. Apple Fails in Bid to Dismiss Cydia Creator\u2019s Amended Antitrust Lawsuit. https:\/\/www.macrumors.com\/2022\/05\/30\/judge-allows-cydia-lawsuit-against-apple\/"},{"key":"e_1_3_2_1_82_1","volume-title":"Proceedings of the 2020 ACM Designing Interactive Systems Conference. ACM, Eindhoven Netherlands, 1727\u20131735","author":"Merrill Nick","year":"2020","unstructured":"Nick Merrill . 2020 . Security Fictions: Bridging Speculative Design and Computer Security . In Proceedings of the 2020 ACM Designing Interactive Systems Conference. ACM, Eindhoven Netherlands, 1727\u20131735 . https:\/\/doi.org\/10.1145\/3357236.3395451 10.1145\/3357236.3395451 Nick Merrill. 2020. Security Fictions: Bridging Speculative Design and Computer Security. In Proceedings of the 2020 ACM Designing Interactive Systems Conference. ACM, Eindhoven Netherlands, 1727\u20131735. https:\/\/doi.org\/10.1145\/3357236.3395451"},{"key":"e_1_3_2_1_83_1","volume-title":"Proceedings of the Fifteenth Symposium on Usable Privacy and Security","author":"Mhaidli Abraham H","year":"2019","unstructured":"Abraham H Mhaidli , Yixin Zou , and Florian Schaub . 2019 . \u201c We Can\u2019t Live Without Them!\u201d App Developers\u2019 Adoption of Ad Networks and Their Considerations of Consumer Risks . Proceedings of the Fifteenth Symposium on Usable Privacy and Security (2019), 21. Abraham H Mhaidli, Yixin Zou, and Florian Schaub. 2019. \u201cWe Can\u2019t Live Without Them!\u201d App Developers\u2019 Adoption of Ad Networks and Their Considerations of Consumer Risks. Proceedings of the Fifteenth Symposium on Usable Privacy and Security (2019), 21."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/512035.512055"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376321"},{"volume-title":"The Right to Repair: Reclaiming Control over the Things We Own","author":"Perzanowski Aaron","key":"e_1_3_2_1_86_1","unstructured":"Aaron Perzanowski . 2022. The Right to Repair: Reclaiming Control over the Things We Own . Cambridge University Press , Cambridge, United Kingdom; New York, NY. Aaron Perzanowski. 2022. The Right to Repair: Reclaiming Control over the Things We Own. Cambridge University Press, Cambridge, United Kingdom; New York, NY."},{"key":"e_1_3_2_1_87_1","volume-title":"Are Chrome Extensions Compliant with the Spirit of Least Privilege?International Journal of Information Security (Sept","author":"Picazo-Sanchez Pablo","year":"2022","unstructured":"Pablo Picazo-Sanchez , Lara Ortiz-Martin , Gerardo Schneider , and Andrei Sabelfeld . 2022. Are Chrome Extensions Compliant with the Spirit of Least Privilege?International Journal of Information Security (Sept . 2022 ). https:\/\/doi.org\/10.1007\/s10207-022-00610-w 10.1007\/s10207-022-00610-w Pablo Picazo-Sanchez, Lara Ortiz-Martin, Gerardo Schneider, and Andrei Sabelfeld. 2022. Are Chrome Extensions Compliant with the Spirit of Least Privilege?International Journal of Information Security (Sept. 2022). https:\/\/doi.org\/10.1007\/s10207-022-00610-w"},{"key":"e_1_3_2_1_88_1","unstructured":"Mark Pilgrim. 2005. Greasemonkey Hacks. O\u2019Reilly Sebastopol Calif.  Mark Pilgrim. 2005. Greasemonkey Hacks. O\u2019Reilly Sebastopol Calif."},{"key":"e_1_3_2_1_89_1","unstructured":"Santiago Pontiroli. 2019. The Cake Is a Lie! Uncovering the Secret World of Malware-like Cheats in Video Games. (2019) 10.  Santiago Pontiroli. 2019. The Cake Is a Lie! Uncovering the Secret World of Malware-like Cheats in Video Games. (2019) 10."},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143400"},{"volume-title":"Ruling in case 308 O 130\/19. https:\/\/dejure.org\/dienste\/vernetzung\/rechtsprechung?Gericht=LG%20Hamburg&Datum=14.01.2022&Aktenzeichen=308%20O%20130%2F19","author":"Hamburg Regional Court","key":"e_1_3_2_1_91_1","unstructured":"Regional Court of Hamburg . 2022. Ruling in case 308 O 130\/19. https:\/\/dejure.org\/dienste\/vernetzung\/rechtsprechung?Gericht=LG%20Hamburg&Datum=14.01.2022&Aktenzeichen=308%20O%20130%2F19 . Regional Court of Hamburg. 2022. Ruling in case 308 O 130\/19. https:\/\/dejure.org\/dienste\/vernetzung\/rechtsprechung?Gericht=LG%20Hamburg&Datum=14.01.2022&Aktenzeichen=308%20O%20130%2F19."},{"key":"e_1_3_2_1_92_1","volume-title":"Dark Patterns: Regulating Digital Design. https:\/\/www.stiftung-nv.de\/sites\/default\/files\/dark.patterns.english.pdf","author":"Rieger Sebastian","year":"2020","unstructured":"Sebastian Rieger and Caroline Sinders . 2020 . Dark Patterns: Regulating Digital Design. https:\/\/www.stiftung-nv.de\/sites\/default\/files\/dark.patterns.english.pdf Sebastian Rieger and Caroline Sinders. 2020. Dark Patterns: Regulating Digital Design. https:\/\/www.stiftung-nv.de\/sites\/default\/files\/dark.patterns.english.pdf"},{"key":"e_1_3_2_1_93_1","volume-title":"The Dark Side of Interaction Design. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems","author":"Rogers Yvonne","year":"2020","unstructured":"Yvonne Rogers , Paul Dourish , Patrick Olivier , Margot Brereton , and Jodi Forlizzi . 2020 . The Dark Side of Interaction Design. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems ( Honolulu, HI, USA) (CHI EA \u201920). Association for Computing Machinery, New York, NY, USA, 1\u20134. https:\/\/doi.org\/10.1145\/3334480.3381070 10.1145\/3334480.3381070 Yvonne Rogers, Paul Dourish, Patrick Olivier, Margot Brereton, and Jodi Forlizzi. 2020. The Dark Side of Interaction Design. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI EA \u201920). Association for Computing Machinery, New York, NY, USA, 1\u20134. https:\/\/doi.org\/10.1145\/3334480.3381070"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3348797"},{"key":"e_1_3_2_1_95_1","unstructured":"rovo89. [n. d.]. Xposed Framework. https:\/\/xposed.info\/  rovo89. [n. d.]. Xposed Framework. https:\/\/xposed.info\/"},{"key":"e_1_3_2_1_96_1","first-page":"2","article-title":"Freedom to Tinker","volume":"17","author":"Samuelson Pamela","year":"2016","unstructured":"Pamela Samuelson . 2016 . Freedom to Tinker . Theoretical Inquiries in Law 17 , 2 (July 2016). Pamela Samuelson. 2016. Freedom to Tinker. Theoretical Inquiries in Law 17, 2 (July 2016).","journal-title":"Theoretical Inquiries in Law"},{"key":"e_1_3_2_1_97_1","unstructured":"SensePost. [n. d.]. objection. https:\/\/github.com\/sensepost\/objection  SensePost. [n. d.]. objection. https:\/\/github.com\/sensepost\/objection"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382999"},{"volume-title":"The Five Whys Technique","author":"Serrat Olivier","key":"e_1_3_2_1_99_1","unstructured":"Olivier Serrat . 2017. The Five Whys Technique . Springer Singapore , Singapore , 307\u2013310. https:\/\/doi.org\/10.1007\/978-981-10-0983-9_32 10.1007\/978-981-10-0983-9_32 Olivier Serrat. 2017. The Five Whys Technique. Springer Singapore, Singapore, 307\u2013310. https:\/\/doi.org\/10.1007\/978-981-10-0983-9_32"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557421"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0017"},{"key":"e_1_3_2_1_102_1","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security (10","author":"Sirur Sean","year":"2018","unstructured":"Sean Sirur , Jason R.C. Nurse , and Helena Webb . 2018 . Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR) . Proceedings of the ACM Conference on Computer and Communications Security (10 2018), 88\u201395. https:\/\/doi.org\/10.1145\/3267357.3267368 10.1145\/3267357.3267368 Sean Sirur, Jason R.C. Nurse, and Helena Webb. 2018. Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR). Proceedings of the ACM Conference on Computer and Communications Security (10 2018), 88\u201395. https:\/\/doi.org\/10.1145\/3267357.3267368"},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"crossref","unstructured":"Adam Smith. 1776. An Inquiry into the Nature and Causes of the Wealth of Nations.  Adam Smith. 1776. An Inquiry into the Nature and Causes of the Wealth of Nations.","DOI":"10.1093\/oseo\/instance.00043218"},{"key":"e_1_3_2_1_104_1","volume-title":"The Normative Ontology of Fitness Trackers. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI EA \u201918)","author":"Spiel Katta","year":"2018","unstructured":"Katta Spiel , Fares Kayali , Louise Horvath , Michael Penkler , Sabine Harrer , Miguel Sicart , and Jessica Hammer . 2018 . Fitter, Happier, More Productive? The Normative Ontology of Fitness Trackers. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI EA \u201918) . Association for Computing Machinery, New York, NY, USA, 1\u201310. https:\/\/doi.org\/10.1145\/3170427.3 188401 10.1145\/3170427.3188401 Katta Spiel, Fares Kayali, Louise Horvath, Michael Penkler, Sabine Harrer, Miguel Sicart, and Jessica Hammer. 2018. Fitter, Happier, More Productive? The Normative Ontology of Fitness Trackers. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI EA \u201918). Association for Computing Machinery, New York, NY, USA, 1\u201310. https:\/\/doi.org\/10.1145\/3170427.3188401"},{"volume-title":"Ad blocking user penetration rate in the United States from 2014 to","year":"2021","key":"e_1_3_2_1_105_1","unstructured":"Statista. 2021. Ad blocking user penetration rate in the United States from 2014 to 2021 . https:\/\/www.statista.com\/statistics\/804008\/ad-blocking-reach-usage-us\/ Statista. 2021. Ad blocking user penetration rate in the United States from 2014 to 2021. https:\/\/www.statista.com\/statistics\/804008\/ad-blocking-reach-usage-us\/"},{"key":"e_1_3_2_1_106_1","unstructured":"Statista \/ Vorhaus Advisors. 2022. Time spent using smartphone. https:\/\/www.statista.com\/statistics\/1310218\/time-spent-using-smartphone-age-us\/  Statista \/ Vorhaus Advisors. 2022. Time spent using smartphone. https:\/\/www.statista.com\/statistics\/1310218\/time-spent-using-smartphone-age-us\/"},{"key":"e_1_3_2_1_107_1","volume-title":"A Deep Learning Approach to Android Malware Feature Learning and Detection. In 2016 IEEE Trustcom\/BigDataSE\/ISPA","author":"Su Xin","year":"2016","unstructured":"Xin Su , Dafang Zhang , Wenjia Li , and Kai Zhao . 2016. A Deep Learning Approach to Android Malware Feature Learning and Detection. In 2016 IEEE Trustcom\/BigDataSE\/ISPA . IEEE , Tianjin, China , 244\u2013251. https:\/\/doi.org\/10.1109\/TrustCom. 2016 .0070 10.1109\/TrustCom.2016.0070 Xin Su, Dafang Zhang, Wenjia Li, and Kai Zhao. 2016. A Deep Learning Approach to Android Malware Feature Learning and Detection. In 2016 IEEE Trustcom\/BigDataSE\/ISPA. IEEE, Tianjin, China, 244\u2013251. https:\/\/doi.org\/10.1109\/TrustCom.2016.0070"},{"volume-title":"Google LLC v. Oracle America","author":"Supreme Court of the United States. 2020.","key":"e_1_3_2_1_108_1","unstructured":"Supreme Court of the United States. 2020. Google LLC v. Oracle America , Inc .https:\/\/www.supremecourt.gov\/opinions\/20pdf\/18-956_d18f.pdf Supreme Court of the United States. 2020. Google LLC v. Oracle America, Inc.https:\/\/www.supremecourt.gov\/opinions\/20pdf\/18-956_d18f.pdf"},{"volume-title":"The Right to Customization: Conceptualizing the Right to Repair for Informational Privacy","author":"Tam\u00f2-Larrieux Aurelia","key":"e_1_3_2_1_109_1","unstructured":"Aurelia Tam\u00f2-Larrieux , Zaira Zihlmann , Kimberly Garcia , and Simon Mayer . 2021. The Right to Customization: Conceptualizing the Right to Repair for Informational Privacy . In Privacy Technologies and Policy, Nils Gruschka, Lu\u00eds Filipe Coelho Antunes, Kai Rannenberg, and Prokopios Drogkaris (Eds.). Vol. 12703 . Springer International Publishing , Cham , 3\u201322. https:\/\/doi.org\/10.1007\/978-3-030-76663-4_1 10.1007\/978-3-030-76663-4_1 Aurelia Tam\u00f2-Larrieux, Zaira Zihlmann, Kimberly Garcia, and Simon Mayer. 2021. The Right to Customization: Conceptualizing the Right to Repair for Informational Privacy. In Privacy Technologies and Policy, Nils Gruschka, Lu\u00eds Filipe Coelho Antunes, Kai Rannenberg, and Prokopios Drogkaris (Eds.). Vol. 12703. Springer International Publishing, Cham, 3\u201322. https:\/\/doi.org\/10.1007\/978-3-030-76663-4_1"},{"volume-title":"The toaster project: Or a heroic attempt to build a simple electric appliance from scratch","author":"Thwaites Thomas","key":"e_1_3_2_1_110_1","unstructured":"Thomas Thwaites . 2011. The toaster project: Or a heroic attempt to build a simple electric appliance from scratch . Chronicle Books . Thomas Thwaites. 2011. The toaster project: Or a heroic attempt to build a simple electric appliance from scratch. Chronicle Books."},{"key":"e_1_3_2_1_111_1","first-page":"2022","volume-title":"Proceedings on Privacy Enhancing Technologies 2022","author":"Tileria Marcos","year":"2022","unstructured":"Marcos Tileria and Jorge Blasco . 2022 . Watch Over Your TV: A Security and Privacy Analysis of the Android TV Ecosystem . Proceedings on Privacy Enhancing Technologies 2022 , 3 (July 2022), 692\u2013710. https:\/\/doi.org\/10.56553\/popets- 2022 - 0092 10.56553\/popets-2022-0092 Marcos Tileria and Jorge Blasco. 2022. Watch Over Your TV: A Security and Privacy Analysis of the Android TV Ecosystem. Proceedings on Privacy Enhancing Technologies 2022, 3 (July 2022), 692\u2013710. https:\/\/doi.org\/10.56553\/popets-2022-0092"},{"key":"e_1_3_2_1_112_1","volume-title":"Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security","author":"Acker Steven Van","year":"2014","unstructured":"Steven Van Acker , Nick Nikiforakis , Lieven Desmet , Frank Piessens , and Wouter Joosen . 2014 . Monkey-in-the-Browser: Malware and Vulnerabilities in Augmented Browsing Script Markets . In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security ( Kyoto, Japan) (ASIA CCS \u201914). Association for Computing Machinery, New York, NY, USA, 525\u2013530. https:\/\/doi.org\/10.1145\/2590296.2590311 10.1145\/2590296.2590311 Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Frank Piessens, and Wouter Joosen. 2014. Monkey-in-the-Browser: Malware and Vulnerabilities in Augmented Browsing Script Markets. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (Kyoto, Japan) (ASIA CCS \u201914). Association for Computing Machinery, New York, NY, USA, 525\u2013530. https:\/\/doi.org\/10.1145\/2590296.2590311"},{"key":"e_1_3_2_1_113_1","volume-title":"Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems - CHI \u201917(CHI \u201917)","author":"Kleek Max Van","year":"2017","unstructured":"Max Van Kleek , Ilaria Liccardi , Reuben Binns , Jun Zhao , Daniel J. Weitzner , and Nigel Shadbolt . 2017 . Better the Devil You Know: Exposing the Data Sharing Practices of Smartphone Apps . In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems - CHI \u201917(CHI \u201917) . ACM Press, Denver, Colorado, USA, 5208\u20135220. https:\/\/doi.org\/10.1145\/3025453.3025556 10.1145\/3025453.3025556 Max Van Kleek, Ilaria Liccardi, Reuben Binns, Jun Zhao, Daniel J. Weitzner, and Nigel Shadbolt. 2017. Better the Devil You Know: Exposing the Data Sharing Practices of Smartphone Apps. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems - CHI \u201917(CHI \u201917). ACM Press, Denver, Colorado, USA, 5208\u20135220. https:\/\/doi.org\/10.1145\/3025453.3025556"},{"key":"e_1_3_2_1_114_1","unstructured":"Vanced. [n. d.]. Vanced. https:\/\/vancedapp.com\/  Vanced. [n. d.]. Vanced. https:\/\/vancedapp.com\/"},{"key":"e_1_3_2_1_115_1","volume-title":"An Empirical Study on Accessibility in Android Apps. In 2019 IEEE International Conference on Software Maintenance and Evolution (ICSME). 41\u201352","author":"Vendome Christopher","year":"2019","unstructured":"Christopher Vendome , Diana Solano , Santiago Li\u00f1\u00e1n , and Mario Linares-V\u00e1squez . 2019 . Can Everyone use my app? An Empirical Study on Accessibility in Android Apps. In 2019 IEEE International Conference on Software Maintenance and Evolution (ICSME). 41\u201352 . https:\/\/doi.org\/10.1109\/ICSME.2019.00014 10.1109\/ICSME.2019.00014 Christopher Vendome, Diana Solano, Santiago Li\u00f1\u00e1n, and Mario Linares-V\u00e1squez. 2019. Can Everyone use my app? An Empirical Study on Accessibility in Android Apps. In 2019 IEEE International Conference on Software Maintenance and Evolution (ICSME). 41\u201352. https:\/\/doi.org\/10.1109\/ICSME.2019.00014"},{"key":"e_1_3_2_1_116_1","volume-title":"To navigate the dangers of the web, you need critical thinking\u2013But also critical ignoring. The Conversation","author":"Wineburg S","year":"2021","unstructured":"S Wineburg . 2021. To navigate the dangers of the web, you need critical thinking\u2013But also critical ignoring. The Conversation ( 2021 ). S Wineburg. 2021. To navigate the dangers of the web, you need critical thinking\u2013But also critical ignoring. The Conversation (2021)."},{"key":"e_1_3_2_1_117_1","first-page":"35","article-title":"The iPhone Jailbreaking Exemption and the Issue of Openness","volume":"19","author":"Wolk Michael H","year":"2010","unstructured":"Michael H Wolk . 2010 . The iPhone Jailbreaking Exemption and the Issue of Openness . Cornell Journal of Law and Public Policy : 19 , 3 (2010), 35 . Michael H Wolk. 2010. The iPhone Jailbreaking Exemption and the Issue of Openness. Cornell Journal of Law and Public Policy: 19, 3 (2010), 35.","journal-title":"Cornell Journal of Law and Public Policy"},{"key":"e_1_3_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300746"},{"key":"e_1_3_2_1_119_1","doi-asserted-by":"crossref","unstructured":"Tim Wu. 2018. The Curse of Bigness: Antitrust in the New Gilded Age. Columbia Global Reports. OCLC: on1029205194.  Tim Wu. 2018. The Curse of Bigness: Antitrust in the New Gilded Age. Columbia Global Reports. OCLC: on1029205194.","DOI":"10.2307\/j.ctv1fx4h9c"},{"key":"e_1_3_2_1_120_1","first-page":"1","volume-title":"DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks. 2018 IEEE European Symposium on Security and Privacy (EuroS&P) 1","author":"Xu K.","year":"2018","unstructured":"K. Xu , Yingjiu Li , R. Deng , and K. Chen . 2018 . DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks. 2018 IEEE European Symposium on Security and Privacy (EuroS&P) 1 , 1 ( 2018 ), 473\u2013487. https:\/\/doi.org\/10.1109\/EuroSP.2018.00040 10.1109\/EuroSP.2018.00040 K. Xu, Yingjiu Li, R. Deng, and K. Chen. 2018. DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks. 2018 IEEE European Symposium on Security and Privacy (EuroS&P) 1, 1 (2018), 473\u2013487. https:\/\/doi.org\/10.1109\/EuroSP.2018.00040"},{"key":"e_1_3_2_1_121_1","volume-title":"Aurasium: Practical Policy Enforcement for Android Applications. In 21st USENIX Security Symposium (USENIX Security 12)","author":"Xu Rubin","year":"2012","unstructured":"Rubin Xu , Hassen Saidi , and Ross Anderson . 2012 . Aurasium: Practical Policy Enforcement for Android Applications. In 21st USENIX Security Symposium (USENIX Security 12) . USENIX Association, Bellevue, WA, 539\u2013552. https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/xu_rubin Rubin Xu, Hassen Saidi, and Ross Anderson. 2012. Aurasium: Practical Policy Enforcement for Android Applications. In 21st USENIX Security Symposium (USENIX Security 12). USENIX Association, Bellevue, WA, 539\u2013552. https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/xu_rubin"},{"key":"e_1_3_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300176"},{"key":"e_1_3_2_1_123_1","volume-title":"Proceedings of the 33rd Annual Computer Security Applications Conference","author":"Yang Wei","year":"2017","unstructured":"Wei Yang , Deguang Kong , Tao Xie , and Carl A. Gunter . 2017. Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps . In Proceedings of the 33rd Annual Computer Security Applications Conference ( Orlando, FL, USA) (ACSAC 2017 ). Association for Computing Machinery, New York, NY, USA, 288\u2013302. https:\/\/doi.org\/10.1145\/3134600.3134642 10.1145\/3134600.3134642 Wei Yang, Deguang Kong, Tao Xie, and Carl A. Gunter. 2017. Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps. In Proceedings of the 33rd Annual Computer Security Applications Conference (Orlando, FL, USA) (ACSAC 2017). Association for Computing Machinery, New York, NY, USA, 288\u2013302. https:\/\/doi.org\/10.1145\/3134600.3134642"},{"key":"e_1_3_2_1_124_1","first-page":"2019","volume-title":"Privacy Enhancing Technologies Symposium 2019 72","author":"Zimmeck Sebastian","year":"2019","unstructured":"Sebastian Zimmeck , Peter Story , Daniel Smullen , Abhilasha Ravichander , Ziqi Wang , Joel Reidenberg , N Cameron Russell , and Norman Sadeh . 2019 . MAPS: Scaling Privacy Compliance Analysis to a Million Apps . Privacy Enhancing Technologies Symposium 2019 72 , 3 (6 2019), 66\u201386. https:\/\/doi.org\/10.2478\/popets- 2019 - 0037 10.2478\/popets-2019-0037 Sebastian Zimmeck, Peter Story, Daniel Smullen, Abhilasha Ravichander, Ziqi Wang, Joel Reidenberg, N Cameron Russell, and Norman Sadeh. 2019. MAPS: Scaling Privacy Compliance Analysis to a Million Apps. Privacy Enhancing Technologies Symposium 2019 72, 3 (6 2019), 66\u201386. https:\/\/doi.org\/10.2478\/popets-2019-0037"}],"event":{"name":"FAccT '23: the 2023 ACM Conference on Fairness, Accountability, and Transparency","acronym":"FAccT '23","location":"Chicago IL USA"},"container-title":["2023 ACM Conference on Fairness, Accountability, and Transparency"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3593013.3593973","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3593013.3593973","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:48:02Z","timestamp":1750178882000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3593013.3593973"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,12]]},"references-count":126,"alternative-id":["10.1145\/3593013.3593973","10.1145\/3593013"],"URL":"https:\/\/doi.org\/10.1145\/3593013.3593973","relation":{},"subject":[],"published":{"date-parts":[[2023,6,12]]},"assertion":[{"value":"2023-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}