{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T11:44:27Z","timestamp":1750765467924,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T00:00:00Z","timestamp":1686528000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000879","name":"Alfred P. Sloan Foundation","doi-asserted-by":"publisher","award":["G-2021-16956"],"award-info":[{"award-number":["G-2021-16956"]}],"id":[{"id":"10.13039\/100000879","id-type":"DOI","asserted-by":"publisher"}]},{"name":"MassMutual Center of Excellence in Complex Systems and Data Science"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,12]]},"DOI":"10.1145\/3593013.3594065","type":"proceedings-article","created":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T14:40:46Z","timestamp":1686580846000},"page":"1088-1100","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["More Data Types More Problems: A Temporal Analysis of Complexity, Stability, and Sensitivity in Privacy Policies"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1619-7552","authenticated-orcid":false,"given":"Juniper","family":"Lovato","sequence":"first","affiliation":[{"name":"Vermont Complex Systems Center, University of Vermont, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3756-9468","authenticated-orcid":false,"given":"Philip","family":"Mueller","sequence":"additional","affiliation":[{"name":"Vermont Complex Systems Center, University of Vermont, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0834-4455","authenticated-orcid":false,"given":"Parisa","family":"Suchdev","sequence":"additional","affiliation":[{"name":"Computer Science, University of Vermont, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1973-8614","authenticated-orcid":false,"given":"Peter","family":"Dodds","sequence":"additional","affiliation":[{"name":"Vermont Complex Systems Center, Computer Science, University of Vermont, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450048"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2008.09.001"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468"},{"key":"e_1_3_2_1_4_1","first-page":"995","article-title":"Digital market manipulation. Geo","volume":"82","author":"Calo Ryan","year":"2013","unstructured":"Ryan Calo. 2013. Digital market manipulation. Geo. Wash. L. Rev. 82 (2013), 995.","journal-title":"Wash. L. Rev."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444816657096"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/msecp.2003.1253568"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/tem.2005.844927"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1108\/oir-11-2012-0124"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3389\/fphy.2021.671882"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41109-022-00446-2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.aaq1360"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025903"},{"key":"e_1_3_2_1_13_1","first-page":"642","article-title":"Reading level of privacy policies on internet health web sites","volume":"51","author":"Graber Mark A","year":"2002","unstructured":"Mark A Graber, Donna M D Alessandro, and Jill Johnson-West. 2002. Reading level of privacy policies on internet health web sites. J. Fam. Practice 51, 7 (2002), 642\u2013642.","journal-title":"J. Fam. Practice"},{"key":"e_1_3_2_1_14_1","volume-title":"Network Onion Divergence: Network representation and comparison using nested configuration models with fixed connectivity, correlation and centrality patterns. arXiv preprint arXiv:2204.08444","author":"H\u00e9bert-Dufresne Laurent","year":"2022","unstructured":"Laurent H\u00e9bert-Dufresne, Jean-Gabriel Young, Alexander Daniels, and Antoine Allard. 2022. Network Onion Divergence: Network representation and comparison using nested configuration models with fixed connectivity, correlation and centrality patterns. arXiv preprint arXiv:2204.08444 (2022), 1\u201315. arXiv:2204.08444"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIS.2013.054334"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985752"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3495563"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.07.017"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0004"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3534640"},{"key":"e_1_3_2_1_21_1","first-page":"543","article-title":"The cost of reading privacy policies","volume":"4","author":"McDonald Aleecia M","year":"2008","unstructured":"Aleecia M McDonald and Lorrie Faith Cranor. 2008. The cost of reading privacy policies. Isjlp 4 (2008), 543.","journal-title":"Isjlp"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1093\/oso"},{"key":"e_1_3_2_1_23_1","volume-title":"California Consumer Privacy Act","author":"State of California. 2018.","year":"2018","unstructured":"State of California. 2018. California Consumer Privacy Act 2018."},{"key":"e_1_3_2_1_24_1","unstructured":"State of Vermont. 2018. Vermont Data Broker Act of 2018 9 V.S.A. \u00a7 2430 et seq."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2007.126"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1284621.1284627"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpsychires.2018.11.016"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1177\/0896920513501350"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-014-9343-8"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1093\/med"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0808904106"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.18574\/nyu"},{"key":"e_1_3_2_1_33_1","volume-title":"Privacy at scale: Introducing the privaseer corpus of web privacy policies. arXiv preprint arXiv:2004.11131","author":"Srinath Mukund","year":"2020","unstructured":"Mukund Srinath, Shomir Wilson, and C Lee Giles. 2020. Privacy at scale: Introducing the privaseer corpus of web privacy policies. arXiv preprint arXiv:2004.11131 (2020), 1\u201310."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/msec.2019.2953324"},{"key":"e_1_3_2_1_35_1","first-page":"1","article-title":"Online manipulation: Hidden influences in a digital world. Geo","volume":"4","author":"Susser Daniel","year":"2019","unstructured":"Daniel Susser, Beate Roessler, and Helen Nissenbaum. 2019. Online manipulation: Hidden influences in a digital world. Geo. L. Tech. Rev. 4 (2019), 1.","journal-title":"L. Tech. Rev."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/09296179408590015"},{"key":"e_1_3_2_1_37_1","volume-title":"IJCAI","volume":"99","author":"Veling Anne","year":"1999","unstructured":"Anne Veling and Peter Van Der Weerd. 1999. Conceptual grouping in word co-occurrence networks. In IJCAI, Vol. 99. Dorpsweg 78, 1697 KD Schellinkhout, The Netherlands, 694\u2013701."},{"key":"e_1_3_2_1_38_1","volume-title":"Privacy Policies Across the Ages: Content of Privacy Policies 1996\u20132021. ACM Transactions on Privacy and Security","author":"Wagner Isabel","year":"2023","unstructured":"Isabel Wagner. 2023. Privacy Policies Across the Ages: Content of Privacy Policies 1996\u20132021. ACM Transactions on Privacy and Security (2023), 1\u201333."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00305-0_17"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3389685"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1103\/physrevresearch.2.043271"}],"event":{"name":"FAccT '23: the 2023 ACM Conference on Fairness, Accountability, and Transparency","acronym":"FAccT '23","location":"Chicago IL USA"},"container-title":["2023 ACM Conference on Fairness Accountability and Transparency"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3593013.3594065","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3593013.3594065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:18Z","timestamp":1750178238000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3593013.3594065"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,12]]},"references-count":41,"alternative-id":["10.1145\/3593013.3594065","10.1145\/3593013"],"URL":"https:\/\/doi.org\/10.1145\/3593013.3594065","relation":{},"subject":[],"published":{"date-parts":[[2023,6,12]]},"assertion":[{"value":"2023-06-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}