{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:46:34Z","timestamp":1776109594118,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,11]]},"DOI":"10.1145\/3613904.3642260","type":"proceedings-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:38:25Z","timestamp":1715416705000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["\u201cIt doesn\u2019t tell me anything about how my data is used\u201d: User Perceptions of Data Collection Purposes"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4753-3889","authenticated-orcid":false,"given":"Lin","family":"Kyi","sequence":"first","affiliation":[{"name":"Max Planck Institute for Security and Privacy, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9519-245X","authenticated-orcid":false,"given":"Abraham","family":"Mhaidli","sequence":"additional","affiliation":[{"name":"School of Information, University of Michigan, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0712-2038","authenticated-orcid":false,"given":"Cristiana Teixeira","family":"Santos","sequence":"additional","affiliation":[{"name":"School of Law, Utrecht University, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8735-4810","authenticated-orcid":false,"given":"Franziska","family":"Roesner","sequence":"additional","affiliation":[{"name":"Paul G. Allen School of Computer Science &amp; Engineering, University of Washington, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8083-0976","authenticated-orcid":false,"given":"Asia J.","family":"Biega","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Security and Privacy, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"e_1_3_3_3_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"key":"e_1_3_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-021-01262-5"},{"key":"e_1_3_3_3_3_1","volume-title":"Flying Blind: How Bad Data Undermines Business. https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2021\/10\/14\/flying-blind-how-bad-data-undermines-business\/","author":"Bansal Manu","year":"2021","unstructured":"Manu Bansal. 2021. Flying Blind: How Bad Data Undermines Business. https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2021\/10\/14\/flying-blind-how-bad-data-undermines-business\/"},{"key":"e_1_3_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2017.04.013"},{"key":"e_1_3_3_3_5_1","unstructured":"Robert Bateman. 2023. Do I Need a Privacy Policy if I Don\u2019t Collect Any Data?Available at https:\/\/www.termsfeed.com\/blog\/privacy-policy-no-data-collected\/."},{"key":"e_1_3_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3539008"},{"key":"e_1_3_3_3_7_1","volume-title":"Data Repurposing through Compatibility: A Computational Perspective. Journal of Institutional and Theoretical Economics","author":"Biega J","year":"2023","unstructured":"Asia\u00a0J Biega. 2023. Data Repurposing through Compatibility: A Computational Perspective. Journal of Institutional and Theoretical Economics (2023)."},{"key":"e_1_3_3_3_8_1","unstructured":"European Data\u00a0Protection Board. 2007. Opinion 4\/2007 on the concept of personal data (WP 136) adopted on 20.06.2007. https:\/\/ec.europa.eu\/justice\/article-29\/documentation\/opinion recommendation\/files\/2007\/wp136_en.pdf"},{"key":"e_1_3_3_3_9_1","volume-title":"Automating Cookie Consent and GDPR Violation Detection. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Bollinger Dino","year":"2022","unstructured":"Dino Bollinger, Karel Kubicek, Carlos Cotrini, and David Basin. 2022. Automating Cookie Consent and GDPR Violation Detection. In 31st USENIX Security Symposium (USENIX Security 22). 2893\u20132910."},{"key":"e_1_3_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461778.3462086"},{"key":"e_1_3_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580725"},{"key":"e_1_3_3_3_12_1","unstructured":"Commission Nationale de L\u2019informatique. 2020. Cookies et autres traceurs. Available at https:\/\/www.cnil.fr\/fr\/cookies-et-autres-traceurs\/regles\/cookies\/lignes-directrices-modificatives-et-recommandation."},{"key":"e_1_3_3_3_13_1","unstructured":"Commission Nationale de L\u2019informatique. 2022. Cookies: the CNIL fines Google a total of 150 million euros and Facebook 60 million euros for non-compliance with French legislation. https:\/\/www.cnil.fr\/en\/cookies-cnil-fines-google-total-150-million-euros-and-facebook-60-million-euros-non-compliance"},{"key":"e_1_3_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23378"},{"key":"e_1_3_3_3_15_1","unstructured":"European Data Protection\u00a0Board (EDPB). 2013. Opinion 03\/2013 on purpose limitation (WP 203). Available at https:\/\/ec.europa.eu\/justice\/article-29\/documentation\/opinion-recommendation\/files\/2013\/wp203_en.pdf."},{"key":"e_1_3_3_3_16_1","volume-title":"adopted on","author":"Working European Data","year":"2013","unstructured":"European Data Protection\u00a0Board (EDPB). 2013. Working Document 02\/2013 providing guidance on obtaining consent for cookies, adopted on 2 October 2013. Available at https:\/\/www.pdpjournals.com\/docs\/88135.pdf."},{"key":"e_1_3_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00043"},{"key":"e_1_3_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_3_3_3_19_1","unstructured":"European Commission. 2018. 2018 Reform of EU data protection rules. Available at https:\/\/ec.europa.eu\/commission\/sites\/beta-political\/files\/data-protection-factsheet-changes_en.pdf."},{"key":"e_1_3_3_3_20_1","unstructured":"European Commission. 2018. Guidelines on transparency under Regulation 2016\/679 WP260 rev.01. Available at https:\/\/ec.europa.eu\/newsroom\/article29\/item-detail.cfm?item_id=622227."},{"key":"e_1_3_3_3_22_1","unstructured":"European Data Protection Board. 2023. Report of the work undertaken by the Cookie Banner Taskforce. Available at https:\/\/edpb.europa.eu\/system\/files\/2023-01\/edpb_20230118_report_cookie_banner_taskforce_en.pdf."},{"key":"e_1_3_3_3_23_1","unstructured":"European Parliament. 2002. Privacy and Electronic Communications Directive (ePrivacy Directive)."},{"key":"e_1_3_3_3_24_1","unstructured":"Anne\u00a0Josephine Flanagan Jen King and Sheila Warren. 2020. Redesigning data privacy: Reimagining notice & consent for human-technology interaction. Available at https:\/\/www3.weforum.org\/docs\/WEF_Redesigning_Data_Privacy_Report_2020.pdf."},{"key":"e_1_3_3_3_25_1","volume-title":"On Compliance of Cookie Purposes with the Purpose Specification Principle. In International Workshop on Privacy Engineering (IWPE","author":"Fouad Imane","year":"2020","unstructured":"Imane Fouad, Cristiana Santos, Feras Al\u00a0Kassar, Nataliia Bielova, and Stefano Calzavara. 2020. On Compliance of Cookie Purposes with the Purpose Specification Principle. In International Workshop on Privacy Engineering (IWPE 2020). Genova, Italy, 1\u20138. https:\/\/hal.inria.fr\/hal-02567022"},{"key":"e_1_3_3_3_26_1","volume-title":"Discovery of grounded theory: Strategies for qualitative research","author":"Glaser G","unstructured":"Barney\u00a0G Glaser and Anselm\u00a0L Strauss. 2017. Discovery of grounded theory: Strategies for qualitative research. Routledge."},{"key":"e_1_3_3_3_27_1","unstructured":"Google Developers. 2023. Third Parties. Available at https:\/\/web.dev\/learn\/privacy\/third-parties\/."},{"key":"e_1_3_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501985"},{"key":"e_1_3_3_3_29_1","unstructured":"Smita Hashim. 2023. How Zoom\u2019s terms of service and practices apply to AI features. Available at https:\/\/blog.zoom.us\/zooms-term-service-ai\/."},{"key":"e_1_3_3_3_30_1","volume-title":"Sample sizes for saturation in qualitative research: A systematic review of empirical tests. Social science & medicine 292","author":"Hennink Monique","year":"2022","unstructured":"Monique Hennink and Bonnie\u00a0N Kaiser. 2022. Sample sizes for saturation in qualitative research: A systematic review of empirical tests. Social science & medicine 292 (2022), 114523."},{"key":"e_1_3_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423647"},{"key":"e_1_3_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2021.e06522"},{"key":"e_1_3_3_3_33_1","unstructured":"Information Commissioner\u2019s Office. 2019. Guidance on the use of cookies and similar technologies. Available at https:\/\/ico.org.uk\/for-organisations\/direct-marketing-and-privacy-and-electronic-communications\/guide-to-pecr\/guidance-on-the-use-of-cookies-and-similar-technologies\/."},{"key":"e_1_3_3_3_34_1","unstructured":"Information Commissioner\u2019s Office. 2023. Cookies and similar technologies. Available at https:\/\/ico.org.uk\/for-organisations\/direct-marketing-and-privacy-and-electronic-communications\/guide-to-pecr\/cookies-and-similar-technologies\/."},{"key":"e_1_3_3_3_35_1","unstructured":"Information Commissioner\u2019s Office. 2023. Overview \u2013 Data Protection and the EU. Available at https:\/\/ico.org.uk\/for-organisations\/data-protection-and-the-eu\/overview-data-protection-and-the-eu\/."},{"key":"e_1_3_3_3_36_1","unstructured":"Italian Data Protection Authority. 2021. Guidelines on Cookies and Other Tracking Tools. Available at https:\/\/www.garanteprivacy.it\/documents\/10160\/0\/GUIDELINES+ON+COOKIES+AND+OTHER+TRACKING+TOOLS+-+Executive+Summary.pdf\/2278a9d4-a0e1-1578-1a09-8291106f4591?version=3.0."},{"key":"e_1_3_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753561"},{"key":"e_1_3_3_3_39_1","volume-title":"10th Symposium On Usable Privacy and Security (SOUPS","author":"Korff Stefan","year":"2014","unstructured":"Stefan Korff and Rainer B\u00f6hme. 2014. Too much choice: End-user privacy decisions in the context of choice proliferation. In 10th Symposium On Usable Privacy and Security (SOUPS 2014). 69\u201387."},{"key":"e_1_3_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41599-021-00787-w"},{"key":"e_1_3_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3481357.3481516"},{"key":"e_1_3_3_3_42_1","volume-title":"Has the GDPR hype affected users","author":"Kulyk Oksana","year":"2020","unstructured":"Oksana Kulyk, Nina Gerber, Annika Hilt, and Melanie Volkamer. 2020. Has the GDPR hype affected users\u2019 reaction to cookie disclaimers?Journal of Cybersecurity 6, 1 (2020), tyaa022."},{"key":"e_1_3_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2018.23012"},{"key":"e_1_3_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111620"},{"key":"e_1_3_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580637"},{"key":"e_1_3_3_3_46_1","unstructured":"Latvian Data Protection Authority (DVI). 2022. Guidelines for the use of cookies on the website. Available at https:\/\/www.dvi.gov.lv\/lv\/jaunums\/par-preventivas-parbaudes-attieciba-uz-sikdatnu-izmantosanas-atbilstibu-lielako-latvijas-e-komersantu-timekla-vietnes-rezultatiem."},{"key":"e_1_3_3_3_47_1","unstructured":"Latvian DPA (DVI). 2022. Guidelines for the use of cookies on the website. Available at https:\/\/media.licdn.com\/dms\/document\/C4D1FAQGpDp65vdTl_g\/feedshare-document-pdf-analyzed\/0\/1649147267223?e=1678924800&v=beta&t=7MXnitOQ9-bf1hXT092TRmS9aQBfLMjkGe2J0ABR7gk."},{"key":"e_1_3_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519687"},{"key":"e_1_3_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0037"},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.11613\/BM.2012.031"},{"key":"e_1_3_3_3_51_1","unstructured":"Matt Milano. 2023. Zoom Updates Terms to Use Customer Data for AI Training With No Opt-Out. Available at https:\/\/www.webpronews.com\/zoom-updates-terms-to-use-customer-data-for-ai-training-with-no-opt-out\/."},{"key":"e_1_3_3_3_52_1","volume-title":"The serial position effect of free recall.Journal of Experimental Psychology 64, 5","author":"Murdock\u00a0Jr B","year":"1962","unstructured":"Bennet\u00a0B Murdock\u00a0Jr. 1962. The serial position effect of free recall.Journal of Experimental Psychology 64, 5 (1962), 482."},{"key":"e_1_3_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376321"},{"key":"e_1_3_3_3_54_1","unstructured":"Parth Shah Imani Thornton Danielle Turrin and John E Hipskind. 2022. Informed Consent. Available at https:\/\/www.ncbi.nlm.nih.gov\/books\/NBK430827\/."},{"key":"e_1_3_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3463676.3485611"},{"key":"e_1_3_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011902718709"},{"key":"e_1_3_3_3_57_1","volume-title":"Saturation in qualitative research: Exploring its conceptualization and operationalization. Quality & quantity 52","author":"Saunders Benjamin","year":"2018","unstructured":"Benjamin Saunders, Julius Sim, Tom Kingstone, Shula Baker, Jackie Waterfield, Bernadette Bartlam, Heather Burroughs, and Clare Jinks. 2018. Saturation in qualitative research: Exploring its conceptualization and operationalization. Quality & quantity 52 (2018), 1893\u20131907."},{"key":"e_1_3_3_3_58_1","volume-title":"Eleventh Symposium on Usable Privacy and Security (SOUPS","author":"Schaub Florian","year":"2015","unstructured":"Florian Schaub, Rebecca Balebako, Adam\u00a0L Durity, and Lorrie\u00a0Faith Cranor. 2015. A design space for effective privacy notices. In Eleventh Symposium on Usable Privacy and Security (SOUPS 2015). 1\u201317."},{"key":"e_1_3_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665963"},{"key":"e_1_3_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3549015.3555675"},{"key":"e_1_3_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106750"},{"key":"e_1_3_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781526435477"},{"key":"e_1_3_3_3_63_1","volume-title":"Adtech: Market Research Report.","author":"UK Information Commission","year":"2019","unstructured":"UK Information Commissioner\u2019s Office. 2019. Adtech: Market Research Report. Available at https:\/\/ico.org.uk\/media\/about-the-ico\/documents\/2614568\/ico-ofcom-adtech-research-20190320.pdf."},{"key":"e_1_3_3_3_64_1","volume-title":"Data Protection Act","author":"Legislation UK","year":"2018","unstructured":"UK Legislation. 2018. Data Protection Act 2018. https:\/\/www.legislation.gov.uk\/ukpga\/2018\/12\/contents\/enacted"},{"key":"e_1_3_3_3_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354212"},{"key":"e_1_3_3_3_66_1","volume-title":"Impossible asks: Can the Transparency and Consent Framework Ever Authorise Real-Time Bidding After the Belgian DPA Decision","author":"Veale Michael","year":"2022","unstructured":"Michael Veale, Midas Nouwens, and Cristiana Santos. 2022. Impossible asks: can the transparency and consent framework ever authorise real-time bidding after the Belgian DPA decision?Michael Veale, Midas Nouwens and Cristiana Teixeiras Santos, Impossible asks: Can the Transparency and Consent Framework Ever Authorise Real-Time Bidding After the Belgian DPA Decision (2022), 12\u201322."}],"event":{"name":"CHI '24: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Proceedings of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642260","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613904.3642260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:24Z","timestamp":1750290264000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642260"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,11]]},"references-count":65,"alternative-id":["10.1145\/3613904.3642260","10.1145\/3613904"],"URL":"https:\/\/doi.org\/10.1145\/3613904.3642260","relation":{},"subject":[],"published":{"date-parts":[[2024,5,11]]},"assertion":[{"value":"2024-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}