{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T18:43:36Z","timestamp":1759776216848,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3677846.3677850","type":"proceedings-article","created":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:27:40Z","timestamp":1729636060000},"page":"87-95","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Decoding the Privacy Policies of Assistive Technologies"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5913-0817","authenticated-orcid":false,"given":"Kirk","family":"Crawford","sequence":"first","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2406-1196","authenticated-orcid":false,"given":"Yi Xuan","family":"Khoo","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-7624-9819","authenticated-orcid":false,"given":"Asha","family":"Kumar","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0142-3529","authenticated-orcid":false,"given":"Helena","family":"Mentis","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1991-6062","authenticated-orcid":false,"given":"Foad","family":"Hamidi","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,10,22]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Idris Adjerid Eyal Peer and Alessandro Acquisti. 2018. Beyond the privacy paradox: Objective versus relative risk in privacy decision making. Management Information Systems Quarterly 42 2 (2018) 465\u2013488.","key":"e_1_3_3_2_2_2","DOI":"10.25300\/MISQ\/2018\/14316"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_3_2","DOI":"10.1145\/2702123.2702334"},{"doi-asserted-by":"publisher","unstructured":"Taslima Akter Tousif Ahmed Apu Kapadia Manohar Swaminathan and Swami\u00a0Manohar Swaminathan. 2020. Privacy Considerations of the Visually Impaired with Camera Based Assistive Technologies: Misrepresentation Impropriety and Fairness. International ACM SIGACCESS Conference on Computers and Accessibility (2020) 69\u201374. 10.1145\/3373625.3417003https:\/\/dl.acm.org\/doi\/10.1145\/3373625.3417003","key":"e_1_3_3_2_4_2","DOI":"10.1145\/3373625.3417003"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_5_2","DOI":"10.1109\/POLICY.2012.11"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_6_2","DOI":"10.1007\/978-3-540-77366-5_34"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_7_2","DOI":"10.1145\/2384916.2384945"},{"doi-asserted-by":"publisher","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology (2006). 10.1191\/1478088706qp063oa","key":"e_1_3_3_2_8_2","DOI":"10.1191\/1478088706qp063oa"},{"unstructured":"Ronan\u00a0T. Bree and Gerry Gallagher. [n.d.]. Using Microsoft Excel to Code and Thematically Analyse Qualitative Data: A Simple Cost-Effective Approach.8 2 ([n. d.]). Issue 2. https:\/\/ojs.aishe.org\/index.php\/aishe-j\/article\/view\/281","key":"e_1_3_3_2_9_2"},{"doi-asserted-by":"publisher","unstructured":"David Byrne. [n.d.]. A Worked Example of Braun and Clarke\u2019s Approach to Reflexive Thematic Analysis. 56 3 ([n. d.]) 1391\u20131412. 10.1007\/s11135-021-01182-y","key":"e_1_3_3_2_10_2","DOI":"10.1007\/s11135-021-01182-y"},{"doi-asserted-by":"publisher","unstructured":"Alarcos Cieza Carla Sabariego Jerome Bickenbach and Somnath Chatterji. 2018. Rethinking Disability. BMC Medicine 16 1 (Jan. 2018) 14. 10.1186\/s12916-017-1002-6","key":"e_1_3_3_2_11_2","DOI":"10.1186\/s12916-017-1002-6"},{"doi-asserted-by":"publisher","unstructured":"James\u00a0M. Clarke Maryam Mehrnezhad and Ehsan Toreini. 2024. Invisible Unreadable and Inaudible Cookie Notices: An Evaluation of Cookie Notices for Users with Visual Impairments. ACM Transactions on Accessible Computing 17 1 (March 2024) 1:1\u20131:39. 10.1145\/3641281https:\/\/dl.acm.org\/doi\/10.1145\/3641281","key":"e_1_3_3_2_12_2","DOI":"10.1145\/3641281"},{"doi-asserted-by":"publisher","unstructured":"Linda Dye Dougal Hare and Steve Hendy. [n.d.]. Factors Impacting on the Capacity to Consent in People with Learning Disabilities. 8 3 ([n. d.]) 11\u201320. 10.1108\/13595474200300023","key":"e_1_3_3_2_13_2","DOI":"10.1108\/13595474200300023"},{"doi-asserted-by":"publisher","unstructured":"Ram\u00a0D. Gopal Hooman Hidaji Raymond\u00a0A. Patterson Erik Rolland and Dmitry Zhdanov. 2018. How Much to Share with Third Parties?: User Privacy Concerns and Website Dilemmas. Management Information Systems Quarterly (2018). 10.25300\/misq\/2018\/13839 https:\/\/dl.acm.org\/doi\/10.25300\/misq\/2018\/13839","key":"e_1_3_3_2_14_2","DOI":"10.25300\/misq\/2018\/13839"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_15_2","DOI":"10.1145\/3234695.3239331"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_16_2","DOI":"10.1145\/3371300.3383336"},{"doi-asserted-by":"publisher","unstructured":"Foad Hamidi Kellie Poneres Aaron\u00a0K. Massey and Amy Hurst. 2018. Who Should Have Access to my Pointing Data?: Privacy Tradeoffs of Adaptive Assistive Technologies. International ACM SIGACCESS Conference on Computers and Accessibility (2018). 10.1145\/3234695.3239331https:\/\/dl.acm.org\/doi\/10.1145\/3234695.3239331","key":"e_1_3_3_2_17_2","DOI":"10.1145\/3234695.3239331"},{"doi-asserted-by":"publisher","unstructured":"Hamza Harkous Kassem Fawaz R. Lebret F. Schaub K. Shin and K. Aberer. 2018. Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. USENIX Security Symposium (2018). 10.5555\/3277203.3277243 https:\/\/dl.acm.org\/doi\/10.5555\/3277203.3277243","key":"e_1_3_3_2_18_2","DOI":"10.5555\/3277203.3277243"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_19_2","DOI":"10.1145\/985692.985752"},{"doi-asserted-by":"crossref","unstructured":"Desleigh\u00a0de Jonge Sylvia Rodger and Heidi Fitzgibbon. 2001. Putting technology to work: Users\u2019 perspective on integrating assistive technology into the workplace. Work 16 2 (2001) 77\u201389.","key":"e_1_3_3_2_20_2","DOI":"10.3233\/WOR-2001-00139"},{"key":"e_1_3_3_2_21_2","volume-title":"Assistive Technology in the Workplace","author":"Jonge Desleigh\u00a0de","year":"2006","unstructured":"Desleigh\u00a0de Jonge, Marcia Scherer, and Sylvia Rodger. 2006. Assistive Technology in the Workplace. Elsevier Health Sciences. Google-Books-ID: 8gAicjzj358C."},{"key":"e_1_3_3_2_22_2","first-page":"39","volume-title":"Eleventh symposium on usable privacy and security (SOUPS 2015)","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. { \u201cMy} Data Just Goes { Everywhere:\u201d} User Mental Models of the Internet and Implications for Privacy and Security. In Eleventh symposium on usable privacy and security (SOUPS 2015). 39\u201352."},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_23_2","DOI":"10.1145\/1753326.1753561"},{"doi-asserted-by":"publisher","unstructured":"Barbara Krumay and Jennifer Klar. 2020. Readability of Privacy Policies. Database Security (2020). 10.1007\/978-3-030-49669-2_22","key":"e_1_3_3_2_24_2","DOI":"10.1007\/978-3-030-49669-2_22"},{"doi-asserted-by":"publisher","unstructured":"Roxanne Leit\u00e3o. 2018. Digital Technologies and their Role in Intimate Partner Violence. CHI Extended Abstracts (2018). 10.1145\/3170427.3180305https:\/\/dl.acm.org\/doi\/10.1145\/3170427.3180305","key":"e_1_3_3_2_25_2","DOI":"10.1145\/3170427.3180305"},{"doi-asserted-by":"publisher","unstructured":"Roxanne Leit\u00e3o. 2019. Technology-Facilitated Intimate Partner Abuse: a qualitative analysis of data from online domestic abuse forums. Human-Computer Interaction (2019). 10.1080\/07370024.2019.1685883","key":"e_1_3_3_2_26_2","DOI":"10.1080\/07370024.2019.1685883"},{"doi-asserted-by":"publisher","unstructured":"Heather\u00a0Richter Lipford Jason Watson Michael Whitney Katherine Froiland and Robert\u00a0W. Reeder. 2010. Visual vs. compact: a comparison of privacy policy interfaces. International Conference on Human Factors in Computing Systems (2010). 10.1145\/1753326.1753492https:\/\/dl.acm.org\/doi\/10.1145\/1753326.1753492","key":"e_1_3_3_2_27_2","DOI":"10.1145\/1753326.1753492"},{"doi-asserted-by":"publisher","unstructured":"Lesa Lorenzen-Huber Mary Boutain L.\u00a0Jean Camp Kalpana Shankar and Kay\u00a0H. Connelly. 2011. Privacy Technology and Aging: A Proposed Framework. Ageing International 36 2 (June 2011) 232\u2013252. 10.1007\/s12126-010-9083-y","key":"e_1_3_3_2_28_2","DOI":"10.1007\/s12126-010-9083-y"},{"doi-asserted-by":"publisher","unstructured":"Gianclaudio Malgieri J\u0119drzej Niklas and J\u0119drzej Niklas. 2020. Vulnerable data subjects. Computer Law and Security Review (2020). 10.1016\/j.clsr.2020.105415","key":"e_1_3_3_2_29_2","DOI":"10.1016\/j.clsr.2020.105415"},{"doi-asserted-by":"publisher","unstructured":"Martin Matzner Jan\u00a0Hendrik Betzing Matthias Tietz Jan vom Brocke Brocke\u00a0Jan vom and J\u00f6rg Becker. 2019. The impact of transparency on mobile privacy decision making. Electronic Markets (2019). 10.1007\/s12525-019-00332-3","key":"e_1_3_3_2_30_2","DOI":"10.1007\/s12525-019-00332-3"},{"unstructured":"Aleecia\u00a0M. McDonald and Lorrie\u00a0Faith Cranor. 2008. The Cost of Reading Privacy Policies. (2008). https:\/\/kb.osu.edu\/handle\/1811\/72839 Accepted: 2015-09-30T22:41:07Z Publisher: Ohio State University. Moritz College of Law.","key":"e_1_3_3_2_31_2"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_32_2","DOI":"10.1007\/978-3-030-82786-1_15"},{"doi-asserted-by":"publisher","unstructured":"Nora McDonald and Andrea Forte. 2022. Privacy and Vulnerable Populations. Modern Socio-Technical Perspectives on Privacy (2022). 10.1007\/978-3-030-82786-1_15","key":"e_1_3_3_2_33_2","DOI":"10.1007\/978-3-030-82786-1_15"},{"doi-asserted-by":"publisher","unstructured":"Gabriele Meiselwitz. 2013. Readability assessment of policies and procedures of social networking sites. Interacci\u00f3n (2013). 10.1007\/978-3-642-39371-6_8 https:\/\/dl.acm.org\/doi\/10.1007\/978-3-642-39371-6_8","key":"e_1_3_3_2_34_2","DOI":"10.1007\/978-3-642-39371-6_8"},{"doi-asserted-by":"publisher","unstructured":"Abraham Mhaidli Selin Fidan An Doan Gina Herakovic Mukund Srinath Lee Matheson Shomir Wilson and Florian Schaub. [n.d.]. Researchers\u2019 Experiences in Analyzing Privacy Policies: Challenges and Opportunities. 2023 4 ([n. d.]) 287\u2013305. 10.56553\/popets-2023-0111","key":"e_1_3_3_2_35_2","DOI":"10.56553\/popets-2023-0111"},{"doi-asserted-by":"publisher","unstructured":"A. Mhaidli Selin Fidan An Doan Gina Herakovic Mukund Srinath Lee Matheson Shomir Wilson and F. Schaub. 2023. Researchers\u2019 Experiences in Analyzing Privacy Policies: Challenges and Opportunities. Proceedings on Privacy Enhancing Technologies (2023). 10.56553\/popets-2023-0111","key":"e_1_3_3_2_36_2","DOI":"10.56553\/popets-2023-0111"},{"doi-asserted-by":"publisher","unstructured":"Abraham Mhaidli Selin Fidan An Doan Gina Herakovic Mukund Srinath Lee Matheson Shomir Wilson and Florian Schaub. 2023. Researchers\u2019 Experiences in Analyzing Privacy Policies: Challenges and Opportunities. Proceedings on Privacy Enhancing Technologies 2023 4 (Oct. 2023) 287\u2013305. 10.56553\/popets-2023-0111","key":"e_1_3_3_2_37_2","DOI":"10.56553\/popets-2023-0111"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_38_2","DOI":"10.1007\/978-3-030-27947-9_13"},{"unstructured":"Daniela Napoli Khadija Baig Sana Maqsood and Sonia Chiasson. [n.d.]. \"I\u2019m Literally Just Hoping This Will {Work:\u2019}\u2019 Obstacles Blocking the Online Security and Privacy of Users with Visual Disabilities. 263\u2013280. https:\/\/www.usenix.org\/conference\/soups2021\/presentation\/napoli","key":"e_1_3_3_2_39_2"},{"doi-asserted-by":"crossref","unstructured":"Helen Nissenbaum. 2009. Privacy in Context: Technology Policy and the Integrity of Social Life. null (2009). https:\/\/doi.org\/null","key":"e_1_3_3_2_40_2","DOI":"10.1515\/9780804772891"},{"doi-asserted-by":"publisher","unstructured":"Matthew\u00a0J. Page Joanne\u00a0E. McKenzie Patrick\u00a0M. Bossuyt Isabelle Boutron Tammy\u00a0C. Hoffmann Cynthia\u00a0D. Mulrow Larissa Shamseer Jennifer\u00a0M. Tetzlaff Elie\u00a0A. Akl Sue\u00a0E. Brennan Roger Chou Julie Glanville Jeremy\u00a0M. Grimshaw Asbj\u00f8rn Hr\u00f3bjartsson Manoj\u00a0M. Lalu Tianjing Li Elizabeth\u00a0W. Loder Evan Mayo-Wilson Steve McDonald Luke\u00a0A. McGuinness Lesley\u00a0A. Stewart James Thomas Andrea\u00a0C. Tricco Vivian\u00a0A. Welch Penny Whiting and David Moher. 2021. The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. Systematic Reviews 10 1 (March 2021) 89. 10.1186\/s13643-021-01626-4","key":"e_1_3_3_2_41_2","DOI":"10.1186\/s13643-021-01626-4"},{"volume-title":"Qualitative Evaluation and Research Methods (2nd edition ed.)","author":"Patton Michael\u00a0Quinn","unstructured":"Michael\u00a0Quinn Patton. [n.d.]. Qualitative Evaluation and Research Methods (2nd edition ed.). SAGE Publications, Inc.","key":"e_1_3_3_2_42_2"},{"doi-asserted-by":"publisher","unstructured":"Stanislaw Piasecki and Jiahong Chen. [n.d.]. Complying with the GDPR When Vulnerable People Use Smart Devices. 12 2 ([n. d.]) 113\u2013131. 10.1093\/idpl\/ipac001","key":"e_1_3_3_2_43_2","DOI":"10.1093\/idpl\/ipac001"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_44_2","DOI":"10.1145\/3290607.3312770"},{"doi-asserted-by":"publisher","unstructured":"Joel\u00a0R. Reidenberg Travis\u00a0D. Breaux Lorrie\u00a0Faith Cranor Brian French Amanda\u00a0Beth Grannis James\u00a0T. Graves Fei Liu Aleecia\u00a0M. McDonald Thomas\u00a0B. Norton Rohan Ramanath N.\u00a0Cameron Russell Norman Sadeh and Florian Schaub. 2014. Disagreeable Privacy Policies: Mismatches between Meaning and Users\u2019 Understanding. Berkeley Technology Law Journal (2014). 10.2139\/ssrn.2418297","key":"e_1_3_3_2_45_2","DOI":"10.2139\/ssrn.2418297"},{"doi-asserted-by":"publisher","unstructured":"Isabel Schwaninger Florian G\u00fcldenpfennig Astrid Weiss and Geraldine Fitzpatrick. 2021. What Do You Mean by Trust? Establishing Shared Meaning in Interdisciplinary Design for Assistive Technology. International Journal of Social Robotics 13 8 (Dec. 2021) 1879\u20131897. 10.1007\/s12369-020-00742-w","key":"e_1_3_3_2_46_2","DOI":"10.1007\/s12369-020-00742-w"},{"doi-asserted-by":"publisher","unstructured":"Stephen Secules Cassandra McCall Cassandra McCall Joel\u00a0Alejandro Mejia Chanel Beebe Adam\u00a0Stark Masters Matilde\u00a0L. S\u00e1nchez\u2010Pe\u00f1a Matilde\u00a0L. S\u00e1nchez-Pe\u00f1a Matilde Sanchez-Pena and Martina Svyantek. 2021. Positionality practices and dimensions of impact on equity research: A collaborative inquiry and call to the community. Journal of Engineering Education (2021). 10.1002\/jee.20377","key":"e_1_3_3_2_47_2","DOI":"10.1002\/jee.20377"},{"doi-asserted-by":"publisher","unstructured":"Diane\u00a0L. Smith. 2008. Disability Gender and Intimate Partner Violence: Relationships from the Behavioral Risk Factor Surveillance System. Sexuality and Disability (2008). 10.1007\/s11195-007-9064-6","key":"e_1_3_3_2_48_2","DOI":"10.1007\/s11195-007-9064-6"},{"doi-asserted-by":"publisher","unstructured":"Mukund Srinath Shomir Wilson Shomir Wilson and C.\u00a0Lee Giles. 2020. Privacy at Scale: Introducing the PrivaSeer Corpus of Web Privacy Policies. arXiv:Information Retrieval (2020). 10.18653\/v1\/2021.acl-long.532","key":"e_1_3_3_2_49_2","DOI":"10.18653\/v1\/2021.acl-long.532"},{"doi-asserted-by":"publisher","unstructured":"Abigale Stangl Emma Sadjo Pardis Emami-Naeini Yang Wang D. Gurari and Leah Findlater. 2023. \u201cDump it Destroy it Send it to Data Heaven\u201d: Blind People\u2019s Expectations for Visual Privacy in Visual Assistance Technologies. International Cross-Disciplinary Conference on Web Accessibility (2023). 10.1145\/3587281.3587296https:\/\/dl.acm.org\/doi\/10.1145\/3587281.3587296","key":"e_1_3_3_2_50_2","DOI":"10.1145\/3587281.3587296"},{"doi-asserted-by":"publisher","unstructured":"Abigale Stangl Kristina Shiroma Nathan Davis Bo Xie Kenneth\u00a0R. Fleischmann Leah Findlater and Danna Gurari. 2022. Privacy Concerns for Visual Assistance Technologies. ACM Transactions on Accessible Computing (2022). 10.1145\/3517384https:\/\/dl.acm.org\/doi\/10.1145\/3517384","key":"e_1_3_3_2_51_2","DOI":"10.1145\/3517384"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_52_2","DOI":"10.1145\/3383219.3383247"},{"doi-asserted-by":"publisher","unstructured":"Madiha Tabassum Abdulmajeed Alqhatani Marran Aldossari and Heather\u00a0Richter Lipford. 2018. Increasing User Attention with a Comic-based Policy. International Conference on Human Factors in Computing Systems (2018). 10.1145\/3173574.3173774https:\/\/dl.acm.org\/doi\/10.1145\/3173574.3173774","key":"e_1_3_3_2_53_2","DOI":"10.1145\/3173574.3173774"},{"doi-asserted-by":"publisher","unstructured":"Vicen\u00e7 Torra and Guillermo Navarro-Arribas. [n.d.]. Data Privacy. 4 4 ([n. d.]) 269\u2013280. 10.1002\/widm.1129 https:\/\/dl.acm.org\/doi\/10.1002\/widm.1129","key":"e_1_3_3_2_54_2","DOI":"10.1002\/widm.1129"},{"doi-asserted-by":"publisher","unstructured":"Lin Wan Claudia M\u00fcller Dave Randall and Volker Wulf. 2016. Design of A GPS Monitoring System for Dementia Care and Its Challenges in Academia-Industry Project. ACM Trans. Comput.-Hum. Interact. 23 5 Article 31 (oct 2016) 36\u00a0pages. 10.1145\/2963095https:\/\/dl.acm.org\/doi\/10.1145\/2963095","key":"e_1_3_3_2_55_2","DOI":"10.1145\/2963095"},{"doi-asserted-by":"publisher","unstructured":"Yang Wang. 2017. The Third Wave?: Inclusive Privacy and Security. (2017). 10.1145\/3171533.3171538https:\/\/dl.acm.org\/doi\/10.1145\/3171533.3171538","key":"e_1_3_3_2_56_2","DOI":"10.1145\/3171533.3171538"},{"doi-asserted-by":"publisher","unstructured":"Yang Wang and Charlotte\u00a0Emily Price. 2022. Accessible Privacy. Modern Socio-Technical Perspectives on Privacy (2022). 10.1007\/978-3-030-82786-1_13","key":"e_1_3_3_2_57_2","DOI":"10.1007\/978-3-030-82786-1_13"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_58_2","DOI":"10.1145\/1837110.1837125"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_59_2","DOI":"10.5555\/3235866.3235892"},{"doi-asserted-by":"publisher","unstructured":"Shomir Wilson Florian Schaub Aswarth\u00a0Abhilash Dara Aswarth\u00a0Abhilash Dara Frederick Liu Sushain Cherivirala Pedro\u00a0Giovanni Leon Mads\u00a0Schaarup Andersen Sebastian Zimmeck Kanthashree\u00a0Mysore Sathyendra N.\u00a0Cameron Russell Thomas\u00a0B. Norton Eduard Hovy Joel\u00a0R. Reidenberg Norman\u00a0M. Sadeh Norman\u00a0M. Sadeh and Norman Sadeh. 2016. The Creation and Analysis of a Website Privacy Policy Corpus. Annual Meeting of the Association for Computational Linguistics (2016). 10.18653\/v1\/p16-1126","key":"e_1_3_3_2_60_2","DOI":"10.18653\/v1\/p16-1126"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_61_2","DOI":"10.1145\/3290605.3300428"},{"doi-asserted-by":"publisher","unstructured":"Yaxing Yao Justin\u00a0Reed Basdeo Oriana\u00a0Rosata McDonough and Yang Wang. 2019. Privacy Perceptions and Designs of Bystanders in Smart Homes. Proceedings of the ACM on Human-Computer Interaction 3 CSCW (Nov. 2019) 59:1\u201359:24. 10.1145\/3359161https:\/\/dl.acm.org\/doi\/10.1145\/3359161","key":"e_1_3_3_2_62_2","DOI":"10.1145\/3359161"},{"doi-asserted-by":"publisher","unstructured":"Razieh\u00a0Nokhbeh Zaeem Rachel\u00a0L. German and K.\u00a0Suzanne Barber. 2018. PrivacyCheck: Automatic Summarization of Privacy Policies Using Data Mining. ACM Transactions on Internet Technology (2018). 10.1145\/3127519https:\/\/dl.acm.org\/doi\/10.1145\/3127519","key":"e_1_3_3_2_63_2","DOI":"10.1145\/3127519"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_64_2","DOI":"10.14722\/ndss.2017.23034"},{"doi-asserted-by":"publisher","unstructured":"Ingvil \u00d8ien Bj\u00f8rg Fallang and Sigrid \u00d8stensj\u00f8. 2016. Everyday use of assistive technology devices in school settings. Disability and Rehabilitation: Assistive Technology 11 8 (Nov. 2016) 630\u2013635. 10.3109\/17483107.2014.1001449Publisher: Taylor & Francis _eprint: https:\/\/doi.org\/10.3109\/17483107.2014.1001449.","key":"e_1_3_3_2_65_2","DOI":"10.3109\/17483107.2014.1001449"}],"event":{"acronym":"W4A '24","name":"W4A '24: The 21st International Web for All Conference","location":"Singapore Singapore"},"container-title":["Proceedings of the 21st International Web for All Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3677846.3677850","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3677846.3677850","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:04:27Z","timestamp":1750291467000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3677846.3677850"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":64,"alternative-id":["10.1145\/3677846.3677850","10.1145\/3677846"],"URL":"https:\/\/doi.org\/10.1145\/3677846.3677850","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-10-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}