{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T05:41:27Z","timestamp":1777614087119,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["16KIS1631"],"award-info":[{"award-number":["16KIS1631"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1145\/3701571.3703373","type":"proceedings-article","created":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T07:28:21Z","timestamp":1733210901000},"page":"527-531","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["PERSON\u00c6R - Transparency Enhancing Tool for LLM-Generated User Personas from Live Website Visits"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0460-3787","authenticated-orcid":false,"given":"Kirill","family":"Kronhardt","sequence":"first","affiliation":[{"name":"TU Dortmund University, Dortmund, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7865-7772","authenticated-orcid":false,"given":"Sebastian","family":"Hoffmann","sequence":"additional","affiliation":[{"name":"TU Dortmund University, Dortmund, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9022-5956","authenticated-orcid":false,"given":"Fabian","family":"Adelt","sequence":"additional","affiliation":[{"name":"TU Dortmund University, Dortmund, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0634-3931","authenticated-orcid":false,"given":"Jens","family":"Gerken","sequence":"additional","affiliation":[{"name":"TU Dortmund University, Dortmund, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,12,2]]},"reference":[{"key":"e_1_3_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.328"},{"key":"e_1_3_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642421"},{"key":"e_1_3_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501616"},{"key":"e_1_3_3_3_5_2","doi-asserted-by":"publisher","unstructured":"Nat\u00e3\u00a0M. Barbosa Gang Wang Blase Ur and Yang Wang. 2021. Who Am I? A Design Probe Exploring Real-Time Transparency about Online and Offline User Profiling Underlying Targeted Ads. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5 3 (Sept. 2021) 88:1\u201388:32. 10.1145\/3478122https:\/\/dl.acm.org\/doi\/10.1145\/3478122","DOI":"10.1145\/3478122"},{"key":"e_1_3_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488406"},{"key":"e_1_3_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-322-99786-9_1"},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"publisher","unstructured":"Thomas\u00a0H. Costello Gordon Pennycook and David\u00a0G. Rand. 2024. Durably Reducing Conspiracy Beliefs through Dialogues with AI. Science 385 6714 (Sept. 2024) eadq1814. 10.1126\/science.adq1814","DOI":"10.1126\/science.adq1814"},{"key":"e_1_3_3_3_9_2","doi-asserted-by":"publisher","unstructured":"Stefano De\u00a0Paoli. 2023. Writing User Personas with Large Language Models: Testing Phase 6 of a Thematic Analysis of Semi-Structured Interviews. 10.48550\/arXiv.2305.18099 arxiv:2305.18099\u00a0[cs]","DOI":"10.48550\/arXiv.2305.18099"},{"key":"e_1_3_3_3_10_2","first-page":"483","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Farke Florian\u00a0M","year":"2021","unstructured":"Florian\u00a0M Farke, David\u00a0G Balash, Maximilian Golla, Markus D\u00fcrmuth, and Adam\u00a0J Aviv. 2021. Are privacy dashboards good for end users? Evaluating user perceptions and reactions to Google\u2019s My Activity. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, Berkeley, 483\u2013500."},{"key":"e_1_3_3_3_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/2808006.2808022"},{"key":"e_1_3_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-79026-8_14"},{"key":"e_1_3_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55415-5_38"},{"key":"e_1_3_3_3_14_2","doi-asserted-by":"crossref","unstructured":"Thomas\u00a0R. Insel. 2017. Digital Phenotyping: Technology for a New Science of Behavior. Journal of the American Medical Association 318 13 (2017) 1215\u20131216.","DOI":"10.1001\/jama.2017.11295"},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"crossref","unstructured":"Jeffrey\u00a0A. Johnson. 2014. The Ethics of Big Data in Higher Education. International Review of Information Ethics 7 (2014) 3\u201310.","DOI":"10.29173\/irie365"},{"key":"e_1_3_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071"},{"key":"e_1_3_3_3_17_2","unstructured":"Martin\u00a0M. Merener. 2012. Theoretical Results on De-Anonymization via Linkage Attacks. Transactions on Data Privacy 5 (2012) 377\u2013402. Issue 2. http:\/\/www.tdp.cat\/issues11\/tdp.a074a11.pdf Retrieved November 2 2017."},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"publisher","unstructured":"George\u00a0R. Milne George Pettinico Fatima\u00a0M. Hajjat and Ereni Markos. 2017. Information Sensitivity Typology: Mapping the Degree and Type of Risk Consumers Perceive in Personal Data Sharing. Journal of Consumer Affairs 51 1 (2017) 133\u2013161. 10.1111\/joca.12111","DOI":"10.1111\/joca.12111"},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"publisher","unstructured":"Patrick Murmann and Simone Fischer-H\u00fcbner. 2017. Tools for Achieving Usable Ex Post Transparency: A Survey. IEEE Access 5 (2017) 22965\u201322991. 10.1109\/ACCESS.2017.2765539","DOI":"10.1109\/ACCESS.2017.2765539"},{"key":"e_1_3_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300880"},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"crossref","unstructured":"Patricia\u00a0A Norberg Daniel\u00a0R Horne and David\u00a0A Horne. 2007. The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of consumer affairs 41 1 (2007) 100\u2013126.","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"key":"e_1_3_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-3305-7_5"},{"key":"e_1_3_3_3_23_2","doi-asserted-by":"publisher","unstructured":"Christine Prince. 2018. Do consumers want to control their personal data? Empirical evidence. International Journal of Human-Computer Studies 110 (2018) 21\u201332. 10.1016\/j.ijhcs.2017.10.003","DOI":"10.1016\/j.ijhcs.2017.10.003"},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139058452.002"},{"key":"e_1_3_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561444"},{"key":"e_1_3_3_3_26_2","doi-asserted-by":"crossref","unstructured":"Norman Sadeh Jason Hong Lorrie Cranor Ian Fette Patrick Kelley Madhu Prabaker and Jinghai Rao. 2009. Understanding and Capturing People\u2019s Privacy Policies in a Mobile Social Networking Application. Personal and Ubiquitous Computing 13 6 (August 2009) 401\u2013412.","DOI":"10.1007\/s00779-008-0214-3"},{"key":"e_1_3_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-48057-7_14"},{"key":"e_1_3_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517589"},{"key":"e_1_3_3_3_29_2","doi-asserted-by":"publisher","unstructured":"Eva-Maria Schomakers Chantal Lidynia Dirk M\u00fcllmann and Martina Ziefle. 2019. Internet users\u2019 perceptions of information sensitivity \u2013 insights from Germany. International Journal of Information Management 46 (2019) 142\u2013150. 10.1016\/j.ijinfomgt.2018.11.018 https:\/\/dl.acm.org\/doi\/10.1016\/j.ijinfomgt.2018.11.018","DOI":"10.1016\/j.ijinfomgt.2018.11.018"},{"key":"e_1_3_3_3_30_2","doi-asserted-by":"publisher","unstructured":"Neeraja Subrahmaniyan D.\u00a0Jeffery Higginbotham and Ann\u00a0M. Bisantz. 2018. Using Personas to Support Augmentative Alternative Communication Device Design: A Validation and Evaluation Study. International Journal of Human\u2013Computer Interaction 34 1 (2018) 84\u201397. 10.1080\/10447318.2017.1330802","DOI":"10.1080\/10447318.2017.1330802"},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"crossref","unstructured":"Monika Taddicken. 2014. The \u2018privacy paradox\u2019in the social web: The impact of privacy concerns individual characteristics and the perceived social relevance on different forms of self-disclosure. Journal of computer-mediated communication 19 2 (2014) 248\u2013273.","DOI":"10.1111\/jcc4.12052"},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359798"},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.5220\/0006301000800091"},{"key":"e_1_3_3_3_34_2","first-page":"217","volume-title":"Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)","author":"Veys Sophie","year":"2021","unstructured":"Sophie Veys, Daniel Serrano, Madison Stamos, Margot Herman, Nathan Reitinger, Michelle\u00a0L. Mazurek, and Blase Ur. 2021. Pursuing Usable and Useful Data Downloads Under {GDPR\/CCPA} Access Rights via {Co-Design}. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). USENIX Association, Berkeley, 217\u2013242."},{"key":"e_1_3_3_3_35_2","first-page":"49","volume-title":"HAISA","author":"Williams Lynne\u00a0Y","year":"2018","unstructured":"Lynne\u00a0Y Williams and Diane\u00a0Rasmussen Pennington. 2018. An Authentic Self: Big Data and Passive Digital Footprints.. In HAISA. Centre for Security, Communications & Network Research, University of Plymouth., Plymouth, UK, 49\u201356."}],"event":{"name":"MUM '24: International Conference on Mobile and Ubiquitous Multimedia","location":"Stockholm Sweden","acronym":"MUM '24"},"container-title":["Proceedings of the International Conference on Mobile and Ubiquitous Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701571.3703373","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3701571.3703373","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:10:05Z","timestamp":1750295405000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701571.3703373"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":34,"alternative-id":["10.1145\/3701571.3703373","10.1145\/3701571"],"URL":"https:\/\/doi.org\/10.1145\/3701571.3703373","relation":{},"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"2024-12-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}