{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T04:07:39Z","timestamp":1751083659813,"version":"3.41.0"},"reference-count":9,"publisher":"Association for Computing Machinery (ACM)","issue":"7","license":[{"start":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T00:00:00Z","timestamp":1750982400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2055196"],"award-info":[{"award-number":["2055196"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1145\/3727636","type":"journal-article","created":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T14:09:10Z","timestamp":1749564550000},"page":"23-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Beyond the Checkbox: Upgrading the Right to Opt Out"],"prefix":"10.1145","volume":"68","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2500-2681","authenticated-orcid":false,"given":"Sebastian","family":"Zimmeck","sequence":"first","affiliation":[{"name":"Wesleyan University, Department of Mathematics and Computer Science, Middletown, Connecticut, United States"}]}],"member":"320","published-online":{"date-parts":[[2025,6,27]]},"reference":[{"key":"e_1_3_1_2_2","volume-title":"Privacy Principles","author":"Berjon R.","year":"2025","unstructured":"Berjon, R. and Yasskin, J. Privacy Principles. W3C Group Note. (Mar. 2025); https:\/\/bit.ly\/3S71Ak0"},{"key":"e_1_3_1_3_2","unstructured":"Cavoukian A. Privacy by Design: The 7 Foundational Principles. (2009); https:\/\/bit.ly\/4jmZWqp"},{"key":"e_1_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Habib H. et al. How to (in)effectively convey privacy choices with icons and link texts. In Proceedings of the 2021 CHI Conf. on Human Factors in Computing Systems (2021); https:\/\/bit.ly\/3GOVySY","DOI":"10.1145\/3411764.3445387"},{"key":"e_1_3_1_5_2","unstructured":"Norman D. Proper Understanding of \u201cThe Human Factor\u201d (Dec. 2023); https:\/\/bit.ly\/42Yvjln"},{"issue":"3","key":"e_1_3_1_6_2","article-title":"The limitations of privacy rights","volume":"98","author":"Solove D.","year":"2023","unstructured":"Solove, D. The limitations of privacy rights. Notre Dame Law Rev. 98, 3 (2023); https:\/\/bit.ly\/3H1HtRX.","journal-title":"Notre Dame Law Rev."},{"key":"e_1_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Ur B. et al. Smart useful scary creepy: Perceptions of online behavioral advertising. In Proceedings of the Symp. on Usable Security and Privacy (2012); https:\/\/bit.ly\/43i2fEK","DOI":"10.1145\/2335356.2335362"},{"key":"e_1_3_1_8_2","article-title":"Opting out may not prevent websites from collecting your data","author":"Zimmeck S.","year":"2021","unstructured":"Zimmeck, S. Opting out may not prevent websites from collecting your data. Medium (July 17, 2021);); https:\/\/bit.ly\/3YepIVB.","journal-title":"Medium"},{"key":"e_1_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Zimmeck S. et al. Generalizable active privacy choice: Designing a graphical user interface for global privacy control. In Proceedings of the 24th Privacy Enhancing Technologies Symp. (2024).","DOI":"10.56553\/popets-2024-0015"},{"key":"e_1_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Zimmeck S. et al. Usability and enforceability of global privacy control. In Proceedings of the 23rd Privacy Enhancing Technologies Symp. (2023); https:\/\/bit.ly\/4dhZV5e","DOI":"10.56553\/popets-2023-0052"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3727636","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3727636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T15:07:59Z","timestamp":1751036879000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3727636"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,27]]},"references-count":9,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["10.1145\/3727636"],"URL":"https:\/\/doi.org\/10.1145\/3727636","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2025,6,27]]},"assertion":[{"value":"2025-03-21","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}