{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T03:47:47Z","timestamp":1768016867630,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T00:00:00Z","timestamp":1763424000000},"content-version":"vor","delay-in-days":36,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2523814, 2448205, 2239605, 2228616"],"award-info":[{"award-number":["2523814, 2448205, 2239605, 2228616"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,13]]},"DOI":"10.1145\/3733802.3764055","type":"proceedings-article","created":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:38:21Z","timestamp":1763458701000},"page":"223-230","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Understanding User Acceptance of Privacy Labels: Barriers and Enhancements"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-5193-2107","authenticated-orcid":false,"given":"Jingwen","family":"Yan","sequence":"first","affiliation":[{"name":"Clemson University, Clemson, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7603-0765","authenticated-orcid":false,"given":"Mohammed","family":"Aldeen","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4222-9852","authenticated-orcid":false,"given":"Jalil","family":"Harris","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2462-7518","authenticated-orcid":false,"given":"Kellen","family":"Grossenbacher","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5264-7573","authenticated-orcid":false,"given":"Song","family":"Liao","sequence":"additional","affiliation":[{"name":"Texas Tech University, Lubbock, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4813-2403","authenticated-orcid":false,"given":"Feng","family":"Luo","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4819-5406","authenticated-orcid":false,"given":"Long","family":"Cheng","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,18]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"2013. Model Notices of Privacy Practices. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/guidance\/model-notices-privacy-practices\/index.html."},{"key":"e_1_3_3_1_3_2","unstructured":"2016. General Data Protection Regulation (GDPR). https:\/\/gdpr-info.eu."},{"key":"e_1_3_3_1_4_2","unstructured":"2018. California Consumer Privacy Act (CCPA). https:\/\/oag.ca.gov\/privacy\/ccpa."},{"key":"e_1_3_3_1_5_2","unstructured":"2024. Google Play Statistics and Trends 2024. https:\/\/42matters.com\/google-play-statistics-and-trends."},{"key":"e_1_3_3_1_6_2","unstructured":"2025. Amazon Mechanical Turk. https:\/\/www.mturk.com\/."},{"key":"e_1_3_3_1_7_2","unstructured":"2025. PRAW: The Python Reddit API Wrapper Documentation. https:\/\/praw.readthedocs.io\/en\/stable\/index.html."},{"key":"e_1_3_3_1_8_2","unstructured":"2025. Provide information for Google Play\u2019s Data safety section. https:\/\/support.google.com\/googleplay\/android-developer\/answer\/10787469?hl=en."},{"key":"e_1_3_3_1_9_2","unstructured":"2025. Qualtrics. https:\/\/www.qualtrics.com\/."},{"key":"e_1_3_3_1_10_2","unstructured":"2025. The apps you love. From a place you can trust. https:\/\/www.apple.com\/app-store\/."},{"key":"e_1_3_3_1_11_2","unstructured":"2025. Transparency is the best policy. https:\/\/www.apple.com\/privacy\/labels\/."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDH62654.2024.00020"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Mohammed Aldeen Jeffrey Young Song Liao Tsu-Yao Chang Long Cheng Haipeng Cai Xiapu Luo and Hongxin Hu. 2024. End-Users Know Best: Identifying Undesired Behavior of Alexa Skills Through User Review Analysis. Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 8 3 (2024) 1\u201328.","DOI":"10.1145\/3678517"},{"key":"e_1_3_3_1_14_2","unstructured":"Mir\u00a0Masood Ali David\u00a0G Balash Monica Kodwani Chris Kanich and Adam\u00a0J Aviv. 2023. Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps\u2019 Privacy Policies. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2306.17063 (2023)."},{"key":"e_1_3_3_1_15_2","first-page":"5645","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Arkalakis Ioannis","year":"2024","unstructured":"Ioannis Arkalakis, Michalis Diamantaris, Serafeim Moustakas, Sotiris Ioannidis, Jason Polakis, and Panagiotis Ilia. 2024. Abandon All Hope Ye Who Enter Here: A Dynamic, Longitudinal Investigation of Android\u2019s Data Safety Section. In 33rd USENIX Security Symposium (USENIX Security 24). 5645\u20135662."},{"key":"e_1_3_3_1_16_2","first-page":"413","volume-title":"Twentieth Symposium on Usable Privacy and Security (SOUPS 2024)","author":"Balash David\u00a0G","year":"2024","unstructured":"David\u00a0G Balash, Mir\u00a0Masood Ali, Chris Kanich, and Adam\u00a0J Aviv. 2024. \" I would not install an app with this label\": Privacy Label Impact on Risk Perception and Willingness to Install { iOS} Apps. In Twentieth Symposium on Usable Privacy and Security (SOUPS 2024). 413\u2013432."},{"key":"e_1_3_3_1_17_2","unstructured":"David\u00a0G Balash Mir\u00a0Masood Ali Xiaoyuan Wu Chris Kanich and Adam\u00a0J Aviv. 2022. Longitudinal analysis of privacy labels in the apple app store. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2206.02658 (2022)."},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW55150.2022.00028"},{"key":"e_1_3_3_1_19_2","unstructured":"Maarten Grootendorst. 2022. BERTopic: Neural topic modeling with a class-based TF-IDF procedure. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2203.05794 (2022)."},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_3_3_1_21_2","first-page":"2831","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Khandelwal Rishabh","year":"2024","unstructured":"Rishabh Khandelwal, Asmit Nayak, Paul Chung, Kassem Fawaz, Antonio Bianchi, Z\u00a0Berkay Celik, Yuval Yarom, Xuemin\u00a0Sherman Shen, Zheng Fang, Shenyi Zhang, et\u00a0al. 2024. Unpacking Privacy Labels: A Measurement and Developer Perspective on Google\u2019s Data Safety Section. In 33rd USENIX Security Symposium (USENIX Security 24). 2831\u20132848."},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Simon Koch Malte Wessels Benjamin Altpeter Madita Olvermann and Martin Johns. 2022. Keeping privacy labels honest. Proceedings on Privacy Enhancing Technologies (2022).","DOI":"10.56553\/popets-2022-0119"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502012"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616650"},{"key":"e_1_3_3_1_25_2","unstructured":"Yanzi Lin Jaideep Juneja Eleanor Birrell and Lorrie\u00a0Faith Cranor. 2023. Data safety vs. app privacy: Comparing the usability of android and ios privacy labels. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2312.03918 (2023)."},{"key":"e_1_3_3_1_26_2","first-page":"5663","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Liu Dexin","year":"2024","unstructured":"Dexin Liu, Yue Xiao, Chaoqi Zhang, Kaitao Xie, Xiaolong Bai, Shikun Zhang, and Luyi Xing. 2024. { iHunter} : Hunting Privacy Violations at Scale in the Software Supply Chain on { iOS}. In 33rd USENIX Security Symposium (USENIX Security 24). 5663\u20135680."},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"crossref","unstructured":"Leland McInnes John Healy and James Melville. 2018. UMAP: Uniform Manifold Approximation and Projection for Dimension Reduction. Journal of Open Source Software 3 29 (2018) 861.","DOI":"10.21105\/joss.00861"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","unstructured":"nlptown. 2020. bert-base-multilingual-uncased-sentiment. https:\/\/huggingface.co\/nlptown\/bert-base-multilingual-uncased-sentiment. 10.57967\/hf\/1515","DOI":"10.57967\/hf\/1515"},{"key":"e_1_3_3_1_29_2","volume-title":"OpenAI o4\u2011mini System Card","year":"2025","unstructured":"OpenAI. 2025. OpenAI o4\u2011mini System Card. Technical Report. OpenAI. https:\/\/cdn.openai.com\/pdf\/2221c875-02dc-4789-800b-e7758f3722c1\/o3-and-o4-mini-system-card.pdf Accessed: May 10, 2025."},{"key":"e_1_3_3_1_30_2","unstructured":"Shidong Pan Zhen Tao Thong Hoang Dawen Zhang Tianshi Li Zhenchang Xing Sherry Xu Mark Staples Thierry Rakotoarivelo and David Lo. 2024. { A New Hope} : Contextual Privacy Policies for Mobile Applications and An Approach Toward Automated Generation. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2402.14544 (2024)."},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW59978.2023.00022"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445768"},{"key":"e_1_3_3_1_33_2","volume-title":"Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP)","author":"Wang Wei","year":"2020","unstructured":"Wei Wang, Nitish Liu, and Kyunghyun Cho. 2020. MiniLM: Deep Self-Attention Distillation for Task-Agnostic Compression of Pre-trained Transformers. In Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP)."},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517688"},{"key":"e_1_3_3_1_35_2","first-page":"1091","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Xiao Yue","year":"2023","unstructured":"Yue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, and Luyi Xing. 2023. Lalaine: Measuring and Characterizing { Non-Compliance} of Apple Privacy Labels. In 32nd USENIX Security Symposium (USENIX Security 23). 1091\u20131108."},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"crossref","unstructured":"Shikun Zhang Yuanyuan Feng Yaxing Yao Lorrie\u00a0Faith Cranor and Norman Sadeh. 2022. How usable are ios app privacy labels? Proceedings on Privacy Enhancing Technologies (2022).","DOI":"10.56553\/popets-2022-0106"},{"key":"e_1_3_3_1_37_2","volume-title":"Symposium on Usable Security and Privacy (USEC)","author":"Zhang Shikun","year":"2023","unstructured":"Shikun Zhang and Norman Sadeh. 2023. Do Privacy Labels Answer Users\u2019 Privacy Questions?. In Symposium on Usable Security and Privacy (USEC)."}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"WPES '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 24th Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3733802.3764055","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3733802.3764055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T18:56:15Z","timestamp":1767984975000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3733802.3764055"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"references-count":36,"alternative-id":["10.1145\/3733802.3764055","10.1145\/3733802"],"URL":"https:\/\/doi.org\/10.1145\/3733802.3764055","relation":{},"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"2025-11-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}