{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T15:37:04Z","timestamp":1763480224964,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,7]]},"DOI":"10.1145\/3757980.3757984","type":"proceedings-article","created":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T15:36:14Z","timestamp":1763393774000},"page":"315-325","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Beyond the Wall of Text: Exploring User-Centred Design for Privacy Notices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5627-2158","authenticated-orcid":false,"given":"Sofia","family":"Lundmark","sequence":"first","affiliation":[{"name":"Department of Media Technology, S\u00f6dert\u00f6rn University, Huddinge, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5580-368X","authenticated-orcid":false,"given":"Amanda","family":"Feldt","sequence":"additional","affiliation":[{"name":"Department of Media Technology, S\u00f6dert\u00f6rn University, Huddinge, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-6761-4242","authenticated-orcid":false,"given":"Kimberley","family":"Jungjai-Tsang","sequence":"additional","affiliation":[{"name":"Department of Media Technology, S\u00f6dert\u00f6rn University, Huddinge, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2025,11,17]]},"reference":[{"key":"e_1_3_3_1_1_2","volume-title":"Privacy and human behavior in the age of information. Science, 347, 6221, 509\u2013514","author":"Acquisti A.","year":"2015","unstructured":"Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347, 6221, 509\u2013514."},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808119"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23039"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/1621995.1622039"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/1165734.1165735"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","unstructured":"Degeling M. Utz C. Lentzsch C.\u00a0et al.\u00a0(2019). We Value Your Privacy ... Now Take Some Cookies. Informatik Spektrum\u00a042 345\u2013346 10.1007\/s00287-019-01201-1","DOI":"10.1007\/s00287-019-01201-1"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58986-8_9"},{"key":"e_1_3_3_1_9_2","unstructured":"EU Regulation (EU) 2016\/679 of the European parliament and of the council of 27 april 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing directive 95\/46\/EC (General Data Protection Regulation)\" \u00a0Off. J. Eur. Union vol. L119 no. 1 pp. 1-88 2016."},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-54158-2_4"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23044"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.2200\/S00594ED1V01Y201408SPT011"},{"key":"e_1_3_3_1_13_2","volume-title":"Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security (SOUPS '16)","author":"Gluck J.","year":"2016","unstructured":"Gluck, J., Schaub, F., Friedman, A., Habib, H., Sadeh, N., Cranor, L. F., & Agarwal, Y. (2016). How short is too short? implications of length and framing on the effectiveness of privacy notices. In Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security (SOUPS '16). USENIX Association, USA, 321\u2013340."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985752"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372296"},{"key":"e_1_3_3_1_16_2","volume-title":"Proceedings of the Conference on Human Factors in Computing Systems (CHI\u201913)","author":"Patrick Gage Kelley","year":"2013","unstructured":"Patrick Gage Kelley, Lorrie Faith Cranor, and Norman Sadeh. (2013). Privacy as part of the app decision- making process. In Proceedings of the Conference on Human Factors in Computing Systems (CHI\u201913). ACM, 3393\u20133402."},{"key":"e_1_3_3_1_17_2","volume-title":"Projektnummer: 2021-03969.","author":"Leckner S.","year":"2023","unstructured":"Leckner, S., Lagerstedt, C., Hupkes, T., & Lundmark, S. (2023). Exit report Sjyst data! -Pinteg case. Vinnova, Projektnummer: 2021-03969. Stockholm: RISE Institutes of Sweden."},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670377"},{"key":"e_1_3_3_1_19_2","unstructured":"Lindstr\u00f6m K. (2023). Tids\u00f6dande l\u00e4sa sajters integritetspolicyer \u2013 tar drygt en arbetsvecka. [online] Available at: https:\/\/computersweden.idg.se\/2.2683\/1.780277\/tidsodande-lasa-sajters-integritetspolicyer-tar-drygt-en-arbetsvecka"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450022"},{"issue":"1","key":"e_1_3_3_1_21_2","first-page":"4","article-title":"The use qualities of digital design","volume":"11","author":"L\u00f6wgren J.","year":"2002","unstructured":"L\u00f6wgren, J. (2002). The use qualities of digital design. Information Design Journal, 11(1), 4\u201320.","journal-title":"Information Design Journal"},{"key":"e_1_3_3_1_22_2","volume-title":"Michigan Law: Law and Economics Workshop","author":"Marotta-Wurgler F.","year":"2015","unstructured":"Marotta-Wurgler, F. (2015). Does \"notice and choice\" disclosure regulation work? An empirical study of privacy policies. Michigan Law: Law and Economics Workshop (2015). https:\/\/www.law.umich.edu\/centersandprograms\/ lawandeconomics\/workshops\/Documents\/Paper13.Marotta- Wurgler. Does% 20Notice%20and%20Choice%20Disclosure%20Work.pdf"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2022.2077234"},{"key":"e_1_3_3_1_24_2","first-page":"540","volume":"4","author":"Aleecia M.","year":"2008","unstructured":"Aleecia M. McDonald and Lorrie F. Cranor. (2008). The Cost of Reading Privacy Policies. I\/S: A Journal of Law and Policy for the Information Society 4, 3 (2008), 540\u2013565.","journal-title":"The Cost of Reading Privacy Policies. I\/S: A Journal of Law and Policy for the Information Society"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.5555\/576915"},{"key":"e_1_3_3_1_26_2","volume-title":"\u00a0The Design of Everyday Things","author":"Norman D. A.","year":"2013","unstructured":"Norman, D. A. (2013).\u00a0The Design of Everyday Things. Basic Books."},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2020.105402"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.265102930"},{"key":"e_1_3_3_1_29_2","volume-title":"Research through Design. In. M. Soegaard & R.F. Dam (red.). The Encyclopedia of Human-Computer Interaction","author":"Stappers P.","year":"2014","unstructured":"Stappers, P. & Giaccardi, E. (2014). Research through Design. In. M. Soegaard & R.F. Dam (red.). The Encyclopedia of Human-Computer Interaction, 2nd Ed. [online] Aarhus: The interaction Design Foundation. H\u00e4mtad fr\u00e5n: <https:\/\/www.interaction-design.org\/literature\/book\/the-encyclopedia-of-human-computer-int eraction-2nd-ed\/research-through-design>[H\u00e4mtad 4 december 2023].","edition":"2"},{"key":"e_1_3_3_1_30_2","volume-title":"GDPR. [online] Available at: https:\/\/internetkunskap.se\/artiklar\/ordlista\/gdpr\/ [Downloaded 2024-11-12]","author":"Swedish Internet Foundation","year":"2021","unstructured":"Swedish Internet Foundation (Internetstiftelsen) (2021). GDPR. [online] Available at: https:\/\/internetkunskap.se\/artiklar\/ordlista\/gdpr\/ [Downloaded 2024-11-12]"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354212"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517688"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0003-6870(02)00009-1"},{"key":"e_1_3_3_1_34_2","volume-title":"Writing a GDPR-compliant privacy notice (template included). [online] Available at: https:\/\/gdpr.eu\/privacy-notice\/ [Downloaded 2024-11-12]","author":"Wolford B.","year":"2024","unstructured":"Wolford, B. (2024). Writing a GDPR-compliant privacy notice (template included). [online] Available at: https:\/\/gdpr.eu\/privacy-notice\/ [Downloaded 2024-11-12]"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/1122445.1122456"},{"key":"e_1_3_3_1_36_2","unstructured":"Zieni\u016bt\u0117 U. 2023. Ny NordVPN-studie visar: det tar \u00e5tta timmar att l\u00e4sa integritetspolicyerna p\u00e5 de 20 mest bes\u00f6kta hemsidorna i Sverige. [online: <https:\/\/nordvpn.com\/sv\/blog\/nordvpn-forskning-integritetspolicy\/>]"}],"event":{"name":"Mindtrek '25: 28th International Academic Mindtrek","acronym":"Mindtrek '25","location":"Tampere Finland"},"container-title":["Proceedings of the 28th International Academic Mindtrek"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3757980.3757984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T15:27:30Z","timestamp":1763479650000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3757980.3757984"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,7]]},"references-count":36,"alternative-id":["10.1145\/3757980.3757984","10.1145\/3757980"],"URL":"https:\/\/doi.org\/10.1145\/3757980.3757984","relation":{},"subject":[],"published":{"date-parts":[[2025,10,7]]},"assertion":[{"value":"2025-11-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}