{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T12:15:08Z","timestamp":1764418508160,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":73,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1145\/3771882.3771889","type":"proceedings-article","created":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T11:54:07Z","timestamp":1764417247000},"page":"182-201","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Investigating User Perceptions of Visualising Inferred Sensitive Information as Privacy Avatars"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-2920-7083","authenticated-orcid":false,"given":"Lena","family":"Swienty","sequence":"first","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9751-675X","authenticated-orcid":false,"given":"Rebecca","family":"Panskus","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2135-0133","authenticated-orcid":false,"given":"Stefanie","family":"Miketta","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0227-8391","authenticated-orcid":false,"given":"Beyza","family":"Kircili","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6719-8029","authenticated-orcid":false,"given":"Sen","family":"Cheng","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7129-9642","authenticated-orcid":false,"given":"Karola","family":"Marky","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,11,30]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","unstructured":"Alessandro Acquisti Idris Adjerid Rebecca Balebako Laura Brandimarte Lorrie\u00a0Faith Cranor Saranga Komanduri Pedro\u00a0Giovanni Leon Norman Sadeh Florian Schaub Manya Sleeper et\u00a0al. 2017. Nudges for Privacy and Security: Understanding and Assisting Users\u2019 Choices Online. Comput. Surveys 50 3 Article 44 (aug 2017) 41\u00a0pages. 10.1145\/3054926","DOI":"10.1145\/3054926"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3463676.3485608"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2732701"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","unstructured":"Patricia Arias-Cabarcos Saina Khalili and Thorsten Strufe. 2023. \u2019Surprised Shocked Worried\u2019: User Reactions to Facebook Data Collection from Third Parties. Proceedings on Privacy Enhancing Technologies 2023 (2023) 384\u2013399. Issue 1. 10.56553\/popets-2023-0023","DOI":"10.56553\/popets-2023-0023"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642180"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","unstructured":"Nat\u00e3\u00a0M Barbosa Gang Wang Blase Ur and Yang Wang. 2021. Who Am I? A Design Probe Exploring Real-Time Transparency about Online and Offline User Profiling Underlying Targeted Ads. Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 5 3 Article 88 (sep 2021) 32\u00a0pages. 10.1145\/3478122","DOI":"10.1145\/3478122"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","unstructured":"Susanne Barth Dan Ionita and Pieter Hartel. 2022. Understanding Online Privacy\u2014A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines. ACM Computing Surveys (CSUR) 55 3 Article 63 (feb 2022) 37\u00a0pages. 10.1145\/3502288","DOI":"10.1145\/3502288"},{"key":"e_1_3_3_2_9_2","first-page":"2813","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Bielova Nataliia","year":"2024","unstructured":"Nataliia Bielova, Laura Litvine, Anysia Nguyen, Mariam Chammat, Vincent Toubiana, and Estelle Hary. 2024. The Effect of Design Patterns on (Present and Future) Cookie Consent Decisions. In 33rd USENIX Security Symposium (USENIX Security 24). USENIX Association, Philadelphia, PA, USA, 2813\u20132830. https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/bielova"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","unstructured":"G Bilchev and D Marston. 2003. Personalised Advertising\u2014Exploiting the Distributed User Profile. BT Technology Journal 21 1 (2003) 84\u201390. 10.1023\/A:1022460428681","DOI":"10.1023\/A:1022460428681"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","unstructured":"Tom Biselli Laura Utz and Christian Reuter. 2024. Supporting Informed Choices about Browser Cookies: The Impact of Personalised Cookie Banners. Proceedings on Privacy Enhancing Technologies 2024 (2024) 171\u2013191. Issue 1. 10.56553\/popets-2024-0011","DOI":"10.56553\/popets-2024-0011"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-49443-89"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","unstructured":"Moritz B\u00fcchi Eduard Fosch-Villaronga Christoph Lutz Aurelia Tam\u00f2-Larrieux and Shruthi Velidi. 2023. Making sense of algorithmic profiling: user perceptions on Facebook. Information Communication & Society 26 4 (2023) 809\u2013825. 10.1080\/1369118X.2021.1989011","DOI":"10.1080\/1369118X.2021.1989011"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","unstructured":"Francisco Caravaca Jos\u00e9 Gonz\u00e1lez-Caba\u00f1as \u00c1ngel Cuevas and Rub\u00e9n Cuevas. 2024. Overprofiling Analysis on Major Internet Players. Proceedings on Privacy Enhancing Technologies 2024 (2024) 929\u2013946. Issue 4. 10.56553\/popets-2024-0149","DOI":"10.56553\/popets-2024-0149"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642363"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","unstructured":"Victoria Clarke and Virginia Braun. 2017. Thematic analysis. The journal of Positive Psychology 12 3 (2017) 297\u2013298. 10.1080\/17439760.2016.1262613","DOI":"10.1080\/17439760.2016.1262613"},{"key":"e_1_3_3_2_17_2","first-page":"287","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Coopamootoo Kovila\u00a0PL","year":"2022","unstructured":"Kovila\u00a0PL Coopamootoo, Maryam Mehrnezhad, and Ehsan Toreini. 2022. \"I feel invaded, annoyed, anxious and I may protect myself\": Individuals\u2019 Feelings about Online Tracking and their Protective Behaviour across Gender and Country. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, USA, 287\u2013304. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/coopamootoo"},{"key":"e_1_3_3_2_18_2","first-page":"2189","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Dambra Savino","year":"2022","unstructured":"Savino Dambra, Iskander Sanchez-Rola, Leyla Bilge, and Davide Balzarotti. 2022. When Sally Met Trackers: Web Tracking From the Users\u2019 Perspective. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, USA, 2189\u20132206. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/dambra"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","unstructured":"Anupam Das Martin Degeling Daniel Smullen and Norman Sadeh. 2018. Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice. IEEE Pervasive Computing 17 3 (Jul 2018) 35\u201346. 10.1109\/MPRV.2018.03367733","DOI":"10.1109\/MPRV.2018.03367733"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23378"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174067"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445516"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174006"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","unstructured":"Florian\u00a0M Farke David\u00a0G Balash Maximilian Golla and Adam\u00a0J Aviv. 2024. How does connecting online activities to advertising inferences impact privacy perceptions?Proceedings on Privacy Enhancing Technologies 2024 (2024) 372\u2013390. Issue 2. 10.56553\/popets-2024-0055","DOI":"10.56553\/popets-2024-0055"},{"key":"e_1_3_3_2_26_2","first-page":"483","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Farke Florian\u00a0M","year":"2021","unstructured":"Florian\u00a0M Farke, David\u00a0G Balash, Maximilian Golla, Markus D\u00fcrmuth, and Adam\u00a0J Aviv. 2021. Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google\u2019s My Activity. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 483\u2013500. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/farke"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451230"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","unstructured":"Thomas Franke Christiane Attig and Daniel Wessel. 2019. A Personal Resource for Technology Interaction: Development and Validation of the Affinity for Technology Interaction (ATI) Scale. International Journal of Human\u2013Computer Interaction 35 6 (2019) 456\u2013467. 10.1080\/10447318.2018.1456150","DOI":"10.1080\/10447318.2018.1456150"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","unstructured":"Nina Gerber Paul Gerber and Melanie Volkamer. 2018. Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & security 77 (2018) 226\u2013261. 10.1016\/j.cose.2018.04.002","DOI":"10.1016\/j.cose.2018.04.002"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","unstructured":"Nina Gerber Alina St\u00f6ver Justin Peschke and Verena Zimmermann. 2023. Don\u2019t Accept All and Continue: Exploring Nudges for More Deliberate Interaction with Tracking Consent Notices. ACM Transactions on Computer-Human Interaction 31 1 Article 1 (nov 2023) 36\u00a0pages. 10.1145\/3617363","DOI":"10.1145\/3617363"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","unstructured":"Thomas Gro\u00df. 2021. Validity and Reliability of the Scale Internet Users\u2019 Information Privacy Concerns (IUIPC). Proceedings on Privacy Enhancing Technologies 2021 (2021) 235\u2013258. Issue 2. 10.2478\/popets-2021-0026","DOI":"10.2478\/popets-2021-0026"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-28643-84"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411497.3420221"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445387"},{"key":"e_1_3_3_2_35_2","first-page":"531","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Harkous Hamza","year":"2018","unstructured":"Hamza Harkous, Kassem Fawaz, R\u00e9mi Lebret, Florian Schaub, Kang\u00a0G Shin, and Karl Aberer. 2018. Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, USA, 531\u2013548. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/harkous"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382816"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","unstructured":"Soha Jiwani Rachna Sasheendran Adhishree Abhyankar Elijah Bouma-Sims and Lorrie Cranor. 2024. Crumbling Cookie Categories: Deconstructing Common Cookie Categories to Create Categories that People Understand. Proceedings on Privacy Enhancing Technologies 2024 (2024) 561\u2013588. Issue 3. 10.56553\/popets-2024-0093","DOI":"10.56553\/popets-2024-0093"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-55783-012"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753561"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00214"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2018.23012"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642260"},{"key":"e_1_3_3_2_44_2","first-page":"22","volume-title":"Proceedings of the 11th Symposium on Usable Privacy and Security (SOUPS 2015)","author":"Leon Pedro\u00a0Giovanni","year":"2015","unstructured":"Pedro\u00a0Giovanni Leon, Ashwini Rao, Florian Schaub, Abigail Marsh, Lorrie\u00a0Faith Cranor, and Norman Sadeh. 2015. Privacy and behavioral advertising: Towards meeting users\u2019 preferences. In Proceedings of the 11th Symposium on Usable Privacy and Security (SOUPS 2015). Association for Computing Machinery, New York, NY, USA, 22\u201324."},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501611"},{"key":"e_1_3_3_2_46_2","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Lerner Ada","year":"2016","unstructured":"Ada Lerner, Anna\u00a0Kornfeld Simpson, Tadayoshi Kohno, and Franziska Roesner. 2016. Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, USA. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/lerner"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450022"},{"key":"e_1_3_3_2_48_2","unstructured":"Laura Manduchi Kushagra Pandey Robert Bamler Ryan Cotterell Sina D\u00e4ubener Sophie Fellenz Asja Fischer Thomas G\u00e4rtner Matthias Kirchler Marius Kloft et\u00a0al. 2024. On the Challenges and Opportunities in Generative AI. https:\/\/arxiv.org\/abs\/2403.00025"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3383016"},{"key":"e_1_3_3_2_50_2","unstructured":"Aleecia McDonald and Lorrie\u00a0Faith Cranor. 2010. Beliefs and Behaviors: Internet Users\u2019 Understanding of Behavioral Advertising. https:\/\/ssrn.com\/abstract=1989092"},{"key":"e_1_3_3_2_51_2","unstructured":"Aleecia\u00a0M McDonald and Lorrie\u00a0Faith Cranor. 2008. The cost of reading privacy policies. I\/S: A Journal of Law and Policy for the Information Society 4 (2008) 543."},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"publisher","unstructured":"William Melicher Mahmood Sharif Joshua Tan Lujo Bauer Mihai Christodorescu and Pedro\u00a0Giovanni Leon. 2016. (Do Not) Track Me Sometimes: Users\u2019 Contextual Preferences for Web Tracking. Proceedings on Privacy Enhancing Technologies 2016 (2016). Issue 2. 10.1515\/popets-2016-0009","DOI":"10.1515\/popets-2016-0009"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883034"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"publisher","unstructured":"Patrick Murmann and Simone Fischer-H\u00fcbner. 2017. Tools for Achieving Usable Ex Post Transparency: A Survey. IEEE Access 5 (2017) 22965\u201322991. 10.1109\/ACCESS.2017.2765539","DOI":"10.1109\/ACCESS.2017.2765539"},{"key":"e_1_3_3_2_55_2","first-page":"399","volume-title":"Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS 2017)","author":"Naeini Pardis\u00a0Emami","year":"2017","unstructured":"Pardis\u00a0Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie\u00a0Faith Cranor, and Norman Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. In Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, Santa Clara, CA, USA, 399\u2013412. https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/naeini"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"publisher","unstructured":"Jonathan\u00a0A Obar and Anne Oeldorf-Hirsch. 2020. The biggest lie on the internet: Ignoring the privacy policies and terms of service policies of social networking services. Information Communication & Society 23 1 (2020) 128\u2013147. 10.1080\/1369118X.2018.1486870","DOI":"10.1080\/1369118X.2018.1486870"},{"key":"e_1_3_3_2_57_2","first-page":"457","volume-title":"Proceedings on the 16th Symposium on Usable Privacy and Security (SOUPS 2020)","author":"Rader Emilee","year":"2020","unstructured":"Emilee Rader, Samantha Hautea, and Anjali Munasinghe. 2020. \"I Have a Narrow Thought Process\": Constraints on Explanations Connecting Inferences and Self-Perceptions. In Proceedings on the 16th Symposium on Usable Privacy and Security (SOUPS 2020). USENIX Association, 457\u2013488. https:\/\/www.usenix.org\/conference\/soups2020\/presentation\/rader"},{"key":"e_1_3_3_2_58_2","unstructured":"Ashwini Rao Florian Schaub and Norman Sadeh. 2015. What do they know about me? Contents and Concerns of Online Behavioral Profiles. arxiv:https:\/\/arXiv.org\/abs\/1506.01675\u00a0[cs.CY] https:\/\/arxiv.org\/abs\/1506.01675"},{"key":"e_1_3_3_2_59_2","first-page":"77","volume-title":"Proceedings of the 12th Symposium on Usable Privacy and Security (SOUPS 2016)","author":"Rao Ashwini","year":"2016","unstructured":"Ashwini Rao, Florian Schaub, Norman Sadeh, Alessandro Acquisti, and Ruogu Kang. 2016. Expecting the Unexpected: Understanding Mismatched Privacy Expectations Online. In Proceedings of the 12th Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, Denver, CO, 77\u201396. https:\/\/www.usenix.org\/conference\/soups2016\/technical-sessions\/presentation\/rao"},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445465"},{"key":"e_1_3_3_2_61_2","doi-asserted-by":"publisher","unstructured":"Nathan Reitinger Bruce Wen Michelle Mazurek and Blase Ur. 2024. What Does It Mean to Be Creepy? Responses to Visualizations of Personal Browsing Activity Online Tracking and Targeted Ads. Proceedings on Privacy Enhancing Technologies 2024 (2024) 715\u2013743. Issue 3. 10.56553\/popets-2024-0101","DOI":"10.56553\/popets-2024-0101"},{"key":"e_1_3_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2016.23017"},{"key":"e_1_3_3_2_63_2","doi-asserted-by":"publisher","unstructured":"Marija Schufrin Steven\u00a0Lamarr Reynolds Arjan Kuijper and Jorn Kohlhammer. 2020. A Visualization Interface to Improve the Transparency of Collected Personal Data on the Internet. IEEE Transactions on Visualization and Computer Graphics 27 2 (2020) 1840\u20131849. 10.1109\/TVCG.2020.3028946","DOI":"10.1109\/TVCG.2020.3028946"},{"key":"e_1_3_3_2_64_2","doi-asserted-by":"publisher","unstructured":"Alina St\u00f6ver Sara Hahn Felix Kretschmer and Nina Gerber. 2023. Investigating how users imagine their personal privacy assistant. Proceedings on Privacy Enhancing Technologies 2023 (2023) 384\u2013402. Issue 2. 10.56553\/popets-2023-0059","DOI":"10.56553\/popets-2023-0059"},{"key":"e_1_3_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173774"},{"key":"e_1_3_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3180445.3180447"},{"key":"e_1_3_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335362"},{"key":"e_1_3_3_2_68_2","first-page":"217","volume-title":"Proceedings of the 17th Symposium on Usable Privacy and Security (SOUPS 2021)","author":"Veys Sophie","year":"2021","unstructured":"Sophie Veys, Daniel Serrano, Madison Stamos, Margot Herman, Nathan Reitinger, Michelle\u00a0L. Mazurek, and Blase Ur. 2021. Pursuing Usable and Useful Data Downloads Under GDPR\/CCPA Access Rights via Co-Design. In Proceedings of the 17th Symposium on Usable Privacy and Security (SOUPS 2021). USENIX Association, 217\u2013242. https:\/\/www.usenix.org\/conference\/soups2021\/presentation\/veys"},{"key":"e_1_3_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363200"},{"key":"e_1_3_3_2_70_2","doi-asserted-by":"crossref","unstructured":"James\u00a0Q Whitman. 2003. The two western cultures of privacy: Dignity versus liberty. Yale LJ 113 (2003) 1151.","DOI":"10.2307\/4135723"},{"key":"e_1_3_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517688"},{"key":"e_1_3_3_2_72_2","doi-asserted-by":"publisher","unstructured":"Sebastian Zimmeck Daniel Goldelman Owen Kaplan Logan Brown Justin Casler Judeley Jean-Charles Joe Champeau and Hamza Harkous. 2024. Website Data Transparency in the Browser. Proceedings on Privacy Enhancing Technologies 2024 (04 2024) 211\u2013234. 10.56553\/popets-2024-0048","DOI":"10.56553\/popets-2024-0048"},{"key":"e_1_3_3_2_73_2","first-page":"1391","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Zimmeck Sebastian","year":"2017","unstructured":"Sebastian Zimmeck, Jie\u00a0S Li, Hyungtae Kim, Steven\u00a0M Bellovin, and Tony Jebara. 2017. A Privacy Analysis of Cross-device Tracking. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, USA, 1391\u20131408. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/zimmeck"},{"key":"e_1_3_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP61157.2025.00240"}],"event":{"name":"MUM '25: 24th International Conference on Mobile and Ubiquitous Multimedia","acronym":"MUM '25","location":"Enna Italy"},"container-title":["Proceedings of the 24th International Conference on Mobile and Ubiquitous Multimedia"],"original-title":[],"deposited":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T12:10:43Z","timestamp":1764418243000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3771882.3771889"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,30]]},"references-count":73,"alternative-id":["10.1145\/3771882.3771889","10.1145\/3771882"],"URL":"https:\/\/doi.org\/10.1145\/3771882.3771889","relation":{},"subject":[],"published":{"date-parts":[[2025,11,30]]},"assertion":[{"value":"2025-11-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}