{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T18:09:49Z","timestamp":1774634989692,"version":"3.50.1"},"reference-count":48,"publisher":"Privacy Enhancing Technologies Symposium Advisory Board","issue":"1","license":[{"start":{"date-parts":[[2021,11,20]],"date-time":"2021-11-20T00:00:00Z","timestamp":1637366400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,1,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Research finds that the users of Social Networking Sites (SNSs) often fail to comprehensively engage with the plethora of available privacy features\u2014 arguably due to their sheer number and the fact that they are often hidden from sight. As different users are likely interested in engaging with different subsets of privacy features, an SNS could improve privacy management practices by adapting its interface in a way that proactively assists, guides, or prompts users to engage with the subset of privacy features they are most likely to benefit from. Whereas recent work presents algorithmic implementations of such privacy adaptation methods, this study investigates the optimal user interface mechanism to present such adaptations. In particular, we tested three proposed<jats:italic>\u201cadaptation methods\u201d<\/jats:italic>(automation, suggestions, highlights) in an online between-subjects user experiment in which 406 participants used a carefully controlled SNS prototype. We systematically evaluate the effect of these adaptation methods on participants\u2019 engagement with the privacy features, their tendency to set stricter settings (protection), and their subjective evaluation of the assigned adaptation method. We find that the<jats:italic>automation<\/jats:italic>of privacy features afforded users the most privacy protection, while giving privacy<jats:italic>suggestions<\/jats:italic>caused the highest level of engagement with the features and the highest subjective ratings (as long as awkward suggestions are avoided). We discuss the practical implications of these findings in the effectiveness of adaptations improving user awareness of, and engagement with, privacy features on social media.<\/jats:p>","DOI":"10.2478\/popets-2022-0031","type":"journal-article","created":{"date-parts":[[2021,11,21]],"date-time":"2021-11-21T02:44:23Z","timestamp":1637462663000},"page":"629-648","source":"Crossref","is-referenced-by-count":11,"title":["The Effectiveness of Adaptation Methods in Improving User Engagement and Privacy Protection on Social Network Sites"],"prefix":"10.56553","volume":"2022","author":[{"given":"Moses","family":"Namara","sequence":"first","affiliation":[{"name":"Clemson University"}]},{"given":"Henry","family":"Sloan","sequence":"additional","affiliation":[{"name":"Binghamton University"}]},{"given":"Bart P.","family":"Knijnenburg","sequence":"additional","affiliation":[{"name":"Clemson University"}]}],"member":"35752","published-online":{"date-parts":[[2021,11,20]]},"reference":[{"key":"2022062314360394945_j_popets-2022-0031_ref_001","doi-asserted-by":"crossref","unstructured":"[1] D. L. Hoffman and T. Novak, \u201cWhy do people use social media? empirical findings and a new theoretical framework for social media goal pursuit,\u201d Empirical Findings and a New Theoretical Framework for Social Media Goal Pursuit (January 17, 2012), 2012.10.2139\/ssrn.1989586","DOI":"10.2139\/ssrn.1989586"},{"key":"2022062314360394945_j_popets-2022-0031_ref_002","doi-asserted-by":"crossref","unstructured":"[2] P. Wisniewski, A. Islam, H. Richter Lipford, and D. C. Wilson, \u201cFraming and measuring multi-dimensional interpersonal privacy preferences of social networking site users,\u201d Communications of the Association for information systems, vol. 38, no. 1, p. 10, 2016.10.17705\/1CAIS.03810","DOI":"10.17705\/1CAIS.03810"},{"key":"2022062314360394945_j_popets-2022-0031_ref_003","doi-asserted-by":"crossref","unstructured":"[3] Z. Tufekci, \u201cGrooming, gossip, facebook and myspace: What can we learn about these sites from those who won\u2019t assimilate?\u201d Information, Communication & Society, vol. 11, no. 4, pp. 544\u2013564, 2008.10.1080\/13691180801999050","DOI":"10.1080\/13691180801999050"},{"key":"2022062314360394945_j_popets-2022-0031_ref_004","doi-asserted-by":"crossref","unstructured":"[4] P. J. Wisniewski, B. P. Knijnenburg, and H. R. Lipford, \u201cMaking privacy personal: Profiling social network users to inform privacy education and nudging,\u201d International Journal of human-computer studies, vol. 98, pp. 95\u2013108, 2017.10.1016\/j.ijhcs.2016.09.006","DOI":"10.1016\/j.ijhcs.2016.09.006"},{"key":"2022062314360394945_j_popets-2022-0031_ref_005","doi-asserted-by":"crossref","unstructured":"[5] S. Hsu, K. Vaccaro, Y. Yue, A. Rickman, and K. Karahalios, \u201cAwareness, navigation, and use of feed control settings online,\u201d in Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 2020, pp. 1\u201313.10.1145\/3313831.3376583","DOI":"10.1145\/3313831.3376583"},{"key":"2022062314360394945_j_popets-2022-0031_ref_006","doi-asserted-by":"crossref","unstructured":"[6] A. Acquisti and R. Gross, \u201cImagined communities: Awareness, information sharing, and privacy on the facebook,\u201d in International workshop on privacy enhancing technologies. Springer, 2006, pp. 36\u201358.10.1007\/11957454_3","DOI":"10.1007\/11957454_3"},{"key":"2022062314360394945_j_popets-2022-0031_ref_007","unstructured":"[7] C. Kahn and D. Ingram, \u201cThree-quarters facebook users as active or more since privacy scandal: Reuters\/ipsos poll,\u201d May 2018. [Online]. Available: https:\/\/www.reuters.com\/article\/us-facebook-privacy-poll\/three-quarters-facebook-users-as-active-or-more-since-privacy-scandal-reuters-ipsos-poll-idUSKBN1I7081"},{"key":"2022062314360394945_j_popets-2022-0031_ref_008","doi-asserted-by":"crossref","unstructured":"[8] M. Netter, M. Riesner, M. Weber, and G. Pernul, \u201cPrivacy settings in online social networks\u2013preferences, perception, and reality,\u201d in 2013 46th Hawaii International Conference on System Sciences. IEEE, 2013, pp. 3219\u20133228.10.1109\/HICSS.2013.455","DOI":"10.1109\/HICSS.2013.455"},{"key":"2022062314360394945_j_popets-2022-0031_ref_009","doi-asserted-by":"crossref","unstructured":"[9] J. Golbeck and M. L. Mauriello, \u201cUser perception of facebook app data access: A comparison of methods and privacy concerns,\u201d Future Internet, vol. 8, no. 2, p. 9, 2016.10.3390\/fi8020009","DOI":"10.3390\/fi8020009"},{"key":"2022062314360394945_j_popets-2022-0031_ref_010","doi-asserted-by":"crossref","unstructured":"[10] P. Wisniewski, A. N. Islam, B. P. Knijnenburg, and S. Patil, \u201cGive social network users the privacy they want,\u201d in Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015, pp. 1427\u20131441.10.1145\/2675133.2675256","DOI":"10.1145\/2675133.2675256"},{"key":"2022062314360394945_j_popets-2022-0031_ref_011","doi-asserted-by":"crossref","unstructured":"[11] A. Kitsiou, E. Tzortzaki, C. Kalloniatis, and S. Gritzalis, \u201cIdentifying privacy related requirements for the design of self-adaptive privacy protections schemes in social networks,\u201d Future Internet, vol. 13, no. 2, p. 23, 2021.10.3390\/fi13020023","DOI":"10.3390\/fi13020023"},{"key":"2022062314360394945_j_popets-2022-0031_ref_012","doi-asserted-by":"crossref","unstructured":"[12] B. P. Knijnenburg, \u201cPrivacy? i can\u2019t even! making a case for user-tailored privacy,\u201d IEEE Security & Privacy, vol. 15, no. 4, pp. 62\u201367, 2017.10.1109\/MSP.2017.3151331","DOI":"10.1109\/MSP.2017.3151331"},{"key":"2022062314360394945_j_popets-2022-0031_ref_013","doi-asserted-by":"crossref","unstructured":"[13] P. Bahirat, Y. He, A. Menon, and B. Knijnenburg, \u201cA data-driven approach to developing iot privacy-setting interfaces,\u201d in 23rd International Conference on Intelligent User Interfaces, 2018, pp. 165\u2013176.10.1145\/3172944.3172982","DOI":"10.1145\/3172944.3172982"},{"key":"2022062314360394945_j_popets-2022-0031_ref_014","unstructured":"[14] B. Liu, M. S. Andersen, F. Schaub, H. Almuhimedi, S. A. Zhang, N. Sadeh, Y. Agarwal, and A. Acquisti, \u201cFollow my recommendations: A personalized privacy assistant for mobile app permissions,\u201d in Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016), 2016, pp. 27\u201341."},{"key":"2022062314360394945_j_popets-2022-0031_ref_015","doi-asserted-by":"crossref","unstructured":"[15] P. Wijesekera, A. Baokar, L. Tsai, J. Reardon, S. Egelman, D. Wagner, and K. Beznosov, \u201cThe feasibility of dynamically granted permissions: Aligning mobile privacy with user preferences,\u201d in 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017, pp. 1077\u20131093.10.1109\/SP.2017.51","DOI":"10.1109\/SP.2017.51"},{"key":"2022062314360394945_j_popets-2022-0031_ref_016","doi-asserted-by":"crossref","unstructured":"[16] M. Namara, H. Sloan, P. Jaiswal, and B. P. Knijnenburg, \u201cThe potential for user-tailored privacy on facebook,\u201d in 2018 IEEE Symposium on Privacy-Aware Computing (PAC). IEEE, 2018, pp. 31\u201342.10.1109\/PAC.2018.00010","DOI":"10.1109\/PAC.2018.00010"},{"key":"2022062314360394945_j_popets-2022-0031_ref_017","doi-asserted-by":"crossref","unstructured":"[17] Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove, \u201cAnalyzing facebook privacy settings: user expectations vs. reality,\u201d in Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, 2011, pp. 61\u201370.10.1145\/2068816.2068823","DOI":"10.1145\/2068816.2068823"},{"key":"2022062314360394945_j_popets-2022-0031_ref_018","doi-asserted-by":"crossref","unstructured":"[18] R. Ravichandran, M. Benisch, P. G. Kelley, and N. M. Sadeh, \u201cCapturing social networking privacy preferences,\u201d in International symposium on privacy enhancing technologies symposium. Springer, 2009, pp. 1\u201318.10.1007\/978-3-642-03168-7_1","DOI":"10.1007\/978-3-642-03168-7_1"},{"key":"2022062314360394945_j_popets-2022-0031_ref_019","doi-asserted-by":"crossref","unstructured":"[19] Y. He, P. Bahirat, B. P. Knijnenburg, and A. Menon, \u201cA Data-Driven Approach to Designing for Privacy in Household IoT,\u201d ACM Trans. Interact. Intell. Syst., vol. 10, no. 1, pp. 10:1\u201310:47, Sep. 2019. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/324137810.1145\/3241378","DOI":"10.1145\/3241378"},{"key":"2022062314360394945_j_popets-2022-0031_ref_020","doi-asserted-by":"crossref","unstructured":"[20] J. Colnago, Y. Feng, T. Palanivel, S. Pearman, M. Ung, A. Acquisti, L. F. Cranor, and N. Sadeh, \u201cInforming the design of a personalized privacy assistant for the internet of things,\u201d in Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 2020, pp. 1\u201313.10.1145\/3313831.3376389","DOI":"10.1145\/3313831.3376389"},{"key":"2022062314360394945_j_popets-2022-0031_ref_021","doi-asserted-by":"crossref","unstructured":"[21] D. Wilkinson, S. Sivakumar, D. Cherry, B. P. Knijnenburg, E. M. Raybourn, P. Wisniewski, and H. Sloan, \u201cUser-tailored privacy by design,\u201d in Proceedings of the Usable Security Mini Conference, 2017.10.14722\/usec.2017.23007","DOI":"10.14722\/usec.2017.23007"},{"key":"2022062314360394945_j_popets-2022-0031_ref_022","doi-asserted-by":"crossref","unstructured":"[22] T. B. Sheridan and W. L. Verplank, \u201cHuman and computer control of undersea teleoperators,\u201d Massachusetts Inst of Tech Cambridge Man-Machine Systems Lab, Tech. Rep., 1978.10.21236\/ADA057655","DOI":"10.21236\/ADA057655"},{"key":"2022062314360394945_j_popets-2022-0031_ref_023","doi-asserted-by":"crossref","unstructured":"[23] O. Pasternak, C. Veloutsou, and A. Morgan-Thomas, \u201cSelf-presentation, privacy and electronic word-of-mouth in social media,\u201d Journal of Product & Brand Management, 2017.10.1108\/JPBM-04-2016-1150","DOI":"10.1108\/JPBM-04-2016-1150"},{"key":"2022062314360394945_j_popets-2022-0031_ref_024","doi-asserted-by":"crossref","unstructured":"[24] O. L. Haimson, A. J. Carter, S. Corvite, B. Wheeler, L. Wang, T. Liu, and A. Lige, \u201cThe major life events taxonomy: Social readjustment, social media information sharing, and online network separation during times of life transition,\u201d Journal of the Association for Information Science and Technology, 2021.10.1002\/asi.24455","DOI":"10.1002\/asi.24455"},{"key":"2022062314360394945_j_popets-2022-0031_ref_025","doi-asserted-by":"crossref","unstructured":"[25] X. Page, R. Ghaiumy Anaraky, B. P. Knijnenburg, and P. J. Wisniewski, \u201cPragmatic tool vs. relational hindrance: Exploring why some social media users avoid privacy features,\u201d Proceedings of the ACM on Human-Computer Interaction, vol. 3, no. CSCW, pp. 1\u201323, 2019.10.1145\/3359212","DOI":"10.1145\/3359212"},{"key":"2022062314360394945_j_popets-2022-0031_ref_026","doi-asserted-by":"crossref","unstructured":"[26] Y. Wang, G. Norcie, S. Komanduri, A. Acquisti, P. G. Leon, and L. F. Cranor, \u201c\u201c i regretted the minute i pressed share\u201d a qualitative study of regrets on facebook,\u201d in Proceedings of the seventh symposium on usable privacy and security, 2011, pp. 1\u201316.10.1145\/2078827.2078841","DOI":"10.1145\/2078827.2078841"},{"key":"2022062314360394945_j_popets-2022-0031_ref_027","doi-asserted-by":"crossref","unstructured":"[27] B. Knijnenburg, E. Raybourn, D. Cherry, D. Wilkinson, S. Sivakumar, and H. Sloan, \u201cDeath to the privacy calculus?\u201d Available at SSRN 2923806, 2017.10.2139\/ssrn.2923806","DOI":"10.2139\/ssrn.2923806"},{"key":"2022062314360394945_j_popets-2022-0031_ref_028","doi-asserted-by":"crossref","unstructured":"[28] L. Warberg, A. Acquisti, and D. Sicker, \u201cCan Privacy Nudges be Tailored to Individuals\u2019 Decision Making and Personality Traits?\u201d in Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, ser. WPES\u201919. New York, NY, USA: Association for Computing Machinery, Nov. 2019, pp. 175\u2013197. [Online]. Available: https:\/\/doi.org\/10.1145\/3338498.335865610.1145\/3338498.3358656","DOI":"10.1145\/3338498.3358656"},{"key":"2022062314360394945_j_popets-2022-0031_ref_029","doi-asserted-by":"crossref","unstructured":"[29] E. Toch, J. Cranshaw, P. H. Drielsma, J. Y. Tsai, P. G. Kelley, J. Springfield, L. Cranor, J. Hong, and N. Sadeh, \u201cEmpirical models of privacy in location sharing,\u201d in Proceedings of the 12th ACM international conference on Ubiquitous computing, 2010, pp. 129\u2013138.10.1145\/1864349.1864364","DOI":"10.1145\/1864349.1864364"},{"key":"2022062314360394945_j_popets-2022-0031_ref_030","doi-asserted-by":"crossref","unstructured":"[30] M. Benisch, P. G. Kelley, N. Sadeh, and L. F. Cranor, \u201cCapturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs,\u201d Personal and Ubiquitous Computing, vol. 15, no. 7, pp. 679\u2013694, 2011.10.1007\/s00779-010-0346-0","DOI":"10.1007\/s00779-010-0346-0"},{"key":"2022062314360394945_j_popets-2022-0031_ref_031","doi-asserted-by":"crossref","unstructured":"[31] O. R. Sanchez, I. Torre, Y. He, and B. P. Knijnenburg, \u201cA recommendation approach for user privacy preferences in the fitness domain,\u201d User Modeling and User-Adapted Interaction, Oct. 2019. [Online]. Available: https:\/\/doi.org\/10.1007\/s11257-019-09246-310.1007\/s11257-019-09246-3","DOI":"10.1007\/s11257-019-09246-3"},{"key":"2022062314360394945_j_popets-2022-0031_ref_032","doi-asserted-by":"crossref","unstructured":"[32] L. Fang and K. LeFevre, \u201cPrivacy wizards for social networking sites,\u201d in Proceedings of the 19th international conference on World wide web, 2010, pp. 351\u2013360.10.1145\/1772690.1772727","DOI":"10.1145\/1772690.1772727"},{"key":"2022062314360394945_j_popets-2022-0031_ref_033","doi-asserted-by":"crossref","unstructured":"[33] Y. Wang, P. G. Leon, A. Acquisti, L. F. Cranor, A. Forget, and N. Sadeh, \u201cA field trial of privacy nudges for facebook,\u201d in Proceedings of the SIGCHI conference on human factors in computing systems, 2014, pp. 2367\u20132376.10.1145\/2556288.2557413","DOI":"10.1145\/2556288.2557413"},{"key":"2022062314360394945_j_popets-2022-0031_ref_034","doi-asserted-by":"crossref","unstructured":"[34] F. Schaub, B. Konings, M. Weber, and F. Kargl, \u201cTowards context adaptive privacy decisions in ubiquitous computing,\u201d in Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on. IEEE, 2012, pp. 407\u2013410. [Online]. Available: http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=619752110.1109\/PerComW.2012.6197521","DOI":"10.1109\/PerComW.2012.6197521"},{"key":"2022062314360394945_j_popets-2022-0031_ref_035","doi-asserted-by":"crossref","unstructured":"[35] T. B. Sheridan, \u201cHuman centered automation: oxymoron or common sense?\u201d in 1995 IEEE International Conference on Systems, Man and Cybernetics. Intelligent Systems for the 21st Century, vol. 1. IEEE, 1995, pp. 823\u2013828.","DOI":"10.1109\/ICSMC.1995.537867"},{"key":"2022062314360394945_j_popets-2022-0031_ref_036","doi-asserted-by":"crossref","unstructured":"[36] A. Acquisti, I. Adjerid, R. Balebako, L. Brandimarte, L. F. Cranor, S. Komanduri, P. G. Leon, N. Sadeh, F. Schaub, M. Sleeper et al., \u201cNudges for privacy and security: Understanding and assisting users\u2019 choices online,\u201d ACM Computing Surveys (CSUR), vol. 50, no. 3, pp. 1\u201341, 2017.10.1145\/3054926","DOI":"10.1145\/3054926"},{"key":"2022062314360394945_j_popets-2022-0031_ref_037","unstructured":"[37] I. Cachola, E. Holgate, D. Preo\u0163iuc-Pietro, and J. J. Li, \u201cExpressively vulgar: The socio-dynamics of vulgarity and its effects on sentiment analysis in social media,\u201d in Proceedings of the 27th International Conference on Computational Linguistics, 2018, pp. 2927\u20132938."},{"key":"2022062314360394945_j_popets-2022-0031_ref_038","doi-asserted-by":"crossref","unstructured":"[38] E. M. Redmiles, S. Kross, and M. L. Mazurek, \u201cHow well do my results generalize? comparing security and privacy survey results from mturk, web, and telephone samples,\u201d in 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 2019, pp. 1326\u20131343.10.1109\/SP.2019.00014","DOI":"10.1109\/SP.2019.00014"},{"key":"2022062314360394945_j_popets-2022-0031_ref_039","doi-asserted-by":"crossref","unstructured":"[39] F. Y. Kung, N. Kwok, and D. J. Brown, \u201cAre attention check questions a threat to scale validity?\u201d Applied Psychology, vol. 67, no. 2, pp. 264\u2013283, 2018.10.1111\/apps.12108","DOI":"10.1111\/apps.12108"},{"key":"2022062314360394945_j_popets-2022-0031_ref_040","doi-asserted-by":"crossref","unstructured":"[40] F. D. Davis, \u201cPerceived usefulness, perceived ease of use, and user acceptance of information technology,\u201d MIS quarterly, pp. 319\u2013340, 1989.10.2307\/249008","DOI":"10.2307\/249008"},{"key":"2022062314360394945_j_popets-2022-0031_ref_041","doi-asserted-by":"crossref","unstructured":"[41] B. P. Knijnenburg and A. Kobsa, \u201cMaking decisions about privacy: information disclosure in context-aware recommender systems,\u201d ACM Transactions on Interactive Intelligent Systems (TiiS), vol. 3, no. 3, pp. 1\u201323, 2013.10.1145\/2499670","DOI":"10.1145\/2499670"},{"key":"2022062314360394945_j_popets-2022-0031_ref_042","doi-asserted-by":"crossref","unstructured":"[42] D. Thissen, L. Steinberg, and D. Kuang, \u201cQuick and easy implementation of the benjamini-hochberg procedure for controlling the false positive rate in multiple comparisons,\u201d Journal of educational and behavioral statistics, vol. 27, no. 1, pp. 77\u201383, 2002.10.3102\/10769986027001077","DOI":"10.3102\/10769986027001077"},{"key":"2022062314360394945_j_popets-2022-0031_ref_043","doi-asserted-by":"crossref","unstructured":"[43] J. Watson, H. R. Lipford, and A. Besmer, \u201cMapping user preference to privacy default settings,\u201d ACM Transactions on Computer-Human Interaction (TOCHI), vol. 22, no. 6, pp. 1\u201320, 2015.10.1145\/2811257","DOI":"10.1145\/2811257"},{"key":"2022062314360394945_j_popets-2022-0031_ref_044","doi-asserted-by":"crossref","unstructured":"[44] C. Cobb, L. Simko, T. Kohno, and A. Hiniker, \u201cUser experiences with online status indicators,\u201d in Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 2020, pp. 1\u201312.10.1145\/3313831.3376240","DOI":"10.1145\/3313831.3376240"},{"key":"2022062314360394945_j_popets-2022-0031_ref_045","doi-asserted-by":"crossref","unstructured":"[45] M. Tschersich and R. Botha, \u201cExploring the impact of restrictive default privacy settings on the privacy calculus on social network sites,\u201d in ECIS, 2014.10.1007\/978-3-319-17016-9_6","DOI":"10.1007\/978-3-319-17016-9_6"},{"key":"2022062314360394945_j_popets-2022-0031_ref_046","unstructured":"[46] A. Vance, D. Eargle, J. L. Jenkins, C. B. Kirwan, and B. B. Anderson, \u201cThe fog of warnings: how non-essential notifications blur with security warnings,\u201d in Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019), 2019."},{"key":"2022062314360394945_j_popets-2022-0031_ref_047","doi-asserted-by":"crossref","unstructured":"[47] S. S. Sundar, J. Kim, M. B. Rosson, and M. D. Molina, \u201cOnline privacy heuristics that predict information disclosure,\u201d in Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 2020, pp. 1\u201312.10.1145\/3313831.3376854","DOI":"10.1145\/3313831.3376854"},{"key":"2022062314360394945_j_popets-2022-0031_ref_048","doi-asserted-by":"crossref","unstructured":"[48] H. Nissenbaum, \u201cA contextual approach to privacy online,\u201d Daedalus, vol. 140, no. 4, pp. 32\u201348, 2011.10.1162\/DAED_a_00113","DOI":"10.1162\/DAED_a_00113"}],"container-title":["Proceedings on Privacy Enhancing Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.sciendo.com\/pdf\/10.2478\/popets-2022-0031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T19:15:30Z","timestamp":1726168530000},"score":1,"resource":{"primary":{"URL":"https:\/\/petsymposium.org\/popets\/2022\/popets-2022-0031.php"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,20]]},"references-count":48,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2021,11,20]]},"published-print":{"date-parts":[[2022,1,1]]}},"alternative-id":["10.2478\/popets-2022-0031"],"URL":"https:\/\/doi.org\/10.2478\/popets-2022-0031","relation":{},"ISSN":["2299-0984"],"issn-type":[{"value":"2299-0984","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,20]]}}}