{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:46:57Z","timestamp":1730328417078,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":72,"publisher":"ACM","funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100003151","name":"Fonds de recherche du Qu\u00e9bec \u2013 Nature et technologies","doi-asserted-by":"publisher","award":["2022-PR-300101"],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100003151","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100001804","name":"Canada Research Chairs","doi-asserted-by":"publisher","award":["CRC-2021-00076"],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100001804","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3643834.3661544","type":"proceedings-article","created":{"date-parts":[[2024,6,29]],"date-time":"2024-06-29T22:48:34Z","timestamp":1719701314000},"page":"258-275","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Motivating Users to Attend to Privacy: A Theory-Driven Design Study"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0009-0006-9695-6737","authenticated-orcid":false,"given":"Varun","family":"Shiri","sequence":"first","affiliation":[{"name":"Department of Computer and Software Engineering, Polytechnique Montreal, Canada"}]},{"ORCID":"http:\/\/orcid.org\/0009-0003-7368-6939","authenticated-orcid":false,"given":"Maggie","family":"Xiong","sequence":"additional","affiliation":[{"name":"School of Computer Science, McGill University, Canada"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8474-5290","authenticated-orcid":false,"given":"Jinghui","family":"Cheng","sequence":"additional","affiliation":[{"name":"Polytechnique Montreal, Canada"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1782-1545","authenticated-orcid":false,"given":"Jin L.C.","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Computer Science, McGill University, Canada"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_3_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST52912.2021.9647767"},{"key":"e_1_3_2_3_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-69746-3_2"},{"key":"e_1_3_2_3_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600096"},{"key":"e_1_3_2_3_4_1","volume-title":"Proceedings of the Thirteenth USENIX Conference on Usable Privacy and Security(SOUPS \u201917)","author":"Albayram Yusuf","year":"2017","unstructured":"Yusuf Albayram, Mohammad Maifi\u00a0Hasan Khan, Theodore Jensen, and Nhan Nguyen. 2017. \"...Better to Use a Lock Screen than to Worry about Saving a Few Seconds of Time\": Effect of Fear Appeal in the Context of Smartphone Locking Behavior. In Proceedings of the Thirteenth USENIX Conference on Usable Privacy and Security(SOUPS \u201917). USENIX Association, USA, 49\u201363. https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/albayram"},{"key":"e_1_3_2_3_5_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750694"},{"key":"e_1_3_2_3_6_1","volume-title":"Privacy Policies of Mobile Apps - A Usability Study. In IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). Institute of Electrical and Electronics Engineers","author":"Anikeev Maxim","year":"2021","unstructured":"Maxim Anikeev, Haya Shulman, and Hervais Simo. 2021. Privacy Policies of Mobile Apps - A Usability Study. In IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). Institute of Electrical and Electronics Engineers, New York, NY, 1\u20132. https:\/\/doi.org\/10.1109\/INFOCOMWKSHPS51825.2021.9484434"},{"key":"e_1_3_2_3_7_1","doi-asserted-by":"publisher","DOI":"10.1037\/1089-2680.1.3.311"},{"key":"e_1_3_2_3_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.399"},{"key":"e_1_3_2_3_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3040489.3040491"},{"key":"e_1_3_2_3_10_1","volume-title":"Proceedings of the International Conference on Software and System Processes and International Conference on Global Software Engineering(ICSSP\u201922)","author":"Brunotte Wasja","year":"2022","unstructured":"Wasja Brunotte, Larissa Chazette, Lukas Kohler, Jil Klunder, and Kurt Schneider. 2022. What About My Privacy?Helping Users Understand Online Privacy Policies. In Proceedings of the International Conference on Software and System Processes and International Conference on Global Software Engineering(ICSSP\u201922). ACM, New York, NY, USA, 56\u201365. https:\/\/doi.org\/10.1145\/3529320.3529327"},{"key":"e_1_3_2_3_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.destud.2018.03.002"},{"key":"e_1_3_2_3_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2022.2106307"},{"key":"e_1_3_2_3_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.06.008"},{"key":"e_1_3_2_3_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165734.1165735"},{"key":"e_1_3_2_3_15_1","volume-title":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security(CCS \u201922)","author":"Dhondt Karel","year":"2022","unstructured":"Karel Dhondt, Victor Le\u00a0Pochat, Alexios Voulimeneas, Wouter Joosen, and Stijn Volckaert. 2022. A Run a Day Won\u2019t Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security(CCS \u201922). ACM, New York, NY, USA, 801\u2013814. https:\/\/doi.org\/10.1145\/3548606.3560616"},{"key":"e_1_3_2_3_16_1","volume-title":"Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems(CHI \u201921)","author":"Ebert Nico","year":"2021","unstructured":"Nico Ebert, Kurt Alexander\u00a0Ackermann, and Bj\u00f6rn Scheppler. 2021. Bolder is Better: Raising User Awareness through Salient and Concise Privacy Notices. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems(CHI \u201921). ACM, New York, NY, USA, Article 67, 12\u00a0pages. https:\/\/doi.org\/10.1145\/3411764.3445516"},{"key":"e_1_3_2_3_17_1","unstructured":"European Parliament and Council of the European Union. 2016. General Data Protection Regulation. https:\/\/gdpr-info.eu"},{"key":"e_1_3_2_3_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/15252019.2018.1521317"},{"key":"e_1_3_2_3_19_1","volume-title":"Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems(CHI \u201921)","author":"Feng Yuanyuan","year":"2021","unstructured":"Yuanyuan Feng, Yaxing Yao, and Norman Sadeh. 2021. A Design Space for Privacy Choices: Towards Meaningful Privacy Control in the Internet of Things. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems(CHI \u201921). ACM, New York, NY, USA, Article 64, 16\u00a0pages."},{"key":"e_1_3_2_3_20_1","doi-asserted-by":"publisher","DOI":"10.1177\/001872675400700202"},{"key":"e_1_3_2_3_21_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2000.tb02323.x"},{"key":"e_1_3_2_3_22_1","volume-title":"Persuasive Technology: 17th International Conference, PERSUASIVE 2022, Virtual Event, March 29\u201331, 2022, Proceedings. Springer-Verlag","author":"Ganesh Anirudh","year":"2022","unstructured":"Anirudh Ganesh, Chinenye Ndulue, and Rita Orji. 2022. Smartphone Security and Privacy \u2013 A Gamified Persuasive Approach with Protection Motivation Theory. In Persuasive Technology: 17th International Conference, PERSUASIVE 2022, Virtual Event, March 29\u201331, 2022, Proceedings. Springer-Verlag, Berlin, Heidelberg, 89\u2013100. https:\/\/doi.org\/10.1007\/978-3-030-98438-0_7"},{"key":"e_1_3_2_3_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.109"},{"key":"e_1_3_2_3_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0899-3467(07)60142-6"},{"key":"e_1_3_2_3_25_1","volume-title":"Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems(CHI \u201921)","author":"Habib Hana","year":"2021","unstructured":"Hana Habib, Yixin Zou, Yaxing Yao, Alessandro Acquisti, Lorrie Cranor, Joel Reidenberg, Norman Sadeh, and Florian Schaub. 2021. Toggles, Dollar Signs, and Triangles: How to (In)Effectively Convey Privacy Choices with Icons and Link Texts. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems(CHI \u201921). ACM, New York, NY, USA, Article 63, 25\u00a0pages. https:\/\/doi.org\/10.1145\/3411764.3445387"},{"key":"e_1_3_2_3_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/02650487.2016.1239878"},{"key":"e_1_3_2_3_27_1","volume-title":"Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Harkous Hamza","year":"2018","unstructured":"Hamza Harkous, Kassem Fawaz, R\u00e9mi Lebret, Florian Schaub, Kang\u00a0G. Shin, and Karl Aberer. 2018. Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 531\u2013548. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/harkous"},{"key":"e_1_3_2_3_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-800894-2.00006-5"},{"key":"e_1_3_2_3_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3130086"},{"key":"e_1_3_2_3_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.10.007"},{"key":"e_1_3_2_3_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/02681102.2013.814040"},{"key":"e_1_3_2_3_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3157850"},{"key":"e_1_3_2_3_33_1","volume-title":"Proceedings of the 5th Symposium on Usable Privacy and Security(SOUPS \u201909)","author":"Kelley Patrick\u00a0Gage","year":"2009","unstructured":"Patrick\u00a0Gage Kelley, Joanna Bresee, Lorrie\u00a0Faith Cranor, and Robert\u00a0W. Reeder. 2009. A \"Nutrition Label\" for Privacy. In Proceedings of the 5th Symposium on Usable Privacy and Security(SOUPS \u201909). ACM, New York, NY, USA, Article 4, 12\u00a0pages. https:\/\/doi.org\/10.1145\/1572532.1572538"},{"key":"e_1_3_2_3_34_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI \u201910)","author":"Kelley Patrick\u00a0Gage","year":"2010","unstructured":"Patrick\u00a0Gage Kelley, Lucian Cesca, Joanna Bresee, and Lorrie\u00a0Faith Cranor. 2010. Standardizing privacy notices: an online study of the nutrition label approach. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI \u201910). ACM, New York, NY, USA, 1573\u20131582. https:\/\/doi.org\/10.1145\/1753326.1753561"},{"key":"e_1_3_2_3_35_1","doi-asserted-by":"publisher","unstructured":"Guoyun Li Yaozhi Zhang Xianqi Yu and Yuqing Sun. 2015. iPri: Context-Aware Access Control and Privacy Policy Recommendation. In 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom). Institute of Electrical and Electronics Engineers New York NY 370\u2013370. https:\/\/doi.org\/10.1109\/UIC-ATC-ScalCom-CBDCom-IoP.2015.83","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP.2015.83"},{"key":"e_1_3_2_3_36_1","volume-title":"Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems(CHI \u201922)","author":"Li Tianshi","year":"2022","unstructured":"Tianshi Li, Kayla Reiman, Yuvraj Agarwal, Lorrie\u00a0Faith Cranor, and Jason\u00a0I. Hong. 2022. Understanding Challenges for Developers to Create Accurate Privacy Nutrition Labels. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems(CHI \u201922). ACM, New York, NY, USA, Article 588, 24\u00a0pages. https:\/\/doi.org\/10.1145\/3491102.3502012"},{"key":"e_1_3_2_3_37_1","volume-title":"Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016","author":"Liu Bin","year":"2016","unstructured":"Bin Liu, Mads\u00a0Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun\u00a0(Aerin) Zhang, Norman Sadeh, Yuvraj Agarwal, and Alessandro Acquisti. 2016. Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, Denver, CO, 27\u201341. https:\/\/www.usenix.org\/conference\/soups2016\/technical-sessions\/presentation\/liu"},{"issue":"3","key":"e_1_3_2_3_38_1","first-page":"543","article-title":"The Cost of Reading Privacy Policies","volume":"4","author":"McDonald M.","year":"2008","unstructured":"Aleecia\u00a0M. McDonald and Lorrie\u00a0Faith Cranor. 2008. The Cost of Reading Privacy Policies. I\/S: A Journal of Law and Policy for the Information Society, vol. 4, no. 3 (2008), 543-568. 4 (2008), 25\u00a0pages.","journal-title":"I\/S: A Journal of Law and Policy for the Information Society"},{"key":"e_1_3_2_3_39_1","doi-asserted-by":"publisher","unstructured":"OECD. 2023. OECD Guidelines for Multinational Enterprises on Responsible Business Conduct. 79\u00a0pages. https:\/\/doi.org\/10.1787\/81f92357-en","DOI":"10.1787\/81f92357-en"},{"key":"e_1_3_2_3_40_1","unstructured":"Government of Canada. 2021. Canada\u2019s Privacy Act. https:\/\/www.justice.gc.ca\/eng\/csj-sjc\/pa-lprp\/pa-lprp.html"},{"key":"e_1_3_2_3_41_1","volume-title":"Proceedings of the 2018 Designing Interactive Systems Conference(DIS \u201918)","author":"Pierce James","year":"2018","unstructured":"James Pierce, Sarah Fox, Nick Merrill, Richmond Wong, and Carl DiSalvo. 2018. An Interface without A User: An Exploratory Design Study of Online Privacy Policies and Digital Legalese. In Proceedings of the 2018 Designing Interactive Systems Conference(DIS \u201918). ACM, New York, NY, USA, 1345\u20131358. https:\/\/doi.org\/10.1145\/3196709.3196818"},{"key":"e_1_3_2_3_42_1","volume-title":"The Dewald Roode Workshop in Information Systems Security","author":"Posey Clay","year":"2011","unstructured":"Clay Posey, Tom Roberts, Paul\u00a0Benjamin Lowry, James Courtney, and Becky Bennett. 2011. Motivating the Insider to Protect Organizational Information Assets: Evidence from Protection Motivation Theory and Rival Explanations. In The Dewald Roode Workshop in Information Systems Security 2011. Social Science Research Network, Blacksburg, Virginia, USA, 1\u201351. https:\/\/ssrn.com\/abstract=2273594"},{"key":"e_1_3_2_3_43_1","volume-title":"Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018","author":"Qahtani Elham\u00a0Al","year":"2018","unstructured":"Elham\u00a0Al Qahtani, Mohamed Shehab, and Abrar Aljohani. 2018. The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, Baltimore, MD, 31\u201346. https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/qahtani"},{"key":"e_1_3_2_3_44_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_3_2_3_45_1","volume-title":"Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems(CHI \u201921)","author":"Reinhardt Daniel","year":"2021","unstructured":"Daniel Reinhardt, Johannes Borchard, and J\u00f6rn Hurtienne. 2021. Visual Interactive Privacy Policy: The Better Choice?. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems(CHI \u201921). ACM, New York, NY, USA, Article 66, 12\u00a0pages. https:\/\/doi.org\/10.1145\/3411764.3445465"},{"key":"e_1_3_2_3_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447310801937999"},{"key":"e_1_3_2_3_47_1","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"e_1_3_2_3_48_1","volume-title":"Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. Social Psychology: A Source Book 1","author":"Rogers W.","year":"1983","unstructured":"Ronald\u00a0W. Rogers. 1983. Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. Social Psychology: A Source Book 1 (1983), 153\u2013176."},{"key":"e_1_3_2_3_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.75"},{"key":"e_1_3_2_3_50_1","volume-title":"Retrieved","author":"Scholar Google","year":"2024","unstructured":"Google Scholar. 2024. Human-Computer Interaction \u2013 Google Scholar Metrics. Retrieved May, 2024 from https:\/\/scholar.google.ca\/citations?view_op=top_venues&hl=en&vq=eng_humancomputerinteraction"},{"key":"e_1_3_2_3_51_1","volume-title":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT). Institute of Electrical and Electronics Engineers","author":"Singh Himani","year":"2017","unstructured":"Himani Singh and Mamta Bhusry. 2017. Privacy policy inference of multiple user-uploaded images on social context websites (Automated generation of privacy policy). In 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT). Institute of Electrical and Electronics Engineers, New York, NY, 1\u20135. https:\/\/doi.org\/10.1109\/CIACT.2017.7977304"},{"key":"e_1_3_2_3_52_1","first-page":"2020","volume-title":"Proceedings on Privacy Enhancing Technologies 2020 (01","author":"Smullen Daniel","year":"2020","unstructured":"Daniel Smullen, Yuanyuan Feng, Shikun Zhang, and Norman Sadeh. 2020. The Best of Both Worlds: Mitigating Trade-offs Between Accuracy and User Burden in Capturing Mobile App Privacy Preferences. Proceedings on Privacy Enhancing Technologies 2020 (01 2020), 195\u2013215. https:\/\/doi.org\/10.2478\/popets-2020-0011"},{"key":"e_1_3_2_3_53_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3536265"},{"key":"e_1_3_2_3_54_1","volume-title":"International Journal of Information Security and Privacy (IJISP), Vol.\u00a09. IGI Global","author":"Sommestad Teodor","year":"1898","unstructured":"Teodor Sommestad, Henrik Karlz\u00e9n, and Jonas Hallberg. 2014. A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behavior. In International Journal of Information Security and Privacy (IJISP), Vol.\u00a09. IGI Global, Hershey, PA, 26\u201346. https:\/\/api.semanticscholar.org\/CorpusID:189804062"},{"key":"e_1_3_2_3_55_1","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020","author":"Story Peter","year":"2020","unstructured":"Peter Story, Daniel Smullen, Alessandro Acquisti, Lorrie\u00a0Faith Cranor, Norman Sadeh, and Florian Schaub. 2020. From Intent to Action: Nudging Users Towards Secure Mobile Payments. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). USENIX Association, Berkeley, CA, 379\u2013415. https:\/\/www.usenix.org\/conference\/soups2020\/presentation\/story"},{"key":"e_1_3_2_3_56_1","first-page":"2022","volume-title":"Proceedings on Privacy Enhancing Technologies 2022 (04","author":"Story Peter","year":"2022","unstructured":"Peter Story, Daniel Smullen, Rex Chen, Yaxing Yao, Alessandro Acquisti, Lorrie Cranor, Norman Sadeh, and Florian Schaub. 2022. Increasing Adoption of Tor Browser Using Informational and Planning Nudges. Proceedings on Privacy Enhancing Technologies 2022 (04 2022), 152\u2013183. https:\/\/doi.org\/10.2478\/popets-2022-0040"},{"key":"e_1_3_2_3_57_1","volume-title":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M). Institute of Electrical and Electronics Engineers","author":"Talib Shuhaili","year":"2014","unstructured":"Shuhaili Talib, Sitti\u00a0Munirah Abdul\u00a0Razak, Akeem Olowolayemo, Melasari Salependi, Nur\u00a0Fatihah Ahmad, Syakila Kunhamoo, and Siti\u00a0Khalijah Bani. 2014. Perception analysis of social networks\u2019 privacy policy: Instagram as a case study. In The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M). Institute of Electrical and Electronics Engineers, New York, NY, 1\u20135. https:\/\/doi.org\/10.1109\/ICT4M.2014.7020612"},{"key":"e_1_3_2_3_58_1","doi-asserted-by":"publisher","unstructured":"T.A.I. Thotawaththa Y.T. Gamage Damika Gamlath Wei Chee and D. Meedeniya. 2021. Automated Categorization of Privacy Policies Based on User Perspective. In 2021 10th International Conference on Information and Automation for Sustainability (ICIAfS). Institute of Electrical and Electronics Engineers New York NY 54\u201359. https:\/\/doi.org\/10.1109\/ICIAfS52090.2021.9606158","DOI":"10.1109\/ICIAfS52090.2021.9606158"},{"key":"e_1_3_2_3_59_1","volume-title":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy(CODASPY \u201916)","author":"Tomuro Noriko","year":"2016","unstructured":"Noriko Tomuro, Steven Lytinen, and Kurt Hornsburg. 2016. Automatic Summarization of Privacy Policies Using Ensemble Learning. In Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy(CODASPY \u201916). ACM, New York, NY, USA, 133\u2013135. https:\/\/doi.org\/10.1145\/2857705.2857741"},{"key":"e_1_3_2_3_60_1","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1287\/isre.1090.0260","article-title":"The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study","volume":"22","author":"Tsai Y.","year":"2011","unstructured":"Janice\u00a0Y. Tsai, Serge Egelman, Lorrie Cranor, and Alessandro Acquisti. 2011. The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. Information Systems Research 22, 2 (2011), 254\u2013268. http:\/\/www.jstor.org\/stable\/23015560","journal-title":"Information Systems Research"},{"key":"e_1_3_2_3_61_1","doi-asserted-by":"publisher","DOI":"10.1111\/nhs.12048"},{"key":"e_1_3_2_3_62_1","volume-title":"2013 46th Hawaii International Conference on System Sciences. Institute of Electrical and Electronics Engineers","author":"Vance Anthony","year":"2013","unstructured":"Anthony Vance, David Eargle, Kirk Ouimet, and Detmar Straub. 2013. Enhancing Password Security through Interactive Fear Appeals: A Web-Based Field Experiment. In 2013 46th Hawaii International Conference on System Sciences. Institute of Electrical and Electronics Engineers, New York, NY, 2988\u20132997. https:\/\/doi.org\/10.1109\/HICSS.2013.196"},{"key":"e_1_3_2_3_63_1","volume-title":"Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5, 4, Article 181 (dec","author":"Velykoivanenko Lev","year":"2022","unstructured":"Lev Velykoivanenko, Kavous\u00a0Salehzadeh Niksirat, No\u00e9 Zufferey, Mathias Humbert, K\u00e9vin Huguenin, and Mauro Cherubini. 2022. Are Those Steps Worth Your Privacy? Fitness-Tracker Users\u2019 Perceptions of Privacy and Utility. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5, 4, Article 181 (dec 2022), 41\u00a0pages. https:\/\/doi.org\/10.1145\/3494960"},{"key":"e_1_3_2_3_64_1","volume-title":"Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems(CHI \u201922)","author":"Wilkinson Daricia","year":"2022","unstructured":"Daricia Wilkinson and Bart Knijnenburg. 2022. Many Islands, Many Problems: An Empirical Examination of Online Safety Behaviors in the Caribbean. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems(CHI \u201922). ACM, New York, NY, USA, Article 102, 25\u00a0pages. https:\/\/doi.org\/10.1145\/3491102.3517643"},{"key":"e_1_3_2_3_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230665"},{"key":"e_1_3_2_3_66_1","volume-title":"Proceedings of the 25th International Conference on World Wide Web(WWW \u201916). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, 133\u2013143","author":"Wilson Shomir","year":"2016","unstructured":"Shomir Wilson, Florian Schaub, Rohan Ramanath, Norman Sadeh, Fei Liu, Noah\u00a0A. Smith, and Frederick Liu. 2016. Crowdsourcing Annotations for Websites\u2019 Privacy Policies: Can It Really Work?. In Proceedings of the 25th International Conference on World Wide Web(WWW \u201916). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, 133\u2013143. https:\/\/doi.org\/10.1145\/2872427.2883035"},{"key":"e_1_3_2_3_67_1","volume-title":"Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems(CHI \u201922)","author":"Windl Maximiliane","year":"2022","unstructured":"Maximiliane Windl, Niels Henze, Albrecht Schmidt, and Sebastian\u00a0S. Feger. 2022. Automating Contextual Privacy Policies: Design and Evaluation of a Production Tool for Digital Consumer Privacy Awareness. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems(CHI \u201922). ACM, New York, NY, USA, Article 34, 18\u00a0pages. https:\/\/doi.org\/10.1145\/3491102.3517688"},{"key":"e_1_3_2_3_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510058"},{"key":"e_1_3_2_3_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.107106"},{"key":"e_1_3_2_3_70_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0106"},{"key":"e_1_3_2_3_71_1","volume-title":"Workshop on Usable Security and Privacy (USEC 2023). Network and Distributed System Security (NDSS) Symposium","author":"Zhang Shikun","year":"2023","unstructured":"Shikun Zhang and Norman Sadeh. 2023. Do Privacy Labels Answer Users\u2019 Privacy Questions?. In Workshop on Usable Security and Privacy (USEC 2023). Network and Distributed System Security (NDSS) Symposium, San Diego, CA. https:\/\/doi.org\/10.14722\/usec.2023.232482"},{"key":"e_1_3_2_3_72_1","volume-title":"2016 AAAI Fall Symposium Series. Network and Distributed System Security (NDSS) Symposium","author":"Zimmeck Sebastian","year":"2016","unstructured":"Sebastian Zimmeck, Ziqi Wang, Lieyong Zou, Roger Iyengar, Bin Liu, Florian Schaub, Shomir Wilson, Norman Sadeh, Steven Bellovin, and Joel Reidenberg. 2016. Automated analysis of privacy requirements for mobile apps. In 2016 AAAI Fall Symposium Series. Network and Distributed System Security (NDSS) Symposium, San Diego, CA, 15\u00a0pages. http:\/\/dx.doi.org\/10.14722\/ndss.2017.23034"}],"event":{"name":"DIS '24: Designing Interactive Systems Conference","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"IT University of Copenhagen Denmark","acronym":"DIS '24"},"container-title":["Designing Interactive Systems Conference"],"original-title":[],"deposited":{"date-parts":[[2024,6,29]],"date-time":"2024-06-29T23:39:48Z","timestamp":1719704388000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643834.3661544"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":72,"alternative-id":["10.1145\/3643834.3661544","10.1145\/3643834"],"URL":"https:\/\/doi.org\/10.1145\/3643834.3661544","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}