{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:57:43Z","timestamp":1776113863030,"version":"3.50.1"},"reference-count":134,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2021,8,20]],"date-time":"2021-08-20T00:00:00Z","timestamp":1629417600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput.-Hum. Interact."],"published-print":{"date-parts":[[2021,10,31]]},"abstract":"<jats:p>\n            Today, industry practitioners (e.g., data scientists, developers, product managers) rely on formal privacy reviews (a combination of user interviews, privacy risk assessments, etc.) in identifying potential customer acceptance issues with their organization\u2019s data practices. However, this process is slow and expensive, and practitioners often have to make ad-hoc privacy-related decisions with little actual feedback from users.\nWe introduce Lean Privacy Review (LPR), a fast, cheap, and easy-to-access method to help practitioners collect direct feedback from users through the proxy of crowd workers in the early stages of design. LPR takes a proposed data practice, quickly breaks it down into smaller parts, generates a set of questionnaire surveys, solicits users\u2019 opinions, and summarizes those opinions in a compact form for practitioners to use. By doing so, LPR can help uncover the range and magnitude of different privacy concerns actual people have at a small fraction of the cost and wait-time for a formal review. We evaluated LPR using 12 real-world data practices with 240 crowd users and 24 data practitioners. Our results show that (1) the discovery of privacy concerns saturates as the number of evaluators exceeds 14 participants, which takes around 5.5 hours to complete (i.e., latency) and costs 3.7 hours of total crowd work (\n            <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>\n                  \n                <\/jats:tex-math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula>\n            $80 in our experiments); and (2) LPR finds 89% of privacy concerns identified by data practitioners as well as 139% additional privacy concerns that practitioners are not aware of, at a 6% estimated false alarm rate.\n          <\/jats:p>","DOI":"10.1145\/3463910","type":"journal-article","created":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T20:10:41Z","timestamp":1629835841000},"page":"1-55","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Lean Privacy Review: Collecting Users\u2019 Privacy Concerns of Data Practices at a Low Cost"],"prefix":"10.1145","volume":"28","author":[{"given":"Haojian","family":"Jin","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Forbes Ave, Pittsburgh"}]},{"given":"Hong","family":"Shen","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Forbes Ave, Pittsburgh"}]},{"given":"Mayank","family":"Jain","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Forbes Ave, Pittsburgh"}]},{"given":"Swarun","family":"Kumar","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Forbes Ave, Pittsburgh"}]},{"given":"Jason I.","family":"Hong","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Forbes Ave, Pittsburgh"}]}],"member":"320","published-online":{"date-parts":[[2021,8,20]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Retrieved","author":"Clarke Roger","year":"2016","unstructured":"Roger Clarke . 2016 . Privacy Introduction and Definitions . Retrieved July 17, 2018 from http:\/\/www.rogerclarke.com\/DV\/Intro.html. Roger Clarke. 2016. Privacy Introduction and Definitions. Retrieved July 17, 2018 from http:\/\/www.rogerclarke.com\/DV\/Intro.html."},{"key":"e_1_2_1_2_1","unstructured":"Fox Van Allen. 2014. When the Device You Use Determines the Price You Get. Techlicious. Retrieved from https:\/\/www.techlicious.com\/blog\/price-discrimination-by-operating-system-device\/.  Fox Van Allen. 2014. When the Device You Use Determines the Price You Get. Techlicious. Retrieved from https:\/\/www.techlicious.com\/blog\/price-discrimination-by-operating-system-device\/."},{"key":"e_1_2_1_3_1","volume-title":"Retrieved","year":"2016","unstructured":"Amazon. 2016 . Does Amazon Have a Minimum Character Requirement for Reviews?\u2014Selling on Amazon \/ General Selling Questions\u2014Amazon Seller Forums . Retrieved February 17, 2020 from https:\/\/sellercentral.amazon.com\/forums\/t\/does-amazon-have-a-minimum-character-requirement-for-reviews\/130681. Amazon. 2016. Does Amazon Have a Minimum Character Requirement for Reviews?\u2014Selling on Amazon \/ General Selling Questions\u2014Amazon Seller Forums. Retrieved February 17, 2020 from https:\/\/sellercentral.amazon.com\/forums\/t\/does-amazon-have-a-minimum-character-requirement-for-reviews\/130681."},{"key":"e_1_2_1_4_1","volume-title":"Retrieved","author":"Ort Cynthia Van","year":"2016","unstructured":"Cynthia Van Ort , Andrew Clearwater , and Chad Quayle . 2016 . An Agile Approach to PIAs and Privacy by Design . Retrieved March 30, 2020 from https:\/\/iapp.org\/resources\/article\/an-agile-approach-to-pias-and-privacy-by-design\/. Cynthia Van Ort, Andrew Clearwater, and Chad Quayle. 2016. An Agile Approach to PIAs and Privacy by Design. Retrieved March 30, 2020 from https:\/\/iapp.org\/resources\/article\/an-agile-approach-to-pias-and-privacy-by-design\/."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.38"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214262"},{"key":"e_1_2_1_7_1","volume-title":"Retrieved","author":"Arthur Charles","year":"2012","unstructured":"Charles Arthur . 2012 . Marissa Mayer\u2019s appointment: What does it mean for Yahoo? | Technology | The Guardian . Retrieved January 30, 2019 from https:\/\/www.theguardian.com\/technology\/2012\/jul\/16\/marissa-mayer-appointment-mean-yahoo?newsfeed=true. Charles Arthur. 2012. Marissa Mayer\u2019s appointment: What does it mean for Yahoo? | Technology | The Guardian. Retrieved January 30, 2019 from https:\/\/www.theguardian.com\/technology\/2012\/jul\/16\/marissa-mayer-appointment-mean-yahoo?newsfeed=true."},{"key":"e_1_2_1_8_1","volume-title":"Retrieved","year":"2020","unstructured":"Atlassian. 2020 . Epics, Stories, Themes, and Initiatives | Atlassian . Retrieved April 29, 2020 from https:\/\/www.atlassian.com\/agile\/project-management\/epics-stories-themes. Atlassian. 2020. Epics, Stories, Themes, and Initiatives | Atlassian. Retrieved April 29, 2020 from https:\/\/www.atlassian.com\/agile\/project-management\/epics-stories-themes."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207727"},{"key":"e_1_2_1_10_1","unstructured":"Kent Beck Mike Beedle Arie Van Bennekum Alistair Cockburn Ward Cunningham Martin Fowler James Grenning Jim Highsmith Andrew Hunt Ron Jeffries Jon Kern Brian Marick Robert C. Martin Steve Mellor Ken Schwaber Jeff Sutherland and Dave Thomas2001. Manifesto for agile software development. https:\/\/agilemanifesto.org\/.  Kent Beck Mike Beedle Arie Van Bennekum Alistair Cockburn Ward Cunningham Martin Fowler James Grenning Jim Highsmith Andrew Hunt Ron Jeffries Jon Kern Brian Marick Robert C. Martin Steve Mellor Ken Schwaber Jeff Sutherland and Dave Thomas2001. Manifesto for agile software development. https:\/\/agilemanifesto.org\/."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866029.1866078"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267808"},{"key":"e_1_2_1_13_1","volume-title":"Privacy at Speed: Privacy by Design for Agile Development at Uber","author":"Bozdag Engin","unstructured":"Engin Bozdag . 2020. Privacy at Speed: Privacy by Design for Agile Development at Uber . USENIX Association , San Francisco, CA . Engin Bozdag. 2020. Privacy at Speed: Privacy by Design for Agile Development at Uber. USENIX Association, San Francisco, CA."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078847"},{"key":"e_1_2_1_16_1","volume-title":"An Introduction to Privacy Engineering and Risk Management in Federal Systems. US Department of Commerce","author":"Brooks Sean","unstructured":"Sean Brooks , Sean Brooks , Michael Garcia , Naomi Lefkovitz , Suzanne Lightman , and Ellen Nadeau . 2017. An Introduction to Privacy Engineering and Risk Management in Federal Systems. US Department of Commerce , National Institute of Standards and Technology , Gaithersburg, MD . Sean Brooks, Sean Brooks, Michael Garcia, Naomi Lefkovitz, Suzanne Lightman, and Ellen Nadeau. 2017. An Introduction to Privacy Engineering and Risk Management in Federal Systems. US Department of Commerce, National Institute of Standards and Technology, Gaithersburg, MD."},{"key":"e_1_2_1_17_1","first-page":"995","article-title":"Digital market manipulation","volume":"82","author":"Calo Ryan","year":"2013","unstructured":"Ryan Calo . 2013 . Digital market manipulation . George Washington Law Review 82 , 4 (2013), 995 . Ryan Calo. 2013. Digital market manipulation. George Washington Law Review 82, 4 (2013), 995.","journal-title":"George Washington Law Review"},{"key":"e_1_2_1_18_1","first-page":"2010","volume-title":"Retrieved","author":"Carlson Nicholas","year":"2010","unstructured":"Nicholas Carlson . 2010 . WARNING: Google Buzz Has a Huge Privacy Flaw\u2014Business Insider . Retrieved December 18, 2018 from https:\/\/www.businessinsider.com\/warning-google-buzz-has-a-huge-privacy-flaw- 2010 - 2012 . Nicholas Carlson. 2010. WARNING: Google Buzz Has a Huge Privacy Flaw\u2014Business Insider. Retrieved December 18, 2018 from https:\/\/www.businessinsider.com\/warning-google-buzz-has-a-huge-privacy-flaw-2010-2."},{"key":"e_1_2_1_19_1","unstructured":"Ann Cavoukian. 2011. Privacy by Design in Law Policy and Practice. A White Paper for Regulators Decision-Makers and Policy-Makers. Information and Privacy Commissioner Ontario.  Ann Cavoukian. 2011. Privacy by Design in Law Policy and Practice. A White Paper for Regulators Decision-Makers and Policy-Makers. Information and Privacy Commissioner Ontario."},{"key":"e_1_2_1_20_1","volume-title":"Retrieved","author":"Chappell Bill","year":"2013","unstructured":"Bill Chappell . 2013 . Google: Don\u2019t Expect Privacy When Sending to Gmail | Technology | The Guardian . Retrieved April 11, 2020 from https:\/\/www.theguardian.com\/technology\/2013\/aug\/14\/google-gmail-users-privacy-email-lawsuit. Bill Chappell. 2013. Google: Don\u2019t Expect Privacy When Sending to Gmail | Technology | The Guardian. Retrieved April 11, 2020 from https:\/\/www.theguardian.com\/technology\/2013\/aug\/14\/google-gmail-users-privacy-email-lawsuit."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466265"},{"key":"e_1_2_1_22_1","volume-title":"Uber: Users Are More Likely to Pay Surge Pricing if Their Phone Battery is Low. Forbes.","author":"Chowdhry Amit","year":"2016","unstructured":"Amit Chowdhry . 2016 . Uber: Users Are More Likely to Pay Surge Pricing if Their Phone Battery is Low. Forbes. Retrieved from https:\/\/www.forbes.com\/sites\/amitchowdhry\/2016\/05\/25\/uber-low-battery. Amit Chowdhry. 2016. Uber: Users Are More Likely to Pay Surge Pricing if Their Phone Battery is Low. Forbes. Retrieved from https:\/\/www.forbes.com\/sites\/amitchowdhry\/2016\/05\/25\/uber-low-battery."},{"key":"e_1_2_1_23_1","volume-title":"An introduction to agile methods.Advances in Computers 62, 03","author":"Cohen David","year":"2004","unstructured":"David Cohen , Mikael Lindvall , and Patricia Costa . 2004. An introduction to agile methods.Advances in Computers 62, 03 ( 2004 ), 1\u201366. David Cohen, Mikael Lindvall, and Patricia Costa. 2004. An introduction to agile methods.Advances in Computers 62, 03 (2004), 1\u201366."},{"key":"e_1_2_1_24_1","article-title":"Protecting consumer privacy in an era of rapid change\u2013A proposed framework for businesses and policymakers","volume":"3","author":"Federal Trade Commission Staff.","year":"2012","unstructured":"Federal Trade Commission Staff. 2012 . Protecting consumer privacy in an era of rapid change\u2013A proposed framework for businesses and policymakers . Journal of Privacy and Confidentiality 3 , 1 (2011). Federal Trade Commission Staff. 2012. Protecting consumer privacy in an era of rapid change\u2013A proposed framework for businesses and policymakers. Journal of Privacy and Confidentiality 3, 1 (2011).","journal-title":"Journal of Privacy and Confidentiality"},{"key":"e_1_2_1_25_1","volume-title":"Retrieved","author":"Company The Nielsen","year":"2011","unstructured":"The Nielsen Company . 2011 . Privacy Please! U.S. Smartphone App Users Concerned with Privacy When it Comes to Location . Retrieved December 20, 2018 from https:\/\/www.nielsen.com\/us\/en\/insights\/news\/2011\/privacy-please-u-s-smartphone-app-users-concerned-with-privacy-when-it-comes-to-location.html. The Nielsen Company. 2011. Privacy Please! U.S. Smartphone App Users Concerned with Privacy When it Comes to Location. Retrieved December 20, 2018 from https:\/\/www.nielsen.com\/us\/en\/insights\/news\/2011\/privacy-please-u-s-smartphone-app-users-concerned-with-privacy-when-it-comes-to-location.html."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054985"},{"key":"e_1_2_1_27_1","volume-title":"Retrieved","author":"Constine Josh","year":"2017","unstructured":"Josh Constine . 2017 . Facebook Rolls Out AI to Detect Suicidal Posts before They\u2019re Reported | TechCrunch . Retrieved February 04, 2020 from https:\/\/techcrunch.com\/2017\/11\/27\/facebook-ai-suicide-prevention\/?guccounter=1. Josh Constine. 2017. Facebook Rolls Out AI to Detect Suicidal Posts before They\u2019re Reported | TechCrunch. Retrieved February 04, 2020 from https:\/\/techcrunch.com\/2017\/11\/27\/facebook-ai-suicide-prevention\/?guccounter=1."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPOT.2013.2277492"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.1.104"},{"key":"e_1_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Adele Da Veiga. 2018. An information privacy culture instrument to measure consumer privacy expectations and confidence. Information & Computer Security26 3 (2018) 338\u2013364.  Adele Da Veiga. 2018. An information privacy culture instrument to measure consumer privacy expectations and confidence. Information & Computer Security26 3 (2018) 338\u2013364.","DOI":"10.1108\/ICS-03-2018-0036"},{"key":"e_1_2_1_31_1","volume-title":"Social cybersecurity: Understanding and leveraging social influence to increase security sensitivity. it-Information Technology 58, 5","author":"Das Sauvik","year":"2016","unstructured":"Sauvik Das . 2016. Social cybersecurity: Understanding and leveraging social influence to increase security sensitivity. it-Information Technology 58, 5 ( 2016 ), 237\u2013245. Sauvik Das. 2016. Social cybersecurity: Understanding and leveraging social influence to increase security sensitivity. it-Information Technology 58, 5 (2016), 237\u2013245."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1771592.1771617"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0266462307080154"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_2_1_35_1","volume-title":"The Belmont report. Ethical principles and guidelines for the protection of human subjects of research.The Journal of the American College of Dentists 81, 3","author":"Department of Health, Education, and Welfare; National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. 2014.","year":"2014","unstructured":"Department of Health, Education, and Welfare; National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. 2014. The Belmont report. Ethical principles and guidelines for the protection of human subjects of research.The Journal of the American College of Dentists 81, 3 ( 2014 ), 4. Department of Health, Education, and Welfare; National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. 2014. The Belmont report. Ethical principles and guidelines for the protection of human subjects of research.The Journal of the American College of Dentists 81, 3 (2014), 4."},{"key":"e_1_2_1_36_1","volume-title":"Retrieved","author":"Department of Homeland Security.","year":"2020","unstructured":"Department of Homeland Security. 2020 . Privacy Impact Assessment Template . Retrieved March 23, 2020 from https:\/\/www.dhs.gov\/xlibrary\/assets\/privacy\/privacy_pia_template.pdf. Department of Homeland Security. 2020. Privacy Impact Assessment Template. Retrieved March 23, 2020 from https:\/\/www.dhs.gov\/xlibrary\/assets\/privacy\/privacy_pia_template.pdf."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357767.3357774"},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the 4th AAAI Conference on Human Computation and Crowdsourcing.","author":"Drapeau Ryan","unstructured":"Ryan Drapeau , Lydia B. Chilton , Jonathan Bragg , and Daniel S. Weld . 2016. Microtalk: Using argumentation to improve crowdsourcing accuracy . In Proceedings of the 4th AAAI Conference on Human Computation and Crowdsourcing. Ryan Drapeau, Lydia B. Chilton, Jonathan Bragg, and Daniel S. Weld. 2016. Microtalk: Using argumentation to improve crowdsourcing accuracy. In Proceedings of the 4th AAAI Conference on Human Computation and Crowdsourcing."},{"key":"e_1_2_1_39_1","volume-title":"Adrienne Porter Felt, and David Wagner","author":"Egelman Serge","year":"2013","unstructured":"Serge Egelman , Adrienne Porter Felt, and David Wagner . 2013 . Choice architecture and smartphone privacy: There\u2019sa price for that. In The Economics of Information Security and Privacy. B\u00f6hme R. (Ed.), Springer , Berlin, 211\u2013236. Serge Egelman, Adrienne Porter Felt, and David Wagner. 2013. Choice architecture and smartphone privacy: There\u2019sa price for that. In The Economics of Information Security and Privacy. B\u00f6hme R. (Ed.), Springer, Berlin, 211\u2013236."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025636"},{"key":"e_1_2_1_41_1","volume-title":"Retrieved","author":"Eckles Dean","year":"2014","unstructured":"Dean Eckles , Eytan Bakshy , and Michael Bernstein . 2014 . Big Experiments: Big Data\u2019s Friend for Making Decisions | Facebook . Retrieved March 02, 2020 from https:\/\/www.facebook.com\/notes\/facebook-data-science\/big-experiments-big-datas-friend-for-making-decisions\/10152160441298859\/. Dean Eckles, Eytan Bakshy, and Michael Bernstein. 2014. Big Experiments: Big Data\u2019s Friend for Making Decisions | Facebook. Retrieved March 02, 2020 from https:\/\/www.facebook.com\/notes\/facebook-data-science\/big-experiments-big-datas-friend-for-making-decisions\/10152160441298859\/."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381943"},{"key":"e_1_2_1_43_1","volume-title":"European Data Protection: Coming of Age","author":"Finn Rachel L.","unstructured":"Rachel L. Finn , David Wright , and Michael Friedewald . 2013. Seven types of privacy . In European Data Protection: Coming of Age . S. Gutwirth, R. Leenes, P. de Hert, and Y. Poullet (Eds.), Springer , 3\u201332. Rachel L. Finn, David Wright, and Michael Friedewald. 2013. Seven types of privacy. In European Data Protection: Coming of Age. S. Gutwirth, R. Leenes, P. de Hert, and Y. Poullet (Eds.), Springer, 3\u201332."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJIMA.2017.087269"},{"key":"e_1_2_1_45_1","volume-title":"Retrieved","author":"Frenkel Sheera","year":"2018","unstructured":"Sheera Frenkel and Kate Conger . 2018 . Facebook\u2019s Security Chief to Depart for Stanford University\u2014The New York Times . Retrieved January 15, 2019 from https:\/\/www.nytimes.com\/2018\/08\/01\/technology\/facebook-security-alex-stamos.html. Sheera Frenkel and Kate Conger. 2018. Facebook\u2019s Security Chief to Depart for Stanford University\u2014The New York Times. Retrieved January 15, 2019 from https:\/\/www.nytimes.com\/2018\/08\/01\/technology\/facebook-security-alex-stamos.html."},{"key":"e_1_2_1_46_1","volume-title":"The New York Times. Retrieved","author":"Granville Kevin","year":"2018","unstructured":"Kevin Granville . 2018 . Facebook and Cambridge analytica: What you need to know as fallout widens . The New York Times. Retrieved July 07, 2020 https:\/\/www.nytimes.com\/2018\/03\/19\/technology\/facebook-cambridge-analytica-explained.html. Kevin Granville. 2018. Facebook and Cambridge analytica: What you need to know as fallout widens. The New York Times. Retrieved July 07, 2020 https:\/\/www.nytimes.com\/2018\/03\/19\/technology\/facebook-cambridge-analytica-explained.html."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2095266.2095270"},{"key":"e_1_2_1_48_1","volume-title":"Proceedings of 6th Workshop on the Economics of Information Security.","author":"Grossklags Jens","year":"2007","unstructured":"Jens Grossklags and Alessandro Acquisti . 2007 . When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information . In Proceedings of 6th Workshop on the Economics of Information Security. Jens Grossklags and Alessandro Acquisti. 2007. When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information. In Proceedings of 6th Workshop on the Economics of Information Security."},{"key":"e_1_2_1_49_1","volume-title":"Retrieved","author":"Guardian The","year":"2018","unstructured":"The Guardian . 2018 . Revealed: 50 Million Facebook Profiles Harvested for Cambridge Analytica in Major Data Breach | News . Retrieved September 26, 2018 from https:\/\/www.theguardian.com\/news\/2018\/mar\/17\/cambridge-analytica-facebook-influence-us-election. The Guardian. 2018. Revealed: 50 Million Facebook Profiles Harvested for Cambridge Analytica in Major Data Breach | News. Retrieved September 26, 2018 from https:\/\/www.theguardian.com\/news\/2018\/mar\/17\/cambridge-analytica-facebook-influence-us-election."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484028.2484100"},{"key":"e_1_2_1_51_1","volume-title":"Retrieved","author":"Harwell Drew","year":"2019","unstructured":"Drew Harwell . 2019 . The Pregnancy-Tracking App Ovia Lets Women Record Their Most Sensitive Data for Themselves\u2014and Their Boss\u2014The Washington Post . Retrieved February 04, 2020 from https:\/\/www.washingtonpost.com\/technology\/2019\/04\/10\/tracking-your-pregnancy-an-app-may-be-more-public-than-you-think\/?arc404=true. Drew Harwell. 2019. The Pregnancy-Tracking App Ovia Lets Women Record Their Most Sensitive Data for Themselves\u2014and Their Boss\u2014The Washington Post. Retrieved February 04, 2020 from https:\/\/www.washingtonpost.com\/technology\/2019\/04\/10\/tracking-your-pregnancy-an-app-may-be-more-public-than-you-think\/?arc404=true."},{"key":"e_1_2_1_52_1","volume-title":"Google Alters Buzz Service over Privacy Concerns \u2014The New York Times. Retrieved","author":"Helft Miguel","year":"2019","unstructured":"Miguel Helft . 2010. Google Alters Buzz Service over Privacy Concerns \u2014The New York Times. Retrieved January 9, 2019 from https:\/\/www.nytimes.com\/2010\/02\/15\/technology\/internet\/15google.html. Miguel Helft. 2010. Google Alters Buzz Service over Privacy Concerns \u2014The New York Times. Retrieved January 9, 2019 from https:\/\/www.nytimes.com\/2010\/02\/15\/technology\/internet\/15google.html."},{"key":"e_1_2_1_53_1","volume-title":"Retrieved","author":"Hill Kashmir","year":"2012","unstructured":"Kashmir Hill . 2012 . How Target Figured Out a Teen Girl Was Pregnant before Her Father Did . Retrieved August 27, 2019 from https:\/\/www.forbes.com\/sites\/kashmirhill\/2012\/02\/16\/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did\/. Kashmir Hill. 2012. How Target Figured Out a Teen Girl Was Pregnant before Her Father Did. Retrieved August 27, 2019 from https:\/\/www.forbes.com\/sites\/kashmirhill\/2012\/02\/16\/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did\/."},{"key":"e_1_2_1_54_1","volume-title":"OkCupid Lied to Users about Their Compatibility as an Experiment. Retrieved","author":"Hill Kashmir","year":"2018","unstructured":"Kashmir Hill . 2014. OkCupid Lied to Users about Their Compatibility as an Experiment. Retrieved July 6, 2018 from https:\/\/www.forbes.com\/sites\/kashmirhill\/2014\/07\/28\/okcupid-experiment-compatibility-deception\/. Kashmir Hill. 2014. OkCupid Lied to Users about Their Compatibility as an Experiment. Retrieved July 6, 2018 from https:\/\/www.forbes.com\/sites\/kashmirhill\/2014\/07\/28\/okcupid-experiment-compatibility-deception\/."},{"key":"e_1_2_1_55_1","volume-title":"Retrieved","author":"Holson Laura M.","year":"2009","unstructured":"Laura M. Holson . 2009 . Putting a Bolder Face on Google\u2014The New York Times . Retrieved January 30, 2019 https:\/\/www.nytimes.com\/2009\/03\/01\/business\/01marissa.html?pagewanted=3&mtrref=undefined&gwh=2970AE389901E20D8913B8FB7ABB5DBE&gwt=pay. Laura M. Holson. 2009. Putting a Bolder Face on Google\u2014The New York Times. Retrieved January 30, 2019 https:\/\/www.nytimes.com\/2009\/03\/01\/business\/01marissa.html?pagewanted=3&mtrref=undefined&gwh=2970AE389901E20D8913B8FB7ABB5DBE&gwt=pay."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1013115.1013129"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1561\/1100000004"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702370"},{"key":"e_1_2_1_59_1","first-page":"442","article-title":"Evolving the IRB: Building robust review for industry research","volume":"72","author":"Jackman Molly","year":"2016","unstructured":"Molly Jackman and Lauri Kanerva . 2016 . Evolving the IRB: Building robust review for industry research . Washington and Lee Law Review Online 72 , 3 (2016), 442 . Molly Jackman and Lauri Kanerva. 2016. Evolving the IRB: Building robust review for industry research. Washington and Lee Law Review Online 72, 3 (2016), 442.","journal-title":"Washington and Lee Law Review Online"},{"key":"e_1_2_1_60_1","volume-title":"Shiqi Wang, Amir Rahmati, Earlence Fernandes, Zhuoqing Morley Mao, Atul Prakash, and Shanghai JiaoTong Unviersity.","author":"Jia Yunhan Jack","year":"2017","unstructured":"Yunhan Jack Jia , Qi Alfred Chen , Shiqi Wang, Amir Rahmati, Earlence Fernandes, Zhuoqing Morley Mao, Atul Prakash, and Shanghai JiaoTong Unviersity. 2017 . ContexloT: Towards providing contextual integrity to appified IoT platforms.In Proceedings of the 24th Annual Network and Distributed System Security Symposium . Yunhan Jack Jia, Qi Alfred Chen, Shiqi Wang, Amir Rahmati, Earlence Fernandes, Zhuoqing Morley Mao, Atul Prakash, and Shanghai JiaoTong Unviersity. 2017. ContexloT: Towards providing contextual integrity to appified IoT platforms.In Proceedings of the 24th Annual Network and Distributed System Security Symposium."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2628363.2628373"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357127"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2047196.2047202"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488217"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1320040111"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2017.23001"},{"key":"e_1_2_1_67_1","volume-title":"Privacy Indexes: A Survey of Westin\u2019s Studies (CMU-ISRI-5-138), Technical Report","author":"Kumaraguru Ponnurangam","year":"2005","unstructured":"Ponnurangam Kumaraguru and Lorrie Faith Cranor . 2005 . Privacy Indexes: A Survey of Westin\u2019s Studies (CMU-ISRI-5-138), Technical Report . Institute for Software Research International, School of Computer Science, Carnegie Mellon University , Pittsburgh, PA. Ponnurangam Kumaraguru and Lorrie Faith Cranor. 2005. Privacy Indexes: A Survey of Westin\u2019s Studies (CMU-ISRI-5-138), Technical Report. Institute for Software Research International, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1358628.1358846"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380116.2380122"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.01.005"},{"key":"e_1_2_1_71_1","volume-title":"Retrieved","author":"Levin Sam","year":"2017","unstructured":"Sam Levin . 2017 . Facebook Told Advertisers It Can Identify Teens Feeling \u2019insecure\u2019 and \u2019worthless\u2019 | Technology | The Guardian . Retrieved February 17, 2020 from https:\/\/www.theguardian.com\/technology\/2017\/may\/01\/facebook-advertising-data-insecure-teens. Sam Levin. 2017. Facebook Told Advertisers It Can Identify Teens Feeling \u2019insecure\u2019 and \u2019worthless\u2019 | Technology | The Guardian. Retrieved February 17, 2020 from https:\/\/www.theguardian.com\/technology\/2017\/may\/01\/facebook-advertising-data-insecure-teens."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2007.28"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235838.3235856"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-016-0727-z"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1002\/meet.14504901134"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068823"},{"key":"e_1_2_1_77_1","volume-title":"Retrieved","year":"2018","unstructured":"Lucidchart. 2018 . Context Data Flow Diagram Template . Retrieved December 22, 2018 from https:\/\/www.lucidchart.com\/pages\/templates\/data-flow-diagram\/context-data-flow-diagram-template. Lucidchart. 2018. Context Data Flow Diagram Template. Retrieved December 22, 2018 from https:\/\/www.lucidchart.com\/pages\/templates\/data-flow-diagram\/context-data-flow-diagram-template."},{"key":"e_1_2_1_78_1","volume-title":"Proceedings of the International Conference on Trust and Trustworthy Computing. Springer, 250\u2013266","author":"Malheiros Miguel","unstructured":"Miguel Malheiros , S\u00f6ren Preibusch , and M. Angela Sasse . 2013. \u201cFairly truthful\u201d: The impact of perceived effort, fairness, relevance, and sensitivity on personal data disclosure . In Proceedings of the International Conference on Trust and Trustworthy Computing. Springer, 250\u2013266 . Miguel Malheiros, S\u00f6ren Preibusch, and M. Angela Sasse. 2013. \u201cFairly truthful\u201d: The impact of perceived effort, fairness, relevance, and sensitivity on personal data disclosure. In Proceedings of the International Conference on Trust and Trustworthy Computing. Springer, 250\u2013266."},{"key":"e_1_2_1_79_1","volume-title":"Understanding Comics: The Invisible Art. Northampton, Mass. William Morrow Paperbacks.","author":"McCloud Scott","year":"1993","unstructured":"Scott McCloud . 1993 . Understanding Comics: The Invisible Art. Northampton, Mass. William Morrow Paperbacks. Scott McCloud. 1993. Understanding Comics: The Invisible Art. Northampton, Mass. William Morrow Paperbacks."},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866929"},{"key":"e_1_2_1_81_1","volume-title":"Amazon Go: No Cashiers, Hundreds of Cameras, and Lots of data\u2014CNN. Retrieved","author":"McFarland Matt","year":"2018","unstructured":"Matt McFarland . 2018 . Amazon Go: No Cashiers, Hundreds of Cameras, and Lots of data\u2014CNN. Retrieved February 4, 2020 from https:\/\/www.cnn.com\/2018\/10\/03\/tech\/amazon-go\/index.html. Matt McFarland. 2018. Amazon Go: No Cashiers, Hundreds of Cameras, and Lots of data\u2014CNN. Retrieved February 4, 2020 from https:\/\/www.cnn.com\/2018\/10\/03\/tech\/amazon-go\/index.html."},{"key":"e_1_2_1_83_1","volume-title":"Calculate Meeting Cost. Retrieved","year":"2020","unstructured":"MeetingKing. 2020 . Calculate Meeting Cost. Retrieved March 2, 2020 from https:\/\/meetingking.com\/meeting-cost-calculator\/. MeetingKing. 2020. Calculate Meeting Cost. Retrieved March 2, 2020 from https:\/\/meetingking.com\/meeting-cost-calculator\/."},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/77481.77486"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_17"},{"key":"e_1_2_1_86_1","first-page":"1","article-title":"Willingness to provide personal information online: The role of perceived privacy risk, privacy statements and brand strength","volume":"2","author":"Myerscough Stuart","year":"2008","unstructured":"Stuart Myerscough , Ben Lowe , and Frank Alpert . 2008 . Willingness to provide personal information online: The role of perceived privacy risk, privacy statements and brand strength . Journal of Website Promotion 2 , 1 \u2013 2 (2008), 115\u2013140. Stuart Myerscough, Ben Lowe, and Frank Alpert. 2008. Willingness to provide personal information online: The role of perceived privacy risk, privacy statements and brand strength. Journal of Website Promotion 2, 1\u20132 (2008), 115\u2013140.","journal-title":"Journal of Website Promotion"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2665148"},{"key":"e_1_2_1_88_1","volume-title":"Retrieved","author":"Newman Lily Hay","year":"2018","unstructured":"Lily Hay Newman . 2018 . The Privacy Battle to Save Google from Itself | WIRED . Retrieved January 10, 2019 from https:\/\/www.wired.com\/story\/google-privacy-data\/. Lily Hay Newman. 2018. The Privacy Battle to Save Google from Itself | WIRED. Retrieved January 10, 2019 from https:\/\/www.wired.com\/story\/google-privacy-data\/."},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.363161"},{"key":"e_1_2_1_90_1","volume-title":"Retrieved","author":"Nielsen Jakob","year":"1995","unstructured":"Jakob Nielsen . 1995 . Heuristic Evaluation: How-To: Article by Jakob Nielsen . Retrieved January 04, 2019 from https:\/\/www.nngroup.com\/articles\/how-to-conduct-a-heuristic-evaluation\/. Jakob Nielsen. 1995. Heuristic Evaluation: How-To: Article by Jakob Nielsen. Retrieved January 04, 2019 from https:\/\/www.nngroup.com\/articles\/how-to-conduct-a-heuristic-evaluation\/."},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/97243.97281"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.5555\/1822585"},{"key":"e_1_2_1_93_1","unstructured":"National Institute of Standards and Technology. 2015. Draft NISTIR 8062: An Introduction to Privacy Engineering and Risk Management in Federal Systems. Retrieved from https:\/\/csrc.nist.gov\/csrc\/media\/publications\/nistir\/8062\/draft\/documents\/nistir_8062_draft.pdf.  National Institute of Standards and Technology. 2015. Draft NISTIR 8062: An Introduction to Privacy Engineering and Risk Management in Federal Systems. Retrieved from https:\/\/csrc.nist.gov\/csrc\/media\/publications\/nistir\/8062\/draft\/documents\/nistir_8062_draft.pdf."},{"key":"e_1_2_1_94_1","unstructured":"National Institute of Standards and Technology. 2017. NISTIR 8062: An Introduction to Privacy Engineering and Risk Management in Federal Systems. Retrieved from https:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2017\/NIST.IR.8062.pdf.  National Institute of Standards and Technology. 2017. NISTIR 8062: An Introduction to Privacy Engineering and Risk Management in Federal Systems. Retrieved from https:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2017\/NIST.IR.8062.pdf."},{"key":"e_1_2_1_95_1","volume-title":"Retrieved","author":"Information Commission","year":"2020","unstructured":"Information Commission er \u2019s Office . 2020 . Data Protection Impact Assessments (DPIAs) | ICO . Retrieved December 30, 2020 from https:\/\/ico.org.uk\/for-organisations\/guide-to-data-protection\/guide-to-the-general-data-protection-regulation-gdpr\/data-protection-impact-assessments-dpias\/. Information Commissioner\u2019s Office. 2020. Data Protection Impact Assessments (DPIAs) | ICO. Retrieved December 30, 2020 from https:\/\/ico.org.uk\/for-organisations\/guide-to-data-protection\/guide-to-the-general-data-protection-regulation-gdpr\/data-protection-impact-assessments-dpias\/."},{"key":"e_1_2_1_96_1","volume-title":"Retrieved","author":"O\u2019Neil Cathy","year":"2019","unstructured":"Cathy O\u2019Neil . 2019 . China Knows How to Take Away Your Health Insurance\u2014 Bloomberg . Retrieved February 04, 2020 from https:\/\/www.bloomberg.com\/opinion\/articles\/2019-06-14\/china-knows-how-to-take-away-your-health-insurance. Cathy O\u2019Neil. 2019. China Knows How to Take Away Your Health Insurance\u2014 Bloomberg. Retrieved February 04, 2020 from https:\/\/www.bloomberg.com\/opinion\/articles\/2019-06-14\/china-knows-how-to-take-away-your-health-insurance."},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1186\/s41073-017-0038-7"},{"key":"e_1_2_1_98_1","volume-title":"Retrieved","author":"Hrubey R. Michael Varney","year":"2020","unstructured":"R. Michael Varney Pamela S. Hrubey . 2020 . Privacy and Data Protection: Internal Audit\u2019s Role in Establishing a Resilient Framework . Retrieved December 28, 2020 from https:\/\/www.crowe.com\/-\/media\/Crowe\/LLP\/folio-pdf-hidden\/Privacy_and_Data_Protection_Crowe_IIA_IAF_Joint_Report_CC2015-006.pdf?la=en-US&modified=20200407161139&hash=4F7360FDC3C61D820622DA34FC448C5B1E6F7877. R. Michael Varney Pamela S. Hrubey. 2020. Privacy and Data Protection: Internal Audit\u2019s Role in Establishing a Resilient Framework. Retrieved December 28, 2020 from https:\/\/www.crowe.com\/-\/media\/Crowe\/LLP\/folio-pdf-hidden\/Privacy_and_Data_Protection_Crowe_IIA_IAF_Joint_Report_CC2015-006.pdf?la=en-US&modified=20200407161139&hash=4F7360FDC3C61D820622DA34FC448C5B1E6F7877."},{"key":"e_1_2_1_99_1","volume-title":"Retrieved","author":"Payne Clare","year":"2016","unstructured":"Clare Payne . 2016 . Bad People, or Bad Decisions? | Investment Magazine . Retrieved April 26, 2020 from https:\/\/www.investmentmagazine.com.au\/2016\/11\/bad-people-or-bad-decisions\/. Clare Payne. 2016. Bad People, or Bad Decisions? | Investment Magazine. Retrieved April 26, 2020 from https:\/\/www.investmentmagazine.com.au\/2016\/11\/bad-people-or-bad-decisions\/."},{"key":"e_1_2_1_100_1","volume-title":"Riot Uses LoL Chatlogs to Weed Out Toxic Employees | GamesIndustry.biz. Retrieved","author":"Pearson Dan","year":"2020","unstructured":"Dan Pearson . 2016. Riot Uses LoL Chatlogs to Weed Out Toxic Employees | GamesIndustry.biz. Retrieved February 4, 2020 from https:\/\/www.gamesindustry.biz\/articles\/2016-06-10-riot-uses-lol-chatlogs-to-weed-out-toxic-employees. Dan Pearson. 2016. Riot Uses LoL Chatlogs to Weed Out Toxic Employees | GamesIndustry.biz. Retrieved February 4, 2020 from https:\/\/www.gamesindustry.biz\/articles\/2016-06-10-riot-uses-lol-chatlogs-to-weed-out-toxic-employees."},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241263"},{"key":"e_1_2_1_102_1","unstructured":"CMU PrivacyGrade. 2015. Grading the Privacy of Smartphone Apps. http:\/\/privacygrade.org\/.  CMU PrivacyGrade. 2015. Grading the Privacy of Smartphone Apps. http:\/\/privacygrade.org\/."},{"key":"e_1_2_1_103_1","volume-title":"Sexual Activity Tracked by Fitbit Shows Up in Google Search Results | TechCrunch. Retrieved","author":"Rao Leena","year":"2020","unstructured":"Leena Rao . 2011. Sexual Activity Tracked by Fitbit Shows Up in Google Search Results | TechCrunch. Retrieved February 4, 2020 from https:\/\/techcrunch.com\/2011\/07\/03\/sexual-activity-tracked-by-fitbit-shows-up-in-google-search-results\/. Leena Rao. 2011. Sexual Activity Tracked by Fitbit Shows Up in Google Search Results | TechCrunch. Retrieved February 4, 2020 from https:\/\/techcrunch.com\/2011\/07\/03\/sexual-activity-tracked-by-fitbit-shows-up-in-google-search-results\/."},{"key":"e_1_2_1_104_1","volume-title":"Retrieved","author":"Reilly Michael","year":"2017","unstructured":"Michael Reilly . 2017 . Is Facebook Targeting Ads at Sad Teens?\u2014MIT Technology Review . Retrieved February 17, 2020 from https:\/\/www.technologyreview.com\/s\/604307\/is-facebook-targeting-ads-at-sad-teens\/. Michael Reilly. 2017. Is Facebook Targeting Ads at Sad Teens?\u2014MIT Technology Review. Retrieved February 17, 2020 from https:\/\/www.technologyreview.com\/s\/604307\/is-facebook-targeting-ads-at-sad-teens\/."},{"key":"e_1_2_1_105_1","volume-title":"The Lean Startup","author":"Reis Eric","unstructured":"Eric Reis . 2011. The Lean Startup , Vol. 27 . Crown Business , New York, NY . Eric Reis. 2011. The Lean Startup, Vol. 27. Crown Business, New York, NY."},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242643"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.5555\/501581"},{"key":"e_1_2_1_108_1","volume-title":"Proceedings of the 3rd AAAI Conference on Human Computation and Crowdsourcing.","author":"Rothwell Spencer","year":"2016","unstructured":"Spencer Rothwell , Steele Carter , Ahmad Elshenawy , and Daniela Braga . 2016 . Job complexity and user attention in crowdsourcing microtasks . In Proceedings of the 3rd AAAI Conference on Human Computation and Crowdsourcing. Spencer Rothwell, Steele Carter, Ahmad Elshenawy, and Daniela Braga. 2016. Job complexity and user attention in crowdsourcing microtasks. In Proceedings of the 3rd AAAI Conference on Human Computation and Crowdsourcing."},{"key":"e_1_2_1_110_1","unstructured":"Stuart Schechter and Cristian Bravo-Lillo. 2014. Using ethical-response surveys to identify sources of disapproval and concern with Facebook\u2019s emotional contagion experiment and other controversial studies. https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/CURRENT20DRAFT20-20Ethical-Response20Survey.pdf.  Stuart Schechter and Cristian Bravo-Lillo. 2014. Using ethical-response surveys to identify sources of disapproval and concern with Facebook\u2019s emotional contagion experiment and other controversial studies. https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/CURRENT20DRAFT20-20Ethical-Response20Survey.pdf."},{"key":"e_1_2_1_111_1","volume-title":"Buttons. Retrieved","author":"NOAM SCHEIBER.","year":"2018","unstructured":"NOAM SCHEIBER. 2017. How Uber Uses Psychological Tricks to Push its Drivers \u2019 Buttons. Retrieved July 8, 2018 from https:\/\/www.nytimes.com\/interactive\/2017\/04\/02\/technology\/uber-drivers-psychological-tricks.html. NOAM SCHEIBER. 2017. How Uber Uses Psychological Tricks to Push its Drivers\u2019 Buttons. Retrieved July 8, 2018 from https:\/\/www.nytimes.com\/interactive\/2017\/04\/02\/technology\/uber-drivers-psychological-tricks.html."},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240252818207"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.179"},{"key":"e_1_2_1_114_1","volume-title":"Retrieved","year":"2018","unstructured":"Smartdraw. 2018 . Data Flow Diagram\u2014Everything You Need to Know About DFD . Retrieved December 22, 2018 from https:\/\/www.smartdraw.com\/data-flow-diagram\/. Smartdraw. 2018. Data Flow Diagram\u2014Everything You Need to Know About DFD. Retrieved December 22, 2018 from https:\/\/www.smartdraw.com\/data-flow-diagram\/."},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/2209249.2209263"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.5555\/2721743"},{"key":"e_1_2_1_118_1","volume-title":"The DGI Data Governance Framework","author":"Thomas Gwen","unstructured":"Gwen Thomas . 2006. The DGI Data Governance Framework , Vol. 20 . The Data Governance Institute, Orlando , FL. Gwen Thomas. 2006. The DGI Data Governance Framework, Vol. 20. The Data Governance Institute, Orlando, FL."},{"key":"e_1_2_1_119_1","volume-title":"Retrieved","year":"2015","unstructured":"ThoughtWorks. 2015 . Security Sandwich | Technology Radar | ThoughtWorks . Retrieved April 25, 2020 from https:\/\/www.thoughtworks.com\/radar\/techniques\/security-sandwich. ThoughtWorks. 2015. Security Sandwich | Technology Radar | ThoughtWorks. Retrieved April 25, 2020 from https:\/\/www.thoughtworks.com\/radar\/techniques\/security-sandwich."},{"key":"e_1_2_1_120_1","volume-title":"Retrieved","year":"2019","unstructured":"Tripadvisor. 2019 . Number of Characters for Review\u2014Tripadvisor Support Forum . Retrieved February 17, 2020 from https:\/\/www.tripadvisor.com\/ShowTopic-g1-i12105-k12375287-Number_of_characters_for_review-Tripadvisor_Support.html. Tripadvisor. 2019. Number of Characters for Review\u2014Tripadvisor Support Forum. Retrieved February 17, 2020 from https:\/\/www.tripadvisor.com\/ShowTopic-g1-i12105-k12375287-Number_of_characters_for_review-Tripadvisor_Support.html."},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142405.1142410"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1145\/985921.986053"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335362"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/256428.167070"},{"key":"e_1_2_1_125_1","volume-title":"Retrieved","year":"2018","unstructured":"Vox. 2018 . The Facebook and Cambridge Analytica scandal, explained with a simple diagram . Retrieved September 26, 2018 from https:\/\/www.vox.com\/policy-and-politics\/2018\/3\/23\/17151916\/facebook-cambridge-analytica-trump-diagram. Vox. 2018. The Facebook and Cambridge Analytica scandal, explained with a simple diagram. Retrieved September 26, 2018 from https:\/\/www.vox.com\/policy-and-politics\/2018\/3\/23\/17151916\/facebook-cambridge-analytica-trump-diagram."},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1145\/3330430.3333614"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078841"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.5555\/2022245.2022260"},{"key":"e_1_2_1_129_1","volume-title":"What Your Face May Tell Lenders about Whether You\u2019re Creditworthy\u2014WSJ. Retrieved","author":"Wei Zhou","year":"2020","unstructured":"Zhou Wei . 2019. What Your Face May Tell Lenders about Whether You\u2019re Creditworthy\u2014WSJ. Retrieved February 4, 2020 from https:\/\/www.wsj.com\/articles\/what-your-face-may-tell-lenders-about-whether-youre-creditworthy-11560218700. Zhou Wei. 2019. What Your Face May Tell Lenders about Whether You\u2019re Creditworthy\u2014WSJ. Retrieved February 4, 2020 from https:\/\/www.wsj.com\/articles\/what-your-face-may-tell-lenders-about-whether-youre-creditworthy-11560218700."},{"key":"e_1_2_1_130_1","volume-title":"Retrieved","author":"City Western","year":"2012","unstructured":"Western City . 2012 . The \u201cFront Page\u201d Test: An Easy Ethics Standard\u2014Western City Magazine . Retrieved April 25, 2020 from https:\/\/www.westerncity.com\/article\/front-page-test-easy-ethics-standard. Western City. 2012. The \u201cFront Page\u201d Test: An Easy Ethics Standard\u2014Western City Magazine. Retrieved April 25, 2020 from https:\/\/www.westerncity.com\/article\/front-page-test-easy-ethics-standard."},{"key":"e_1_2_1_131_1","volume-title":"Discounted Cumulative Gain\u2014Wikipedia. Retrieved","year":"2020","unstructured":"Wikipedia. 2020. Discounted Cumulative Gain\u2014Wikipedia. Retrieved March 3, 2020 from https:\/\/en.wikipedia.org\/wiki\/Discounted_cumulative_gain. Wikipedia. 2020. Discounted Cumulative Gain\u2014Wikipedia. Retrieved March 3, 2020 from https:\/\/en.wikipedia.org\/wiki\/Discounted_cumulative_gain."},{"key":"e_1_2_1_132_1","volume-title":"Retrieved","year":"2020","unstructured":"Wikipedia. 2020 . Separation of Duties . Retrieved April 23, 2020 from https:\/\/en.wikipedia.org\/wiki\/Separation_of_duties. Wikipedia. 2020. Separation of Duties. Retrieved April 23, 2020 from https:\/\/en.wikipedia.org\/wiki\/Separation_of_duties."},{"key":"e_1_2_1_133_1","volume-title":"Proceedings of the Pacific Telecommunication Council Conference","volume":"2012","author":"Winter Jenifer S.","year":"2012","unstructured":"Jenifer S. Winter . 2012 . Privacy and the emerging internet of things: Using the framework of contextual integrity to inform policy . In Proceedings of the Pacific Telecommunication Council Conference , Vol. 2012 . Jenifer S. Winter. 2012. Privacy and the emerging internet of things: Using the framework of contextual integrity to inform policy. In Proceedings of the Pacific Telecommunication Council Conference, Vol. 2012."},{"key":"e_1_2_1_134_1","volume-title":"OKCupid Plays With Love in User Experiments\u2014The New York Times. Retrieved","author":"Wood Molly","year":"2018","unstructured":"Molly Wood . 2014. OKCupid Plays With Love in User Experiments\u2014The New York Times. Retrieved July 6, 2018 from https:\/\/www.nytimes.com\/2014\/07\/29\/technology\/okcupid-publishes-findings-of-user-experiments.html?ref=technology&_r=1. Molly Wood. 2014. OKCupid Plays With Love in User Experiments\u2014The New York Times. Retrieved July 6, 2018 from https:\/\/www.nytimes.com\/2014\/07\/29\/technology\/okcupid-publishes-findings-of-user-experiments.html?ref=technology&_r=1."},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235838.3235840"},{"key":"e_1_2_1_136_1","volume-title":"Privacy Impact Assessment","author":"Wright David","unstructured":"David Wright and Paul De Hert . 2011. Privacy Impact Assessment . Vol. 6 . Springer Science & Business Media . David Wright and Paul De Hert. 2011. Privacy Impact Assessment. Vol. 6. Springer Science & Business Media."}],"container-title":["ACM Transactions on Computer-Human Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3463910","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3463910","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:25:09Z","timestamp":1750195509000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3463910"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,20]]},"references-count":134,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,10,31]]}},"alternative-id":["10.1145\/3463910"],"URL":"https:\/\/doi.org\/10.1145\/3463910","relation":{},"ISSN":["1073-0516","1557-7325"],"issn-type":[{"value":"1073-0516","type":"print"},{"value":"1557-7325","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,20]]},"assertion":[{"value":"2020-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}