research-article
Authors: Maximilian Hils, Daniel W. Woods, and Rainer Böhme
IMC '20: Proceedings of the ACM Internet Measurement Conference
October 2020
Pages 317 - 332
Published: 27 October 2020 Publication History
- 33citation
- 966
- Downloads
Metrics
Total Citations33Total Downloads966Last 12 Months203
Last 6 weeks29
New Citation Alert added!
This alert has been successfully added and will be sent to:
You will be notified whenever a record that you have chosen has been cited.
To manage your alert preferences, click on the button below.
Manage my Alerts
New Citation Alert!
Please log in to your account
Get Access
- Get Access
- References
- Media
- Tables
- Share
Abstract
Privacy laws like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) have pushed internet firms processing personal data to obtain user consent. Uncertainty around sanctions for non-compliance led many websites to embed a Consent Management Provider (CMP), which collects users' consent and shares it with third-party vendors and other websites. Our paper maps the formation of this ecosystem using longitudinal measurements. Primary and secondary data sources are used to measure each actor within the ecosystem. Using 161 million browser crawls, we estimate that CMP adoption doubled from June 2018 to June 2019 and then doubled again until June 2020. Sampling 4.2 million unique domains, we observe that CMP adoption is most prevalent among moderately popular websites (Tranco top 50-10k) but a long tail exists. Using APIs from the ad-tech industry, we quantify the purposes and lawful bases used to justify processing personal data. A controlled experiment on a public website provides novel insights into how the time-to-complete of two leading CMPs' consent dialogues varies with the preferences expressed, showing how privacy aware users incur a significant time cost.
References
[1]
Gunes Acar, Christian Eubank, Steven Englehardt, Marc Juarez, Arvind Narayanan, and Claudia Diaz. 2014. The Web Never Forgets: Persistent Tracking Mechanisms in the Wild. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14). ACM, 674--689. https://doi.org/10.1145/2660267.2660347
Digital Library
[2]
Idris Adjerid, Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2013. Sleights of Privacy: Framing, Disclosures, and the Limits of Transparency. In Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS '13). ACM, Article 9, 11 pages. https://doi.org/10.1145/2501604.2501613
Digital Library
[3]
John Perry Barlow. 1996. A Declaration of the Independence of Cyberspace.
[4]
Bettina Berendt, Oliver Günther, and Sarah Spiekermann. 2005. Privacy in ECommerce: Stated Preferences vs. Actual Behavior. Commun. ACM 48, 4 (April 2005), 101--106. https://doi.org/10.1145/1053291.1053295
Digital Library
[5]
Rainer Böhme and Stefan Köpsell. 2010. Trained to Accept? A Field Experiment on Consent Dialogs. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10). ACM, 2403--2406. https://doi.org/10.1145/1753326.1753689
Digital Library
[6]
Joseph Bonneau and Sören Preibusch. 2009. The Privacy Jungle: On the Market for Data Protection in Social Networks. In 8th Annual Workshop on the Economics of Information Security, WEIS. https://doi.org/10.1007/978-1-4419-6967-5_8
[7]
Aaron Ceross and Andrew Simpson. 2018. Rethinking the Proposition of Privacy Engineering. In Proceedings of the New Security Paradigms Workshop (NSPW '18). ACM, 89--102. https://doi.org/10.1145/3285002.3285006
Digital Library
[8]
Richard Clayton, Tyler Moore, and Nicolas Christin. 2015. Concentrating Correctly on Cybercrime Concentration. In 14th Annual Workshop on the Economics of Information Security, WEIS.
[9]
Lorrie Faith Cranor. 2003. P3P: Making Privacy Policies More Useful. IEEE Security and Privacy 1, 6 (2003), 50--55. https://doi.org/10.1109/MSECP.2003.1253568
Digital Library
[10]
Commission Nationale de l'Informatique et des Libertés (CNIL). 2019. Guidelines on cookies and tracking devices. https://www.cnil.fr/en/cookies-and-other-tracking-devices-cnil-publishes-new-guidelines
[11]
Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, and Thorsten Holz. 2019. We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy. In 26th Annual Network and Distributed System Security Symposium (NDSS '19). The Internet Society. https://doi.org/10.14722/ndss.2019.23378
[12]
Serge Egelman, Lorrie Faith Cranor, and Jason Hong. 2008. You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '08). ACM, 1065--1074. https://doi.org/10.1145/1357054.1357219
Digital Library
[13]
Mozilla Foundation.2007--2020. Public Suffix List. https://publicsuffix.org/
[14]
Phillipa Gill, Vijay Erramilli, Augustin Chaintreau, Balachander Krishnamurthy, Konstantina Papagiannaki, and Pablo Rodriguez. 2013. Follow the Money: Understanding Economics of Online Aggregation and Advertising. In Proceedings of the 2013 Conference on Internet Measurement Conference (IMC '13). ACM, 141--148. https://doi.org/10.1145/2504730.2504768
Digital Library
[15]
Tarleton Gillespie. 2010. The politics of 'platforms'. New Media & Society 12, 3 (2010), 347--364. https://doi.org/10.1177/1461444809342738
[16]
Hana Habib, Yixin Zou, Aditi Jannu, Neha Sridhar, Chelse Swoopes, Alessandro Acquisti, Lorrie Faith Cranor, Norman M. Sadeh, and Florian Schaub. 2019. An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites. In Fifteenth Symposium on Usable Privacy and Security (SOUPS '19). USENIX. https://www.usenix.org/conference/soups2019/presentation/habib
[17]
Elizabeth Liz Harding, Jarno J Vanto, Reece Clark, L Hannah Ji, and Sara C Ainsworth. 2019. Understanding the scope and impact of the California Consumer Privacy Act of 2018. Journal of Data Protection & Privacy 2, 3 (2019), 234--253.
[18]
Soheil Human and Florian Cech. 2021. A Human-centric Perspective on Digital Consenting: The Case of GAFAM. In Human Centred Intelligent Systems. Springer, 139--159. https://doi.org/10.1007/978-981-15-5784-2_12
[19]
IAB Europe. 2020. CMP List. https://iabeurope.eu/cmp-list/
[20]
IAB Europe. 2020. What is the Transparency and Consent Framework (TCF)? https://iabeurope.eu/transparency-consent-framework/
[21]
Muhammad Ikram, Narseo Vallina-Rodriguez, Suranga Seneviratne, Mohamed Ali Kaafar, and Vern Paxson. 2016. An Analysis of the Privacy and Security Risks of Android VPN Permission-Enabled Apps. In Proceedings of the 2016 Internet Measurement Conference (IMC '16). ACM, 349--364. https://doi.org/10.1145/2987443.2987471
Digital Library
[22]
Costas Iordanou, Georgios Smaragdakis, Ingmar Poese, and Nikolaos Laoutaris. 2018. Tracing Cross Border Web Tracking. In Proceedings of the Internet Measurement Conference 2018 (IMC '18). ACM, 329--342. https://doi.org/10.1145/3278532.3278561
Digital Library
[23]
Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara B. Kiesler. 2015. "My Data Just Goes Everywhere:" User Mental Models of the Internet and Implications for Privacy and Security. In Eleventh Symposium On Usable Privacy and Security (SOUPS '15). USENIX, 39--52. https://www.usenix.org/conference/soups2015/proceedings/presentation/kang
[24]
Farzaneh Karegar, John Sören Pettersson, and Simone Fischer-Hübner. 2020. The Dilemma of User Engagement in Privacy Notices: Effects of Interaction Modes and Habituation on User Attention. ACM Transactions on Privacy and Security 23, 1 (2020), 5:1--5:38. https://doi.org/10.1145/3372296
Digital Library
[25]
Mohammad Taha Khan, Joe DeBlasio, Geoffrey M. Voelker, Alex C. Snoeren, Chris Kanich, and Narseo Vallina-Rodriguez. 2018. An Empirical Analysis of the Commercial VPN Ecosystem. In Proceedings of the Internet Measurement Conference 2018 (IMC '18). ACM, 443--456. https://doi.org/10.1145/3278532.3278570
Digital Library
[26]
David M. Kristol. 2001. HTTP Cookies: Standards, privacy, and politics. ACM Transactions on Internet Technology 1, 2 (2001), 151--198. https://doi.org/10.1145/502152.502153
Digital Library
[27]
Ponnurangam Kumaraguru, Lorrie Cranor, Jorge Lobo, and Seraphin Calo. 2007. A Survey of Privacy Policy Languages. In Workshop on Usable IT Security Management: 3rd Symposium on Usable Privacy and Security, ACM (USM '07).
[28]
Yee-Lin Lai and Kai-Lung Hui. 2006. Internet Opt-in and Opt-out: Investigating the Roles of Frames, Defaults and Privacy Concerns. In Proceedings of the 2006 ACM SIGMIS CPR Conference on Computer Personnel Research (SIGMIS CPR '06). ACM, 253--263. https://doi.org/10.1145/1125170.1125230
Digital Library
[29]
Pierre Laperdrix, Nataliia Bielova, Benoit Baudry, and Gildas Avoine. 2020. Browser Fingerprinting: A Survey. ACM Transactions on the Web 14, 2, Article 8 (April 2020), 33 pages. https://doi.org/10.1145/3386040
Digital Library
[30]
Dominique Machuletz and Rainer Böhme. 2020. Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPR. Proceedings on Privacy Enhancing Technologies 2, 481--498. https://doi.org/10.2478/popets-2020-0037
[31]
Samin Yaseer Mahmud, Akhil Acharya, Benjamin Andow, William Enck, and Bradley Reaves. 2020. Cardpliance: PCI DSS Compliance of Android Applications. In 29th USENIX Security Symposium (USENIX '20).1517--1533. https://www.usenix.org/conference/usenixsecurity20/presentation/mahmud
[32]
Célestin Matte, Nataliia Bielova, and Cristiana Santos. 2020. Do Cookie Banners Respect my Choice? Measuring Legal Compliance of Banners from IAB Europe's Transparency and Consent Framework. In 2020 IEEE Symposium on Security and Privacy. IEEE, 791--809. https://doi.org/10.1109/SP40000.2020.00076
[33]
Célestin Matte, Cristiana Santos, and Nataliia Bielova. 2020. Purposes in IAB Europe's TCF: which legal basis and how are they used by advertisers?. In Annual Privacy Forum (APF 2020).
[34]
Jonathan R. Mayer and John C. Mitchell. 2012. Third-Party Web Tracking: Policy and Technology. In 2012 IEEE Symposium on Security and Privacy. IEEE, 413--427. https://doi.org/10.1109/SP.2012.47
[35]
Damon McCoy, Hitesh Dharmdasani, Christian Kreibich, Geoffrey M. Voelker, and Stefan Savage. 2012. Priceless: The Role of Payments in Abuse-Advertised Goods. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS '12). ACM, 845--856. https://doi.org/10.1145/2382196.2382285
Digital Library
[36]
Aleecia M McDonald and Lorrie Faith Cranor. 2008. The cost of reading privacy policies. Journal of Law and Policy for the Information Society 4 (2008), 543.
[37]
Lynette I. Millett, Batya Friedman, and Edward Felten. 2001. Cookies and Web Browser Design: Toward Realizing Informed Consent Online. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '01). ACM, 46--52. https://doi.org/10.1145/365024.365034
Digital Library
[38]
Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, and Giovanni Vigna. 2013. Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting. In 2013 IEEE Symposium on Security and Privacy. IEEE, 541--555. https://doi.org/10.1109/SP.2013.43
[39]
Midas Nouwens, Ilaria Liccardi, Michael Veale, David Karger, and Lalana Kagal. 2020. Dark Patterns after the GDPR: Scraping Consent Pop-Ups and Demonstrating Their Influence. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI '20). ACM, 1--13. https://doi.org/10.1145/3313831.3376321
Digital Library
[40]
Judith S. Olson, Jonathan Grudin, and Eric Horvitz. 2005. A Study of Preferences for Sharing and Privacy. In CHI '05 Extended Abstracts on Human Factors in Computing Systems. ACM, 1985--1988. https://doi.org/10.1145/1056808.1057073
Digital Library
[41]
Mark O'Neill, Elham Vaziripour, Justin Wu, and Daniel Zappala. 2016. Condensing Steam: Distilling the Diversity of Gamer Behavior. In Proceedings of the 2016 Internet Measurement Conference (IMC '16). ACM, 81--95. https://doi.org/10.1145/2987443.2987489
Digital Library
[42]
Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, and Nicolas Kourtellis. 2019. No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem. In Proceedings of the Internet Measurement Conference (IMC '19). ACM, 280--293. https://doi.org/10.1145/3355369.3355582
Digital Library
[43]
Panagiotis Papadopoulos, Nicolas Kourtellis, Pablo Rodriguez Rodriguez, and Nikolaos Laoutaris. 2017. If You Are Not Paying for It, You Are the Product: How Much Do Advertisers Pay to Reach You?. In Proceedings of the 2017 Internet Measurement Conference (IMC '17). ACM, 142--156. https://doi.org/10.1145/3131365.3131397
Digital Library
[44]
Victor Le Pochat, Tom van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczynski, and Wouter Joosen. 2019. Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. In 26th Annual Network and Distributed System Security Symposium (NDSS '19). The Internet Society. https://doi.org/10.14722/ndss.2019.23386
[45]
Enric Pujol, Oliver Hohlfeld, and Anja Feldmann. 2015. Annoyed Users: Ads and Ad-Block Usage in the Wild. In Proceedings of the 2015 Internet Measurement Conference (IMC '15). ACM, 93--106. https://doi.org/10.1145/2815675.2815705
Digital Library
[46]
Sazzadur Rahaman, Gang Wang, and Danfeng (Daphne) Yao. 2019. Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS '19). ACM, 481--498. https://doi.org/10.1145/3319535.3363195
Digital Library
[47]
Hana Ross. 2017. Data subject consent: How will the General Data Protection Regulation affect this? Journal of Data Protection & Privacy 1, 2 (2017), 146--155.
[48]
Iskander Sanchez-Rola, Matteo Dell'Amico, Platon Kotzias, Davide Balzarotti, Leyla Bilge, Pierre-Antoine Vervier, and Igor Santos. 2019. Can I Opt Out Yet? GDPR and the Global Illusion of Cookie Control. In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security (Asia CCS '19). ACM, 340--351. https://doi.org/10.1145/3321705.3329806
Digital Library
[49]
Quirin Scheitle, Oliver Hohlfeld, Julien Gamba, Jonas Jelten, Torsten Zimmermann, Stephen D. Strowes, and Narseo Vallina-Rodriguez. 2018. A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists. In Proceedings of the Internet Measurement Conference 2018 (IMC '18). ACM, 478--493. https://doi.org/10.1145/3278532.3278574
Digital Library
[50]
Jannick Sørensen and Sokol Kosta. 2019. Before and After GDPR: The Changes in Third Party Presence at Public and Private European Websites. In The World Wide Web Conference (WWW '19). ACM, 1590--1600. https://doi.org/10.1145/3308558.3313524
Digital Library
[51]
Sarah Spiekermann, Alessandro Acquisti, Rainer Böhme, and Kai Lung Hui. 2015. The challenges of personal data markets and privacy. Electronic Markets 25, 2 (2015), 161--167. https://doi.org/10.1007/s12525-015-0191-0
[52]
Samaneh Tajalizadehkhoob, Tom Van Goethem, Maciej Korczyński, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, and Michel van Eeten. 2017. Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS '17). ACM, 553--567. https://doi.org/10.1145/3133956.3133971
Digital Library
[53]
Martino Trevisan, Stefano Traverso, Eleonora Bassi, and Marco Mellia. 2019. 4 Years of EU Cookie Law: Results and Lessons Learned. Proceedings on Privacy Enhancing Technologies 2019, 2 (2019), 126--145. https://doi.org/10.2478/popets-2019-0023
[54]
Blase Ur, Pedro Giovanni Leon, Lorrie Faith Cranor, Richard Shay, and Yang Wang. 2012. Smart, Useful, Scary, Creepy: Perceptions of Online Behavioral Advertising. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12). ACM, Article 4, 15 pages. https://doi.org/10.1145/2335356.2335362
Digital Library
[55]
Tobias Urban, Martin Degeling, Thorsten Holz, and Norbert Pohlmann. 2020. Beyond the Front Page: Measuring Third Party Dynamics in the Field. In Proceedings of The Web Conference 2020 (WWW '20). ACM, 1275--1286. https://doi.org/10.1145/3366423.3380203
Digital Library
[56]
Christine Utz, Martin Degeling, Sascha Fahl, Florian Schaub, and Thorsten Holz. 2019. (Un)informed Consent: Studying GDPR Consent Notices in the Field. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS '19). ACM, 973--990. https://doi.org/10.1145/3319535.3354212
Digital Library
[57]
Pelayo Vallina, Álvaro Feal, Julien Gamba, Narseo Vallina-Rodriguez, and Antonio Fernández Anta. 2019. Tales from the p*rn: A Comprehensive Privacy Analysis of the Web p*rn Ecosystem. In Proceedings of the Internet Measurement Conference (IMC '19). ACM, 245--258. https://doi.org/10.1145/3355369.3355583
Digital Library
[58]
Rob Van Eijk, Hadi Asghari, Philipp Winter, and Arvind Narayanan. 2019. The Impact of User Location on Cookie Notices (Inside and Outside of the European Union). In Workshop on Technology and Consumer Protection (ConPro'19).
[59]
Anthony Vance, David Eargle, Jeffrey L. Jenkins, C. Brock Kirwan, and Bonnie Brinton Anderson. 2019. The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings. In Fifteenth Symposium on Usable Privacy and Security (SOUPS '19). USENIX. https://www.usenix.org/conference/soups2019/presentation/vance
[60]
Daniel W Woods and Rainer Böhme. 2020. The Commodification of Consent. In 20th Annual Workshop on the Economics of Information Security, WEIS.
[61]
Scott A Wright and Guang-Xin Xie. 2019. Perceived Privacy Violation: Exploring the Malleability of Privacy Expectations. Journal of Business Ethics 156, 1 (2019), 123--140. https://doi.org/10.1007/s10551-017-3553-z
[62]
Savvas Zannettou, Tristan Caulfield, Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, and Guillermo Suarez-Tangil. 2018. On the Origins of Memes by Means of Fringe Web Communities. In Proceedings of the Internet Measurement Conference 2018 (IMC '18). ACM, 188--202. https://doi.org/10.1145/3278532.3278550
Digital Library
[63]
Savvas Zannettou, Tristan Caulfield, Emiliano De Cristofaro, Nicolas Kourtelris, Ilias Leontiadis, Michael Sirivianos, Gianluca Stringhini, and Jeremy Blackburn. 2017. The Web Centipede: Understanding How Web Communities Influence Each Other through the Lens of Mainstream and Alternative News Sources. In Proceedings of the 2017 Internet Measurement Conference (IMC '17). ACM, 405--417. https://doi.org/10.1145/3131365.3131390
Digital Library
Cited By
View all
- Porcelli LMastroianni MFicco MPalmieri F(2024)A User-Centered Privacy Policy Management System for Automatic Consent on Cookie BannersComputers10.3390/computers1302004313:2(43)Online publication date: 1-Feb-2024
- Kyi L(2024)Reimagining Online Consent for More Responsible and Human-Centred Data CollectionExtended Abstracts of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613905.3651129(1-3)Online publication date: 11-May-2024
https://dl.acm.org/doi/10.1145/3613905.3651129
- Kyi LMhaidli ASantos CRoesner FBiega A(2024)“It doesn’t tell me anything about how my data is used”: User Perceptions of Data Collection PurposesProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642260(1-12)Online publication date: 11-May-2024
https://dl.acm.org/doi/10.1145/3613904.3642260
- Show More Cited By
Index Terms
Measuring the Emergence of Consent Management on the Web
Information systems
World Wide Web
Online advertising
Networks
Network performance evaluation
Network measurement
Security and privacy
Human and societal aspects of security and privacy
Privacy protections
Usability in security and privacy
Recommendations
- (Un)informed Consent: Studying GDPR Consent Notices in the Field
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
Since the adoption of the General Data Protection Regulation (GDPR) in May 2018 more than 60 % of popular websites in Europe display cookie consent notices to their visitors. This has quickly led to users becoming fatigued with privacy notifications and ...
Read More
- The crisis of consent: how stronger legal protection may lead to weaker consent in data protection
In this article we examine the effectiveness of consent in data protection legislation. We argue that the current legal framework for consent, which has its basis in the idea of autonomous authorisation, does not work in practice. In practice the legal ...
Read More
- Authenticated and Privacy-Preserving Consent Management in the Internet of Things
Abstract
As the Internet of Things (IoT) starts providing meaningful solutions in multiple domains, users expect to take full advantage of the features and benefits of smart devices, but not at the cost of privacy loss. They want to keep control over their ...
Read More
Comments
Information & Contributors
Information
Published In
IMC '20: Proceedings of the ACM Internet Measurement Conference
October 2020
751 pages
ISBN:9781450381383
DOI:10.1145/3419394
Copyright © 2020 ACM.
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [emailprotected].
Sponsors
- SIGMETRICS: ACM Special Interest Group on Measurement and Evaluation
- SIGCOMM: ACM Special Interest Group on Data Communication
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Published: 27 October 2020
Permissions
Request permissions for this article.
Check for updates
Author Tags
- CCPA
- GDPR
- consent
- privacy
- web measurement
Qualifiers
- Research-article
- Research
- Refereed limited
Funding Sources
Conference
IMC '20
Sponsor:
- SIGMETRICS
- SIGCOMM
Acceptance Rates
IMC '20 Paper Acceptance Rate 53 of 216 submissions, 25%;
Overall Acceptance Rate 277 of 1,083 submissions, 26%
More
Contributors
Other Metrics
View Article Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- View Citations
33
Total Citations
966
Total Downloads
- Downloads (Last 12 months)203
- Downloads (Last 6 weeks)29
Other Metrics
View Author Metrics
Citations
Cited By
View all
- Porcelli LMastroianni MFicco MPalmieri F(2024)A User-Centered Privacy Policy Management System for Automatic Consent on Cookie BannersComputers10.3390/computers1302004313:2(43)Online publication date: 1-Feb-2024
- Kyi L(2024)Reimagining Online Consent for More Responsible and Human-Centred Data CollectionExtended Abstracts of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613905.3651129(1-3)Online publication date: 11-May-2024
https://dl.acm.org/doi/10.1145/3613905.3651129
- Kyi LMhaidli ASantos CRoesner FBiega A(2024)“It doesn’t tell me anything about how my data is used”: User Perceptions of Data Collection PurposesProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642260(1-12)Online publication date: 11-May-2024
https://dl.acm.org/doi/10.1145/3613904.3642260
- Radway SQuintanilla KLudden CVotipka D(2024)An Investigation of US Universities' Implementation of FERPA Student Directory Policies and Student Privacy PreferencesProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642066(1-35)Online publication date: 11-May-2024
https://dl.acm.org/doi/10.1145/3613904.3642066
- Smith MTorres-Agüero AGrossman RSen PChen YBorcea CChua TNgo CKa-Wei Lee RKumar RLauw H(2024)A Study of GDPR Compliance under the Transparency and Consent FrameworkProceedings of the ACM on Web Conference 202410.1145/3589334.3645618(1227-1236)Online publication date: 13-May-2024
https://dl.acm.org/doi/10.1145/3589334.3645618
- Li WXiong BYang C(2024) A roadmap to achieving a healthier information ecosystem through GDPR implementation and privacy compliance technologies Journal of the Association for Information Science and Technology10.1002/asi.24878Online publication date: 28-Feb-2024
- Khandelwal RNayak AHarkous HFawaz KCalandrino JTroncoso C(2023)Automated cookie notice analysis and enforcementProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620300(1109-1126)Online publication date: 9-Aug-2023
https://dl.acm.org/doi/10.5555/3620237.3620300
- Khalid MAhmed MKim J(2023)Enhancing Data Protection in Dynamic Consent Management Systems: Formalizing Privacy and Security Definitions with Differential Privacy, Decentralization, and Zero-Knowledge ProofsSensors10.3390/s2317760423:17(7604)Online publication date: 1-Sep-2023
- Khalid MAhmed MHelfert MKim J(2023)Privacy-First Paradigm for Dynamic Consent Management Systems: Empowering Data Subjects through Decentralized Data Controllers and Privacy-Preserving TechniquesElectronics10.3390/electronics1224497312:24(4973)Online publication date: 12-Dec-2023
- Jha NTrevisan MMellia MIrarrazaval RFernandez D(2023)I Refuse if You Let Me: Studying User Behavior with Privacy Banners at Scale2023 7th Network Traffic Measurement and Analysis Conference (TMA)10.23919/TMA58422.2023.10198936(1-9)Online publication date: 26-Jun-2023
- Show More Cited By
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in
Full Access
Get this Publication
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderMedia
Figures
Other
Tables