{"id":"https://openalex.org/W2826749337","doi":"https://doi.org/10.1145/3214271","title":"Addressing The Privacy Paradox through Personalized Privacy Notifications","display_name":"Addressing The Privacy Paradox through Personalized Privacy Notifications","publication_year":2018,"publication_date":"2018-07-05","ids":{"openalex":"https://openalex.org/W2826749337","doi":"https://doi.org/10.1145/3214271","mag":"2826749337"},"language":"en","primary_location":{"id":"doi:10.1145/3214271","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3214271","pdf_url":null,"source":{"id":"https://openalex.org/S4210219751","display_name":"Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies","issn_l":"2474-9567","issn":["2474-9567"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065876864","display_name":"Corey Jackson","orcid":"https://orcid.org/0000-0003-0828-4506"},"institutions":[{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Corey Brian Jackson","raw_affiliation_strings":["School of Information Studies, Syracuse University, Syracuse, NY, USA"],"affiliations":[{"raw_affiliation_string":"School of Information Studies, Syracuse University, Syracuse, NY, USA","institution_ids":["https://openalex.org/I70983195"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100322712","display_name":"Yan Wang","orcid":"https://orcid.org/0000-0002-5344-1884"},"institutions":[{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yang Wang","raw_affiliation_strings":["School of Information Studies, Syracuse University, Syracuse, NY, USA"],"affiliations":[{"raw_affiliation_string":"School of Information Studies, Syracuse University, Syracuse, NY, USA","institution_ids":["https://openalex.org/I70983195"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5065876864"],"corresponding_institution_ids":["https://openalex.org/I70983195"],"apc_list":null,"apc_paid":null,"fwci":7.7452,"has_fulltext":false,"cited_by_count":37,"citation_normalized_percentile":{"value":0.96916086,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"2","issue":"2","first_page":"1","last_page":"25"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12335","display_name":"Sexuality, Behavior, and Technology","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/3203","display_name":"Clinical Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.8344009518623352},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.6115458011627197},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.5989787578582764},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5978635549545288},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5731115341186523},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.5275958180427551},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.513832151889801},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.4783743917942047},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3871833384037018}],"concepts":[{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.8344009518623352},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.6115458011627197},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.5989787578582764},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5978635549545288},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5731115341186523},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.5275958180427551},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.513832151889801},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.4783743917942047},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3871833384037018},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3214271","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3214271","pdf_url":null,"source":{"id":"https://openalex.org/S4210219751","display_name":"Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies","issn_l":"2474-9567","issn":["2474-9567"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7099999785423279}],"awards":[{"id":"https://openalex.org/G5905103432","display_name":null,"funder_award_id":"1464347","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W71887310","https://openalex.org/W112232302","https://openalex.org/W799327109","https://openalex.org/W1460341157","https://openalex.org/W1489067988","https://openalex.org/W1547786939","https://openalex.org/W1951724000","https://openalex.org/W1966114254","https://openalex.org/W1968592516","https://openalex.org/W1971219113","https://openalex.org/W1980864917","https://openalex.org/W1981568085","https://openalex.org/W1991750733","https://openalex.org/W1993722065","https://openalex.org/W1993938397","https://openalex.org/W2007784529","https://openalex.org/W2046274577","https://openalex.org/W2048723827","https://openalex.org/W2050557001","https://openalex.org/W2053154970","https://openalex.org/W2071869991","https://openalex.org/W2073242082","https://openalex.org/W2080453063","https://openalex.org/W2092726106","https://openalex.org/W2107643854","https://openalex.org/W2110213347","https://openalex.org/W2123307077","https://openalex.org/W2126797747","https://openalex.org/W2132142813","https://openalex.org/W2136649349","https://openalex.org/W2144981153","https://openalex.org/W2163241745","https://openalex.org/W2405832514","https://openalex.org/W2415016544","https://openalex.org/W2502993608","https://openalex.org/W2545457694","https://openalex.org/W2741480773","https://openalex.org/W2952961700","https://openalex.org/W3121242664","https://openalex.org/W3123012225","https://openalex.org/W4300107936"],"related_works":["https://openalex.org/W2101582069","https://openalex.org/W2127814706","https://openalex.org/W2994243660","https://openalex.org/W2118333568","https://openalex.org/W4225340788","https://openalex.org/W2086129702","https://openalex.org/W2800932586","https://openalex.org/W2041722016","https://openalex.org/W2161302168","https://openalex.org/W1965085458"],"abstract_inverted_index":{"Privacy":[0],"behaviors":[1,184],"of":[2,55,58,107,133,163,185],"individuals":[3],"are":[4],"often":[5],"inconsistent":[6],"with":[7,95,173],"their":[8,96,148,195],"stated":[9],"attitudes,":[10],"a":[11,36,91,112,134],"phenomenon":[12],"known":[13],"as":[14],"the":[15,51,72,77,105,129,161,169,183,189,199],"\"privacy":[16],"paradox.\"":[17],"These":[18],"inconsistencies":[19,79],"may":[20],"lead":[21],"to":[22,70,80,84,139],"troublesome":[23],"or":[24],"regrettable":[25],"experiences.":[26],"To":[27,99,151],"help":[28],"people":[29],"address":[30],"these":[31],"privacy":[32,38,45,53,78,97,113,123,131,149,170,176,190,196],"inconsistencies,":[33],"we":[34,103,155],"propose":[35],"personalized":[37],"notification":[39,177],"approach":[40,172],"that":[41,93,116,182],"juxtaposes":[42],"users'":[43,121],"general":[44,122],"attitudes":[46,124,197],"towards":[47,125],"specific":[48],"technologies":[49],"and":[50,110,128],"potential":[52,130],"riskiness":[54,132],"particular":[56,135],"instances":[57],"such":[59],"technology,":[60],"right":[61],"when":[62],"users":[63,81],"make":[64,140],"decisions":[65,89,146],"about":[66],"whether":[67],"and/or":[68,143],"how":[69],"use":[71],"technology":[73],"under":[74],"consideration.":[75],"Highlighting":[76],"was":[82],"designed":[83,111],"nudge":[85],"them":[86,138],"in":[87,90],"making":[88],"way":[92],"aligns":[94],"attitudes.":[98,150],"illustrate":[100],"this":[101,118,153],"approach,":[102],"chose":[104],"domain":[106],"mobile":[108,126],"apps":[109,127],"discrepancy":[114,119,171,191],"interface":[115,192],"highlights":[117],"between":[120],"app,":[136],"nudging":[137],"app":[141],"installation":[142],"permission":[144],"granting":[145],"reflecting":[147],"evaluate":[152],"interface,":[154],"conducted":[156],"an":[157],"online":[158],"experiment":[159],"simulating":[160],"process":[162],"installing":[164],"Android":[165],"apps.":[166],"We":[167],"compared":[168],"several":[174],"existing":[175],"approaches.":[178,201],"Our":[179],"results":[180],"suggest":[181],"participants":[186],"who":[187],"used":[188],"better":[193],"reflected":[194],"than":[198],"other":[200]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2025-10-10T00:00:00"}
