{"id":"https://openalex.org/W4220766760","doi":"https://doi.org/10.1145/3490099.3511152","title":"Mind-proofing Your Phone: Navigating the Digital Minefield with GreaseTerminator","display_name":"Mind-proofing Your Phone: Navigating the Digital Minefield with GreaseTerminator","publication_year":2022,"publication_date":"2022-03-21","ids":{"openalex":"https://openalex.org/W4220766760","doi":"https://doi.org/10.1145/3490099.3511152"},"language":"en","primary_location":{"id":"doi:10.1145/3490099.3511152","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3490099.3511152","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"27th International Conference on Intelligent User Interfaces","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2112.10699","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101966588","display_name":"Siddhartha Datta","orcid":"https://orcid.org/0009-0005-1504-1096"},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Siddhartha Datta","raw_affiliation_strings":["Department of Computer Science, University of Oxford, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Oxford, United Kingdom","institution_ids":["https://openalex.org/I40120149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059625515","display_name":"Konrad Kollnig","orcid":"https://orcid.org/0000-0002-7412-8731"},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Konrad Kollnig","raw_affiliation_strings":["Department of Computer Science, University of Oxford, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Oxford, United Kingdom","institution_ids":["https://openalex.org/I40120149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056692594","display_name":"Nigel Shadbolt","orcid":"https://orcid.org/0000-0002-5085-9724"},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nigel Shadbolt","raw_affiliation_strings":["Department of Computer Science, University of Oxford, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Oxford, United Kingdom","institution_ids":["https://openalex.org/I40120149"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101966588"],"corresponding_institution_ids":["https://openalex.org/I40120149"],"apc_list":null,"apc_paid":null,"fwci":1.042,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.74224044,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"523","last_page":"536"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.7775536775588989},{"id":"https://openalex.org/keywords/distraction","display_name":"Distraction","score":0.6964948177337646},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.628681480884552},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5440323948860168},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.5089240074157715},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48025253415107727},{"id":"https://openalex.org/keywords/digital-ecosystem","display_name":"Digital ecosystem","score":0.4667171835899353},{"id":"https://openalex.org/keywords/intervention","display_name":"Intervention (counseling)","score":0.45909059047698975},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4170936346054077},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3333033621311188},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2339523732662201},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.182373046875}],"concepts":[{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.7775536775588989},{"id":"https://openalex.org/C2776378700","wikidata":"https://www.wikidata.org/wiki/Q3030775","display_name":"Distraction","level":2,"score":0.6964948177337646},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.628681480884552},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5440323948860168},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.5089240074157715},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48025253415107727},{"id":"https://openalex.org/C2777527080","wikidata":"https://www.wikidata.org/wiki/Q3557311","display_name":"Digital ecosystem","level":2,"score":0.4667171835899353},{"id":"https://openalex.org/C2780665704","wikidata":"https://www.wikidata.org/wiki/Q959298","display_name":"Intervention (counseling)","level":2,"score":0.45909059047698975},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4170936346054077},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3333033621311188},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2339523732662201},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.182373046875},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C118552586","wikidata":"https://www.wikidata.org/wiki/Q7867","display_name":"Psychiatry","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3490099.3511152","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3490099.3511152","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"27th International Conference on Intelligent User Interfaces","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2112.10699","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2112.10699","pdf_url":"https://arxiv.org/pdf/2112.10699","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:cris.maastrichtuniversity.nl:publications/6292977a-164b-4b7d-a69e-8d03b8c9a2dd","is_oa":true,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85127735031&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4306402616","display_name":"Research Publications (Maastricht University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I34352273","host_organization_name":"Maastricht University","host_organization_lineage":["https://openalex.org/I34352273"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Datta, S, Kollnig, K & Shadbolt, N 2022, Mind-proofing Your Phone : Navigating the Digital Minefield with GreaseTerminator. in 27th International Conference on Intelligent User Interfaces, IUI 2022. Association for Computing Machinery, IUI: International Conference on Intelligent User Interfaces. Proceedings, pp. 523-536, 27th International Conference on Intelligent User Interfaces, IUI 2022, Helsinki, Finland, 21/03/22. https://doi.org/10.1145/3490099.3511152","raw_type":"contributionToPeriodical"},{"id":"pmh:um:oai:cris.maastrichtuniversity.nl:publications/6292977a-164b-4b7d-a69e-8d03b8c9a2dd","is_oa":true,"landing_page_url":"https://cris.maastrichtuniversity.nl/en/publications/6292977a-164b-4b7d-a69e-8d03b8c9a2dd","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"27th International Conference on Intelligent User Interfaces, IUI 2022, 523 - 536","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2112.10699","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2112.10699","pdf_url":"https://arxiv.org/pdf/2112.10699","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6499999761581421,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G883624705","display_name":null,"funder_award_id":"2219016","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1583540486","https://openalex.org/W1974942555","https://openalex.org/W2004429690","https://openalex.org/W2014383590","https://openalex.org/W2044228862","https://openalex.org/W2065429801","https://openalex.org/W2065546348","https://openalex.org/W2084957670","https://openalex.org/W2095146280","https://openalex.org/W2110158442","https://openalex.org/W2126242334","https://openalex.org/W2134699024","https://openalex.org/W2137041566","https://openalex.org/W2143766683","https://openalex.org/W2400526174","https://openalex.org/W2520692763","https://openalex.org/W2588847508","https://openalex.org/W2595653137","https://openalex.org/W2604439268","https://openalex.org/W2795529671","https://openalex.org/W2888181683","https://openalex.org/W2899035333","https://openalex.org/W2899535553","https://openalex.org/W2914976286","https://openalex.org/W2942138835","https://openalex.org/W2954566102","https://openalex.org/W2967916802","https://openalex.org/W3000010701","https://openalex.org/W3014450416","https://openalex.org/W3021574431","https://openalex.org/W3030993165","https://openalex.org/W3083032891","https://openalex.org/W3094450620","https://openalex.org/W3098062821","https://openalex.org/W3133380064","https://openalex.org/W3162779347","https://openalex.org/W4221005961","https://openalex.org/W4251441517","https://openalex.org/W4288359830"],"related_works":["https://openalex.org/W2105821991","https://openalex.org/W2147463956","https://openalex.org/W4281250427","https://openalex.org/W1989682839","https://openalex.org/W3189952116","https://openalex.org/W2199854241","https://openalex.org/W3193324181","https://openalex.org/W2788194012","https://openalex.org/W1486205750","https://openalex.org/W210914953"],"abstract_inverted_index":{"Digital":[0],"harms":[1,39,76,95],"are":[2],"widespread":[3],"in":[4,15,100],"the":[5,22,58,81,91],"mobile":[6],"ecosystem.":[7],"As":[8],"these":[9,75],"devices":[10],"gain":[11],"ever":[12],"more":[13],"prominence":[14],"our":[16],"daily":[17],"lives,":[18],"so":[19],"too":[20],"increases":[21],"potential":[23],"for":[24],"malicious":[25],"attacks":[26],"against":[27,34,74],"individuals.":[28],"The":[29],"last":[30],"line":[31],"of":[32,37,83,94],"defense":[33],"a":[35],"range":[36,93],"digital":[38,42],"-":[40,56],"including":[41],"distraction,":[43],"political":[44],"polarisation":[45],"through":[46],"hate":[47],"speech,":[48],"and":[49,71,86],"children":[50],"being":[51],"exposed":[52],"to":[53,65,68],"damaging":[54],"material":[55],"is":[57],"user":[59],"interface.":[60],"This":[61],"work":[62],"introduces":[63],"GreaseTerminator":[64,99],"enable":[66],"researchers":[67],"develop,":[69],"deploy,":[70],"test":[72],"interventions":[73],"with":[77,98],"end-users.":[78],"We":[79],"demonstrate":[80],"ease":[82],"intervention":[84],"development":[85],"deployment,":[87],"as":[88,90],"well":[89],"broad":[92],"potentially":[96],"covered":[97],"five":[101],"in-depth":[102],"case":[103],"studies.":[104]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2022-04-03T00:00:00"}
