<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Consent Recommender System: A Case Study on LinkedIn Settings</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Rosni K V</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Manish Shukla</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vijayanand Banahatti</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sachin Lodha</string-name>
          <email>sachin.lodhag@tcs.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>TCS Research Labs</institution>
          ,
          <country country="IN">India</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Privacy is an increasing concern in the digital world, especially when it has become a common knowledge that even high profile enterprises process data without data-subject's consent. In certain cases where data-subject's consent was taken, it was not linked to the proper purpose of processing. To address this growing concern, newer privacy regulations and laws are emerging to empower a data-subject with informed and explicit consent through which she can allow or revoke usage of her personal data. However, it has been shown that privacy self-management does not provide the expected results. This is mainly due to information overload as data-subjects use multiple services entailing variety of purposes, and hence, resulting in a very large number of consent requests. This may lead to consent fatigue as data-subject is now expected to provide informed consent for each associated purpose. The consent fatigue in data-subjects can lead to either incorrect decision making or opting for default values provided by the enterprise, and thus, defeating the purpose of new data privacy regulations. In this work, we discuss the factors influencing the informed consent of a data-subject. Further, we propose a 'consent recommender system' based on Factorization Machines (FMs) to assist the data-subject and thereby avoiding consent fatigue. Our consent recommender system effectively models the interaction between the different factors which influence a data-subject's informed consent. We discuss how this setup extends for cold start data-subjects facing the decision problem with consent requests from multiple enterprises. Additionally, we demonstrate the scenario of consent recommendation as a prediction problem with minimum attributes available from LinkedIn's privacy settings.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>2016) discussed the specific ways in which vague or unclear
language hinders the comprehension of enterprise practices.
This paradigm represented one extreme of the data privacy
management landscape where the data-subject had little or
no control over her data with respect to its usage and
sharing.</p>
      <p>
        Some enterprises allowed data-subjects to access their
data and provide consent for certain specific purposes such
as sharing of personal email or demographic data with third
party. However, such privacy preference controls provided
by enterprises were either limited or there was a
disconnect from privacy policy
        <xref ref-type="bibr" rid="ref28 ref3">(Anthonysamy, Greenwood, and
Rashid 2013)</xref>
        or it was hard to use them
        <xref ref-type="bibr" rid="ref22">(Madden 2012)</xref>
        .
Further, these controls did not stop an enterprise from
analyzing the data for gaining additional insights into
datasubject’s behavior. More recently, these concerns were
addressed by newer privacy regulations and acts in different
geographies, for example, GDPR in EU
        <xref ref-type="bibr" rid="ref34">(Voigt and Von dem
Bussche 2017)</xref>
        and CCPA in California
        <xref ref-type="bibr" rid="ref9">(de la Torre 2018)</xref>
        .
These data protection regulations are designed to protect the
personal information of individuals by restricting how such
information can be collected, used and disclosed by having
proper informed consent from data-subjects
        <xref ref-type="bibr" rid="ref18 ref36 ref5">(Barnard-Wills,
Chulvi, and De Hert 2016)</xref>
        . For example, France’s National
Data Protection Commission (CNIL) penalized Google for
not having a valid legal basis to process the personal data of
the users of its services, especially for ads personalization
purposes1.
      </p>
      <p>
        Informed consent is beginning to form the foundation of
data protection law in many jurisdictions. It is intuitively
considered as an appropriate method to ensure the protection
of a data-subject’s autonomy as it allows her to have control
over her personal data
        <xref ref-type="bibr" rid="ref12 ref34">(Voigt and Von dem Bussche 2017;
Dwyer III, Weaver, and Hughes 2004)</xref>
        . However, if a
datasubject interacts with multiple services having consent
requirement for many purposes (defined in Section 3) then
it leads to information overloading while making decision,
and hence, consent fatigue. In biomedical domain consent
fatigue is a well discussed topic
        <xref ref-type="bibr" rid="ref28">(Ploug and Holm 2013)</xref>
        .
Solove
        <xref ref-type="bibr" rid="ref33">(Solove 2012)</xref>
        and Casteren
        <xref ref-type="bibr" rid="ref6">(Casteren 2017)</xref>
        have
studied about consumer’s privacy self-management and their
1https://www.cnil.fr/en/cnils-restricted-committee-imposesfinancial-penalty-50-million-euros-against-google-llc
Survey
Responses
      </p>
      <p>Pre process (extract the required settings,
one-hot encoding user indexing, purpose</p>
      <p>related information)
Privacy Settings</p>
      <p>Pre-Processed Data
New User</p>
      <p>Query Vector</p>
      <p>Model
score &gt;= threshold?</p>
      <p>Yes
Allow</p>
      <p>
        No
Deny
ability to make meaningful decisions with information
overload. A recent study
        <xref ref-type="bibr" rid="ref10">(Degeling et al. 2018)</xref>
        discusses the
impact of GDPR on web applications and services as well
as new issues arising from the same. Two key takeaways
from their work are: a) The majority of websites updated
their privacy policies in the last two years, and, b) Average
text length in policy document rose from a mean of 2,145
words in March 2016 to 3,044 words in March 2018 (+41%
in 2 years) and increased another 18% until late May (3,603
words). The consent fatigue may either result in wrong
decision making by data-subject or providing implicit consent
by not taking any action.
      </p>
      <p>
        In this work, we explore the problem of consent fatigue
due to information overload and frequent decision
making. To address this issue we proposed and implemented a
consent recommender system for LinkedIn application. Our
work enables a LinkedIn user in identifying appropriate
privacy controls and its corresponding setting. It is especially
useful for cold-starting a new user for whom no prior
historical privacy preferences are available. The main contribution
of our work consists of a novel combination of Factorization
Machine (FM)
        <xref ref-type="bibr" rid="ref29">(Rendle 2010; 2012)</xref>
        and factors affecting an
individuals decision making process for predicting their
privacy preference. That said, the details of our contribution are
as follows:
      </p>
      <p>
        We conducted a survey on 50 data-subjects to identify
factors that can influence their decision-making process.
Further, we collected LinkedIn privacy setting data for each
participant for building our recommendation model.
In this work we have shown that the privacy
recommendation problem can be modeled as a prediction problem. For
that we used Factorization Machine (FM)
        <xref ref-type="bibr" rid="ref29">(Rendle 2010;
2012)</xref>
        for consent recommendation. This also helped in
analyzing the pairwise interaction of attributes for
learning reliable weights. Further, we showed that the accuracy
of our proposed model is around 88%. Also, we discussed
the change in accuracy (in terms of precision, recall and
F1-score) with respect to the different combination of
features.
      </p>
      <p>The rest of the paper is organized as follows. Related work
is presented in section 2. Architecture and system
description are given in section 3. The survey methodology,
demography details and result analysis are discussed in section 4.
The experimental results are shown in section 5. Section 6
describes the implication of our work, future research
possibilities and the limitation of our work with some concluding
remarks in section 7.</p>
      <p>2</p>
    </sec>
    <sec id="sec-2">
      <title>Related Work</title>
      <p>
        Often services and applications capture more than required
user data for analytics or generating profit by selling it to
third party. An example of this was discussed in
        <xref ref-type="bibr" rid="ref4">(Balebako
et al. 2013)</xref>
        where they showed that even well-known mobile
applications capture sensitive data of data-subjects and then
share it with third party without their cognizance. However,
with latest data privacy regulations a data-subject’s consent
becomes necessary to process her data. Substantial amount
of work is done for understanding privacy concerns of
datasubject
        <xref ref-type="bibr" rid="ref17 ref19 ref21 ref27 ref31 ref31 ref32 ref35">(Liu et al. 2016; Olejnik et al. 2017; Knijnenburg
2014; Sadeh and Hong 2014; Liu, Lin, and Sadeh 2014;
Sadeh et al. 2009; Wijesekera et al. 2017)</xref>
        .
      </p>
      <p>
        In their work, Sadeh et al analyzed the sensitive data
requested by a mobile app and the purposes associated with
it
        <xref ref-type="bibr" rid="ref31">(Sadeh and Hong 2014)</xref>
        . Liu et al, detected user profiles
based on the user application permission settings
        <xref ref-type="bibr" rid="ref21 ref31">(Liu, Lin,
and Sadeh 2014)</xref>
        . They further used Singular Value
Decomposition (SVD) for addressing the issues related to sparsity
and dimensionality. In
        <xref ref-type="bibr" rid="ref35">(Wijesekera et al. 2017)</xref>
        , authors
reduce the burden on users by automating the decision making
process in smartphones.
      </p>
      <p>
        Researchers have also looked into the privacy preference
recommender system for social networks. Ghainour et al
        <xref ref-type="bibr" rid="ref16 ref18 ref36">(Ghazinour, Matwin, and Sokolova 2016)</xref>
        proposed a
recommender system for privacy settings in social networks,
particularly for Facebook. They modeled user’s Facebook
privacy settings of photo albums by independently
considering different attributes, for example, personal profile and
interests. In this paper, we also make use of the pairwise
interaction of attributes. As it helps in learning reliable weights
by taking the inner product of lower dimensional vectors.
      </p>
      <p>
        In a recent work,
        <xref ref-type="bibr" rid="ref25">(Naeini et al. 2017)</xref>
        focused on privacy
expectations and preferences in IoT data collection
scenarios. Naeini et al (2017) further showed that privacy
preferences are diverse, context dependent and participants are
more likely to consent to data if it benefits them.
Additionally, they were able to predict data-subjects preferences
after three data-collection scenarios. The work presented in
        <xref ref-type="bibr" rid="ref25">(Naeini et al. 2017)</xref>
        comes closer to our work. However,
their main focus is on improving the privacy notices for IoT
m
1
1
0
p2
Purpose (p)
…
…
…
…
…
1
0
1
0
pc1
0
1
0
1
pc2
…
…
…
…
…
0
0
1
1 0
psc1 psc2
1
0
0
α
…
…
…
…
…
1
0
devices and develop more advanced personal privacy
assistants, whereas, we are addressing the problem of
information overload, and hence, the issue of consent fatigue in post
GDPR and CCPA era.
      </p>
      <p>3</p>
    </sec>
    <sec id="sec-3">
      <title>System Description</title>
      <p>
        Definitions: Some basic definitions of the terms as per
GDPR
        <xref ref-type="bibr" rid="ref34">(Voigt and Von dem Bussche 2017)</xref>
        :
1. data-subject is an individual whose personal data is
collected, held or processed. In this paper terms consumer
and data-subject are used interchangeably.
2. personal data shall mean any information relating to an
identified or identifiable natural person (‘data subject’)
3. consent is defined as a data-subject’s informed and
unambiguous agreement to process her data.
4. purpose of processing data refers to the need and
unambiguous reason for collecting, accessing and processing
data-subject’s data.
      </p>
      <p>Problem Statement: Let U be the set of data-subjects
such that U = fu1; : : : ; uN g. Further, let S be a service
provider (LinkedIn in our case), that processes large amount
of data fields D = fd1; : : : ; dK g. Let P = fp1; : : : ; pX g
be the set of clear and unambiguous purposes under which
S processes D. For a given purpose pi 2 P , there is an
associated Di D. The service provider S will only process
Di for the purpose pi. Similarly, a data field dj 2 D could
be linked to multiple purposes Pj P . Also, purpose pi is
associated with a set of attributes ( i) (e.g., description,
purpose category, sensitivity of requested data field, etc.), such
that = SiX=1 i.</p>
      <p>
        Figure 1 describes the overall flow of our proposed
recommendation system. We selected LinkedIn for building our
recommendation model because its a popular professional
networking site and we found their privacy settings very
comprehensive, including, handling of GDPR related
concerns2. The modification in their policy was notified via a
banner on their landing page. In case a data-subject keeps
on using their service without modifying any settings then
it is considered as implicit consent which is discussed by
2https://www.linkedin.com/help/linkedin/topics/6701/6702
        <xref ref-type="bibr" rid="ref10">(Degeling et al. 2018)</xref>
        . We extracted the privacy setting of
each participant in our experiment. The collected data is
processed to create a suitable feature vector for training the FM
model using TensorFlow (Abadi et al. 2016). We tested the
accuracy of model by splitting the collected data into
training and testing and reported the results in Section 5.
3.1
      </p>
      <sec id="sec-3-1">
        <title>Factorization Machines (FM)</title>
        <p>Our data is described in the matrix format X 2 Rm n,
wherein, xi 2 Rn is the ith row that represents the
combination of a data-subject and a particular privacy setting with
additional attributes as binary indicator variables. The
response variable yi 2 R represents the consent value for ith
feature vector. Figure 2 shows the input matrix
representation used in this work.</p>
        <p>
          Why FM for Consent Recommendation? The
Equation 1 shows the traditional linear regression model, where,
w0 2 R and W 2 Rn are bias and weights for features
respectively. For any two given features we can
independently learn the weight parameters using the model of
Equation 1 with linear time complexity. However, this model is
not suitable for learning the pairwise interaction of features
as discussed in
          <xref ref-type="bibr" rid="ref29">(Rendle 2010; 2012)</xref>
          . A polynomial
regression model with order 2 can capture the parameters for
pairwise interaction, but, its time complexity is O(n2).
y^(x) := w0 +
n
X wixi
i=1
(1)
        </p>
        <p>
          In a consent recommendation system various factors
interact and influence each other and that is why we have
selected FM as our model. It solves the issue by factorizing the
W as a lower dimensional factor matrix. The model equation
from
          <xref ref-type="bibr" rid="ref30">(Rendle 2012)</xref>
          is given below:
y^(x) := w0 +
n n n
X wixi + X X
i=1
i=1 i0=i+1
        </p>
        <p>
          k
xixi0 X vi;j vi0;j (2)
j=1
In Equation 2, model parameters are w0 2 R; w 2 Rn and
V 2 Rn k. Further, vi and vi0 in V represents the ith and
(i0)th variables with k latent factors. The first part of the
above equation models the linear interaction, and, second
2
part shows the pairwise interaction of variables with low
rank(k) using their inner product. This effectively helps to
estimate the parameters in highly sparse dataset. The
Equation 2, is of order 2. We can have higher order variable
interactions as shown below
          <xref ref-type="bibr" rid="ref29">(Rendle 2010)</xref>
          :
        </p>
        <p>n
y^(x) = w0 + X</p>
        <p>wixi +
i=1
d n
X X
l=2 i1=1
n
X</p>
        <p>l
Y xij</p>
        <p>!
il=il 1+1 j=1
kl l
X</p>
        <p>Y vij;f</p>
        <p>(l)
f=1 j=1
Where, V(l) 2 Rn kl ; kl 2 N0+ and, 8l 2 f2; : : : ; dg, with
d as the order.</p>
        <p>Prediction of Consent: Given a feature vector x,
Equation 3 quantifies the consent. The recommendation can be
generated by thresholding the value of y^(x). Therefore, the
predicted consent Cp is defined as:</p>
        <p>Cp (x) =</p>
        <sec id="sec-3-1-1">
          <title>1; allow if y^(x) 0; deny if y^(x) &lt;</title>
          <p>4</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Methodology</title>
      <p>
        This section describes the steps involved in our data
collection procedure. We selected the participants with an active
LinkedIn account with last login activity not older than 15
days. We presented a consent form prior to survey that
explained to each participant about the collected data, its use in
our study, and the retention period of the data. Those
participants who gave consent for data collection and processing
were allowed to volunteer further. The data collected from
!
(3)
(4)
participants did not have any personally identifiable
information. The study consisted of three sections: a) an online
survey focused on understanding respondent’s basic
demographics, b) Internet User’s Information Privacy Concern
(IUIPC) survey
        <xref ref-type="bibr" rid="ref23">(Malhotra, Kim, and Agarwal 2004)</xref>
        , and c)
some additional questions to support our design, so as to
understand how active the participant is in social networking
platforms, especially, in this case LinkedIn (refer to Section
4.2).
      </p>
      <p>The participants were asked to provide us their privacy
settings information from LinkedIn. We processed the
settings information and related description for building binary
indicator feature vectors (xi 2 Rn, refer to Section 3.1). We
considered each section title as a purpose that comes
under three categories (privacy, advertisement and
communication) and 11 subcategories during our study. The purpose
information comprised of one or more control buttons
denoted as setting information (refer to Figure 3). Each type
of variables such as setting, purpose and its attributes were
encoded as one-hot vector.
4.1</p>
      <sec id="sec-4-1">
        <title>Additional Survey Questions</title>
        <p>Participants were asked to rate their comfort level with
services using and sharing their personal information on a
5-point Likert scale: Q1: I am comfortable with LinkedIn
use/share my personal information or activity data for any
purposes. Q2: I am comfortable with other social networks
(example, Facebook, Twitter, Google+) use/share my
personal information or activity data for any purposes</p>
        <p>To assess the change in a participant’s behavior, we asked
the question Q1 and Q2 as Q3 and Q4 respectively with the
following updated scenario:</p>
        <p>The enterprise explicitly says that for what purpose it is
25
t
n
uo20
c
15
10
5
0</p>
      </sec>
      <sec id="sec-4-2">
        <title>IUIPC score</title>
      </sec>
      <sec id="sec-4-3">
        <title>Range</title>
      </sec>
      <sec id="sec-4-4">
        <title>Mean</title>
        <sec id="sec-4-4-1">
          <title>Control</title>
          <p>Awareness
Collection
using the information and it’s privacy practice is
certified by a trusted organization.</p>
          <p>‘Q5’ and ‘Q6’ were formulated to understand participants
opinion on visibility of their personal data on LinkedIn and
other social networking sites. Q5: If you are disclosing your
personal information in LinkedIn, who can see your
personal information? Q6: If you are disclosing your personal
information in other social networks (example, Facebook,
Twitter, Google+), who can see your personal information?
4.2</p>
        </sec>
      </sec>
      <sec id="sec-4-5">
        <title>Survey Result Analysis</title>
        <p>Dataset Demographics. Sampled population from our
research lab consists of data-subjects with an active LinkedIn
account and an active user of at least one more social
networking service. The number of participants who gave their
consent for data collection experiment were 50. Out of these
50 participants 54% were Male and 46% were Female. 96%
of the participants were from age group 22-30 years. The
minimum educational qualification within the sample
population was under-graduate degree, whereas, the highest
qualification was Doctor of Philosophy (PhD). Also, 68%
of the participants were highly active (more than once in a
week) on LinkedIn’s social networking platform.</p>
        <p>
          Findings. In the entry level survey the participants scored
relatively well on IUIPC scale for control, awareness and
collection of personal information as reported in Table 1.
This indicates that participants have reasonably high level of
privacy concerns. From the survey we found that 20%
participants have modified their privacy settings only at the time
of registration, 42% modify once in a quarter, 30% once in a
year, and 8% never changed their setting and have given
implicit consent for their data use. Figure 4 shows the results
from our survey. It is apparent that the ‘Agree, Disagree and
Neutral’ count value changes from ‘Q1’ to ‘Q2’ and from
‘Q3’ to ‘Q4’. We used this insight and included purpose and
it’s attributes for building our prediction model. In Figure 4,
we can see that the most of the participants tend to make
their personal information visible to their social network.
However, some participants kept their information visible to
the public in LinkedIn but not on other social networking
sites. We conjecture that a participant could benefit by
disclosing the professional information as it helps them
building new professional connects, and hence, possibility of new
job opportunities. This finding is coherent with the
observation from Geffet et al
          <xref ref-type="bibr" rid="ref18 ref36">(Zhitomirsky-Geffet and Bratspiess
2016)</xref>
          . These insights suggest that the reputation of an
enterprise and the potential benefits to the data-subject could
influence consent decision.
        </p>
        <p>5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Experiment Analysis</title>
      <p>
        We surveyed 50 participants for LinkedIn with maximum of
174 privacy settings, 42 purposes, 4 purpose categories (3
values used here) and 11 purpose subcategories. Total we
had 5584 samples (m) with 281 features (n = 50 + 174 +
42+4+11), for m and n refer to Section 3.1. If a participant
gives her consent for a given data field and purpose then the
state of the control is considered as ‘1’, that is the control
is selected, otherwise it will be ‘0’. Further, we utilized the
TensorFlow implementation of FM algorithm (TFFM) with
ADAM optimizer
        <xref ref-type="bibr" rid="ref24">(Mikhail Trofimov 2016)</xref>
        . Learning rate
was kept as 0.001 and the threshold value ( ) was set as 0.5.
      </p>
      <p>In our experiment, we randomly divided all the
participants in 10 bins. We iterated over these 10 bins, using one
bin for testing purpose and the remaining 9 bins for
training our model. Finally, We averaged out the accuracy
obtained from the 10 iterations, shown in Table 2. The
sensitivity analysis of f1-score with respect to the rank is shown
in Figure 5. It can be observed that there is change in
accuracy with different degree of feature combination (order).
Further, the size of the dataset is limited which may lead to
the fluctuations in the line plot as rank increases. It would be
interesting to use some contextual information such as text
from purpose description to understand the meaning behind
latent factors (V 2 Rn k in Equation 2). The complexity of
different models is given in Table 3.</p>
      <p>Mean Square Error, Precision and Recall: We analyzed
the Mean Square Error (MSE), precision, recall and f1-score
with different order and rank combinations. The results are
shown in Table 2. Initially we considered all the purpose
attributes in our TFFM model. Further, we assessed the
impact of purpose attributes by removing each attribute one
by one. From experiments we figured that rank(k) 17 gives
better results in terms of accuracy. Moreover, we compared
TFFM results with Linear Support Vector Machine (SVM)
and polynomial SVM. Linear SVM showed marginal
improvement over TFFM model as linear models work better
with less amount of data. However, as explained in Section
3.1, TFFM can work as a consent recommendation system
given its linear complexity, scalability with larger datasets</p>
      <sec id="sec-5-1">
        <title>No Rank</title>
      </sec>
      <sec id="sec-5-2">
        <title>TFFM Order (d=3)</title>
        <p>Models</p>
        <sec id="sec-5-2-1">
          <title>Linear SVM SVM (kernel=‘poly’) TFFM (d=1) d=2</title>
          <p>
            and can accommodate different contextual factors. It can be
inferred from Table 2 that SVM with ‘poly’ kernel is
overfitting with the data. Also, in his work Steffen Rendle
            <xref ref-type="bibr" rid="ref29">(Rendle 2010)</xref>
            showed that SVM with ‘poly’ kernel fails with two
way interactions.
          </p>
          <p>Cold start vs warm start: The cold-start
recommendation scenario appears when there are no prior preferences for
users or items, whereas, warm-start arises when prior
preferences are available.</p>
          <p>
            FM model works with attributes or categories of input
data represented as binary indicators
            <xref ref-type="bibr" rid="ref30">(Rendle 2012)</xref>
            . The
flexibility of this model helps us to deal with cold-start
users/items even when we lack prior preferences. Here, the
purpose related attributes of input data are helpful for
predicting the new data-subject’s consent.
          </p>
          <p>6</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Discussion and Implication</title>
      <p>Contributions. Our work makes some useful contributions
in the context of information overload and resulting
consent fatigue due to multiple purposes for whom consent is
needed. We have shown that consent recommendation could
be modeled as a prediction problem. Our recommender
system has an accuracy of 87% for data-subjects with no prior
preferences or usage history. For warm-start data-subjects
the system is expected to perform even better. We also
identified certain factors which may heavily influence a
datasubject’s decision making process for consent. Furthermore,
the survey results showed that data-subjects are more
comfortable in sharing information with enterprises providing
professional services.</p>
      <p>
        Future Work. Informed consent from data-subject is
pivotal in data privacy regulations and safeguarding their
interests. However, privacy policies are complex, and even with
relevant educational qualification data-subjects find it
difficult to make proper choices. Therefore, there is a need for
personal digital assistant that can also help a data-subject in
making consent decisions. For future work we will refer to
        <xref ref-type="bibr" rid="ref19 ref25">(Liu et al. 2016; Naeini et al. 2017)</xref>
        as our baseline. As
consent is pivotal concept in most of the regulations, therefore,
we envision that it will be required even if the enterprise
were to process homomorphically encrypted data
        <xref ref-type="bibr" rid="ref15">(Gentry
and Boneh 2009)</xref>
        .
      </p>
      <p>
        Implicit consent for data collection, sharing and
processing is possible due to multiple reasons. Three main reasons
contributing to implicit consent are: a) consent fatigue, b)
data-subjects unawareness, and c) complex privacy policy
document. This may lead to a sense of false compliance and
security
        <xref ref-type="bibr" rid="ref10">(Degeling et al. 2018)</xref>
        . A potential area to explore
is to identify possible breach of compliance regulations due
to a data-subject’s implicit consent.
      </p>
      <p>In this work we built our recommender system by training
our model on data gathered from LinkedIn. In post GDPR
and CCPA era, all the service providers of varying type are
expected to comply with them. However, more than often
it is not feasible to gather sufficient data to build a model
for each one of them. To address this issue transfer learning
could be a possible area to look into. Assuming the consent
requests from the other service has the same flavour of
purposes and related attributes.</p>
      <p>Apart from European Union’s GDPR, many other
countries are looking into their own version of data privacy
laws and regulations. For example, Protection of Personal
Information Act, 2013 (POPI Act) of South Africa,
Personal Information Protection and Electronic Documents Act
(PIPEDA) from Canada, Singapore Personal Data
Protection Act, 2012, and Data Protection Act in India. In future
we would like to do a user study and analyze the effect of
their demographics on the decision making process.</p>
      <p>Limitations. Our findings are based on study of privacy
settings of a single web-application. This prediction model
developed for LinkedIn might not be suitable for a dating
site or a photograph sharing site. However, there is a
possibility of exploring the application of transfer learning and
checking the efficacy of our model on other applications.</p>
      <p>We could collect only limited number of participant’s
privacy settings. In order to obtain a more reliable confidence
metric, we will carry out experiments with more
participants. Also, in this work we have not quantified the degree
of fatigue. It will be interesting to see how it will affect the
recommendation model. A possible way to assess it is to
observe a data-subject’s interaction with the application.</p>
      <p>
        The information we obtained from the self reported
responses of the participants may suffer from ‘Privacy
Paradox’
        <xref ref-type="bibr" rid="ref26">(Norberg, Horne, and Horne 2007)</xref>
        . Even though most
of the participants were highly concerned about their
privacy, but, their actual behavior towards consent request may
change in real life. Further, we could not analyze whether the
participants are going to change the privacy settings later or
not.
      </p>
      <p>We conclude that a lot of factors can affect a data-subjects
consent depending on the purpose of processing data.
However, the unavailability of factors in the real world setting
challenged us in our experiments. For example, the time of
consent request, benefit to a data-subject in exchange for
consent, information about data field sensitivity and its
retention period should matter, but it was hard to extract this
information from the experimental setup.</p>
      <p>7</p>
    </sec>
    <sec id="sec-7">
      <title>Conclusion</title>
      <p>In this work, we explored the issues pertaining to
information overload and consent fatigue due to complex privacy
policies and new regulations requiring consent for various
purposes. We addressed this issue by implementing a
consent recommender system for LinkedIn. Furthermore, we
demonstrated that the recommendation problem could be
modeled as a prediction problem. Our analysis of survey
responses and LinkedIn data enabled us to identify some
important factors which can influence a data-subject’s decision
making process. We hope that our work will be useful in
identifying the issues pertaining to consent fatigue and build
interest for further research in this area.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          2016.
          <article-title>Tensorflow: a system for large-scale machine learning</article-title>
          .
          <source>In OSDI</source>
          , volume
          <volume>16</volume>
          ,
          <fpage>265</fpage>
          -
          <lpage>283</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Andrade</surname>
            ,
            <given-names>E. B.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Kaltcheva</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ; and
          <string-name>
            <surname>Weitz</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <year>2002</year>
          .
          <article-title>Selfdisclosure on the web: The impact of privacy policy, reward, and company reputation</article-title>
          .
          <source>ACR North American Advances.</source>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>Anthonysamy</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ; Greenwood,
          <string-name>
            <given-names>P.</given-names>
            ; and
            <surname>Rashid</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>2013</year>
          .
          <article-title>Social networking privacy: Understanding the disconnect from policy to controls</article-title>
          .
          <source>Computer</source>
          <volume>46</volume>
          (
          <issue>6</issue>
          ):
          <fpage>60</fpage>
          -
          <lpage>67</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>Balebako</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ; Jung,
          <string-name>
            <given-names>J.</given-names>
            ;
            <surname>Lu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            ;
            <surname>Cranor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. F.</given-names>
            ; and
            <surname>Nguyen</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          <year>2013</year>
          .
          <article-title>”little brothers watching you”: Raising awareness of data leaks on smartphones</article-title>
          .
          <source>In Proceedings of the Ninth Symposium on Usable Privacy and Security</source>
          , SOUPS '
          <volume>13</volume>
          ,
          <issue>12</issue>
          :
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          :
          <fpage>11</fpage>
          . New York, NY, USA: ACM.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>Barnard-Wills</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Chulvi</surname>
            ,
            <given-names>C. P.</given-names>
          </string-name>
          ; and
          <string-name>
            <surname>De Hert</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <year>2016</year>
          .
          <article-title>Data protection authority perspectives on the impact of data protection reform on cooperation in the eu</article-title>
          .
          <source>Computer Law &amp; Security Review</source>
          <volume>32</volume>
          (
          <issue>4</issue>
          ):
          <fpage>587</fpage>
          -
          <lpage>598</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>Casteren</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <year>v</year>
          .
          <year>2017</year>
          .
          <article-title>Consent now and then</article-title>
          .
          <source>Ph.D. Dissertation</source>
          , Queensland University of Technology.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>Cranor</surname>
            ,
            <given-names>L. F.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Idouchi</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Leon</surname>
            ,
            <given-names>P. G.</given-names>
          </string-name>
          ; Sleeper,
          <string-name>
            <given-names>M.</given-names>
            ; and
            <surname>Ur</surname>
          </string-name>
          ,
          <string-name>
            <surname>B.</surname>
          </string-name>
          <year>2013</year>
          .
          <article-title>Are they actually any different? comparing thousands of financial institutions privacy practices</article-title>
          .
          <source>In Proc.</source>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>WEIS</surname>
          </string-name>
          , volume
          <volume>13</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>de la Torre</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <year>2018</year>
          .
          <article-title>A guide to the california consumer privacy act of 2018</article-title>
          . Available at SSRN.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>Degeling</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Utz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Lentzsch</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Hosseini</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Schaub</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ; and Holz,
          <string-name>
            <surname>T.</surname>
          </string-name>
          <year>2018</year>
          .
          <article-title>We value your privacy... now take some cookies: Measuring the gdpr's impact on web privacy.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          arXiv preprint arXiv:
          <year>1808</year>
          .05096.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <surname>Dwyer</surname>
            <given-names>III</given-names>
          </string-name>
          , S. J.;
          <string-name>
            <surname>Weaver</surname>
            ,
            <given-names>A. C.</given-names>
          </string-name>
          ; and
          <string-name>
            <surname>Hughes</surname>
            ,
            <given-names>K. K.</given-names>
          </string-name>
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <article-title>Health insurance portability and accountability act</article-title>
          .
          <source>Security Issues in the Digital Medical Enterprise</source>
          <volume>72</volume>
          (
          <issue>2</issue>
          ):
          <fpage>9</fpage>
          -
          <lpage>18</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <surname>Flavia´n</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          , and Guinal´ıu,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <year>2006</year>
          .
          <article-title>Consumer trust, perceived security and privacy policy: three basic elements of loyalty to a web site</article-title>
          .
          <source>Industrial Management &amp; Data Systems</source>
          <volume>106</volume>
          (
          <issue>5</issue>
          ):
          <fpage>601</fpage>
          -
          <lpage>620</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <surname>Gentry</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Boneh</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <year>2009</year>
          .
          <article-title>A fully homomorphic encryption scheme</article-title>
          , volume
          <volume>20</volume>
          . Stanford University Stanford.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <surname>Ghazinour</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Matwin</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ; and Sokolova,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <year>2016</year>
          .
          <article-title>Yourprivacyprotector, a recommender system for privacy settings in social networks</article-title>
          .
          <source>arXiv preprint arXiv:1602</source>
          .
          <year>01937</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <surname>Knijnenburg</surname>
            ,
            <given-names>B. P.</given-names>
          </string-name>
          <year>2014</year>
          .
          <article-title>Information disclosure profiles for segmentation and recommendation</article-title>
          .
          <source>In SOUPS2014 Workshop on Privacy Personas and Segmentation.</source>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <year>2016</year>
          .
          <article-title>Privacy policies and their lack of clear disclosure regarding the life cycle of user information</article-title>
          .
          <source>In 2016 AAAI Fall Symposium Series.</source>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Andersen</surname>
            ,
            <given-names>M. S.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Schaub</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Almuhimedi</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ; Zhang,
          <string-name>
            <given-names>S. A.</given-names>
            ;
            <surname>Sadeh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ;
            <surname>Agarwal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ; and
            <surname>Acquisti</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <article-title>Follow my recommendations: A personalized privacy assistant for mobile app permissions</article-title>
          .
          <source>In Twelfth Symposium on Usable Privacy and Security (SOUPS</source>
          <year>2016</year>
          ),
          <fpage>27</fpage>
          -
          <lpage>41</lpage>
          . Denver, CO: USENIX Association.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Lin</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ; and
          <string-name>
            <surname>Sadeh</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <year>2014</year>
          .
          <article-title>Reconciling mobile app privacy and usability on smartphones: Could user privacy profiles help</article-title>
          ?
          <source>In Proceedings of the 23rd International Conference on World Wide Web, WWW '14</source>
          ,
          <fpage>201</fpage>
          -
          <lpage>212</lpage>
          . New York, NY, USA: ACM.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <surname>Madden</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <year>2012</year>
          .
          <article-title>Privacy management on social media sites</article-title>
          .
          <source>Pew Internet Report 1-20.</source>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <string-name>
            <surname>Malhotra</surname>
            ,
            <given-names>N. K.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>S. S.</given-names>
          </string-name>
          ; and
          <string-name>
            <surname>Agarwal</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <year>2004</year>
          .
          <article-title>Internet users' information privacy concerns (iuipc): The construct, the scale, and a causal model</article-title>
          .
          <source>Information systems research 15</source>
          <volume>(4)</volume>
          :
          <fpage>336</fpage>
          -
          <lpage>355</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <given-names>Mikhail</given-names>
            <surname>Trofimov</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. N.</surname>
          </string-name>
          <year>2016</year>
          .
          <article-title>tffm: Tensorflow implementation of an arbitrary order factorization machine</article-title>
          . https: //github.com/geffy/tffm.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <string-name>
            <surname>Naeini</surname>
            ,
            <given-names>P. E.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Bhagavatula</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ; Habib,
          <string-name>
            <surname>H.</surname>
          </string-name>
          ; Degeling,
          <string-name>
            <given-names>M.</given-names>
            ;
            <surname>Bauer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            ;
            <surname>Cranor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            ; and
            <surname>Sadeh</surname>
          </string-name>
          ,
          <string-name>
            <surname>N.</surname>
          </string-name>
          <year>2017</year>
          .
          <article-title>Privacy expectations and preferences in an iot world</article-title>
          .
          <source>In Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS).</source>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <string-name>
            <surname>Norberg</surname>
            ,
            <given-names>P. A.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Horne</surname>
            ,
            <given-names>D. R.</given-names>
          </string-name>
          ; and
          <string-name>
            <surname>Horne</surname>
            ,
            <given-names>D. A.</given-names>
          </string-name>
          <year>2007</year>
          .
          <article-title>The privacy paradox: Personal information disclosure intentions versus behaviors</article-title>
          .
          <source>Journal of Consumer Affairs</source>
          <volume>41</volume>
          (
          <issue>1</issue>
          ):
          <fpage>100</fpage>
          -
          <lpage>126</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <string-name>
            <surname>Olejnik</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Dacosta</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ; Machado,
          <string-name>
            <given-names>J. S.</given-names>
            ;
            <surname>Huguenin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            ;
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. E.</given-names>
            ; and
            <surname>Hubaux</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.</surname>
          </string-name>
          <year>2017</year>
          .
          <article-title>Smarper: Context-aware and automatic runtime-permissions for mobile devices</article-title>
          .
          <source>In 2017 IEEE Symposium on Security and Privacy</source>
          ,
          <string-name>
            <surname>SP</surname>
          </string-name>
          <year>2017</year>
          , San Jose, CA, USA, May
          <volume>22</volume>
          -26,
          <year>2017</year>
          ,
          <fpage>1058</fpage>
          -
          <lpage>1076</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <string-name>
            <surname>Ploug</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Holm</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <year>2013</year>
          .
          <article-title>Informed consent and routinisation</article-title>
          .
          <source>Journal of Medical Ethics</source>
          <volume>39</volume>
          (
          <issue>4</issue>
          ):
          <fpage>214</fpage>
          -
          <lpage>218</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <string-name>
            <surname>Rendle</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <year>2010</year>
          .
          <article-title>Factorization machines</article-title>
          .
          <source>In Data Mining (ICDM)</source>
          ,
          <year>2010</year>
          IEEE 10th International Conference on,
          <fpage>995</fpage>
          -
          <lpage>1000</lpage>
          . IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          <string-name>
            <surname>Rendle</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <year>2012</year>
          .
          <article-title>Factorization machines with libfm</article-title>
          .
          <source>ACM Transactions on Intelligent Systems and Technology (TIST) 3</source>
          (
          <issue>3</issue>
          ):
          <fpage>57</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          <string-name>
            <surname>Sadeh</surname>
            ,
            <given-names>J. L. B. L. N.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Hong</surname>
            ,
            <given-names>J. I.</given-names>
          </string-name>
          <year>2014</year>
          .
          <article-title>Modeling users mobile app privacy preferences: Restoring usability in a sea of permission settings</article-title>
          .
          <source>In Symposium on Usable Privacy and Security (SOUPS)</source>
          .
          <source>Citeseer.</source>
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          <string-name>
            <surname>Sadeh</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Hong</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Cranor</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Fette</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ; Kelley,
          <string-name>
            <given-names>P.</given-names>
            ;
            <surname>Prabaker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ; and
            <surname>Rao</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.</surname>
          </string-name>
          <year>2009</year>
          .
          <article-title>Understanding and capturing peoples privacy policies in a mobile social networking application</article-title>
          .
          <source>Personal and Ubiquitous Computing</source>
          <volume>13</volume>
          (
          <issue>6</issue>
          ):
          <fpage>401</fpage>
          -
          <lpage>412</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          <string-name>
            <surname>Solove</surname>
            ,
            <given-names>D. J.</given-names>
          </string-name>
          <year>2012</year>
          .
          <article-title>Introduction: Privacy self-management and the consent dilemma</article-title>
          . Harv. L. Rev.
          <volume>126</volume>
          :
          <year>1880</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          <string-name>
            <surname>Voigt</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , and Von dem Bussche,
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>2017</year>
          .
          <article-title>The EU General Data Protection Regulation (GDPR)</article-title>
          , volume
          <volume>18</volume>
          . Springer.
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          <string-name>
            <surname>Wijesekera</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Baokar</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Tsai</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Reardon</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ; Egelman,
          <string-name>
            <given-names>S.</given-names>
            ;
            <surname>Wagner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ; and
            <surname>Beznosov</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.</surname>
          </string-name>
          <year>2017</year>
          .
          <article-title>The feasibility of dynamically granted permissions: Aligning mobile privacy with user preferences</article-title>
          .
          <source>In Security and Privacy (SP)</source>
          ,
          <source>2017 IEEE Symposium on</source>
          ,
          <fpage>1077</fpage>
          -
          <lpage>1093</lpage>
          . IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          <string-name>
            <surname>Zhitomirsky-Geffet</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Bratspiess</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <year>2016</year>
          .
          <article-title>Professional information disclosure on social networks: The case of facebook and linked in in israel</article-title>
          .
          <source>Journal of the Association for Information Science and Technology</source>
          <volume>67</volume>
          (
          <issue>3</issue>
          ):
          <fpage>493</fpage>
          -
          <lpage>504</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>