<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Towards a Framework for Harm Prevention in Web Search</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Steven Zimmerman</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stefan M. Herzog</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>David Elsweiler</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jon Chamberlain</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Udo Kruschwitz</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Center for Adaptive Rationality Max Planck Institute for Human Development</institution>
          ,
          <addr-line>Berlin</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Universität Regensburg</institution>
          ,
          <addr-line>Regensburg</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Essex</institution>
          ,
          <addr-line>Colchester</addr-line>
          ,
          <country country="UK">United Kingdom</country>
        </aff>
      </contrib-group>
      <fpage>30</fpage>
      <lpage>46</lpage>
      <abstract>
        <p>We introduce a framework aimed at the information science (IS), information retrieval (IR) and data science communities as well as behavioral and cognitive scientists and policy makers inside government and at corporations operating Web search platforms. The goal of this framework is to instigate collaborative discussion and research across these communities to address potential dangers searchers and society face in modern Web search. We provide an overview of the harms, such as poor health outcomes, and their possible causes, including searcher and system biases being tuned for maximum profit. Modifications to policy, additional evaluation metrics, a mixture of cognitive decision making tools and improvements to the IR system are the suggested pathways. Examples are provided of how the framework can be put into practice.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Research and theory developed in information science (IS) has inspired many
of the algorithms, models and interfaces developed and implemented in modern
information retrieval (IR) systems [
        <xref ref-type="bibr" rid="ref78">78</xref>
        ]. Even with this influential link between
the communities, quite recent commentary [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] suggests there is a gap in research
between the two areas and a need for a holistic view of the searcher (the IS
focus) and the search system (the IR focus) as one system together [
        <xref ref-type="bibr" rid="ref36 ref37">36, 37</xref>
        ].
In fact, Ingwersen and Järvelin [
        <xref ref-type="bibr" rid="ref37">37</xref>
        ] suggest this view must go beyond just the
system and the searcher. Data science, a profession deemed “the sexiest job"
[
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], also has agency in the modern Web search environment. The data science
community has quite an influential role in modern Web search environments,
as members of this community are often tasked with development of models
that are optimized to maximize user satisfaction [
        <xref ref-type="bibr" rid="ref78">78</xref>
        ], revenue and profits [
        <xref ref-type="bibr" rid="ref19 ref88">19,
88</xref>
        ] and user engagement [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. Finally, there is the community of searchers that
seek and find information on the Web through a multitude of IR environments
such as search engines (e.g. Google), product websites (e.g. Amazon) and social
media news feeds (e.g. Facebook) that have their own biases and beliefs [
        <xref ref-type="bibr" rid="ref7 ref77">7, 77</xref>
        ].
Unfortunately, the biases and beliefs of the searcher and the IR systems they
interact with form a feedback loop that not only changes the system [
        <xref ref-type="bibr" rid="ref7 ref73 ref8">7, 8, 73</xref>
        ]
but also changes the beliefs of the user [
        <xref ref-type="bibr" rid="ref7 ref73 ref77">7, 73, 77</xref>
        ]. Ultimately, this self-reinforcing
cycle exposes individual searchers and broader society to potentially harmful and
dangerous outcomes [
        <xref ref-type="bibr" rid="ref55 ref7 ref73 ref77">7, 55, 73, 77</xref>
        ]. It is our view that the potential and
alreadyrealized harms caused by this reinforcing cycle are a side effect of the non-holistic
view, a view which must extend beyond the searcher and the system [
        <xref ref-type="bibr" rid="ref37">37</xref>
        ], and
thus motivates our framework for harm prevention in Web search.
      </p>
      <p>
        Our framework is aimed at communities which include researchers in IS,
IR, data science and the behavioral and cognitive sciences as well as the
policy makers in governments and the leadership teams of Web platforms. There
is common recognition by these communities of the ethical concerns and
potentially grave implications of the technology that are now ubiquitous in our
everyday lives. Simultaneously, aside from efforts by IS and IR [
        <xref ref-type="bibr" rid="ref11 ref17 ref37">11, 17, 37</xref>
        ], these
communities appear to be working independently of one another. As such, we
see a need for a common framework for all of these communities to jointly work
towards a common goal of ethical responsibility to the searcher and broader
society for which we are a part of. The components of the framework (Section 3)
are ones we believe are the most essential for these communities to place focus
initially. Components include policy updates, cognitive interventions, evaluation
methods, and considerations for overall search system design. Central to our
framework are four themes: collaborative effort by the communities mentioned,
greater transparency to the user, greater choice for the user and an ethics-based
approach for search system development.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Background</title>
      <p>
        Why develop a framework? A number of researchers in the IR, IS and data
science communities have expressed ethical concerns and potential for harmful
ramifications due to the information that is collected and provided by the
current Web search environments we deploy [
        <xref ref-type="bibr" rid="ref22 ref35 ref67 ref7 ref77 ref78">7, 22, 35, 67, 77, 78</xref>
        ]. In parallel, some
researchers in our community have proposed and demonstrated methods that
address some of these matters (see [
        <xref ref-type="bibr" rid="ref10 ref23 ref27 ref34 ref64 ref67 ref87">10, 23, 27, 34, 64, 67, 87</xref>
        ]). The behavioral and
cognitive sciences community has voiced similar concerns [
        <xref ref-type="bibr" rid="ref41 ref43 ref45">41, 43, 45</xref>
        ] and offered
possible solutions [
        <xref ref-type="bibr" rid="ref41 ref42 ref43 ref45">41–43, 45</xref>
        ] in line with the IR and IS communities. Yet, even
though leadership of many popular Web platforms (where search for
information commonly occurs) publicly express their concerns about these same matters,
there are very few instances where they set policies for their platforms to align
with recommendations of researchers and policy makers4 and the more common
response is to take no action5 until required by law to do so6.
      </p>
      <p>
        What are the harms? A broad spectrum of harms have occurred or have the
potential to occur. Dangerous and potentially deadly health outcomes [
        <xref ref-type="bibr" rid="ref55 ref77">77, 55</xref>
        ],
as well as destabilized political systems [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] have occurred. Excessive interaction
(e.g. internet addiction) with information in social media environments is shown
to have small but negative impacts to adolescents [
        <xref ref-type="bibr" rid="ref53">53</xref>
        ]7. State-sponsored
surveillance that monitors searcher behavior is sometimes used to harm individuals
[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Other individuals interacting with IR systems have the potential of being
radicalized and motivated to join extremist communities known to cause harm
to others [
        <xref ref-type="bibr" rid="ref73">73</xref>
        ]. Users can receive dangerous advertisements based on their beliefs
[
        <xref ref-type="bibr" rid="ref62">62</xref>
        ]. Indeed the harms can become quite dystopian [
        <xref ref-type="bibr" rid="ref74">74</xref>
        ] and these serve as the
primary motivation for our proposal that aims to prevent individual and societal
harms due to Web search.
      </p>
      <p>
        What are the causes? The harms have many underlying causes, but we
emphasize key factors. First, corporate (IR) platform policy can encourage data
scientists to create addictive systems [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] and environments that are non-transparent
to searchers8 [
        <xref ref-type="bibr" rid="ref41 ref45">41, 45</xref>
        ]. There are of course the previously mentioned biases
existent in both the system [
        <xref ref-type="bibr" rid="ref7 ref77">7, 77</xref>
        ] and the user [
        <xref ref-type="bibr" rid="ref38 ref51 ref77">38, 51, 77</xref>
        ], and the reinforcement
factor [
        <xref ref-type="bibr" rid="ref7 ref73 ref8">7, 8, 73</xref>
        ]. Information itself is a factor. This comes in two forms, the
information found (e.g. search results, Web pages, videos, social media post) and the
information collected about the searcher (e.g. queries, IP address, usernames) –
both of which offer many benefits to searchers such as exposure to more relevant
information and faster task completion [
        <xref ref-type="bibr" rid="ref78">78</xref>
        ], but simultaneously may contain
harmful content [
        <xref ref-type="bibr" rid="ref77">77</xref>
        ] and cost them their privacy [
        <xref ref-type="bibr" rid="ref39 ref78">39, 78</xref>
        ]. The centralized nature
of search environments [
        <xref ref-type="bibr" rid="ref82 ref83">82, 83</xref>
        ], which are now commonplace, were built upon
IS models of search developed and tested in quite different environments, such
as the library [
        <xref ref-type="bibr" rid="ref78 ref83">78, 83</xref>
        ], and is another factor likely playing into concerns around
privacy. The motive of profit [
        <xref ref-type="bibr" rid="ref88">88</xref>
        ] certainly encourages searchers to view
information they might not otherwise do [
        <xref ref-type="bibr" rid="ref74">74</xref>
        ]. Moreover, the metrics used to evaluate
systems (a focus of data scientists and IR researchers [
        <xref ref-type="bibr" rid="ref80">80</xref>
        ]) are quite different
to those suggested by IS researchers (e.g. [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]). This issue of the communities
(e.g. IR, data science and cognitive science) operating independently, rather than
collectively towards a shared goal, is also a possible cause that should not be
overlooked. The field of research known as interactive information retrieval (IIR)
4 Exceptions include: Twitter now includes credibility assessments of claims for some
      </p>
      <p>
        Tweets [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]; Facebook moderates news feeds for hate speech [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
5 For example, nearly a decade has passed since [
        <xref ref-type="bibr" rid="ref34 ref64">34, 64</xref>
        ] suggested approaches to enable
searchers a pathway for better assessments credibility, but to our knowledge, no
commercial search engine has implemented these methods.
6 In 2018 both the General Data Protection Regulation (GDPR) (to better protect
privacy) [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] and NetzDG (to reduce racism and extremism) [
        <xref ref-type="bibr" rid="ref63">63</xref>
        ] forced major
platforms to update their policies and practices or face stiff penalties.
7 This study argues for better evaluation measures, which we discuss in Section 3.4
8 For example, to understand privacy impacts, searchers must read lengthy privacy
policy statements, written in an obfuscated manner.
aims for a collective and interdisciplinary view of the search process [
        <xref ref-type="bibr" rid="ref36 ref37">36, 37</xref>
        ] and
it is through the IIR lens that the framework was developed and now introduced.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Framework Components</title>
      <p>
        A recent proposal by Smith and Young Rieh [
        <xref ref-type="bibr" rid="ref67">67</xref>
        ] provides important insights
for the development of a framework for Web search systems designed to prevent
harms to individuals and society. Their proposal suggests that many users have
information literacy and critical thinking skills that are useful to reduce the
risks of harms from Web search. They highlight that current implementation
methods of search systems, such as the Search Engine Results Page (SERP),
offer little if any support to utilize these skills. Furthermore, they point out
that users (likely due to the high cognitive demands of applying information
literacy skills) put too much trust in the results found in the SERP, as has
been demonstrated by other research [
        <xref ref-type="bibr" rid="ref38 ref77">38, 77</xref>
        ]. It appears some vitally important
processes of search introduced by the IS community are being inhibited by the
current design [
        <xref ref-type="bibr" rid="ref67">67</xref>
        ], processes including sense-making and exploratory search,
which is unfortunate given the role they play in learning [
        <xref ref-type="bibr" rid="ref78">78</xref>
        ]. Their proposal
also suggests that current IR systems are optimized for close-ended tasks (e.g.
fact-based, question-answering), but should instead be optimized for learning.
Ultimately, their proposal being that information in Web search interfaces should
offer cues (e.g. topic, author and their affiliations, affective semantics including
hate and humor) that enable users to utilize their literacy skills and assist them
with critical thinking. However, their framework, as encompassing as it is, does
not consider important matters such as privacy of the searcher [
        <xref ref-type="bibr" rid="ref39">39</xref>
        ] and platform
policies optimized for corporate profit [
        <xref ref-type="bibr" rid="ref80 ref88">80, 88</xref>
        ]. That said, many elements of their
proposal, such as considerations for interface design and informational cues that
engage critical thinking for better decision making, are central to our proposal.
We therefore see our work as an extension of their work. The decision-making
factor is in fact fundamental to search [
        <xref ref-type="bibr" rid="ref60 ref78">60, 78</xref>
        ], suggesting a strong need for
cognitive interventions, which are proposed as a bridge between many of the
other framework components.
      </p>
      <p>The proposed framework is segmented into four main areas which are seen as
core to the development of search environments to reduce risk of harm to both
the searcher and society. (1) Policy, which includes methods of law, education
and corporate policy, are suggested. (2) A set of cognitive approaches,
developed for the specific purpose of engaging decision making that reduces risk to
individuals and society are introduced. (3) Considerations for the system design
are provided, for which content enrichment and interface design are the main
focus. (4) Any framework, and any approach for that matter, needs to be
evaluated, for which suggestions are also given. The considerations provided are not
exhaustive, and are intended as a foundation for a way forward.</p>
      <sec id="sec-3-1">
        <title>3.1 Policy</title>
        <p>
          Policy is a broad topic, which encompasses relevant areas such as law and
education and can be used as a mechanism to prevent harm in Web search. Policies
set by the Web search systems are used as a means to leverage their commercial,
legal and overall organizational interests. For instance, explicit privacy policies
and data usage policies may be tailored to protect the provider from legal
ramifications (e.g. the GDPR), while simultaneously maximizing their commercial
profits [
          <xref ref-type="bibr" rid="ref88">88</xref>
          ]. Alternatively, a provider may shift their policy to meet social norms
and address public outcry from issues such as misinformation [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. There are
also policy decisions around design choices for the core product that searchers
interact with, such as how to present information in a SERP, search support
tools to include in the product (e.g. query suggestion), and underlying retrieval
and ranking models to implement. Clearly, web search platforms should keep
harm prevention central to their design policy.
        </p>
        <p>
          Laws can be implemented, locally, nationally, within economic regions and
globally, with examples including California, Canada, European Union and
human rights law respectively. For Web searchers, the GDPR [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ], a law which
is designed to better protect their privacy and allow for greater transparency
and control over how data collected about them is used, is perhaps the most
well known law for harm prevention to date. Laws may also be used to enforce
information providers (e.g. social media and search platforms) to take down and
/ or filter out content that is perceived by law makers to be harmful to
individuals and or societies. Examples include the NetzDG Germany [
          <xref ref-type="bibr" rid="ref63">63</xref>
          ] that require
removal of speech that is hateful (e.g. Nazi imagery) and censoring of Google
search results (e.g. websites mentioning the Tiananmen Square massacre) by the
Chinese government [
          <xref ref-type="bibr" rid="ref72">72</xref>
          ]. Some laws, such as the communications and decency
act in the USA [
          <xref ref-type="bibr" rid="ref75">75</xref>
          ], place the onus of legal liability on the publisher of the
content (e.g. author of news article), but not the provider (e.g. search engine) or
user (e.g. searcher). Legal tools achieve harm prevention through penalty (e.g.
fines, imprisonment) for non-adherence to the rules stated by law, they also have
a sense of authoritarianism and dictating what is good or bad. As differentiating
between good and bad can be problematic [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ], we suggest that law be used as a
tool of last resort. Nonetheless, ethical considerations are a critical factor to IIR
systems and research and therefore must be taken into account [
          <xref ref-type="bibr" rid="ref40 ref78">40, 78</xref>
          ]. As part
of the framework, basic universal human rights [
          <xref ref-type="bibr" rid="ref69 ref70 ref71">69–71</xref>
          ] are the recommended
lens through which policy is set.
        </p>
        <p>
          Finally, education approaches and campaigns are a suggested pathway to
improve search capabilities that minimize personal harm. There are some efforts
by platforms to provide education tools and programs in primary and secondary
schooling (see [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ]) as well as being broadcast to searchers of any age (see [
          <xref ref-type="bibr" rid="ref30 ref59">30,
59</xref>
          ]). However, a searcher is not provided such tools directly in the search engines
(i.e. there is no link provided)9. In our view, education is a promising pathway, as
it overlaps with the cognitive interventions discussed in the section that follows.
9 Query recommendations and spelling corrections may be educational if it can be
shown that the user improves their query behavior or their spelling over time.
3.2
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Behavioral and Cognitive Interventions</title>
        <p>
          Decision making is fundamental to the search process [
          <xref ref-type="bibr" rid="ref60 ref78">60, 78</xref>
          ]. Therefore it is
worthwhile to consider strategies from behavioral and cognitive sciences that are
developed specifically for minimizing risk and harms. Three approaches,
nudging [
          <xref ref-type="bibr" rid="ref56 ref68">56, 68</xref>
          ], boosting [
          <xref ref-type="bibr" rid="ref33 ref41">33, 41</xref>
          ] and techno-cognition [
          <xref ref-type="bibr" rid="ref43">43</xref>
          ], were recently proposed
pathways to minimize and address harms in the modern online world [
          <xref ref-type="bibr" rid="ref41 ref45">41, 45</xref>
          ].
We focus on the first two approaches, nudging and boosting, as they are quite
different in their methodology, yet very similar in their aim of reducing
individual and societal risks. Additionally, we introduce nutrition labels and fact boxes
as means to communicate potential harms.
        </p>
        <p>
          Nudging [
          <xref ref-type="bibr" rid="ref68">68</xref>
          ] is a popular behavioral-public-policy approach, which has gained
notoriety in recent years. Nudges aim to push people towards—what the ‘nudger’
believes to be—more beneficial decisions through the ‘choice architecture’ of
people’s environment (e.g., default settings). Thaler and Sunstein [
          <xref ref-type="bibr" rid="ref68">68</xref>
          ] provide
the following definition of a nudge:
        </p>
        <p>A nudge . . . is any aspect of the choice architecture that alters people’s
behavior in a predictable way without forbidding any options or
significantly changing their economic incentives. To count as a mere nudge, the
intervention must be easy and cheap to avoid. Nudges are not mandates.
Putting fruit at eye level counts as a nudge. Banning junk food does not.</p>
        <p>
          Nudging requires that the ‘choice architecture’ includes an element of
libertarian paternalism [
          <xref ref-type="bibr" rid="ref68">68</xref>
          ], that is, the nudge must allow the individual to opt out
(e.g., choose the non-default option); this is different from a purely paternalistic
approach such as bans, which have no opt-out mechanism by design and intent.
Some nudges, such as nutrition labels and warning lights, have educational
elements [
          <xref ref-type="bibr" rid="ref41 ref86">41, 86</xref>
          ], but for the most part, nudges aim to directly change behavior
without targeting people’s competences [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ]. The political philosophy and claims
about human nature underlying nudging have been criticized recently [
          <xref ref-type="bibr" rid="ref28 ref52">52, 28</xref>
          ];
see, for example, [
          <xref ref-type="bibr" rid="ref56">56</xref>
          ] for a review of the issues discussed. Self-nudging [
          <xref ref-type="bibr" rid="ref56">56</xref>
          ] –
people acting as their own “citizen choice architects” – has been proposed as a
way to harness the power of nudging while largely circumventing its problems.
Boosting [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ] is another approach to behavior change based on evidence from
behavioral science. Quoting Hertwig and Grüne-Yanoff (p. 974):
The objective of boosts is to improve people’s competence to make their
own choices. The focus of boosting is on interventions that make it easier
for people to exercise their own agency by fostering existing competences
or instilling new ones. Examples include the ability to understand
statistical health information, the ability to make financial decisions on the
basis of simple accounting rules, and the strategic use of automatic
processes (...)
        </p>
        <p>
          In the context of web search, boosting aims to improve people’s skills to
effectively and safely search the web. To achieve this, a boosting approach combines
both IR research on how people search and adapt their search strategies to the
environment [
          <xref ref-type="bibr" rid="ref34 ref42 ref66">34, 42, 66</xref>
          ] with general insights on human judgment decision
making online [
          <xref ref-type="bibr" rid="ref41 ref45">41, 45</xref>
          ] and offline [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ] to design and evaluate boosting interventions.
        </p>
        <p>
          The key difference between a boosting and nudging approach lies in the
former’s assumption that people are not simply “irrational” (and thus need to be
nudged towards better decisions), but that the human cognitive architecture
is malleable and thus new competencies and skills can be instilled [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ]—often
requiring little time and effort. However, whether nudging or boosting is the
“better” approach for a particular situation depends both on ethical considerations
(e.g., how much value is placed on people’s autonomy), but also on pragmatic
considerations of which approach will likely be more successful in terms of
effectiveness and economic and non-economic costs. For example, since boosting
needs people’s cooperation to be effective, boosting has the advantage that it—by
design—cannot be manipulative. But this cooperation requirement also implies
that boosting will not be successful in situations were people are unwilling or
unable to learn or make use of a boost. See [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ] for a discussion and some rules
of thumb for when nudging or boosting is likely to work better.
        </p>
        <p>
          Nutrition Labels and Fact Boxes Cognitive science has also provided a
large body of evidence on visual approaches for communication of risk in an
understandable way. Nutrition labels are one popular visual approach for risk
communication, and it is shown that traffic light type approaches produce
better outcomes and are more preferred by users [
          <xref ref-type="bibr" rid="ref48 ref65 ref76">48, 65, 76</xref>
          ] than tabular based
approaches10. Originally designed for medical decision making for doctors and
patients, fact boxes are another promising means to provide information in a
manner that includes the benefits and harms of the available decisions [
          <xref ref-type="bibr" rid="ref49">49</xref>
          ]11.
Interestingly, both nutrition labels and fact boxes can act as the medium to
perform a nudge or a boost.
3.3
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>Search System Design</title>
        <p>
          Many components are necessary to build a fully functional search engine [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] and
it is clear that the underlying systems have a tendency to become biased and steer
users towards harmful information [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. Here, we focus on content enrichment and
the search interface and provide limited discussion on other components, such
as log analysis and retrieval models hinting at where they might play a role
within the framework. Based on commonly used implementation methods, such
as those leveraging query logs as a primary means to model searchers and provide
10 Such as those produced by the Food and Drug Administration
https://www.fda.gov/food/nutrition-education-resources-materials/new-nutritionfacts-label
11 See examples of fact boxes at the Harding Institute for Risk Literacy
https://hardingcenter.de/en/fact-boxes
support tools (e.g. query recommendations, collaborative search models) [
          <xref ref-type="bibr" rid="ref18 ref78">18, 78</xref>
          ],
it is conceivable that many of the system biases currently present [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] would abate
over time due to the logging of interactions of a subset of users that make use of
system elements discussed in sections below. That is, users that take the effort
to minimize personal harm could in fact provide benefit to all users.
        </p>
      </sec>
      <sec id="sec-3-4">
        <title>Content Enrichment with Informational Cues Processes that enrich and</title>
        <p>
          classify information in Web documents are fundamental to modern search
engines and IR systems [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. As previous research indicates, there are many
different cues to consider [
          <xref ref-type="bibr" rid="ref27 ref42 ref67">27, 42, 67</xref>
          ] during this enrichment process to be applied to
information that may be useful for minimizing risk to searchers, for which many
are important factors for making better decisions in search [
          <xref ref-type="bibr" rid="ref34 ref42 ref66">34, 42, 66</xref>
          ].
        </p>
        <p>
          For IR researchers and data scientists, the listing of cues provided by Smith
and Rieh (see [
          <xref ref-type="bibr" rid="ref67">67</xref>
          ]) as well as methods outlined by Fuhr et al (see [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ]) are useful
guides for development of cue extraction methods. Methods are already available
for extracting cues such as the reading level, the virality of the content (i.e. how
likely will the information spread), emotionality (e.g. language that is angry,
overly positive, etc.), prevalence of factual, opinionated and / or controversial
information, trustworthiness of the source (e.g. mechanisms to determine the
credibility of a Web page), technicality (e.g. a score for amount of technical
jargon in document) and if the document is currently topically relevant [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ].
        </p>
        <p>
          Bibliographic cues (e.g. author affiliation) and inferential cues (e.g. citations
to and from document) are also needed for critical thinking and evaluation of
information [
          <xref ref-type="bibr" rid="ref67">67</xref>
          ]. A lack of transparency exists in affiliations of authors and
publishers of information [
          <xref ref-type="bibr" rid="ref67">67</xref>
          ], and therefore there is a clear need for developing
methods that evaluate affiliation(s) of authors and publishers of information (e.g.
who is funding think tank X that publishes web page Y) [
          <xref ref-type="bibr" rid="ref43">43</xref>
          ].
        </p>
        <p>
          Methods to identify content that is hateful [
          <xref ref-type="bibr" rid="ref84">84</xref>
          ], misogynistic [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] or containing
vulgar language [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ] are also readily available and potentially useful for
minimizing exposure to content that some users may find offensive, which Smith
and Rieh [
          <xref ref-type="bibr" rid="ref67">67</xref>
          ] classify as valence cues. Marking content which is sexually explicit
(written, verbally and / or visually) [
          <xref ref-type="bibr" rid="ref54">54</xref>
          ], may be useful for developing strategies
to minimize harms to minors as well as users that are susceptible to addiction.
        </p>
        <p>
          As privacy is of paramount concern too, extracting cues that provide greater
transparency to the searcher into what data is collected and by whom it is
collected and shared are also critical to prevent harms from the collected
information. One such task in this space is the identification of 3rd parties that data
will be shared with when visiting a Web page [
          <xref ref-type="bibr" rid="ref44 ref81">44, 81</xref>
          ] and another being the
classification of privacy statements on the websites where the content is hosted,
a task that could be designed with existing privacy statement corpora [
          <xref ref-type="bibr" rid="ref79">79</xref>
          ]. In
a similar vein as author affiliation cues proposed by [
          <xref ref-type="bibr" rid="ref67">67</xref>
          ] and [
          <xref ref-type="bibr" rid="ref43">43</xref>
          ], privacy-based
ontologies containing information (e.g. total fines, number of GDPR violations)
about 1st-party providers and the 3rd-party affiliations could be developed to
present privacy cues.
        </p>
        <p>
          Many of the cues can be extracted with models produced by machine
learning algorithms. Nevertheless, for data scientists that develop these models, it is
critical to minimize model bias, such as gender bias [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. Many solutions in the
field of IR are designed with a “find the best” model mindset, as evidenced by the
leaderboard approach for shared tasks (e.g. TREC, SemEval), and are a likely
cause of some model biases and subsequent poor predictions. There is evidence
that ensemble approaches are more robust and resilient to bias and more likely
to outperform a single model [
          <xref ref-type="bibr" rid="ref31 ref46 ref84">31, 46, 84</xref>
          ], and are one possible alternative. In
search spaces with potentially dangerous outcomes (e.g. health), data scientists
should also consider interpretable models [
          <xref ref-type="bibr" rid="ref58">58</xref>
          ].
        </p>
        <p>
          Interface Design Informational cues, cognitive interventions and policy are all
important for harm reductions [
          <xref ref-type="bibr" rid="ref45">45</xref>
          ], but they need a medium for implementation
and it is the search interface (such as a SERP) that is this medium.
        </p>
        <p>
          Extracting cues that allow for the design of better decision making tools
(thus enabling users to better tap into their critical thinking skills) and designing
interfaces that present such cues and tools in a not-too-disruptive manner are two
major challenges for interface design. Commercial SERPs are typically presented
as ranked lists [
          <xref ref-type="bibr" rid="ref67">67</xref>
          ] and, depending on the query, will contain content such as
advertisements, social media posts and news articles [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. Search support tools are
an important IR system component for improving search [
          <xref ref-type="bibr" rid="ref78">78</xref>
          ], some of which are
available within the SERP including query suggestions and auto-completion as
well as spelling correction. Thus, any component that allows the user to minimize
the chance of harm, also falls within the scope of search support.
        </p>
        <p>
          Space is a premium and one challenge is to ensure that the screen is not
overloaded [
          <xref ref-type="bibr" rid="ref47">47</xref>
          ]. Risk communication tools such as nutrition labels and fact boxes
are highly effective and desirable, but may not fit on small mobile devices, where
warning lights are likely the better option. Link enrichment is another approach
[
          <xref ref-type="bibr" rid="ref47">47</xref>
          ], where pop-ups populated with informational cues are included with the
results, and is thus especially appealing as it could be applied to both desktop
and mobile search. Link enrichment also need not apply only to the SERP, and
can be applied as searchers navigate within [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] or across domains and the Web
(Wikipedia desktop offers link enrichment and is one live example).
        </p>
        <p>
          Alternatively, the SERP could be designed to rank or filter results as to
attenuate possible harms from, say, privacy concerns or dangerous medical advice
[
          <xref ref-type="bibr" rid="ref87">87</xref>
          ]. Indeed, commercial search engines already offer the default of filtering adult
content (e.g. content that is classified as sexually explicit), and takes up little
space within the interface. Altering results in the SERP in this manner is a
nudge, so long as the user is given the capability to opt-out [
          <xref ref-type="bibr" rid="ref68">68</xref>
          ]. However, we
caution against such approaches, as it does not tap into the important critical
thinking and literacy skills of searchers [
          <xref ref-type="bibr" rid="ref67">67</xref>
          ] and thus likely does not generalize
to other contexts without such a nudge.
        </p>
        <p>
          The interface is also where policy can be implemented. It is conceivable that
law makers may someday require IR systems to include any number of the
approaches already discussed—an information nutrition label [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ] is one such
possibility. Or platforms, such as Google, could voluntarily set policy that provides
links to educational resources in the SERP, simplifying the process for searchers
to learn how to better protect themselves during the search process.
        </p>
      </sec>
      <sec id="sec-3-5">
        <title>3.4 Evaluation</title>
        <p>
          Evaluation is a fundamental and necessary process for IIR research. There are
many resources readily available (for an introduction see [
          <xref ref-type="bibr" rid="ref40">40</xref>
          ] for evaluation of
user studies and [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] for evaluation of IR systems) to perform evaluations of IIR
systems and user interactions. Traditional evaluation metrics, such as
relevancebased metrics (e.g. precision, F-measure), and human-based metrics (e.g. time
to complete tasks, query abandonment rate) are essential for harm prevention
strategies developed with this framework, as there should be minimal impact on
these metrics. For data scientists and other researchers that perform evaluations,
they should consider recent suggestions of leading experts (see [
          <xref ref-type="bibr" rid="ref26 ref61">26, 61</xref>
          ]), as IR
studies often lack statistical rigor [
          <xref ref-type="bibr" rid="ref61">61</xref>
          ] and that many easily avoidable mistakes
are made [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ]. We now turn our attention to more recently proposed metrics
that should also be considered, including metrics that take an economic view,
and a somewhat newer generation of outcome-based metrics.
        </p>
        <p>
          Economic-Based Metrics Interventions that reduce risk of harm, such as
those suggested in the framework, have costs (e.g. time) for the individual [
          <xref ref-type="bibr" rid="ref32 ref68">32, 68</xref>
          ]
and costs are an important economic consideration for IIR environments [
          <xref ref-type="bibr" rid="ref4 ref6">4, 6</xref>
          ]12.
The economic view has inspired a new set of useful evaluation approaches, which
integrate theories from economics and have the overall aim to better predict user
behavior in the search environment [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. Incorporation of the economic view of
IIR is potentially useful for evaluating the framework, as it allows evaluation
from the perspective of trade-offs of costs and benefits [
          <xref ref-type="bibr" rid="ref3 ref5">3, 5</xref>
          ], such as the
tradeoff of costs of time for the benefit of reduced risk of harm as part of the search
process. In addition to time, examples of relevant costs one might consider are the
money a searcher is willing to pay for information that is of high quality, amount
of data they are willing to share with 3rd parties and the effort of searching for
information relevant to their task.
        </p>
        <p>
          Outcome-Oriented Metrics Sense-making, one area of research within IS
that considers the process of filling in gaps of knowledge, also has a strong
focus on the ultimate outcome of this process [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ], outcomes which may have
positive or negative impacts [
          <xref ref-type="bibr" rid="ref21 ref57">21, 57</xref>
          ]. Such impacts fall in the domain of success
metrics [
          <xref ref-type="bibr" rid="ref78">78</xref>
          ], which are possibly the most important evaluation approach for the
framework, as they can be measured from the user perspective (does the user
believe their risk of harm was reduced) and from the system perspective (did
user X, making use of a privacy intervention, share less data than user Y, who
12 There are costs with respect to designing and operationalizing interventions in a
search environment, such as salaries for software engineers. However, for this
discussion, we are strictly concerned with the economics of the searcher.
did not). Such metrics are important in the area of health search as incorrect
information (resulting in incorrect knowledge) risks great harm [
          <xref ref-type="bibr" rid="ref55 ref77">55, 77</xref>
          ]. Also
promising are new evaluation methods, such as overall reputation of commercial
search platforms and longitudinal studies that sample regular users13.
4
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>The Framework in Practice</title>
      <p>
        Several empirical studies and commercial systems have some (but not all) of the
elements of the framework. It is worth noting these to provide a lens into how
the framework can be used in practice. To our knowledge, however, no approach
addresses all four components. Behavioral interventions (nudges) and
systembased content enrichment were shown to effectively steer users towards healthier
food choices [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] and away from Websites that more greatly impact personal
privacy [
        <xref ref-type="bibr" rid="ref1 ref87">1, 87</xref>
        ]. Outcome-oriented evaluation measures were considered in the
latter study [
        <xref ref-type="bibr" rid="ref87">87</xref>
        ], but lack the policy element. Some commercial search engines
(e.g. DuckDuckGo), have used policy, system design and cognitive approaches
to protect users from adult material, but do not publish evaluation approaches.
      </p>
      <p>
        Specific to behavioral and cognitive interventions, there are additional
empirical findings worth noting. A subset of the cues suggested by Smith and Rieh [
        <xref ref-type="bibr" rid="ref67">67</xref>
        ]
were used to augment search results visually to nudge users to more accurately
assess credible information [
        <xref ref-type="bibr" rid="ref64">64</xref>
        ]. Browser plug-ins can provide a visual nudge
during Web browsing and exploration, such as the Ghostery 3rd-party blocking
tool (https://www.ghostery.com/), which by default blocks data sharing with
3rd parties14. In line with a boosting approach, one study tested low-cost search
tips as a means to provide skills for better searching [
        <xref ref-type="bibr" rid="ref50">50</xref>
        ] and another study
improved novice searchers skills by feedback based their search behavior compared
to expert searchers [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]; note that neither study was explicitly designed for harm
reduction nor explicitly referred to boosting.
      </p>
      <p>
        Evidence suggests that elements in the URL can be utilized to boost users
with a skill to better protect privacy and simultaneously improve health
outcomes [
        <xref ref-type="bibr" rid="ref85">85</xref>
        ] and Figure 1 is a prototype of a boost that combines these findings
with a fact box [
        <xref ref-type="bibr" rid="ref49">49</xref>
        ] as a means to reduce risks of 3rd-party tracking. Commercial
search platforms may someday shift their policy to offer more focus on harm
prevention, where policy might place such a fact box in the SERP, or alternatively
offer tools allowing users to self-nudge [
        <xref ref-type="bibr" rid="ref56">56</xref>
        ] (e.g. selecting search domains, such
as health and politics, to filter out non-credible information by default).
5
      </p>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>
        We introduced a framework as a pathway to reduce the risk of harms present
in modern Web search. Central to the framework are cognitive decision making
tools and three further components: policy, system design and overall evaluation.
13 The Harvard nurse study https://www.nurseshealthstudy.org/ may be a useful
template for longitudinally assessing harm and risk factors of search systems.
14 Caution should prevail with 3rd-party blocking tools as recent findings question their
effectiveness [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
Fig. 1. A proposed boost based upon fact box methods [
        <xref ref-type="bibr" rid="ref49">49</xref>
        ] and previous findings on
the usefulness of the top-level domain of a URL for harm reduction [
        <xref ref-type="bibr" rid="ref85">85</xref>
        ]. Data scientists
and IR researchers could make use of sampling techniques to dynamically populate fact
boxes based upon the topical search space of a user’s information need.
      </p>
      <p>
        Baeza-Yates’ recent commentary on the interactions between IR systems and
searchers [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] as a cause of harms in Web search systems, is direct real-world
evidence of the pervasive nature of the current Web search setup. Implementing
the strategies sketched in this article is a possible approach to improving the
overall system. Given current algorithms and their ability to learn from log data,
hypothetically it would only require a subset of users concerned about harms in
Web search to shift the results for everyone else (i.e., a positive externality). The
environment could naturally evolve to something more protective for individuals
and society as a whole.
      </p>
      <p>
        We recognize that our framework is just a start, and there is much more
to be considered, especially in the space of ensuring overall commercial value
and limiting the impacts on system performance. Embedding the current, initial
framework in the IIR view, which takes a multi-faceted and interdisciplinary
approach inclusive of these additional factors, will ensure that it can mature into a
comprehensive and realistic framework. A key message from our proposal is that
methods from cognitive science introduced in our framework appear particularly
promising [
        <xref ref-type="bibr" rid="ref33 ref41 ref45">33, 41, 45</xref>
        ]. We hope that such a framework will be a useful discussion
point for members of all communities involved to work towards a common goal
of minimizing the harm for searchers and our society.
      </p>
      <p>Acknowledgements Thank you to the reviewers for their constructive feedback
that has helped strengthen this paper. This work was supported by the Economic
and Social Research Council grant number ES/M010236/1 (The Human Rights
Big Data and Technology (HRBDT) Project).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Acquisti</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Adjerid</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Balebako</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brandimarte</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cranor</surname>
            ,
            <given-names>L.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Komanduri</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leon</surname>
            ,
            <given-names>P.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sadeh</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schaub</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sleeper</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          , Wilson, S.:
          <article-title>Nudges for privacy and security: Understanding and assisting users' choices online</article-title>
          .
          <source>ACM Comput. Surv</source>
          .
          <volume>50</volume>
          (
          <issue>3</issue>
          ) (
          <year>August 2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Alhindi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kruschwitz</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fox</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Albakour</surname>
          </string-name>
          , M.D.:
          <article-title>Profile-based summarisation for web site navigation</article-title>
          .
          <source>ACM Transactions on Information Systems (TOIS) 33(1)</source>
          , 4:
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          :
          <fpage>39</fpage>
          (Mar
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Azzopardi</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>The economics in interactive information retrieval</article-title>
          .
          <source>In: Proceedings of the 34th International ACM SIGIR Conference on Research and Development in Information Retrieval</source>
          . p.
          <fpage>15</fpage>
          -
          <lpage>24</lpage>
          . SIGIR '
          <volume>11</volume>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Azzopardi</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Modelling interaction with economic models of search</article-title>
          .
          <source>In: Proceedings of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval</source>
          . pp.
          <fpage>3</fpage>
          -
          <lpage>12</lpage>
          . SIGIR '14,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Azzopardi</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thomas</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Craswell</surname>
          </string-name>
          , N.:
          <article-title>Measuring the utility of search engine result pages: An information foraging based measure</article-title>
          .
          <source>In: The 41st International ACM SIGIR Conference on Research and Development in Information Retrieval</source>
          . p.
          <fpage>605</fpage>
          -
          <lpage>614</lpage>
          . SIGIR '
          <volume>18</volume>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Azzopardi</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zuccon</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>An analysis of the cost and benefit of search interactions</article-title>
          .
          <source>In: Proceedings of the 2016 ACM International Conference on the Theory of Information Retrieval</source>
          . pp.
          <fpage>59</fpage>
          -
          <lpage>68</lpage>
          . ICTIR '
          <volume>16</volume>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Baeza-Yates</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>Bias on the web</article-title>
          .
          <source>Communications of the ACM</source>
          <volume>61</volume>
          (
          <issue>6</issue>
          ),
          <fpage>54</fpage>
          -
          <lpage>61</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Bakshy</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Messing</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Adamic</surname>
            ,
            <given-names>L.A.</given-names>
          </string-name>
          :
          <article-title>Exposure to ideologically diverse news and opinion on facebook</article-title>
          .
          <source>Science</source>
          <volume>348</volume>
          (
          <issue>6239</issue>
          ),
          <fpage>1130</fpage>
          -
          <lpage>1132</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Basile</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bosco</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fersini</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Debora</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patti</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pardo</surname>
            ,
            <given-names>F.M.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosso</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sanguinetti</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , et al.:
          <article-title>Semeval-2019 task 5: Multilingual detection of hate speech against immigrants and women in twitter</article-title>
          .
          <source>In: 13th International Workshop on Semantic Evaluation</source>
          . pp.
          <fpage>54</fpage>
          -
          <lpage>63</lpage>
          . Association for Computational Linguistics (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Bateman</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Teevan</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>White</surname>
            ,
            <given-names>R.W.:</given-names>
          </string-name>
          <article-title>The search dashboard: How reflection and comparison impact search behavior</article-title>
          .
          <source>In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</source>
          . p.
          <fpage>1785</fpage>
          -
          <lpage>1794</lpage>
          . CHI '
          <volume>12</volume>
          ,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Belkin</surname>
            ,
            <given-names>N.J.:</given-names>
          </string-name>
          <article-title>Some(what) grand challenges for information retrieval</article-title>
          .
          <source>SIGIR Forum</source>
          <volume>42</volume>
          (
          <issue>1</issue>
          ),
          <fpage>47</fpage>
          -
          <lpage>54</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Bolukbasi</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chang</surname>
            ,
            <given-names>K.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zou</surname>
            ,
            <given-names>J.Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Saligrama</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalai</surname>
            ,
            <given-names>A.T.</given-names>
          </string-name>
          :
          <article-title>Man is to Computer Programmer as Woman is to Homemaker? Debiasing Word Embeddings</article-title>
          .
          <source>In: Advances in Neural Information Processing Systems</source>
          <volume>29</volume>
          , pp.
          <fpage>4349</fpage>
          -
          <lpage>4357</lpage>
          . NIPS,
          <string-name>
            <surname>Curran</surname>
            <given-names>Associates</given-names>
          </string-name>
          , Inc. (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Botsman</surname>
          </string-name>
          , R.:
          <article-title>Big data meets big brother as china moves to rate its citizens</article-title>
          .
          <source>Wired UK</source>
          <volume>21</volume>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Cadwalladr</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Graham-Harrison</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          :
          <article-title>Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach</article-title>
          .
          <source>The Guardian</source>
          <volume>17</volume>
          ,
          <issue>22</issue>
          (
          <year>2018</year>
          ), https://www.theguardian.com/news/2018/mar/17/cambridgeanalytica-facebook
          <article-title>-influence-us-election</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Carlsen</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Haque</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>What Does Facebook Consider Hate Speech? Take Our Quiz</article-title>
          . https://www.nytimes.com/interactive/2017/10/13/technology/facebookhate-speech-quiz.
          <source>html (October</source>
          <year>2017</year>
          ), (Accessed on 10/21/2018)
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Conger</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alba</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Twitter Refutes Inaccuracies in Trump's Tweets About Mail-In Voting - The New York Times</article-title>
          . https://www.nytimes.com/
          <year>2020</year>
          /05/26/technology/twitter
          <article-title>-trump-mail-inballots</article-title>
          .
          <source>html (May</source>
          <year>2020</year>
          ), (Accessed on 06/14/2020)
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Croft</surname>
          </string-name>
          , W.B.:
          <article-title>The importance of interaction for information retrieval</article-title>
          .
          <source>In: Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval</source>
          . pp.
          <fpage>1</fpage>
          -
          <lpage>2</lpage>
          . SIGIR'19,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          , New York, NY, USA (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Croft</surname>
            ,
            <given-names>W.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Metzler</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Strohman</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Search Engines: Information Retrieval in Practice</article-title>
          . Pearson
          <string-name>
            <surname>Education</surname>
          </string-name>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Davenport</surname>
            ,
            <given-names>T.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patil</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Data scientist: The sexiest job of the 21st century</article-title>
          .
          <source>Harvard business review 90(5)</source>
          ,
          <fpage>70</fpage>
          -
          <lpage>76</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Davidson</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Warmsley</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Macy</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weber</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Automated hate speech detection and the problem of offensive language</article-title>
          .
          <source>arXiv preprint arXiv:1703.04009</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Dervin</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Sense-making theory and practice: an overview of user interests in knowledge seeking and use</article-title>
          .
          <source>Journal of Knowledge Management</source>
          <volume>2</volume>
          (
          <issue>2</issue>
          ),
          <fpage>36</fpage>
          -
          <lpage>46</lpage>
          (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Diaz</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Worst practices for designing production information access systems</article-title>
          .
          <source>ACM SIGIR Forum</source>
          <volume>50</volume>
          (
          <issue>1</issue>
          ),
          <fpage>2</fpage>
          -
          <lpage>11</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Elsweiler</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Trattner</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harvey</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Exploiting food choice biases for healthier recipe recommendation</article-title>
          .
          <source>In: Proceedings of the 40th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval</source>
          . pp.
          <fpage>575</fpage>
          -
          <lpage>584</lpage>
          . SIGIR '18,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24. European Union:
          <article-title>General Data Protection Regulation (GDPR) - Official Legal Text (2016 April)</article-title>
          , https://gdpr-info.eu/, (Accessed on 04/02/2018)
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Fouad</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bielova</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Legout</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sarafijanovic-Djukic</surname>
          </string-name>
          , N.:
          <article-title>Missed by filter lists: Detecting unknown third-party trackers with invisible pixels</article-title>
          .
          <source>Proceedings on Privacy Enhancing Technologies</source>
          <year>2020</year>
          (
          <article-title>2</article-title>
          ),
          <fpage>499</fpage>
          -
          <lpage>518</lpage>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Fuhr</surname>
            ,
            <given-names>N.:</given-names>
          </string-name>
          <article-title>Some Common Mistakes In IR Evaluation, And How They Can Be Avoided</article-title>
          .
          <source>ACM SIGIR Forum</source>
          <volume>51</volume>
          (
          <issue>3</issue>
          ),
          <fpage>32</fpage>
          -
          <lpage>41</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Fuhr</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giachanou</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grefenstette</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gurevych</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hanselowski</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jarvelin</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jones</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , Liu,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Mothe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Nejdl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            ,
            <surname>Peters</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>Stein</surname>
          </string-name>
          ,
          <string-name>
            <surname>B.</surname>
          </string-name>
          :
          <article-title>An information nutritional label for online documents</article-title>
          .
          <source>ACM SIGIR Forum</source>
          <volume>51</volume>
          (
          <issue>3</issue>
          ),
          <fpage>46</fpage>
          -
          <lpage>66</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Gigerenzer</surname>
          </string-name>
          , G.:
          <article-title>On the supposed evidence for libertarian paternalism</article-title>
          .
          <source>Review of philosophy and psychology 6</source>
          (
          <issue>3</issue>
          ),
          <fpage>361</fpage>
          -
          <lpage>383</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Gigerenzer</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hertwig</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , Pachur (Eds.), T.:
          <article-title>Heuristics: The Foundations of Adaptive Behavior</article-title>
          . Oxford University Press (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Google</surname>
          </string-name>
          :
          <article-title>Search education - google</article-title>
          . https://www.google.com/insidesearch/searcheducation/, (Accessed on 06/14/2020)
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Hagen</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Potthast</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Büchner</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Webis: An ensemble for twitter sentiment detection</article-title>
          .
          <source>In: Proceedings of the 9th International Workshop on Semantic Evaluation (SemEval</source>
          <year>2015</year>
          ). pp.
          <fpage>582</fpage>
          -
          <lpage>589</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Hertwig</surname>
          </string-name>
          , R.:
          <article-title>When to consider boosting: some rules for policy-makers</article-title>
          .
          <source>Behavioural Public Policy</source>
          <volume>1</volume>
          (
          <issue>2</issue>
          ),
          <fpage>143</fpage>
          -
          <lpage>161</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Hertwig</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grüne-Yanoff</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Nudging and boosting: Steering or empowering good decisions</article-title>
          .
          <source>Perspectives on Psychological Science</source>
          <volume>12</volume>
          (
          <issue>6</issue>
          ),
          <fpage>973</fpage>
          -
          <lpage>986</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Hilligoss</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rieh</surname>
          </string-name>
          , S.Y.:
          <article-title>Developing a unifying framework of credibility assessment: Construct, heuristics, and interaction in context</article-title>
          .
          <source>Information Processing &amp; Management</source>
          <volume>44</volume>
          (
          <issue>4</issue>
          ),
          <fpage>1467</fpage>
          -
          <lpage>1484</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Horvitz</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mulligan</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Data, privacy, and the greater good</article-title>
          .
          <source>Science</source>
          <volume>349</volume>
          (
          <issue>6245</issue>
          ),
          <fpage>253</fpage>
          -
          <lpage>255</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Ingwersen</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Cognitive perspectives of information retrieval interaction: Elements of a cognitive ir theory</article-title>
          .
          <source>Journal of Documentation</source>
          <volume>52</volume>
          (
          <issue>1</issue>
          ),
          <fpage>3</fpage>
          -
          <lpage>50</lpage>
          (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Ingwersen</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Järvelin</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>The Turn: Integration of Information Seeking and Retrieval in Context</article-title>
          , vol.
          <volume>18</volume>
          . Springer Science &amp; Business
          <string-name>
            <surname>Media</surname>
          </string-name>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Joachims</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Granka</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pan</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hembrooke</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gay</surname>
          </string-name>
          , G.:
          <article-title>Accurately interpreting clickthrough data as implicit feedback</article-title>
          .
          <source>In: Proceedings of the 28th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval</source>
          . pp.
          <fpage>154</fpage>
          -
          <lpage>161</lpage>
          . SIGIR '05,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39.
          <string-name>
            <surname>Jones</surname>
            ,
            <given-names>K.S.:</given-names>
          </string-name>
          <article-title>Privacy: what's different now?</article-title>
          <source>Interdisciplinary Science Reviews</source>
          <volume>28</volume>
          (
          <issue>4</issue>
          ),
          <fpage>287</fpage>
          -
          <lpage>292</lpage>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          40.
          <string-name>
            <surname>Kelly</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Methods for evaluating interactive information retrieval systems with users</article-title>
          .
          <source>Foundations and Trends® in Information Retrieval</source>
          <volume>3</volume>
          (
          <issue>1-2</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>224</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          41.
          <string-name>
            <surname>Kozyreva</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lewandowsky</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hertwig</surname>
          </string-name>
          , R.:
          <article-title>Citizens versus the internet: Confronting digital challenges with cognitive tools. Psychological Science in the Public Interest</article-title>
          (In Press 2020)
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          42.
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>M.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Loughlin</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lundberg</surname>
            ,
            <given-names>I.B.</given-names>
          </string-name>
          :
          <article-title>Applying one reason decision-making: the prioritisation of literature searches</article-title>
          .
          <source>Australian Journal of Psychology</source>
          <volume>54</volume>
          (
          <issue>3</issue>
          ),
          <fpage>137</fpage>
          -
          <lpage>143</lpage>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          43.
          <string-name>
            <surname>Lewandowsky</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ecker</surname>
            ,
            <given-names>U.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cook</surname>
          </string-name>
          , J.:
          <article-title>Beyond misinformation: Understanding and coping with the “post-truth” era</article-title>
          .
          <source>Journal of Applied Research in Memory and Cognition</source>
          <volume>6</volume>
          (
          <issue>4</issue>
          ),
          <fpage>353</fpage>
          -
          <lpage>369</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          44.
          <string-name>
            <surname>Libert</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Privacy implications of health information seeking on the web</article-title>
          .
          <source>Communications of the ACM</source>
          <volume>58</volume>
          (
          <issue>3</issue>
          ),
          <fpage>68</fpage>
          -
          <lpage>77</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          45.
          <string-name>
            <surname>Lorenz-Spreen</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lewandowsky</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sunstein</surname>
            ,
            <given-names>C.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hertwig</surname>
          </string-name>
          , R.:
          <article-title>How behavioural sciences can promote truth, autonomy and democratic discourse online</article-title>
          .
          <source>Nature Human Behaviour</source>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          46.
          <string-name>
            <surname>MacAvaney</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yao</surname>
            ,
            <given-names>H.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Russell</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goharian</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Frieder</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Hate speech detection: Challenges and solutions</article-title>
          .
          <source>PloS one 14(8)</source>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          47.
          <string-name>
            <surname>Marchionini</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Geisler</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brunk</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Agileviews: A human-centered framework for interfaces to information spaces</article-title>
          .
          <source>In: Proceedings of the Annual Conference of the American Society for Information Science</source>
          . pp.
          <fpage>271</fpage>
          -
          <lpage>280</lpage>
          (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          48.
          <string-name>
            <surname>Maubach</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hoek</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mather</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Interpretive front-of-pack nutrition labels. comparing competing recommendations</article-title>
          .
          <source>Appetite</source>
          <volume>82</volume>
          ,
          <fpage>67</fpage>
          -
          <lpage>77</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          49.
          <string-name>
            <surname>McDowell</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rebitschek</surname>
            ,
            <given-names>F.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gigerenzer</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wegwarth</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>A simple tool for communicating the benefits and harms of health interventions: A guide for creating a fact box</article-title>
          .
          <source>MDM Policy &amp; Practice</source>
          <volume>1</volume>
          (
          <issue>1</issue>
          ) (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          50.
          <string-name>
            <surname>Moraveji</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Russell</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bien</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mease</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Measuring improvement in user search performance resulting from optimal search tips</article-title>
          .
          <source>In: Proceedings of the 34th International ACM SIGIR Conference on Research and Development in Information Retrieval</source>
          . p.
          <fpage>355</fpage>
          -
          <lpage>364</lpage>
          . SIGIR '
          <volume>11</volume>
          ,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          51.
          <string-name>
            <surname>Novin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Meyers</surname>
          </string-name>
          , E.:
          <article-title>Making sense of conflicting science information: Exploring bias in the search engine result page</article-title>
          .
          <source>In: Proceedings of the 2017 Conference on Conference Human Information Interaction and Retrieval</source>
          . pp.
          <fpage>175</fpage>
          -
          <lpage>184</lpage>
          . CHIIR '17,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          52.
          <string-name>
            <surname>Oliver</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Nudging, shoving, and budging: Behavioural economic-informed policy</article-title>
          .
          <source>Public Administration</source>
          <volume>93</volume>
          (
          <issue>3</issue>
          ),
          <fpage>700</fpage>
          -
          <lpage>714</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          53.
          <string-name>
            <surname>Orben</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Teenagers, screens and social media: a narrative review of reviews and key studies</article-title>
          .
          <source>Social Psychiatry and Psychiatric</source>
          Epidemiology pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          54.
          <string-name>
            <surname>Perez</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Avila</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moreira</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moraes</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Testoni</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Valle</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goldenstein</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rocha</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Video pornography detection through deep learning techniques and motion information</article-title>
          .
          <source>Neurocomputing</source>
          <volume>230</volume>
          ,
          <fpage>279</fpage>
          -
          <lpage>293</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          55.
          <string-name>
            <surname>Pogacar</surname>
            ,
            <given-names>F.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ghenai</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smucker</surname>
            ,
            <given-names>M.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Clarke</surname>
            ,
            <given-names>C.L.</given-names>
          </string-name>
          :
          <article-title>The positive and negative influence of search results on people's decisions about the efficacy of medical treatments</article-title>
          .
          <source>In: Proceedings of the ACM SIGIR International Conference on Theory of Information Retrieval</source>
          . pp.
          <fpage>209</fpage>
          -
          <lpage>216</lpage>
          . ICTIR '17,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          56.
          <string-name>
            <surname>Reijula</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hertwig</surname>
          </string-name>
          , R.:
          <article-title>Self-nudging and the citizen choice architect</article-title>
          .
          <source>Behavioural Public</source>
          Policy p.
          <fpage>1</fpage>
          -
          <lpage>31</lpage>
          (
          <year>2020</year>
          ). https://doi.org/10.1017/bpp.
          <year>2020</year>
          .5
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          57.
          <string-name>
            <surname>Reinhard</surname>
            ,
            <given-names>C.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dervin</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Comparing situated sense-making processes in virtual worlds: Application of dervin's sense-making methodology to media reception situations</article-title>
          .
          <source>Convergence</source>
          <volume>18</volume>
          (
          <issue>1</issue>
          ),
          <fpage>27</fpage>
          -
          <lpage>48</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          58.
          <string-name>
            <surname>Rudin</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Stop explaining black box machine learning models for high stakes decisions and use interpretable models instead</article-title>
          .
          <source>Nature Machine Intelligence</source>
          <volume>1</volume>
          (
          <issue>5</issue>
          ),
          <fpage>206</fpage>
          -
          <lpage>215</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          59.
          <string-name>
            <surname>Russell</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Callegaro</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>How to be a better web searcher: Secrets from google scientists researchers who study how we use search engines share common mistakes, misperceptions and advice</article-title>
          .
          <source>Scientific American</source>
          (
          <year>2019</year>
          ), https://blogs.scientificamerican.com/observations/how-to
          <article-title>-be-a-betterweb-searcher-secrets-from-google-scientists/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref60">
        <mixed-citation>
          60.
          <string-name>
            <surname>Ruthven</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Interactive information retrieval</article-title>
          .
          <source>Annual Review of Information Science and Technology</source>
          <volume>42</volume>
          (
          <issue>1</issue>
          ),
          <fpage>43</fpage>
          -
          <lpage>91</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref61">
        <mixed-citation>
          61.
          <string-name>
            <surname>Sakai</surname>
          </string-name>
          , T.:
          <article-title>Statistical Significance, Power, and Sample Sizes: A Systematic Review of SIGIR and TOIS,</article-title>
          <year>2006</year>
          -
          <fpage>2015</fpage>
          .
          <source>In: Proceedings of the 39th International ACM SIGIR Conference on Research and Development in Information Retrieval</source>
          . pp.
          <fpage>5</fpage>
          -
          <lpage>14</lpage>
          . SIGIR '16,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          , New York, NY, USA (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref62">
        <mixed-citation>
          62.
          <string-name>
            <surname>Sankin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Want to Find a Misinformed Public? Facebook's Already Done It</article-title>
          . https://themarkup.org/coronavirus/2020/04/23/want-to
          <article-title>-find-a-misinformedpublic-facebooks-already-done-</article-title>
          <string-name>
            <surname>it</surname>
          </string-name>
          (
          <year>April 2020</year>
          ), (Accessed on 04/30/2020)
        </mixed-citation>
      </ref>
      <ref id="ref63">
        <mixed-citation>
          63.
          <string-name>
            <surname>Schulz</surname>
          </string-name>
          , W.:
          <article-title>Regulating Intermediaries to Protect Privacy Online - the Case of the German NetzDG. Personality and Data Protection Rights on the Internet (</article-title>
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref64">
        <mixed-citation>
          64.
          <string-name>
            <surname>Schwarz</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Morris</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Augmenting web pages and search results to support credibility assessment</article-title>
          .
          <source>In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</source>
          . p.
          <fpage>1245</fpage>
          -
          <lpage>1254</lpage>
          . CHI '
          <volume>11</volume>
          ,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref65">
        <mixed-citation>
          65.
          <string-name>
            <surname>Siegrist</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leins-Hess</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , Keller, C.:
          <article-title>Which front-of-pack nutrition label is the most efficient one? the results of an eye-tracker study</article-title>
          .
          <source>Food Quality and Preference</source>
          <volume>39</volume>
          ,
          <fpage>183</fpage>
          -
          <lpage>190</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref66">
        <mixed-citation>
          66.
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>C.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kantor</surname>
            ,
            <given-names>P.B.:</given-names>
          </string-name>
          <article-title>User adaptation: Good results from poor systems</article-title>
          .
          <source>In: Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval</source>
          . p.
          <fpage>147</fpage>
          -
          <lpage>154</lpage>
          . SIGIR '
          <volume>08</volume>
          ,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery, New York, NY, USA (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref67">
        <mixed-citation>
          67.
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>C.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rieh</surname>
          </string-name>
          , S.Y.:
          <article-title>Knowledge-context in search systems: Toward informationliterate actions</article-title>
          .
          <source>In: Proceedings of the 2019 Conference on Human Information Interaction and Retrieval</source>
          . pp.
          <fpage>55</fpage>
          -
          <lpage>62</lpage>
          . CHIIR '19,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          , New York, NY, USA (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref68">
        <mixed-citation>
          68.
          <string-name>
            <surname>Thaler</surname>
            ,
            <given-names>R.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sunstein</surname>
            ,
            <given-names>C.R.</given-names>
          </string-name>
          : Nudge:
          <article-title>Improving Decisions about Health, Wealth, and Happiness</article-title>
          .
          <source>Penguin</source>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref69">
        <mixed-citation>
          69. The United Nations:
          <article-title>Universal declaration of human rights (</article-title>
          <year>1948</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref70">
        <mixed-citation>
          70. The United Nations General Assembly:
          <article-title>International covenant on civil and political rights</article-title>
          .
          <source>Treaty Series</source>
          <volume>999</volume>
          ,
          <issue>171</issue>
          (
          <year>December 1966</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref71">
        <mixed-citation>
          71. The United Nations General Assembly:
          <article-title>International covenant on economic, social, and cultural rights</article-title>
          .
          <source>Treaty Series</source>
          <volume>999</volume>
          ,
          <issue>171</issue>
          (
          <year>December 1966</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref72">
        <mixed-citation>
          72.
          <string-name>
            <surname>Thompson</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Google's China Problem (and China's Google Problem)</article-title>
          .
          <source>The New York Times</source>
          (
          <year>2006</year>
          ), (Accessed on 06/
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref73">
        <mixed-citation>
          73.
          <string-name>
            <surname>Tufekci</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>Facebook said its algorithms do help form echo chambers, and the tech press missed it</article-title>
          .
          <source>New Perspectives Quarterly</source>
          <volume>32</volume>
          (
          <issue>3</issue>
          ),
          <fpage>9</fpage>
          -
          <lpage>12</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref74">
        <mixed-citation>
          74.
          <string-name>
            <surname>Tufekci</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>We're building a dystopia just to make people click on ads</article-title>
          (
          <year>September 2017</year>
          ), https://www.ted.com/
        </mixed-citation>
      </ref>
      <ref id="ref75">
        <mixed-citation>
          75. U.S. Government Publishing Office:
          <volume>47</volume>
          usc 230:
          <article-title>Protection for private blocking and screening of offensive material</article-title>
          . https://www.govinfo.gov/content/pkg/USCODE2011-title47/pdf/USCODE-2011
          <string-name>
            <surname>-title47-</surname>
          </string-name>
          chap5
          <string-name>
            <surname>-</surname>
          </string-name>
          subchapII
          <string-name>
            <surname>-</surname>
          </string-name>
          partI-sec230.
          <source>pdf</source>
          (
          <year>1996</year>
          ), (Accessed on 06/
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref76">
        <mixed-citation>
          76.
          <string-name>
            <surname>Van Herpen</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Van Trijp</surname>
            ,
            <given-names>H.C.</given-names>
          </string-name>
          :
          <article-title>Front-of-pack nutrition labels. their effect on attention and choices when consumers have varying goals and time constraints</article-title>
          .
          <source>Appetite</source>
          <volume>57</volume>
          (
          <issue>1</issue>
          ),
          <fpage>148</fpage>
          -
          <lpage>160</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref77">
        <mixed-citation>
          77.
          <string-name>
            <surname>White</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Beliefs and biases in web search</article-title>
          .
          <source>In: Proceedings of the 36th International ACM SIGIR Conference on Research and Development in Information Retrieval</source>
          . pp.
          <fpage>3</fpage>
          -
          <lpage>12</lpage>
          . SIGIR '13,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref78">
        <mixed-citation>
          78.
          <string-name>
            <surname>White</surname>
            ,
            <given-names>R.W.</given-names>
          </string-name>
          :
          <article-title>Interactions with Search Systems</article-title>
          . Cambridge University Press (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref79">
        <mixed-citation>
          79. Wilson,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Schaub</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Dara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.A.</given-names>
            ,
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Cherivirala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Leon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.G.</given-names>
            ,
            <surname>Andersen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.S.</given-names>
            ,
            <surname>Zimmeck</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Sathyendra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.M.</given-names>
            ,
            <surname>Russell</surname>
          </string-name>
          ,
          <string-name>
            <surname>N.C.</surname>
          </string-name>
          , et al.:
          <article-title>The creation and analysis of a website privacy policy corpus</article-title>
          .
          <source>In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics</source>
          . pp.
          <fpage>1330</fpage>
          -
          <lpage>1340</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref80">
        <mixed-citation>
          80.
          <string-name>
            <surname>Young</surname>
            ,
            <given-names>K.S.:</given-names>
          </string-name>
          <article-title>Internet addiction: A new clinical phenomenon and its consequences</article-title>
          .
          <source>American Behavioral Ccientist</source>
          <volume>48</volume>
          (
          <issue>4</issue>
          ),
          <fpage>402</fpage>
          -
          <lpage>415</lpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref81">
        <mixed-citation>
          81.
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Macbeth</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Modi</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pujol</surname>
            ,
            <given-names>J.M.</given-names>
          </string-name>
          :
          <article-title>Tracking the trackers</article-title>
          .
          <source>In: Proceedings of the 25th International Conference on World Wide Web</source>
          . pp.
          <fpage>121</fpage>
          -
          <lpage>132</lpage>
          . WWW '16,
          <string-name>
            <given-names>International</given-names>
            <surname>World Wide Web Conferences Steering Committee</surname>
          </string-name>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref82">
        <mixed-citation>
          82.
          <string-name>
            <surname>Zimmer</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>Privacy on Planet Google: Using the Theory of Contextual Integrity to Clarify the Privacy Threats of Google's Quest for the Perfect Search Engine Google: An Intersection of Business and Technology</article-title>
          .
          <source>Journal of Business &amp; Technology Law</source>
          <volume>3</volume>
          ,
          <fpage>109</fpage>
          -
          <lpage>126</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref83">
        <mixed-citation>
          83.
          <string-name>
            <surname>Zimmer</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Web Search Studies: Multidisciplinary Perspectives on Web Search Engines</article-title>
          , pp.
          <fpage>507</fpage>
          -
          <lpage>521</lpage>
          . Springer Netherlands (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref84">
        <mixed-citation>
          84.
          <string-name>
            <surname>Zimmerman</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fox</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kruschwitz</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Improving hate speech detection with deep learning ensembles</article-title>
          .
          <source>In: Proceedings of the 10th International Conference on Language Resources</source>
          and
          <article-title>Evaluation (Miyazaki, Japan)</article-title>
          .
          <source>LREC</source>
          <year>2018</year>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref85">
        <mixed-citation>
          85.
          <string-name>
            <surname>Zimmerman</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thorpe</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chamberlain</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kruschwitz</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Towards search strategies for better privacy and information</article-title>
          .
          <source>In: Proceedings of the 2020 Conference on Human Information Interaction and Retrieval</source>
          . pp.
          <fpage>124</fpage>
          -
          <lpage>134</lpage>
          . CHIIR '
          <volume>20</volume>
          ,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref86">
        <mixed-citation>
          86.
          <string-name>
            <surname>Zimmerman</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thorpe</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fox</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kruschwitz</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Investigating the interplay between searchers' privacy concerns and their search behavior</article-title>
          .
          <source>In: Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval</source>
          . pp.
          <fpage>953</fpage>
          -
          <lpage>956</lpage>
          . SIGIR'19,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref87">
        <mixed-citation>
          87.
          <string-name>
            <surname>Zimmerman</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thorpe</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fox</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kruschwitz</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Privacy nudging in search: Investigating potential impacts</article-title>
          .
          <source>In: Proceedings of the 2019 Conference on Human Information Interaction and Retrieval</source>
          . pp.
          <fpage>283</fpage>
          -
          <lpage>287</lpage>
          . CHIIR '
          <volume>19</volume>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref88">
        <mixed-citation>
          88.
          <string-name>
            <surname>Zuboff</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Big other: surveillance capitalism and the prospects of an information civilization</article-title>
          .
          <source>Journal of Information Technology</source>
          <volume>30</volume>
          (
          <issue>1</issue>
          ),
          <fpage>75</fpage>
          -
          <lpage>89</lpage>
          (
          <year>Mar 2015</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>