Measuring the Emergence of Consent Management on the Web | Proceedings of the ACM Internet Measurement Conference (2024)

research-article

Authors: Maximilian Hils, Daniel W. Woods, and Rainer Böhme

IMC '20: Proceedings of the ACM Internet Measurement Conference

October 2020

Pages 317 - 332

Published: 27 October 2020 Publication History

  • 33citation
  • 963
  • Downloads

Metrics

Total Citations33Total Downloads963

Last 12 Months207

Last 6 weeks34

  • Get Citation Alerts

    New Citation Alert added!

    This alert has been successfully added and will be sent to:

    You will be notified whenever a record that you have chosen has been cited.

    To manage your alert preferences, click on the button below.

    Manage my Alerts

    New Citation Alert!

    Please log in to your account

  • Get Access

      • Get Access
      • References
      • Media
      • Tables
      • Share

    Abstract

    Privacy laws like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) have pushed internet firms processing personal data to obtain user consent. Uncertainty around sanctions for non-compliance led many websites to embed a Consent Management Provider (CMP), which collects users' consent and shares it with third-party vendors and other websites. Our paper maps the formation of this ecosystem using longitudinal measurements. Primary and secondary data sources are used to measure each actor within the ecosystem. Using 161 million browser crawls, we estimate that CMP adoption doubled from June 2018 to June 2019 and then doubled again until June 2020. Sampling 4.2 million unique domains, we observe that CMP adoption is most prevalent among moderately popular websites (Tranco top 50-10k) but a long tail exists. Using APIs from the ad-tech industry, we quantify the purposes and lawful bases used to justify processing personal data. A controlled experiment on a public website provides novel insights into how the time-to-complete of two leading CMPs' consent dialogues varies with the preferences expressed, showing how privacy aware users incur a significant time cost.

    References

    [1]

    Gunes Acar, Christian Eubank, Steven Englehardt, Marc Juarez, Arvind Narayanan, and Claudia Diaz. 2014. The Web Never Forgets: Persistent Tracking Mechanisms in the Wild. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14). ACM, 674--689. https://doi.org/10.1145/2660267.2660347

    Digital Library

    [2]

    Idris Adjerid, Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2013. Sleights of Privacy: Framing, Disclosures, and the Limits of Transparency. In Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS '13). ACM, Article 9, 11 pages. https://doi.org/10.1145/2501604.2501613

    Digital Library

    [3]

    John Perry Barlow. 1996. A Declaration of the Independence of Cyberspace.

    [4]

    Bettina Berendt, Oliver Günther, and Sarah Spiekermann. 2005. Privacy in ECommerce: Stated Preferences vs. Actual Behavior. Commun. ACM 48, 4 (April 2005), 101--106. https://doi.org/10.1145/1053291.1053295

    Digital Library

    [5]

    Rainer Böhme and Stefan Köpsell. 2010. Trained to Accept? A Field Experiment on Consent Dialogs. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10). ACM, 2403--2406. https://doi.org/10.1145/1753326.1753689

    Digital Library

    [6]

    Joseph Bonneau and Sören Preibusch. 2009. The Privacy Jungle: On the Market for Data Protection in Social Networks. In 8th Annual Workshop on the Economics of Information Security, WEIS. https://doi.org/10.1007/978-1-4419-6967-5_8

    [7]

    Aaron Ceross and Andrew Simpson. 2018. Rethinking the Proposition of Privacy Engineering. In Proceedings of the New Security Paradigms Workshop (NSPW '18). ACM, 89--102. https://doi.org/10.1145/3285002.3285006

    Digital Library

    [8]

    Richard Clayton, Tyler Moore, and Nicolas Christin. 2015. Concentrating Correctly on Cybercrime Concentration. In 14th Annual Workshop on the Economics of Information Security, WEIS.

    [9]

    Lorrie Faith Cranor. 2003. P3P: Making Privacy Policies More Useful. IEEE Security and Privacy 1, 6 (2003), 50--55. https://doi.org/10.1109/MSECP.2003.1253568

    Digital Library

    [10]

    Commission Nationale de l'Informatique et des Libertés (CNIL). 2019. Guidelines on cookies and tracking devices. https://www.cnil.fr/en/cookies-and-other-tracking-devices-cnil-publishes-new-guidelines

    [11]

    Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, and Thorsten Holz. 2019. We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy. In 26th Annual Network and Distributed System Security Symposium (NDSS '19). The Internet Society. https://doi.org/10.14722/ndss.2019.23378

    [12]

    Serge Egelman, Lorrie Faith Cranor, and Jason Hong. 2008. You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '08). ACM, 1065--1074. https://doi.org/10.1145/1357054.1357219

    Digital Library

    [13]

    Mozilla Foundation.2007--2020. Public Suffix List. https://publicsuffix.org/

    [14]

    Phillipa Gill, Vijay Erramilli, Augustin Chaintreau, Balachander Krishnamurthy, Konstantina Papagiannaki, and Pablo Rodriguez. 2013. Follow the Money: Understanding Economics of Online Aggregation and Advertising. In Proceedings of the 2013 Conference on Internet Measurement Conference (IMC '13). ACM, 141--148. https://doi.org/10.1145/2504730.2504768

    Digital Library

    [15]

    Tarleton Gillespie. 2010. The politics of 'platforms'. New Media & Society 12, 3 (2010), 347--364. https://doi.org/10.1177/1461444809342738

    [16]

    Hana Habib, Yixin Zou, Aditi Jannu, Neha Sridhar, Chelse Swoopes, Alessandro Acquisti, Lorrie Faith Cranor, Norman M. Sadeh, and Florian Schaub. 2019. An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites. In Fifteenth Symposium on Usable Privacy and Security (SOUPS '19). USENIX. https://www.usenix.org/conference/soups2019/presentation/habib

    [17]

    Elizabeth Liz Harding, Jarno J Vanto, Reece Clark, L Hannah Ji, and Sara C Ainsworth. 2019. Understanding the scope and impact of the California Consumer Privacy Act of 2018. Journal of Data Protection & Privacy 2, 3 (2019), 234--253.

    [18]

    Soheil Human and Florian Cech. 2021. A Human-centric Perspective on Digital Consenting: The Case of GAFAM. In Human Centred Intelligent Systems. Springer, 139--159. https://doi.org/10.1007/978-981-15-5784-2_12

    [19]

    IAB Europe. 2020. CMP List. https://iabeurope.eu/cmp-list/

    [20]

    IAB Europe. 2020. What is the Transparency and Consent Framework (TCF)? https://iabeurope.eu/transparency-consent-framework/

    [21]

    Muhammad Ikram, Narseo Vallina-Rodriguez, Suranga Seneviratne, Mohamed Ali Kaafar, and Vern Paxson. 2016. An Analysis of the Privacy and Security Risks of Android VPN Permission-Enabled Apps. In Proceedings of the 2016 Internet Measurement Conference (IMC '16). ACM, 349--364. https://doi.org/10.1145/2987443.2987471

    Digital Library

    [22]

    Costas Iordanou, Georgios Smaragdakis, Ingmar Poese, and Nikolaos Laoutaris. 2018. Tracing Cross Border Web Tracking. In Proceedings of the Internet Measurement Conference 2018 (IMC '18). ACM, 329--342. https://doi.org/10.1145/3278532.3278561

    Digital Library

    [23]

    Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara B. Kiesler. 2015. "My Data Just Goes Everywhere:" User Mental Models of the Internet and Implications for Privacy and Security. In Eleventh Symposium On Usable Privacy and Security (SOUPS '15). USENIX, 39--52. https://www.usenix.org/conference/soups2015/proceedings/presentation/kang

    [24]

    Farzaneh Karegar, John Sören Pettersson, and Simone Fischer-Hübner. 2020. The Dilemma of User Engagement in Privacy Notices: Effects of Interaction Modes and Habituation on User Attention. ACM Transactions on Privacy and Security 23, 1 (2020), 5:1--5:38. https://doi.org/10.1145/3372296

    Digital Library

    [25]

    Mohammad Taha Khan, Joe DeBlasio, Geoffrey M. Voelker, Alex C. Snoeren, Chris Kanich, and Narseo Vallina-Rodriguez. 2018. An Empirical Analysis of the Commercial VPN Ecosystem. In Proceedings of the Internet Measurement Conference 2018 (IMC '18). ACM, 443--456. https://doi.org/10.1145/3278532.3278570

    Digital Library

    [26]

    David M. Kristol. 2001. HTTP Cookies: Standards, privacy, and politics. ACM Transactions on Internet Technology 1, 2 (2001), 151--198. https://doi.org/10.1145/502152.502153

    Digital Library

    [27]

    Ponnurangam Kumaraguru, Lorrie Cranor, Jorge Lobo, and Seraphin Calo. 2007. A Survey of Privacy Policy Languages. In Workshop on Usable IT Security Management: 3rd Symposium on Usable Privacy and Security, ACM (USM '07).

    [28]

    Yee-Lin Lai and Kai-Lung Hui. 2006. Internet Opt-in and Opt-out: Investigating the Roles of Frames, Defaults and Privacy Concerns. In Proceedings of the 2006 ACM SIGMIS CPR Conference on Computer Personnel Research (SIGMIS CPR '06). ACM, 253--263. https://doi.org/10.1145/1125170.1125230

    Digital Library

    [29]

    Pierre Laperdrix, Nataliia Bielova, Benoit Baudry, and Gildas Avoine. 2020. Browser Fingerprinting: A Survey. ACM Transactions on the Web 14, 2, Article 8 (April 2020), 33 pages. https://doi.org/10.1145/3386040

    Digital Library

    [30]

    Dominique Machuletz and Rainer Böhme. 2020. Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPR. Proceedings on Privacy Enhancing Technologies 2, 481--498. https://doi.org/10.2478/popets-2020-0037

    [31]

    Samin Yaseer Mahmud, Akhil Acharya, Benjamin Andow, William Enck, and Bradley Reaves. 2020. Cardpliance: PCI DSS Compliance of Android Applications. In 29th USENIX Security Symposium (USENIX '20).1517--1533. https://www.usenix.org/conference/usenixsecurity20/presentation/mahmud

    [32]

    Célestin Matte, Nataliia Bielova, and Cristiana Santos. 2020. Do Cookie Banners Respect my Choice? Measuring Legal Compliance of Banners from IAB Europe's Transparency and Consent Framework. In 2020 IEEE Symposium on Security and Privacy. IEEE, 791--809. https://doi.org/10.1109/SP40000.2020.00076

    [33]

    Célestin Matte, Cristiana Santos, and Nataliia Bielova. 2020. Purposes in IAB Europe's TCF: which legal basis and how are they used by advertisers?. In Annual Privacy Forum (APF 2020).

    [34]

    Jonathan R. Mayer and John C. Mitchell. 2012. Third-Party Web Tracking: Policy and Technology. In 2012 IEEE Symposium on Security and Privacy. IEEE, 413--427. https://doi.org/10.1109/SP.2012.47

    [35]

    Damon McCoy, Hitesh Dharmdasani, Christian Kreibich, Geoffrey M. Voelker, and Stefan Savage. 2012. Priceless: The Role of Payments in Abuse-Advertised Goods. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS '12). ACM, 845--856. https://doi.org/10.1145/2382196.2382285

    Digital Library

    [36]

    Aleecia M McDonald and Lorrie Faith Cranor. 2008. The cost of reading privacy policies. Journal of Law and Policy for the Information Society 4 (2008), 543.

    [37]

    Lynette I. Millett, Batya Friedman, and Edward Felten. 2001. Cookies and Web Browser Design: Toward Realizing Informed Consent Online. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '01). ACM, 46--52. https://doi.org/10.1145/365024.365034

    Digital Library

    [38]

    Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, and Giovanni Vigna. 2013. Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting. In 2013 IEEE Symposium on Security and Privacy. IEEE, 541--555. https://doi.org/10.1109/SP.2013.43

    [39]

    Midas Nouwens, Ilaria Liccardi, Michael Veale, David Karger, and Lalana Kagal. 2020. Dark Patterns after the GDPR: Scraping Consent Pop-Ups and Demonstrating Their Influence. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI '20). ACM, 1--13. https://doi.org/10.1145/3313831.3376321

    Digital Library

    [40]

    Judith S. Olson, Jonathan Grudin, and Eric Horvitz. 2005. A Study of Preferences for Sharing and Privacy. In CHI '05 Extended Abstracts on Human Factors in Computing Systems. ACM, 1985--1988. https://doi.org/10.1145/1056808.1057073

    Digital Library

    [41]

    Mark O'Neill, Elham Vaziripour, Justin Wu, and Daniel Zappala. 2016. Condensing Steam: Distilling the Diversity of Gamer Behavior. In Proceedings of the 2016 Internet Measurement Conference (IMC '16). ACM, 81--95. https://doi.org/10.1145/2987443.2987489

    Digital Library

    [42]

    Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, and Nicolas Kourtellis. 2019. No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem. In Proceedings of the Internet Measurement Conference (IMC '19). ACM, 280--293. https://doi.org/10.1145/3355369.3355582

    Digital Library

    [43]

    Panagiotis Papadopoulos, Nicolas Kourtellis, Pablo Rodriguez Rodriguez, and Nikolaos Laoutaris. 2017. If You Are Not Paying for It, You Are the Product: How Much Do Advertisers Pay to Reach You?. In Proceedings of the 2017 Internet Measurement Conference (IMC '17). ACM, 142--156. https://doi.org/10.1145/3131365.3131397

    Digital Library

    [44]

    Victor Le Pochat, Tom van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczynski, and Wouter Joosen. 2019. Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. In 26th Annual Network and Distributed System Security Symposium (NDSS '19). The Internet Society. https://doi.org/10.14722/ndss.2019.23386

    [45]

    Enric Pujol, Oliver Hohlfeld, and Anja Feldmann. 2015. Annoyed Users: Ads and Ad-Block Usage in the Wild. In Proceedings of the 2015 Internet Measurement Conference (IMC '15). ACM, 93--106. https://doi.org/10.1145/2815675.2815705

    Digital Library

    [46]

    Sazzadur Rahaman, Gang Wang, and Danfeng (Daphne) Yao. 2019. Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS '19). ACM, 481--498. https://doi.org/10.1145/3319535.3363195

    Digital Library

    [47]

    Hana Ross. 2017. Data subject consent: How will the General Data Protection Regulation affect this? Journal of Data Protection & Privacy 1, 2 (2017), 146--155.

    [48]

    Iskander Sanchez-Rola, Matteo Dell'Amico, Platon Kotzias, Davide Balzarotti, Leyla Bilge, Pierre-Antoine Vervier, and Igor Santos. 2019. Can I Opt Out Yet? GDPR and the Global Illusion of Cookie Control. In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security (Asia CCS '19). ACM, 340--351. https://doi.org/10.1145/3321705.3329806

    Digital Library

    [49]

    Quirin Scheitle, Oliver Hohlfeld, Julien Gamba, Jonas Jelten, Torsten Zimmermann, Stephen D. Strowes, and Narseo Vallina-Rodriguez. 2018. A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists. In Proceedings of the Internet Measurement Conference 2018 (IMC '18). ACM, 478--493. https://doi.org/10.1145/3278532.3278574

    Digital Library

    [50]

    Jannick Sørensen and Sokol Kosta. 2019. Before and After GDPR: The Changes in Third Party Presence at Public and Private European Websites. In The World Wide Web Conference (WWW '19). ACM, 1590--1600. https://doi.org/10.1145/3308558.3313524

    Digital Library

    [51]

    Sarah Spiekermann, Alessandro Acquisti, Rainer Böhme, and Kai Lung Hui. 2015. The challenges of personal data markets and privacy. Electronic Markets 25, 2 (2015), 161--167. https://doi.org/10.1007/s12525-015-0191-0

    [52]

    Samaneh Tajalizadehkhoob, Tom Van Goethem, Maciej Korczyński, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, and Michel van Eeten. 2017. Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS '17). ACM, 553--567. https://doi.org/10.1145/3133956.3133971

    Digital Library

    [53]

    Martino Trevisan, Stefano Traverso, Eleonora Bassi, and Marco Mellia. 2019. 4 Years of EU Cookie Law: Results and Lessons Learned. Proceedings on Privacy Enhancing Technologies 2019, 2 (2019), 126--145. https://doi.org/10.2478/popets-2019-0023

    [54]

    Blase Ur, Pedro Giovanni Leon, Lorrie Faith Cranor, Richard Shay, and Yang Wang. 2012. Smart, Useful, Scary, Creepy: Perceptions of Online Behavioral Advertising. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12). ACM, Article 4, 15 pages. https://doi.org/10.1145/2335356.2335362

    Digital Library

    [55]

    Tobias Urban, Martin Degeling, Thorsten Holz, and Norbert Pohlmann. 2020. Beyond the Front Page: Measuring Third Party Dynamics in the Field. In Proceedings of The Web Conference 2020 (WWW '20). ACM, 1275--1286. https://doi.org/10.1145/3366423.3380203

    Digital Library

    [56]

    Christine Utz, Martin Degeling, Sascha Fahl, Florian Schaub, and Thorsten Holz. 2019. (Un)informed Consent: Studying GDPR Consent Notices in the Field. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS '19). ACM, 973--990. https://doi.org/10.1145/3319535.3354212

    Digital Library

    [57]

    Pelayo Vallina, Álvaro Feal, Julien Gamba, Narseo Vallina-Rodriguez, and Antonio Fernández Anta. 2019. Tales from the p*rn: A Comprehensive Privacy Analysis of the Web p*rn Ecosystem. In Proceedings of the Internet Measurement Conference (IMC '19). ACM, 245--258. https://doi.org/10.1145/3355369.3355583

    Digital Library

    [58]

    Rob Van Eijk, Hadi Asghari, Philipp Winter, and Arvind Narayanan. 2019. The Impact of User Location on Cookie Notices (Inside and Outside of the European Union). In Workshop on Technology and Consumer Protection (ConPro'19).

    [59]

    Anthony Vance, David Eargle, Jeffrey L. Jenkins, C. Brock Kirwan, and Bonnie Brinton Anderson. 2019. The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings. In Fifteenth Symposium on Usable Privacy and Security (SOUPS '19). USENIX. https://www.usenix.org/conference/soups2019/presentation/vance

    [60]

    Daniel W Woods and Rainer Böhme. 2020. The Commodification of Consent. In 20th Annual Workshop on the Economics of Information Security, WEIS.

    [61]

    Scott A Wright and Guang-Xin Xie. 2019. Perceived Privacy Violation: Exploring the Malleability of Privacy Expectations. Journal of Business Ethics 156, 1 (2019), 123--140. https://doi.org/10.1007/s10551-017-3553-z

    [62]

    Savvas Zannettou, Tristan Caulfield, Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, and Guillermo Suarez-Tangil. 2018. On the Origins of Memes by Means of Fringe Web Communities. In Proceedings of the Internet Measurement Conference 2018 (IMC '18). ACM, 188--202. https://doi.org/10.1145/3278532.3278550

    Digital Library

    [63]

    Savvas Zannettou, Tristan Caulfield, Emiliano De Cristofaro, Nicolas Kourtelris, Ilias Leontiadis, Michael Sirivianos, Gianluca Stringhini, and Jeremy Blackburn. 2017. The Web Centipede: Understanding How Web Communities Influence Each Other through the Lens of Mainstream and Alternative News Sources. In Proceedings of the 2017 Internet Measurement Conference (IMC '17). ACM, 405--417. https://doi.org/10.1145/3131365.3131390

    Digital Library

    Cited By

    View all

    • Porcelli LMastroianni MFicco MPalmieri F(2024)A User-Centered Privacy Policy Management System for Automatic Consent on Cookie BannersComputers10.3390/computers1302004313:2(43)Online publication date: 1-Feb-2024
    • Kyi L(2024)Reimagining Online Consent for More Responsible and Human-Centred Data CollectionExtended Abstracts of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613905.3651129(1-3)Online publication date: 11-May-2024

      https://dl.acm.org/doi/10.1145/3613905.3651129

    • Kyi LMhaidli ASantos CRoesner FBiega A(2024)“It doesn’t tell me anything about how my data is used”: User Perceptions of Data Collection PurposesProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642260(1-12)Online publication date: 11-May-2024

      https://dl.acm.org/doi/10.1145/3613904.3642260

    • Show More Cited By

    Index Terms

    1. Measuring the Emergence of Consent Management on the Web

      1. Information systems

        1. World Wide Web

          1. Online advertising

        2. Networks

          1. Network performance evaluation

            1. Network measurement

          2. Security and privacy

            1. Human and societal aspects of security and privacy

              1. Privacy protections

                1. Usability in security and privacy

            Recommendations

            • (Un)informed Consent: Studying GDPR Consent Notices in the Field

              CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security

              Since the adoption of the General Data Protection Regulation (GDPR) in May 2018 more than 60 % of popular websites in Europe display cookie consent notices to their visitors. This has quickly led to users becoming fatigued with privacy notifications and ...

              Read More

            • The crisis of consent: how stronger legal protection may lead to weaker consent in data protection

              In this article we examine the effectiveness of consent in data protection legislation. We argue that the current legal framework for consent, which has its basis in the idea of autonomous authorisation, does not work in practice. In practice the legal ...

              Read More

            • Authenticated and Privacy-Preserving Consent Management in the Internet of Things

              Abstract

              As the Internet of Things (IoT) starts providing meaningful solutions in multiple domains, users expect to take full advantage of the features and benefits of smart devices, but not at the cost of privacy loss. They want to keep control over their ...

              Read More

            Comments

            Information & Contributors

            Information

            Published In

            Measuring the Emergence of Consent Management on the Web | Proceedings of the ACM Internet Measurement Conference (4)

            IMC '20: Proceedings of the ACM Internet Measurement Conference

            October 2020

            751 pages

            ISBN:9781450381383

            DOI:10.1145/3419394

            Copyright © 2020 ACM.

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [emailprotected].

            Sponsors

            • SIGMETRICS: ACM Special Interest Group on Measurement and Evaluation
            • SIGCOMM: ACM Special Interest Group on Data Communication

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            Published: 27 October 2020

            Permissions

            Request permissions for this article.

            Check for updates

            Author Tags

            1. CCPA
            2. GDPR
            3. consent
            4. privacy
            5. web measurement

            Qualifiers

            • Research-article
            • Research
            • Refereed limited

            Funding Sources

            Conference

            IMC '20

            Sponsor:

            • SIGMETRICS
            • SIGCOMM

            IMC '20: ACM Internet Measurement Conference

            October 27 - 29, 2020

            Virtual Event, USA

            Acceptance Rates

            IMC '20 Paper Acceptance Rate 53 of 216 submissions, 25%;

            Overall Acceptance Rate 277 of 1,083 submissions, 26%

            More

            Upcoming Conference

            IMC '24

            • Sponsor:
            • sigcomm
            • sigcomm

            ACM Internet Measurement Conference

            November 4 - 6, 2024

            Madrid , AA , Spain

            Contributors

            Measuring the Emergence of Consent Management on the Web | Proceedings of the ACM Internet Measurement Conference (5)

            Other Metrics

            View Article Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • 33

              Total Citations

              View Citations
            • 963

              Total Downloads

            • Downloads (Last 12 months)207
            • Downloads (Last 6 weeks)34

            Other Metrics

            View Author Metrics

            Citations

            Cited By

            View all

            • Porcelli LMastroianni MFicco MPalmieri F(2024)A User-Centered Privacy Policy Management System for Automatic Consent on Cookie BannersComputers10.3390/computers1302004313:2(43)Online publication date: 1-Feb-2024
            • Kyi L(2024)Reimagining Online Consent for More Responsible and Human-Centred Data CollectionExtended Abstracts of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613905.3651129(1-3)Online publication date: 11-May-2024

              https://dl.acm.org/doi/10.1145/3613905.3651129

            • Kyi LMhaidli ASantos CRoesner FBiega A(2024)“It doesn’t tell me anything about how my data is used”: User Perceptions of Data Collection PurposesProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642260(1-12)Online publication date: 11-May-2024

              https://dl.acm.org/doi/10.1145/3613904.3642260

            • Radway SQuintanilla KLudden CVotipka D(2024)An Investigation of US Universities' Implementation of FERPA Student Directory Policies and Student Privacy PreferencesProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642066(1-35)Online publication date: 11-May-2024

              https://dl.acm.org/doi/10.1145/3613904.3642066

            • Smith MTorres-Agüero AGrossman RSen PChen YBorcea CChua TNgo CKa-Wei Lee RKumar RLauw H(2024)A Study of GDPR Compliance under the Transparency and Consent FrameworkProceedings of the ACM on Web Conference 202410.1145/3589334.3645618(1227-1236)Online publication date: 13-May-2024

              https://dl.acm.org/doi/10.1145/3589334.3645618

            • Li WXiong BYang C(2024) A roadmap to achieving a healthier information ecosystem through GDPR implementation and privacy compliance technologies Journal of the Association for Information Science and Technology10.1002/asi.24878Online publication date: 28-Feb-2024
            • Khandelwal RNayak AHarkous HFawaz KCalandrino JTroncoso C(2023)Automated cookie notice analysis and enforcementProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620300(1109-1126)Online publication date: 9-Aug-2023

              https://dl.acm.org/doi/10.5555/3620237.3620300

            • Khalid MAhmed MKim J(2023)Enhancing Data Protection in Dynamic Consent Management Systems: Formalizing Privacy and Security Definitions with Differential Privacy, Decentralization, and Zero-Knowledge ProofsSensors10.3390/s2317760423:17(7604)Online publication date: 1-Sep-2023
            • Khalid MAhmed MHelfert MKim J(2023)Privacy-First Paradigm for Dynamic Consent Management Systems: Empowering Data Subjects through Decentralized Data Controllers and Privacy-Preserving TechniquesElectronics10.3390/electronics1224497312:24(4973)Online publication date: 12-Dec-2023
            • Jha NTrevisan MMellia MIrarrazaval RFernandez D(2023)I Refuse if You Let Me: Studying User Behavior with Privacy Banners at Scale2023 7th Network Traffic Measurement and Analysis Conference (TMA)10.23919/TMA58422.2023.10198936(1-9)Online publication date: 26-Jun-2023
            • Show More Cited By

            View Options

            Get Access

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            Get this Publication

            View options

            PDF

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            Media

            Figures

            Other

            Tables

            Measuring the Emergence of Consent Management on the Web | Proceedings of the ACM Internet Measurement Conference (2024)

            References

            Top Articles
            Latest Posts
            Article information

            Author: Zonia Mosciski DO

            Last Updated:

            Views: 6324

            Rating: 4 / 5 (51 voted)

            Reviews: 90% of readers found this page helpful

            Author information

            Name: Zonia Mosciski DO

            Birthday: 1996-05-16

            Address: Suite 228 919 Deana Ford, Lake Meridithberg, NE 60017-4257

            Phone: +2613987384138

            Job: Chief Retail Officer

            Hobby: Tai chi, Dowsing, Poi, Letterboxing, Watching movies, Video gaming, Singing

            Introduction: My name is Zonia Mosciski DO, I am a enchanting, joyous, lovely, successful, hilarious, tender, outstanding person who loves writing and wants to share my knowledge and understanding with you.