
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
“Developers Are Responsible”: What Ad Networks Tell Developers About Privacy
Mohammad Tahaei, Kami Vaniea
(2021), pp. 1-11
Open Access | Times Cited: 27
Mohammad Tahaei, Kami Vaniea
(2021), pp. 1-11
Open Access | Times Cited: 27
Showing 1-25 of 27 citing articles:
Recruiting Participants With Programming Skills: A Comparison of Four Crowdsourcing Platforms and a CS Student Mailing List
Mohammad Tahaei, Kami Vaniea
CHI Conference on Human Factors in Computing Systems (2022)
Open Access | Times Cited: 31
Mohammad Tahaei, Kami Vaniea
CHI Conference on Human Factors in Computing Systems (2022)
Open Access | Times Cited: 31
Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications
Mohammad Tahaei, Ruba Abu-Salma, Awais Rashid
(2023), pp. 1-24
Open Access | Times Cited: 22
Mohammad Tahaei, Ruba Abu-Salma, Awais Rashid
(2023), pp. 1-24
Open Access | Times Cited: 22
Unveiling Digital Manipulation and Persuasion in e-Commerce: A Systematic Literature Review of Dark Patterns and Digital Nudging
Vibhav Singh, Niraj Kumar Vishvakarma, Vinod Kumar
Journal of Internet Commerce (2024) Vol. 23, Iss. 2, pp. 144-171
Closed Access | Times Cited: 8
Vibhav Singh, Niraj Kumar Vishvakarma, Vinod Kumar
Journal of Internet Commerce (2024) Vol. 23, Iss. 2, pp. 144-171
Closed Access | Times Cited: 8
Understanding Privacy-Related Advice on Stack Overflow
Mohammad Tahaei, Tianshi Li, Kami Vaniea
Proceedings on Privacy Enhancing Technologies (2022) Vol. 2022, Iss. 2, pp. 114-131
Open Access | Times Cited: 28
Mohammad Tahaei, Tianshi Li, Kami Vaniea
Proceedings on Privacy Enhancing Technologies (2022) Vol. 2022, Iss. 2, pp. 114-131
Open Access | Times Cited: 28
Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites
Christine Utz, Sabrina Amft, Martin Degeling, et al.
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2023, Iss. 1, pp. 5-28
Open Access | Times Cited: 14
Christine Utz, Sabrina Amft, Martin Degeling, et al.
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2023, Iss. 1, pp. 5-28
Open Access | Times Cited: 14
Profit over principles: unveiling the motivating factors behind dark patterns in e-commerce through the lens of agency theory
Vibhav Singh, Niraj Kumar Vishvakarma, Vinod Kumar
Journal of Enterprise Information Management (2025)
Closed Access
Vibhav Singh, Niraj Kumar Vishvakarma, Vinod Kumar
Journal of Enterprise Information Management (2025)
Closed Access
Charting App Developers’ Journey Through Privacy Regulation Features in Ad Networks
Mohammad Tahaei, Kopo M. Ramokapane, Tianshi Li, et al.
Proceedings on Privacy Enhancing Technologies (2022) Vol. 2022, Iss. 3, pp. 33-56
Open Access | Times Cited: 16
Mohammad Tahaei, Kopo M. Ramokapane, Tianshi Li, et al.
Proceedings on Privacy Enhancing Technologies (2022) Vol. 2022, Iss. 3, pp. 33-56
Open Access | Times Cited: 16
Helping Mobile Application Developers Create Accurate Privacy Labels
Jack Gardner, Yuanyuan Feng, Kayla Reiman, et al.
(2022), pp. 212-230
Closed Access | Times Cited: 15
Jack Gardner, Yuanyuan Feng, Kayla Reiman, et al.
(2022), pp. 212-230
Closed Access | Times Cited: 15
Embedding Privacy Into Design Through Software Developers: Challenges and Solutions
Mohammad Tahaei, Kami Vaniea, Awais Rashid
IEEE Security & Privacy (2022) Vol. 21, Iss. 1, pp. 49-57
Open Access | Times Cited: 12
Mohammad Tahaei, Kami Vaniea, Awais Rashid
IEEE Security & Privacy (2022) Vol. 21, Iss. 1, pp. 49-57
Open Access | Times Cited: 12
How Can We Design Privacy-Friendly Apps for Children? Using a Research through Design Process to Understand Developers' Needs and Challenges
Anirudh Ekambaranathan, Jun Zhao, Max Van Kleek
Proceedings of the ACM on Human-Computer Interaction (2023) Vol. 7, Iss. CSCW2, pp. 1-29
Open Access | Times Cited: 7
Anirudh Ekambaranathan, Jun Zhao, Max Van Kleek
Proceedings of the ACM on Human-Computer Interaction (2023) Vol. 7, Iss. CSCW2, pp. 1-29
Open Access | Times Cited: 7
Encoding Privacy: Sociotechnical Dynamics of Data Protection Compliance Work
Rohan Grover
(2024), pp. 1-13
Open Access | Times Cited: 2
Rohan Grover
(2024), pp. 1-13
Open Access | Times Cited: 2
SoK: Technical Implementation and Human Impact of Internet Privacy Regulations
Eleanor Birrell, Jay Rodolitz, A. Adam Ding, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 673-696
Closed Access | Times Cited: 2
Eleanor Birrell, Jay Rodolitz, A. Adam Ding, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 673-696
Closed Access | Times Cited: 2
Navigating the Data Avalanche
Anirudh Ekambaranathan, Jun Zhao, George Chalhoub
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2023) Vol. 7, Iss. 2, pp. 1-24
Closed Access | Times Cited: 6
Anirudh Ekambaranathan, Jun Zhao, George Chalhoub
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2023) Vol. 7, Iss. 2, pp. 1-24
Closed Access | Times Cited: 6
DarkDialogs: Automated detection of 10 dark patterns on cookie dialogs
Daniel Kirkman, Kami Vaniea, Daniel Woods
(2023), pp. 847-867
Open Access | Times Cited: 6
Daniel Kirkman, Kami Vaniea, Daniel Woods
(2023), pp. 847-867
Open Access | Times Cited: 6
“Those things are written by lawyers, and programmers are reading that.” Mapping the Communication Gap Between Software Developers and Privacy Experts
Stefan Albert Horstmann, Samuel Domiks, Marco Gutfleisch, et al.
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2024, Iss. 1, pp. 151-170
Open Access | Times Cited: 6
Stefan Albert Horstmann, Samuel Domiks, Marco Gutfleisch, et al.
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2024, Iss. 1, pp. 151-170
Open Access | Times Cited: 6
Emerging Transdisciplinary Perspectives to Confront Dark Patterns
Colin M. Gray, Shruthi Sai Chivukula, Kerstin Bongard-Blanchy, et al.
(2023), pp. 1-4
Closed Access | Times Cited: 3
Colin M. Gray, Shruthi Sai Chivukula, Kerstin Bongard-Blanchy, et al.
(2023), pp. 1-4
Closed Access | Times Cited: 3
This Sneaky Piggy Went to the Android Ad Market: Misusing Mobile Sensors for Stealthy Data Exfiltration
Michalis Diamantaris, Serafeim Moustakas, Lichao Sun, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2021), pp. 1065-1081
Open Access | Times Cited: 7
Michalis Diamantaris, Serafeim Moustakas, Lichao Sun, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2021), pp. 1065-1081
Open Access | Times Cited: 7
On the Analysis of MUD-Files’ Interactions, Conflicts, and Configuration Requirements Before Deployment
Vafa Andalibi, Eliot Lear, DongInn Kim, et al.
EAI/Springer Innovations in Communication and Computing (2022), pp. 137-157
Closed Access | Times Cited: 5
Vafa Andalibi, Eliot Lear, DongInn Kim, et al.
EAI/Springer Innovations in Communication and Computing (2022), pp. 137-157
Closed Access | Times Cited: 5
Overview of Usable Privacy Research: Major Themes and Research Directions
Simone Fischer‐Hübner, Farzaneh Karegar
Synthesis lectures on information security, privacy, and trust (2024), pp. 43-102
Closed Access
Simone Fischer‐Hübner, Farzaneh Karegar
Synthesis lectures on information security, privacy, and trust (2024), pp. 43-102
Closed Access
COVID-19 Mobile Applications: A Study of Trackers and Data Leaks
Nicolás Serrano, Gustavo Betarte, Juan Diego Campo
Journal of Internet Services and Applications (2024) Vol. 15, Iss. 1, pp. 139-159
Open Access
Nicolás Serrano, Gustavo Betarte, Juan Diego Campo
Journal of Internet Services and Applications (2024) Vol. 15, Iss. 1, pp. 139-159
Open Access
Toward Regulatory Compliance: A few-shot Learning Approach to Extract Processing Activities
K C Pragyan, Rambod Ghandiparsi, Rocky Slavin, et al.
(2024), pp. 241-250
Open Access
K C Pragyan, Rambod Ghandiparsi, Rocky Slavin, et al.
(2024), pp. 241-250
Open Access
The role of online communities in supporting mental health during the COVID-19 pandemic
Chengcheng Qu, Renwen Zhang
XRDS Crossroads The ACM Magazine for Students (2021) Vol. 28, Iss. 1, pp. 38-41
Closed Access | Times Cited: 1
Chengcheng Qu, Renwen Zhang
XRDS Crossroads The ACM Magazine for Students (2021) Vol. 28, Iss. 1, pp. 38-41
Closed Access | Times Cited: 1
"We are a startup to the core": A qualitative interview study on the security and privacy development practices in Turkish software startups
Dilara Keküllüoğlu, Yasemin Acar
2022 IEEE Symposium on Security and Privacy (SP) (2023), pp. 2015-2031
Open Access
Dilara Keküllüoğlu, Yasemin Acar
2022 IEEE Symposium on Security and Privacy (SP) (2023), pp. 2015-2031
Open Access
5th International Conference on Advanced Research Methods and Analytics (CARMA 2023)
CARMA Scientific Committee, María del Rocío Martínez Torres, S. L. Toral
(2023)
Open Access
CARMA Scientific Committee, María del Rocío Martínez Torres, S. L. Toral
(2023)
Open Access