
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Charting App Developers’ Journey Through Privacy Regulation Features in Ad Networks
Mohammad Tahaei, Kopo M. Ramokapane, Tianshi Li, et al.
Proceedings on Privacy Enhancing Technologies (2022) Vol. 2022, Iss. 3, pp. 33-56
Open Access | Times Cited: 16
Mohammad Tahaei, Kopo M. Ramokapane, Tianshi Li, et al.
Proceedings on Privacy Enhancing Technologies (2022) Vol. 2022, Iss. 3, pp. 33-56
Open Access | Times Cited: 16
Showing 16 citing articles:
Developers Say the Darnedest Things: Privacy Compliance Processes Followed by Developers of Child-Directed Apps
Noura Alomar, Serge Egelman
Proceedings on Privacy Enhancing Technologies (2022) Vol. 2022, Iss. 4, pp. 250-273
Open Access | Times Cited: 24
Noura Alomar, Serge Egelman
Proceedings on Privacy Enhancing Technologies (2022) Vol. 2022, Iss. 4, pp. 250-273
Open Access | Times Cited: 24
Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites
Christine Utz, Sabrina Amft, Martin Degeling, et al.
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2023, Iss. 1, pp. 5-28
Open Access | Times Cited: 14
Christine Utz, Sabrina Amft, Martin Degeling, et al.
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2023, Iss. 1, pp. 5-28
Open Access | Times Cited: 14
Matcha
Tianshi Li, Lorrie Faith Cranor, Yuvraj Agarwal, et al.
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2024) Vol. 8, Iss. 1, pp. 1-38
Open Access | Times Cited: 4
Tianshi Li, Lorrie Faith Cranor, Yuvraj Agarwal, et al.
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2024) Vol. 8, Iss. 1, pp. 1-38
Open Access | Times Cited: 4
The Role of Human-Centered AI in User Modeling, Adaptation, and Personalization—Models, Frameworks, and Paradigms
Helma Torkamaan, Mohammad Tahaei, Stefan Buijsman, et al.
Human-computer interaction series (2024), pp. 43-84
Closed Access | Times Cited: 3
Helma Torkamaan, Mohammad Tahaei, Stefan Buijsman, et al.
Human-computer interaction series (2024), pp. 43-84
Closed Access | Times Cited: 3
Embedding Privacy Into Design Through Software Developers: Challenges and Solutions
Mohammad Tahaei, Kami Vaniea, Awais Rashid
IEEE Security & Privacy (2022) Vol. 21, Iss. 1, pp. 49-57
Open Access | Times Cited: 12
Mohammad Tahaei, Kami Vaniea, Awais Rashid
IEEE Security & Privacy (2022) Vol. 21, Iss. 1, pp. 49-57
Open Access | Times Cited: 12
“Track every move”: Analyzing developers’ privacy discourse in GitHub README files
Keren Levi-Eshkol, Rivka Ribak
New Media & Society (2024)
Open Access | Times Cited: 2
Keren Levi-Eshkol, Rivka Ribak
New Media & Society (2024)
Open Access | Times Cited: 2
SoK: Technical Implementation and Human Impact of Internet Privacy Regulations
Eleanor Birrell, Jay Rodolitz, A. Adam Ding, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 673-696
Closed Access | Times Cited: 2
Eleanor Birrell, Jay Rodolitz, A. Adam Ding, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 673-696
Closed Access | Times Cited: 2
A Narrative Review of Factors Affecting the Implementation of Privacy and Security Practices in Software Development
Leysan Nurgalieva, Alisa Frik, Gavin Doherty
ACM Computing Surveys (2023) Vol. 55, Iss. 14s, pp. 1-27
Open Access | Times Cited: 6
Leysan Nurgalieva, Alisa Frik, Gavin Doherty
ACM Computing Surveys (2023) Vol. 55, Iss. 14s, pp. 1-27
Open Access | Times Cited: 6
“Those things are written by lawyers, and programmers are reading that.” Mapping the Communication Gap Between Software Developers and Privacy Experts
Stefan Albert Horstmann, Samuel Domiks, Marco Gutfleisch, et al.
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2024, Iss. 1, pp. 151-170
Open Access | Times Cited: 6
Stefan Albert Horstmann, Samuel Domiks, Marco Gutfleisch, et al.
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2024, Iss. 1, pp. 151-170
Open Access | Times Cited: 6
How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Notification Study Reveals Diverse Circumstances and Challenges
Alina Stöver, Nina Gerber, Henning Pridöhl, et al.
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2023, Iss. 2, pp. 251-264
Open Access | Times Cited: 5
Alina Stöver, Nina Gerber, Henning Pridöhl, et al.
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2023, Iss. 2, pp. 251-264
Open Access | Times Cited: 5
Privacy, Permissions, and the Health App Ecosystem: A Stack Overflow Exploration
Mohammad Tahaei, Julia Bernd, Awais Rashid
(2022), pp. 117-130
Open Access | Times Cited: 8
Mohammad Tahaei, Julia Bernd, Awais Rashid
(2022), pp. 117-130
Open Access | Times Cited: 8
ExD: Explainable Deletion
Kopo M. Ramokapane, Awais Rashid
New Security Paradigms Workshop (2023), pp. 34-47
Open Access | Times Cited: 1
Kopo M. Ramokapane, Awais Rashid
New Security Paradigms Workshop (2023), pp. 34-47
Open Access | Times Cited: 1
Advocating a Policy Push Toward Inclusive and Secure “Digital-First” Societies
Partha Das Chowdhury, Karen Renaud
IEEE Security & Privacy (2024) Vol. 22, Iss. 5, pp. 23-31
Closed Access
Partha Das Chowdhury, Karen Renaud
IEEE Security & Privacy (2024) Vol. 22, Iss. 5, pp. 23-31
Closed Access
Measuring Compliance Implications of Third-party Libraries' Privacy Label Disclosure Guidelines
Yue Xiao, C. H. Zhang, Yue Qin, et al.
(2024), pp. 1641-1655
Open Access
Yue Xiao, C. H. Zhang, Yue Qin, et al.
(2024), pp. 1641-1655
Open Access
“A method like this would be overkill”: Developers’ Perceived Issues with Privacy-preserving Computation Methods
Patrick Kühtreiber, Viktoriya Pak, Delphine Reinhardt
(2023), pp. 1041-1048
Closed Access
Patrick Kühtreiber, Viktoriya Pak, Delphine Reinhardt
(2023), pp. 1041-1048
Closed Access
Enhancing Transparency and Accountability of TPLs with PBOM: A Privacy Bill of Materials
Yue Xiao, Adwait Nadkarni, Xiaojing Liao
(2023), pp. 1-11
Closed Access
Yue Xiao, Adwait Nadkarni, Xiaojing Liao
(2023), pp. 1-11
Closed Access