Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3442381.3450048acmconferencesArticle/Chapter ViewAbstractPublication PageswebconfConference Proceedingsconference-collections
research-article

Privacy Policies over Time: Curation and Analysis of a Million-Document Dataset

Published: 03 June 2021 Publication History
  • Get Citation Alerts
  • First page of PDF

    References

    [1]
    [1] California Civil Code §§ 1798.100-1798.199.100. .
    [2]
    Rami Al-Rfou. 2020. polyglot. Retrieved 2. Apr. 2020 from https://pypi.org/project/polyglot
    [3]
    Alir3z4. 2020. html2text. Retrieved 25. Feb. 2020 from https://github.com/Alir3z4/html2text
    [4]
    Annie I. Anton, Julia B. Eart, Matthew W. Vail, Neha Jain, Carrie M. Gheen, and Jack M. Frink. 2007. HIPAA’s Effect on Web Site Privacy Policies. IEEE Security & Privacy 5, 1 (Jan. 2007), 45–52.
    [5]
    Internet Archive. 2018. Wayback Machine General Information. Retrieved 13. Feb. 2021 from https://help.archive.org/hc/en-us/articles/360004716091-Wayback-Machine-General-Information
    [6]
    Internet Archive. 2020. wayback. Retrieved 24. Feb. 2020 from https://github.com/internetarchive/wayback/tree/master/wayback-cdx-server
    [7]
    Internet Archive. 2020. Wayback Stats. Retrieved 5. May 2020 from https://analytics0.archive.org/stats/wb.php
    [8]
    Mete Balci. 2020. pdftitle. Retrieved 8. Apr. 2020 from https://pypi.org/project/pdftitle
    [9]
    Vinayshekhar Bannihatti Kumar, Roger Iyengar, Namita Nisal, Yuanyuan Feng, Hana Habib, Peter Story, Sushain Cherivirala, Margaret Hagan, Lorrie Cranor, Shomir Wilson, Florian Schaub, and Norman Sadeh. 2020. Finding a Choice in a Haystack: Automatic Extraction of Opt-Out Statements from Privacy Policy Text. In Proceedings of The Web Conference 2020 (Taipei, Taiwan) (WWW ’20). Association for Computing Machinery, New York, NY, USA, 1943–1954.
    [10]
    Jasmine Bowers, Bradley Reaves, Imani N. Sherman, Patrick Traynor, and Kevin Butler. 2017. Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, Santa Clara, CA, 97–114.
    [11]
    Justin F Brunelle, Mat Kelly, Hany SalahEldeen, Michele C Weigle, and Michael L Nelson. 2015. Not all mementos are created equal: Measuring the impact of missing resources. International Journal on Digital Libraries 16, 3-4 (2015), 283–301.
    [12]
    Justin F Brunelle, Mat Kelly, Michele C Weigle, and Michael L Nelson. 2016. The impact of JavaScript on archivability. International Journal on Digital Libraries 17, 2 (2016), 95–117.
    [13]
    [13] California Business and Professions Code §§ 22575-22579. .
    [14]
    Aaron Cahn, Scott Alfeld, Paul Barford, and Shanmugavelayutham Muthukrishnan. 2016. An empirical study of web cookies. In Proceedings of the 25th International Conference on World Wide Web. 891–901.
    [15]
    Adam Cohen. 2020. fuzzywuzzy. Retrieved 1. Apr. 2020 from https://pypi.org/project/fuzzywuzzy
    [16]
    Federal Trade Commission. 1998. Privacy Online: A Report to Congress. Retrieved 13. Feb. 2021 from https://www.ftc.gov/sites/default/files/documents/reports/privacy-online-report-congress/priv-23a.pdf
    [17]
    Federal Trade Commission. 2000. Privacy Online: Fair Information Practices in the Electronic Marketplace.
    [18]
    Contributors to Wikimedia projects. 2020. Cavnvas Fingerprinting - Wikipedia. Retrieved 15. Oct 2020 from https://en.wikipedia.org/wiki/Canvas_fingerprinting
    [19]
    Contributors to Wikimedia projects. 2020. Device Fingerprint - Wikipedia. Retrieved 15. Oct 2020 from https://en.wikipedia.org/wiki/Device_fingerprint
    [20]
    Contributors to Wikimedia projects. 2020. Evercookie - Wikipedia. Retrieved 15. Oct 2020 from https://en.wikipedia.org/wiki/Evercookie
    [21]
    Contributors to Wikimedia projects. 2020. HTTP Cookie - Wikipedia. Retrieved 15. Oct 2020 from https://en.wikipedia.org/wiki/HTTP_cookie
    [22]
    Contributors to Wikimedia projects. 2020. Local Shared Object - Wikipedia. Retrieved 15. Oct 2020 from https://en.wikipedia.org/wiki/Local_shared_object
    [23]
    Contributors to Wikimedia projects. 2020. WebBeacon - Wikipedia. Retrieved 15. Oct 2020 from https://en.wikipedia.org/wiki/Web_beacon
    [24]
    Mary J Culnan. 2000. Protecting privacy online: Is self-regulation working?Journal of Public Policy & Marketing 19, 1 (2000), 20–26.
    [25]
    Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, and Thorsten Holz. 2019. We value your privacy... now take some cookies: Measuring the GDPR’s impact on web privacy. Proceedings of the Network and Distributed Systems Security Symposium (2019).
    [26]
    Carmine DiMAscio. 2020. py-readability-metrics.
    [27]
    DuckDuckGo. 2020. DuckDuckGo Tracker Radar Exposes Hidden Tracking. Retrieved 13. Feb. 2021 from https://spreadprivacy.com/duckduckgo-tracker-radar/
    [28]
    Steven Englehardt and Arvind Narayanan. 2016. Online tracking: A 1-million-site measurement and analysis. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. 1388–1401.
    [29]
    Benjamin Fabian, Tatiana Ermakova, and Tino Lentz. 2017. Large-scale readability analysis of privacy policies. In Proceedings of the International Conference on Web Intelligence. 18–25.
    [30]
    Imane Fouad, Nataliia Bielova, Arnaud Legout, Natasa Sarafijanovic-Djukic, 2020. Missed by Filter Lists: Detecting Unknown Third-Party Trackers with Invisible Pixels. Proceedings on Privacy Enhancing Technologies 2020, 2(2020), 499–518.
    [31]
    Hana Habib, Sarah Pearman, Jiamin Wang, Yixin Zou, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, and Florian Schaub. 2020. “It’s a Scavenger Hunt”: Usability of Websites’ Opt-Out and Data Deletion Choices. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems(CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–12.
    [32]
    Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G Shin, and Karl Aberer. 2018. Polisis: Automated analysis and presentation of privacy policies using deep learning. In 27th USENIX Security Symposium USENIX Security 18. 531–548.
    [33]
    Matthew Honnibal, Ines Montani, Sofie Van Landeghem, and Adriane Boyd. 2020. spaCy: Industrial-strength Natural Language Processing in Python. https://doi.org/10.5281/zenodo.1212303
    [34]
    ICANN. 2020. ICANN | Descriptions and Contact Information for ICANN-Accredited Registrars. Retrieved 27. May 2020 from https://www.icann.org/registrar-reports/accreditation-qualified-list.html
    [35]
    Carlos Jensen and Colin Potts. 2004. Privacy Policies as Decision-Making Tools: An Evaluation of Online Privacy Notices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Vienna, Austria) (CHI ’04). Association for Computing Machinery, New York, NY, USA, 471–478.
    [36]
    Rebecca Killick, Paul Fearnhead, and Idris A Eckley. 2012. Optimal detection of changepoints with a linear computational cost. J. Amer. Statist. Assoc. 107, 500 (2012), 1590–1598.
    [37]
    J Peter Kincaid, Robert P Fishburne Jr, Richard L Rogers, and Brad S Chissom. 1975. Derivation of new readability formulas (automated readability index, fog count and flesch reading ease formula) for navy enlisted personnel. (1975).
    [38]
    Marc Kührer, Christian Rossow, and Thorsten Holz. 2014. Paint it black: Evaluating the effectiveness of malware blacklists. In International Workshop on Recent Advances in Intrusion Detection. Springer, 1–21.
    [39]
    Marc Kührer, Christian Rossow, and Thorsten Holz. 2014. Technical Report TR-HGI-2014-002 - Paint it black: Evaluating the effectiveness of malware blacklists. (2014), 1–28.
    [40]
    Ada Lerner, Tadayoshi Kohno, and Franziska Roesner. 2017. Rewriting history: Changing the archived web from the present. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 1741–1755.
    [41]
    Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, and Franziska Roesner. 2016. Internet jones and the raiders of the lost trackers: An archaeological study of web tracking from 1996 to 2016. In 25th USENIX Security Symposium (USENIX Security 16).
    [42]
    Yuanxiang Li, Walter Stweart, Jake Zhu, and Anna Ni. 2012. Online privacy policy of the thirty Dow Jones corporations: Compliance with FTC Fair Information Practice Principles and readability assessment. Communications of the IIMA 12, 3 (2012), 5.
    [43]
    Timothy Libert. 2018. An automated approach to auditing disclosure of third-party data collection in website privacy policies. In Proceedings of the 2018 World Wide Web Conference. 207–216.
    [44]
    Thomas Linden, Rishabh Khandelwal, Hamza Harkous, and Kassem Fawaz. 2020. The privacy policy landscape after the GDPR. Proceedings on Privacy Enhancing Technologies 2020, 1(2020), 47–64.
    [45]
    [45] Mark Graham.2020. Personal communication. https://twitter.com/MarkGraham/status/1237439729429180416
    [46]
    Florencia Marotta-Wurgler. 2016. Self-Regulation and Competition in Privacy Policies. The Journal of Legal Studies 45, S2 (2016), S13–S39.
    [47]
    Jonathan R. Mayer and John C. Mitchell. 2012. Third-Party Web Tracking: Policy and Technology. IEEE Security & Privacy(2012), 413–427.
    [48]
    Aleecia M. McDonald and Lorrie Faith Cranor. 2008. The cost of reading privacy policies. I/S: A Journal of Law and Policy for the Information Society 4 (2008), 543.
    [49]
    Aleecia M Mcdonald, Robert W Reeder, Patrick Gage Kelley, and Lorrie Faith Cranor. 2009. A comparative study of online privacy policies and formats. In International Symposium on Privacy Enhancing Technologies Symposium. Springer, 37–55.
    [50]
    George R. Milne and Mary J. Culnan. 2002. Using the Content of Online Privacy Notices to Inform Public Policy: A Longitudinal Analysis of the 1998-2001 U.S. Web Surveys. The Information Society 18, 5 (2002), 345–359.
    [51]
    George R Milne and Mary J Culnan. 2004. Strategies for reducing online privacy risks: Why consumers read (or don’t read) online privacy notices. Journal of interactive marketing 18, 3 (2004), 15–29.
    [52]
    George R Milne, Mary J Culnan, and Henry Greene. 2006. A longitudinal assessment of online privacy notice readability. Journal of Public Policy & Marketing 25, 2 (2006), 238–249.
    [53]
    Mozilla. 2019. readability. Retrieved 25. Feb. 2020 from https://github.com/mozilla/readability
    [54]
    Kanthashree Mysore Sathyendra, Shomir Wilson, Florian Schaub, Sebastian Zimmeck, and Norman Sadeh. 2017. Identifying the Provision of Choices in Privacy Policy Text. In Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, Copenhagen, Denmark, 2774–2779.
    [55]
    Johannes Naab, Patrick Sattler, Jonas Jelten, Oliver Gasser, and Georg Carle. 2019. Prefix Top Lists: Gaining Insights with Prefixes from Domain-based Top Lists on DNS Deployment. In Proceedings of the Internet Measurement Conference. 351–357.
    [56]
    United States. White House Office. 1997. A framework for global electronic commerce. White House.
    [57]
    Yue Pan and George M. Zinkhan. 2006. Exploring the impact of online privacy disclosures on consumer trust. Journal of Retailing 82, 4 (2006), 331 – 338.
    [58]
    F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research 12 (2011), 2825–2830.
    [59]
    Dominique Picard. 1985. Testing and estimating change-points in time series. Advances in applied probability(1985), 841–867.
    [60]
    Pyppeteer. 2019. miyakogi/pyppeteer: Headless chrome/chromium automation library (unofficial port of puppeteer). Retrieved 15. Apr. 2020 from https://github.com/miyakogi/pyppeteer
    [61]
    Rohan Ramanath, Fei Liu, Norman Sadeh, and Noah A. Smith. 2014. Unsupervised Alignment of Privacy Policies using Hidden Markov Models. In Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers). Association for Computational Linguistics, Baltimore, Maryland, 605–610.
    [62]
    Joel R. Reidenberg, Jaspreet Bhatia, Travis D. Breaux, and Thomas B. Norton. 2016. Ambiguity in Privacy Policies and the Impact of Regulation. The Journal of Legal Studies 45, S2 (2016), S163–S190.
    [63]
    Joel R. Reidenberg, Travis Breaux, Lorrie Faith Cranor, Brian French, Amanda Grannis, James T. Graves, Fei Liu, Aleecia McDonald, Thomas B. Norton, Rohan Ramanath, N. Cameron Russell, Norman Sadeh, and Florian Schaub. 2015. Disagreeable Privacy Policies: Mismatches Between Meaning and Users’ Understanding. Berkeley Technology Law Journal 30, 1 (2015), 39–88.
    [64]
    Kenneth Reitz. 2020. requests · PyPI. Retrieved 15. Apr. 2020 from https://pypi.org/project/requests
    [65]
    Rowena Rodrigues, David Wright, and Kush Wadhwa. 2013. Developing a privacy seal scheme (that works). International Data Privacy Law 3, 2 (2013), 100–116.
    [66]
    Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, James Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux, and Jianwei Niu. 2016. Toward a Framework for Detecting Privacy Policy Violations in Android Application Code. In Proceedings of the 38th International Conference on Software Engineering (Austin, Texas) (ICSE ’16). Association for Computing Machinery, New York, NY, USA, 25–36.
    [67]
    Daniel J Solove and Woodrow Hartzog. 2014. The FTC and the new common law of privacy. Colum. L. Rev. 114(2014), 583.
    [68]
    Mukund Srinath, Shomir Wilson, and C Lee Giles. 2020. Privacy at scale: Introducing the privaseer corpus of web privacy policies. arXiv preprint arXiv:2004.11131(2020).
    [69]
    Lior Jacob Strahilevitz and Matthew B. Kugler. 2016. Is Privacy Policy Language Irrelevant to Consumers?The Journal of Legal Studies 45, S2 (2016), S69–S95.
    [70]
    Ali Sunyaev, Tobias Dehling, Patrick L Taylor, and Kenneth D Mandl. 2014. Availability and quality of mobile health app privacy policies. Journal of the American Medical Informatics Association 22, e1 (08 2014), e28–e33.
    [71]
    Peter Swire. 1997. Markets, Self-Regulation, and Government Enforcement in the Protection of Personal Information, in Privacy and Self-Regulation in the Information Age by the US Department of Commerce.Privacy and Self-Regulation in the Information Age by the US Department of Commerce (1997).
    [72]
    Sebastian Thiel and Michael Trier. 2020. GitPython. Retrieved 31. May 2020 from https://pypi.org/project/GitPython
    [73]
    TOS;DR. 2020. TOSBack | The Terms-Of-Service Tracker. Retrieved 31. May 2020 from https://tosback.org
    [74]
    Charles Truong, Laurent Oudre, and Nicolas Vayatis. 2020. Selective review of offline change point detection methods. Signal Processing 167(2020), 107299.
    [75]
    UMIST and the Office of the Information Commissioner. 2002. Study of Compliance with the Data Protection Act 1998 by UK Based Websites. Retrieved 13. Feb. 2021 from http://www.lindamacaulay.com/upload/resource/9_1dpacompliancereport.pdf
    [76]
    Matthew W. Vail, Julia. B. Earp, and Annie I. Antón. 2008. An Empirical Study of Consumer Perceptions and Comprehension of Web Site Privacy Policies. IEEE Transactions on Engineering Management 55, 3 (2008), 442–454.
    [77]
    Thomas Vissers, Wouter Joosen, and Nick Nikiforakis. 2015. Parking sensors: Analyzing and detecting parked domains. In Proceedings of the 22nd Network and Distributed System Security Symposium (NDSS 2015). Internet Society, 53–53.
    [78]
    Yi-Min Wang, Doug Beck, Jeffrey Wang, Chad Verbowski, and Brad Daniels. 2006. Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting.SRUTI 6, 31-36 (2006), 2–2.
    [79]
    Webshrinker. 2020. Domain Category API.
    [80]
    Shomir Wilson, Florian Schaub, Aswarth Abhilash Dara, Frederick Liu, Sushain Cherivirala, Pedro Giovanni Leon, Mads Schaarup Andersen, Sebastian Zimmeck, Kanthashree Mysore Sathyendra, N. Cameron Russell, Thomas B. Norton, Eduard Hovy, Joel Reidenberg, and Norman Sadeh. 2016. The Creation and Analysis of a Website Privacy Policy Corpus. In Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers). Association for Computational Linguistics, 1330–1340.
    [81]
    Shomir Wilson, Florian Schaub, Rohan Ramanath, Norman Sadeh, Fei Liu, Noah A. Smith, and Frederick Liu. 2016. Crowdsourcing Annotations for Websites’ Privacy Policies: Can It Really Work?. In Proceedings of the 25th International Conference on World Wide Web (Montréal, Québec, Canada) (WWW ’16). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, 133–143.
    [82]
    Hsiaoming Yang. 2020. Mistune.
    [83]
    Razieh Nokhbeh Zaeem and K Suzanne Barber. 2020. A Large Publicly Available Corpus of Website Privacy Policies Based on DMOZ. Retrieved 02. Feb. 2021 from https://identity.utexas.edu/sites/default/files/2020-12/A%20Large%20Publicly%20Available%20Corpus%20ofWebsite%20Privacy%20Policies.pdf
    [84]
    Sebastian Zimmeck and Steven M. Bellovin. 2014. Privee: An Architecture for Automatically Analyzing Web Privacy Policies. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 1–16.
    [85]
    Sebastian Zimmeck, Peter Story, Daniel Smullen, Abhilasha Ravichander, Ziqi Wang, Joel Reidenberg, N. Cameron Russell, and Norman Sadeh. 2019. MAPS: Scaling Privacy Compliance Analysis to a Million Apps. Proceedings on Privacy Enhancing Technologies 2019, 3(2019), 66 – 86.

    Cited By

    View all
    • (2024)Regulatory Compliance With Limited Enforceability: Evidence From Privacy PoliciesSSRN Electronic Journal10.2139/ssrn.4774514Online publication date: 2024
    • (2024)PrivacyChat: Utilizing Large Language Model for Fine-Grained Information Extraction over Privacy PoliciesWisdom, Well-Being, Win-Win10.1007/978-3-031-57850-2_17(223-231)Online publication date: 15-Apr-2024
    • (2023)POLICYCOMPProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620298(1073-1090)Online publication date: 9-Aug-2023
    • Show More Cited By
    1. Privacy Policies over Time: Curation and Analysis of a Million-Document Dataset

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        WWW '21: Proceedings of the Web Conference 2021
        April 2021
        4054 pages
        ISBN:9781450383127
        DOI:10.1145/3442381
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 03 June 2021

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. data protection
        2. open dataset
        3. privacy policy
        4. web tracking

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        WWW '21
        Sponsor:
        WWW '21: The Web Conference 2021
        April 19 - 23, 2021
        Ljubljana, Slovenia

        Acceptance Rates

        Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)313
        • Downloads (Last 6 weeks)37

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Regulatory Compliance With Limited Enforceability: Evidence From Privacy PoliciesSSRN Electronic Journal10.2139/ssrn.4774514Online publication date: 2024
        • (2024)PrivacyChat: Utilizing Large Language Model for Fine-Grained Information Extraction over Privacy PoliciesWisdom, Well-Being, Win-Win10.1007/978-3-031-57850-2_17(223-231)Online publication date: 15-Apr-2024
        • (2023)POLICYCOMPProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620298(1073-1090)Online publication date: 9-Aug-2023
        • (2023)Understanding Website Privacy Policies—A Longitudinal Analysis Using Natural Language ProcessingInformation10.3390/info1411062214:11(622)Online publication date: 19-Nov-2023
        • (2023)PrivacyGLUE: A Benchmark Dataset for General Language Understanding in Privacy PoliciesApplied Sciences10.3390/app1306370113:6(3701)Online publication date: 14-Mar-2023
        • (2023)Analysis of Farm Data License Agreements: Do Data Agreements Adequately Reflect on Farm Data Practices and Farmers’ Data Rights?Agriculture10.3390/agriculture1311217013:11(2170)Online publication date: 20-Nov-2023
        • (2023)Regulatory Compliance with Limited Enforceability: Evidence from Privacy PoliciesSSRN Electronic Journal10.2139/ssrn.4600876Online publication date: 2023
        • (2023)Trends in Privacy Dialog Design after the GDPR: The Impact of Industry and Government ActionsProceedings of the 22nd Workshop on Privacy in the Electronic Society10.1145/3603216.3624963(107-121)Online publication date: 26-Nov-2023
        • (2023)Privacy Policies across the Ages: Content of Privacy Policies 1996–2021ACM Transactions on Privacy and Security10.1145/359015226:3(1-32)Online publication date: 13-May-2023
        • (2023)PolicyChecker: Analyzing the GDPR Completeness of Mobile Apps' Privacy PoliciesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623067(3373-3387)Online publication date: 15-Nov-2023
        • Show More Cited By

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media