Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3442381.3450048acmconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
research-article

Privacy Policies over Time: Curation and Analysis of a Million-Document Dataset

Published: 03 June 2021 Publication History
First page of PDF

References

[1]
[1] California Civil Code §§ 1798.100-1798.199.100. .
[2]
Rami Al-Rfou. 2020. polyglot. Retrieved 2. Apr. 2020 from https://pypi.org/project/polyglot
[3]
Alir3z4. 2020. html2text. Retrieved 25. Feb. 2020 from https://github.com/Alir3z4/html2text
[4]
Annie I. Anton, Julia B. Eart, Matthew W. Vail, Neha Jain, Carrie M. Gheen, and Jack M. Frink. 2007. HIPAA’s Effect on Web Site Privacy Policies. IEEE Security & Privacy 5, 1 (Jan. 2007), 45–52.
[5]
Internet Archive. 2018. Wayback Machine General Information. Retrieved 13. Feb. 2021 from https://help.archive.org/hc/en-us/articles/360004716091-Wayback-Machine-General-Information
[6]
Internet Archive. 2020. wayback. Retrieved 24. Feb. 2020 from https://github.com/internetarchive/wayback/tree/master/wayback-cdx-server
[7]
Internet Archive. 2020. Wayback Stats. Retrieved 5. May 2020 from https://analytics0.archive.org/stats/wb.php
[8]
Mete Balci. 2020. pdftitle. Retrieved 8. Apr. 2020 from https://pypi.org/project/pdftitle
[9]
Vinayshekhar Bannihatti Kumar, Roger Iyengar, Namita Nisal, Yuanyuan Feng, Hana Habib, Peter Story, Sushain Cherivirala, Margaret Hagan, Lorrie Cranor, Shomir Wilson, Florian Schaub, and Norman Sadeh. 2020. Finding a Choice in a Haystack: Automatic Extraction of Opt-Out Statements from Privacy Policy Text. In Proceedings of The Web Conference 2020 (Taipei, Taiwan) (WWW ’20). Association for Computing Machinery, New York, NY, USA, 1943–1954.
[10]
Jasmine Bowers, Bradley Reaves, Imani N. Sherman, Patrick Traynor, and Kevin Butler. 2017. Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, Santa Clara, CA, 97–114.
[11]
Justin F Brunelle, Mat Kelly, Hany SalahEldeen, Michele C Weigle, and Michael L Nelson. 2015. Not all mementos are created equal: Measuring the impact of missing resources. International Journal on Digital Libraries 16, 3-4 (2015), 283–301.
[12]
Justin F Brunelle, Mat Kelly, Michele C Weigle, and Michael L Nelson. 2016. The impact of JavaScript on archivability. International Journal on Digital Libraries 17, 2 (2016), 95–117.
[13]
[13] California Business and Professions Code §§ 22575-22579. .
[14]
Aaron Cahn, Scott Alfeld, Paul Barford, and Shanmugavelayutham Muthukrishnan. 2016. An empirical study of web cookies. In Proceedings of the 25th International Conference on World Wide Web. 891–901.
[15]
Adam Cohen. 2020. fuzzywuzzy. Retrieved 1. Apr. 2020 from https://pypi.org/project/fuzzywuzzy
[16]
Federal Trade Commission. 1998. Privacy Online: A Report to Congress. Retrieved 13. Feb. 2021 from https://www.ftc.gov/sites/default/files/documents/reports/privacy-online-report-congress/priv-23a.pdf
[17]
Federal Trade Commission. 2000. Privacy Online: Fair Information Practices in the Electronic Marketplace.
[18]
Contributors to Wikimedia projects. 2020. Cavnvas Fingerprinting - Wikipedia. Retrieved 15. Oct 2020 from https://en.wikipedia.org/wiki/Canvas_fingerprinting
[19]
Contributors to Wikimedia projects. 2020. Device Fingerprint - Wikipedia. Retrieved 15. Oct 2020 from https://en.wikipedia.org/wiki/Device_fingerprint
[20]
Contributors to Wikimedia projects. 2020. Evercookie - Wikipedia. Retrieved 15. Oct 2020 from https://en.wikipedia.org/wiki/Evercookie
[21]
Contributors to Wikimedia projects. 2020. HTTP Cookie - Wikipedia. Retrieved 15. Oct 2020 from https://en.wikipedia.org/wiki/HTTP_cookie
[22]
Contributors to Wikimedia projects. 2020. Local Shared Object - Wikipedia. Retrieved 15. Oct 2020 from https://en.wikipedia.org/wiki/Local_shared_object
[23]
Contributors to Wikimedia projects. 2020. WebBeacon - Wikipedia. Retrieved 15. Oct 2020 from https://en.wikipedia.org/wiki/Web_beacon
[24]
Mary J Culnan. 2000. Protecting privacy online: Is self-regulation working?Journal of Public Policy & Marketing 19, 1 (2000), 20–26.
[25]
Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, and Thorsten Holz. 2019. We value your privacy... now take some cookies: Measuring the GDPR’s impact on web privacy. Proceedings of the Network and Distributed Systems Security Symposium (2019).
[26]
Carmine DiMAscio. 2020. py-readability-metrics.
[27]
DuckDuckGo. 2020. DuckDuckGo Tracker Radar Exposes Hidden Tracking. Retrieved 13. Feb. 2021 from https://spreadprivacy.com/duckduckgo-tracker-radar/
[28]
Steven Englehardt and Arvind Narayanan. 2016. Online tracking: A 1-million-site measurement and analysis. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. 1388–1401.
[29]
Benjamin Fabian, Tatiana Ermakova, and Tino Lentz. 2017. Large-scale readability analysis of privacy policies. In Proceedings of the International Conference on Web Intelligence. 18–25.
[30]
Imane Fouad, Nataliia Bielova, Arnaud Legout, Natasa Sarafijanovic-Djukic, 2020. Missed by Filter Lists: Detecting Unknown Third-Party Trackers with Invisible Pixels. Proceedings on Privacy Enhancing Technologies 2020, 2(2020), 499–518.
[31]
Hana Habib, Sarah Pearman, Jiamin Wang, Yixin Zou, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, and Florian Schaub. 2020. “It’s a Scavenger Hunt”: Usability of Websites’ Opt-Out and Data Deletion Choices. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems(CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–12.
[32]
Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G Shin, and Karl Aberer. 2018. Polisis: Automated analysis and presentation of privacy policies using deep learning. In 27th USENIX Security Symposium USENIX Security 18. 531–548.
[33]
Matthew Honnibal, Ines Montani, Sofie Van Landeghem, and Adriane Boyd. 2020. spaCy: Industrial-strength Natural Language Processing in Python. https://doi.org/10.5281/zenodo.1212303
[34]
ICANN. 2020. ICANN | Descriptions and Contact Information for ICANN-Accredited Registrars. Retrieved 27. May 2020 from https://www.icann.org/registrar-reports/accreditation-qualified-list.html
[35]
Carlos Jensen and Colin Potts. 2004. Privacy Policies as Decision-Making Tools: An Evaluation of Online Privacy Notices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Vienna, Austria) (CHI ’04). Association for Computing Machinery, New York, NY, USA, 471–478.
[36]
Rebecca Killick, Paul Fearnhead, and Idris A Eckley. 2012. Optimal detection of changepoints with a linear computational cost. J. Amer. Statist. Assoc. 107, 500 (2012), 1590–1598.
[37]
J Peter Kincaid, Robert P Fishburne Jr, Richard L Rogers, and Brad S Chissom. 1975. Derivation of new readability formulas (automated readability index, fog count and flesch reading ease formula) for navy enlisted personnel. (1975).
[38]
Marc Kührer, Christian Rossow, and Thorsten Holz. 2014. Paint it black: Evaluating the effectiveness of malware blacklists. In International Workshop on Recent Advances in Intrusion Detection. Springer, 1–21.
[39]
Marc Kührer, Christian Rossow, and Thorsten Holz. 2014. Technical Report TR-HGI-2014-002 - Paint it black: Evaluating the effectiveness of malware blacklists. (2014), 1–28.
[40]
Ada Lerner, Tadayoshi Kohno, and Franziska Roesner. 2017. Rewriting history: Changing the archived web from the present. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 1741–1755.
[41]
Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, and Franziska Roesner. 2016. Internet jones and the raiders of the lost trackers: An archaeological study of web tracking from 1996 to 2016. In 25th USENIX Security Symposium (USENIX Security 16).
[42]
Yuanxiang Li, Walter Stweart, Jake Zhu, and Anna Ni. 2012. Online privacy policy of the thirty Dow Jones corporations: Compliance with FTC Fair Information Practice Principles and readability assessment. Communications of the IIMA 12, 3 (2012), 5.
[43]
Timothy Libert. 2018. An automated approach to auditing disclosure of third-party data collection in website privacy policies. In Proceedings of the 2018 World Wide Web Conference. 207–216.
[44]
Thomas Linden, Rishabh Khandelwal, Hamza Harkous, and Kassem Fawaz. 2020. The privacy policy landscape after the GDPR. Proceedings on Privacy Enhancing Technologies 2020, 1(2020), 47–64.
[45]
[45] Mark Graham.2020. Personal communication. https://twitter.com/MarkGraham/status/1237439729429180416
[46]
Florencia Marotta-Wurgler. 2016. Self-Regulation and Competition in Privacy Policies. The Journal of Legal Studies 45, S2 (2016), S13–S39.
[47]
Jonathan R. Mayer and John C. Mitchell. 2012. Third-Party Web Tracking: Policy and Technology. IEEE Security & Privacy(2012), 413–427.
[48]
Aleecia M. McDonald and Lorrie Faith Cranor. 2008. The cost of reading privacy policies. I/S: A Journal of Law and Policy for the Information Society 4 (2008), 543.
[49]
Aleecia M Mcdonald, Robert W Reeder, Patrick Gage Kelley, and Lorrie Faith Cranor. 2009. A comparative study of online privacy policies and formats. In International Symposium on Privacy Enhancing Technologies Symposium. Springer, 37–55.
[50]
George R. Milne and Mary J. Culnan. 2002. Using the Content of Online Privacy Notices to Inform Public Policy: A Longitudinal Analysis of the 1998-2001 U.S. Web Surveys. The Information Society 18, 5 (2002), 345–359.
[51]
George R Milne and Mary J Culnan. 2004. Strategies for reducing online privacy risks: Why consumers read (or don’t read) online privacy notices. Journal of interactive marketing 18, 3 (2004), 15–29.
[52]
George R Milne, Mary J Culnan, and Henry Greene. 2006. A longitudinal assessment of online privacy notice readability. Journal of Public Policy & Marketing 25, 2 (2006), 238–249.
[53]
Mozilla. 2019. readability. Retrieved 25. Feb. 2020 from https://github.com/mozilla/readability
[54]
Kanthashree Mysore Sathyendra, Shomir Wilson, Florian Schaub, Sebastian Zimmeck, and Norman Sadeh. 2017. Identifying the Provision of Choices in Privacy Policy Text. In Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, Copenhagen, Denmark, 2774–2779.
[55]
Johannes Naab, Patrick Sattler, Jonas Jelten, Oliver Gasser, and Georg Carle. 2019. Prefix Top Lists: Gaining Insights with Prefixes from Domain-based Top Lists on DNS Deployment. In Proceedings of the Internet Measurement Conference. 351–357.
[56]
United States. White House Office. 1997. A framework for global electronic commerce. White House.
[57]
Yue Pan and George M. Zinkhan. 2006. Exploring the impact of online privacy disclosures on consumer trust. Journal of Retailing 82, 4 (2006), 331 – 338.
[58]
F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research 12 (2011), 2825–2830.
[59]
Dominique Picard. 1985. Testing and estimating change-points in time series. Advances in applied probability(1985), 841–867.
[60]
Pyppeteer. 2019. miyakogi/pyppeteer: Headless chrome/chromium automation library (unofficial port of puppeteer). Retrieved 15. Apr. 2020 from https://github.com/miyakogi/pyppeteer
[61]
Rohan Ramanath, Fei Liu, Norman Sadeh, and Noah A. Smith. 2014. Unsupervised Alignment of Privacy Policies using Hidden Markov Models. In Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers). Association for Computational Linguistics, Baltimore, Maryland, 605–610.
[62]
Joel R. Reidenberg, Jaspreet Bhatia, Travis D. Breaux, and Thomas B. Norton. 2016. Ambiguity in Privacy Policies and the Impact of Regulation. The Journal of Legal Studies 45, S2 (2016), S163–S190.
[63]
Joel R. Reidenberg, Travis Breaux, Lorrie Faith Cranor, Brian French, Amanda Grannis, James T. Graves, Fei Liu, Aleecia McDonald, Thomas B. Norton, Rohan Ramanath, N. Cameron Russell, Norman Sadeh, and Florian Schaub. 2015. Disagreeable Privacy Policies: Mismatches Between Meaning and Users’ Understanding. Berkeley Technology Law Journal 30, 1 (2015), 39–88.
[64]
Kenneth Reitz. 2020. requests · PyPI. Retrieved 15. Apr. 2020 from https://pypi.org/project/requests
[65]
Rowena Rodrigues, David Wright, and Kush Wadhwa. 2013. Developing a privacy seal scheme (that works). International Data Privacy Law 3, 2 (2013), 100–116.
[66]
Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, James Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux, and Jianwei Niu. 2016. Toward a Framework for Detecting Privacy Policy Violations in Android Application Code. In Proceedings of the 38th International Conference on Software Engineering (Austin, Texas) (ICSE ’16). Association for Computing Machinery, New York, NY, USA, 25–36.
[67]
Daniel J Solove and Woodrow Hartzog. 2014. The FTC and the new common law of privacy. Colum. L. Rev. 114(2014), 583.
[68]
Mukund Srinath, Shomir Wilson, and C Lee Giles. 2020. Privacy at scale: Introducing the privaseer corpus of web privacy policies. arXiv preprint arXiv:2004.11131(2020).
[69]
Lior Jacob Strahilevitz and Matthew B. Kugler. 2016. Is Privacy Policy Language Irrelevant to Consumers?The Journal of Legal Studies 45, S2 (2016), S69–S95.
[70]
Ali Sunyaev, Tobias Dehling, Patrick L Taylor, and Kenneth D Mandl. 2014. Availability and quality of mobile health app privacy policies. Journal of the American Medical Informatics Association 22, e1 (08 2014), e28–e33.
[71]
Peter Swire. 1997. Markets, Self-Regulation, and Government Enforcement in the Protection of Personal Information, in Privacy and Self-Regulation in the Information Age by the US Department of Commerce.Privacy and Self-Regulation in the Information Age by the US Department of Commerce (1997).
[72]
Sebastian Thiel and Michael Trier. 2020. GitPython. Retrieved 31. May 2020 from https://pypi.org/project/GitPython
[73]
TOS;DR. 2020. TOSBack | The Terms-Of-Service Tracker. Retrieved 31. May 2020 from https://tosback.org
[74]
Charles Truong, Laurent Oudre, and Nicolas Vayatis. 2020. Selective review of offline change point detection methods. Signal Processing 167(2020), 107299.
[75]
UMIST and the Office of the Information Commissioner. 2002. Study of Compliance with the Data Protection Act 1998 by UK Based Websites. Retrieved 13. Feb. 2021 from http://www.lindamacaulay.com/upload/resource/9_1dpacompliancereport.pdf
[76]
Matthew W. Vail, Julia. B. Earp, and Annie I. Antón. 2008. An Empirical Study of Consumer Perceptions and Comprehension of Web Site Privacy Policies. IEEE Transactions on Engineering Management 55, 3 (2008), 442–454.
[77]
Thomas Vissers, Wouter Joosen, and Nick Nikiforakis. 2015. Parking sensors: Analyzing and detecting parked domains. In Proceedings of the 22nd Network and Distributed System Security Symposium (NDSS 2015). Internet Society, 53–53.
[78]
Yi-Min Wang, Doug Beck, Jeffrey Wang, Chad Verbowski, and Brad Daniels. 2006. Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting.SRUTI 6, 31-36 (2006), 2–2.
[79]
Webshrinker. 2020. Domain Category API.
[80]
Shomir Wilson, Florian Schaub, Aswarth Abhilash Dara, Frederick Liu, Sushain Cherivirala, Pedro Giovanni Leon, Mads Schaarup Andersen, Sebastian Zimmeck, Kanthashree Mysore Sathyendra, N. Cameron Russell, Thomas B. Norton, Eduard Hovy, Joel Reidenberg, and Norman Sadeh. 2016. The Creation and Analysis of a Website Privacy Policy Corpus. In Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers). Association for Computational Linguistics, 1330–1340.
[81]
Shomir Wilson, Florian Schaub, Rohan Ramanath, Norman Sadeh, Fei Liu, Noah A. Smith, and Frederick Liu. 2016. Crowdsourcing Annotations for Websites’ Privacy Policies: Can It Really Work?. In Proceedings of the 25th International Conference on World Wide Web (Montréal, Québec, Canada) (WWW ’16). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, 133–143.
[82]
Hsiaoming Yang. 2020. Mistune.
[83]
Razieh Nokhbeh Zaeem and K Suzanne Barber. 2020. A Large Publicly Available Corpus of Website Privacy Policies Based on DMOZ. Retrieved 02. Feb. 2021 from https://identity.utexas.edu/sites/default/files/2020-12/A%20Large%20Publicly%20Available%20Corpus%20ofWebsite%20Privacy%20Policies.pdf
[84]
Sebastian Zimmeck and Steven M. Bellovin. 2014. Privee: An Architecture for Automatically Analyzing Web Privacy Policies. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 1–16.
[85]
Sebastian Zimmeck, Peter Story, Daniel Smullen, Abhilasha Ravichander, Ziqi Wang, Joel Reidenberg, N. Cameron Russell, and Norman Sadeh. 2019. MAPS: Scaling Privacy Compliance Analysis to a Million Apps. Proceedings on Privacy Enhancing Technologies 2019, 3(2019), 66 – 86.

Cited By

View all
  • (2025)Corpus of Privacy Policies for Web Services and Internet of Things Devices for Analyzing the Awareness of Personal Data SubjectsКорпус политик конфиденциальности веб-сервисов и устройств Интернета Вещей для анализа информированности субъектов персональных данныхInformatics and AutomationИнформатика и автоматизация10.15622/ia.24.1.724:1(163-192)Online publication date: 20-Jan-2025
  • (2024)Is it a trap? a large-scale empirical study and comprehensive assessment of online automated privacy policy generators for mobile appsProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699218(5681-5698)Online publication date: 14-Aug-2024
  • (2024)Regulatory Compliance With Limited Enforceability: Evidence From Privacy PoliciesSSRN Electronic Journal10.2139/ssrn.4774514Online publication date: 2024
  • Show More Cited By
  1. Privacy Policies over Time: Curation and Analysis of a Million-Document Dataset

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WWW '21: Proceedings of the Web Conference 2021
      April 2021
      4054 pages
      ISBN:9781450383127
      DOI:10.1145/3442381
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 03 June 2021

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. data protection
      2. open dataset
      3. privacy policy
      4. web tracking

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      WWW '21
      Sponsor:
      WWW '21: The Web Conference 2021
      April 19 - 23, 2021
      Ljubljana, Slovenia

      Acceptance Rates

      Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)279
      • Downloads (Last 6 weeks)25
      Reflects downloads up to 31 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Corpus of Privacy Policies for Web Services and Internet of Things Devices for Analyzing the Awareness of Personal Data SubjectsКорпус политик конфиденциальности веб-сервисов и устройств Интернета Вещей для анализа информированности субъектов персональных данныхInformatics and AutomationИнформатика и автоматизация10.15622/ia.24.1.724:1(163-192)Online publication date: 20-Jan-2025
      • (2024)Is it a trap? a large-scale empirical study and comprehensive assessment of online automated privacy policy generators for mobile appsProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699218(5681-5698)Online publication date: 14-Aug-2024
      • (2024)Regulatory Compliance With Limited Enforceability: Evidence From Privacy PoliciesSSRN Electronic Journal10.2139/ssrn.4774514Online publication date: 2024
      • (2024)ToneCheck: Unveiling the Impact of Dialects in Privacy PolicyProceedings of the 29th ACM Symposium on Access Control Models and Technologies10.1145/3649158.3657035(7-18)Online publication date: 24-Jun-2024
      • (2024)Analyzing Corporate Privacy Policies using AI ChatbotsProceedings of the 2024 ACM on Internet Measurement Conference10.1145/3646547.3689015(505-515)Online publication date: 4-Nov-2024
      • (2024)A Study of GDPR Compliance under the Transparency and Consent FrameworkProceedings of the ACM Web Conference 202410.1145/3589334.3645618(1227-1236)Online publication date: 13-May-2024
      • (2024)SoK: Technical Implementation and Human Impact of Internet Privacy Regulations2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00206(673-696)Online publication date: 19-May-2024
      • (2024)Privacy policy analysisComputers and Security10.1016/j.cose.2024.104065146:COnline publication date: 1-Nov-2024
      • (2024)Analysing Websites Privacy Policies: A Study of E-commerce Websites in South AfricaHuman Aspects of Information Security and Assurance10.1007/978-3-031-72563-0_12(168-183)Online publication date: 28-Nov-2024
      • (2024)PrivacyChat: Utilizing Large Language Model for Fine-Grained Information Extraction over Privacy PoliciesWisdom, Well-Being, Win-Win10.1007/978-3-031-57850-2_17(223-231)Online publication date: 10-Apr-2024
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media