{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:59Z","timestamp":1750308599494,"version":"3.41.0"},"reference-count":0,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T00:00:00Z","timestamp":1498176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCAS Comput. Soc."],"published-print":{"date-parts":[[2017,6,23]]},"abstract":"<jats:p>Browsers have become the de facto platform for modern software distribution. Naturally, browser vendors want to expose all the capabilities provided by modern computing devices to the websites that are running code through the browser. This added complexity introduces additional risks to users' security and privacy. Here I present one method for inferring the risks and rewards to the user of these new features, and consider how we can better manage this tradeoff in the future.<\/jats:p>","DOI":"10.1145\/3112644.3112647","type":"journal-article","created":{"date-parts":[[2017,6,26]],"date-time":"2017-06-26T12:13:22Z","timestamp":1498479202000},"page":"16-18","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The costs and benefits of treating the browser like an operating system"],"prefix":"10.1145","volume":"47","author":[{"given":"Chris","family":"Kanich","sequence":"first","affiliation":[]}],"member":"320","published-online":{"date-parts":[[2017,6,23]]},"container-title":["ACM SIGCAS Computers and Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3112644.3112647","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/3112644.3112647","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:05:39Z","timestamp":1750273539000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3112644.3112647"}},"subtitle":["how ad blockers help us better understand how different browser features are used and who they benefit"],"short-title":[],"issued":{"date-parts":[[2017,6,23]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,6,23]]}},"alternative-id":["10.1145\/3112644.3112647"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/3112644.3112647","relation":{},"ISSN":["0095-2737"],"issn-type":[{"type":"print","value":"0095-2737"}],"subject":[],"published":{"date-parts":[[2017,6,23]]},"assertion":[{"value":"2017-06-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}