Author(s):

  • Justin Petelka 
  • Lucy Van Kleunen 
  • Liam Albright 
  • Elizabeth Murnane 
  • Stephen Voida 
  •  Jaime Snyder 

Abstract:

Research in personal informatics (PI) calls for systems to support social forms of tracking, raising questions about how privacy can and should support intentionally sharing sensitive health information. We focus on the case of personal data related to the self-tracking of bipolar disorder (BD) in order to explore the ways in which disclosure activities intersect with other privacy experiences. While research in HCI often discusses privacy as a disclosure activity, this does not reflect the ways in which privacy can be passively experienced. In this paper we broaden conceptions of privacy by defining transparency experiences and contributing factors in contrast to disclosure activities and preferences. Next, we ground this theoretical move in empirical analysis of personal narratives shared by people managing BD. We discuss the resulting emergent model of transparency in terms of implications for the design of socially-enabled PI systems. CAUTION: This paper contains references to experiences of mental illness, including self-harm, depression, suicidal ideation, etc.

Documentation:

https://doi.org/10.1145/3313831.3376573

References:

[1] Acquisti Alessandro, Adjerid Idris, Balebako Rebecca, Brandimarte Laura, Cranor Lorrie Faith, Komanduri Saranga, Leon Pedro Giovanni, Sadeh Norman, Schaub Florian, Sleeper Manya, Wang Yang, and Wilson Shomir. 2017. Nudges for Privacy and Security: Understanding and Assisting Users’ Choices Online. Comput. Surveys 50, 3, Article 44 (August. 2017), 41 pages. DOI: 10.1145/3054926 [CrossRef] [Google Scholar]

[2] Altman Irwin. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole, Monterey, cA, USA. [Google Scholar]

[3] Andalibi Nazanin and Forte Andrea. 2018a. Announcing Pregnancy Loss on Facebook: A Decision-Making Framework for Stigmatized Disclosures on Identified Social Network Sites. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI ’18). ACM, New York, NY, USA, Article 158, 14 pages. DOI: 10.1145/3173574.3173732 [CrossRef] [Google Scholar]

[4] Andalibi Nazanin and Forte Andrea. 2018b. Responding to Sensitive Disclosures on Social Media: A Decision-Making Framework. ACM Trans. Comput.-Hum. Interact 25, 6, Article 31 (December. 2018), 29 pages. DOI: 10.1145/3241044 [CrossRef] [Google Scholar]

[5] Andalibi Nazanin, Morris Margaret E., and Forte Andrea. 2018. Testing Waters, Sending Clues: Indirect Disclosures of Socially Stigmatized Experiences on Social Media. Proceedings of the ACM on Human-Computer Interaction 2, CSCW, Article 19 (November. 2018), 23 pages. DOI: 10.1145/3274288 [CrossRef] [Google Scholar]

[6] Aronson Jodi. 1995. A pragmatic view of thematic analysis. The Qualitative Report 2, 1 (1995), 1–3. [Google Scholar]

[7] Barkhuus Louise. 2012. The mismeasurement of privacy: Using contextual integrity to reconsider privacy in HCI. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, New York, NY, USA, 367–376. DOI: 10.1145/2207676.2207727 [CrossRef] [Google Scholar]

[8] Beauchamp Toby. 2009. Artful concealment and strategic visibility: Transgender bodies and US state surveillance after 9/11. Surveillance & Society 6, 4 (2009), 356–366. DOI: 10.24908/ss.v6i4.3267 [CrossRef] [Google Scholar]

[9] Bowker Geoffrey C. and Star Susan Leigh. 2000. Sorting things out: Classification and its consequences. MIT Press, Cambridge, MA, USA. [Google Scholar]

[10] boyd danah. 2007. Why youth (heart) social network sites: The role of networked publics in teenage social life. MacArthur Foundation series on digital learning–Youth, identity, and digital media volume 119 (2007), 142. https://ssrn.com/abstract=1518924 [Google Scholar]

[11] Brashers Dale E., Goldsmith Daena J., and Hsieh Elaine. 2006. Information Seeking and Avoiding in Health Contexts. Human Communication Research 28, 2 (01 2006), 258–271. DOI: 10.1111/j.1468-2958.2002.tb00807.x [CrossRef] [Google Scholar]

[12] Browne Simone. 2015. Dark matters: On the surveillance of blackness. Duke University Press, Durham, NC, USA. [Google Scholar]

[13] Cheney-Lippold John. 2018. We are data: Algorithms and the making of our digital selves. NYU Press, New York, NY, USA. [Google Scholar]

[14] Chung Chia-Fang, Agapie Elena, Schroeder Jessica, Mishra Sonali, Fogarty James, and Munson Sean A.. 2017. When Personal Tracking Becomes Social: Examining the Use of Instagram for Healthy Eating. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI ’17). ACM, New York, NY, USA, 1674–1687. DOI: 10.1145/3025453.3025747 [PMC free article] [PubMed] [CrossRef] [Google Scholar]

[15] Chung Chia-Fang, Dew Kristin, Cole Allison, Zia Jasmine, Fogarty James, Kientz Julie A., and Munson Sean A.. 2016. Boundary Negotiating Artifacts in Personal Informatics: Patient-Provider Collaboration with Patient-Generated Data. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW ’16). ACM, New York, NY, USA, 770–786. DOI: 10.1145/2818048.2819926 [PMC free article] [PubMed] [CrossRef] [Google Scholar]

[16] Cohen Julie E.. 2012. What privacy is for. Harvard Law Review 126 (2012), 1904. [Google Scholar]

[17] Consolvo Sunny, Roessler Peter, and Shelton Brett E.. 2004. The CareNet display: lessons learned from an in home evaluation of an ambient display. In Proceedings of the 6th International Conference on Ubiquitous Computing (UbiComp ‘04). Springer, Berlin, 1–17. 10.1007/978-3-540-30119-6_1 [CrossRef] [Google Scholar]

[18] Cranor Lorrie Faith and Garfinkel Simson. 2005. Security and usability: Designing secure systems that people can use. O’Reilly, Sebastopol, CA, USA. [Google Scholar]

[19] De Choudhury Munmun and De Sushovan. 2014. Mental Health Discourse on reddit: Self-Disclosure, Social Support, and Anonymity. In Proceedings of the 8th International AAAI Conference on Weblogs and Social Media (ICWSM 2014). AAAI Press, Palo Alto, CA, USA, 71–80. https://www.aaai.org/ocs/index.php/ICWSM/ICWSM14/paper/view/8075 [Google Scholar]

[20] Denicoff Kirk D., Leverich Gabriele S., Nolen William A., Rush A. John, McElroy Susan L., Keck Paul E., Suppes Trisha, Altshuler Lori L., Kupka Ralph, Frye Mark A., Hatef J, Brotman MA, and Post Robert M.. 2000. Validation of the prospective NIMH-Life-Chart Method (NIMH-LCM-p) for longitudinal assessment of bipolar disorder. Psychological Medicine 30, 6 (2000), 1391–1397. DOI: 10.1017/s0033291799002810 [PubMed] [CrossRef] [Google Scholar]

[21] Dinev Tamara and Hart Paul. 2006. An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems Research 17, 1 (2006), 61–80. DOI: 10.1287/isre.1060.0080 [CrossRef] [Google Scholar]

[22] Dourish Paul and Anderson Ken. 2006. Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. Human–Computer Interaction 21, 3 (2006), 319–342. DOI: 10.1207/s15327051hci2103_2 [CrossRef] [Google Scholar]

[23] Epstein Daniel A., Borning Alan, and Fogarty James. 2013. Fine-grained Sharing of Sensed Physical Activity: A Value Sensitive Approach. In Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp ‘13). ACM, New York, NY, USA, 489–498. DOI: 10.1145/2493432.2493433 [CrossRef] [Google Scholar]

[24] Epstein Daniel A., Cordeiro Felicia, Bales Elizabeth, Fogarty James, and Munson Sean. 2014. Taming Data Complexity in Lifelogs: Exploring Visual Cuts of Personal Informatics Data. In Proceedings of the 2014 Conference on Designing Interactive Systems (DIS ‘14). ACM, New York, NY, USA, 667–676. DOI: 10.1145/2598510.2598558 [CrossRef] [Google Scholar]

[25] Epstein Daniel A., Jacobson Bradley H., Bales Elizabeth, McDonald David W., and Munson Sean A.. 2015a. From “Nobody Cares” to “Way to Go!”: A Design Framework for Social Sharing in Personal Informatics. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW ’15). ACM, New York, NY, USA, 1622–1636. DOI: 10.1145/2675133.2675135 [CrossRef] [Google Scholar]

[26] Epstein Daniel A., Ping An, Fogarty James, and Munson Sean A.. 2015b. A Lived Informatics Model of Personal Informatics. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp ’15). ACM, New York, NY, USA, 731–742. DOI: 10.1145/2750858.2804250 [CrossRef] [Google Scholar]

[27] Froehlich Jon, Chen Mike Y., Consolvo Sunny, Harrison Beverly, and Landay James A.. 2007. MyExperience: A System for in Situ Tracing and Capturing of User Feedback on Mobile Phones. In Proceedings of the 5th International Conference on Mobile Systems, Applications and Services (MobiSys ’07). ACM, New York, NY, USA, 57–70. DOI: 10.1145/1247660.1247670 [CrossRef] [Google Scholar]

[28] Gumperz John J.. 1982. Discourse strategies. Vol. 1. Cambridge University Press, Cambridge, UK. [Google Scholar]

[29] Hayfield Nikki, Clarke Victoria, and Halliwell Emma. 2014. Bisexual women’s understandings of social marginalisation: ‘The heterosexuals don’t understand us but nor do the lesbians’. Feminism & Psychology 24, 3 (2014), 352–372. DOI: 10.1177/0959353514539651 [CrossRef] [Google Scholar]

[30] Johnstone Barbara. 2008. Discourse Analysis (3rd ed.). Blackwell, Oxford, UK. [Google Scholar]

[31] Joinson Adam N. and Paine Carina B.. 2009. Self-disclosure, privacy and the Internet. The Oxford Handbook of Internet Psychology 2374252 (2009), 237–252. DOI: 10.1093/oxfordhb/9780199561803.013.0016 [CrossRef] [Google Scholar]

[32] Kahn David A., Sachs Gary S., Printz David J., Carpenter Daniel, Docherty John P., and Ross Ruth. 2000. Medication treatment of bipolar disorder 2000: A summary of the expert consensus guidelines. Journal of Psychiatric Practice 6, 4 (2000), 197–211. DOI: 10.1097/00131746-200007000-00004 [PubMed] [CrossRef] [Google Scholar]

[33] Kang Ruogu, Brown Stephanie, and Kiesler Sara. 2013. Why Do People Seek Anonymity on the Internet?: Informing Policy and Design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’13). ACM, New York, NY, USA, 2657–2666. DOI: 10.1145/2470654.2481368 [CrossRef] [Google Scholar]

[34] Kersten-van Dijk Elisabeth and Ijsselsteijn Wijnand A. 2016. Design Beyond the Numbers: Sharing, Comparing, Storytelling and the Need for a Quantified Us. Interaction Design and Architecture(s) 29 (2016), 121–135. [Google Scholar]

[35] Khovanskaya Vera, Baumer Eric P. S., Cosley Dan, Voida Stephen, and Gay Geri. 2013. “Everybody Knows What You’re Doing”: A Critical Design Approach to Personal Informatics. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’13). ACM, New York, NY, USA, 3403–3412. DOI: 10.1145/2470654.2466467 [CrossRef] [Google Scholar]

[36] Kordzadeh Nima, Warren John, and Seifi Ali. 2016. Antecedents of privacy calculus components in virtual health communities. International Journal of Information Management 36, 5 (2016), 724 – 734. DOI: 10.1016/j.ijinfomgt.2016.04.015 [CrossRef] [Google Scholar]

[37] Laufer Robert S. and Wolfe Maxine. 1977. Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory. Journal of Social Issues 33, 3 (1977), 22–42. DOI: 10.1111/j.1540-4560.1977.tb01880.x [CrossRef] [Google Scholar]

[38] Li Ian, Dey Anind, and Forlizzi Jodi. 2010. A stage-based model of personal informatics systems. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, ACM, New York, NY, USA, 557–566. DOI: 10.1145/1753326.1753409 [CrossRef] [Google Scholar]

[39] Lugg Catherine A.. 2016. US Public Schools and the Politics of Queer Erasure. Palgrave Macmillan, New York, NY, USA. [Google Scholar]

[40] Madden Mary, Gilman Michele, Levy Karen, and Marwick Alice. 2017. Privacy, poverty, and big data: A matrix of vulnerabilities for poor Americans. Washington University Law Review 95 (2017), 53. https://ssrn.com/abstract=2930247 [Google Scholar]

[41] Madejski Michelle, Johnson Maritza, and Bellovin Steven M.. 2012. A study of privacy settings errors in an online social network. In 2012 IEEE International Conference on Pervasive Computing and Communications Workshops. IEEE, Piscataway, NJ, USA, 340–345. DOI: 10.1109/PerComW.2012.6197507 [CrossRef] [Google Scholar]

[42] Mankoff Jennifer, Fussell Susan R, Dillahunt Tawanna, Glaves Rachel, Grevet Catherine, Johnson Michael, Matthews Deanna, Matthews H Scott, McGuire Robert, Thompson Robert, and others. 2010. StepGreen.org: Increasing energy saving behaviors via social networks. In Fourth International AAAI Conference on Weblogs and Social Media. AAAI Press, Palo Alto, CA, USA, 106–113. https://www.aaai.org/ocs/index.php/ICWSM/ICWSM10/paper/view/1474 [Google Scholar]

[43] Martin Emily. 2009. Bipolar expeditions: Mania and depression in American culture. Princeton University Press, Princeton, NJ, USA. [Google Scholar]

[44] Matthews Mark, Murnane Elizabeth L., and Snyder Jaime. 2017a. Quantifying the Changeable Self: The Role of Self-Tracking in Coming to Terms With and Managing Bipolar Disorder. Human–Computer Interaction 32, 5–6 (2017), 413–446. DOI: 10.1080/07370024.2017.1294983 [CrossRef] [Google Scholar]

[45] Matthews Mark, Murnane Elizabeth L., Snyder Jaime, Guha Shion, Chang Pamara, Doherty Gavin, and Gay Geri. 2017b. The double-edged sword: A mixed methods study of the interplay between bipolar disorder and technology use. Computers in Human Behavior 75 (2017), 288–300. DOI: 10.1016/j.chb.2017.05.009 [CrossRef] [Google Scholar]

[46] Munson Sean A., Cavusoglu Hasan, Frisch Larry, and Fels Sidney. 2013. Sociotechnical Challenges and Progress in Using Social Media for Health. Journal of Medical Internet Research 15, 10, Article e226 (22 October 2013), 14 pages. DOI: 10.2196/jmir.2792 [PMC free article] [PubMed] [CrossRef] [Google Scholar]

[47] Murnane Elizabeth L., Cosley Dan, Chang Pamara, Guha Shion, Frank Ellen, Gay Geri, and Matthews Mark. 2016. Self-monitoring practices, attitudes, and needs of individuals with bipolar disorder: implications for the design of technologies to manage mental health. Journal of the American Medical Informatics Association 23, 3 (01 2016), 477–484. DOI: 10.1093/jamia/ocv165 [PubMed] [CrossRef] [Google Scholar]

[48] Murnane Elizabeth L., Walker Tara G., Tench Beck, Voida Stephen, and Snyder Jaime. 2018. Personal informatics in interpersonal contexts: Towards the design of technology that supports the social ecologies of long-term mental health management. Proceedings of the ACM on Human-Computer Interaction 2, CSCW (2018), 127. DOI: 10.1145/3274396 [CrossRef] [Google Scholar]

[49] Newman Mark W., Lauterbach Debra, Munson Sean A., Resnick Paul, and Morris Margaret E.. 2011. It’s not that I don’t have problems, I’m just not putting them on Facebook: Challenges and opportunities in using online social networks for health. In Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work (CSCW ’11). ACM, New York, NY, USA, 341–350. DOI: 10.1145/1958824.1958876 [CrossRef] [Google Scholar]

[50] Nissenbaum Helen. 2004. Privacy as contextual integrity. Washington Law Review 79 (2004), 119. [Google Scholar]

[51] Nissenbaum Helen. 2009. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, Palo Alto, CA, USA. [Google Scholar]

[52] O’Leary Kathleen, Bhattacharya Arpita, Munson Sean A., Wobbrock Jacob O., and Pratt Wanda. 2017. Design Opportunities for Mental Health Peer Support Technologies. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW ’17). ACM, New York, NY, USA, 1470–1484. DOI: 10.1145/2998181.2998349 [CrossRef] [Google Scholar]

[53] O’Leary Kathleen, Schueller Stephen M., Wobbrock Jacob O., and Pratt Wanda. 2018. “Suddenly, We Got to Become Therapists for Each Other”: Designing Peer Support Chats for Mental Health. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI ’18). ACM, New York, NY, USA, Article 331, 14 pages. DOI: 10.1145/3173574.3173905 [CrossRef] [Google Scholar]

[54] Palen Leysia and Dourish Paul. 2003. Unpacking privacy for a networked world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’03). ACM, New York, NY, USA, 129–136. DOI: 10.1145/642611.642635 [CrossRef] [Google Scholar]

[55] Patel Dilisha, Blandford Ann, Warner Mark, Shawe Jill, and Stephenson Judith. 2019. “I Feel Like Only Half a Man”: Online Forums As a Resource for Finding a “New Normal” for Men Experiencing Fertility Issues. Proc. ACMHum.-Comput. Interact 3, CSCW, Article 82 (November. 2019), 20 pages. DOI: 10.1145/3359184 [CrossRef] [Google Scholar]

[56] Peddinti Sai Teja, Ross Keith W., and Cappos Justin. 2014. “On the Internet, Nobody Knows You’re a Dog”: A Twitter Case Study of Anonymity in Social Networks. In Proceedings of the Second ACM Conference on Online Social Networks (COSN ’14). ACM, New York, NY, USA, 83–94. DOI: 10.1145/2660460.2660467 [CrossRef] [Google Scholar]

[57] Pierce James. 2019. Smart Home Security Cameras and Shifting Lines of Creepiness: A Design-Led Inquiry. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI ’19). ACM, New York, NY, USA, Article 45, 14 pages. DOI: 10.1145/3290605.3300275 [CrossRef] [Google Scholar]

[58] Pina Laura R., Sien Sang-Wha, Ward Teresa, Yip Jason C., Munson Sean A, Fogarty James, and Kientz Julie A.. 2017. From personal informatics to family informatics: Understanding family practices around health monitoring. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. ACM, New York, NY, USA, 2300–2315. DOI: 10.1145/2998181.2998362 [CrossRef] [Google Scholar]

[59] Price-Robertson Rhys, Obradovic Angela, and Morgan Brad. 2017. Relational recovery: beyond individualism in the recovery approach. Advances in Mental Health 15 (2017), 108–120. Issue 2. DOI: 10.1080/18387357.2016.1243014 [CrossRef] [Google Scholar]

[60] Rapp Amon and Cena Federica. 2016. Personal informatics for everyday life: How users without prior self-tracking experience engage with personal data. International Journal of Human-Computer Studies 94 (October. 2016), 1–17. DOI: 10.1016/j.ijhcs.2016.05.006 [CrossRef] [Google Scholar]

[61] Rodríguez Juana María. 2016. Queer Politics, Bisexual Erasure: Sexuality at the Nexus of Race, Gender, and Statistics. lambda nordica 21, 1–2 (2016), 169–182. https://escholarship.org/uc/item/8hv987pn [Google Scholar]

[62] Rooksby John, Rost Mattias, Morrison Alistair, and Chalmers Matthew. 2014. Personal tracking as lived informatics. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’14). ACM, New York, NY, USA, 1163–1172. DOI: 10.1145/2556288.2557039 [CrossRef] [Google Scholar]

[63] Sandhu Ravi S., Coyne Edward J., Feinstein Hal L., and Youman Charles E.. 1996. Role-Based Access Control Models. Computer 29, 2 (February. 1996), 38–47. DOI: 10.1109/2.485845 [CrossRef] [Google Scholar]

[64] Sannon Shruti, Murnane Elizabeth L., Bazarova Natalya N., and Gay Geri. 2019. “I was really, really nervous posting it”: Communicating about Invisible Chronic Illnesses across Social Media Platforms. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, New York, NY, USA, 353. DOI: 10.1145/3290605.3300583 [CrossRef] [Google Scholar]

[65] Schaub Florian, Balebako Rebecca, Durity Adam L., and Cranor Lorrie Faith. 2015a. A Design Space for Effective Privacy Notices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, 1–17. https://www.usenix.org/conference/soups2015/proceedings/presentation/schaub [Google Scholar]

[66] Schaub Florian, Könings Bastian, and Weber Michael. 2015b. Context-Adaptive Privacy: Leveraging Context Awareness to Support Privacy Decision Making. IEEE Pervasive Computing 14, 1 (January 2015), 34–43. DOI: 10.1109/MPRV.2015.5 [CrossRef] [Google Scholar]

[67] Scot Jamie. 2014. A Revisionist History: How Archives are Used to Reverse the Erasure of Queer People in Contemporary History. QED: A Journal in GLBTQ Worldmaking 1, 2 (2014), 205–209. DOI: 10.14321/qed.1.2.0205 [CrossRef] [Google Scholar]

[68] Shen HongHai and Dewan Prasun. 1992. Access Control for Collaborative Environments. In Proceedings of the 1992 ACM Conference on Computer-supported Cooperative Work (CSCW ’92). ACM, New York, NY, USA, 51–58. DOI: 10.1145/143457.143461 [CrossRef] [Google Scholar]

[69] Snyder Jaime, Murnane Elizabeth L., Lustig Caitie, and Voida Stephen. 2019. Visually Encoding the Lived Experience of Bipolar Disorder. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, New York, NY, USA, 133. DOI: 10.1145/3290605.3300363 [CrossRef] [Google Scholar]

[70] Suppes Trisha, Leverich Gabriele S., Keck Paul E. Jr, Nolen Willem A., Denicoff Kirk D., Altshuler Lori L., McElroy Susan L., Rush A. John, Kupka Ralph, Frye Mark A., Bickel Maia, and Post Robert M.. 2001. The Stanley Foundation Bipolar Treatment Outcome Network: II. demographics and illness characteristics of the first 261 patients. Journal of Affective Disorders 67, 1–3 (2001), 45–59. DOI: 10.1016/S0165-0327(01)00432-3 [PubMed] [CrossRef] [Google Scholar]

[71] Wang Yang, Leon Pedro Giovanni, Acquisti Alessandro, Cranor Lorrie Faith, Forget Alain, and Sadeh Norman. 2014. A Field Trial of Privacy Nudges for Facebook. In Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems (CHI ’14). ACM, New York, NY, USA, 2367–2376. DOI: 10.1145/2556288.2557413 [CrossRef] [Google Scholar]

[72] Wang Yang, Leon Pedro Giovanni, Scott Kevin, Chen Xiaoxuan, Acquisti Alessandro, and Cranor Lorrie Faith. 2013. Privacy Nudges for Social Media: An Exploratory Facebook Study. In Proceedings of the 22nd International Conference on World Wide Web (WWW ’13 Companion). ACM, New York, NY, USA, 763–770. DOI: 10.1145/2487788.2488038 [CrossRef] [Google Scholar]

[73] Warner Mark, Maestre Juan F., Gibbs Jo, Chung Chia-Fang, and Blandford Ann. 2019. Signal Appropriation of Explicit HIV Status Disclosure Fields in Sex-Social Apps Used by Gay and Bisexual Men. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI ’19). ACM, New York, NY, USA, Article 692, 15 pages. DOI: 10.1145/3290605.3300922 [CrossRef] [Google Scholar]

[74] West Peter, Van Kleek Max, Giordano Richard, Weal Mark J., and Shadbolt Nigel. 2018. Common Barriers to the Use of Patient-Generated Data Across Clinical Settings. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI ’18). ACM, New York, NY, USA, Article 484, 13 pages. DOI: 10.1145/3173574.3174058 [CrossRef] [Google Scholar]

[75] Zhao Xuan, Lampe Cliff, and Ellison Nicole B. 2016. The social media ecology: User perceptions, strategies and challenges. In Proceedings of the 2016 SIGCHI Conference on Human Factors in Computing Systems. ACM, New York, NY, USA, 89–100. DOI: 10.1145/2858036.2858333 [CrossRef] [Google Scholar]