Author(s):
- Pei-Yao Hung
- Mark S. Ackerman
Abstract:
With the advent of pervasive sensing devices, data captured about one’s everyday life (e.g., heart rate, sleep quality, emotion, or social activity) offers enormous possibilities for promoting in-home health care for severe chronic care, such as can be found in Spinal Cord Injury or Disorders or the like. Sharing these Everyday Data for Care (EDC) allows care team personnel (e.g., caregivers and clinicians) to assist with health monitoring and decision-making, but will also create tension and concerns (e.g., privacy) for people with health conditions due to the detailed nature of the data. Resolving these tensions and concerns is critical for the adoption and use of a pervasive healthcare environment.
We examine data sharing of EDC to determine how we can better manage the tradeoffs between privacy on one hand and the pro-active sharing of data that one needs for better care. In this paper, we target one critical aspect of using EDC, the problem of sharing an overwhelming number of sensor outputs with numerous care team recipients. We report the results of a scenario-based study that examined ways to reduce the burden of setting policies or rules to manage both the pro-active data sharing and the privacy aspects of care with EDC. In summary, we found that our participants were able to use self-generated groupings of EDC data, and more importantly, largely kept those groupings when creating to share data with potential recipients and when dealing with changes in their health trajectory. These findings offer hope that we can reduce the burden of authoring and maintaining data sharing and privacy policies through semi-automatic mechanisms, where the system suggests policies that are consistent with the users’ preferences – especially as health changes.
Documentation:
https://doi.org/10.1007/978-3-030-99194-4_18
References:
- Ackerman, M.S., Büyüktür, A.G., Hung, P.-Y., Meade, M.A., Newman, M.W.: Socio-technical design for the care of people with spinal cord injuries. In: Designing Healthcare That Works, pp. 1–18. Elsevier (2018) Google Scholar
- Ackerman, M.S., et al.: Simplifying user-controlled privacy policies. IEEE Pervasive Comput. 8, 28–32 (2009)CrossRef Google Scholar
- Almuhimedi, H., et al.: Your location has been shared 5,398 times!: a field study on mobile app privacy nudging. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI 2015, pp. 787–796. ACM, New York (2015). https://doi.org/10.1145/2702123.2702210. http://doi.acm.org/10.1145/2702123.2702210
- Amir, O., Grosz, B.J., Gajos, K.Z., Swenson, S.M., Sanders, L.M.: From care plans to care coordination: opportunities for computer support of teamwork in complex healthcare. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI 2015, pp. 1419–1428. ACM, New York (2015). https://doi.org/10.1145/2702123.2702320. http://doi.acm.org/10.1145/2702123.2702320
- Anderson, G.: Chronic care: making the case for ongoing care (2010) Google Scholar
- Apthorpe, N., Shvartzshnaider, Y., Mathur, A., Reisman, D., Feamster, N.: Discovering smart home internet of things privacy norms using contextual integrity. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(2), 59:1–59:23 (2018). https://doi.org/10.1145/3214262
- Arruda, M.F., Bulcão-Neto, R.F.: Toward a lightweight ontology for privacy protection in IoT. In: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, SAC 2019, pp. 880–888. Association for Computing Machinery, New York, April 2019. https://doi.org/10.1145/3297280.3297367
- Ayobi, A., Marshall, P., Cox, A.L., Chen, Y.: Quantifying the body and caring for the mind: self-tracking in multiple sclerosis. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, CHI 2017, Denver, Colorado, USA, pp. 6889–6901. Association for Computing Machinery, May 2017. https://doi.org/10.1145/3025453.3025869
- Bagalkot, N., Sokoler, T.: MagicMirror: towards enhancing collaborative rehabilitation practices. In: Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work, CSCW 2011, pp. 593–596. ACM, New York (2011). https://doi.org/10.1145/1958824.1958922. http://doi.acm.org/10.1145/1958824.1958922
- Bahirat, P., He, Y., Menon, A., Knijnenburg, B.: A data-driven approach to developing IoT privacy-setting interfaces. In: 23rd International Conference on Intelligent User Interfaces, IUI 2018, pp. 165–176. ACM, New York (2018). https://doi.org/10.1145/3172944.3172982. http://doi.acm.org/10.1145/3172944.3172982
- Barbosa, N.M., Park, J.S., Yao, Y., Wang, Y.: “What if?” predicting individual users’ smart home privacy preferences and their changes. Proc. Priv. Enhancing Technol. 2019(4), 211–231 (2019). https://doi.org/10.2478/popets-2019-0066
- Bernard, H.R.: Research Methods in Anthropology: Qualitative and Quantitative Approaches. Rowman & Littlefield (2017). Google-Books-ID: 2Fk7DwAAQBAJ Google Scholar
- Bernard, H.R.: Social Research Methods: Qualitative and Quantitative Approaches. SAGE (2000). Google-Books-ID: VDPftmVO5lYC Google Scholar
- Birnholtz, J., Jones-Rounds, M.: Independence and interaction: understanding seniors’ privacy and awareness needs for aging in place. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2010, pp. 143–152. ACM, New York (2010). https://doi.org/10.1145/1753326.1753349. http://doi.acm.org/10.1145/1753326.1753349
- Borders, K., Zhao, X., Prakash, A.: CPOL: high-performance policy evaluation. In: Proceedings of the 12th ACM conference on Computer and communications security, CCS 2005, pp. 147–157. Association for Computing Machinery, New York, November 2005. https://doi.org/10.1145/1102120.1102142
- Bowser, A., Shilton, K., Preece, J., Warrick, E.: Accounting for privacy in citizen science: ethical research in a context of openness. In: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, CSCW 2017, Portland, Oregon, USA, pp. 2124–2136. Association for Computing Machinery, February 2017. https://doi.org/10.1145/2998181.2998305
- Bowyer, A., Montague, K., Wheater, S., McGovern, R., Lingam, R., Balaam, M.: Understanding the family perspective on the storage, sharing and handling of family civic data. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, CHI 2018, pp. 136:1–136:13. ACM, New York (2018). https://doi.org/10.1145/3173574.3173710. http://doi.acm.org/10.1145/3173574.3173710
- Bélanger, F., Crossler, R.E., Hiller, J.S., Park, J.M., Hsiao, M.S.: POCKET: a tool for protecting children’s privacy online. Decis. Support Syst. 54(2), 1161–1173 (2013). https://doi.org/10.1016/j.dss.2012.11.010. http://www.sciencedirect.com/science/article/pii/S0167923612003429
- Büyüktür, A.G., Ackerman, M.S., Newman, M.W., Hung, P.-Y.: Design considerations for semi-automated tracking: self-care plans in spinal cord injury. In: Proceedings of the 11th EAI International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth 2017, pp. 183–192. ACM, New York (2017). https://doi.org/10.1145/3154862.3154870. http://doi.acm.org/10.1145/3154862.3154870
- Büyüktür, A.G., Hung, P.-Y., Newman, M.W., Ackerman, M.S.: Supporting collaboratively constructed independence: a study of spinal cord injury. Proc. ACM Hum.-Comput. Interact. 2(CSCW), 26:1–26:25 (2018). https://doi.org/10.1145/3274295. http://doi.acm.org/10.1145/3274295
- Choe, E.K., Consolvo, S., Jung, J., Harrison, B., Kientz, J.A.: Living in a glass house: a survey of private moments in the home. In: Proceedings of the 13th International Conference on Ubiquitous Computing, UbiComp 2011, Beijing, China, pp. 41–44. Association for Computing Machinery, September 2011. https://doi.org/10.1145/2030112.2030118
- Choe, E.K., Lee, N.B., Lee, B., Pratt, W., Kientz, J.A.: Understanding quantified-selfers’ practices in collecting and exploring personal data. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2014, pp. 1143–1152. ACM, New York (2014). https://doi.org/10.1145/2556288.2557372. http://doi.acm.org.proxy.lib.umich.edu/10.1145/2556288.2557372
- Chung, C.F., et al.: Identifying and planning for individualized change: patient-provider collaboration using lightweight food diaries in healthy eating and irritable bowel syndrome. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(1), 7:1–7:27 (2019). https://doi.org/10.1145/3314394
- Clarke, A.: Situational Analysis: Grounded Theory After the Postmodern Turn. SAGE Publications, Thousand Oaks (2005)CrossRef Google Scholar
- Consolvo, S., Roessler, P., Shelton, B.E., LaMarca, A., Schilit, B., Bly, S.: Technology for care networks of elders. IEEE Pervasive Comput. 3(2), 22–29 (2004). https://doi.org/10.1109/MPRV.2004.1316814CrossRef Google Scholar
- Centers for Disease Control and Prevention: About Chronic Diseases—CDC (2020). https://www.cdc.gov/chronicdisease/about/index.htm
- Emami-Naeini, P., et al.: Privacy expectations and preferences in an IoT world. In: Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pp. 399–412. USENIX Association, Santa Clara (2017). https://www.usenix.org/conference/soups2017/technical-sessions/presentation/naeini
- Epstein, D.A., Borning, A., Fogarty, J.: Fine-grained sharing of sensed physical activity: a value sensitive approach. In: Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2013, pp. 489–498. ACM, New York (2013). https://doi.org/10.1145/2493432.2493433. http://doi.acm.org/10.1145/2493432.2493433
- Felipe, S., Singh, A., Bradley, C., Williams, A.C., Bianchi-Berthouze, N.: Roles for personal informatics in chronic pain. In: 2015 9th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth), pp. 161–168, May 2015. https://doi.org/10.4108/icst.pervasivehealth.2015.259501
- Figueiredo, M.C., Chen, Y.: Patient-generated health data: dimensions, challenges, and open questions. Found. Trends® Hum.-Comput. Interact. 13(3), 165–297 (2020). https://doi.org/10.1561/1100000080
- Fischer, G., Lemke, A.C., Mastaglio, T., Morch, A.I.: Using critics to empower users. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 1990, pp. 337–347. ACM, New York (1990). https://doi.org/10.1145/97243.97305. http://doi.acm.org/10.1145/97243.97305
- Fong, P.W.: Relationship-based access control: protection model and policy language. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, pp. 191–202. ACM, New York (2011). https://doi.org/10.1145/1943513.1943539. http://doi.acm.org/10.1145/1943513.1943539
- Glasgow, R.E., Anderson, R.M.: In diabetes care, moving from compliance to adherence is not enough. Diab. Care 22(12), 2090–2092 (1999)CrossRef Google Scholar
- Scientific Software Development GmbH: ATLAS.ti: The Qualitative Data Analysis & Research Software (2020). https://atlasti.com/
- Grönvall, E., Verdezoto, N.: Beyond self-monitoring: understanding non-functional aspects of home-based healthcare technology. In: Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2013, pp. 587–596. ACM, New York (2013). https://doi.org/10.1145/2493432.2493495
- Harbach, M., Hettig, M., Weber, S., Smith, M.: Using personal examples to improve risk communication for security & privacy decisions. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2014, pp. 2647–2656. ACM, New York (2014). https://doi.org/10.1145/2556288.2556978. http://doi.acm.org/10.1145/2556288.2556978
- He, Y., Bahirat, P., Knijnenburg, B.P., Menon, A.: A data-driven approach to designing for privacy in household IoT. ACM Trans. Interact. Intell. Syst. (TiiS) 10(1), 10:1–10:47 (2019). https://doi.org/10.1145/3241378
- Hong, M.K., Wilcox, L., Machado, D., Olson, T.A., Simoneaux, S.F.: Care partnerships: toward technology to support teens’ participation in their health care. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI 2016, pp. 5337–5349. ACM, New York (2016). https://doi.org/10.1145/2858036.2858508. http://doi.acm.org/10.1145/2858036.2858508
- Hung, P.-Y., Ackerman, M.S.: Discount expertise metrics for augmenting community interaction. In: Proceedings of the Work-In-Progress Track of the 7th International Conference on Communities and Technologies, vol. 12, pp. 43–52 (2015) Google Scholar
- Iachello, G., et al.: Control, deception, and communication: evaluating the deployment of a location-enhanced messaging service. In: Beigl, M., Intille, S., Rekimoto, J., Tokuda, H. (eds.) UbiComp 2005. LNCS, vol. 3660, pp. 213–231. Springer, Heidelberg (2005). https://doi.org/10.1007/11551201_13CrossRef Google Scholar
- Jacobs, M.L., Clawson, J., Mynatt, E.D.: Comparing health information sharing preferences of cancer patients, doctors, and navigators. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, CSCW 2015, pp. 808–818. ACM, New York (2015). https://doi.org/10.1145/2675133.2675252. http://doi.acm.org/10.1145/2675133.2675252
- Junior, M.P., Xavier, S.I.D.R., Prates, R.O.: Investigating the use of a simulator to support users in anticipating impact of privacy settings in Facebook. In: Proceedings of the 18th International Conference on Supporting Group Work, GROUP 2014, pp. 63–72. ACM, New York (2014). https://doi.org/10.1145/2660398.2660419. http://doi.acm.org/10.1145/2660398.2660419
- Kanaan, H., Mahmood, K., Sathyan, V.: An ontological model for privacy in emerging decentralized healthcare systems. In: 2017 IEEE 13th International Symposium on Autonomous Decentralized System (ISADS), pp. 107–113, March 2017. https://doi.org/10.1109/ISADS.2017.37
- Kariotis, T., et al.: Emerging health data platforms: from individual control to collective data governance. Data Policy 2 (2020). https://doi.org/10.1017/dap.2020.14
- Karkar, R., et al.: TummyTrials: a feasibility study of using self-experimentation to detect individualized food triggers. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, CHI 2017, pp. 6850–6863. ACM, New York (2017). https://doi.org/10.1145/3025453.3025480. http://doi.acm.org/10.1145/3025453.3025480
- Kelley, P.G., Cranor, L.F., Sadeh, N.: Privacy as part of the app decision-making process. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2013, pp. 3393–3402. ACM, New York (2013). https://doi.org/10.1145/2470654.2466466. http://doi.acm.org/10.1145/2470654.2466466
- Knijnenburg, B.P.: Information disclosure profiles for segmentation and recommendation. In: SOUPS2014 Workshop on Privacy Personas and Segmentation (2014) Google Scholar
- Kumar, P., Schoenebeck, S.: The modern day baby book: enacting good mothering and stewarding privacy on Facebook. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, CSCW 2015, Vancouver, BC, Canada, pp. 1302–1312. Association for Computing Machinery, February 2015. https://doi.org/10.1145/2675133.2675149
- Kumaraguru, P., Cranor, L., Lobo, J., Calo, S.: A survey of privacy policy languages. In: Workshop on Usable IT Security Management (USM 2007): Proceedings of the 3rd Symposium on Usable Privacy and Security. ACM (2007) Google Scholar
- Könings, B.: User-centered awareness and control of privacy in Ubiquitous Computing. Dissertation, Universität Ulm, July 2015. https://doi.org/10.18725/OPARU-3240. https://oparu.uni-ulm.de/xmlui/handle/123456789/3267
- Langheinrich, M.: Privacy by design—principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45427-6_23CrossRef MATH Google Scholar
- Lee, H., Kobsa, A.: Privacy preference modeling and prediction in a simulated campuswide IoT environment. In: 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 276–285, March 2017. https://doi.org/10.1109/PERCOM.2017.7917874. ISSN 2474-249X
- Li, I., Dey, A., Forlizzi, J.: A stage-based model of personal informatics systems. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Atlanta, Georgia, USA, 10–15 April 2010, CHI 2010, pp. 557–566. ACM, New York (2010). https://doi.org/10.1145/1753326.1753409. http://doi.acm.org.proxy.lib.umich.edu/10.1145/1753326.1753409
- Li, Y., Vishwamitra, N., Hu, H., Caine, K.: Towards a taxonomy of content sensitivity and sharing preferences for photos. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, CHI 2020, pp. 1–14. Association for Computing Machinery, New York, April 2020. https://doi.org/10.1145/3313831.3376498
- Liu, L.S., et al.: Improving communication and social support for caregivers of high-risk infants through mobile technologies. In: Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work, CSCW 2011, pp. 475–484. ACM, New York (2011). https://doi.org/10.1145/1958824.1958897. http://doi.acm.org/10.1145/1958824.1958897
- Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing Facebook privacy settings: user expectations vs. reality. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, pp. 61–70 (2011) Google Scholar
- Loukil, F., Ghedira-Guegan, C., Boukadi, K., Benharkat, A.N.: LIoPY: a legal compliant ontology to preserve privacy for the Internet of Things. In: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), vol. 02, pp. 701–706, July 2018. https://doi.org/10.1109/COMPSAC.2018.10322. ISSN 0730-3157
- Luca, A.D., Zezschwitz, E.V.: Usable privacy and security. IT – Inf. Technol. 58(5), 215–216 (2016). https://doi.org/10.1515/itit-2016-0034. https://www.degruyter.com/document/doi/10.1515/itit-2016-0034/html
- Mamykina, L., Mynatt, E., Davidson, P., Greenblatt, D.: MAHI: investigation of social scaffolding for reflective thinking in diabetes management. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2008, pp. 477–486. ACM, New York (2008). https://doi.org/10.1145/1357054.1357131. http://doi.acm.org/10.1145/1357054.1357131
- Mazzia, A., LeFevre, K., Adar, E.: The PViz comprehension tool for social network privacy settings. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS 2012, pp. 13:1–13:12. ACM, New York (2012). https://doi.org/10.1145/2335356.2335374. http://doi.acm.org/10.1145/2335356.2335374
- Meade, M.A.: Health Mechanics: Tools for the Self-Management of Spinal Cord Injury and Disease. University of Michigan, Ann Arbor (2009) Google Scholar
- Miro: Miro—Free Online Collaborative Whiteboard Platform (2020). https://miro.com/
- Murnane, E.L., Walker, T.G., Tench, B., Voida, S., Snyder, J.: Personal informatics in interpersonal contexts: towards the design of technology that supports the social ecologies of long-term mental health management. Proc. ACM Hum.-Comput. Interact. 2(CSCW), 127:1–127:27 (2018). https://doi.org/10.1145/3274396
- Nissen, B., et al.: Should I Agree?: delegating consent decisions beyond the individual. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, CHI 2019, Glasgow, Scotland UK, pp. 515:1–515:13. ACM, New York (2019). https://doi.org/10.1145/3290605.3300745. http://doi.acm.org/10.1145/3290605.3300745
- Nunes, F., Fitzpatrick, G.: Self-care technologies and collaboration. Int. J. Hum.-Comput. Interact. 31(12), 869–881 (2015). https://doi.org/10.1080/10447318.2015.1067498
- Odom, W., Sellen, A., Harper, R., Thereska, E.: Lost in translation: understanding the possession of digital things in the cloud. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2012, Austin, Texas, USA, pp. 781–790. Association for Computing Machinery, May 2012. https://doi.org/10.1145/2207676.2207789
- Olejnik, K., Dacosta, I., Machado, J.S., Huguenin, K., Khan, M.E., Hubaux, J.P.: SmarPer: context-aware and automatic runtime-permissions for mobile devices. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 1058–1076, May 2017. https://doi.org/10.1109/SP.2017.25. ISSN 2375-1207
- World Health Organization: WHO—Integrated chronic disease prevention and control (2020). https://www.who.int/chp/about/integrated_cd/en/
- Pina, L.R., et al.: From personal informatics to family informatics: understanding family practices around health monitoring. In: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, CSCW 2017, pp. 2300–2315. ACM, New York (2017). https://doi.org/10.1145/2998181.2998362. http://doi.acm.org/10.1145/2998181.2998362
- Piras, E.M.: Beyond self-tracking: exploring and unpacking four emerging labels of patient data work. Health Inform. J. 25(3), 598–607 (2019). https://doi.org/10.1177/1460458219833121CrossRef Google Scholar
- Raber, F., Luca, A.D., Graus, M.: Privacy wedges: area-based audience selection for social network posts. In: Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, Denver (2016). https://www.usenix.org/conference/soups2016/workshop-program/wpi/presentation/raber
- Reeder, R.W., et al.: Expandable grids for visualizing and authoring computer security policies. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2008, pp. 1473–1482. ACM, New York (2008). https://doi.org/10.1145/1357054.1357285. http://doi.acm.org/10.1145/1357054.1357285
- Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38–47 (1996). https://doi.org/10.1109/2.485845CrossRef Google Scholar
- Schaub, F., Könings, B., Lang, P., Wiedersheim, B., Winkler, C., Weber, M.: PriCal: context-adaptive privacy in ambient calendar displays. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2014, pp. 499–510. ACM, New York (2014). https://doi.org/10.1145/2632048.2632087. http://doi.acm.org/10.1145/2632048.2632087
- Schroeder, J., et al.: Examining self-tracking by people with migraine: goals, needs, and opportunities in a chronic health condition. In: Proceedings of the 2018 Designing Interactive Systems Conference, DIS 2018, Hong Kong, China, pp. 135–148. Association for Computing Machinery, June 2018. https://doi.org/10.1145/3196709.3196738
- Schroeder, J., Hoffswell, J., Chung, C.F., Fogarty, J., Munson, S., Zia, J.: Supporting patient-provider collaboration to identify individual triggers using food and symptom journals. In: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, CSCW 2017, pp. 1726–1739. ACM, New York (2017). https://doi.org/10.1145/2998181.2998276. http://doi.acm.org/10.1145/2998181.2998276
- Quantified Self: Quantified Self – Self Knowledge Through Numbers. https://quantifiedself.com/, library Catalog: quantifiedself.com
- Sharma, A., Cosley, D.: Studying and modeling the connection between people’s preferences and content sharing. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, CSCW 2015, Vancouver, BC, Canada, pp. 1246–1257. Association for Computing Machinery, February 2015. https://doi.org/10.1145/2675133.2675151
- Smullen, D., Feng, Y., Zhang, S.A., Sadeh, N.: The best of both worlds: mitigating trade-offs between accuracy and user burden in capturing mobile app privacy preferences. Proc. Priv. Enhancing Technol. 2020(1), 195–215 (2020). https://doi.org/10.2478/popets-2020-0011. https://content.sciendo.com/view/journals/popets/2020/1/article-p195.xml
- Suh, J., Williams, S., Fann, J.R., Fogarty, J., Bauer, A.M., Hsieh, G.: Parallel journeys of patients with cancer and depression: challenges and opportunities for technology-enabled collaborative care. Proc. ACM Hum.-Comput. Interact. 4(CSCW1), 038:1–038:36 (2020). https://doi.org/10.1145/3392843
- Thayer, A., Bietz, M.J., Derthick, K., Lee, C.P.: I love you, let’s share calendars: calendar sharing as relationship work. In: Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, CSCW 2012, Seattle, Washington, USA, pp. 749–758. Association for Computing Machinery, February 2012. https://doi.org/10.1145/2145204.2145317. https://doi.org/10.1145/2145204.2145317
- Toch, E., et al.: Empirical models of privacy in location sharing. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing, UbiComp 2010, pp. 129–138. Association for Computing Machinery, New York, September 2010. https://doi.org/10.1145/1864349.1864364
- Toch, E., et al.: Locaccino: a privacy-centric location sharing application. In: Proceedings of the 12th ACM International Conference Adjunct Papers on Ubiquitous Computing – Adjunct, UbiComp 2010, pp. 381–382. Adjunct, ACM, New York (2010). https://doi.org/10.1145/1864431.1864446. http://doi.acm.org/10.1145/1864431.1864446
- Tolmie, P., Crabtree, A., Rodden, T., Colley, J., Luger, E.: “This has to be the cats”: personal data legibility in networked sensing systems. In: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, CSCW 2016, pp. 491–502. ACM, New York (2016). https://doi.org/10.1145/2818048.2819992. http://doi.acm.org/10.1145/2818048.2819992
- Tsai, L., et al.: Turtle guard: helping android users apply contextual privacy preferences. In: Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pp. 145–162. USENIX Association, Santa Clara (2017). https://www.usenix.org/conference/soups2017/technical-sessions/presentation/tsai
- Van Kleek, M., Liccardi, I., Binns, R., Zhao, J., Weitzner, D.J., Shadbolt, N.: Better the devil you know: exposing the data sharing practices of smartphone apps. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, CHI 2017, pp. 5208–5220. ACM, New York (2017). https://doi.org/10.1145/3025453.3025556. http://doi.acm.org/10.1145/3025453.3025556
- Vertesi, J., Kaye, J., Jarosewski, S.N., Khovanskaya, V.D., Song, J.: Data narratives: uncovering tensions in personal data management. In: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, CSCW 2016, pp. 478–490. ACM, New York (2016). https://doi.org/10.1145/2818048.2820017. http://doi.acm.org/10.1145/2818048.2820017
- Vescovi, M., Perentis, C., Leonardi, C., Lepri, B., Moiso, C.: My data store: toward user awareness and control on personal data. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, UbiComp 2014, pp. 179–182. Adjunct, ACM, New York (2014). https://doi.org/10.1145/2638728.2638745. http://doi.acm.org/10.1145/2638728.2638745
- Voida, A., Grinter, R.E., Ducheneaut, N., Edwards, W.K., Newman, M.W.: Listening in: practices surrounding iTunes music sharing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2005, Portland, Oregon, USA, pp. 191–200. Association for Computing Machinery, April 2005. https://doi.org/10.1145/1054972.1054999
- Wang, S., Hou, Y., Gao, F., Ma, S.: Ontology-based resource description model for Internet of Things. In: 2016 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 105–108, October 2016. https://doi.org/10.1109/CyberC.2016.29
- Wang, Y., Gou, L., Xu, A., Zhou, M.X., Yang, H., Badenes, H.: VeilMe: an interactive visualization tool for privacy configuration of using personality traits. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 817–826. ACM (2015) Google Scholar
- Wang, Y., Leon, P.G., Acquisti, A., Cranor, L.F., Forget, A., Sadeh, N.: A field trial of privacy nudges for Facebook. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2014, pp. 2367–2376. ACM, New York (2014). https://doi.org/10.1145/2556288.2557413. http://doi.acm.org/10.1145/2556288.2557413
- Westin, A.F.: Privacy and Freedom (1968). Google-Books-ID: EqGAfBTQreMC Google Scholar
- Yu, S.H., et al.: A mobile mediation tool for improving interaction between depressed individuals and caregivers. Pers. Ubiquitous Comput. 15(7), 695–706 (2011). https://doi.org/10.1007/s00779-010-0347-zCrossRef Google Scholar
- Zhao, J., Binns, R., Van Kleek, M., Shadbolt, N.: Privacy languages: are we there yet to enable user controls? In: Proceedings of the 25th International Conference Companion on World Wide Web, WWW 2016, pp. 799–806. Companion, International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, April 2016. https://doi.org/10.1145/2872518.2890590
- Zoom: Video Conferencing, Web Conferencing, Webinars, Screen Sharing (2020). https://zoom.us/