{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:42:24Z","timestamp":1767339744638,"version":"3.37.3"},"reference-count":77,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,10,8]],"date-time":"2021-10-08T00:00:00Z","timestamp":1633651200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,10,8]],"date-time":"2021-10-08T00:00:00Z","timestamp":1633651200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/M001636\/1","EP\/N028260\/2","EP\/R03351X\/1"],"award-info":[{"award-number":["EP\/M001636\/1","EP\/N028260\/2","EP\/R03351X\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Nottingham Research Fellowship (NRF) Award"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2022,2]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The home is a site marked by the increasing collection and use of personal data, whether online or from connected devices. This trend is accompanied by new data protection regulation and the development of privacy enhancing technologies (PETs) that seek to enable individual control over the processing of personal data. However, a great deal of the data generated within the connected home is interpersonal in nature and cannot therefore be attributed to an individual. The cardboard box study adapts the technology probe approach to explore with potential end users the salience of a PET called the Databox and to understand the challenge of collaborative rather than individual data management in the home. The cardboard box study was designed as an ideation card game and conducted with 22 households distributed around the UK, providing us with 38 participants. Demographically, our participants were of varying ages and had a variety of occupational backgrounds and differing household situations. The study makes it perspicuous that privacy is not a ubiquitous concern <jats:italic>within the home<\/jats:italic> as a great deal of data is shared by default of people living together; that when privacy is occasioned it performs a distinct social function that is concerned with <jats:italic>human security<\/jats:italic> and the safety and integrity of people rather than devices and data; and that current \u2018interdependent privacy\u2019 solutions that seek to support collaborative data management are <jats:italic>not well aligned<\/jats:italic> with the ways access control is negotiated and managed within the home.<\/jats:p>","DOI":"10.1007\/s00779-021-01655-9","type":"journal-article","created":{"date-parts":[[2021,10,8]],"date-time":"2021-10-08T15:00:33Z","timestamp":1633705233000},"page":"155-176","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["The cardboard box study: understanding collaborative data management in the connected home"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6929-5615","authenticated-orcid":false,"given":"Damla","family":"Kilic","sequence":"first","affiliation":[]},{"given":"Andy","family":"Crabtree","sequence":"additional","affiliation":[]},{"given":"Glenn","family":"McGarry","sequence":"additional","affiliation":[]},{"given":"Murray","family":"Goulden","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,8]]},"reference":[{"key":"1655_CR1","volume-title":"The environment and social behaviour: privacy, personal space, territory and crowding","author":"I Altman","year":"1975","unstructured":"Altman I (1975) The environment and social behaviour: privacy, personal space, territory and crowding. Brooks Cole, Monterey"},{"key":"1655_CR2","unstructured":"Bischoff P (2018). What is the consumer privacy bill of rights? Comparitech, 27 November 2018. https:\/\/www.comparitech.com\/blog\/vpn-privacy\/consumer-privacy-bill-of-rights. Accessed 6 December 2019"},{"key":"1655_CR3","unstructured":"Bowles N (2018). Thermostats, locks and lights: digital tools of domestic abuse. https:\/\/www.nytimes.com\/2018\/06\/23\/technology\/smart-home-devices-domestic-abuse.html. Accessed 6 December 2019"},{"key":"1655_CR4","doi-asserted-by":"publisher","unstructured":"Boyd D (2012). Networked privacy. Surveillance & Society, vol. 10, no. 3&4, December 2012, https:\/\/doi.org\/10.24908\/ss.v10i3\/4.4529","DOI":"10.24908\/ss.v10i3\/4.4529"},{"key":"1655_CR5","doi-asserted-by":"crossref","unstructured":"Braun V, Clarke V (2008) Using thematic analysis in psychology. Qualitative research in psychology, vol. 3 (2), pp. 77\u2013101","DOI":"10.1191\/1478088706qp063oa"},{"key":"1655_CR6","doi-asserted-by":"crossref","unstructured":"Button G, Harper R (1995) The relevance of \u2018work-practice\u2019 for design. Computer Supported Cooperative Work: The Journal of Collaborative Computing, vol. 4, December 1995, pp.263\u2013280","DOI":"10.1007\/BF00749172"},{"key":"1655_CR7","doi-asserted-by":"crossref","unstructured":"Chen J, Ping J W, Xu YC, Tan B (2015). Information privacy concern about peer disclosure in online social networks. IEEE Transactions on Engineering Management, vol. 62, issue 3 August 2015, pp. 311\u2013324","DOI":"10.1109\/TEM.2015.2432117"},{"key":"1655_CR8","unstructured":"Cognizant (2015). The rise of the smart product economy. https:\/\/www.cognizant.com\/InsightsWhitepapers\/the-rise-of-the-smart-product-economy-codex1249.pdf. Accessed 6 December 2019"},{"key":"1655_CR9","doi-asserted-by":"crossref","unstructured":"Crabtree A, Mortier R, Rodden T, Tolmie P (2012) Unremarkable networking: the home network as a part of everyday life. In DIS \u201812. Proceedings of the Designing Interactive Systems Conference, Newcastle, UK, 11-15 June, 2012. New York: ACM Press, pp. 554-563","DOI":"10.1145\/2317956.2318039"},{"key":"1655_CR10","doi-asserted-by":"crossref","unstructured":"Crabtree A, Mortier R (2015). Human data interaction: historical lessons from social studies and CSCW. In ECSCW \u201815. Proceedings of the 14th European Conference on Computer Supported Cooperative Work, Oslo, Norway, 19-23 September, 2015. Switzerland: Springer International Publishing, pp. 1-20","DOI":"10.1007\/978-3-319-20499-4_1"},{"key":"1655_CR11","doi-asserted-by":"crossref","unstructured":"Crabtree, A. and Tolmie, P., 2016. A day in the life of things in the home. Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing,","DOI":"10.1145\/2818048.2819954"},{"key":"1655_CR12","doi-asserted-by":"publisher","unstructured":"Crabtree A., Tolmie P., Rouncefield M. (2013) \u201cHow many bloody examples do you want?\u201d Fieldwork and generalisation. In: Bertelsen O., Ciolfi L., Grasso M., Papadopoulos G. (eds) ECSCW 2013: Proceedings of the 13th European Conference on Computer Supported Cooperative Work, 21-25 September 2013, Paphos, Cyprus. Springer, London. https:\/\/doi.org\/10.1007\/978-1-4471-5346-7_1","DOI":"10.1007\/978-1-4471-5346-7_1"},{"key":"1655_CR13","doi-asserted-by":"crossref","unstructured":"Crabtree A, Tolmie P, Knight W (2017). Repacking privacy for a networked world. Computer Supported Cooperative Work: The Journal of Collaborative Computing and Work Practices, vol. 26 (4), May 2017, pp. 453\u2013488","DOI":"10.1007\/s10606-017-9276-y"},{"key":"1655_CR14","doi-asserted-by":"crossref","unstructured":"Crabtree A et al (2018). Building accountability into the internet of things: the IoT Databox model. Journal of Reliable Intelligent Environments, vol.4, no.1, January 2018, pp. 39\u201355","DOI":"10.1007\/s40860-018-0054-5"},{"key":"1655_CR15","unstructured":"Crabtree, A, Hyland L, Colley J, Flintham M, Fischer J, Kwon H (2019). Probing IoT-based consumer services: \u2018insights\u2019 from the connected shower, personal and ubiquitous computing, Online First. DOI 0.1007\/s00779-019-01303-3"},{"key":"1655_CR16","unstructured":"de Montjoye Y, Wang S, Pentland A (2012). On the trusted use of large-scale personal data. Bulletin of the IEEE Technical Committee on Data Engineering, vol.35, no.4, March 2012, pp. 5\u20138"},{"key":"1655_CR17","unstructured":"Flintham M, Goulden M, Price D, Urquhart L (2019). Domesticating data: socio-legal perspectives on smart homes and good data design. Theory on Demand, vol. 29, pp. 343\u2013360"},{"key":"1655_CR18","doi-asserted-by":"crossref","unstructured":"Freed D, Palmer J, Minchala D, Levy K, Ristenpart T, Dell N (2018). \u201cA stalker\u2019s paradise\u201d \u2013 how intimate partner abusers exploit technology. In CHI \u201818. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Montreal, Canada, 21-26 April, 2018. New York: ACM Press, paper no. 667","DOI":"10.1145\/3173574.3174241"},{"key":"1655_CR19","unstructured":"FTC Staff Report (2015) Internet of things: privacy and security in a connected world. Federal Trade Commission, January 2015. https:\/\/www.ftc.gov\/system\/files\/documents\/reports\/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy\/150127iotrpt.pdf. Accessed 6 December 2019"},{"key":"1655_CR20","doi-asserted-by":"crossref","unstructured":"Fuentes C, Porcheron M, Fischer JE, Costanza E, Malik O, Ramchurn SD 2019. Tracking the consumption of home essentials. In CHI \u201819. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Glasgow, Scotland, 4-9 May, 2019. New York: ACM Press, paper no. 639","DOI":"10.1145\/3290605.3300869"},{"key":"1655_CR21","unstructured":"Garfinkel H (1967). Studies in ethnomethodology. Englewood Cliffs, New Jersey: Prentice Hall"},{"key":"1655_CR22","first-page":"337","volume-title":"Theoretical sociology: sociology: perspectives and development","author":"H Garfinkel","year":"1970","unstructured":"Garfinkel H, Sacks H (1970) On formal structures of practical action. In: McKinney JD, Teryakian EA (eds) Theoretical sociology: sociology: perspectives and development. Appleton-Century Crofts, New York, pp 337\u2013366"},{"key":"1655_CR23","volume-title":"Ethnomethodology\u2019s program: working out Durkheim\u2019s aphorism","author":"H Garfinkel","year":"2002","unstructured":"Garfinkel H (2002) Ethnomethodology\u2019s program: working out Durkheim\u2019s aphorism. Rowman & Littlefield Publishers, Lanham, Maryland"},{"key":"1655_CR24","unstructured":"General Data Protection Regulation (2016) Official Journal of the European Union, vol.59, pp. 1\u201388"},{"key":"1655_CR25","doi-asserted-by":"crossref","unstructured":"Gnesi S, Matteucci I, Moiso C, Mori P, Petrocchi M, Vescovi M (2014). My data, your data, our data: managing privacy preferences in multiple subjects personal data. In APF 2014. Proceedings of the Annual Privacy Forum, Athens Greece, 20\u201321 May 2014. Cham: Springer, pp. 154\u2013171","DOI":"10.1007\/978-3-319-06749-0_11"},{"key":"1655_CR26","doi-asserted-by":"crossref","unstructured":"Gonz\u00e1lez-Manzano L, Gonz\u00e1lez-Tablas A, Fuentes J, Ribagorda A (2014). cooped: co-owned personal data management. Computers & Security, vol 47, November 2014, pp. 41\u201365","DOI":"10.1016\/j.cose.2014.06.003"},{"key":"1655_CR27","doi-asserted-by":"crossref","unstructured":"Guo Y, Zhang L, Chen X (2014). Collaborative privacy management: mobile privacy beyond your own devices. In SPME \u201814. Proceedings of the ACM MobiCom Workshop on Security and Privacy in Mobile Environments, Maui, Hawaii, 7-11 September 2014. New York: ACM Press, pp. 25-30","DOI":"10.1145\/2646584.2646590"},{"key":"1655_CR28","doi-asserted-by":"crossref","unstructured":"Goulden M, Tolmie P, Lodge T, Mortier R, Pietilainen A, Teixeira R (2017). Living with interpersonal data: observability and accountability in the age of pervasive ICT. New Media and Society, vol. 20 (4), April 2018, pp. 1580\u20131599","DOI":"10.1177\/1461444817700154"},{"key":"1655_CR29","volume-title":"The presentation of self in everyday life","author":"I Goffman","year":"1956","unstructured":"Goffman I (1956) The presentation of self in everyday life. University of Edinburgh, Edinburgh"},{"key":"1655_CR30","volume-title":"Computer supported cooperative work: a book of readings","author":"I Greif","year":"1988","unstructured":"Greif I (1988) Computer supported cooperative work: a book of readings. Morgan Kaufmann Publishers, San Mateo"},{"key":"1655_CR31","doi-asserted-by":"crossref","unstructured":"Harper R (ed.) (2011). The connected home: the future of domestic life. London, Springer-Verlag.","DOI":"10.1007\/978-0-85729-476-0"},{"key":"1655_CR32","doi-asserted-by":"crossref","unstructured":"Hu H, Ahn G (2011). Multiparty authorization framework for data sharing in online social networks. In DBSec 2011. Proceedings of the IFIP Annual Conference on Data Applications Security and Privacy, Richmond (VA), USA, 11\u201313 July 2011. Heidelberg: Springer, pp. 29\u201343","DOI":"10.1007\/978-3-642-22348-8_5"},{"key":"1655_CR33","doi-asserted-by":"crossref","unstructured":"Hu H, Ahn G, Jorgensen J (2013). Multiparty access control for online social networks: model and mechanisms. IEEE Transactions on Knowledge and Data Engineering, vol. 25, issue 7, July 2013, pp. 1614\u20131627","DOI":"10.1109\/TKDE.2012.97"},{"key":"1655_CR34","doi-asserted-by":"crossref","unstructured":"Humbert M, Trubert B, Huguenin K (2019). A survey on interdependent privacy. ACM Computing Surveys, vol.52 (6), October 2019, article 122","DOI":"10.1145\/3360498"},{"key":"1655_CR35","unstructured":"ICO (2019). Personal data of both the requester and others. https:\/\/ico.org.uk\/media\/1209\/personal-data-of-both-the-requester-and-others-foi-eir.pdf. Accessed 6 May 2020"},{"key":"1655_CR36","doi-asserted-by":"crossref","unstructured":"Ilia P, Carminati B, Ferrari E, Fragopoulou P, Ioannidis S (2017). SAMPAC: socially-aware collaborative multi-party access control. In CODASPY \u201817. Proceedings of the 7th ACM Conference on Data and Application Security, Scottsdale (AZ), USA, 22-24 March 2017. New York: ACM Press, pp. 71-82","DOI":"10.1145\/3029806.3029834"},{"key":"1655_CR37","unstructured":"Internet of Shit (2019). https:\/\/internetofshit.net. Accessed 24 September 2019"},{"key":"1655_CR38","unstructured":"Internet of Useless Things (2019). https:\/\/iout.rehabagency.ai. Accessed 24 September 2019"},{"key":"1655_CR39","unstructured":"Kilic D (2019). The cardboard box study. https:\/\/drive.google.com\/open?id=1TKEBPN9HNa6WMmnrAVAb3gZ00Na4qT0e. Accessed 12 December 2019"},{"key":"1655_CR40","doi-asserted-by":"crossref","unstructured":"Kek\u00fcll\u00fco\u011flu D, K\u00f6kciyan N, Yolum P (2016). Strategies for privacy negotiation in online social networks. In PrAISe \u201816. Proceedings of the 1st International Workshop on AI for Privacy and Security, The Hague, Holland, 29-30 August 2016. New York: ACM Press, pp. 1-8","DOI":"10.1145\/2970030.2970035"},{"key":"1655_CR41","doi-asserted-by":"crossref","unstructured":"Li F, Yu J, Zhang L, Sun Z, Lv M (2017a). A privacy-preserving method for photo sharing in instant message systems. In ICCSP \u201817. Proceedings of the International Conference on Cryptography, Security and Privacy, Wuhan, China, 17\u201319 March 2017. New York: ACM Press, pp. 38\u201343","DOI":"10.1145\/3058060.3058081"},{"key":"1655_CR42","doi-asserted-by":"crossref","unstructured":"Li Y, Vishwamitra N, Knijnenburg B, Hu H, Caine K (2017b). Effectiveness and users\u2019 experience of obfuscation as a privacy-enhancing technology for sharing photos. Proceedings of the ACM on Human-Computer Interaction, vol.1, December 2017, article 67","DOI":"10.1145\/3134702"},{"key":"1655_CR43","doi-asserted-by":"crossref","unstructured":"Mehregan P, Fong P (2016). Policy negotiation for co-owned resources in relationship-based access control. In SACMAT \u201816. Proceedings of the 21st ACM Symposium on Access Control Models and Technologies, Shanghai, China, 5-8 June 2016. New York: ACM Press, pp. 125-136","DOI":"10.1145\/2914642.2914652"},{"key":"1655_CR44","doi-asserted-by":"crossref","unstructured":"Mortier R et al (2016). Personal data management with the databox: what\u2019s inside the box? In CAN \u201816. Proceedings of the 2016 ACM Workshop on Cloud-Assisted Networking, Irvine, California, 12 December 2016. New York: ACM Press, pp. 49\u201354","DOI":"10.1145\/3010079.3010082"},{"key":"1655_CR45","unstructured":"Miller P (2018) What is edge computing? The Verge, 7 May, 2018. https:\/\/www.theverge.com\/circuitbreaker\/2018\/5\/7\/17327584\/edge-computing-cloud-google-microsoft-apple-amazon. Accessed 6 December 2019"},{"key":"1655_CR46","unstructured":"Mydex (2007). https:\/\/mydex.org\/about-mydex. Accessed 6 December 2019"},{"key":"1655_CR47","unstructured":"Nishi M (2018). Data protection in Japan to align with GDPR. Skadden, Arps, Slate, Meagher & Flom LLP and Affiliates, 24 September 2018. https:\/\/www.skadden.com\/insights\/publications\/2018\/09\/quarterly-insights\/data-protection-in-japan-to-align-with-gdpr. Accessed 6 December 2019"},{"key":"1655_CR48","unstructured":"Nissenbaum H (2004). Privacy as contextual integrity. Washington Law Review, vol. 79, no. 30, February 2004, pp. 101\u2013139"},{"key":"1655_CR49","unstructured":"Office for National Statistics (2016). Violent crime and sexual offences - intimate personal violence and serious sexual assault. https:\/\/www.ons.gov.uk\/peoplepopulationandcommunity\/crimeandjustice\/compendium\/focusonviolentcrimeandsexualoffences\/2015-02-12\/chapter4violentcrimeandsexualoffencesintimatepersonalviolenceandserioussexualassault. Accessed 6 December 2019"},{"key":"1655_CR50","doi-asserted-by":"crossref","unstructured":"Olteanu A, Huguenin K, Dacosta I, Hubaux J (2018). Consensual and privacy-preserving sharing of multi-subject and interdependent data. In NDSS. Proceedings of the Symposium on Network and Distributed Systems Security, San Diego (CA), USA, 18-21 February 2018. https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2018\/07\/ndss2018_06B-1_Olteanu_paper.pdf. Accessed 7 May 2020","DOI":"10.14722\/ndss.2018.23002"},{"key":"1655_CR51","doi-asserted-by":"crossref","unstructured":"Palen L, Dourish P (2003). Unpacking \u2018privacy\u2019 for a networked world. In CHI \u201803. Proceedings of the CHI Conference on Human Factors in Computing Systems, 23-27 February 2003. New York: ACM Press, pp. 129-136","DOI":"10.1145\/642611.642635"},{"key":"1655_CR52","unstructured":"Parsons T (1968) The structure of social action. New York: Free Press"},{"issue":"3","key":"1655_CR53","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1111\/j.1756-2589.2010.00052.x","volume":"2","author":"S Petronio","year":"2010","unstructured":"Petronio S (2010) Communication privacy management theory: what do we know about family privacy regulation? Journal of Family Theory & Review 2(3) September 2010:175\u2013196","journal-title":"Journal of Family Theory & Review"},{"key":"1655_CR54","unstructured":"Poikola A, Kuikkaniemi K, Honko H (2015). MyData - a nordic model for human-centered personal data management and processing. http:\/\/urn.fi\/URN:ISBN:978-952-243-455-5. Accessed 1 August 2019"},{"key":"1655_CR55","volume-title":"Mundane reason: reality in everyday and sociological discourse","author":"M Pollner","year":"1987","unstructured":"Pollner M (1987) Mundane reason: reality in everyday and sociological discourse. Cambridge University Press, Cambridge"},{"key":"1655_CR56","unstructured":"Postscapes (2019) IoT devices and products. https:\/\/www.postscapes.com\/internet-of-things-award\/winners. Accessed 6 December 2019"},{"key":"1655_CR57","unstructured":"Radaelli L, Sapiezynski P, Houssiau P, Shmueli E, de Montjoye Y(2018). Quantifying surveillance in the networked age: node-based intrusions and group privacy. arXiv, March 2018. https:\/\/arxiv.org\/abs\/1803.09007. Accessed 6 May 2020"},{"key":"1655_CR58","doi-asserted-by":"crossref","unstructured":"Rodden T, Benford S (2003). The evolution of buildings and implications for the design of ubiquitous domestic environments. In CHI \u201803. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Fort Lauderdale, Florida, 5-10 April 2003. New York: ACM Press, pp. 9-16","DOI":"10.1145\/642611.642615"},{"key":"1655_CR59","doi-asserted-by":"crossref","unstructured":"Sailaja N, Colley J, Crabtree A, Gradinar A, Coulton P, Forrester I, Kerlin L, Stenton P (2019) The living room of the future. In TVX \u201819. Proceedings of the ACM International Conference on Interactive Experiences for Television and Online Video, Salford, England, 5-7 June, 2019. New York: ACM Press, pp. 95-107","DOI":"10.1145\/3317697.3323360"},{"key":"1655_CR60","doi-asserted-by":"crossref","unstructured":"Sacks, H. (1984) \u201cNotes on methodology\u201d, Structures of social action: studies in conversation analysis (eds. Maxwell, J.M. and Heritage, J.), pp. 21-27, Cambridge University Press","DOI":"10.1017\/CBO9780511665868.005"},{"key":"1655_CR61","unstructured":"Sacks H (1992). The baby cried. The mommy picked it up. In G. Jefferson (ed): Lectures on conversation. Oxford: Blackwell, Volume I, Lecture 1, spring 1966, pp. 236-242"},{"key":"1655_CR62","doi-asserted-by":"crossref","unstructured":"Schmidt K, Bannon L (1992) Taking CSCW seriously: supporting articulation work. Computer Supported Cooperative Work: An International Journal, vol. 1 (1), March 1992, pp. 7\u201340","DOI":"10.1007\/BF00752449"},{"key":"1655_CR63","unstructured":"Solid (2018). https:\/\/solid.mit.edu. Accessed 1 August 2019"},{"key":"1655_CR64","doi-asserted-by":"crossref","unstructured":"Squicciarini A, Shehab M, Paci F (2009). Collective privacy management in social networks. In WWW \u201809. Proceedings of the 18th International Conference on World Wide Web, Madrid, Spain, 20\u201324 April 2009. New York: ACM Press, pp. 521\u2013530","DOI":"10.1145\/1526709.1526780"},{"key":"1655_CR65","doi-asserted-by":"crossref","unstructured":"Such J, Rovatsos M (2016). Privacy policy negotiation in social media. ACM Transactions on Autonomous and Adaptive Systems, vol. 11, no. 1, February 2016, article no.4","DOI":"10.1145\/2821512"},{"key":"1655_CR66","doi-asserted-by":"crossref","unstructured":"Thomas K, Grier C, Nicol D (2010). unFriendly: multi-party privacy risks in social networks. In PETS 2010. Proceedings of the International Symposium on Privacy Enhancing Technologies Symposium, Berlin, Germany, 21\u201323 July 2010. Heidelberg: Springer, pp. 236\u2013252","DOI":"10.1007\/978-3-642-14527-8_14"},{"key":"1655_CR67","doi-asserted-by":"crossref","unstructured":"Tolmie P, Crabtree A (2017) The practical politics of sharing personal data. Personal and Ubiquitous Computing, vol. 22 (2), August 2017, pp. 293\u2013315","DOI":"10.1007\/s00779-017-1071-8"},{"key":"1655_CR68","unstructured":"UoN (2019) Integrity and ethics. https:\/\/www.nottingham.ac.uk\/research\/ethics-and-integrity. Accessed 6 December 2019"},{"key":"1655_CR69","doi-asserted-by":"crossref","unstructured":"vom Lehn D (2019). from garfinkel\u2019s \u2018experiments in miniature\u2019 to the ethnomethodological analysis of interaction. Human Studies, vol. 42, February 2019, pp. 305\u2013326","DOI":"10.1007\/s10746-019-09496-5"},{"key":"1655_CR70","unstructured":"Ward P (2015). Hub of all things (HAT). In J. Richards (ed.) Digital leaders. Swindon, Wiltshire, British Computer Society, pp. 58\u201359"},{"key":"1655_CR71","volume-title":"Privacy and freedom","author":"A Westin","year":"1967","unstructured":"Westin A (1967) Privacy and freedom. Atheneum, New York"},{"key":"1655_CR72","doi-asserted-by":"crossref","unstructured":"Wishart R, Corapi D, Marinovic S, Sloman M (2010). Collaborative privacy policy authoring in a social networking context. In POLICY 2010. Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, Fairfax (VA), USA, 21\u201323 July 2010. New Jersey: IEEE, pp. 1\u20138","DOI":"10.1109\/POLICY.2010.13"},{"key":"1655_CR73","doi-asserted-by":"crossref","unstructured":"W\u00f6lfel C, Merritt T (2013) Method card design dimensions: a survey of card-based design tools. In P. Kotze, G. Marsden, G. Lindgaard, J. Wesson and M. Winckler (eds.): INTERACT 2013. Proceedings of the 14th IFIP TC 13 International Conference on Human-Computer Interaction, Cape Town, South Africa, 2\u20136 September, 2013. Heidelberg: Springer-Verlag pp.479\u2013486","DOI":"10.1007\/978-3-642-40483-2_34"},{"key":"1655_CR74","doi-asserted-by":"crossref","unstructured":"Xu K, Guo Y, Guo L, Fang Y, Li X (2017). My privacy my decision: control of photo sharing on online social networks. IEEE Transactions on Dependable and Secure Computing, vol. 14, issue 2 March 2017, pp. 199\u2013210","DOI":"10.1109\/TDSC.2015.2443795"},{"issue":"4","key":"1655_CR75","doi-asserted-by":"publisher","first-page":"808","DOI":"10.1021\/acssensors.9b00440","volume":"4","author":"H Yousefi","year":"2019","unstructured":"Yousefi H, Su H, Imani S, Alkhaldi K, Filipe C, Didar T (2019) Intelligent food packaging: a review of smart sensing technologies for monitoring food quality. ACS Sensors 4(4):808\u2013821","journal-title":"ACS Sensors"},{"key":"1655_CR76","doi-asserted-by":"crossref","unstructured":"Zhong H, Squicciarini A, Miller D (2018). Toward automated multiparty privacy conflict detection. In CIKM \u201818. Proceedings of the 27th International conference on Information and Knowledge Management, Torino, Italy, 22\u201326 October 2018. New York: ACM Press, pp. 1811-1814","DOI":"10.1145\/3269206.3269329"},{"key":"1655_CR77","unstructured":"Zimmerman D (1970). The practicalities of rule use. Pp.221-238. in Douglas, J.D. (ed.): Understanding everyday life: toward the reconstruction of sociological knowledge. Chicago: Aldine Publishing Company, 221\u2013238"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-021-01655-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00779-021-01655-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-021-01655-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,11]],"date-time":"2022-01-11T03:07:28Z","timestamp":1641870448000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00779-021-01655-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,8]]},"references-count":77,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["1655"],"URL":"https:\/\/doi.org\/10.1007\/s00779-021-01655-9","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"type":"print","value":"1617-4909"},{"type":"electronic","value":"1617-4917"}],"subject":[],"published":{"date-parts":[[2021,10,8]]},"assertion":[{"value":"30 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}