{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:32:04Z","timestamp":1776115924301,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,7]],"date-time":"2016-05-07T00:00:00Z","timestamp":1462579200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSERC","award":["436576"],"award-info":[{"award-number":["436576"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,7]]},"DOI":"10.1145\/2858036.2858232","type":"proceedings-article","created":{"date-parts":[[2016,5,5]],"date-time":"2016-05-05T14:08:22Z","timestamp":1462457302000},"page":"1362-1373","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Enhancing Mobile Content Privacy with Proxemics Aware Notifications and Protection"],"prefix":"10.1145","author":[{"given":"Huiyuan","family":"Zhou","sequence":"first","affiliation":[{"name":"Dalhousie University, Halifax, NS, Canada"}]},{"given":"Khalid","family":"Tearo","sequence":"additional","affiliation":[{"name":"Dalhousie University, Halifax, NS, Canada"}]},{"given":"Aniruddha","family":"Waje","sequence":"additional","affiliation":[{"name":"Dalhousie University, Halifax, NS, Canada"}]},{"given":"Elham","family":"Alghamdi","sequence":"additional","affiliation":[{"name":"Dalhousie University, Halifax, NS, Canada"}]},{"given":"Thamara","family":"Alves","sequence":"additional","affiliation":[{"name":"Federal University of S\u00e3o Carlos, S\u00e3o Carlos, Brazil"}]},{"given":"Vinicius","family":"Ferreira","sequence":"additional","affiliation":[{"name":"Federal University of Sao Carlos, Sao Carlos, Brazil"}]},{"given":"Kirstie","family":"Hawkey","sequence":"additional","affiliation":[{"name":"Dalhousie University, Halifax, Canada"}]},{"given":"Derek","family":"Reilly","sequence":"additional","affiliation":[{"name":"Dalhousie University, Halifax, Canada"}]}],"member":"320","published-online":{"date-parts":[[2016,5,7]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Personal Space, Territory, and Crowding. Monterey, Calif.: Brooks\/Cole.","author":"Altman I.","year":"1975"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01883.x"},{"key":"e_1_3_2_2_3_1","volume-title":"Culture and environment (No. 2). CUP Archive","author":"Altman I.","year":"1984"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1936652.1936676"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(03)00021-1"},{"key":"e_1_3_2_2_6_1","volume-title":"Proceedings of the Third European Conference on Computer-Supported Cooperative Work 13--17 September 1993, Milan, Italy ECSCW'93 (pp. 77--92)","author":"Bellotti V.","year":"1993"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-483-6_7"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2579528"},{"key":"e_1_3_2_2_9_1","volume-title":"Understanding the privacy space. First Monday, 7(10)","author":"Brunk B.","year":"2002"},{"key":"e_1_3_2_2_10_1","volume-title":"A user-centric privacy space framework","author":"Brunk B.","year":"2005"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441837"},{"key":"e_1_3_2_2_12_1","volume-title":"The U.S. mobile app report. Retrieved from: http:\/\/www.comscore.com\/Insights\/Presentations-andWhitepapers\/2014\/The-US-Mobile-App-Report","author":"Comscore","year":"2014"},{"key":"e_1_3_2_2_13_1","volume-title":"The role of representative design in an ecological approach to cognition. Psychological bulletin, 130(6), 959","author":"Dhami M. K.","year":"2004"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491568.2491570"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0308-5"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299019"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979280"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(11)70116-6"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1897239.1897250"},{"key":"e_1_3_2_2_20_1","volume-title":"The hidden dimension (Vol","author":"Hall E. T.","year":"1969"},{"key":"e_1_3_2_2_21_1","volume-title":"Ubicomp 2001: Ubiquitous Computing (pp. 240--246)","author":"Hansson R."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357135"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1268517.1268553"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1561\/1100000004"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1959826.1959834"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.01.041"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280683"},{"key":"e_1_3_2_2_28_1","volume-title":"Ubicomp 2001: Ubiquitous Computing (pp. 273--291)","author":"Langheinrich M."},{"key":"e_1_3_2_2_29_1","volume-title":"Lin, C. A., & Atkin","author":"Lee L.","year":"2014"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2013.6490252"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/289444.289505"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531643"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493223"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_3_2_2_35_1","volume-title":"Commentary on Research on New Security Indicators -essay","author":"Patrick A.","year":"2007"},{"key":"e_1_3_2_2_36_1","volume-title":"Compensatory reactions to spatial intrusion. Sociometry, 114--121","author":"Patterson M. L.","year":"1971"},{"key":"e_1_3_2_2_37_1","unstructured":"Polhemus Inc.(2013). G4 user manual. Retrieved on March 15 2013 from http:\/\/polhemus.com\/_assets\/img\/G4_User_Manual_UR M10PH238-D.pdf.  Polhemus Inc.(2013). G4 user manual. Retrieved on March 15 2013 from http:\/\/polhemus.com\/_assets\/img\/G4_User_Manual_UR M10PH238-D.pdf."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702164"},{"key":"e_1_3_2_2_40_1","volume-title":"Retrieved on","author":"Project Tango Depth Perception","year":"2015"},{"key":"e_1_3_2_2_41_1","volume-title":"Business people globally describe their ideal work environment. Retrieved from: press.regus.com\/unitedkingdom\/download\/60669\/gbs11theidealworkplaceenvironmentreport_final.pdf","author":"Regus","year":"2014"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078831"},{"key":"e_1_3_2_2_43_1","volume-title":"Proceedings of the 17th Australia conference on Computer-Human Interaction: Citizens Online: Considerations for Today and the Future (pp. 1--10)","author":"Tan D. S.","year":"2005"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125451.1125711"},{"key":"e_1_3_2_2_45_1","unstructured":"Thompson. H.(March 2011). Visual data breach risk assessment study. For People Security and 3M. Retrieved from: http:\/\/solutions.3m.com\/3MContentRetrievalAPI\/BlobServlet?locale=en_US&lmd=1291398659000&assetId=1273672752407&assetType=MMM_Image&blobAttribute=ImageFile  Thompson. H.(March 2011). Visual data breach risk assessment study. For People Security and 3M. Retrieved from: http:\/\/solutions.3m.com\/3MContentRetrievalAPI\/BlobServlet?locale=en_US&lmd=1291398659000&assetId=1273672752407&assetType=MMM_Image&blobAttribute=ImageFile"},{"key":"e_1_3_2_2_46_1","volume-title":"Information visualization: perception for design","author":"Ware C.","year":"2012"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133265.1133303"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2732726"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/2795315.2795316"}],"event":{"name":"CHI'16: CHI Conference on Human Factors in Computing Systems","location":"San Jose California USA","acronym":"CHI'16","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2858036.2858232","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2858036.2858232","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:54:20Z","timestamp":1750222460000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2858036.2858232"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,7]]},"references-count":48,"alternative-id":["10.1145\/2858036.2858232","10.1145\/2858036"],"URL":"https:\/\/doi.org\/10.1145\/2858036.2858232","relation":{},"subject":[],"published":{"date-parts":[[2016,5,7]]},"assertion":[{"value":"2016-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}