{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T09:17:09Z","timestamp":1768036629086,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T00:00:00Z","timestamp":1493683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EU Horizon 2020","award":["643644"],"award-info":[{"award-number":["643644"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,2]]},"DOI":"10.1145\/3025453.3025861","type":"proceedings-article","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T12:34:28Z","timestamp":1493814868000},"page":"6425-6437","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Privacy Considerations when Designing Social Network Systems to Support Successful Ageing"],"prefix":"10.1145","author":[{"given":"Andrew R.","family":"McNeill","sequence":"first","affiliation":[{"name":"Northumbria University, Newcastle upon Tyne, United Kingdom"}]},{"given":"Lynne","family":"Coventry","sequence":"additional","affiliation":[{"name":"Northumbria University, Newcastle upon Tyne, United Kingdom"}]},{"given":"Jake","family":"Pywell","sequence":"additional","affiliation":[{"name":"Northumbria University, Newcastle upon Tyne, United Kingdom"}]},{"given":"Pam","family":"Briggs","sequence":"additional","affiliation":[{"name":"Northumbria University, Newcastle upon Tyne, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2017,5,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Handbook of the psychology of aging","author":"Antonucci Toni C.","unstructured":"Toni C. Antonucci . 2001. Social relations an examination of social networks, social support . In Handbook of the psychology of aging , James Birren and K Warner Schaie (eds.). Academic Press , London , 427--453. Toni C. Antonucci. 2001. Social relations an examination of social networks, social support. In Handbook of the psychology of aging, James Birren and K Warner Schaie (eds.). Academic Press, London, 427--453."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1037\/0882-7974.12.1.189"},{"key":"e_1_3_2_1_3_1","volume-title":"Retrieved","author":"Berkman LF","year":"1986","unstructured":"LF Berkman , CS Berkman , and S Kasl . 1986 . Depressive symptoms in relation to physical health and functioning in the elderly. American journal of epidemiology 124, 3: 372--388 . Retrieved September 21, 2016 from http:\/\/aje.oxfordjournals.org\/content\/124\/3\/372.short LF Berkman, CS Berkman, and S Kasl. 1986. Depressive symptoms in relation to physical health and functioning in the elderly. American journal of epidemiology 124, 3: 372--388. Retrieved September 21, 2016 from http:\/\/aje.oxfordjournals.org\/content\/124\/3\/372.short"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504335.2504407"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1097\/01.JGP.0000195222.93655.d1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.4017\/gt.2013.11.3.001.00"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"A. Bowling. 2005. What is successful ageing and who should define it? BMJ 331 7531: 1548--1551.  A. Bowling. 2005. What is successful ageing and who should define it? BMJ 331 7531: 1548--1551.","DOI":"10.1136\/bmj.331.7531.1548"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1017\/S095925989800848X"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1186\/1479-5868-10-14"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1037\/e577562012-003"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 6th International Conference on Body Area Networks, ICST (Institute for Computer Sciences, SocialInformatics and Telecommunications Engineering), 71--77","author":"Fisher Drew","year":"2011","unstructured":"Keng-hao Chang, Drew Fisher , John Canny , and Bj\u00f6rn Hartmann . 2011 . How's my mood and stress?: an efficient speech analysis library for unobtrusive monitoring on mobile phones . Proceedings of the 6th International Conference on Body Area Networks, ICST (Institute for Computer Sciences, SocialInformatics and Telecommunications Engineering), 71--77 . Keng-hao Chang, Drew Fisher, John Canny, and Bj\u00f6rn Hartmann. 2011. How's my mood and stress?: an efficient speech analysis library for unobtrusive monitoring on mobile phones. Proceedings of the 6th International Conference on Body Area Networks, ICST (Institute for Computer Sciences, SocialInformatics and Telecommunications Engineering), 71--77."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1097\/01.JGP.0000192501.03069.bc"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2077546.2077552"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1093\/gerona\/56.suppl_2.13"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2010.104"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.1053"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2146303.2146331"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493495"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2582051.2582089"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1123\/japa.19.4.347"},{"key":"e_1_3_2_1_22_1","volume-title":"Technology and Aging: Selected Papers from the 2007 International Conference on Technology and Aging","author":"Hayes Tamara","unstructured":"Tamara Hayes , Misha Pavel , and Jeffrey Kaye . 2008. An approach for deriving continuous health assessment indicators from in-home sensor data . In Technology and Aging: Selected Papers from the 2007 International Conference on Technology and Aging , Alex Mihailidis, Jennifer Boger, Henry Kautz and Lawrence Normie (eds.). IOS Press , Amsterdam, Netherlands , 130--137. Tamara Hayes, Misha Pavel, and Jeffrey Kaye. 2008. An approach for deriving continuous health assessment indicators from in-home sensor data. In Technology and Aging: Selected Papers from the 2007 International Conference on Technology and Aging, Alex Mihailidis, Jennifer Boger, Henry Kautz and Lawrence Normie (eds.). IOS Press, Amsterdam, Netherlands, 130--137."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/1525822X06298589"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1177\/0269216308098799"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8721.00025"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.120.3.450"},{"key":"e_1_3_2_1_27_1","first-page":"1","article-title":"Age differences in privacy attitudes, literacy and privacy management on Facebook. Cyberpsychology","volume":"10","author":"Kezer Murat","year":"2016","unstructured":"Murat Kezer , Bar\u0131\u015f Sevi , Zeynep Cemalcilar , and Lemi Baruh . 2016 . Age differences in privacy attitudes, literacy and privacy management on Facebook. Cyberpsychology : Journal of Psychosocial Research on Cyberspace 10 , 1 . Murat Kezer, Bar\u0131\u015f Sevi, Zeynep Cemalcilar, and Lemi Baruh. 2016. Age differences in privacy attitudes, literacy and privacy management on Facebook. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 10, 1.","journal-title":"Journal of Psychosocial Research on Cyberspace"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1177\/0272989X07306782"},{"key":"e_1_3_2_1_29_1","volume-title":"Ubicomp 2001: Ubiquitous Computing, Gregory D","author":"Langheinrich Marc","unstructured":"Marc Langheinrich . 2001. Privacy by Design -- Principles of Privacy-Aware Ubiquitous Systems . In Ubicomp 2001: Ubiquitous Computing, Gregory D . Abowd, Barry Brumitt and Steven Shafer (eds.). Springer Berlin Heidelberg , Berlin , 273--291. Marc Langheinrich. 2001. Privacy by Design -- Principles of Privacy-Aware Ubiquitous Systems. In Ubicomp 2001: Ubiquitous Computing, Gregory D. Abowd, Barry Brumitt and Steven Shafer (eds.). Springer Berlin Heidelberg, Berlin, 273--291."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-014-0810-3"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-014-9492-7"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2305316.2305332"},{"key":"e_1_3_2_1_33_1","unstructured":"Joseph Luft and H. Ingham. 1961. The Johari Window: a graphic model of awareness in interpersonal relations. Human relations training news 5 9: 6--7.  Joseph Luft and H. Ingham. 1961. The Johari Window: a graphic model of awareness in interpersonal relations. Human relations training news 5 9: 6--7."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2007.4353792"},{"key":"e_1_3_2_1_35_1","volume-title":"Privacy management on social media sites","author":"Madden Mary","year":"2012","unstructured":"Mary Madden . 2012. Privacy management on social media sites . Pew Research Center . Retrieved from http:\/\/www.pewinternet.org\/Reports\/ 2012 \/Privacymanagement-on-social-media.aspx Mary Madden. 2012. Privacy management on social media sites. Pew Research Center. Retrieved from http:\/\/www.pewinternet.org\/Reports\/2012\/Privacymanagement-on-social-media.aspx"},{"key":"e_1_3_2_1_36_1","volume-title":"Computing with Social Trust","author":"Marsh Stephen","unstructured":"Stephen Marsh and Pamela Briggs . 2009. Examining Trust , Forgiveness and Regret as Computational Concepts . In Computing with Social Trust . Springer London , London , 9--43. Stephen Marsh and Pamela Briggs. 2009. Examining Trust, Forgiveness and Regret as Computational Concepts. In Computing with Social Trust. Springer London, London, 9--43."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979245"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Tobias Nef Raluca L Ganea Ren\u00e9 M M\u00fcri and Urs P Mosimann. 2013. Social networking sites and older users - a systematic review. International psychogeriatrics 25 7: 1041--53.  Tobias Nef Raluca L Ganea Ren\u00e9 M M\u00fcri and Urs P Mosimann. 2013. Social networking sites and older users - a systematic review. International psychogeriatrics 25 7: 1041--53.","DOI":"10.1017\/S1041610213000355"},{"key":"e_1_3_2_1_39_1","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"Nissenbaum Helen","unstructured":"Helen Nissenbaum . 2009. Privacy in context: Technology, policy, and the integrity of social life . Stanford University Press . Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1006\/jevp.1997.0049"},{"key":"e_1_3_2_1_41_1","volume-title":"Social Media Usage: 20052015","author":"Perrin Andrew","year":"2015","unstructured":"Andrew Perrin . 2015. Social Media Usage: 20052015 . Pew Research Center . Retrieved from http:\/\/www.pewinternet.org\/ 2015 \/10\/08\/socialnetworking-usage-2005--2015\/ Andrew Perrin. 2015. Social Media Usage: 20052015. Pew Research Center. Retrieved from http:\/\/www.pewinternet.org\/2015\/10\/08\/socialnetworking-usage-2005--2015\/"},{"key":"e_1_3_2_1_42_1","volume-title":"Big Data: Seizing Opportunities, Preserving Values.","author":"Podesta J.","year":"2014","unstructured":"J. Podesta , P. Pritzker , E. J. Moniz , J. Holdren , and J. Zients . 2014 . Big Data: Seizing Opportunities, Preserving Values. Retrieved from https:\/\/www.whitehouse.gov\/sites\/default\/files\/docs\/bi g_data_privacy_report_may_1_2014.pdf J. Podesta, P. Pritzker, E. J. Moniz, J. Holdren, and J. Zients. 2014. Big Data: Seizing Opportunities, Preserving Values. Retrieved from https:\/\/www.whitehouse.gov\/sites\/default\/files\/docs\/bi g_data_privacy_report_may_1_2014.pdf"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381983"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1093\/geront\/37.4.433"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Guillaume Sacco V\u00e9ronique Joumier Nelly Darmon etal 2012. Detection of activities of daily living impairment in Alzheimer's disease and mild cognitive impairment using information and communication technology. Clinical interventions in aging 7: 539--49.  Guillaume Sacco V\u00e9ronique Joumier Nelly Darmon et al. 2012. Detection of activities of daily living impairment in Alzheimer's disease and mild cognitive impairment using information and communication technology. Clinical interventions in aging 7: 539--49.","DOI":"10.2147\/CIA.S36297"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2011.19"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30779-9_25"},{"key":"e_1_3_2_1_48_1","volume-title":"Intergenerational activity tracker program: Impact with health related outcomes on older adults. 2015 Long Island Systems, Applications and Technology","author":"Sookhai Laura","unstructured":"Laura Sookhai , Jean F. Coppola , and Chris Gaur . 2015. Intergenerational activity tracker program: Impact with health related outcomes on older adults. 2015 Long Island Systems, Applications and Technology , IEEE , 1--7. Laura Sookhai, Jean F. Coppola, and Chris Gaur. 2015. Intergenerational activity tracker program: Impact with health related outcomes on older adults. 2015 Long Island Systems, Applications and Technology, IEEE, 1--7."},{"key":"e_1_3_2_1_49_1","unstructured":"Superflux. 2015. Uninvited Guests. Retrieved from http:\/\/www.superflux.in\/work\/uninvited-guests  Superflux. 2015. Uninvited Guests. Retrieved from http:\/\/www.superflux.in\/work\/uninvited-guests"},{"key":"e_1_3_2_1_50_1","unstructured":"H. Taylor. 2003. Most People Are \"Privacy Pragmatists\" Who While Concerned about Privacy Will Sometimes Trade It Off for Other Benefits. Retrieved from http:\/\/www.prnewswire.com\/newsreleases\/most-people-are-privacy-pragmatists-whowhile-concerned-about-privacy-will-sometimes-tradeit-off-for-other-benefits-says-harris-interactive-survey74721077.html  H. Taylor. 2003. Most People Are \"Privacy Pragmatists\" Who While Concerned about Privacy Will Sometimes Trade It Off for Other Benefits. Retrieved from http:\/\/www.prnewswire.com\/newsreleases\/most-people-are-privacy-pragmatists-whowhile-concerned-about-privacy-will-sometimes-tradeit-off-for-other-benefits-says-harris-interactive-survey74721077.html"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"S E Taylor and J D Brown. 1988. Illusion and wellbeing: a social psychological perspective on mental health. Psychological bulletin 103 2: 193--210.  S E Taylor and J D Brown. 1988. Illusion and wellbeing: a social psychological perspective on mental health. Psychological bulletin 103 2: 193--210.","DOI":"10.1037\/0033-2909.103.2.193"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1093\/geronb\/53B.6.S313"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0033291798007211"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493469"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2696867"},{"key":"e_1_3_2_1_56_1","volume-title":"Walther and Shawn Boyd","author":"Joseph","year":"2002","unstructured":"Joseph B. Walther and Shawn Boyd . 2002 . Attraction to computer-mediated social support. In Communication technology and society: Audience adoption and uses, C. A. Lin and D. Atkin (eds.). Hampton Press , Cresskill, NJ, 153--188. Joseph B. Walther and Shawn Boyd. 2002. Attraction to computer-mediated social support. In Communication technology and society: Audience adoption and uses, C. A. Lin and D. Atkin (eds.). Hampton Press, Cresskill, NJ, 153--188."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1093\/geront\/gnq013"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/238386.238387"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1093\/geronb\/60.3.S129"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1177\/0733464807311435"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1080\/03601277.2010.544580"}],"event":{"name":"CHI '17: CHI Conference on Human Factors in Computing Systems","location":"Denver Colorado USA","acronym":"CHI '17","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025861","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025861","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:39Z","timestamp":1750215819000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025861"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,2]]},"references-count":61,"alternative-id":["10.1145\/3025453.3025861","10.1145\/3025453"],"URL":"https:\/\/doi.org\/10.1145\/3025453.3025861","relation":{},"subject":[],"published":{"date-parts":[[2017,5,2]]},"assertion":[{"value":"2017-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}