{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T05:03:38Z","timestamp":1766466218893,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,4,19]],"date-time":"2018-04-19T00:00:00Z","timestamp":1524096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"EPSRC","award":["EP\/L016176\/1"],"award-info":[{"award-number":["EP\/L016176\/1"]}]},{"name":"Department of Health, UK Government","award":["Connected Health Cities \/ SILVER Project (No Award Number"],"award-info":[{"award-number":["Connected Health Cities \/ SILVER Project (No Award Number"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,4,19]]},"DOI":"10.1145\/3173574.3173710","type":"proceedings-article","created":{"date-parts":[[2018,4,20]],"date-time":"2018-04-20T15:43:11Z","timestamp":1524238991000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Understanding the Family Perspective on the Storage, Sharing and Handling of Family Civic Data"],"prefix":"10.1145","author":[{"given":"Alex","family":"Bowyer","sequence":"first","affiliation":[{"name":"Newcastle University, Newcastle Upon Tyne, United Kingdom"}]},{"given":"Kyle","family":"Montague","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, United Kingdom"}]},{"given":"Stuart","family":"Wheater","sequence":"additional","affiliation":[{"name":"Arjuna Technologies Ltd, Newcastle upon Tyne, United Kingdom"}]},{"given":"Ruth","family":"McGovern","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle-upon-Tyne, United Kingdom"}]},{"given":"Raghu","family":"Lingam","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle-upon-Tyne, United Kingdom"}]},{"given":"Madeline","family":"Balaam","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2018,4,19]]},"reference":[{"volume-title":"Boundary Objects and Beyond: Working with Leigh Star","author":"Bowker Geoffrey C.","key":"e_1_3_2_2_1_1","unstructured":"Geoffrey C. Bowker, Stefan Timmermans, Adele E. Clarke, and Ellen Balka. 2016. Boundary Objects and Beyond: Working with Leigh Star. MIT Press."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1147261.1147271"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1011870.1011885"},{"key":"e_1_3_2_2_4_1","volume-title":"Cookie Wars: How New Data Profiling and Targeting Techniques Threaten Citizens and Consumers in the \"Big Data\" Era. In European Data Protection: In Good Health?","author":"Chester Jeff","year":"2012","unstructured":"Jeff Chester. 2012. Cookie Wars: How New Data Profiling and Targeting Techniques Threaten Citizens and Consumers in the \"Big Data\" Era. In European Data Protection: In Good Health? Springer, Dordrecht, 53--77."},{"key":"e_1_3_2_2_5_1","unstructured":"Connected Health Cities. 2016. Liverpool Care Record. Retrieved from https:\/\/vimeo.com\/190984383"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1332\/030557312X645838"},{"key":"e_1_3_2_2_7_1","first-page":"159","article-title":"Current Issues and Future Directions in Methods for Studying Technology in the Home","volume":"11","author":"Coughlan Tim","year":"2013","unstructured":"Tim Coughlan, Kerstin Leder Mackley, Michael Brown, Sarah Martindale, Stephan Schl\u00f6gl, Becky Mallaband, John Arnott, Jettie Hoonhout, Dalila Szostak, Robin Brewer, Erika Poole, Antti Pirhonen, Val Mitchell, Sarah Pink, and Nicholas Hine. 2013. Current Issues and Future Directions in Methods for Studying Technology in the Home. PsychNology Journal 11, 2: 159--184.","journal-title":"PsychNology Journal"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2010.03.001"},{"key":"e_1_3_2_2_9_1","unstructured":"Federal Trade Commission. 2013. Mobile privacy disclosures: Building trust through transparency. Federal Trade Commission."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","unstructured":"Batya Friedman. 1996. Value-sensitive Design. interactions 3 6: 16--23. 10.1145\/242485.242493","DOI":"10.1145\/242485.242493"},{"key":"e_1_3_2_2_11_1","first-page":"503","article-title":"Informed consent by design","volume":"2001","author":"Friedman Batya","year":"2005","unstructured":"Batya Friedman, Peyina Lin, and Jessica K Miller. 2005. Informed consent by design. Security and Usability, 2001: 503--530.","journal-title":"Security and Usability"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/13561820600890235"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240720"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"Jane Kaye Edgar A. Whitley Nadja Kanellopoulou Sadie Creese Kay J. Hughes and David Lund. 2011. Dynamic consent: a solution to a perennial problem? BMC 343 nov01: d6900--d6900.","DOI":"10.1136\/bmj.d6900"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1038\/ejhg.2014.71"},{"key":"e_1_3_2_2_16_1","volume-title":"The European Commission's Proposed Data Protection Regulation: A Copernican Revolution in European Data Protection Law. Social Science Research Network","author":"Kuner Christopher","year":"2017","unstructured":"Christopher Kuner. 2012. The European Commission's Proposed Data Protection Regulation: A Copernican Revolution in European Data Protection Law. Social Science Research Network, Rochester, NY. Retrieved August 24, 2017 from https:\/\/papers.ssrn.com\/abstract=2162781"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1177\/0162243910377624"},{"key":"e_1_3_2_2_18_1","unstructured":"Ruth Levitas. 2012. There may be 'trouble'ahead: what we know about those 120 000 'troubled'families. Policy response series 3: 21."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493446"},{"key":"e_1_3_2_2_20_1","volume-title":"Church","author":"Lunshof Jeantine E.","year":"2008","unstructured":"Jeantine E. Lunshof, Ruth Chadwick, Daniel B. Vorhaus, and George M. Church. 2008. From genetic privacy to open consent. Nature Reviews. Genetics; London 9, 5: 406--11."},{"key":"e_1_3_2_2_21_1","volume-title":"Rodgers","author":"Lyons Ronan A.","year":"2014","unstructured":"Ronan A. Lyons, David V. Ford, Laurence Moore, and Sarah E. Rodgers. 2014. Use of data linkage to measure the population health effect of non-health-care interventions. The Lancet 383, 9927: 1517--1519."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/1468794113517391"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2206.2011.00822.x"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639189.2639239"},{"key":"e_1_3_2_2_25_1","volume-title":"HumanData Interaction: The Human Face of the Data-Driven Society. Social Science Research Network","author":"Mortier Richard","year":"2016","unstructured":"Richard Mortier, Hamed Haddadi, Tristan Henderson, Derek McAuley, and Jon Crowcroft. 2014. HumanData Interaction: The Human Face of the Data-Driven Society. Social Science Research Network, Rochester, NY. Retrieved December 11, 2016 from https:\/\/papers.ssrn.com\/abstract=2508051"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1520340.1520394"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441838"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1095592"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Andrew Patrick and Steve Kenny. 2003. From privacy legislation to interface design: Implementing information privacy in human-computer interactions. In Privacy Enhancing Technologies 107--124.","DOI":"10.1007\/978-3-540-40956-4_8"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2494261"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","unstructured":"Henrich P\u00f6hls. 2008. Verifiable and revocable expression of consent to processing of aggregated personal data. Information and Communications Security: 279--293. 10.1007\/978-3-540-88625-9_19","DOI":"10.1007\/978-3-540-88625-9_19"},{"key":"e_1_3_2_2_32_1","unstructured":"Keith F. Punch. 2013. Introduction to Social Research: Quantitative and Qualitative Approaches. SAGE."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"crossref","unstructured":"Beate R\u00f6ssler. 2015. Should personal data be a tradable good? On the moral limits of markets in privacy. Social dimensions of privacy: Interdisciplinary perspectives: 141--161.","DOI":"10.1017\/CBO9781107280557.009"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2010.11.009"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2012.23"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1037\/0735-7028.24.2.160"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702558"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6210.2006.00594.x"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2009.10.001"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.2196\/medinform.3525"},{"key":"e_1_3_2_2_41_1","volume-title":"Holbrook","author":"Willison Donald J.","year":"2003","unstructured":"Donald J. Willison, Karim Keshavjee, Kalpana Nair, Charlie Goldsmith, and Anne M. Holbrook. 2003. Patients' consent preferences for research uses of information in electronic medical records: interview and survey data. BMJ 326, 7385: 373."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0491.2004.00246.x"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.2217\/pme.09.48"},{"key":"e_1_3_2_2_44_1","volume-title":"Leeds Care Record. Retrieved","author":"Leeds Care","year":"2017","unstructured":"Leeds Care Record - Shared information. Better care for you. Leeds Care Record. Retrieved August 24, 2017 from https:\/\/www.leedscarerecord.org\/"},{"key":"e_1_3_2_2_45_1","unstructured":"Great North Care Record. Retrieved August 24 2017 from https:\/\/www.greatnorthcarerecord.org.uk\/"},{"key":"e_1_3_2_2_46_1","unstructured":"Troubled Families Programme | Newcastle City Council. Retrieved August 24 2017 from https:\/\/www.newcastle.gov.uk\/social-care-andhealth\/safeguarding-and-abuse\/troubled-familiesprogramme"},{"volume-title":"Retrieved","year":"2017","key":"e_1_3_2_2_47_1","unstructured":"TFs. Centre of Excellence for Information Sharing. Retrieved August 24, 2017 from http:\/\/informationsharing.org.uk\/policy-areas\/families\/"},{"key":"e_1_3_2_2_48_1","volume-title":"Connected Health Cities. Retrieved","author":"SILVER","year":"2017","unstructured":"SILVER: Smart Interventions for Local Vulnerable Families. Connected Health Cities. Retrieved August 24, 2017 from https:\/\/www.connectedhealthcities.org\/researchprojects\/troubled-families\/"},{"key":"e_1_3_2_2_49_1","volume-title":"Retrieved","author":"Regulation","year":"2016","unstructured":"Regulation 71, General Data Protection Regulations (EU) 2016\/679 - EUR-Lex - Europa EU. Retrieved September 18, 2017 from http:\/\/eurlex.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"e_1_3_2_2_50_1","volume-title":"Retrieved","author":"Controversial","year":"2017","unstructured":"Controversial database of medical records is scrapped over security concerns | The BMJ. Retrieved August 24, 2017 from http:\/\/www.bmj.com\/content\/354\/bmj.i3804"},{"key":"e_1_3_2_2_51_1","unstructured":"About. VOME. Retrieved September 18 2017 from http:\/\/vome.org.uk\/about\/"}],"event":{"name":"CHI '18: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Montreal QC Canada","acronym":"CHI '18"},"container-title":["Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3173574.3173710","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3173574.3173710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:02:58Z","timestamp":1750215778000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3173574.3173710"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,19]]},"references-count":51,"alternative-id":["10.1145\/3173574.3173710","10.1145\/3173574"],"URL":"https:\/\/doi.org\/10.1145\/3173574.3173710","relation":{},"subject":[],"published":{"date-parts":[[2018,4,19]]},"assertion":[{"value":"2018-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}