{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:32:29Z","timestamp":1769747549140,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,21]],"date-time":"2020-04-21T00:00:00Z","timestamp":1587427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,21]]},"DOI":"10.1145\/3313831.3376632","type":"proceedings-article","created":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T17:16:51Z","timestamp":1590599811000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["The Burden of Ending Online Account Sharing"],"prefix":"10.1145","author":[{"given":"Borke","family":"Obada-Obieh","sequence":"first","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Yue","family":"Huang","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Konstantin","family":"Beznosov","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]}],"member":"320","published-online":{"date-parts":[[2020,4,23]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Apple. 2019. Apple support. http:\/\/support.apple.com\/en-ca\/HT204976. (2019). Accessed: 2019--12--23."},{"key":"e_1_3_2_2_2_1","unstructured":"TD Bank. 2019. TD bank joint account. http:\/\/tdbank.intelliresponse.com\/?requestType= NormalRequest&source=3&question= How+do+I+open+or+close+a+joint+account. (2019). Accessed: 2019--12--23."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/319171.319177"},{"key":"e_1_3_2_2_4_1","volume-title":"Proceedings of the 2008 Agreement of Teacher and Principal Performance New Security Paradigms Workshop. ACM, 47--58","author":"Beautement Adam","year":"2009","unstructured":"Adam Beautement, M Angela Sasse, and Mike Wonham. 2009. The compliance budget: managing security behaviour in organisations. In Proceedings of the 2008 Agreement of Teacher and Principal Performance New Security Paradigms Workshop. ACM, 47--58. Ratings. Online Submission (2012)."},{"key":"e_1_3_2_2_5_1","volume-title":"Nearly Half of Netflix Subscribers Share their Account Passwords. https:\/\/www.comparitech.com\/blog\/vpn-privacy\/sharingnetflix-passwords\/. (March","author":"Bischoff Paul","year":"2019","unstructured":"Paul Bischoff. March 2019. Nearly Half of Netflix Subscribers Share their Account Passwords. https:\/\/www.comparitech.com\/blog\/vpn-privacy\/sharingnetflix-passwords\/. (March 2019). Accessed: 2019--12--16."},{"key":"e_1_3_2_2_6_1","unstructured":"Pew Research Center. January 2017. Password management and mobile security. http:\/\/www.pewinternet.org\/2017\/01\/26\/2-passwordmanagement-and-mobile-security. (January 2017). Accessed: 2019-02--27."},{"key":"e_1_3_2_2_7_1","volume-title":"https:\/\/www.cnbc.com\/2018\/08\/19\/millennials-are-going-toextreme-lengths-to-share-streaming-passwords-.html. (August","author":"User Agreement CNBC.","year":"2018","unstructured":"CNBC. August 2018. User Agreement. https:\/\/www.cnbc.com\/2018\/08\/19\/millennials-are-going-toextreme-lengths-to-share-streaming-passwords-.html. (August 2018). Accessed: 2019-02--28."},{"key":"e_1_3_2_2_8_1","unstructured":"Deborah Cohen and Benjamin Crabtree. 2006. Qualitative research guidelines project. (2006)."},{"key":"e_1_3_2_2_9_1","unstructured":"The Conversation. February 2018. How to digitally disentangle after a break up some new rules. http:\/\/theconversation.com\/how-to-digitallydisentangle-after-a-break-up-some-new-rules-90592. (February 2018). Accessed: 2019-02--27."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/10999183.2010.10767394"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460666"},{"key":"e_1_3_2_2_12_1","unstructured":"Facebook. 2019. Facebook business page. facebook.com\/business\/pages. (2019). Accessed: 2019--12--23."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174241"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134681"},{"key":"e_1_3_2_2_16_1","unstructured":"Matthew Graham Anthony Milanowski and Jackson Miller. 2012. Measuring and Promoting Inter-Rater"},{"key":"e_1_3_2_2_17_1","unstructured":"The Guardian. 2018. From ghosting to oversharing: the new rules of breakups. https:\/\/www.theguardian.com\/ lifeandstyle\/2018\/nov\/15\/new-rules-of-breakups. (2018). Accessed: 2019-02--27."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Gregory Guest Kathleen M MacQueen and Emily E Namey. 2011. Applied thematic analysis. (2011).","DOI":"10.4135\/9781483384436"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781483384436"},{"key":"e_1_3_2_2_20_1","unstructured":"Management Study Guide. 2019. Different Types of Interpersonal Relationships. https:\/\/www.managementstudyguide.com\/types-ofinterpersonal-relationships.htm. (2019). Accessed: 2019-09--18."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719050"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Daniel Herron Wendy Moncur and Elise van den Hoven. 2017. Digital decoupling and disentangling: towards design for romantic break up. (2017).","DOI":"10.1145\/3064663.3064765"},{"key":"e_1_3_2_2_23_1","unstructured":"Troy Hunt. 2017. The Trouble with Politicians Sharing Passwords. https:\/\/www.troyhunt.com\/the-trouble-withpoliticians-sharing-passwords\/. (2017). Accessed: 2019-07--30."},{"key":"e_1_3_2_2_24_1","unstructured":"Country Financial Security Index. September 2018. Survey: More than Half of Americans Are Using Shared Services Like Uber Lyft and Airbnb. https:\/\/www.countryfinancial.com\/en\/about-us\/newsroom\/ year2018\/More-than-Half-of-Americans-Are-UsingShared-Services.html. (September 2018). Accessed: 2019-02--27."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"Maia Jacobs Henriette Cramer and Louise Barkhuus. 2016. Caring About Sharing: Couples' Practices in Single User Device Access. (2016).","DOI":"10.1145\/2957276.2957296"},{"key":"e_1_3_2_2_26_1","unstructured":"D.S. Jeslet G. Sivaraman M. Uma K. Thangadurai and M. Punithavalli. 2010. Survey on awareness and security issues in password management strategies. IJCSNS 10 4 (2010)."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979324"},{"key":"e_1_3_2_2_28_1","unstructured":"Klaxos.com. 2009. LinkedIn Profile Writing Service. https:\/\/ca.linkedin.com\/company\/linkedin-profile-service. (2009). Accessed: 2019-02--28."},{"key":"e_1_3_2_2_29_1","volume-title":"https:\/\/www.linkedin.com\/legal\/user-agreement. (May","author":"User Agreement In.","year":"2018","unstructured":"LinkedIn. May 2018. User Agreement. https:\/\/www.linkedin.com\/legal\/user-agreement. (May 2018). Accessed: 2019-02--28."},{"key":"e_1_3_2_2_30_1","unstructured":"LinkedIn Makeover. 2019. Order Your LinkedIn Makeover Today. https:\/\/www.linkedin-makeover.com\/order-today\/. (2019). Accessed: 2019-02--28."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"Diogo Marques Tiago Guerreiro Lu\u00eds Carri\u00e7o Ivan Beschastnikh and Konstantin Beznosov. 2019. Vulnerability & Blame: Making Sense of Unauthorized Access to Smartphones. (2019).","DOI":"10.1145\/3290605.3300819"},{"key":"e_1_3_2_2_32_1","volume-title":"Twelfth Symposium on Usable Privacy and Security ({SOUPS}","author":"Marques Diogo","year":"2016","unstructured":"Diogo Marques, Ildar Muslukhov, Tiago Guerreiro, Lu\u00eds Carri\u00e7o, and Konstantin Beznosov. 2016. Snooping on mobile phones: Prevalence and trends. In Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016). 159--174."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"crossref","unstructured":"Tara Matthews Kerwell Liao Anna Turner Marianne Berkovich Robert Reeder and Sunny Consolvo. 2016. She'll just grab any device that's closer: A Study of Everyday Device & Account Sharing in Households. (2016).","DOI":"10.1145\/2858036.2858051"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025875"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"crossref","unstructured":"Wendy Moncur Lorna Gibson and Daniel Herron. 2016. The role of digital technologies during relationship breakdowns. (2016).","DOI":"10.1145\/2818048.2819925"},{"key":"e_1_3_2_2_36_1","unstructured":"OAuth. 2019. The OAuth 2.0 Authorization Framework. https:\/\/tools.ietf.org\/html\/rfc6749. (2019). Accessed: 2019--12--26."},{"key":"e_1_3_2_2_37_1","unstructured":"House of Commons. 2017. House of Commons Staff Handbook-Information Security Responsibilities. https:\/\/www.parliament.uk\/documents\/commons-resources\/ Staff-handbook\/chapter-23-information-security.pdf. (2017). Accessed: 2019-09--17."},{"key":"e_1_3_2_2_38_1","unstructured":"OkCupid. 2019. OkCupid's homepage. https:\/\/www.okcupid.com. (2019). Accessed: 2019--12--22."},{"key":"e_1_3_2_2_39_1","unstructured":"Overleaf. 2019. Overleaf about us. www.overleaf.com\/about. (2019). Accessed: 2019--12--23."},{"key":"e_1_3_2_2_40_1","unstructured":"Cheul Young Park Cori Faklaris Siyan Zhao Alex Sciuto Laura Dabbish and Jason Hong. 2018. Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships. (2018)."},{"key":"e_1_3_2_2_41_1","unstructured":"UK Parliament. 2019. Advice for Members and their Staff. https:\/\/www.parliament.uk\/documents\/upload\/ advice-for-members-offices.pdf. (2019). Accessed: 2019-09--17."},{"key":"e_1_3_2_2_42_1","unstructured":"ProfileLinked. 2009. We Create Your Professional Linkedin Profile. https:\/\/ca.linkedin.com\/company\/professional-linkedinprofiles-services-for-executives. (2009). Accessed: 2019-02--28."},{"key":"e_1_3_2_2_43_1","volume-title":"Networks, Hacking, and Media--CITA MS@ 30: Now and Then and Tomorrow","author":"Quan-Haase Anabel","unstructured":"Anabel Quan-Haase, Andrew D Nevin, and Veronika Lukacs. 2018. Romantic Dissolution and Facebook Life: a Typology of Coping Strategies for Breakups. In Networks, Hacking, and Media--CITA MS@ 30: Now and Then and Tomorrow. Emerald Publishing Limited, 73--98."},{"key":"e_1_3_2_2_44_1","volume-title":"Is it possible to share access to a LinkedIn profile? https:\/\/www.quora.com\/Is-itpossible-to-share-access-to-a-LinkedIn-profile. (November","author":"November","year":"2018","unstructured":"Quora. November 2018. Is it possible to share access to a LinkedIn profile? https:\/\/www.quora.com\/Is-itpossible-to-share-access-to-a-LinkedIn-profile. (November 2018). Accessed: 2019-02--28."},{"key":"e_1_3_2_2_45_1","volume-title":"The Business Value of User Experience. Cranbury: D3 Infragistics","author":"Ross Jim","year":"2014","unstructured":"Jim Ross. 2014. The Business Value of User Experience. Cranbury: D3 Infragistics (2014)."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466241"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1236236"},{"key":"e_1_3_2_2_48_1","unstructured":"Sephora. 2019. Sephora's about us page. https:\/\/www.sephora.com\/beauty\/about-us. (2019). Accessed: 2019--12--22."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"crossref","unstructured":"Supriya Singh Anuja Cabraal Catherine Demosthenous Gunela Astbrink and Michele Furlong. 2007. Password sharing: implications for security design based on social practice. (2007).","DOI":"10.1145\/1240624.1240759"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167209352250"},{"key":"e_1_3_2_2_51_1","volume-title":"AMCIS 2007 Proceedings","author":"Sward David","year":"2007","unstructured":"David Sward. 2007. User experience design: a strategy for competitive advantage. AMCIS 2007 Proceedings (2007), 163."},{"key":"e_1_3_2_2_52_1","unstructured":"Tumblr. 2019. Tumblr's homepage. https:\/\/www.tumblr.com. (2019). Accessed: 2019--12--22."},{"key":"e_1_3_2_2_53_1","unstructured":"Twitter. 2019. How to Use the Teams Feature on TweetDeck. https:\/\/help.twitter.com\/en\/using-twitter\/tweetdeck-teams. (2019). Accessed: 2019-09--18."},{"key":"e_1_3_2_2_54_1","unstructured":"UXPlanet. 2019. Why Better Web User Experience Leads to Better Branding. https:\/\/uxplanet.org\/why-better-web-user-experienceleads-to-better-branding-e2194ff0d081. (2019). Accessed: 2019-09--18."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2014.0179"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/646280.687663"},{"key":"e_1_3_2_2_57_1","volume-title":"Proceedings of the 17th ACM conference on Computer","author":"Zhang Yinqian","year":"2010","unstructured":"Yinqian Zhang, Fabian Monrose, and Michael K. Reiter. Proceedings of the 17th ACM conference on Computer 2010. The security of modern password expiration: An and communications security. ACM, 176--186. algorithmic framework and empirical analysis. In Proceedings of the 17th ACM conference on Computer and communications security. ACM, 176--186."}],"event":{"name":"CHI '20: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '20","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313831.3376632","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3313831.3376632","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:28Z","timestamp":1750199908000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313831.3376632"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,21]]},"references-count":57,"alternative-id":["10.1145\/3313831.3376632","10.1145\/3313831"],"URL":"https:\/\/doi.org\/10.1145\/3313831.3376632","relation":{},"subject":[],"published":{"date-parts":[[2020,4,21]]},"assertion":[{"value":"2020-04-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}