{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T22:53:49Z","timestamp":1754261629820,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,6]],"date-time":"2020-01-06T00:00:00Z","timestamp":1578268800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,6]]},"DOI":"10.1145\/3323994.3372137","type":"proceedings-article","created":{"date-parts":[[2019,12,18]],"date-time":"2019-12-18T13:21:21Z","timestamp":1576675281000},"page":"39-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Understanding and Designing for Privacy in Wearable Fitness Platforms"],"prefix":"10.1145","author":[{"given":"Abdulmajeed","family":"Alqhatani","sequence":"first","affiliation":[{"name":"University of North Carolina at Charlotte, Charlotte, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,1,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Addonizio G. (2017). The privacy risks surrounding consumer health and fitness apps associated wearable devices and HIPAA's limitations.  Addonizio G. (2017). The privacy risks surrounding consumer health and fitness apps associated wearable devices and HIPAA's limitations."},{"volume-title":"Fifteenth Symposium on Usable Privacy and Security ({SOUPS}","year":"2019","author":"Alqhatani A.","key":"e_1_3_2_1_2_1"},{"volume-title":"Retrieved","year":"2018","author":"Russey C.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858352"},{"volume-title":"IFIP International Internet of Things Conference (pp. 147--159)","year":"2018","author":"Kr\u00f6ger J.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICHI.2017.29"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958876"},{"key":"e_1_3_2_1_8_1","first-page":"257","volume-title":"Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017)","author":"Rader E.","year":"2017"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300753"},{"volume-title":"International Conference on Information (pp. 229--239)","year":"2018","author":"Vitak J.","key":"e_1_3_2_1_10_1"}],"event":{"name":"GROUP '20: The 2020 ACM International Conference on Supporting Group Work","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Sanibel Island Florida USA","acronym":"GROUP '20"},"container-title":["Companion of the 2020 ACM International Conference on Supporting Group Work"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323994.3372137","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3323994.3372137","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:13Z","timestamp":1750204453000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323994.3372137"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,6]]},"references-count":10,"alternative-id":["10.1145\/3323994.3372137","10.1145\/3323994"],"URL":"https:\/\/doi.org\/10.1145\/3323994.3372137","relation":{},"subject":[],"published":{"date-parts":[[2020,1,6]]},"assertion":[{"value":"2020-01-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}