{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T01:35:29Z","timestamp":1772847329399,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,25]],"date-time":"2020-04-25T00:00:00Z","timestamp":1587772800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["CNS-1524296"],"award-info":[{"award-number":["CNS-1524296"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,25]]},"DOI":"10.1145\/3334480.3382815","type":"proceedings-article","created":{"date-parts":[[2020,5,28]],"date-time":"2020-05-28T13:22:17Z","timestamp":1590672137000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Towards a Conceptual Model for Provoking Privacy Speculation"],"prefix":"10.1145","author":[{"given":"Norbert","family":"Nthala","sequence":"first","affiliation":[{"name":"Michigan State University, East Lansing, MI, USA"}]},{"given":"Emilee","family":"Rader","sequence":"additional","affiliation":[{"name":"Michigan State University, East Lansing, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,4,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1203752"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124923"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.47"},{"key":"e_1_3_2_1_4_1","volume-title":"Exploring Privacy Concerns about Personal Sensing","author":"Klasnja Predrag","unstructured":"Predrag Klasnja, Sunny Consolvo, Tanzeem Choudhury, Richard Beckwith, and Jeffrey Hightower. 2009. Exploring Privacy Concerns about Personal Sensing. In Pervasive Computing, Hideyuki Tokuda, Michael Beigl, Adrian Friday, A. J. Bernheim Brush, and Yoshito Tobe (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 176--183."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517868"},{"key":"e_1_3_2_1_6_1","first-page":"543","article-title":"The cost of reading privacy policies","volume":"4","author":"McDonald Aleecia M","year":"2008","unstructured":"Aleecia M McDonald and Lorrie Faith Cranor. 2008. The cost of reading privacy policies. Isjlp 4 (2008), 543.","journal-title":"Isjlp"},{"key":"e_1_3_2_1_7_1","volume-title":"Users' Privacy Concerns About Wearables","author":"Motti Vivian Genaro","unstructured":"Vivian Genaro Motti and Kelly Caine. 2015. Users' Privacy Concerns About Wearables. In Financial Cryptography and Data Security, Michael Brenner, Nicolas Christin, Benjamin Johnson, and Kurt Rohloff (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 231--244."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409661"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/948005.948051"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.21606\/drs.2016.165"},{"key":"e_1_3_2_1_11_1","first-page":"85","article-title":"Regulating the internet of things: first steps toward managing discrimination, privacy, security and consent","volume":"93","author":"Peppet Scott R","year":"2014","unstructured":"Scott R Peppet. 2014. Regulating the internet of things: first steps toward managing discrimination, privacy, security and consent. Tex. L. Rev. 93 (2014), 85.","journal-title":"Tex. L. Rev."},{"key":"e_1_3_2_1_12_1","volume-title":"Privacy Awareness: A Means to Solve the Privacy Paradox?. In The Future of Identity in the","author":"P\u00f6tzsch Stefanie","year":"2009","unstructured":"Stefanie P\u00f6tzsch. 2009. Privacy Awareness: A Means to Solve the Privacy Paradox?. In The Future of Identity in the Information Society, Vashek Maty\u00e1vs, Simone Fischer-H\u00fcbner, Daniel Cvrvc ek, and Petr vS venda (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 226--236."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.008"},{"key":"e_1_3_2_1_14_1","volume-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017","author":"Rader Emilee","year":"2017","unstructured":"Emilee Rader and Janine Slaker. 2017. The importance of visibility for folk theories of sensor data. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, Santa Clara, CA, 257--270. https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/rader"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355577"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557421"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.09.038"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2016.06.004"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363200"}],"event":{"name":"CHI '20: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '20","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3334480.3382815","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3334480.3382815","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:10Z","timestamp":1750199590000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3334480.3382815"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,25]]},"references-count":19,"alternative-id":["10.1145\/3334480.3382815","10.1145\/3334480"],"URL":"https:\/\/doi.org\/10.1145\/3334480.3382815","relation":{},"subject":[],"published":{"date-parts":[[2020,4,25]]},"assertion":[{"value":"2020-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}