{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:16:31Z","timestamp":1760710591904,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T00:00:00Z","timestamp":1620259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1714514"],"award-info":[{"award-number":["CNS-1714514"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,6]]},"DOI":"10.1145\/3411764.3445071","type":"proceedings-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T05:58:10Z","timestamp":1620453490000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Building for \u2018We\u2019: Safety Settings for Couples with Memory Concerns"],"prefix":"10.1145","author":[{"given":"Nora","family":"McDonald","sequence":"first","affiliation":[{"name":"University of Maryland, Baltimore County, United States"}]},{"given":"Helena M.","family":"Mentis","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, United States"}]}],"member":"320","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Alkhatib S. Waycott J. and Buchanan G. 2019. Privacy in Aged Care Monitoring Devices (ACMD): The Developers\u2019 Perspective. Studies in Health Technology and Informatics. 266 (2019).  Alkhatib S. Waycott J. and Buchanan G. 2019. Privacy in Aged Care Monitoring Devices (ACMD): The Developers\u2019 Perspective. Studies in Health Technology and Informatics. 266 (2019)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaging.2006.09.002"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/1471301217737652"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/2159676X.2019.1628806"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"volume-title":"Person-Centred Dementia Care: Making Services Better","author":"Brooker D.","key":"e_1_3_2_1_6_1","unstructured":"Brooker , D. 2006. Person-Centred Dementia Care: Making Services Better . Jessica Kingsley Publishers . Brooker, D. 2006. Person-Centred Dementia Care: Making Services Better. Jessica Kingsley Publishers."},{"key":"e_1_3_2_1_7_1","volume-title":"The Spyware Used in Intimate Partner Violence. 2018 IEEE Symposium on Security and Privacy (SP) (May","author":"Chatterjee R.","year":"2018","unstructured":"Chatterjee , R. , Doerfler , P. , Orgad , H. , Havron , S. , Palmer , J. , Freed , D. , Levy , K. , Dell , N. , McCoy , D. and Ristenpart , T . 2018 . The Spyware Used in Intimate Partner Violence. 2018 IEEE Symposium on Security and Privacy (SP) (May 2018 ), 441\u2013458. Chatterjee, R., Doerfler, P., Orgad, H., Havron, S., Palmer, J., Freed, D., Levy, K., Dell, N., McCoy, D. and Ristenpart, T. 2018. The Spyware Used in Intimate Partner Violence. 2018 IEEE Symposium on Security and Privacy (SP) (May 2018), 441\u2013458."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing","author":"Cornejo R.","year":"2016","unstructured":"Cornejo , R. , Brewer , R. , Edasis , C. and Piper , A.M . 2016. Vulnerability, Sharing, and Privacy: Analyzing Art Therapy for Older Adults with Dementia . Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing ( San Francisco, California, USA , Feb. 2016 ), 1572\u20131583. Cornejo, R., Brewer, R., Edasis, C. and Piper, A.M. 2016. Vulnerability, Sharing, and Privacy: Analyzing Art Therapy for Older Adults with Dementia. Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (San Francisco, California, USA, Feb. 2016), 1572\u20131583."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/14639230410001684387"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Freed D. Palmer J. Minchala D. Levy K. Ristenpart T. and Dell N. 2018. \u201cA Stalker's Paradise\u201d: How Intimate Partner Abusers Exploit Technology. (2018) 1\u201313.  Freed D. Palmer J. Minchala D. Levy K. Ristenpart T. and Dell N. 2018. \u201cA Stalker's Paradise\u201d: How Intimate Partner Abusers Exploit Technology. (2018) 1\u201313.","DOI":"10.1145\/3173574.3174241"},{"key":"e_1_3_2_1_11_1","volume-title":"eds","author":"Greenbaum J.","year":"1991","unstructured":"Greenbaum , J. and Kyng , M . eds . 1991 . Design at Work : Cooperative Design of Computer Systems. CRC Press . Greenbaum, J. and Kyng, M. eds. 1991. Design at Work: Cooperative Design of Computer Systems. CRC Press."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/1471301205051096"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Hellstrom I. Nolan M. and Lundh U. 2007. Sustaining `couplehood\u2019: Spouses\u2019 strategies for living positively with dementia. Dementia. SAGE.  Hellstrom I. Nolan M. and Lundh U. 2007. Sustaining `couplehood\u2019: Spouses\u2019 strategies for living positively with dementia. Dementia. SAGE.","DOI":"10.1177\/1471301207081571"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/1471301205049188"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1177\/1471301217709604"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 28th Australian Conference on Computer-Human Interaction (Launceston","author":"J\u00f8rgensen M.S.","year":"2016","unstructured":"J\u00f8rgensen , M.S. , Nissen , F.K. , Paay , J. , Kjeldskov , J. and Skov , M.B . 2016. Monitoring children's physical activity and sleep: a study of surveillance and information disclosure . Proceedings of the 28th Australian Conference on Computer-Human Interaction (Launceston , Tasmania, Australia , Nov. 2016 ), 50\u201358. J\u00f8rgensen, M.S., Nissen, F.K., Paay, J., Kjeldskov, J. and Skov, M.B. 2016. Monitoring children's physical activity and sleep: a study of surveillance and information disclosure. Proceedings of the 28th Australian Conference on Computer-Human Interaction (Launceston, Tasmania, Australia, Nov. 2016), 50\u201358."},{"volume-title":"The dynamics of dementia: a modified grounded theory study","author":"Keady J.P.","key":"e_1_3_2_1_17_1","unstructured":"Keady , J.P. 1999. The dynamics of dementia: a modified grounded theory study . University of Wales. Keady, J.P. 1999. The dynamics of dementia: a modified grounded theory study. University of Wales."},{"key":"e_1_3_2_1_18_1","unstructured":"Keady J.P. and Nolan M. 2003. The dynamics of dementia: working together working separately or working alone? Partnerships in family care: Understanding the caregiving career. 15\u201332.  Keady J.P. and Nolan M. 2003. The dynamics of dementia: working together working separately or working alone? Partnerships in family care: Understanding the caregiving career. 15\u201332."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025522"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208570"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132525.3132554"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalz.2007.04.388"},{"key":"e_1_3_2_1_23_1","volume-title":"Realizing Choice: Online Safeguards for Couples Adapting to Cognitive Challenges. (Virtual Conference","author":"McDonald N.","year":"2020","unstructured":"McDonald , N. , Larsen , A. , Battisti , A. , Madjaroff , G. , Massey , A. and Mentis , H . 2020 . Realizing Choice: Online Safeguards for Couples Adapting to Cognitive Challenges. (Virtual Conference , Aug. 2020). McDonald, N., Larsen, A., Battisti, A., Madjaroff, G., Massey, A. and Mentis, H. 2020. Realizing Choice: Online Safeguards for Couples Adapting to Cognitive Challenges. (Virtual Conference, Aug. 2020)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/01634372.2011.593021"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3056540.3056559"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025861"},{"volume-title":"Proceedings of the ACM Conference on Computer-Supported Cooperative Work & Social Computing (In submission).","author":"Mentis H.M.","key":"e_1_3_2_1_27_1","unstructured":"Mentis , H.M. , Madjaroff , G. , Massey , A. and Trendafilova , Z . In submission. The Illusion of Choice in Discussing Cybersecurity Safeguards Between Older Adults with Mild Cognitive Impairment and Their Caregivers . Proceedings of the ACM Conference on Computer-Supported Cooperative Work & Social Computing (In submission). Mentis, H.M., Madjaroff, G., Massey, A. and Trendafilova, Z. In submission. The Illusion of Choice in Discussing Cybersecurity Safeguards Between Older Adults with Mild Cognitive Impairment and Their Caregivers. Proceedings of the ACM Conference on Computer-Supported Cooperative Work & Social Computing (In submission)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300573"},{"key":"e_1_3_2_1_29_1","volume-title":"A Majority of Americans Know Little About Digital Security and Privacy","author":"New Pew Research Study","year":"2019","unstructured":"New Pew Research Study : A Majority of Americans Know Little About Digital Security and Privacy : 2019 . https:\/\/www.cpomagazine.com\/cyber-security\/new-pew-research-study-a-majority-of-americans-know-little-about-digital-security-and-privacy\/. Accessed : 2020-07-20. New Pew Research Study: A Majority of Americans Know Little About Digital Security and Privacy: 2019. https:\/\/www.cpomagazine.com\/cyber-security\/new-pew-research-study-a-majority-of-americans-know-little-about-digital-security-and-privacy\/. Accessed: 2020-07-20."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858260"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858260"},{"key":"e_1_3_2_1_32_1","unstructured":"Rosson M.B. and Carrol J.M. 2009. Scenario-based design. Human-Computer Interaction: Development Process. CRC Press. 146\u2013161.  Rosson M.B. and Carrol J.M. 2009. Scenario-based design. Human-Computer Interaction: Development Process. CRC Press. 146\u2013161."},{"key":"e_1_3_2_1_33_1","unstructured":"Smith A. 2017. Americans and Cybersecurity. Pew Research Center: Internet Science & Tech.  Smith A. 2017. Americans and Cybersecurity. Pew Research Center: Internet Science & Tech."},{"key":"e_1_3_2_1_34_1","volume-title":"A Multidisciplinary Assessment of the Stalkerware Application Industry","author":"The Predator","year":"2019","unstructured":"The Predator in Your Pocket : A Multidisciplinary Assessment of the Stalkerware Application Industry : 2019 . https:\/\/citizenlab.ca\/2019\/06\/the-predator-in-your-pocket-a-multidisciplinary-assessment-of-the-stalkerware-application-industry\/. Accessed : 2019-12-24. The Predator in Your Pocket: A Multidisciplinary Assessment of the Stalkerware Application Industry: 2019. https:\/\/citizenlab.ca\/2019\/06\/the-predator-in-your-pocket-a-multidisciplinary-assessment-of-the-stalkerware-application-industry\/. Accessed: 2019-12-24."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2011.6091176"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2963095"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557307"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3171533.3171538"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998352"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301275.3302317"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055043"}],"event":{"name":"CHI '21: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Yokohama Japan","acronym":"CHI '21"},"container-title":["Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445071","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445071","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445071","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:30Z","timestamp":1750195710000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445071"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,6]]},"references-count":41,"alternative-id":["10.1145\/3411764.3445071","10.1145\/3411764"],"URL":"https:\/\/doi.org\/10.1145\/3411764.3445071","relation":{},"subject":[],"published":{"date-parts":[[2021,5,6]]},"assertion":[{"value":"2021-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}