{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T08:56:05Z","timestamp":1773392165849,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T00:00:00Z","timestamp":1620259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,6]]},"DOI":"10.1145\/3411764.3445299","type":"proceedings-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T07:01:49Z","timestamp":1620457309000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["Creepy Technology:What Is It and How Do You Measure It?"],"prefix":"10.1145","author":[{"given":"Pawe\u0142 W.","family":"Wo\u017aniak","sequence":"first","affiliation":[{"name":"Utrecht University, Netherlands"}]},{"given":"Jakob","family":"Karolus","sequence":"additional","affiliation":[{"name":"LMU Munich, Germany"}]},{"given":"Florian","family":"Lang","sequence":"additional","affiliation":[{"name":"LMU Munich, Germany"}]},{"given":"Caroline","family":"Eckerth","sequence":"additional","affiliation":[{"name":"LMU Munich, Germany"}]},{"given":"Johannes","family":"Sch\u00f6ning","sequence":"additional","affiliation":[{"name":"University of Bremen, Germany"}]},{"given":"Yvonne","family":"Rogers","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom and University of Bremen, Bremen, Germany"}]},{"given":"Jasmin","family":"Niess","sequence":"additional","affiliation":[{"name":"University of Bremen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901819"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753347"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Ann Blandford Dominic Furniss and Stephann Makri. 2016. Qualitative HCI research: Going behind the scenes. Synthesis lectures on human-centered informatics 9 1(2016) 1\u2013115.  Ann Blandford Dominic Furniss and Stephann Makri. 2016. Qualitative HCI research: Going behind the scenes. Synthesis lectures on human-centered informatics 9 1(2016) 1\u2013115.","DOI":"10.2200\/S00706ED1V01Y201602HCI034"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpubh.2018.00149"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3024969.3025083"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1111\/cdev.12999"},{"key":"e_1_3_2_2_7_1","volume-title":"Spotify and Tinder need to stop being creepy with customer data. Wired UK (Feb","author":"Burgess Matt","year":"2018","unstructured":"Matt Burgess . 2018. Spotify and Tinder need to stop being creepy with customer data. Wired UK (Feb . 2018 ). https:\/\/www.wired.co.uk\/article\/spotify-tinder-netflix-advertising-customer-information-privacy Section : Privacy . Matt Burgess. 2018. Spotify and Tinder need to stop being creepy with customer data. Wired UK (Feb. 2018). https:\/\/www.wired.co.uk\/article\/spotify-tinder-netflix-advertising-customer-information-privacy Section: Privacy."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1177\/154193120304701102"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203771587"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-006X.56.5.754"},{"key":"e_1_3_2_2_11_1","volume-title":"Scale development: Theory and applications. Vol.\u00a026","author":"DeVellis F","unstructured":"Robert\u00a0 F DeVellis . 2016. Scale development: Theory and applications. Vol.\u00a026 . Sage publications. Robert\u00a0F DeVellis. 2016. Scale development: Theory and applications. Vol.\u00a026. Sage publications."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441799"},{"key":"e_1_3_2_2_13_1","unstructured":"Kevin Dugan. 2018. Facebook\u2019s creepy new speakers are freaking people out. https:\/\/nypost.com\/2018\/10\/08\/facebooks-creepy-new-speakers-are-freaking-people-out\/  Kevin Dugan. 2018. Facebook\u2019s creepy new speakers are freaking people out. https:\/\/nypost.com\/2018\/10\/08\/facebooks-creepy-new-speakers-are-freaking-people-out\/"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312870"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642653"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2634317.2634340"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380116.2380138"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/506443.506543"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224298204600207"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2735711.2735794"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376415"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702545"},{"key":"e_1_3_2_2_23_1","volume-title":"The Secretive Company That Might End Privacy as We Know It. The New York Times (Jan","author":"Hill Kashmir","year":"2020","unstructured":"Kashmir Hill . 2020. The Secretive Company That Might End Privacy as We Know It. The New York Times (Jan . 2020 ). https:\/\/www.nytimes.com\/2020\/01\/18\/technology\/clearview-privacy-facial-recognition.html Kashmir Hill. 2020. The Secretive Company That Might End Privacy as We Know It. The New York Times (Jan. 2020). https:\/\/www.nytimes.com\/2020\/01\/18\/technology\/clearview-privacy-facial-recognition.html"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1349822.1349845"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188546"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3171221.3171286"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2574831"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2930674.2930710"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376252"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264926"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130859.3131293"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892331"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376162"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcm.2016.02.012"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2018.02220"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3024969.3025058"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979306"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134704"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3371382.3378376"},{"key":"e_1_3_2_2_40_1","volume-title":"http:\/\/quantifiedtoilets.com\/. Critical Making Hackathon at the SIGCHI Conference on Human Factors in Computing Systems","author":"Quantified\u00a0Toilets LLC.","year":"2014","unstructured":"Quantified\u00a0Toilets LLC. 2014. http:\/\/quantifiedtoilets.com\/. Critical Making Hackathon at the SIGCHI Conference on Human Factors in Computing Systems ( 2014 ). Quantified\u00a0Toilets LLC. 2014. http:\/\/quantifiedtoilets.com\/. Critical Making Hackathon at the SIGCHI Conference on Human Factors in Computing Systems (2014)."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319502.3374788"},{"key":"e_1_3_2_2_42_1","unstructured":"Adrienne Matei. 2017. New technology is forcing us to confront the ethics of bringing people back from the dead. https:\/\/qz.com\/896207\/death-technology-will-allow-grieving-people-to-bring-back-their-loved-ones-from-the-dead-digitally\/  Adrienne Matei. 2017. New technology is forcing us to confront the ethics of bringing people back from the dead. https:\/\/qz.com\/896207\/death-technology-will-allow-grieving-people-to-bring-back-their-loved-ones-from-the-dead-digitally\/"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.newideapsych.2016.03.003"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1899950.1899991"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985347.1985353"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134712"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173897"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322286"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342197.3345320"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3349263.3349603"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ROMAN.2004.1374777"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979437"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382967"},{"key":"e_1_3_2_2_54_1","volume-title":"Oxford English Dictionary","author":"Online OED","unstructured":"OED Online . 2021. Oxford English Dictionary . Oxford University Press . OED Online. 2021. Oxford English Dictionary. Oxford University Press."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3024969.3025064"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818052.2869124"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901832"},{"key":"e_1_3_2_2_58_1","first-page":"150","article-title":"An Analysis of the Technology Acceptance Model in Understanding University Students\u2019 Behavioral Intention to Use e-Learning","volume":"12","author":"Park Sung\u00a0Youl","year":"2009","unstructured":"Sung\u00a0Youl Park . 2009 . An Analysis of the Technology Acceptance Model in Understanding University Students\u2019 Behavioral Intention to Use e-Learning . Journal of Educational Technology & Society 12 , 3 (2009), 150 \u2013 162 . https:\/\/www.jstor.org\/stable\/jeductechsoci.12.3.150 Publisher: International Forum of Educational Technology & Society. Sung\u00a0Youl Park. 2009. An Analysis of the Technology Acceptance Model in Understanding University Students\u2019 Behavioral Intention to Use e-Learning. Journal of Educational Technology & Society 12, 3 (2009), 150\u2013162. https:\/\/www.jstor.org\/stable\/jeductechsoci.12.3.150 Publisher: International Forum of Educational Technology & Society.","journal-title":"Journal of Educational Technology & Society"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376187"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858381"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300275"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053246"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481281"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1613858.1613936"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173902"},{"key":"e_1_3_2_2_66_1","volume-title":"The coding manual for qualitative researchers","author":"Salda\u00f1a Johnny","unstructured":"Johnny Salda\u00f1a . 2015. The coding manual for qualitative researchers . Sage . Johnny Salda\u00f1a. 2015. The coding manual for qualitative researchers. Sage."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2017.8"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3116595.3116596"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3381809"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557421"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.5555\/2447556.2447651"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395548"},{"key":"e_1_3_2_2_73_1","first-page":"45","article-title":"A Theory of Creepy: Technology, Privacy, and Shifting Social Norms","volume":"16","author":"Tene Omer","year":"2014","unstructured":"Omer Tene and Jules Polonetsky . 2014 . A Theory of Creepy: Technology, Privacy, and Shifting Social Norms . Yale Journal of Law and Technology 16 (2014), 45 . Omer Tene and Jules Polonetsky. 2014. A Theory of Creepy: Technology, Privacy, and Shifting Social Norms. Yale Journal of Law and Technology 16 (2014), 45.","journal-title":"Yale Journal of Law and Technology"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152832.3157381"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-003-0245-8"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702522"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335362"},{"key":"e_1_3_2_2_78_1","volume-title":"Oxford thesaurus of English","author":"Waite Maurice","unstructured":"Maurice Waite . 2009. Oxford thesaurus of English . Oxford University Press . Maurice Waite. 2009. Oxford thesaurus of English. Oxford University Press."},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1037\/cbs0000066"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1177\/0011000006288127"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300303"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531685"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557152"}],"event":{"name":"CHI '21: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '21","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445299","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445299","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:44Z","timestamp":1750195724000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445299"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,6]]},"references-count":83,"alternative-id":["10.1145\/3411764.3445299","10.1145\/3411764"],"URL":"https:\/\/doi.org\/10.1145\/3411764.3445299","relation":{},"subject":[],"published":{"date-parts":[[2021,5,6]]},"assertion":[{"value":"2021-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}