{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:09:08Z","timestamp":1776092948647,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T00:00:00Z","timestamp":1620259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,6]]},"DOI":"10.1145\/3411764.3445485","type":"proceedings-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T04:19:40Z","timestamp":1620447580000},"page":"1-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Us and Them (and It): Social Orientation, Privacy Concerns, and Expected Use of Pandemic-Tracking Apps in the United States"],"prefix":"10.1145","author":[{"given":"John S.","family":"Seberger","sequence":"first","affiliation":[{"name":"Informatics Indiana University, United States"}]},{"given":"Sameer","family":"Patil","sequence":"additional","affiliation":[{"name":"School of Informatics, Computing, and Engineering Indiana University, United States"}]}],"member":"320","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2800835.2800851"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"key":"e_1_3_2_2_3_1","volume-title":"Privacy and human behavior in the age of information. Science 347, 6221","author":"Acquisti Alessandro","year":"2015","unstructured":"Alessandro Acquisti , Laura Brandimarte , and George Loewenstein . 2015. Privacy and human behavior in the age of information. Science 347, 6221 ( 2015 ), 509\u2013514. Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2015. Privacy and human behavior in the age of information. Science 347, 6221 (2015), 509\u2013514."},{"key":"e_1_3_2_2_4_1","volume-title":"2nd Annual Workshop on Economics and Information Security-WEIS, Vol.\u00a03. WEIS","author":"Acquisti Alessandro","year":"2003","unstructured":"Alessandro Acquisti and Jens Grossklags . 2003 . Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior . In 2nd Annual Workshop on Economics and Information Security-WEIS, Vol.\u00a03. WEIS , Berkeley, CA, 1\u201327. Alessandro Acquisti and Jens Grossklags. 2003. Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior. In 2nd Annual Workshop on Economics and Information Security-WEIS, Vol.\u00a03. WEIS, Berkeley, CA, 1\u201327."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188581"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702210"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1101\/2020.05.05.20091587"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1017\/pan.2018.57"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.7146\/aahcc.v1i1.21298"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025918"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466446"},{"key":"e_1_3_2_2_13_1","volume-title":"May","author":"Bell Genevieve","year":"2020","unstructured":"Genevieve Bell . 2020. We need mass surveillance to fight COVID-19 \u2013 but it doesn\u2019t have to be creepy. https:\/\/www.technologyreview.com\/2020\/04\/12\/999186\/covid-19-contact-tracing-surveillance-data-privacy-anonymity\/ MIT Technology Review , May 2020 . Genevieve Bell. 2020. We need mass surveillance to fight COVID-19 \u2013 but it doesn\u2019t have to be creepy. https:\/\/www.technologyreview.com\/2020\/04\/12\/999186\/covid-19-contact-tracing-surveillance-data-privacy-anonymity\/ MIT Technology Review, May 2020."},{"key":"e_1_3_2_2_14_1","volume-title":"Tracesecure: Towards privacy preserving contact tracing. arXiv:2004.04059.","author":"Bell James","year":"2020","unstructured":"James Bell , David Butler , Chris Hicks , and Jon Crowcroft . 2020 . Tracesecure: Towards privacy preserving contact tracing. arXiv:2004.04059. James Bell, David Butler, Chris Hicks, and Jon Crowcroft. 2020. Tracesecure: Towards privacy preserving contact tracing. arXiv:2004.04059."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.m1373"},{"key":"e_1_3_2_2_16_1","volume-title":"PACT: Privacy sensitive protocols and mechanisms for mobile contact tracing. arxiv:2004.03544","author":"Chan Justin","year":"2020","unstructured":"Justin Chan , Shyam Gollakota , Eric Horvitz , Joseph Jaeger , Sham Kakade , Tadayoshi Kohno , John Langford , Jonathan Larson , Sudheesh Singanamalla , Jacob Sunshine , 2020 . PACT: Privacy sensitive protocols and mechanisms for mobile contact tracing. arxiv:2004.03544 Justin Chan, Shyam Gollakota, Eric Horvitz, Joseph Jaeger, Sham Kakade, Tadayoshi Kohno, John Langford, Jonathan Larson, Sudheesh Singanamalla, Jacob Sunshine, 2020. PACT: Privacy sensitive protocols and mechanisms for mobile contact tracing. arxiv:2004.03544"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359249"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"William\u00a0F. Chaplin Oliver\u00a0P. John and Lewis\u00a0R. Goldberg. 1988. Conceptions of states and traits: dimensional attributes with ideals as prototypes.Journal of personality and social psychology 54 4(1988) 541.  William\u00a0F. Chaplin Oliver\u00a0P. John and Lewis\u00a0R. Goldberg. 1988. Conceptions of states and traits: dimensional attributes with ideals as prototypes.Journal of personality and social psychology 54 4(1988) 541.","DOI":"10.1037\/0022-3514.54.4.541"},{"key":"e_1_3_2_2_19_1","unstructured":"Hyunghoon Cho Daphne Ippolito and Yun\u00a0William Yu. 2020. Contact tracing mobile apps for COVID-19: Privacy considerations and related trade-offs. arXiv:2003.11511.  Hyunghoon Cho Daphne Ippolito and Yun\u00a0William Yu. 2020. Contact tracing mobile apps for COVID-19: Privacy considerations and related trade-offs. arXiv:2003.11511."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053168015622072"},{"key":"e_1_3_2_2_21_1","unstructured":"Simon\u00a0P. Cohn. 2006. Privacy and confidentiality in the nationwide health information network. http:\/\/www.ncvhs.hhs.gov\/060622lt.htm  Simon\u00a0P. Cohn. 2006. Privacy and confidentiality in the nationwide health information network. http:\/\/www.ncvhs.hhs.gov\/060622lt.htm"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3410566.3410585"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1600-0587.2012.07348.x"},{"key":"e_1_3_2_2_24_1","volume-title":"Dis-ease surveillance: How might surveillance studies address COVID-19?Surveillance & Society 18, 1","author":"French Martin","year":"2020","unstructured":"Martin French and Torin Monahan . 2020. Dis-ease surveillance: How might surveillance studies address COVID-19?Surveillance & Society 18, 1 ( 2020 ), 1\u201311. Martin French and Torin Monahan. 2020. Dis-ease surveillance: How might surveillance studies address COVID-19?Surveillance & Society 18, 1 (2020), 1\u201311."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"Bram\u00a0M. Fridhandler. 1986. Conceptual note on state trait and the state\u2013trait distinction.Journal of Personality and Social Psychology 50 1(1986) 169.  Bram\u00a0M. Fridhandler. 1986. Conceptual note on state trait and the state\u2013trait distinction.Journal of Personality and Social Psychology 50 1(1986) 169.","DOI":"10.1037\/0022-3514.50.1.169"},{"key":"e_1_3_2_2_26_1","volume-title":"Proceedings of the 13th Workshop on Privacy in the Electronic Society. Association for Computing Machinery","author":"Fu Huiqing","year":"2014","unstructured":"Huiqing Fu and Janne Lindqvist . 2014 . General area or approximate location? How people understand location permissions . In Proceedings of the 13th Workshop on Privacy in the Electronic Society. Association for Computing Machinery , Scottsdale, AZ, 117\u2013120. Huiqing Fu and Janne Lindqvist. 2014. General area or approximate location? How people understand location permissions. In Proceedings of the 13th Workshop on Privacy in the Electronic Society. Association for Computing Machinery, Scottsdale, AZ, 117\u2013120."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188466"},{"key":"e_1_3_2_2_28_1","volume-title":"Detecting influenza epidemics using search engine query data. Nature 457, 7232","author":"Ginsberg Jeremy","year":"2009","unstructured":"Jeremy Ginsberg , Matthew\u00a0 H. Mohebbi , Rajan\u00a0 S. Patel , Lynnette Brammer , Mark\u00a0 S. Smolinski , and Larry Brilliant . 2009. Detecting influenza epidemics using search engine query data. Nature 457, 7232 ( 2009 ), 1012\u20131014. Jeremy Ginsberg, Matthew\u00a0H. Mohebbi, Rajan\u00a0S. Patel, Lynnette Brammer, Mark\u00a0S. Smolinski, and Larry Brilliant. 2009. Detecting influenza epidemics using search engine query data. Nature 457, 7232 (2009), 1012\u20131014."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1002\/bdm.1753"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1080\/00071310020015280"},{"key":"e_1_3_2_2_31_1","unstructured":"Eszter Hargittai Minh\u00a0Hao Nguyen Jaelle Fuchs Jonathan Gruber Will Marler Amanda Hunsaker and Gokce Karaoglu. 2020. COVID-19 study on digital media and the coronavirus pandemic. http:\/\/webuse.org\/covid\/  Eszter Hargittai Minh\u00a0Hao Nguyen Jaelle Fuchs Jonathan Gruber Will Marler Amanda Hunsaker and Gokce Karaoglu. 2020. COVID-19 study on digital media and the coronavirus pandemic. http:\/\/webuse.org\/covid\/"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"Eszter Hargittai and Elissa\u00a0M. Redmiles. 2020. Will Americans be willing to install COVID-19 tracking apps?https:\/\/blogs.scientificamerican.com\/observations\/will-americans-be-willing-to-install-covid-19-tracking-apps\/ Library Catalog: blogs.scientificamerican.com.  Eszter Hargittai and Elissa\u00a0M. Redmiles. 2020. Will Americans be willing to install COVID-19 tracking apps?https:\/\/blogs.scientificamerican.com\/observations\/will-americans-be-willing-to-install-covid-19-tracking-apps\/ Library Catalog: blogs.scientificamerican.com.","DOI":"10.5210\/fm.v25i11.11095"},{"key":"e_1_3_2_2_33_1","unstructured":"Vi Hart Divya Siddarth Bethan Cantrell Lila Tretikov Peter Eckersley John Langford Scott Leibrand Sham Kakade Dana Lewis Stefano Tessaro and Glen Weyl. 2020. Outpacing the virus: Digital response to containing the spread of COVID-19 while mitigating privacy risks. https:\/\/ethics.harvard.edu\/outpacing-virus  Vi Hart Divya Siddarth Bethan Cantrell Lila Tretikov Peter Eckersley John Langford Scott Leibrand Sham Kakade Dana Lewis Stefano Tessaro and Glen Weyl. 2020. Outpacing the virus: Digital response to containing the spread of COVID-19 while mitigating privacy risks. https:\/\/ethics.harvard.edu\/outpacing-virus"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3380960"},{"key":"e_1_3_2_2_35_1","unstructured":"Human Rights Watch. 2020. COVID-19 Apps Pose Serious Human Rights Risks. https:\/\/www.hrw.org\/news\/2020\/05\/13\/covid-19-apps-pose-serious-human-rights-risks  Human Rights Watch. 2020. COVID-19 Apps Pose Serious Human Rights Risks. https:\/\/www.hrw.org\/news\/2020\/05\/13\/covid-19-apps-pose-serious-human-rights-risks"},{"key":"e_1_3_2_2_36_1","volume-title":"The Self and the Object World","author":"Jacobson Edith","unstructured":"Edith Jacobson . 1965. The Self and the Object World . Hogarth Press , London . Edith Jacobson. 1965. The Self and the Object World. Hogarth Press, London."},{"key":"e_1_3_2_2_37_1","volume-title":"Critique of Pure Reason","author":"Kant Immanuel","unstructured":"Immanuel Kant . 1999. Critique of Pure Reason . Cambridge University Press, Cambridge , UK. Immanuel Kant. 1999. Critique of Pure Reason. Cambridge University Press, Cambridge, UK."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"crossref","unstructured":"Michael Klenk Hein Duijf and Christian Engels. 2020. Ethics of digital contact tracing and COVID-19: Who is (not) free to go?https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3595394  Michael Klenk Hein Duijf and Christian Engels. 2020. Ethics of digital contact tracing and COVID-19: Who is (not) free to go?https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3595394","DOI":"10.2139\/ssrn.3595394"},{"key":"e_1_3_2_2_39_1","unstructured":"Christiane Kuhn Martin Beck and Thorsten Strufe. 2020. COVID notions: Towards formal definitions\u2013and documented understanding\u2013of privacy goals and claimed protection in proximity-tracing services. arXiv:2004.07723.  Christiane Kuhn Martin Beck and Thorsten Strufe. 2020. COVID notions: Towards formal definitions\u2013and documented understanding\u2013of privacy goals and claimed protection in proximity-tracing services. arXiv:2004.07723."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017189.2017193"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1177\/003591577106400646"},{"key":"e_1_3_2_2_42_1","volume-title":"Reassembling the social: An introduction to actor-network-theory","author":"Latour Bruno","unstructured":"Bruno Latour . 2005. Reassembling the social: An introduction to actor-network-theory . Oxford University Press , Oxford, UK . Bruno Latour. 2005. Reassembling the social: An introduction to actor-network-theory. Oxford University Press, Oxford, UK."},{"key":"e_1_3_2_2_43_1","unstructured":"Bruno Latour. 2020. Imaginer les gestes-barri\u00e8res contre le retour \u00e0 la production d\u2019avant-crise. https:\/\/oara.fr\/sites\/default\/files\/images\/upload\/bruno_latour_imaginer_les_gestes_barrie_res_1.pdf  Bruno Latour. 2020. Imaginer les gestes-barri\u00e8res contre le retour \u00e0 la production d\u2019avant-crise. https:\/\/oara.fr\/sites\/default\/files\/images\/upload\/bruno_latour_imaginer_les_gestes_barrie_res_1.pdf"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860017"},{"key":"e_1_3_2_2_47_1","unstructured":"Sascha Meinert. 2014. Field manual: Scenario building. https:\/\/www.etui.org\/sites\/default\/files\/2014_Scenario_Building_DEF.pdf  Sascha Meinert. 2014. Field manual: Scenario building. https:\/\/www.etui.org\/sites\/default\/files\/2014_Scenario_Building_DEF.pdf"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000494.2000499"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3308451"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300698"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.8.4.e27"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"crossref","unstructured":"Sangchul Park Gina\u00a0Jeehyun Choi and Haksoo Ko. 2020. Information Technology-Based Tracing Strategy in Response to COVID-19 in South Korea\u2013Privacy Controversies. https:\/\/jamanetwork.com\/journals\/jama\/article-abstract\/2765252  Sangchul Park Gina\u00a0Jeehyun Choi and Haksoo Ko. 2020. Information Technology-Based Tracing Strategy in Response to COVID-19 in South Korea\u2013Privacy Controversies. https:\/\/jamanetwork.com\/journals\/jama\/article-abstract\/2765252","DOI":"10.1001\/jama.2020.6602"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335363"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381983"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851683"},{"key":"e_1_3_2_2_56_1","unstructured":"Ramesh Raskar Isabel Schunemann Rachel Barbar Kristen Vilcans Jim Gray Praneeth Vepakomma Suraj Kapa Andrea Nuzzo Rajiv Gupta Alex Berke 2020. Apps gone rogue: Maintaining personal privacy in an epidemic. arXiv:2003.08567.  Ramesh Raskar Isabel Schunemann Rachel Barbar Kristen Vilcans Jim Gray Praneeth Vepakomma Suraj Kapa Andrea Nuzzo Rajiv Gupta Alex Berke 2020. Apps gone rogue: Maintaining personal privacy in an epidemic. arXiv:2003.08567."},{"key":"e_1_3_2_2_57_1","unstructured":"Elissa\u00a0M. Redmiles. 2020. User concerns & tradeoffs in technology-facilitated contact tracing. arXiv:2004.13219.  Elissa\u00a0M. Redmiles. 2020. User concerns & tradeoffs in technology-facilitated contact tracing. arXiv:2004.13219."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00014"},{"key":"e_1_3_2_2_60_1","volume-title":"The Social Contract. Wordsworth Editions Limited","author":"Rousseau Jean-Jacques","unstructured":"Jean-Jacques Rousseau . 1998. The Social Contract. Wordsworth Editions Limited , London . Jean-Jacques Rousseau. 1998. The Social Contract. Wordsworth Editions Limited, London."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1080\/03637751.2017.1342043"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0019467"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1177\/106939719502900302"},{"key":"e_1_3_2_2_64_1","first-page":"1880","article-title":"Introduction: Privacy self-management and the consent dilemma","volume":"126","author":"Solove J.","year":"2012","unstructured":"Daniel\u00a0 J. Solove . 2012 . Introduction: Privacy self-management and the consent dilemma . Harv. L. Rev. 126 (2012), 1880 . Daniel\u00a0J. Solove. 2012. Introduction: Privacy self-management and the consent dilemma. Harv. L. Rev. 126(2012), 1880.","journal-title":"Harv. L. Rev."},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173589"},{"key":"e_1_3_2_2_66_1","first-page":"413","article-title":"Nudging and choice architecture: Ethical considerations","volume":"32","author":"Sunstein R.","year":"2015","unstructured":"Cass\u00a0 R. Sunstein . 2015 . Nudging and choice architecture: Ethical considerations . Yale Journal on Regulation 32 , 2 (2015), 413 \u2013 450 . https:\/\/www.yalejreg.com\/print\/the-ethics-of-nudging\/ Cass\u00a0R. Sunstein. 2015. Nudging and choice architecture: Ethical considerations. Yale Journal on Regulation 32, 2 (2015), 413\u2013450. https:\/\/www.yalejreg.com\/print\/the-ethics-of-nudging\/","journal-title":"Yale Journal on Regulation"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1108\/JCM-07-2014-1078"},{"key":"e_1_3_2_2_68_1","volume-title":"Public health surveillance in the United States. Epidemiologic reviews 10, 1","author":"Thacker B.","year":"1988","unstructured":"Stephen\u00a0 B. Thacker and Ruth\u00a0 L. Berkelman . 1988. Public health surveillance in the United States. Epidemiologic reviews 10, 1 ( 1988 ), 164\u2013190. Stephen\u00a0B. Thacker and Ruth\u00a0L. Berkelman. 1988. Public health surveillance in the United States. Epidemiologic reviews 10, 1 (1988), 164\u2013190."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376760"},{"key":"e_1_3_2_2_70_1","volume-title":"The psychological measurement of cultural syndromes.American psychologist 51, 4","author":"Triandis C.","year":"1996","unstructured":"Harry\u00a0 C. Triandis . 1996. The psychological measurement of cultural syndromes.American psychologist 51, 4 ( 1996 ), 407. Harry\u00a0C. Triandis. 1996. The psychological measurement of cultural syndromes.American psychologist 51, 4 (1996), 407."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-6494.696169"},{"key":"e_1_3_2_2_72_1","volume-title":"Individualism and collectivism","author":"Triandis C.","unstructured":"Harry\u00a0 C. Triandis . 2018. Individualism and collectivism . Routledge , New York . Harry\u00a0C. Triandis. 2018. Individualism and collectivism. Routledge, New York."},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.74.1.118"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.7455683"},{"key":"e_1_3_2_2_75_1","volume-title":"Calif.) 6, 2","author":"Vatcheva P.","year":"2016","unstructured":"Kristina\u00a0 P. Vatcheva , MinJae Lee , Joseph\u00a0 B. McCormick , and Mohammad\u00a0 H. Rahbar . 2016. Multicollinearity in regression analyses conducted in epidemiologic studies. Epidemiology (Sunnyvale , Calif.) 6, 2 ( 2016 ), 2161\u20131165. Kristina\u00a0P. Vatcheva, MinJae Lee, Joseph\u00a0B. McCormick, and Mohammad\u00a0H. Rahbar. 2016. Multicollinearity in regression analyses conducted in epidemiologic studies. Epidemiology (Sunnyvale, Calif.) 6, 2 (2016), 2161\u20131165."},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3375223"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26633-6_7"},{"key":"e_1_3_2_2_79_1","volume-title":"International Conference on Information Systems, Vol.\u00a03. Association for Information Systems","author":"Xu Heng","year":"2012","unstructured":"Heng Xu , Sumeet Gupta , Mary\u00a0Beth Rosson , and John\u00a0 M. Carroll . 2012 . Measuring mobile users\u2019 concerns for information privacy . In International Conference on Information Systems, Vol.\u00a03. Association for Information Systems , Orlando, FL, USA, 2278\u20132293. Heng Xu, Sumeet Gupta, Mary\u00a0Beth Rosson, and John\u00a0M. Carroll. 2012. Measuring mobile users\u2019 concerns for information privacy. In International Conference on Information Systems, Vol.\u00a03. Association for Information Systems, Orlando, FL, USA, 2278\u20132293."},{"key":"e_1_3_2_2_80_1","volume-title":"Peer-to-peer contact tracing: Development of a privacy-preserving smartphone app. JMIR mHealth and uHealth 8, 4","author":"Yasaka M.","year":"2020","unstructured":"Tyler\u00a0 M. Yasaka , Brandon\u00a0 M. Lehrich , and Ronald Sahyouni . 2020. Peer-to-peer contact tracing: Development of a privacy-preserving smartphone app. JMIR mHealth and uHealth 8, 4 ( 2020 ), e18936. Tyler\u00a0M. Yasaka, Brandon\u00a0M. Lehrich, and Ronald Sahyouni. 2020. Peer-to-peer contact tracing: Development of a privacy-preserving smartphone app. JMIR mHealth and uHealth 8, 4 (2020), e18936."},{"key":"e_1_3_2_2_81_1","volume-title":"Americans","author":"Zhang Baobao","unstructured":"Baobao Zhang , Sarah Kreps , and Nina McMurry . 2020. Americans \u2019 perceptions of privacy and surveillance in the COVID- 19 pandemic.https:\/\/osf.io\/9wz3y Baobao Zhang, Sarah Kreps, and Nina McMurry. 2020. Americans\u2019 perceptions of privacy and surveillance in the COVID-19 pandemic.https:\/\/osf.io\/9wz3y"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2017.11.003"},{"key":"e_1_3_2_2_83_1","volume-title":"Proceedings of the 2008 International Conference on Digital Government Research(dg.o \u201908)","author":"Zhang Yulei","year":"2008","unstructured":"Yulei Zhang , Yan Dang , Yi-Da Chen , Hsinchun Chen , Mark Thurmond , Chwan-Chuen King , Daniel\u00a0Dajun Zeng , and Catherine\u00a0 A. Larson . 2008 . BioPortal infectious disease informatics research: Disease surveillance and situational awareness . In Proceedings of the 2008 International Conference on Digital Government Research(dg.o \u201908) . Digital Government Society of North America, Montreal, Canada, 393\u2013394. Yulei Zhang, Yan Dang, Yi-Da Chen, Hsinchun Chen, Mark Thurmond, Chwan-Chuen King, Daniel\u00a0Dajun Zeng, and Catherine\u00a0A. Larson. 2008. BioPortal infectious disease informatics research: Disease surveillance and situational awareness. In Proceedings of the 2008 International Conference on Digital Government Research(dg.o \u201908). Digital Government Society of North America, Montreal, Canada, 393\u2013394."},{"key":"e_1_3_2_2_84_1","volume-title":"The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs","author":"Zuboff Shoshana","unstructured":"Shoshana Zuboff . 2019. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs , New York . Shoshana Zuboff. 2019. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs, New York."}],"event":{"name":"CHI '21: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '21","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445485","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445485","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:48Z","timestamp":1750195728000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445485"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,6]]},"references-count":83,"alternative-id":["10.1145\/3411764.3445485","10.1145\/3411764"],"URL":"https:\/\/doi.org\/10.1145\/3411764.3445485","relation":{},"subject":[],"published":{"date-parts":[[2021,5,6]]},"assertion":[{"value":"2021-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}