{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T02:34:18Z","timestamp":1772937258753,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,2,14]],"date-time":"2021-02-14T00:00:00Z","timestamp":1613260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001602","name":"Science Foundation Ireland","doi-asserted-by":"publisher","award":["13\/RC\/2094, 16\/SP\/3804"],"award-info":[{"award-number":["13\/RC\/2094, 16\/SP\/3804"]}],"id":[{"id":"10.13039\/501100001602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/P01013X\/1, EP\/R013144\/1"],"award-info":[{"award-number":["EP\/P01013X\/1, EP\/R013144\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,2,14]]},"DOI":"10.1145\/3430524.3440626","type":"proceedings-article","created":{"date-parts":[[2021,2,14]],"date-time":"2021-02-14T22:50:58Z","timestamp":1613343058000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Up Close &amp; Personal: Exploring User-preferred Image Schemas for Intuitive Privacy Awareness and Control"],"prefix":"10.1145","author":[{"given":"Vikram","family":"Mehta","sequence":"first","affiliation":[{"name":"School of Computing and Communications, The Open University, Milton Keynes, UK"}]},{"given":"Arosha K.","family":"Bandara","sequence":"additional","affiliation":[{"name":"School of Computing and Communications, The Open University, Milton Keynes, UK"}]},{"given":"Blaine A.","family":"Price","sequence":"additional","affiliation":[{"name":"School of Computing and Communications, The Open University, Milton Keynes, UK"}]},{"given":"Bashar","family":"Nuseibeh","sequence":"additional","affiliation":[{"name":"School of Computing and Communications, The Open University, Milton Keynes UK and Lero - The Irish Software Research Centre, University of Limerick, Limerick, Ireland"}]},{"given":"Daniel","family":"Gooch","sequence":"additional","affiliation":[{"name":"School of Computing and Communications, The Open University, Milton Keynes, UK"}]}],"member":"320","published-online":{"date-parts":[[2021,2,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Personal Space, Territory, and Crowding.Brooks\/Cole","author":"Altman Irwin","unstructured":"Irwin Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding.Brooks\/Cole Publishing Company, Monterey, California. 237 pages."},{"key":"e_1_3_2_1_2_1","volume-title":"Privacy: A conceptual analysis. Environment and behavior 8, 1","author":"Altman Irwin","year":"1976","unstructured":"Irwin Altman. 1976. Privacy: A conceptual analysis. Environment and behavior 8, 1 (1976), 7\u201329."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-433-3_2Series"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501616"},{"key":"e_1_3_2_1_5_1","unstructured":"Ayah Bdeir. 2006. random search. http:\/\/ayahbdeir.com\/work\/random-search\/"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1203752"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1241934.1241940"},{"key":"e_1_3_2_1_8_1","volume-title":"Metaphor. In Proceedings of the Aristotelian Society, New Series, Vol.\u00a055","author":"Black Max","year":"1955","unstructured":"Max Black. 1955. Metaphor. In Proceedings of the Aristotelian Society, New Series, Vol.\u00a055. Aristotelian Society, Wiley, London, UK, 273\u2013294. http:\/\/www.jstor.org\/stable\/4544549"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of Participatory Design Conference (PDC","author":"Brandt Eva","year":"2000","unstructured":"Eva Brandt and Camilla Grunnet. 2000. Evoking the future: Drama and props in user centered design. In Proceedings of Participatory Design Conference (PDC 2000). ACM Press, Portland, 11\u201320. https:\/\/www.researchgate.net\/profile\/Eva_Brandt\/publication\/238697873_Evoking_the_future_drama_and_props_in_user_centered_design\/links\/0deec5367607449ef4000000\/Evoking-the-future-drama-and-props-in-user-centered-design.pdf"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/026540758900600201"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054985"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01557915"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_15_1","volume-title":"Digital Aura. In 4th International Conference on Pervasive Computing, Pervasive 2004","author":"Ferscha Alois","year":"2004","unstructured":"Alois Ferscha, Manfred Hechinger, Rene Mayrhofer, Marcos dos Santos\u00a0Rocha, Marquart Franz, and Roy Oberhauser. 2004. Digital Aura. In 4th International Conference on Pervasive Computing, Pervasive 2004, Advances in Pervasive Computing. Springer-Verlag, Linz, Austria, 405\u2013410. https:\/\/www.hs-aalen.de\/uploads\/publication\/file\/6399\/DigitalAura-ferscha2004.pdf"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1515\/9783110197532.1.35"},{"key":"e_1_3_2_1_17_1","volume-title":"Current anthropology 9, 2\/3","author":"Hall T.","year":"1968","unstructured":"Edward\u00a0T. Hall, Ray\u00a0L. Birdwhistell, Bernhard Bock, Paul Bohannan, A.\u00a0Richard Diebold\u00a0Jr, Marshall Durbin, Munro\u00a0S. Edmonson, J.\u00a0L. Fischer, Dell Hymes, Solon\u00a0T. Kimball, and others. 1968. Proxemics. Current anthropology 9, 2\/3 (1968), 83\u2013108. http:\/\/www.journals.uchicago.edu\/doi\/abs\/10.1086\/200975"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2648.1981.tb03195.x"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1226969.1226996"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1517664.1517686"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2010.08.009"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJART.2009.029240"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851600.1851690"},{"key":"e_1_3_2_1_25_1","volume-title":"The body in the mind: The bodily basis of meaning, imagination, and reason","author":"Johnson Mark","unstructured":"Mark Johnson. 2013. The body in the mind: The bodily basis of meaning, imagination, and reason. University of Chicago Press, Chicago."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72037-9_10"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1519004"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2011.5720177"},{"key":"e_1_3_2_1_30_1","unstructured":"Rachel Krause. 2018. NN\/g Nielsen Norman Group. https:\/\/www.nngroup.com\/articles\/storyboards-visualize-ideas\/"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1358628.1358846"},{"key":"e_1_3_2_1_32_1","unstructured":"Bastian K\u00f6nings. 2015. User-centered awareness and control of privacy in Ubiquitous Computing. PhD diss. PhD diss. Universit\u00e4t Ulm."},{"key":"e_1_3_2_1_33_1","volume-title":"Metaphors we live by","author":"Lakoff George","unstructured":"George Lakoff and Mark Johnson. 2003. Metaphors we live by. University of Chicago Press, Chicago."},{"key":"e_1_3_2_1_34_1","volume-title":"Workshop on Socially-informed Design of Privacy-enhancing Solutions in Ubiquitous Computing. UbiComp","author":"Langheinrich Marc","unstructured":"Marc Langheinrich. 2002. Privacy invasions in ubiquitous computing. In Workshop on Socially-informed Design of Privacy-enhancing Solutions in Ubiquitous Computing. UbiComp. Distributed Systems Group, Institute for Pervasive Computing, Swiss Federal Institute of Technology, ETH Zurich, Switzerland, 8. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.6.6743&rep=rep1&type=pdf"},{"key":"e_1_3_2_1_35_1","volume-title":"Designing Disclosure: Interactive Personal privacy at the Dawn of ubiquitous computing. Master\u2019s thesis. Computer Science Division","author":"Lederer Scott","year":"2003","unstructured":"Scott Lederer. 2003. Designing Disclosure: Interactive Personal privacy at the Dawn of ubiquitous computing. Master\u2019s thesis. Computer Science Division, University of California, Berkeley. http:\/\/www.cs.cmu.edu\/~io\/publications\/old-pubs\/privacy-techreport02.pdf"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-007-0163-2"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21521-6_17"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2148131.2148166"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/332040.332438"},{"key":"e_1_3_2_1_42_1","volume-title":"Murky conceptual waters: The public and the private. Ethics and Information technology 3, 3","author":"Marx T.","year":"2001","unstructured":"Gary\u00a0T. Marx. 2001. Murky conceptual waters: The public and the private. Ethics and Information technology 3, 3 (2001), 157\u2013169. http:\/\/link.springer.com\/article\/10.1023\/A:1012456832336"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3294109.3302934"},{"key":"e_1_3_2_1_44_1","unstructured":"Vikram Mehta. 2020. Privacy Metaphors - study repository. https:\/\/github.com\/PrivacyMetaphors\/Study"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892475"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1177\/154193120404800209"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_3_2_1_49_1","volume-title":"Boundaries of privacy: Dialectics of disclosure","author":"Petronio Sandra","unstructured":"Sandra Petronio. 2002. Boundaries of privacy: Dialectics of disclosure. Suny Press, USA. 268 pages."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078846"},{"key":"e_1_3_2_1_51_1","volume-title":"The Behavioral Basis of Design","author":"Sommer Robert","unstructured":"Robert Sommer. 1969. Personal Space. The Behavioral Basis of Design.Prentice-Hall, USA. 177 pages."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1177\/0162243915571167"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","unstructured":"Peter Tarasewich Jun Gong and Richard Conlan. 2006. Protecting private data in public. In CHI\u201906 Extended Abstracts on Human Factors in Computing Systems. ACM Montr\u00e9al 1409\u20131414. https:\/\/doi.org\/10.1145\/1125451.1125711","DOI":"10.1145\/1125451.1125711"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501605"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207761"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58536-9_16"}],"event":{"name":"TEI '21: Fifteenth International Conference on Tangible, Embedded, and Embodied Interaction","location":"Salzburg Austria","acronym":"TEI '21"},"container-title":["Proceedings of the Fifteenth International Conference on Tangible, Embedded, and Embodied Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3430524.3440626","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3430524.3440626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:57Z","timestamp":1750199937000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3430524.3440626"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,14]]},"references-count":52,"alternative-id":["10.1145\/3430524.3440626","10.1145\/3430524"],"URL":"https:\/\/doi.org\/10.1145\/3430524.3440626","relation":{},"subject":[],"published":{"date-parts":[[2021,2,14]]},"assertion":[{"value":"2021-02-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}