{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T20:43:51Z","timestamp":1760647431588,"version":"3.41.0"},"reference-count":156,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW1","license":[{"start":{"date-parts":[[2021,4,13]],"date-time":"2021-04-13T00:00:00Z","timestamp":1618272000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001711","name":"Swiss National Science Foundation","doi-asserted-by":"crossref","award":["CRSK- 2_190762"],"award-info":[{"award-number":["CRSK- 2_190762"]}],"id":[{"id":"10.13039\/501100001711","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2021,4,13]]},"abstract":"<jats:p>Individuals share increasing amounts of personal multimedia data, exposing themselves (uploaders) as well as others (data subjects). Non-consensual sharing of multimedia data that depicts others raises so-called multiparty privacy conflicts (MPCs), which can have severe consequences. To limit the incidence of MPCs, a family of Precautionary mechanisms have recently been developed that force uploaders to collaborate with the other data subjects to prevent MPCs. However, there is still very little work on understanding how users perceive the precautionary mechanisms together with which ones they prefer and why. In addition, precautionary mechanisms have some limitations, e.g., they require linking content to the co-owners' identity. Therefore, we also explore alternatives to precautionary mechanisms and propose a new class of solutions-Dissuasive mechanisms-that aim at deterring the uploaders from sharing without consent. We then present a user-centric comparison of precautionary and dissuasive mechanisms, through a large-scale survey (N = 1792; a representative sample of adult Internet users). Our results showed that respondents prefer precautionary to dissuasive mechanisms. These enforce collaboration, provide more control to the data subjects, but also they reduce uploaders' uncertainty around what is considered appropriate for sharing. We learned that threatening legal consequences is the most desirable dissuasive mechanism, and that respondents prefer the mechanisms that threaten users with immediate consequences (compared with delayed consequences). Dissuasive mechanisms are in fact well received by frequent sharers and older users, while precautionary mechanisms are preferred by women and younger users. We discuss the implications for design, including considerations about side leakages, consent collection, and censorship.<\/jats:p>","DOI":"10.1145\/3449127","type":"journal-article","created":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T17:47:59Z","timestamp":1619113679000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["When Forcing Collaboration is the Most Sensible Choice"],"prefix":"10.1145","volume":"5","author":[{"given":"Mauro","family":"Cherubini","sequence":"first","affiliation":[{"name":"University of Lausanne, Lausanne, Switzerland"}]},{"given":"Kavous","family":"Salehzadeh Niksirat","sequence":"additional","affiliation":[{"name":"University of Lausanne, Lausanne, Switzerland"}]},{"given":"Marc-Olivier","family":"Boldi","sequence":"additional","affiliation":[{"name":"University of Lausanne, Lausanne, Switzerland"}]},{"given":"Henri","family":"Keopraseuth","sequence":"additional","affiliation":[{"name":"University of Lausanne, Lausanne, Switzerland"}]},{"given":"Jose M.","family":"Such","sequence":"additional","affiliation":[{"name":"King's College London, London, United Kingdom"}]},{"given":"K\u00e9vin","family":"Huguenin","sequence":"additional","affiliation":[{"name":"University of Lausanne, Lausanne, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2021,4,22]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0005-7894(05)80279-5"},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa1465"},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8090-5_13"},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"key":"e_1_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906412"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020"},{"volume-title":"The environment and social behavior: privacy, personal space, territory, crowding. Brooks\/Cole Pub","key":"e_1_2_2_7_1","unstructured":"Irwin. Altman. 1975. The environment and social behavior: privacy, personal space, territory, crowding. Brooks\/Cole Pub. Co., Monterey, California, USA. https:\/\/eric.ed.gov\/?id=ED131515"},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00006"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2018.1448492"},{"key":"e_1_2_2_10_1","volume-title":"Reducing Default and Framing Effects in Privacy Decision-Making. In SIGHCI 2018 Proc. Assoc. for Info. Sys. (AIS)","author":"Anaraky Reza","year":"2018","unstructured":"Reza Anaraky, Tahereh Nabizadeh, Bart Knijnenburg, and Marten Risius. 2018. Reducing Default and Framing Effects in Privacy Decision-Making. In SIGHCI 2018 Proc. Assoc. for Info. Sys. (AIS), Atlanta, GA, USA, 7. https: \/\/aisel.aisnet.org\/sighci2018\/19"},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702322"},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-004-0097-7"},{"key":"e_1_2_2_13_1","first-page":"3447384","article-title":"Privacy Dependencies","volume":"95","author":"Barocas Solon","year":"2019","unstructured":"Solon Barocas and Karen Levy. 2019. Privacy Dependencies. Wash. Law Rev. 95, ID 3447384 (Sept. 2019), 62. https:\/\/papers.ssrn.com\/abstract=3447384","journal-title":"Wash. Law Rev."},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v067.i01"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/14789949.2011.617535"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2014.6815277"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753560"},{"key":"e_1_2_2_18_1","unstructured":"Rachel Botsman. 2017. Big data meets Big Brother as China moves to rate its citizens. https:\/\/www.wired.co.uk\/ article\/chinese-government-social-credit-score-privacy-invasion"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501610"},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280691"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300733"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2011.247109"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819996"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2015.0602"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.29297\/orbit.v1i2.38"},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892410"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.14763\/2020.4.1537"},{"key":"e_1_2_2_29_1","unstructured":"Istituto Poligrafico e Zecca dello Stato S.p.A. 2019. Gazzetta Ufficiale. https:\/\/www.gazzettaufficiale.it\/eli\/id\/2019\/07\/ 25\/19G00076\/sg"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.2811\/981927"},{"key":"e_1_2_2_31_1","unstructured":"Chai Feldblum and Victoria Lipnic. 2016. Select Task Force on the Study of Harassment in the Workplace (Full Report). https:\/\/www.eeoc.gov\/eeoc\/task_force\/harassment\/upload\/report.pdf"},{"key":"e_1_2_2_32_1","volume-title":"Computer and Internet Use in the United States. Number ACS-28 in American Community Surv. Reports","author":"File Thom","year":"2014","unstructured":"Thom File and Camille Ryan. 2013. Computer and Internet Use in the United States. Number ACS-28 in American Community Surv. Reports. US Census Bureau Washington, DC, Washington, DC, USA. https:\/\/www.census.gov\/ library\/publications\/2014\/acs\/acs-28.html"},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0061470"},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2010.5543255"},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2014.1001300"},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038920"},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.4180836"},{"key":"e_1_2_2_38_1","volume-title":"Proc. of the Int. Workshop on Agents and CyberSecu. (ACySe'15)","author":"Fogues Ricard L","year":"2015","unstructured":"Ricard L Fogues, Pradeep Murukanniah, Jose M Such, Agustin Espinosa, Ana Garcia-Fornes, and Munindar Singh. 2015. Argumentation for multi-party privacy management. In Proc. of the Int. Workshop on Agents and CyberSecu. (ACySe'15). ACM Press, Istanbul, Turkey, 3--6. https:\/\/eprints.lancs.ac.uk\/id\/eprint\/74191\/"},{"key":"e_1_2_2_39_1","volume-title":"American Convention on Human Rights. http:\/\/www.oas.org\/dil\/treaties_B-32_American_Convention_on_Human_Rights.htm Last accessed 2nd of","author":"Legal Affairs Secretariat","year":"1969","unstructured":"Secretariat for Legal Affairs. 1969. American Convention on Human Rights. http:\/\/www.oas.org\/dil\/treaties_B-32_American_Convention_on_Human_Rights.htm Last accessed 2nd of October 2020."},{"key":"e_1_2_2_40_1","volume-title":"Facebook apologises for censoring prehistoric Venus statue. https:\/\/phys.org\/news\/2018- 03-facebook-apologises-censoring-prehistoric-venus.html Last accessed 6th of","author":"France-Presse Agence","year":"2020","unstructured":"Agence France-Presse. 2018. Facebook apologises for censoring prehistoric Venus statue. https:\/\/phys.org\/news\/2018- 03-facebook-apologises-censoring-prehistoric-venus.html Last accessed 6th of October 2020."},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781315143897-5"},{"key":"e_1_2_2_42_1","first-page":"515","article-title":"Crime, punishment, and deterrence","volume":"48","author":"Gibbs Jack P","year":"1968","unstructured":"Jack P Gibbs. 1968. Crime, punishment, and deterrence. The Southwestern Social Science Quarterly 48, 4 (1968), 515--530. http:\/\/www.jstor.org\/stable\/42867909","journal-title":"The Southwestern Social Science Quarterly"},{"key":"e_1_2_2_43_1","volume-title":"The American class structure in an age of growing inequality","author":"Gilbert Dennis L.","unstructured":"Dennis L. Gilbert. 2008. The American class structure in an age of growing inequality (7th ed ed.). Pine Forge Press, Los Angeles, CA, USA. https:\/\/www.goodreads.com\/book\/show\/4107424-the-american-class-structure-in-an-age-of-growing-inequality","edition":"7"},{"volume-title":"Protect Your Image Rights. https:\/\/www.gouvernement.fr\/guide-victimes\/en-proteger-son-droit-a-l-image Last accessed 2nd of","year":"2020","key":"e_1_2_2_44_1","unstructured":"Gouvernement.fr. 2019. Protect Your Image Rights. https:\/\/www.gouvernement.fr\/guide-victimes\/en-proteger-son-droit-a-l-image Last accessed 2nd of October 2020."},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.2307\/2653776"},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/HCI2010.18"},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00097"},{"key":"e_1_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173621"},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300597"},{"key":"e_1_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0213453"},{"key":"e_1_2_2_52_1","first-page":"14","article-title":"Cyber Stalking and Cyber Harassment Legislation in the United States","volume":"7","author":"Hazelwood Steven D","year":"2013","unstructured":"Steven D Hazelwood and Sarah Koon-Magnin. 2013. Cyber Stalking and Cyber Harassment Legislation in the United States: A Qualitative Analysis. Int. Jour. of Cyber Criminology 7, 2 (2013), 14. https:\/\/www.cybercrimejournal.com\/ hazelwoodkoonmagninijcc2013vol7issue2.pdf","journal-title":"A Qualitative Analysis. Int. Jour. of Cyber Criminology"},{"key":"e_1_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462113"},{"key":"e_1_2_2_54_1","volume-title":"Why Social Platforms Are Taking Some Responsibility for Content. https:\/\/www.cigionline.org\/ articles\/why-social-platforms-are-taking-some-responsibility-content Last accessed 12th of","author":"Hirsh Jesse","year":"2020","unstructured":"Jesse Hirsh. 2019. Why Social Platforms Are Taking Some Responsibility for Content. https:\/\/www.cigionline.org\/ articles\/why-social-platforms-are-taking-some-responsibility-content Last accessed 12th of October 2020."},{"key":"e_1_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3380960"},{"key":"e_1_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22348-8_5"},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076747"},{"key":"e_1_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM"},{"key":"e_1_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.97"},{"key":"e_1_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360498"},{"key":"e_1_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029834"},{"key":"e_1_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813603"},{"key":"e_1_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281444"},{"key":"e_1_2_2_64_1","volume-title":"Handbook of Usability Testing: How to Plan, Design, and Conduct Effective Tests","author":"Rubin Jeffrey","unstructured":"Jeffrey Rubin and Dana Chisnell. 2011. Handbook of Usability Testing: How to Plan, Design, and Conduct Effective Tests, 2nd Edition | Wiley (2nd edition ed.). Wiley, Hoboken, NJ, USA. https:\/\/books.google.ch\/books\/about\/Handbook_of_ Usability_Testing.html?id=l_e1MmVzMb0C&redir_esc=y","edition":"2"},{"key":"e_1_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1091721"},{"key":"e_1_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054"},{"key":"e_1_2_2_67_1","doi-asserted-by":"crossref","unstructured":"Evans Jonathan and Frankish Keith. 2009. In Two Minds: Dual Processes and Beyond - Open Research Online. Oxford University Press London UK. 382 pages. http:\/\/oro.open.ac.uk\/22096\/","DOI":"10.1093\/acprof:oso\/9780199230167.001.0001"},{"key":"e_1_2_2_68_1","doi-asserted-by":"publisher","unstructured":"Daniel Kahneman. 2011. Thinking fast and slow (Kindle Edition). https:\/\/doi.org\/10.1037\/h0099210","DOI":"10.1037\/h0099210"},{"key":"e_1_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158373"},{"key":"e_1_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970030.2970035"},{"key":"e_1_2_2_71_1","volume-title":"Digital 2020: Global Digital Overview. https:\/\/datareportal.com\/reports\/digital-2020-global-digital-overview Last accessed 13th of","author":"Kemp Simon","year":"2020","unstructured":"Simon Kemp. 2020. Digital 2020: Global Digital Overview. https:\/\/datareportal.com\/reports\/digital-2020-global-digital-overview Last accessed 13th of November 2020."},{"key":"e_1_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3003434"},{"key":"e_1_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444819826402"},{"key":"e_1_2_2_74_1","unstructured":"Bert P. Krages. 2003. The Photographer's Right. http:\/\/www.krages.com\/phoright.htm Last accessed 2nd of October 2020."},{"key":"e_1_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.90.3.412"},{"key":"e_1_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.7146\/aahcc.v1i1.21300"},{"key":"e_1_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979420"},{"key":"e_1_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376498"},{"key":"e_1_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134702"},{"key":"e_1_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2014.107"},{"key":"e_1_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300361"},{"key":"e_1_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12119-020-09738-0"},{"key":"e_1_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376666"},{"key":"e_1_2_2_84_1","first-page":"289","article-title":"The Criminalization of Revenge Porn in Japan","volume":"24","author":"Matsui Shigenori","year":"2015","unstructured":"Shigenori Matsui. 2015. The Criminalization of Revenge Porn in Japan. Wash. Int. Law Jour. 24, 2 (2015), 289--318. https:\/\/heinonline.org\/HOL\/P?h=hein.journals\/pacrimlp24&i=305","journal-title":"Wash. Int. Law Jour."},{"volume-title":"Bright Side Of Shame: transforming and growing through practical","author":"Mayer Claude-H\u00e9l\u00e8ne","key":"e_1_2_2_85_1","unstructured":"Claude-H\u00e9l\u00e8ne Mayer and Elisabeth Vanderheiden. 2019. Bright Side Of Shame: transforming and growing through practical. Springer, Cham, Switzerland. http:\/\/link.springer.com\/10.1007\/978-3-030-13409-9"},{"key":"e_1_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8721.00151"},{"key":"e_1_2_2_87_1","volume-title":"Punishment: A comparative historical perspective","author":"Miethe Terance D","year":"2005","unstructured":"Terance D Miethe, Hong Lu, et al. 2005. Punishment: A comparative historical perspective. Cambridge University Press, Cambridge, UK. https:\/\/books.google.ch\/books\/about\/Punishment.html?id=o2ovr4ZzIXsC&redir_esc=y"},{"key":"e_1_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240682"},{"key":"e_1_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741124"},{"key":"e_1_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.83"},{"key":"e_1_2_2_91_1","first-page":"1","article-title":"Cyber-Aggression, Cyberbullying, and Cyber-Grooming: A Survey and Research Challenges","volume":"54","author":"Miljana","year":"2021","unstructured":"Miljana Mladenovi?, Vera O?mjanski, and Sta?a Vuji?i? Stankovi?. 2021. Cyber-Aggression, Cyberbullying, and Cyber-Grooming: A Survey and Research Challenges. ACM Comp. Surv. 54, 1 (Jan. 2021), 1--42. https:\/\/doi.org\/10. 1145\/3424246","journal-title":"ACM Comp. Surv."},{"key":"e_1_2_2_92_1","volume-title":"20th Int. Conf. on Autonomous Agents and Multiagent Sys. (AAMAS'21)","author":"Mosca Francesca","year":"2021","unstructured":"Francesca Mosca and Jose M Such. 2021. ELVIRA: an Explainable Agent for Value and Utility-driven Multiuser Privacy. In 20th Int. Conf. on Autonomous Agents and Multiagent Sys. (AAMAS'21). Int. Foundation for Autonomous Agents and Multiagent Sys., London, UK (virtual), In press."},{"key":"e_1_2_2_93_1","volume-title":"Proc. of the AAAI Spring Symp. on Priv.-Enhancing Artificial Intelligence and Language Tech. (PAL'19)","author":"Mosca Francesca","year":"2019","unstructured":"Francesca Mosca, Jose M Such, and Peter Mcburney. 2019. Value-driven Collaborative Privacy Decision Making. In Proc. of the AAAI Spring Symp. on Priv.-Enhancing Artificial Intelligence and Language Tech. (PAL'19). CEUR Workshop Proc., Stanford, California, USA, 13--20. http:\/\/ceur-ws.org\/Vol-2335\/1st_PAL_paper_4.pdf"},{"key":"e_1_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.5555\/3398761"},{"key":"e_1_2_2_95_1","doi-asserted-by":"publisher","DOI":"10.1086\/449268"},{"volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"Nissenbaum Helen","key":"e_1_2_2_96_1","unstructured":"Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press, Stanford, CA, USA. https:\/\/www.sup.org\/books\/title\/?id=8862"},{"key":"e_1_2_2_97_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006"},{"key":"e_1_2_2_98_1","volume-title":"California Consumer Privacy Act (CCPA). https:\/\/oag.ca.gov\/privacy\/ ccpa Last accessed 2nd of","author":"State of California Department of Justice. 2018.","year":"2020","unstructured":"State of California Department of Justice. 2018. California Consumer Privacy Act (CCPA). https:\/\/oag.ca.gov\/privacy\/ ccpa Last accessed 2nd of October 2020."},{"key":"e_1_2_2_99_1","volume-title":"Convention for the Protection of Human Rights and Fundamental Freedoms. https:\/\/www.coe.int\/en\/web\/conventions\/full-list\/-\/conventions\/rms\/0900001680063765 Last accessed 2nd of","author":"Council of Europe Portal.","year":"1950","unstructured":"Council of Europe Portal. 1950. Convention for the Protection of Human Rights and Fundamental Freedoms. https:\/\/www.coe.int\/en\/web\/conventions\/full-list\/-\/conventions\/rms\/0900001680063765 Last accessed 2nd of October 2020."},{"key":"e_1_2_2_100_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1523698113"},{"key":"e_1_2_2_101_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23002"},{"key":"e_1_2_2_102_1","doi-asserted-by":"publisher","DOI":"10.1016\/j"},{"key":"e_1_2_2_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_2_2_104_1","doi-asserted-by":"publisher","DOI":"10.2307\/3054128"},{"key":"e_1_2_2_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702165"},{"key":"e_1_2_2_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557121"},{"key":"e_1_2_2_107_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1756--2589.2010.00052.x"},{"key":"e_1_2_2_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858381"},{"key":"e_1_2_2_109_1","doi-asserted-by":"publisher","DOI":"10.1007\/b98882"},{"volume-title":"Protecting Canadians from Online Crime Act. https: \/\/laws-lois.justice.gc.ca\/eng\/annualstatutes\/2014_31\/page-1.html Last accessed 2nd of","year":"2020","key":"e_1_2_2_110_1","unstructured":"Canada.ca Portal. 2019. Consolidated federal laws of canada, Protecting Canadians from Online Crime Act. https: \/\/laws-lois.justice.gc.ca\/eng\/annualstatutes\/2014_31\/page-1.html Last accessed 2nd of October 2020."},{"key":"e_1_2_2_111_1","volume-title":"https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj Last accessed 2nd of","author":"Portal Lex","year":"2020","unstructured":"EUR-Lex Portal. 2016. REGULATION (EU) 2016\/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL. https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj Last accessed 2nd of October 2020."},{"key":"e_1_2_2_112_1","volume-title":"Universal Declaration of Human Rights. https:\/\/www.un.org\/en\/universal-declaration-human-rights\/ Last accessed 2nd of","author":"United Nations Portal. 1948.","year":"2020","unstructured":"United Nations Portal. 1948. Universal Declaration of Human Rights. https:\/\/www.un.org\/en\/universal-declaration-human-rights\/ Last accessed 2nd of October 2020."},{"key":"e_1_2_2_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753846.1754142"},{"key":"e_1_2_2_114_1","first-page":"3","article-title":"Privacy. Cali","volume":"48","author":"Prosser William L","year":"1960","unstructured":"William L Prosser. 1960. Privacy. Cali. Law Rev. 48, 3 (Aug. 1960), 383--423. https:\/\/web.archive.org\/web\/ 20131019050717\/http:\/\/www.californialawreview.org\/assets\/pdfs\/misc\/prosser_privacy.pdf","journal-title":"Law Rev."},{"key":"e_1_2_2_115_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68711-7_7"},{"key":"e_1_2_2_116_1","volume-title":"Proc. of the Symp. on Usable Priv. and Secu. (SOUPS'18)","author":"Rashidi Yasmeen","year":"2018","unstructured":"Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, and Norman Makoto Su. 2018. \"You Don't Want to Be the next Meme\": College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography. In Proc. of the Symp. on Usable Priv. and Secu. (SOUPS'18). USENIX Assoc., USA, 143--157. https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/rashidi"},{"key":"e_1_2_2_117_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392827"},{"key":"e_1_2_2_118_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07620-1_38"},{"key":"e_1_2_2_119_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00014"},{"key":"e_1_2_2_120_1","doi-asserted-by":"publisher","DOI":"10.1080\/08870440108405863"},{"key":"e_1_2_2_121_1","doi-asserted-by":"publisher","DOI":"10.1002\/ijop.12042"},{"key":"e_1_2_2_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPA.2012.6310454"},{"key":"e_1_2_2_123_1","volume-title":"Facebook denies 'censoring' 19th-century vagina painting. https: \/\/phys.org\/news\/2018-02-facebook-denies-censoring-19th-century-vagina.html Last accessed 6th of","author":"Schmid Joseph","year":"2020","unstructured":"Joseph Schmid and Sofia Bouderbala. 2018. Facebook denies 'censoring' 19th-century vagina painting. https: \/\/phys.org\/news\/2018-02-facebook-denies-censoring-19th-century-vagina.html Last accessed 6th of October 2020."},{"key":"e_1_2_2_124_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal"},{"key":"e_1_2_2_125_1","volume-title":"When Women Don't Want to Talk. https:\/\/www.thecut.com\/2019\/10\/when-women-dont-want-to-talk-about-assault-and-harassment.html Last accessed 25th of","author":"Schonbek Amelia","year":"2020","unstructured":"Amelia Schonbek. 2019. When Women Don't Want to Talk. https:\/\/www.thecut.com\/2019\/10\/when-women-dont-want-to-talk-about-assault-and-harassment.html Last accessed 25th of May 2020."},{"key":"e_1_2_2_126_1","doi-asserted-by":"publisher","DOI":"10.1080\/21670811"},{"key":"e_1_2_2_127_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.2010.01381.x"},{"key":"e_1_2_2_128_1","doi-asserted-by":"publisher","DOI":"10.1080\/10410236.2011.552480"},{"key":"e_1_2_2_129_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983644"},{"key":"e_1_2_2_130_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526780"},{"key":"e_1_2_2_131_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-010-0193-7"},{"key":"e_1_2_2_132_1","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso"},{"key":"e_1_2_2_133_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327957pspr0803_1"},{"key":"e_1_2_2_134_1","doi-asserted-by":"publisher","DOI":"10.1080\/08900523.2014.917976"},{"key":"e_1_2_2_135_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665964"},{"key":"e_1_2_2_136_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2539165"},{"key":"e_1_2_2_137_1","doi-asserted-by":"publisher","DOI":"10.1145\/3208039"},{"key":"e_1_2_2_138_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025668"},{"key":"e_1_2_2_139_1","doi-asserted-by":"publisher","DOI":"10.1145\/2821512"},{"key":"e_1_2_2_140_1","volume-title":"Sunstein","author":"Thaler Richard H.","year":"2008","unstructured":"Richard H. Thaler and Cass R. Sunstein. 2008. Nudge: improving decisions about health, wealth, and happiness. Yale University Press, New Haven, CT, USA. https:\/\/en.wikipedia.org\/wiki\/Nudge_(book)"},{"key":"e_1_2_2_141_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_14"},{"key":"e_1_2_2_142_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142405.1142410"},{"key":"e_1_2_2_143_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543164"},{"key":"e_1_2_2_144_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025896"},{"key":"e_1_2_2_145_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3078875"},{"key":"e_1_2_2_146_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2017.06.010"},{"key":"e_1_2_2_147_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557413"},{"key":"e_1_2_2_148_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488038"},{"key":"e_1_2_2_149_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078841"},{"key":"e_1_2_2_150_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2010.13"},{"key":"e_1_2_2_151_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.03810"},{"key":"e_1_2_2_152_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207761"},{"key":"e_1_2_2_153_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23299"},{"key":"e_1_2_2_154_1","doi-asserted-by":"publisher","DOI":"10.1177\/109019810002700506"},{"key":"e_1_2_2_155_1","doi-asserted-by":"publisher","DOI":"10.1145\/2894216.2894220"},{"key":"e_1_2_2_156_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3269329"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3449127","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3449127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:46Z","timestamp":1750191466000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3449127"}},"subtitle":["Desirability of Precautionary and Dissuasive Mechanisms to Manage Multiparty Privacy Conflicts"],"short-title":[],"issued":{"date-parts":[[2021,4,13]]},"references-count":156,"journal-issue":{"issue":"CSCW1","published-print":{"date-parts":[[2021,4,13]]}},"alternative-id":["10.1145\/3449127"],"URL":"https:\/\/doi.org\/10.1145\/3449127","relation":{},"ISSN":["2573-0142"],"issn-type":[{"type":"electronic","value":"2573-0142"}],"subject":[],"published":{"date-parts":[[2021,4,13]]},"assertion":[{"value":"2021-04-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}