{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T22:19:36Z","timestamp":1774563576519,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":78,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T00:00:00Z","timestamp":1624233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["EP\/M02315X\/1, EP\/R045178\/1"],"award-info":[{"award-number":["EP\/M02315X\/1, EP\/R045178\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,21]]},"DOI":"10.1145\/3452918.3458797","type":"proceedings-article","created":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T21:29:18Z","timestamp":1624483758000},"page":"108-119","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Human Data Interaction in Data-Driven Media Experiences : An Exploration of Data Sensitive Responses to the Socio-Technical Challenges of Personal Data Leverage"],"prefix":"10.1145","author":[{"given":"Neelima","family":"Sailaja","sequence":"first","affiliation":[{"name":"Horizon Digital Economy Hub University of Nottingham, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rhianne","family":"Jones","sequence":"additional","affiliation":[{"name":"BBC, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Derek","family":"McAuley","sequence":"additional","affiliation":[{"name":"Horizon Digital Economy Research University of Nottingham, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2021,6,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The economics of personal data and the economics of privacy. Retrieved","author":"Acquisti A","year":"2020","unstructured":"A Acquisti . 2010. The economics of personal data and the economics of privacy. Retrieved August 6, 2020 from http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.1017.7187&rep=rep1&type=pdf A Acquisti. 2010. The economics of personal data and the economics of privacy. Retrieved August 6, 2020 from http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.1017.7187&rep=rep1&type=pdf"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Alessandro Acquisti and Jens Grossklags. 2004. Privacy attitudes and privacy behavior. Economics of Information Security: 165\u2013178.  Alessandro Acquisti and Jens Grossklags. 2004. Privacy attitudes and privacy behavior. Economics of Information Security: 165\u2013178.","DOI":"10.1007\/1-4020-8090-5_13"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2959054"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300233"},{"key":"e_1_3_2_1_5_1","volume-title":"Object-Based Media. Retrieved","author":"BBC.","year":"2018","unstructured":"BBC. Object-Based Media. Retrieved September 19, 2018 from https:\/\/www.bbc.co.uk\/rd\/object-based-media BBC. Object-Based Media. Retrieved September 19, 2018 from https:\/\/www.bbc.co.uk\/rd\/object-based-media"},{"key":"e_1_3_2_1_6_1","volume-title":"Human Data Interaction - BBC R&D. Retrieved","author":"BBC","year":"2020","unstructured":"BBC R&D. 2017. Human Data Interaction - BBC R&D. Retrieved August 6, 2020 from https:\/\/www.bbc.co.uk\/rd\/projects\/human-data-interaction BBC R&D. 2017. Human Data Interaction - BBC R&D. Retrieved August 6, 2020 from https:\/\/www.bbc.co.uk\/rd\/projects\/human-data-interaction"},{"key":"e_1_3_2_1_7_1","volume-title":"Transforming qualitative information: Thematic analysis and code development","author":"Boyatzis Richard E.","unstructured":"Richard E. Boyatzis . 1998. Transforming qualitative information: Thematic analysis and code development . Sage . Richard E. Boyatzis. 1998. Transforming qualitative information: Thematic analysis and code development. Sage."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"L Brandimarte A Acquisti and George Loewenstein. 2013. Misplaced confidences privacy and the control paradox. Social psychological and personality science 4.3 (2013): 340-347.  L Brandimarte A Acquisti and George Loewenstein. 2013. Misplaced confidences privacy and the control paradox. Social psychological and personality science 4.3 (2013): 340-347.","DOI":"10.1177\/1948550612455931"},{"key":"e_1_3_2_1_9_1","volume-title":"The Guardian. Retrieved","author":"Cadwalladr Carole","year":"2018","unstructured":"Carole Cadwalladr and Emma Graham-Harrison . 2018 . Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach . The Guardian. Retrieved August 28, 2018 from https:\/\/www.theguardian.com\/news\/2018\/mar\/17\/cambridge-analytica-facebook-influence-us-election Carole Cadwalladr and Emma Graham-Harrison. 2018. Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. The Guardian. Retrieved August 28, 2018 from https:\/\/www.theguardian.com\/news\/2018\/mar\/17\/cambridge-analytica-facebook-influence-us-election"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.84"},{"key":"e_1_3_2_1_11_1","unstructured":"Ann Cavoukian. 2009. Privacy by Design - The 7 foundational principles - Implementation and mapping of fair information practices. Information and Privacy Commissioner of Ontario Canada.  Ann Cavoukian. 2009. Privacy by Design - The 7 foundational principles - Implementation and mapping of fair information practices. Information and Privacy Commissioner of Ontario Canada."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Pablo Cesar and Konstantinos Chorianopoulos. 2009. The Evolution of TV Systems Content and Users Toward Interactivity. http:\/\/doi.org\/10.1561\/1100000008  Pablo Cesar and Konstantinos Chorianopoulos. 2009. The Evolution of TV Systems Content and Users Toward Interactivity. http:\/\/doi.org\/10.1561\/1100000008","DOI":"10.1561\/1100000008"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-005-5879-y"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3084289.3089912"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2881876"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20499-4_1"},{"key":"e_1_3_2_1_17_1","first-page":"273","article-title":"Necessary but not sufficient: Standardized mechanisms for privacy notice and choice","author":"Cranor Lorrie Faith","year":"2012","unstructured":"Lorrie Faith Cranor . 2012 . Necessary but not sufficient: Standardized mechanisms for privacy notice and choice . J. on Telecomm. & High Tech. L. 10: 273 . Lorrie Faith Cranor. 2012. Necessary but not sufficient: Standardized mechanisms for privacy notice and choice. J. on Telecomm. & High Tech. L. 10: 273.","journal-title":"J. on Telecomm. & High Tech."},{"key":"e_1_3_2_1_18_1","volume-title":"Wittgenstein and Kierkegaard: Religion, individuality, and philosophical method","author":"Creegan C.L.","unstructured":"C.L. Creegan . 1989. Wittgenstein and Kierkegaard: Religion, individuality, and philosophical method . London : Routledge . C.L. Creegan. 1989. Wittgenstein and Kierkegaard: Religion, individuality, and philosophical method. London: Routledge."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.1.104"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2442106.2442108"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/10196780601136997"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1049\/ibc.2016.0034"},{"key":"e_1_3_2_1_23_1","volume-title":"Retrieved","author":"Finlay L","year":"2002","unstructured":"L Finlay . 2002 . Negotiating the swamp: the opportunity and challenge of reflexivity in research practice. Qualitative research . Retrieved May 16, 2016 from http:\/\/qrj.sagepub.com\/content\/2\/2\/209.short L Finlay. 2002. Negotiating the swamp: the opportunity and challenge of reflexivity in research practice. Qualitative research. Retrieved May 16, 2016 from http:\/\/qrj.sagepub.com\/content\/2\/2\/209.short"},{"key":"e_1_3_2_1_24_1","volume-title":"Retrieved","author":"Forrester Ian","year":"2016","unstructured":"Ian Forrester . 2016 . Visual Perceptive Media gets people talking . Retrieved September 10, 2016 from http:\/\/www.bbc.co.uk\/rd\/blog\/2015-12-visual-perceptive-media-gets-people-talking Ian Forrester. 2016. Visual Perceptive Media gets people talking. Retrieved September 10, 2016 from http:\/\/www.bbc.co.uk\/rd\/blog\/2015-12-visual-perceptive-media-gets-people-talking"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.73.5.103"},{"key":"e_1_3_2_1_26_1","volume-title":"25 GDPR \u2013 Data protection by design and by default. Retrieved","author":"Article GDPR.","year":"2020","unstructured":"GDPR. 2018. Article . 25 GDPR \u2013 Data protection by design and by default. Retrieved August 6, 2020 from https:\/\/gdpr-info.eu\/art-25-gdpr\/ GDPR. 2018. Article. 25 GDPR \u2013 Data protection by design and by default. Retrieved August 6, 2020 from https:\/\/gdpr-info.eu\/art-25-gdpr\/"},{"key":"e_1_3_2_1_27_1","volume-title":"20 GDPR \u2013 Right to data portability | General Data Protection Regulation (GDPR). Retrieved","author":"Art GDPR.","year":"2020","unstructured":"GDPR. 2018. Art . 20 GDPR \u2013 Right to data portability | General Data Protection Regulation (GDPR). Retrieved August 6, 2020 from https:\/\/gdpr-info.eu\/art-20-gdpr\/ GDPR. 2018. Art. 20 GDPR \u2013 Right to data portability | General Data Protection Regulation (GDPR). Retrieved August 6, 2020 from https:\/\/gdpr-info.eu\/art-20-gdpr\/"},{"key":"e_1_3_2_1_28_1","volume-title":"Article 12 EU General Data Protection Regulation (EU-GDPR). Retrieved","author":"GDPR.","year":"2020","unstructured":"GDPR. 2018. Article 12 EU General Data Protection Regulation (EU-GDPR). Retrieved August 6, 2020 from https:\/\/www.privacy-regulation.eu\/en\/article-12-transparent-information-communication-and-modalities-for-the-exercise-of-the-rights-of-the-data-subject-GDPR.htm GDPR. 2018. Article 12 EU General Data Protection Regulation (EU-GDPR). Retrieved August 6, 2020 from https:\/\/www.privacy-regulation.eu\/en\/article-12-transparent-information-communication-and-modalities-for-the-exercise-of-the-rights-of-the-data-subject-GDPR.htm"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240720"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Adrian Gradinar Daniel Burnett Paul Coulton 2015. Perceptive Media \u2013 Adaptive Storytelling for Digital Broadcast. Human-Computer Interaction: 586\u2013589. http:\/\/doi.org\/10.1007\/978-3-319-22723-8_67  Adrian Gradinar Daniel Burnett Paul Coulton 2015. Perceptive Media \u2013 Adaptive Storytelling for Digital Broadcast. Human-Computer Interaction: 586\u2013589. http:\/\/doi.org\/10.1007\/978-3-319-22723-8_67","DOI":"10.1007\/978-3-319-22723-8_67"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/09548960109365165"},{"key":"e_1_3_2_1_32_1","first-page":"2010","article-title":"Government and IT-","author":"House of Commons Public Administration Select Committee.","year":"2011","unstructured":"House of Commons Public Administration Select Committee. 2011 . Government and IT- \"a recipe for rip-offs\": time for a new approach. Twelfth Report of Session 2010 - 2012 . Retrieved August 6, 2020 from http:\/\/www.publications.parliament.uk\/pa\/cm201012\/cmselect\/ cmpubadm\/715\/715i.pdf House of Commons Public Administration Select Committee. 2011. Government and IT-\"a recipe for rip-offs\": time for a new approach. Twelfth Report of Session 2010-12. Retrieved August 6, 2020 from http:\/\/www.publications.parliament.uk\/pa\/cm201012\/cmselect\/ cmpubadm\/715\/715i.pdf","journal-title":"Twelfth Report of Session"},{"key":"e_1_3_2_1_33_1","volume-title":"Retrieved","author":"Hui Kai-Lung","year":"2007","unstructured":"Kai-Lung Hui , Hock Hai Teo , and Sang-Yong Tom Lee . 2007 . The value of privacy assurance: an exploratory field experiment. Mis Quarterly: 19\u201333 . Retrieved July 23, 2019 from https:\/\/www.jstor.org\/stable\/25148779 Kai-Lung Hui, Hock Hai Teo, and Sang-Yong Tom Lee. 2007. The value of privacy assurance: an exploratory field experiment. Mis Quarterly: 19\u201333. Retrieved July 23, 2019 from https:\/\/www.jstor.org\/stable\/25148779"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/15265161.2013.768864"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Arjan Jeckmans Michael Beye Zekeriya Erkin Pieter Hartel Reginald Lagendijk and Qiang Tang. 2013. Privacy in Recommender Systems. Social media retrieval: 263\u2013281. Retrieved from http:\/\/www.csrquest.net\/uploadfiles\/1D.pdf  Arjan Jeckmans Michael Beye Zekeriya Erkin Pieter Hartel Reginald Lagendijk and Qiang Tang. 2013. Privacy in Recommender Systems. Social media retrieval: 263\u2013281. Retrieved from http:\/\/www.csrquest.net\/uploadfiles\/1D.pdf","DOI":"10.1007\/978-1-4471-4555-4_12"},{"key":"e_1_3_2_1_36_1","unstructured":"Carl Kalapesi. 2012. Rethinking Personal Data: Strengthening Trust.  Carl Kalapesi. 2012. Rethinking Personal Data: Strengthening Trust."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491159.2491161"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107458.1107491"},{"key":"e_1_3_2_1_39_1","volume-title":"DAX: Data-Driven Audience Experiences in Esports. ACM International Conference on Interactive Media Experiences, ACM, 94\u2013105","author":"Kokkinakis Athanasios Vasileios","year":"2020","unstructured":"Athanasios Vasileios Kokkinakis , Simon Demediuk , Isabelle N\u00f6lle , 2020 . DAX: Data-Driven Audience Experiences in Esports. ACM International Conference on Interactive Media Experiences, ACM, 94\u2013105 . http:\/\/doi.org\/10.1145\/3391614.3393659 Athanasios Vasileios Kokkinakis, Simon Demediuk, Isabelle N\u00f6lle, 2020. DAX: Data-Driven Audience Experiences in Esports. ACM International Conference on Interactive Media Experiences, ACM, 94\u2013105. http:\/\/doi.org\/10.1145\/3391614.3393659"},{"key":"e_1_3_2_1_40_1","volume-title":"Researching AI Legibility through Design. Retrieved","author":"Lindley Joseph","year":"2020","unstructured":"Joseph Lindley , Ali Akmal , Fraziska Pilling , and Paul Coulton . 2020. Researching AI Legibility through Design. Retrieved August 6, 2020 from https:\/\/eprints.lancs.ac.uk\/id\/eprint\/140343\/1\/Researching_AI_Legibillity_through_Design_pre_print.pdf Joseph Lindley, Ali Akmal, Fraziska Pilling, and Paul Coulton. 2020. Researching AI Legibility through Design. Retrieved August 6, 2020 from https:\/\/eprints.lancs.ac.uk\/id\/eprint\/140343\/1\/Researching_AI_Legibillity_through_Design_pre_print.pdf"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702142"},{"key":"e_1_3_2_1_42_1","first-page":"1","article-title":"The Cost of Reading Privacy Policies","volume":"4","author":"McDonald Aleecia","year":"2008","unstructured":"Aleecia McDonald and Lorrie Faith Cranor . 2008 . The Cost of Reading Privacy Policies . I\/S - A Journal of Law and Policy for the Information Society 4 , 3: 1 \u2013 22 . Aleecia McDonald and Lorrie Faith Cranor. 2008. The Cost of Reading Privacy Policies. I\/S - A Journal of Law and Policy for the Information Society 4, 3: 1\u201322.","journal-title":"I\/S - A Journal of Law and Policy for the Information Society"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0098790"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Richard Mortier Hamed Haddadi Tristan Henderson Derek Mcauley and Jon Crowcroft. 2014. Human-Data Interaction: The Human Face of the Data-Driven Society.  Richard Mortier Hamed Haddadi Tristan Henderson Derek Mcauley and Jon Crowcroft. 2014. Human-Data Interaction: The Human Face of the Data-Driven Society.","DOI":"10.2139\/ssrn.2508051"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-019-01210-7"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"H Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev.: 101\u2013139. http:\/\/doi.org\/10.1109\/SP.2006.32  H Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev.: 101\u2013139. http:\/\/doi.org\/10.1109\/SP.2006.32","DOI":"10.1109\/SP.2006.32"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799629"},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, ACM, 5385\u20135396","author":"Pike Matthew","unstructured":"Matthew Pike , Richard Ramchurn , Steve Benford , and Max L. Wilson . 2016. # scanners: exploring the control of adaptive films using brain-computer interaction . Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, ACM, 5385\u20135396 . Matthew Pike, Richard Ramchurn, Steve Benford, and Max L. Wilson. 2016. # scanners: exploring the control of adaptive films using brain-computer interaction. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, ACM, 5385\u20135396."},{"key":"e_1_3_2_1_50_1","volume-title":"Layered Policy Design | TRUSTe. trustarc.com. Retrieved","author":"Pinnick Travis","year":"2019","unstructured":"Travis Pinnick . 2011. Layered Policy Design | TRUSTe. trustarc.com. Retrieved July 7, 2019 from http:\/\/www.truste.com\/blog\/2011\/05\/20\/layered-policy-and-short-notice-design\/ Travis Pinnick. 2011. Layered Policy Design | TRUSTe. trustarc.com. Retrieved July 7, 2019 from http:\/\/www.truste.com\/blog\/2011\/05\/20\/layered-policy-and-short-notice-design\/"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300378"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v34i1.2449"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2638728.2641679"},{"key":"e_1_3_2_1_54_1","unstructured":"Neelima Sailaja. 2020. Understanding the Challenges of Using Personal Data in Media Experiences.  Neelima Sailaja. 2020. Understanding the Challenges of Using Personal Data in Media Experiences."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317697.3323360"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210825.3210830"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025986"},{"key":"e_1_3_2_1_58_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS","author":"Schaub Florian","year":"2015","unstructured":"Florian Schaub , Rebecca Balebako , Adam L Durity , and Lorrie Faith Cranor . 2015 . A Design Space for Effective Privacy Notices . Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 1\u201317. Florian Schaub, Rebecca Balebako, Adam L Durity, and Lorrie Faith Cranor. 2015. A Design Space for Effective Privacy Notices. Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 1\u201317."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557421"},{"key":"e_1_3_2_1_60_1","volume-title":"BBC. Retrieved","author":"Shotton Matthew","year":"2014","unstructured":"Matthew Shotton , Frank Melchior , Michael Evans , Tony Churnside , Matthew Brooks , and Mike Armstrong . 2014 . Object-based broadcasting - curation, responsiveness and user experience . BBC. Retrieved January 21, 2019 from https:\/\/www.bbc.co.uk\/rd\/publications\/whitepaper285 Matthew Shotton, Frank Melchior, Michael Evans, Tony Churnside, Matthew Brooks, and Mike Armstrong. 2014. Object-based broadcasting - curation, responsiveness and user experience. BBC. Retrieved January 21, 2019 from https:\/\/www.bbc.co.uk\/rd\/publications\/whitepaper285"},{"key":"e_1_3_2_1_61_1","volume-title":"Retrieved","author":"Singel Ryan","year":"2010","unstructured":"Ryan Singel . 2010 . NETFLIX Cancels Recommendation Contest after Privacy Lawsuit . Retrieved September 19, 2018 from https:\/\/www.wired.com\/2010\/03\/netflix-cancels-contest\/ Ryan Singel. 2010. NETFLIX Cancels Recommendation Contest after Privacy Lawsuit. Retrieved September 19, 2018 from https:\/\/www.wired.com\/2010\/03\/netflix-cancels-contest\/"},{"key":"e_1_3_2_1_62_1","unstructured":"Solid. 2017. Solid. Retrieved from https:\/\/solid.mit.edu  Solid. 2017. Solid. Retrieved from https:\/\/solid.mit.edu"},{"key":"e_1_3_2_1_63_1","volume-title":"Newbury Park, CA: Sage.","author":"Strauss A.","year":"1990","unstructured":"A. Strauss and J. Corbin . 1990 . Basics of qualitative research: Grounded theory procedures and techniques. Newbury Park, CA: Sage. A. Strauss and J. Corbin. 1990. Basics of qualitative research: Grounded theory procedures and techniques. Newbury Park, CA: Sage."},{"key":"e_1_3_2_1_64_1","volume-title":"Understanding the impact of web personalization on user information processing and decision outcomes. MIS quarterly: 865\u2013890. Retrieved","author":"Tam Kar Yan","year":"2019","unstructured":"Kar Yan Tam and Shuk Ying Ho. 2006. Understanding the impact of web personalization on user information processing and decision outcomes. MIS quarterly: 865\u2013890. Retrieved July 5, 2019 from https:\/\/www.jstor.org\/stable\/25148757 Kar Yan Tam and Shuk Ying Ho. 2006. Understanding the impact of web personalization on user information processing and decision outcomes. MIS quarterly: 865\u2013890. Retrieved July 5, 2019 from https:\/\/www.jstor.org\/stable\/25148757"},{"key":"e_1_3_2_1_65_1","volume-title":"data.police.uk. Retrieved","author":"Government Home Office UK","year":"2020","unstructured":"Home Office UK Government . 2014. data.police.uk. Retrieved August 6, 2020 from https:\/\/data.police.uk Home Office UK Government. 2014. data.police.uk. Retrieved August 6, 2020 from https:\/\/data.police.uk"},{"key":"e_1_3_2_1_66_1","volume-title":"The Court of Justice declares the Data Retention Directive to be invalid","author":"European Union Court","year":"2020","unstructured":"Court of Justice of the European Union . 2014. The Court of Justice declares the Data Retention Directive to be invalid . Press Release No 54\/14. Retrieved August 6, 2020 from http:\/\/curia.europa.eu\/jcms\/upload\/docs\/application\/pdf\/2014-04\/cp140054en.pdf Court of Justice of the European Union. 2014. The Court of Justice declares the Data Retention Directive to be invalid. Press Release No 54\/14. Retrieved August 6, 2020 from http:\/\/curia.europa.eu\/jcms\/upload\/docs\/application\/pdf\/2014-04\/cp140054en.pdf"},{"key":"e_1_3_2_1_67_1","volume-title":"EU Charter of Fundamental Rights. Retrieved","author":"Union European","year":"2020","unstructured":"European Union . 2000. EU Charter of Fundamental Rights. Retrieved August 6, 2020 from https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:12012P\/TXT European Union. 2000. EU Charter of Fundamental Rights. Retrieved August 6, 2020 from https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:12012P\/TXT"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"crossref","unstructured":"Lachlan Urquhart. 2016. Towards User Centric Regulation: Exploring the Interface Between Information Technology Law and Human Computer Interaction.  Lachlan Urquhart. 2016. Towards User Centric Regulation: Exploring the Interface Between Information Technology Law and Human Computer Interaction.","DOI":"10.2139\/ssrn.2865842"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"crossref","unstructured":"Lachlan Urquhart Neelima Sailaja and Derek McAuley. 2017. Realising the Right to Data Portability for the Internet of Things. SSRN Electronic Journal. http:\/\/doi.org\/10.2139\/ssrn.2933448  Lachlan Urquhart Neelima Sailaja and Derek McAuley. 2017. Realising the Right to Data Portability for the Internet of Things. SSRN Electronic Journal. http:\/\/doi.org\/10.2139\/ssrn.2933448","DOI":"10.2139\/ssrn.2933448"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-008-0119-z"},{"key":"e_1_3_2_1_71_1","first-page":"25","article-title":"Interactive TV narratives: Opportunities, progress, and challenges","volume":"4","author":"Ursu Marian F.","year":"2008","unstructured":"Marian F. Ursu , Maureen Thomas , Ian Kegel , 2008 . Interactive TV narratives: Opportunities, progress, and challenges . ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 4 , 4: 25 . Retrieved January 21, 2019 from https:\/\/dl.acm.org\/citation.cfm?id=1412198 Marian F. Ursu, Maureen Thomas, Ian Kegel, 2008. Interactive TV narratives: Opportunities, progress, and challenges. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 4, 4: 25. Retrieved January 21, 2019 from https:\/\/dl.acm.org\/citation.cfm?id=1412198","journal-title":"ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM)"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3391614.3393654"},{"key":"e_1_3_2_1_73_1","volume-title":"The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. Retrieved","author":"C.","year":"2020","unstructured":"W3 C. 2002. The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. Retrieved August 6, 2020 from https:\/\/www.w3.org\/TR\/P3P\/ W3C. 2002. The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. Retrieved August 6, 2020 from https:\/\/www.w3.org\/TR\/P3P\/"},{"key":"e_1_3_2_1_74_1","volume-title":"A P3P Preference Exchange Language 1.0 (APPEL1.0). Retrieved","author":"C.","year":"2020","unstructured":"W3 C. 2002. A P3P Preference Exchange Language 1.0 (APPEL1.0). Retrieved August 6, 2020 from https:\/\/www.w3.org\/TR\/P3P-preferences\/ W3C. 2002. A P3P Preference Exchange Language 1.0 (APPEL1.0). Retrieved August 6, 2020 from https:\/\/www.w3.org\/TR\/P3P-preferences\/"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557413"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3282486"},{"key":"e_1_3_2_1_78_1","volume-title":"Feature Interactions in Policy-Driven Privacy Management. Retrieved","author":"Yee George","year":"2020","unstructured":"George Yee and Larry Korba . 2003. Feature Interactions in Policy-Driven Privacy Management. Retrieved August 6, 2020 from http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.90.7595&rep=rep1&type=pdf George Yee and Larry Korba. 2003. Feature Interactions in Policy-Driven Privacy Management. Retrieved August 6, 2020 from http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.90.7595&rep=rep1&type=pdf"},{"key":"e_1_3_2_1_79_1","volume-title":"The Negotiation of Privacy Policies in Distance Education. Retrieved","author":"Yee George","year":"2020","unstructured":"George Yee and Larry Korba . 2003. The Negotiation of Privacy Policies in Distance Education. Retrieved August 6, 2020 from http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.83.7768&rep=rep1&type=pdf George Yee and Larry Korba. 2003. The Negotiation of Privacy Policies in Distance Education. Retrieved August 6, 2020 from http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.83.7768&rep=rep1&type=pdf"}],"event":{"name":"IMX '21: ACM International Conference on Interactive Media Experiences","location":"Virtual Event USA","acronym":"IMX '21","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGMM ACM Special Interest Group on Multimedia","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["ACM International Conference on Interactive Media Experiences"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3452918.3458797","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3452918.3458797","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:06Z","timestamp":1750193226000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3452918.3458797"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,21]]},"references-count":78,"alternative-id":["10.1145\/3452918.3458797","10.1145\/3452918"],"URL":"https:\/\/doi.org\/10.1145\/3452918.3458797","relation":{},"subject":[],"published":{"date-parts":[[2021,6,21]]},"assertion":[{"value":"2021-06-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}