{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:28:43Z","timestamp":1776104923834,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T00:00:00Z","timestamp":1667865600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,8]]},"DOI":"10.1145\/3500868.3561201","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T23:18:17Z","timestamp":1667863097000},"page":"205-208","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Consent: A Research and Design Lens for Human-Computer Interaction"],"prefix":"10.1145","author":[{"given":"Douglas","family":"Zytko","sequence":"first","affiliation":[{"name":"Oakland University, United States"}]},{"given":"Jane","family":"Im","sequence":"additional","affiliation":[{"name":"School of Information &amp; Division of Computer Science and Engineering, University of Michigan, United States"}]},{"given":"Jonathan","family":"Zong","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, United States"}]}],"member":"320","published-online":{"date-parts":[[2022,11,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753521"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445378"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/0162243916656059"},{"key":"e_1_3_2_1_4_1","unstructured":"Tracey Breeden. 2022. How Consent Creates Healthy Communication & Relationships. https:\/\/mtch.com\/single-trust-and-safety\/45  Tracey Breeden. 2022. How Consent Creates Healthy Communication & Relationships. https:\/\/mtch.com\/single-trust-and-safety\/45"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485252"},{"key":"e_1_3_2_1_6_1","volume-title":"Sexting panic: Rethinking criminalization, privacy, and consent","author":"Hasinoff Amy\u00a0Adele","unstructured":"Amy\u00a0Adele Hasinoff . 2015. Sexting panic: Rethinking criminalization, privacy, and consent . University of Illinois Press. Amy\u00a0Adele Hasinoff. 2015. Sexting panic: Rethinking criminalization, privacy, and consent. University of Illinois Press."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445778"},{"key":"e_1_3_2_1_8_1","unstructured":"Haksoo Ko John Leitner Eunsoo Kim and Jonggu Jeong. 2017. Structure and enforcement of data privacy law in South Korea. International Data Privacy Law(2017).  Haksoo Ko John Leitner Eunsoo Kim and Jonggu Jeong. 2017. Structure and enforcement of data privacy law in South Korea. International Data Privacy Law(2017)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Tahu Kukutai and John Taylor (Eds.). 2016. Indigenous Data Sovereignty: Toward an agenda. Vol.\u00a038. ANU Press.  Tahu Kukutai and John Taylor (Eds.). 2016. Indigenous Data Sovereignty: Toward an agenda. Vol.\u00a038. ANU Press.","DOI":"10.22459\/CAEPR38.11.2016"},{"key":"e_1_3_2_1_10_1","unstructured":"Una Lee and Dann Toliver. 2017. Building Consentful Tech. (2017). http:\/\/www.consentfultech.io\/wp-content\/uploads\/2019\/10\/Building-Consentful-Tech.pdf  Una Lee and Dann Toliver. 2017. Building Consentful Tech. (2017). http:\/\/www.consentfultech.io\/wp-content\/uploads\/2019\/10\/Building-Consentful-Tech.pdf"},{"key":"e_1_3_2_1_11_1","unstructured":"Juniper Lovato Antoine Allard Randall Harp and Laurent H\u00e9bert-Dufresne. 2020. Limits of individual consent and models of distributed consent in online social networks. arXiv preprint arXiv:2006.16140(2020).  Juniper Lovato Antoine Allard Randall Harp and Laurent H\u00e9bert-Dufresne. 2020. Limits of individual consent and models of distributed consent in online social networks. arXiv preprint arXiv:2006.16140(2020)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445610"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376827"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1486870"},{"key":"e_1_3_2_1_15_1","unstructured":"Planned Parenthood. 2016. Understanding Consent is as Easy as FRIES. Planned Parenthood Tumblr. http:\/\/plannedparenthood. tumblr. com\/post\/148506806862\/understanding-consent-is-as-easy-as-fries-consent(2016).  Planned Parenthood. 2016. Understanding Consent is as Easy as FRIES. Planned Parenthood Tumblr. http:\/\/plannedparenthood. tumblr. com\/post\/148506806862\/understanding-consent-is-as-easy-as-fries-consent(2016)."},{"key":"e_1_3_2_1_16_1","unstructured":"Tawana Petty Mariella Saba Tamika Lewis Seeta\u00a0Pe\u00f1a Gangadharan and Virginia Eubanks. 2018. Our data bodies: Reclaiming our data. June 15(2018) 37.  Tawana Petty Mariella Saba Tamika Lewis Seeta\u00a0Pe\u00f1a Gangadharan and Virginia Eubanks. 2018. Our data bodies: Reclaiming our data. June 15(2018) 37."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.75"},{"key":"e_1_3_2_1_18_1","first-page":"1880","article-title":"Privacy self-management and the consent dilemma","volume":"126","author":"Solove J","year":"2013","unstructured":"Daniel\u00a0 J Solove . 2013 . Privacy self-management and the consent dilemma . Harvard Law Review 126 (2013), 1880 . Daniel\u00a0J Solove. 2013. Privacy self-management and the consent dilemma. Harvard Law Review 126(2013), 1880.","journal-title":"Harvard Law Review"},{"key":"e_1_3_2_1_19_1","first-page":"2232","article-title":"Commonsense consent","volume":"129","author":"Sommers Roseanna","year":"2019","unstructured":"Roseanna Sommers . 2019 . Commonsense consent . Yale LJ 129 (2019), 2232 . Roseanna Sommers. 2019. Commonsense consent. Yale LJ 129(2019), 2232.","journal-title":"Yale LJ"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445107"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445154"},{"key":"e_1_3_2_1_22_1","volume-title":"confidentiality, and the threat to public health surveillanceCommentary: Don\u2019t waive consent lightly\u2014involve the public. BMJ 324, 7347","author":"Verity Chris","year":"2002","unstructured":"Chris Verity , Donal Manning , and Angus Nicoll . 2002. Consent , confidentiality, and the threat to public health surveillanceCommentary: Don\u2019t waive consent lightly\u2014involve the public. BMJ 324, 7347 ( 2002 ), 1210\u20131213. Chris Verity, Donal Manning, and Angus Nicoll. 2002. Consent, confidentiality, and the threat to public health surveillanceCommentary: Don\u2019t waive consent lightly\u2014involve the public. BMJ 324, 7347 (2002), 1210\u20131213."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433140"},{"key":"e_1_3_2_1_24_1","volume-title":"Bartleby: Procedural and Substantive Ethics in the Design of Research Ethics Systems. Social Media+ Society 8, 1","author":"Zong Jonathan","year":"2022","unstructured":"Jonathan Zong and J\u00a0Nathan Matias . 2022 . Bartleby: Procedural and Substantive Ethics in the Design of Research Ethics Systems. Social Media+ Society 8, 1 (2022), 20563051221077021. Jonathan Zong and J\u00a0Nathan Matias. 2022. Bartleby: Procedural and Substantive Ethics in the Design of Research Ethics Systems. Social Media+ Society 8, 1 (2022), 20563051221077021."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449288"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3516506"}],"event":{"name":"CSCW '22: Computer Supported Cooperative Work and Social Computing","location":"Virtual Event Taiwan","acronym":"CSCW '22","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Companion Publication of the 2022 Conference on Computer Supported Cooperative Work and Social Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3500868.3561201","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3500868.3561201","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:40Z","timestamp":1750182580000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3500868.3561201"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,8]]},"references-count":26,"alternative-id":["10.1145\/3500868.3561201","10.1145\/3500868"],"URL":"https:\/\/doi.org\/10.1145\/3500868.3561201","relation":{},"subject":[],"published":{"date-parts":[[2022,11,8]]},"assertion":[{"value":"2022-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}