{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:28:15Z","timestamp":1776108495952,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,21]],"date-time":"2022-06-21T00:00:00Z","timestamp":1655769600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["EP\/T022493\/1"],"award-info":[{"award-number":["EP\/T022493\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,21]]},"DOI":"10.1145\/3505284.3529974","type":"proceedings-article","created":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T13:27:24Z","timestamp":1655904444000},"page":"141-150","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["An Exploration of Account Sharing Practices on Media Platforms"],"prefix":"10.1145","author":[{"given":"Neelima","family":"Sailaja","sequence":"first","affiliation":[{"name":"Horizon Digital Economy Hub, University of Nottingham, United Kingdom"}]},{"given":"Abigail","family":"Fowler","sequence":"additional","affiliation":[{"name":"Horizon Centre for Doctoral Training, University of Nottingham, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2022,6,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015)","author":"Alghamdi D","year":"2015","unstructured":"D Alghamdi , I Flechais , and Marina Jirotka . 2015 . Security practices for households bank customers in the Kingdom of Saudi Arabia . Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015) : 297\u2013308. Retrieved December 30, 2021 from https:\/\/www.usenix.org\/system\/files\/conference\/soups2015\/soups15-paper-alghamdi.pdf D Alghamdi, I Flechais, and Marina Jirotka. 2015. Security practices for households bank customers in the Kingdom of Saudi Arabia. Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015): 297\u2013308. Retrieved December 30, 2021 from https:\/\/www.usenix.org\/system\/files\/conference\/soups2015\/soups15-paper-alghamdi.pdf"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/meet.14504701402"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2448136.2448152"},{"key":"e_1_3_2_1_4_1","volume-title":"Transforming qualitative information: Thematic analysis and code development","author":"Boyatzis Richard E.","unstructured":"Richard E. Boyatzis . 1998. Transforming qualitative information: Thematic analysis and code development . Sage . Richard E. Boyatzis. 1998. Transforming qualitative information: Thematic analysis and code development. Sage."},{"key":"e_1_3_2_1_5_1","volume-title":"Retrieved","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke . 2006 . Using thematic analysis in psychology. Qualitative research in psychology . Retrieved September 18, 2017 from http:\/\/www.tandfonline.com\/doi\/abs\/10.1191\/1478088706qp063oa Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology. Retrieved September 18, 2017 from http:\/\/www.tandfonline.com\/doi\/abs\/10.1191\/1478088706qp063oa"},{"key":"e_1_3_2_1_6_1","volume-title":"UbiComp 2007: Ubiquitous Computing","author":"Bernheim Brush A. J.","unstructured":"A. J. Bernheim Brush and Kori M. Inkpen . Yours, Mine and Ours? Sharing and Use of Technology in Domestic Environments . In UbiComp 2007: Ubiquitous Computing . Springer Berlin Heidelberg , Berlin, Heidelberg , 109\u2013126. https:\/\/doi.org\/10.1007\/978-3-540-74853-3_7 10.1007\/978-3-540-74853-3_7 A. J. Bernheim Brush and Kori M. Inkpen. Yours, Mine and Ours? Sharing and Use of Technology in Domestic Environments. In UbiComp 2007: Ubiquitous Computing. Springer Berlin Heidelberg, Berlin, Heidelberg, 109\u2013126. https:\/\/doi.org\/10.1007\/978-3-540-74853-3_7"},{"key":"e_1_3_2_1_7_1","volume-title":"Retrieved","author":"Bryant K","year":"2006","unstructured":"K Bryant , J Campbell \u2013 Australasian Journal of Information , and undefined 2006 . User behaviours associated with password security and management. journal.acs.org.au . Retrieved December 30, 2021 from http:\/\/journal.acs.org.au\/index.php\/ajis\/article\/view\/9 K Bryant, J Campbell \u2013 Australasian Journal of Information, and undefined 2006. User behaviours associated with password security and management. journal.acs.org.au. Retrieved December 30, 2021 from http:\/\/journal.acs.org.au\/index.php\/ajis\/article\/view\/9"},{"key":"e_1_3_2_1_8_1","volume-title":"Retrieved","author":"Busse Britta","year":"2013","unstructured":"Britta Busse and Marek Fuchs . 2013 . Prevalence of cell phone sharing. Survey methods\u00a0: Insights from the field, 15 . Retrieved December 30, 2021 from https:\/\/www.ssoar.info\/ssoar\/handle\/document\/33369 Britta Busse and Marek Fuchs. 2013. Prevalence of cell phone sharing. Survey methods\u00a0: Insights from the field, 15. Retrieved December 30, 2021 from https:\/\/www.ssoar.info\/ssoar\/handle\/document\/33369"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the ACM 2008 conference on Computer supported cooperative work \u2013 CSCW \u201908","author":"Egelman Serge","unstructured":"Serge Egelman , A.J. Bernheim Brush , and Kori M. Inkpen . 2008. Family accounts . In Proceedings of the ACM 2008 conference on Computer supported cooperative work \u2013 CSCW \u201908 , 669. https:\/\/doi.org\/10.1145\/1460563.1460666 10.1145\/1460563.1460666 Serge Egelman, A.J. Bernheim Brush, and Kori M. Inkpen. 2008. Family accounts. In Proceedings of the ACM 2008 conference on Computer supported cooperative work \u2013 CSCW \u201908, 669. https:\/\/doi.org\/10.1145\/1460563.1460666"},{"key":"e_1_3_2_1_10_1","volume-title":"Strauss","author":"Barney G, Glaser","year":"1998","unstructured":"Barney G, Glaser and Anselm L . Strauss . 1998 . Grounded theory. Strategien qualitativer Forschung . Bern : Retrieved November 22, 2016 from http:\/\/www.ssnpstudents.com\/wp\/wp-content\/uploads\/2015\/02\/THE-DISCOVERY-OF-GROUNDED-THEORY-Glaser-Strauss.docx Barney G, Glaser and Anselm L. Strauss. 1998. Grounded theory. Strategien qualitativer Forschung. Bern: Retrieved November 22, 2016 from http:\/\/www.ssnpstudents.com\/wp\/wp-content\/uploads\/2015\/02\/THE-DISCOVERY-OF-GROUNDED-THEORY-Glaser-Strauss.docx"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cag.2003.12.003"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-4023-7_24"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432918"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2957276.2957296"},{"key":"e_1_3_2_1_15_1","volume-title":"The Adaptive Web","author":"Jameson Anthony","year":"2079","unstructured":"Anthony Jameson and Barry Smyth . Recommendation to Groups . In The Adaptive Web . Springer Berlin Heidelberg , Berlin, Heidelberg , 596\u2013627. https:\/\/doi.org\/10.1007\/978-3-540-7 2079 -9_20 10.1007\/978-3-540-72079-9_20 Anthony Jameson and Barry Smyth. Recommendation to Groups. In The Adaptive Web. Springer Berlin Heidelberg, Berlin, Heidelberg, 596\u2013627. https:\/\/doi.org\/10.1007\/978-3-540-72079-9_20"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139941"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3210054"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518953"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2619\u20132622","author":"Joseph","year":"1978","unstructured":"Joseph \u201c Jofish\u201d Kaye. 2011. Self-reported password sharing strategies . In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2619\u20132622 . https:\/\/doi.org\/10.1145\/ 1978 942.1979324 10.1145\/1978942.1979324 Joseph \u201cJofish\u201d Kaye. 2011. Self-reported password sharing strategies. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2619\u20132622. https:\/\/doi.org\/10.1145\/1978942.1979324"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531665"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work \u2013 CSCW \u201912","author":"Lee Charlotte P.","unstructured":"Charlotte P. Lee , Katie Derthick , Alexander Thayer , and Matthew J. Bietz . 2012. I love you, let's share calendars . In Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work \u2013 CSCW \u201912 , 749. https:\/\/doi.org\/10.1145\/2145204.2145317 10.1145\/2145204.2145317 Charlotte P. Lee, Katie Derthick, Alexander Thayer, and Matthew J. Bietz. 2012. I love you, let's share calendars. In Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work \u2013 CSCW \u201912, 749. https:\/\/doi.org\/10.1145\/2145204.2145317"},{"key":"e_1_3_2_1_22_1","volume-title":"Diary Study of Couples\u2019 Everyday Account Sharing. CSCW\u201920 Companion: Conference Companion Publication of the 2020 on Computer Supported Cooperative Work and Social Computing. Retrieved","author":"Lin Junchao","year":"2020","unstructured":"Junchao Lin , Irene Yu , Jason Hong , and Laura Dabbish . 2020 . \u201c Did You Just Purchase a Butt Head on Amazon?\u201d\u2013A Diary Study of Couples\u2019 Everyday Account Sharing. CSCW\u201920 Companion: Conference Companion Publication of the 2020 on Computer Supported Cooperative Work and Social Computing. Retrieved February 5, 2022 from https:\/\/par.nsf.gov\/biblio\/10285054 Junchao Lin, Irene Yu, Jason Hong, and Laura Dabbish. 2020. \u201cDid You Just Purchase a Butt Head on Amazon?\u201d\u2013A Diary Study of Couples\u2019 Everyday Account Sharing. CSCW\u201920 Companion: Conference Companion Publication of the 2020 on Computer Supported Cooperative Work and Social Computing. Retrieved February 5, 2022 from https:\/\/par.nsf.gov\/biblio\/10285054"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572540"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"James Lull. 1980. The social uses of television. Human communication research 6 3: 197\u2013209.  James Lull. 1980. The social uses of television. Human communication research 6 3: 197\u2013209.","DOI":"10.1111\/j.1468-2958.1980.tb00140.x"},{"key":"#cr-split#-e_1_3_2_1_25_1.1","doi-asserted-by":"crossref","unstructured":"Tara Matthews Kerwell Liao Anna Turner Marianne Berkovich Robert Reeder and Sunny Consolvo. 2016. &quot;She'll just grab any device that's closer&quot; In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems 5921-5932. https:\/\/doi.org\/10.1145\/2858036.2858051 10.1145\/2858036.2858051","DOI":"10.1145\/2858036.2858051"},{"key":"#cr-split#-e_1_3_2_1_25_1.2","doi-asserted-by":"crossref","unstructured":"Tara Matthews Kerwell Liao Anna Turner Marianne Berkovich Robert Reeder and Sunny Consolvo. 2016. &quot;She'll just grab any device that's closer&quot; In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems 5921-5932. https:\/\/doi.org\/10.1145\/2858036.2858051","DOI":"10.1145\/2858036.2858051"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753421"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-019-01210-7"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376632"},{"key":"e_1_3_2_1_30_1","volume-title":"Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018)","author":"Park Cheul Young","year":"2018","unstructured":"Cheul Young Park , Cori Faklaris , Siyan Zhao , and Alex Sciuto . 2018 . Share and share alike? An exploration of secure behaviors in romantic relationships . Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018) : 83\u2013102. Retrieved December 30, 2021 from https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/park Cheul Young Park, Cori Faklaris, Siyan Zhao, and Alex Sciuto. 2018. Share and share alike? An exploration of secure behaviors in romantic relationships. Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018): 83\u2013102. Retrieved December 30, 2021 from https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/park"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240759"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240759"},{"key":"e_1_3_2_1_33_1","volume-title":"Software engineering","unstructured":"Sommerville, Ian. 2011. Software engineering 9 th ed. Boston : Addison- Wesley . Sommerville, Ian. 2011. Software engineering 9th ed. Boston : Addison-Wesley.","edition":"9"},{"key":"e_1_3_2_1_34_1","volume-title":"The Economic Times. Retrieved","author":"Times The Economic","year":"2022","unstructured":"The Economic Times . 2022 . Netflix News: Netflix to end multiple account sharing. What it means for users who share password with others? \u2013 The Economic Times . The Economic Times. Retrieved April 10, 2022 from https:\/\/economictimes.indiatimes.com\/magazines\/panache\/netflix-to-end-multiple-account-sharing-what-it-means-for-users-who-share-password-with-others\/articleshow\/90288460.cms?from=mdr The Economic Times. 2022. Netflix News: Netflix to end multiple account sharing. What it means for users who share password with others? \u2013 The Economic Times. The Economic Times. Retrieved April 10, 2022 from https:\/\/economictimes.indiatimes.com\/magazines\/panache\/netflix-to-end-multiple-account-sharing-what-it-means-for-users-who-share-password-with-others\/articleshow\/90288460.cms?from=mdr"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376605"}],"event":{"name":"IMX '22: ACM International Conference on Interactive Media Experiences","location":"Aveiro JB Portugal","acronym":"IMX '22","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGMM ACM Special Interest Group on Multimedia","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["ACM International Conference on Interactive Media Experiences"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3505284.3529974","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3505284.3529974","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:24Z","timestamp":1750182564000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3505284.3529974"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,21]]},"references-count":36,"alternative-id":["10.1145\/3505284.3529974","10.1145\/3505284"],"URL":"https:\/\/doi.org\/10.1145\/3505284.3529974","relation":{},"subject":[],"published":{"date-parts":[[2022,6,21]]},"assertion":[{"value":"2022-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}