{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:57:26Z","timestamp":1776113846297,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":72,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544548.3580909","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T04:27:55Z","timestamp":1681964875000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Understanding and Mitigating Technology-Facilitated Privacy Violations in the Physical World"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9743-3819","authenticated-orcid":false,"given":"Maximiliane","family":"Windl","sequence":"first","affiliation":[{"name":"LMU Munich, Germany and Munich Center for Machine Learning (MCML), Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0752-3480","authenticated-orcid":false,"given":"Verena","family":"Winterhalter","sequence":"additional","affiliation":[{"name":"LMU Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3890-1990","authenticated-orcid":false,"given":"Albrecht","family":"Schmidt","sequence":"additional","affiliation":[{"name":"LMU Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5462-8782","authenticated-orcid":false,"given":"Sven","family":"Mayer","sequence":"additional","affiliation":[{"name":"LMU Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_3_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445122"},{"key":"e_1_3_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1705.06805"},{"key":"e_1_3_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0066"},{"key":"e_1_3_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546724"},{"key":"e_1_3_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00706ED1V01Y201602HCI034"},{"key":"e_1_3_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101647"},{"key":"e_1_3_3_3_7_1","unstructured":"Carnegie Mellon University. 2019. The Personalized Privacy Assistant Project. https:\/\/privacyassistant.org\/"},{"key":"e_1_3_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.84"},{"key":"e_1_3_3_3_9_1","first-page":"2009","article-title":"Privacy by design: The 7 foundational principles. Information and privacy commissioner of Ontario","volume":"5","author":"Cavoukian Ann","year":"2009","unstructured":"Ann Cavoukian. 2009. Privacy by design: The 7 foundational principles. Information and privacy commissioner of Ontario, Canada 5 (2009), 2009.","journal-title":"Canada"},{"key":"e_1_3_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897073.2897715"},{"key":"e_1_3_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383413"},{"key":"e_1_3_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376304"},{"key":"e_1_3_3_3_13_1","volume-title":"HCI in Business","author":"Chow Richard","unstructured":"Richard Chow, Serge Egelman, Raghudeep Kannavara, Hosub Lee, Suyash Misra, and Edward Wang. 2015. HCI in Business: A Collaboration with Academia in IoT Privacy. In HCI in Business. Springer International Publishing, Cham, 679\u2013687."},{"key":"e_1_3_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376389"},{"key":"e_1_3_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563967"},{"key":"e_1_3_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2019.0846"},{"key":"e_1_3_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025636"},{"key":"e_1_3_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00043"},{"key":"e_1_3_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445148"},{"key":"e_1_3_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517504"},{"key":"e_1_3_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167996.3167999"},{"key":"e_1_3_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0047"},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00019"},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445779"},{"key":"e_1_3_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501985"},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445258"},{"key":"e_1_3_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300597"},{"key":"e_1_3_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076747"},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214271"},{"key":"e_1_3_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970030.2970035"},{"key":"e_1_3_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158373"},{"key":"e_1_3_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_3_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451633"},{"key":"e_1_3_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"e_1_3_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444820924632"},{"key":"e_1_3_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428361.3428464"},{"key":"e_1_3_3_3_37_1","first-page":"543","article-title":"The cost of reading privacy policies","volume":"4","author":"McDonald M","year":"2008","unstructured":"Aleecia\u00a0M McDonald and Lorrie\u00a0Faith Cranor. 2008. The cost of reading privacy policies. I\/S: A Journal of Law and Policy for the Information Society 4 (2008), 543\u2013568. http:\/\/hdl.handle.net\/1811\/72839","journal-title":"I\/S: A Journal of Law and Policy for the Information Society"},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1878431.1878446"},{"key":"e_1_3_3_3_39_1","volume-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017","author":"Naeini Pardis\u00a0Emami","year":"2017","unstructured":"Pardis\u00a0Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie\u00a0Faith Cranor, and Norman Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, Santa Clara, CA, 399\u2013412. https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/naeini"},{"key":"e_1_3_3_3_40_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Washington Law Review 79(2004), 119\u2013158.","journal-title":"Washington Law Review"},{"key":"e_1_3_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376321"},{"key":"e_1_3_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0029"},{"key":"e_1_3_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1486870"},{"key":"e_1_3_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2899007.2899008"},{"key":"e_1_3_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328529.3328557"},{"key":"e_1_3_3_3_46_1","unstructured":"Office of\u00a0the California Attorney\u00a0General. 2020. California Consumer Privacy Act (CCPA): Final Text of Proposed Regulations. https:\/\/gdpr.eu\/cookies\/"},{"key":"e_1_3_3_3_47_1","unstructured":"Horizon 2020 Framework\u00a0Programme of\u00a0the European\u00a0Union. 2021. Cookies the GDPR and the ePrivacy Directive. https:\/\/gdpr.eu\/cookies\/"},{"key":"e_1_3_3_3_48_1","unstructured":"European Parliament. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679"},{"key":"e_1_3_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40956-4_8"},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447310801937999"},{"key":"e_1_3_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.11"},{"key":"e_1_3_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293455"},{"key":"e_1_3_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3282894.3282919"},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375188"},{"key":"e_1_3_3_3_55_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS 2015","author":"Schaub Florian","year":"2015","unstructured":"Florian Schaub, Rebecca Balebako, Adam\u00a0L. Durity, and Lorrie\u00a0Faith Cranor. 2015. A Design Space for Effective Privacy Notices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, 1\u201317. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/schaub"},{"key":"e_1_3_3_3_56_1","volume-title":"Interaction Design: Beyond Human-Computer Interaction","author":"Sharp Helen","year":"2019","unstructured":"Helen Sharp, Jenny Preece, and Yvonne Rogers. 2019. Interaction Design: Beyond Human-Computer Interaction. Wiley. https:\/\/books.google.de\/books?id=UDeQDwAAQBAJ"},{"key":"e_1_3_3_3_57_1","doi-asserted-by":"crossref","unstructured":"Christopher Slobogin. 2002. Public privacy: camera surveillance of public places and the right to anonymity. Miss. lJ 72(2002) 213.","DOI":"10.2139\/ssrn.364600"},{"key":"e_1_3_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"e_1_3_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.88"},{"key":"e_1_3_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911996.2912018"},{"key":"e_1_3_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502137"},{"key":"e_1_3_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0260"},{"key":"e_1_3_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188457"},{"key":"e_1_3_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447526.3472065"},{"key":"e_1_3_3_3_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.11.008"},{"key":"e_1_3_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517688"},{"key":"e_1_3_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3567739"},{"key":"e_1_3_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546719"},{"key":"e_1_3_3_3_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142500"},{"key":"e_1_3_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300428"},{"key":"e_1_3_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"},{"key":"e_1_3_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025907"}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","location":"Hamburg Germany","acronym":"CHI '23","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3580909","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544548.3580909","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:18Z","timestamp":1750178838000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3580909"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":72,"alternative-id":["10.1145\/3544548.3580909","10.1145\/3544548"],"URL":"https:\/\/doi.org\/10.1145\/3544548.3580909","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}