{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T15:32:58Z","timestamp":1759937578155,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":73,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100012363","name":"Saudi Arabia Cultural Bureau in London","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100012363","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544548.3581307","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T04:26:08Z","timestamp":1681964768000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Multiuser Privacy and Security Conflicts in the Cloud"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6152-0013","authenticated-orcid":false,"given":"Eman","family":"Alhelali","sequence":"first","affiliation":[{"name":"King's College London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8420-3929","authenticated-orcid":false,"given":"Kopo M.","family":"Ramokapane","sequence":"additional","affiliation":[{"name":"Bristol Cyber Security Group, Department of Computer Science, University of Bristol, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6041-178X","authenticated-orcid":false,"given":"Jose","family":"Such","sequence":"additional","affiliation":[{"name":"King's College London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906412"},{"key":"e_1_3_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070464"},{"key":"e_1_3_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/160\/1\/012106"},{"key":"e_1_3_3_2_4_1","volume-title":"Privacy: The Perspectives of Nannies on Smart Home Surveillance. In 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20)","author":"Bernd Julia","year":"2020","unstructured":"Julia Bernd, Ruba Abu-Salma, and Alisa Frik. 2020. {Bystanders\u2019} Privacy: The Perspectives of Nannies on Smart Home Surveillance. In 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20)."},{"key":"e_1_3_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753560"},{"key":"e_1_3_3_2_6_1","volume-title":"Symposium on the dynamics of the internet and society.","author":"Boyd Danah","year":"2011","unstructured":"Danah Boyd and Alice\u00a0E Marwick. 2011. Social privacy in networked publics: Teens\u2019 attitudes, practices, and strategies. In A decade in internet time: Symposium on the dynamics of the internet and society."},{"key":"e_1_3_3_2_7_1","volume-title":"Using thematic analysis in psychology. Qualitative research in psychology 3, 2","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77\u2013101."},{"key":"e_1_3_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.hitech.2014.07.008"},{"key":"e_1_3_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/1468794105056924"},{"key":"e_1_3_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449127"},{"key":"e_1_3_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/pfi.21749"},{"key":"e_1_3_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300705"},{"volume-title":"The handbook of conflict resolution: Theory and practice","author":"Deutsch Morton","key":"e_1_3_3_2_13_1","unstructured":"Morton Deutsch, Peter\u00a0T Coleman, and Eric\u00a0C Marcus. 2011. The handbook of conflict resolution: Theory and practice. John Wiley & Sons."},{"key":"e_1_3_3_2_14_1","volume-title":"The critical incident technique.Psychological bulletin 51, 4","author":"Flanagan C","year":"1954","unstructured":"John\u00a0C Flanagan. 1954. The critical incident technique.Psychological bulletin 51, 4 (1954), 327."},{"key":"e_1_3_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300498"},{"key":"e_1_3_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029837"},{"key":"e_1_3_3_2_17_1","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS","author":"Harkous Hamza","year":"2016","unstructured":"Hamza Harkous, Kassem Fawaz, Kang\u00a0G Shin, and Karl Aberer. 2016. {PriBots}: Conversational Privacy with Chatbots. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)."},{"key":"e_1_3_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445258"},{"key":"e_1_3_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00097"},{"key":"e_1_3_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173621"},{"key":"e_1_3_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300597"},{"key":"e_1_3_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076747"},{"key":"e_1_3_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.97"},{"key":"e_1_3_3_2_24_1","doi-asserted-by":"crossref","unstructured":"M. Humbert B. Trubert and K. Huguenin. 2019. A Survey on Interdependent Privacy. Comput. Surveys (2019) 35.","DOI":"10.1145\/3360498"},{"key":"e_1_3_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813603"},{"key":"e_1_3_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078845"},{"key":"e_1_3_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335369"},{"volume-title":"Discourse analysis","author":"Johnstone Barbara","key":"e_1_3_3_2_28_1","unstructured":"Barbara Johnstone. 2017. Discourse analysis. John Wiley & Sons."},{"key":"e_1_3_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174117"},{"volume-title":"Expendable Files in Cloud Storage. In 30th {USENIX} Security Symposium ({USENIX} Security 21).","author":"Khan Mohammad\u00a0Taha","key":"e_1_3_3_2_30_1","unstructured":"Mohammad\u00a0Taha Khan, Christopher Tran, Shubham Singh, Dimitri Vasilkov, Chris Kanich, Blase Ur, and Elena Zheleva. 2021. Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage. In 30th {USENIX} Security Symposium ({USENIX} Security 21)."},{"key":"e_1_3_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1177\/0894439317752406"},{"key":"e_1_3_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979420"},{"key":"e_1_3_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocy072"},{"key":"e_1_3_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737466"},{"key":"e_1_3_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517520"},{"key":"e_1_3_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134702"},{"key":"e_1_3_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1177\/1525822X980100020301"},{"key":"e_1_3_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479581"},{"key":"e_1_3_3_2_39_1","volume-title":"Conducting behavioral research on Amazon\u2019s Mechanical Turk. Behavior research methods 44, 1","author":"Mason Winter","year":"2012","unstructured":"Winter Mason and Siddharth Suri. 2012. Conducting behavioral research on Amazon\u2019s Mechanical Turk. Behavior research methods 44, 1 (2012), 1\u201323."},{"key":"e_1_3_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1002\/ab.10060"},{"key":"e_1_3_3_2_41_1","volume-title":"International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS). 916\u2013924","author":"Mosca Francesca","year":"2021","unstructured":"Francesca Mosca and Jose Such. 2021. ELVIRA: an Explainable Agent for Value and Utility-driven Multiuser Privacy. In International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS). 916\u2013924."},{"key":"e_1_3_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-021-09543-5"},{"key":"e_1_3_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702233"},{"key":"e_1_3_3_2_44_1","doi-asserted-by":"crossref","unstructured":"Kavous\u00a0Salehzadeh Niksirat Evanne Anthoine-Milhomme Samuel Randin K\u00e9vin Huguenin and Mauro Cherubini. 2021. \u201cI thought you were okay\u201d: Participatory Design with Young Adults to Fight Multiparty Privacy Conflicts in Online Social Networks. (2021).","DOI":"10.1145\/3461778.3462040"},{"key":"e_1_3_3_2_45_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79(2004), 119.","journal-title":"Wash. L. Rev."},{"key":"e_1_3_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23002"},{"key":"e_1_3_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11002-018-9448-7"},{"key":"e_1_3_3_2_48_1","doi-asserted-by":"crossref","unstructured":"F. Paci A. Squicciarini and N. Zannone. 2018. Survey on access control for community-centered collaborative systems. Comput. Surveys 51 1 (2018).","DOI":"10.1145\/3146025"},{"key":"e_1_3_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.5071532"},{"key":"e_1_3_3_2_50_1","volume-title":"Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46, 4","author":"Peer Eyal","year":"2014","unstructured":"Eyal Peer, Joachim Vosgerau, and Alessandro Acquisti. 2014. Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46, 4 (2014), 1023\u20131031."},{"key":"e_1_3_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335364"},{"key":"e_1_3_3_2_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/2936924.2937025"},{"key":"e_1_3_3_2_53_1","volume-title":"Study of Users\u2019 Cloud Deletion Practices and Coping Strategies. In Thirteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Ramokapane M.","year":"2017","unstructured":"Kopo\u00a0M. Ramokapane, Awais Rashid, and Jose Such. 2017. \u201cI feel stupid I can\u2019t delete...\u201d: A Study of Users\u2019 Cloud Deletion Practices and Coping Strategies. In Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017). 241\u2013256."},{"key":"e_1_3_3_2_54_1","volume-title":"What Users Want From Cloud Deletion and the Information They Need: A Participatory Action Study.ACM Transactions on Privacy and Security (TOPS)","author":"Ramokapane M.","year":"2022","unstructured":"Kopo\u00a0M. Ramokapane, Jose Such, and Awais Rashid. 2022. What Users Want From Cloud Deletion and the Information They Need: A Participatory Action Study.ACM Transactions on Privacy and Security (TOPS) (2022)."},{"key":"e_1_3_3_2_55_1","volume-title":"Manage Privacy in the Era of Pervasive Photography. In Fourteenth Symposium on Usable Privacy and Security (SOUPS","author":"Rashidi Yasmeen","year":"2018","unstructured":"Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, and Norman\u00a0Makoto Su. 2018. \" You don\u2019t want to be the next meme\": College Students\u2019 Workarounds to Manage Privacy in the Era of Pervasive Photography. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). 143\u2013157."},{"key":"e_1_3_3_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIIECS.2017.8275972"},{"key":"e_1_3_3_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526780"},{"key":"e_1_3_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2539165"},{"key":"e_1_3_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3208039"},{"key":"e_1_3_3_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025668"},{"key":"e_1_3_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2821512"},{"key":"e_1_3_3_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555546"},{"key":"e_1_3_3_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858303"},{"key":"e_1_3_3_2_64_1","volume-title":"The critical incident technique: method or methodology?Qualitative health research 29, 7","author":"Viergever F","year":"2019","unstructured":"Roderik\u00a0F Viergever. 2019. The critical incident technique: method or methodology?Qualitative health research 29, 7 (2019), 1065\u20131079."},{"key":"e_1_3_3_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3078875"},{"key":"e_1_3_3_2_66_1","volume-title":"Facts & Trends for","author":"Vladimir Sumina","year":"2022","unstructured":"Sumina Vladimir. 2021. 26 Cloud Computing Statistics, Facts & Trends for 2022. https:\/\/www.cloudwards.net\/cloud-computing-statistics\/."},{"key":"e_1_3_3_2_67_1","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS","author":"Wermke Dominik","year":"2020","unstructured":"Dominik Wermke, Nicolas Huaman, Christian Stransky, Niklas Busch, Yasemin Acar, and Sascha Fahl. 2020. Cloudy with a chance of misconceptions: exploring users\u2019 perceptions and expectations of security and privacy in cloud office suites. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). 359\u2013377."},{"key":"e_1_3_3_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207761"},{"key":"e_1_3_3_2_69_1","first-page":"1077","article-title":"Reframing privacy 2.0 in online social network","author":"Xu Heng","year":"2011","unstructured":"Heng Xu. 2011. Reframing privacy 2.0 in online social network. U. Pa. J. Const. L. 14(2011), 1077.","journal-title":"U. Pa. J. Const."},{"key":"e_1_3_3_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"},{"key":"e_1_3_3_2_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025907"},{"key":"e_1_3_3_2_72_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.10.006"},{"key":"e_1_3_3_2_73_1","volume-title":"Addressing cloud computing security issues. Future Generation computer systems 28, 3","author":"Zissis Dimitrios","year":"2012","unstructured":"Dimitrios Zissis and Dimitrios Lekkas. 2012. Addressing cloud computing security issues. Future Generation computer systems 28, 3 (2012), 583\u2013592."}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Hamburg Germany","acronym":"CHI '23"},"container-title":["Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3581307","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544548.3581307","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:28Z","timestamp":1750178848000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3581307"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":73,"alternative-id":["10.1145\/3544548.3581307","10.1145\/3544548"],"URL":"https:\/\/doi.org\/10.1145\/3544548.3581307","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}