{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T03:00:13Z","timestamp":1768014013387,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":148,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544548.3581337","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T04:26:08Z","timestamp":1681964768000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Contributing to Accessibility Datasets: Reflections on Sharing Study Data by Blind People"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0060-6681","authenticated-orcid":false,"given":"Rie","family":"Kamikubo","sequence":"first","affiliation":[{"name":"College of Information Studies, University of Maryland, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8556-9113","authenticated-orcid":false,"given":"Kyungjun","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Maryland, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7798-308X","authenticated-orcid":false,"given":"Hernisa","family":"Kacorri","sequence":"additional","affiliation":[{"name":"College of Information Studies, University of Maryland, United States"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_3_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300692"},{"key":"e_1_3_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504335.2504360"},{"key":"e_1_3_3_3_3_1","volume-title":"Informed consent: are researchers accurately representing risks and benefits?Scandinavian Journal of Caring Sciences 26, 4","author":"Ahern Kathy","year":"2012","unstructured":"Kathy Ahern. 2012. Informed consent: are researchers accurately representing risks and benefits?Scandinavian Journal of Caring Sciences 26, 4 (2012), 671\u2013678."},{"key":"e_1_3_3_3_4_1","volume-title":"Participatory data stewardship. Reading time","author":"JUST AI.","year":"2021","unstructured":"JUST AI. 2021. Participatory data stewardship. Reading time (2021)."},{"key":"e_1_3_3_3_5_1","unstructured":"Amazon. 2021. Registry of Open Data on AWS. https:\/\/registry.opendata.aws\/."},{"key":"e_1_3_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300233"},{"key":"e_1_3_3_3_7_1","unstructured":"Arthur Asuncion and David Newman. 2007. UCI machine learning repository."},{"key":"e_1_3_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3323697"},{"key":"e_1_3_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207727"},{"key":"e_1_3_3_3_10_1","unstructured":"Dwight Barry. 2017. Do not use averages with Likert scale data. Enterp. Anal 24(2017)."},{"key":"e_1_3_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00269"},{"key":"e_1_3_3_3_12_1","volume-title":"Field work evidence","author":"Becker Howard\u00a0Saul","unstructured":"Howard\u00a0Saul Becker. 1970. Field work evidence. Transaction publishers. 39\u201362 pages."},{"key":"e_1_3_3_3_13_1","volume-title":"Wicked","author":"Berger Arne","year":"2017","unstructured":"Arne Berger, S\u00f6ren Totzauer, Kevin Lefeuvre, Michael Storz, Albrecht Kurze, and Andreas Bischof. 2017. Wicked, Open, Collaborative: Why Research through Design Matters for HCI Research. i-com 16, 2 (2017), 131\u2013142."},{"key":"e_1_3_3_3_14_1","volume-title":"Now I see it, now I don\u2019t: Researcher\u2019s position and reflexivity in qualitative research. Qualitative research 15, 2","author":"Berger Roni","year":"2015","unstructured":"Roni Berger. 2015. Now I see it, now I don\u2019t: Researcher\u2019s position and reflexivity in qualitative research. Qualitative research 15, 2 (2015), 219\u2013234."},{"key":"e_1_3_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866029.1866080"},{"key":"e_1_3_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/RESPECT49803.2020.9272466"},{"key":"e_1_3_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40593-021-00248-0"},{"key":"e_1_3_3_3_18_1","volume-title":"Man is to computer programmer as woman is to homemaker? debiasing word embeddings. Advances in neural information processing systems 29","author":"Bolukbasi Tolga","year":"2016","unstructured":"Tolga Bolukbasi, Kai-Wei Chang, James\u00a0Y Zou, Venkatesh Saligrama, and Adam\u00a0T Kalai. 2016. Man is to computer programmer as woman is to homemaker? debiasing word embeddings. Advances in neural information processing systems 29 (2016), 4349\u20134357."},{"key":"e_1_3_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1038\/sdata.2016.11"},{"key":"e_1_3_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481291"},{"key":"e_1_3_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555627"},{"key":"e_1_3_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308561.3353774"},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373625.3417024"},{"key":"e_1_3_3_3_24_1","volume-title":"Using thematic analysis in psychology. Qualitative research in psychology 3, 2","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77\u2013101."},{"key":"e_1_3_3_3_25_1","volume-title":"Reflecting on reflexive thematic analysis. Qualitative research in sport, exercise and health 11, 4","author":"Braun Virginia","year":"2019","unstructured":"Virginia Braun and Victoria Clarke. 2019. Reflecting on reflexive thematic analysis. Qualitative research in sport, exercise and health 11, 4 (2019), 589\u2013597."},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/capr.12360"},{"key":"e_1_3_3_3_27_1","volume-title":"One size fits all? What counts as quality practice in (reflexive) thematic analysis?Qualitative research in psychology 18, 3","author":"Braun Virginia","year":"2021","unstructured":"Virginia Braun and Victoria Clarke. 2021. One size fits all? What counts as quality practice in (reflexive) thematic analysis?Qualitative research in psychology 18, 3 (2021), 328\u2013352."},{"key":"e_1_3_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313685"},{"key":"e_1_3_3_3_29_1","volume-title":"Studying the internet experience. HP laboratories technical report HPL 49","author":"Brown Barry","year":"2001","unstructured":"Barry Brown. 2001. Studying the internet experience. HP laboratories technical report HPL 49 (2001)."},{"key":"e_1_3_3_3_30_1","volume-title":"Conference on fairness, accountability and transparency. PMLR, 77\u201391","author":"Buolamwini Joy","year":"2018","unstructured":"Joy Buolamwini and Timnit Gebru. 2018. Gender shades: Intersectional accuracy disparities in commercial gender classification. In Conference on fairness, accountability and transparency. PMLR, 77\u201391."},{"key":"e_1_3_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858498"},{"key":"e_1_3_3_3_32_1","volume-title":"Proceedings of the Seventh International Conference on Language Resources and Evaluation (LREC\u201910)","author":"Calzolari Nicoletta","year":"2010","unstructured":"Nicoletta Calzolari, Claudia Soria, Riccardo Del\u00a0Gratta, Sara Goggi, Valeria Quochi, Irene Russo, Khalid Choukri, Joseph Mariani, and Stelios Piperidis. 2010. The lrec map of language resources and technologies. In Proceedings of the Seventh International Conference on Language Resources and Evaluation (LREC\u201910)."},{"key":"e_1_3_3_3_33_1","volume-title":"Versus for Accessibility?. In Proceedings of the 2nd Conference of the Asia-Pacific","author":"Cao Yang\u00a0Trista","year":"2022","unstructured":"Yang\u00a0Trista Cao, Kyle Seelman, Kyungjun Lee, and Hal Daum\u00e9\u00a0III. 2022. What\u2019s Different between Visual Question Answering for Machine \u201cUnderstanding\u201d Versus for Accessibility?. In Proceedings of the 2nd Conference of the Asia-Pacific Chapter of the Association for Computational Linguistics and the 12th International Joint Conference on Natural Language Processing (Volume 1: Long Papers). Association for Computational Linguistics, Online only, 1025\u20131034. https:\/\/aclanthology.org\/2022.aacl-main.75"},{"key":"e_1_3_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382839"},{"key":"e_1_3_3_3_35_1","volume-title":"NeurIPS 2021 Workshop on Human Centered AI(2021)","author":"Chan Joel","year":"2021","unstructured":"Joel Chan, Hal Daum\u00e9\u00a0III, John\u00a0P Dickerson, Hernisa Kacorri, and Ben Shneiderman. 2021. Supporting human flourishing by ensuring human involvement in AI-infused systems. NeurIPS 2021 Workshop on Human Centered AI(2021)."},{"key":"e_1_3_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-010-0115-7"},{"key":"e_1_3_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jenvp.2010.03.007"},{"key":"e_1_3_3_3_38_1","volume-title":"Speculative everything: design, fiction, and social dreaming","author":"Dunne Anthony","unstructured":"Anthony Dunne and Fiona Raby. 2013. Speculative everything: design, fiction, and social dreaming. MIT press."},{"key":"e_1_3_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/VL"},{"key":"e_1_3_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2005.844927"},{"key":"e_1_3_3_3_41_1","unstructured":"A Engler. 2019. For some employment algorithms disability discrimination by default. Brookings. Available at: https:\/\/www. brookings. edu\/blog\/techtank\/2019\/10\/31\/for-some-employment-algorithms-disability-discrimination-by-default\/(accessed 1 June 2020) (2019)."},{"key":"e_1_3_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.25495\/7GXK-RD71"},{"key":"e_1_3_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995444"},{"key":"e_1_3_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3370271"},{"key":"e_1_3_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1177\/00343552070500030401"},{"key":"e_1_3_3_3_46_1","unstructured":"Centre for Information Policy\u00a0Leadership. 2016. Risk High Risk Risk Assessments and Data Protection Impact Assessments under the GDPR. https:\/\/www.informationpolicycentre.com\/uploads\/5\/7\/1\/0\/57104281\/cipl_gdpr_project_risk_white_paper_21_december_2016.pdf. (2016)."},{"key":"e_1_3_3_3_47_1","unstructured":"Batya Friedman Peter Kahn and Alan Borning. 2002. Value sensitive design: Theory and methods. University of Washington technical report 2 (2002) 12."},{"key":"e_1_3_3_3_48_1","doi-asserted-by":"publisher","unstructured":"Ozlem\u00a0Ozmen Garibay Brent Winslow Salvatore Andolina Margherita Antona Anja Bodenschatz Constantinos Coursaris Gregory Falco Stephen\u00a0M. Fiore Ivan Garibay Keri Grieman John\u00a0C. Havens Marina Jirotka Hernisa Kacorri Waldemar Karwowski Joe Kider Joseph Konstan Sean Koon Monica Lopez-Gonzalez Iliana Maifeld-Carucci Sean McGregor Gavriel Salvendy Ben Shneiderman Constantine Stephanidis Christina Strobel Carolyn\u00a0Ten Holter and Wei Xu. 2023. Six Human-Centered Artificial Intelligence Grand Challenges. International Journal of Human\u2013Computer Interaction 39 3(2023) 391\u2013437. https:\/\/doi.org\/10.1080\/10447318.2022.2153320 arXiv:https:\/\/doi.org\/10.1080\/10447318.2022.2153320","DOI":"10.1080\/10447318.2022.2153320"},{"key":"e_1_3_3_3_49_1","unstructured":"Timnit Gebru Jamie Morgenstern Briana Vecchione Jennifer\u00a0Wortman Vaughan Hanna\u00a0M. Wallach Hal\u00a0Daum\u00e9 III and Kate Crawford. 2018. Datasheets for Datasets. CoRR abs\/1803.09010(2018). arxiv:1803.09010http:\/\/arxiv.org\/abs\/1803.09010"},{"key":"e_1_3_3_3_50_1","volume-title":"Measuring Americans","author":"Gilbert Sarah","year":"2021","unstructured":"Sarah Gilbert, Jessica Vitak, and Katie Shilton. 2021. Measuring Americans\u2019 comfort with research uses of their social media data. Social Media+ Society 7, 3 (2021), 20563051211033824."},{"key":"e_1_3_3_3_51_1","unstructured":"Google. 2019. Lookout - Assisted Vision. https:\/\/play.google.com\/store\/apps\/details?id=com.google.android.apps.accessibility.reveal&hl=en_US&gl=US"},{"key":"e_1_3_3_3_52_1","unstructured":"Anhong Guo Ece Kamar Jennifer\u00a0Wortman Vaughan Hanna Wallach and Meredith\u00a0Ringel Morris. 2019. Toward Fairness in AI for People with Disabilities: A Research Roadmap. arXiv preprint arXiv:1907.02227."},{"key":"e_1_3_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00103"},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00380"},{"key":"e_1_3_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234695.3239331"},{"key":"e_1_3_3_3_56_1","unstructured":"Saad Hassan Larwan Berke Elahe Vahdani Longlong Jing Yingli Tian and Matt Huenerfauth. 2020. An Isolated-Signing RGBD Dataset of 100 American Sign Language Signs Produced by Fluent ASL Signers. In Proceedings of the LREC2020 9th Workshop on the Representation and Processing of Sign Languages: Sign Language Resources in the Service of the Language Community Technological Challenges and Application Perspectives. European Language Resources Association (ELRA) Marseille France 89\u201394. https:\/\/www.aclweb.org\/anthology\/2020.signlang-1.14"},{"key":"e_1_3_3_3_57_1","volume-title":"Privacy and Surveillance: Public Attitudes on Cameras on the Street, in the Home, and in the Workplace. Rutgers JL & Pub. Pol\u2019y 14","author":"Heumann Milton","year":"2016","unstructured":"Milton Heumann, Lance Cassak, Esther Kang, and Thomas Twitchell. 2016. Privacy and Surveillance: Public Attitudes on Cameras on the Street, in the Home, and in the Workplace. Rutgers JL & Pub. Pol\u2019y 14 (2016), 37."},{"key":"e_1_3_3_3_58_1","doi-asserted-by":"crossref","unstructured":"Elizabeth\u00a0M Hill Emma\u00a0L Turner Richard\u00a0M Martin and Jenny\u00a0L Donovan. 2013. \u201cLet\u2019s get the best quality research we can\u201d: public awareness and acceptance of consent to use existing data in health research: a systematic review and qualitative study. BMC medical research methodology 13 1 (2013) 1\u201310.","DOI":"10.1186\/1471-2288-13-72"},{"key":"e_1_3_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300645"},{"key":"e_1_3_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517428.3544824"},{"key":"e_1_3_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376428"},{"key":"e_1_3_3_3_62_1","volume-title":"Proceedings of the 6th Workshop on the Representation and Processing of Sign Languages: Beyond the Manual Channel, The 9th International Conference on Language Resources and Evaluation (LREC","author":"Huenerfauth Matt","year":"2014","unstructured":"Matt Huenerfauth and Hernisa Kacorri. 2014. Release of experimental stimuli and questions for evaluating facial expressions in animations of American Sign Language. In Proceedings of the 6th Workshop on the Representation and Processing of Sign Languages: Beyond the Manual Channel, The 9th International Conference on Language Resources and Evaluation (LREC 2014), Reykjavik, Iceland."},{"key":"e_1_3_3_3_64_1","volume-title":"Using a qualitative vignette to explore a complex public health issue. Qualitative health research 25, 10","author":"Jackson Michaela","year":"2015","unstructured":"Michaela Jackson, Paul Harrison, Boyd Swinburn, and Mark Lawrence. 2015. Using a qualitative vignette to explore a complex public health issue. Qualitative health research 25, 10 (2015), 1395\u20131409."},{"key":"e_1_3_3_3_65_1","volume-title":"Likert scales: How to (ab) use them?Medical education 38, 12","author":"Jamieson Susan","year":"2004","unstructured":"Susan Jamieson. 2004. Likert scales: How to (ab) use them?Medical education 38, 12 (2004), 1217\u20131218."},{"key":"e_1_3_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372829"},{"key":"e_1_3_3_3_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167902.3167904"},{"key":"e_1_3_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373625.3418026"},{"key":"e_1_3_3_3_71_1","volume-title":"NeurIPS 2020 Workshop on Dataset Curation and Security","author":"Kacorri Hernisa","year":"2020","unstructured":"Hernisa Kacorri, Utkarsh Dwivedi, and Rie Kamikubo. 2020. Data Sharing in Wellness, Accessibility, and Aging. NeurIPS 2020 Workshop on Dataset Curation and Security (2020)."},{"key":"e_1_3_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025899"},{"key":"e_1_3_3_3_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2982142.2982178"},{"key":"e_1_3_3_3_74_1","volume-title":"Kaggle: Your Machine Learning and Data Science Community. https:\/\/www.kaggle.com.","year":"2021","unstructured":"Kaggle. 2021. Kaggle: Your Machine Learning and Data Science Community. https:\/\/www.kaggle.com."},{"key":"e_1_3_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3441852.3471208"},{"key":"e_1_3_3_3_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517428.3544826"},{"key":"e_1_3_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130930"},{"key":"e_1_3_3_3_78_1","doi-asserted-by":"crossref","unstructured":"Spyros Kokolakis. 2017. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & security 64(2017) 122\u2013134.","DOI":"10.1016\/j.cose.2015.07.002"},{"key":"e_1_3_3_3_79_1","volume-title":"Research Handbook on Big Data Law","author":"Kop Mauritz","unstructured":"Mauritz Kop. 2021. Machine learning and EU data-sharing practices: Legal aspects of machine learning training datasets for AI systems. In Research Handbook on Big Data Law. Edward Elgar Publishing, 432\u2013453."},{"key":"e_1_3_3_3_80_1","volume-title":"Who owns the data? Open data for healthcare. Frontiers in public health 4","author":"Kostkova Patty","year":"2016","unstructured":"Patty Kostkova, Helen Brewer, Simon De\u00a0Lusignan, Edward Fottrell, Ben Goldacre, Graham Hart, Phil Koczan, Peter Knight, Corinne Marsolier, Rachel\u00a0A McKendry, 2016. Who owns the data? Open data for healthcare. Frontiers in public health 4 (2016), 7."},{"key":"e_1_3_3_3_81_1","doi-asserted-by":"crossref","unstructured":"Jacob\u00a0Leon Kr\u00f6ger Milagros Miceli and Florian M\u00fcller. 2021. How Data Can Be Used Against People: A Classification of Personal Data Misuses. Available at SSRN 3887097(2021).","DOI":"10.2139\/ssrn.3887097"},{"key":"e_1_3_3_3_82_1","doi-asserted-by":"crossref","unstructured":"Jenny Krutzinna and Luciano Floridi. 2019. Ethical medical data donation: a pressing issue. The Ethics of Medical Data Donation(2019) 1\u20136.","DOI":"10.1007\/978-3-030-04363-6_1"},{"key":"e_1_3_3_3_83_1","doi-asserted-by":"publisher","DOI":"10.1161\/01.CIR.0000080642.35380.50"},{"key":"e_1_3_3_3_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300566"},{"key":"e_1_3_3_3_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376398"},{"key":"e_1_3_3_3_86_1","unstructured":"Thomas Linden Rishabh Khandelwal Hamza Harkous and Kassem Fawaz. 2018. The privacy policy landscape after the GDPR. arXiv preprint arXiv:1809.08396(2018)."},{"key":"e_1_3_3_3_87_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi9120704"},{"key":"e_1_3_3_3_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300822"},{"key":"e_1_3_3_3_89_1","doi-asserted-by":"publisher","DOI":"10.2196\/18937"},{"key":"e_1_3_3_3_90_1","doi-asserted-by":"publisher","DOI":"10.1002\/bult.2014.1720400514"},{"key":"e_1_3_3_3_91_1","unstructured":"Mavis Machirori and Reema Patel. 2021. Turning distrust in data sharing into \u201cengage deliberate decide\u201d. (2021). https:\/\/www.adalovelaceinstitute.org\/blog\/distrust-data-sharing-engage-deliberate-decide\/"},{"key":"e_1_3_3_3_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376445"},{"key":"e_1_3_3_3_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01064"},{"key":"e_1_3_3_3_94_1","volume-title":"Using numbers in qualitative research. Qualitative inquiry 16, 6","author":"Maxwell A","year":"2010","unstructured":"Joseph\u00a0A Maxwell. 2010. Using numbers in qualitative research. Qualitative inquiry 16, 6 (2010), 475\u2013482."},{"key":"e_1_3_3_3_95_1","first-page":"543","article-title":"The cost of reading privacy policies","volume":"4","author":"McDonald M","year":"2008","unstructured":"Aleecia\u00a0M McDonald and Lorrie\u00a0Faith Cranor. 2008. The cost of reading privacy policies. Isjlp 4(2008), 543.","journal-title":"Isjlp"},{"key":"e_1_3_3_3_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501984"},{"key":"e_1_3_3_3_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376871"},{"key":"e_1_3_3_3_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025589"},{"key":"e_1_3_3_3_99_1","volume-title":"Seeing AI: An app for visually impaired people that narrates the world around you. https:\/\/www.microsoft.com\/en-us\/garage\/wall-of-fame\/seeing-ai\/","year":"2017","unstructured":"Microsoft. 2017. Seeing AI: An app for visually impaired people that narrates the world around you. https:\/\/www.microsoft.com\/en-us\/garage\/wall-of-fame\/seeing-ai\/"},{"key":"e_1_3_3_3_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174224"},{"key":"e_1_3_3_3_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3356727"},{"key":"e_1_3_3_3_102_1","volume-title":"Research participant views regarding qualitative data sharing. Ethics & human research 42, 2","author":"Mozersky Jessica","year":"2020","unstructured":"Jessica Mozersky, Meredith Parsons, Heidi Walsh, Kari Baldwin, Tristan McIntosh, and James\u00a0M DuBois. 2020. Research participant views regarding qualitative data sharing. Ethics & human research 42, 2 (2020), 13\u201327."},{"key":"e_1_3_3_3_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308561.3353812"},{"key":"e_1_3_3_3_104_1","volume-title":"The role of data type and recipient in individuals","author":"Nicholas Jennifer","year":"2019","unstructured":"Jennifer Nicholas, Katie Shilton, Stephen\u00a0M Schueller, Elizabeth\u00a0L Gray, Mary\u00a0J Kwasny, David\u00a0C Mohr, 2019. The role of data type and recipient in individuals\u2019 perspectives on sharing passively collected smartphone data for mental health: Cross-sectional questionnaire study. JMIR mHealth and uHealth 7, 4 (2019), e12578."},{"key":"e_1_3_3_3_105_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Washington Law Review 79(2004), 119.","journal-title":"Washington Law Review"},{"key":"e_1_3_3_3_106_1","doi-asserted-by":"publisher","DOI":"10.1177\/2333393617732017"},{"key":"e_1_3_3_3_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445870"},{"key":"e_1_3_3_3_108_1","doi-asserted-by":"publisher","unstructured":"Rubens\u00a0Lacerda Queiroz F\u00e1bio\u00a0Ferrentini Sampaio Cabral Lima and Priscila Machado\u00a0Vieira Lima. 2020. AI from concrete to abstract: demystifying artificial intelligence to the general public. https:\/\/doi.org\/10.1007\/s00146-021-01151-x arxiv:2006.04013\u00a0[cs.CY]","DOI":"10.1007\/s00146-021-01151-x"},{"key":"e_1_3_3_3_109_1","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/7147212"},{"key":"e_1_3_3_3_110_1","unstructured":"Joanna Redden Jessica Brand and Vanesa Terzieva. 2020. Data harm record. (2020)."},{"key":"e_1_3_3_3_111_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5540074"},{"key":"e_1_3_3_3_112_1","unstructured":"Microsoft Research. 2018. Microsoft Research Open Data. https:\/\/msropendata.com\/"},{"key":"e_1_3_3_3_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145238"},{"key":"e_1_3_3_3_114_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"e_1_3_3_3_115_1","volume-title":"Real qualitative researchers do not count: The use of numbers in qualitative research. Research in nursing & health 24, 3","author":"Sandelowski Margarete","year":"2001","unstructured":"Margarete Sandelowski. 2001. Real qualitative researchers do not count: The use of numbers in qualitative research. Research in nursing & health 24, 3 (2001), 230\u2013240."},{"key":"e_1_3_3_3_116_1","doi-asserted-by":"publisher","DOI":"10.1177\/1558689809334210"},{"key":"e_1_3_3_3_117_1","doi-asserted-by":"crossref","unstructured":"Nancy\u00a0E Schoenberg and Hege Ravdal. 2000. Using vignettes in awareness and attitudinal research. International journal of social research methodology 3 1(2000) 63\u201374.","DOI":"10.1080\/136455700294932"},{"key":"e_1_3_3_3_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/2141943.2141945"},{"key":"e_1_3_3_3_119_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41431-019-0344-2"},{"key":"e_1_3_3_3_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517428.3544813"},{"key":"e_1_3_3_3_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592761.1592778"},{"key":"e_1_3_3_3_122_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.03.001"},{"key":"e_1_3_3_3_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419764"},{"key":"e_1_3_3_3_124_1","doi-asserted-by":"crossref","unstructured":"Ben Shneiderman. 2020. Human-centered artificial intelligence: Reliable safe & trustworthy. International Journal of Human\u2013Computer Interaction 36 6(2020) 495\u2013504.","DOI":"10.1080\/10447318.2020.1741118"},{"key":"e_1_3_3_3_125_1","doi-asserted-by":"crossref","unstructured":"Ido Sivan-Sevilla. 2022. Varieties of enforcement strategies post-GDPR: a fuzzy-set qualitative comparative analysis (fsQCA) across data protection authorities. Journal of European Public Policy(2022) 1\u201334.","DOI":"10.31235\/osf.io\/kjf8q"},{"key":"e_1_3_3_3_126_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3299033"},{"key":"e_1_3_3_3_127_1","unstructured":"Daniel Solove. 2014. 10 Reasons Why Privacy Matters. https:\/\/teachprivacy.com\/10-reasons-privacy-matters\/."},{"key":"e_1_3_3_3_128_1","unstructured":"Daniel\u00a0J Solove. 2008. Understanding privacy. (2008)."},{"key":"e_1_3_3_3_129_1","doi-asserted-by":"publisher","DOI":"10.1145\/3060056"},{"key":"e_1_3_3_3_130_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517384"},{"key":"e_1_3_3_3_131_1","doi-asserted-by":"publisher","DOI":"10.4300\/JGME-5-4-18"},{"key":"e_1_3_3_3_132_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-6736(17)31282-5"},{"key":"e_1_3_3_3_133_1","doi-asserted-by":"crossref","unstructured":"Gioacchino Tangari Muhammad Ikram Kiran Ijaz Mohamed\u00a0Ali Kaafar and Shlomo Berkovsky. 2021. Mobile health and privacy: cross sectional study. bmj 373(2021).","DOI":"10.1136\/bmj.n1248"},{"key":"e_1_3_3_3_134_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_3_3_3_135_1","doi-asserted-by":"publisher","DOI":"10.1145\/3441852.3471225"},{"key":"e_1_3_3_3_136_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMR.2016.2568798"},{"key":"e_1_3_3_3_137_1","doi-asserted-by":"publisher","DOI":"10.1145\/3315002.3332429"},{"key":"e_1_3_3_3_138_1","unstructured":"Shari Trewin. 2018. AI fairness for people with disabilities: Point of view. arXiv preprint arXiv:1811.10670(2018)."},{"key":"e_1_3_3_3_139_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20074-8_33"},{"key":"e_1_3_3_3_140_1","volume-title":"Determinants of patient participation in clinical studies requiring informed consent: why patients enter a clinical trial. Patient education and counseling 35, 2","author":"Verheggen WSM","year":"1998","unstructured":"Frank\u00a0WSM Verheggen, Fred Nieman, and Ruud Jonkers. 1998. Determinants of patient participation in clinical studies requiring informed consent: why patients enter a clinical trial. Patient education and counseling 35, 2 (1998), 111\u2013125."},{"key":"e_1_3_3_3_141_1","volume-title":"The open data era in health and social care. NYLS Legal Studies Research Paper2563788","author":"Verhulst Stefaan","year":"2014","unstructured":"Stefaan Verhulst, Beth\u00a0Simone Noveck, Robyn Caplan, Kristy Brown, and Claudia Paz. 2014. The open data era in health and social care. NYLS Legal Studies Research Paper2563788 (2014)."},{"key":"e_1_3_3_3_142_1","doi-asserted-by":"publisher","DOI":"10.1111\/risa.12271"},{"key":"e_1_3_3_3_143_1","volume-title":"Mobile Technology for Adaptive Aging: Proceedings of a Workshop. National Academies Press, 1\u201320","author":"Vitak Jessica","year":"2020","unstructured":"Jessica Vitak and Katie Shilton. 2020. Trust, privacy and security, and accessibility considerations when conducting mobile technologies research with older adults. In Mobile Technology for Adaptive Aging: Proceedings of a Workshop. National Academies Press, 1\u201320."},{"key":"e_1_3_3_3_144_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376448"},{"key":"e_1_3_3_3_145_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-6736(10)62234-9"},{"key":"e_1_3_3_3_146_1","volume-title":"Detecting neurodegenerative disorders from web search signals. NPJ digital medicine 1, 1","author":"White W","year":"2018","unstructured":"Ryen\u00a0W White, P\u00a0Murali Doraiswamy, and Eric Horvitz. 2018. Detecting neurodegenerative disorders from web search signals. NPJ digital medicine 1, 1 (2018), 1\u20134."},{"key":"e_1_3_3_3_147_1","unstructured":"Meredith Whittaker Meryl Alper Cynthia\u00a0L Bennett Sara Hendren Liz Kaziunas Mara Mills Meredith\u00a0Ringel Morris Joy Rankin Emily Rogers Marcel Salas 2019. Disability Bias and AI. AI Now Institute November(2019)."},{"key":"e_1_3_3_3_148_1","doi-asserted-by":"publisher","DOI":"10.17723\/0360-9081-84.2.468"},{"key":"e_1_3_3_3_149_1","volume-title":"The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision support systems 51, 1","author":"Xu Heng","year":"2011","unstructured":"Heng Xu, Xin\u00a0Robert Luo, John\u00a0M Carroll, and Mary\u00a0Beth Rosson. 2011. The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision support systems 51, 1 (2011), 42\u201352."},{"key":"e_1_3_3_3_150_1","doi-asserted-by":"publisher","DOI":"10.1145\/2513383.2513443"},{"key":"e_1_3_3_3_151_1","volume-title":"Geerten Van De\u00a0Kaa, and Kostas Poulis","author":"Zuiderwijk Anneke","year":"2016","unstructured":"Anneke Zuiderwijk, Marijn Janssen, Geerten Van De\u00a0Kaa, and Kostas Poulis. 2016. The wicked problem of commercial value creation in open data ecosystems: Policy guidelines for governments. Information polity 21, 3 (2016), 223\u2013236."}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","location":"Hamburg Germany","acronym":"CHI '23","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3581337","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544548.3581337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:29Z","timestamp":1750178849000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3581337"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":148,"alternative-id":["10.1145\/3544548.3581337","10.1145\/3544548"],"URL":"https:\/\/doi.org\/10.1145\/3544548.3581337","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}