{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:51:37Z","timestamp":1776084697758,"version":"3.50.1"},"reference-count":82,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW2","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000266","name":"EPSRC","doi-asserted-by":"crossref","award":["EP\/R033889\/1, EP\/R033889\/2, EP\/R033854\/1 and EP\/R033870\/1"],"award-info":[{"award-number":["EP\/R033889\/1, EP\/R033889\/2, EP\/R033854\/1 and EP\/R033870\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2022,11,7]]},"abstract":"<jats:p>When pieces from an individual's personal information available online are connected over time and across multiple platforms, this more complete digital trace can give unintended insights into their life and opinions. In a data narrative interview study with 26 currently employed participants, we examined risks and harms to individuals and employers when others joined the dots between their online information. We discuss the themes of visibility and self-disclosure, unintentional information leakage and digital privacy literacies constructed from our analysis. We contribute insights not only into people's difficulties in recalling and conceptualising their digital traces but of subsequently envisioning how their online information may be combined, or (re)identified across their traces and address a current gap in research by showing that awareness is lacking around the potential for personal information to be correlated by and made coherent to\/by others, posing risks to individuals, employers, and even the state. We touch on inequalities of privacy, freedom and legitimacy that exist for different groups with regard to what they make (or feel compelled to make) available online and we contribute to current methodological work on the use of sketching to support visual sense making in data narrative interviews. We conclude by discussing the need for interventions that support personal reflection on the potential visibility of combined digital traces to spotlight hidden vulnerabilities, and promote more proactive action about what is shared and not shared online.<\/jats:p>","DOI":"10.1145\/3555214","type":"journal-article","created":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T22:59:06Z","timestamp":1668207546000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Revealing Cumulative Risks in Online Personal Information: A Data Narrative Study"],"prefix":"10.1145","volume":"6","author":[{"given":"Emma","family":"Nicol","sequence":"first","affiliation":[{"name":"University of Strathclyde, Glasgow, United Kingdom"}]},{"given":"Jo","family":"Briggs","sequence":"additional","affiliation":[{"name":"Northumbria University, Newcastle upon Tyne, United Kingdom"}]},{"given":"Wendy","family":"Moncur","sequence":"additional","affiliation":[{"name":"University of Strathclyde, Glasgow, United Kingdom"}]},{"given":"Amal","family":"Htait","sequence":"additional","affiliation":[{"name":"Aston University, Birmingham, United Kingdom"}]},{"given":"Daniel Paul","family":"Carey","sequence":"additional","affiliation":[{"name":"Independent Researcher, Newcastle upon Tyne, United Kingdom"}]},{"given":"Leif","family":"Azzopardi","sequence":"additional","affiliation":[{"name":"University of Strathclyde, Glasgow, Scotland, United Kingdom"}]},{"given":"Burkhard","family":"Schafer","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, Scotland, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2022,11,11]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"2007. Art & Research : Jacques Ranci\u00e8re and Indisciplinarity. http:\/\/www.artandresearch.org.uk\/v2n1\/jrinterview.html  2007. Art & Research : Jacques Ranci\u00e8re and Indisciplinarity. http:\/\/www.artandresearch.org.uk\/v2n1\/jrinterview.html"},{"key":"e_1_2_1_2_1","unstructured":"2015. Data Privacy Project -- Initiatives to inform and support libraries and librarians. https:\/\/dataprivacyproject.org\/  2015. Data Privacy Project -- Initiatives to inform and support libraries and librarians. https:\/\/dataprivacyproject.org\/"},{"key":"e_1_2_1_3_1","unstructured":"2021. Data: a new direction - GOV.UK. https:\/\/www.gov.uk\/government\/consultations\/data-a-new-direction  2021. Data: a new direction - GOV.UK. https:\/\/www.gov.uk\/government\/consultations\/data-a-new-direction"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.08.013"},{"key":"e_1_2_1_5_1","unstructured":"Irwin Altman. 1975. The environment and social behavior: privacy personal space territory and crowding. (1975). https:\/\/eric.ed.gov\/?id=ed131515  Irwin Altman. 1975. The environment and social behavior: privacy personal space territory and crowding. (1975). https:\/\/eric.ed.gov\/?id=ed131515"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/0263775818767426"},{"key":"#cr-split#-e_1_2_1_7_1.1","doi-asserted-by":"crossref","unstructured":"Debi Ashenden. 2018. In their own words: employee attitudes towards information security. Information & Computer Security 26 3 (7 2018) 327--337. https:\/\/doi.org\/10.1108\/ICS-04--2018-0042 10.1108\/ICS-04--2018-0042","DOI":"10.1108\/ICS-04-2018-0042"},{"key":"#cr-split#-e_1_2_1_7_1.2","doi-asserted-by":"crossref","unstructured":"Debi Ashenden. 2018. In their own words: employee attitudes towards information security. Information & Computer Security 26 3 (7 2018) 327--337. https:\/\/doi.org\/10.1108\/ICS-04--2018-0042","DOI":"10.1108\/ICS-04-2018-0042"},{"key":"e_1_2_1_8_1","volume-title":"https:\/\/doi.org\/10.1145\/2380718.2380722","author":"Bachrach Yoram","year":"2012","unstructured":"Yoram Bachrach , Michal Kosinski , Thore Graepel , Pushmeet Kohli , and David Stillwell . 2012. FacebookPersonality_michal_29_04_12.pdf. ( 2012 ). https:\/\/doi.org\/10.1145\/2380718.2380722 10.1145\/2380718.2380722 Yoram Bachrach, Michal Kosinski, Thore Graepel, Pushmeet Kohli, and David Stillwell. 2012. FacebookPersonality_michal_29_04_12.pdf. (2012). https:\/\/doi.org\/10.1145\/2380718.2380722"},{"key":"e_1_2_1_9_1","volume-title":"Relational privacy and the networked governance of the self","author":"Bannerman Sara","year":"2019","unstructured":"Sara Bannerman . 2019. Relational privacy and the networked governance of the self . Information Communication and Society 22, 14 (12 2019 ), 2187--2202. https:\/\/doi.org\/10.1080\/1369118X.2018.1478982 10.1080\/1369118X.2018.1478982 Sara Bannerman. 2019. Relational privacy and the networked governance of the self. Information Communication and Society 22, 14 (12 2019), 2187--2202. https:\/\/doi.org\/10.1080\/1369118X.2018.1478982"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2017.04.013"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067860.1067862"},{"key":"e_1_2_1_12_1","volume-title":"Buzzanell","author":"Berkelaar Brenda L.","year":"2015","unstructured":"Brenda L. Berkelaar and Patrice M . Buzzanell . 2015 . Online Employment Screening and Digital Career Capital. Management Communication Quarterly 29, 1 (2 2015), 84--113. https:\/\/doi.org\/10.1177\/0893318914554657 10.1177\/0893318914554657 Brenda L. Berkelaar and Patrice M. Buzzanell. 2015. Online Employment Screening and Digital Career Capital. Management Communication Quarterly 29, 1 (2 2015), 84--113. https:\/\/doi.org\/10.1177\/0893318914554657"},{"key":"e_1_2_1_14_1","volume-title":"Why youth (heart) social network sites: The role of networked publics in teenage social life. papers.ssrn.com","author":"Boyd Danah","year":"2009","unstructured":"Danah Boyd . 2009. Why youth (heart) social network sites: The role of networked publics in teenage social life. papers.ssrn.com ( 2009 ). https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1518924 Danah Boyd. 2009. Why youth (heart) social network sites: The role of networked publics in teenage social life. papers.ssrn.com (2009). https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1518924"},{"key":"e_1_2_1_15_1","unstructured":"Danah Boyd. 2010. 'Public Default Private When Necessary'. boyd - Google Scholar. available:http:\/\/dmlcentral.net\/blog\/danah-boyd\/public-default-private-when-necessary  Danah Boyd. 2010. 'Public Default Private When Necessary'. boyd - Google Scholar. available:http:\/\/dmlcentral.net\/blog\/danah-boyd\/public-default-private-when-necessary"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"key":"e_1_2_1_17_1","volume-title":"Time Collapse in Social Media: Extending the Context Collapse","author":"Brandtzaeg Petter Bae","year":"2018","unstructured":"Petter Bae Brandtzaeg and Marika L\u00fcders . 2018. Time Collapse in Social Media: Extending the Context Collapse . Social Media Society 4, 1 (1 2018 ), 205630511876334. https:\/\/doi.org\/10.1177\/2056305118763349 10.1177\/2056305118763349 Petter Bae Brandtzaeg and Marika L\u00fcders. 2018. Time Collapse in Social Media: Extending the Context Collapse. Social Media Society 4, 1 (1 2018), 205630511876334. https:\/\/doi.org\/10.1177\/2056305118763349"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415244"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077699016640224"},{"key":"e_1_2_1_21_1","volume-title":"Conference on Human Factors in Computing Systems - Proceedings. Association for Computing Machinery","author":"Coles-Kemp Lizzie","unstructured":"Lizzie Coles-Kemp , Rikke Bjerg Jensen , and Claude P.R. Heath . 2020. Too Much Information: Questioning Security in a Post-Digital Society . In Conference on Human Factors in Computing Systems - Proceedings. Association for Computing Machinery , New York, NY, USA, 1--14. https:\/\/doi.org\/10.1145\/3313831.3376214 10.1145\/3313831.3376214 Lizzie Coles-Kemp, Rikke Bjerg Jensen, and Claude P.R. Heath. 2020. Too Much Information: Questioning Security in a Post-Digital Society. In Conference on Human Factors in Computing Systems - Proceedings. Association for Computing Machinery, New York, NY, USA, 1--14. https:\/\/doi.org\/10.1145\/3313831.3376214"},{"key":"e_1_2_1_22_1","volume-title":"Affordances-in-practice: An ethnographic critique of social media logic and context collapse. New media & society 20, 10 (10","author":"Costa Elisabetta","year":"2018","unstructured":"Elisabetta Costa . 2018 . Affordances-in-practice: An ethnographic critique of social media logic and context collapse. New media & society 20, 10 (10 2018), 3641--3656. https:\/\/doi.org\/10.1177\/1461444818756290 10.1177\/1461444818756290 Elisabetta Costa. 2018. Affordances-in-practice: An ethnographic critique of social media logic and context collapse. New media & society 20, 10 (10 2018), 3641--3656. https:\/\/doi.org\/10.1177\/1461444818756290"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2014.888458"},{"key":"e_1_2_1_24_1","volume-title":"Reciprocity of reciprocity of self-disclosure and liking: Three meta-analyses reviewed. In Balancing the Secrets of Private Disclosures","author":"Dindia Kathryn","unstructured":"Kathryn Dindia . 2000. Sex Differences in Self-Disclosure , Reciprocity of reciprocity of self-disclosure and liking: Three meta-analyses reviewed. In Balancing the Secrets of Private Disclosures . Routledge , 37--52. https:\/\/doi.org\/10.4324\/9781410604606--10\/SEX-IFFERENCES-SELF-ISCLOSURE-ECIPROCITY 10.4324\/9781410604606--10 Kathryn Dindia. 2000. Sex Differences in Self-Disclosure, Reciprocity of reciprocity of self-disclosure and liking: Three meta-analyses reviewed. In Balancing the Secrets of Private Disclosures. Routledge, 37--52. https:\/\/doi.org\/10.4324\/9781410604606--10\/SEX-IFFERENCES-SELF-ISCLOSURE-ECIPROCITY"},{"key":"e_1_2_1_25_1","volume-title":"Wallach","author":"Dressler Judson C.","year":"2015","unstructured":"Judson C. Dressler , Christopher Bronk , and Daniel S . Wallach . 2015 . Exploiting military OpSec through open-source vulnerabilities. Vol. 2015-Decem. IEEE. 450-- 458 pages. https:\/\/doi.org\/10.1109\/MILCOM.2015.7357484 10.1109\/MILCOM.2015.7357484 Judson C. Dressler, Christopher Bronk, and Daniel S. Wallach. 2015. Exploiting military OpSec through open-source vulnerabilities. Vol. 2015-Decem. IEEE. 450--458 pages. https:\/\/doi.org\/10.1109\/MILCOM.2015.7357484"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2683467.2683475"},{"key":"e_1_2_1_27_1","unstructured":"David Ellis Lukasz Piwekis and Adam Joinson. 2016. The future of wearable technology -- Centre for Research and Evidence on Security Threats. https:\/\/crestresearch.ac.uk\/comment\/the-future-of-wearable-technology\/  David Ellis Lukasz Piwekis and Adam Joinson. 2016. The future of wearable technology -- Centre for Research and Evidence on Security Threats. https:\/\/crestresearch.ac.uk\/comment\/the-future-of-wearable-technology\/"},{"key":"e_1_2_1_28_1","volume-title":"Do smartphone usage scales predict behavior? International Journal of Human Computer Studies 130 (10","author":"Ellis David A.","year":"2019","unstructured":"David A. Ellis , Brittany I. Davidson , Heather Shaw , and Kristoffer Geyer . 2019. Do smartphone usage scales predict behavior? International Journal of Human Computer Studies 130 (10 2019 ), 86--92. https:\/\/doi.org\/10.1016\/j.ijhcs.2019.05.004 10.1016\/j.ijhcs.2019.05.004 David A. Ellis, Brittany I. Davidson, Heather Shaw, and Kristoffer Geyer. 2019. Do smartphone usage scales predict behavior? International Journal of Human Computer Studies 130 (10 2019), 86--92. https:\/\/doi.org\/10.1016\/j.ijhcs.2019.05.004"},{"key":"e_1_2_1_29_1","volume-title":"Durrant","author":"Elsden Chris","year":"2016","unstructured":"Chris Elsden , David S. Kirk , and Abigail C . Durrant . 2016 . A Quantified Past: Toward Design for Remembering With Personal Informatics. Human-Computer Interaction 31, 6 (11 2016), 518--557. https:\/\/doi.org\/10.1080\/07370024.2015.1093422 10.1080\/07370024.2015.1093422 Chris Elsden, David S. Kirk, and Abigail C. Durrant. 2016. A Quantified Past: Toward Design for Remembering With Personal Informatics. Human-Computer Interaction 31, 6 (11 2016), 518--557. https:\/\/doi.org\/10.1080\/07370024.2015.1093422"},{"key":"e_1_2_1_30_1","volume-title":"Design activism: beautiful strangeness for a sustainable world","author":"Fuad-Luke Alastair","unstructured":"Alastair Fuad-Luke . 2013. Design activism: beautiful strangeness for a sustainable world . Routledge . Alastair Fuad-Luke. 2013. Design activism: beautiful strangeness for a sustainable world. Routledge."},{"key":"e_1_2_1_31_1","volume-title":"Design: Cultural probes. Interactions 6, 1 (1","author":"Gaver Bill","year":"1999","unstructured":"Bill Gaver , Tony Dunn , and Elena Pacenti . 1999 . Design: Cultural probes. Interactions 6, 1 (1 1999), 21--29. https:\/\/doi.org\/10.1145\/291224.291235 10.1145\/291224.291235 Bill Gaver, Tony Dunn, and Elena Pacenti. 1999. Design: Cultural probes. Interactions 6, 1 (1 1999), 21--29. https:\/\/doi.org\/10.1145\/291224.291235"},{"key":"e_1_2_1_32_1","unstructured":"Erving Goffman. 1959. The Presentation of Self in Everyday Life. https:\/\/books.google.co.uk\/books?hl=en&lr=&id=TlIAzT5uT-IC&oi=fnd&pg=PA120&ots=IuGdfiLkoa&sig=D4qf0QBOVwXTiGoRVHUywbr7Mik&redir_esc=y#v= onepage&q&f=false  Erving Goffman. 1959. The Presentation of Self in Everyday Life. https:\/\/books.google.co.uk\/books?hl=en&lr=&id=TlIAzT5uT-IC&oi=fnd&pg=PA120&ots=IuGdfiLkoa&sig=D4qf0QBOVwXTiGoRVHUywbr7Mik&redir_esc=y#v= onepage&q&f=false"},{"key":"e_1_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Eric Gordon and Gabriel Mugar. 2020. Meaningful Inefficiencies. Oxford University Press.  Eric Gordon and Gabriel Mugar. 2020. Meaningful Inefficiencies. Oxford University Press.","DOI":"10.1093\/oso\/9780190870140.001.0001"},{"key":"e_1_2_1_34_1","volume-title":"When does manipulation turn a design 'dark'? Interactions 27, 1 (12","author":"Gray Colin","year":"2019","unstructured":"Colin Gray and Shruthi Sai Chivukula . 2019. When does manipulation turn a design 'dark'? Interactions 27, 1 (12 2019 ), 96--96. https:\/\/doi.org\/10.1145\/3375016 10.1145\/3375016 Colin Gray and Shruthi Sai Chivukula. 2019. When does manipulation turn a design 'dark'? Interactions 27, 1 (12 2019), 96--96. https:\/\/doi.org\/10.1145\/3375016"},{"key":"e_1_2_1_35_1","volume-title":"Violence, & Abuse","author":"Grimani Aikaterini","year":"2020","unstructured":"Aikaterini Grimani , Anna Gavine , and Wendy Moncur . 2020. An evidence synthesis of covert online strategies regarding intimate partner violence. Trauma , Violence, & Abuse ( 2020 ). https:\/\/doi.org\/10.1016\/j.drugpo.2019.102621 10.1016\/j.drugpo.2019.102621 Aikaterini Grimani, Anna Gavine, and Wendy Moncur. 2020. An evidence synthesis of covert online strategies regarding intimate partner violence. Trauma, Violence, & Abuse (2020). https:\/\/doi.org\/10.1016\/j.drugpo.2019.102621"},{"key":"e_1_2_1_37_1","volume-title":"Conference on Human Factors in Computing Systems - Proceedings. Association for Computing Machinery, 2895--2907","author":"Haimson Oliver L.","unstructured":"Oliver L. Haimson , Jed R. Brubaker , Lynn Dombrowski , and Gillian R. Hayes . 2016. Digital footprints and changing networks during online identity transitions . In Conference on Human Factors in Computing Systems - Proceedings. Association for Computing Machinery, 2895--2907 . https:\/\/doi.org\/10.1145\/2858036.2858136 10.1145\/2858036.2858136 Oliver L. Haimson, Jed R. Brubaker, Lynn Dombrowski, and Gillian R. Hayes. 2016. Digital footprints and changing networks during online identity transitions. In Conference on Human Factors in Computing Systems - Proceedings. Association for Computing Machinery, 2895--2907. https:\/\/doi.org\/10.1145\/2858036.2858136"},{"key":"e_1_2_1_38_1","first-page":"3737","article-title":"What can i really do?","volume":"10","author":"Hargittai Eszter","year":"2016","unstructured":"Eszter Hargittai and Alice Marwick . 2016 . \" What can i really do? \" Explaining the privacy paradox with online apathy. International Journal of Communication 10 (2016), 3737 -- 3757 . https:\/\/doi.org\/10.5167\/uzh-148157 10.5167\/uzh-148157 Eszter Hargittai and Alice Marwick. 2016. \"What can i really do?\" Explaining the privacy paradox with online apathy. International Journal of Communication 10 (2016), 3737--3757. https:\/\/doi.org\/10.5167\/uzh-148157","journal-title":"International Journal of Communication"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2677199.2691601"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556975"},{"key":"e_1_2_1_41_1","volume-title":"Analysis of privacy in online social networks of Runet","author":"Kisilevich Slava","year":"1854","unstructured":"Slava Kisilevich and Florian Mansmann . 2010. Analysis of privacy in online social networks of Runet . Association for Computing Machinery . 46--55 pages. https:\/\/doi.org\/10.1145\/ 1854 099.1854112 10.1145\/1854099.1854112 Slava Kisilevich and Florian Mansmann. 2010. Analysis of privacy in online social networks of Runet. Association for Computing Machinery. 46--55 pages. https:\/\/doi.org\/10.1145\/1854099.1854112"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10708-014-9601-7"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2010.6"},{"key":"e_1_2_1_44_1","unstructured":"Gunther Kress. 2003. Literacy in the New Media Age - Gunther R. Kress - Google Books. https:\/\/books.google.co.uk\/books?hl=en&lr=&id=2vaNeafOoiYC&oi=fnd&pg=PP17&dq=guntherkressmedia&ots=Uwjel_v8Mb&sig=1Mf-h0rPc5I4ZiM2bbTcurjebbI#v=onepage&q=gunther%20kress%20media&f=false  Gunther Kress. 2003. Literacy in the New Media Age - Gunther R. Kress - Google Books. https:\/\/books.google.co.uk\/books?hl=en&lr=&id=2vaNeafOoiYC&oi=fnd&pg=PP17&dq=guntherkressmedia&ots=Uwjel_v8Mb&sig=1Mf-h0rPc5I4ZiM2bbTcurjebbI#v=onepage&q=gunther%20kress%20media&f=false"},{"key":"e_1_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Ian Li Anind Dey and Jodi Forlizzi. 2010. A Stage-Based Model of Personal Informatics Systems. http:\/\/daytum.com  Ian Li Anind Dey and Jodi Forlizzi. 2010. A Stage-Based Model of Personal Informatics Systems. http:\/\/daytum.com","DOI":"10.1145\/1753326.1753409"},{"key":"e_1_2_1_46_1","volume-title":"September","author":"Losada David E.","year":"2019","unstructured":"David E. Losada , Fabio Crestani , and Javier Parapar . 2019. Overview of eRisk 2019 Early Risk Prediction on the Internet. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11696 LNCS , September ( 2019 ), 340--357. https:\/\/doi.org\/10.1007\/978--3-030--28577--7{_}27 10.1007\/978--3-030--28577--7 David E. Losada, Fabio Crestani, and Javier Parapar. 2019. Overview of eRisk 2019 Early Risk Prediction on the Internet. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11696 LNCS, September (2019), 340--357. https:\/\/doi.org\/10.1007\/978--3-030--28577--7{_}27"},{"key":"e_1_2_1_47_1","volume-title":"Feeling your data: Touch and making sense of personal digital data:. https:\/\/doi.org\/10.1177\/1461444817717515 19, 10 (7","author":"Lupton Deborah","year":"2017","unstructured":"Deborah Lupton . 2017. Feeling your data: Touch and making sense of personal digital data:. https:\/\/doi.org\/10.1177\/1461444817717515 19, 10 (7 2017 ), 1599--1614. https:\/\/doi.org\/10.1177\/1461444817717515 10.1177\/1461444817717515 Deborah Lupton. 2017. Feeling your data: Touch and making sense of personal digital data:. https:\/\/doi.org\/10.1177\/1461444817717515 19, 10 (7 2017), 1599--1614. https:\/\/doi.org\/10.1177\/1461444817717515"},{"key":"e_1_2_1_48_1","volume-title":"Data selves: more-than-human perspectives","author":"Lupton Deborah","unstructured":"Deborah Lupton . 2019. Data selves: more-than-human perspectives . John Wiley and Sons Inc . 154 pages. Deborah Lupton. 2019. Data selves: more-than-human perspectives. John Wiley and Sons Inc. 154 pages."},{"key":"e_1_2_1_49_1","volume-title":"The foundations of EU data protection law. https:\/\/books.google.com\/books?hl=en&lr=&id=jCXYCgAAQBAJ&oi=fnd&pg=PP1dq=Lynskey,Orla.ThefoundationsofEUdataprotectionlaw","author":"Lynskey Orla","year":"2015","unstructured":"Orla Lynskey . 2015. The foundations of EU data protection law. https:\/\/books.google.com\/books?hl=en&lr=&id=jCXYCgAAQBAJ&oi=fnd&pg=PP1dq=Lynskey,Orla.ThefoundationsofEUdataprotectionlaw . OxfordUniversityPress , 2015 .&ots=iXfY77KwAd&sig=Hz7XDNKqkyAnKWBAM7slVCIGr-M Orla Lynskey. 2015. The foundations of EU data protection law. https:\/\/books.google.com\/books?hl=en&lr=&id=jCXYCgAAQBAJ&oi=fnd&pg=PP1dq=Lynskey,Orla.ThefoundationsofEUdataprotectionlaw.OxfordUniversityPress,2015.&ots=iXfY77KwAd&sig=Hz7XDNKqkyAnKWBAM7slVCIGr-M"},{"key":"e_1_2_1_50_1","volume-title":"Polymedia: Towards a new theory of digital media in interpersonal communication:. International Journal of Cultural Studies (8","author":"Madianou Mirca","year":"2012","unstructured":"Mirca Madianou and Daniel Miller . 2012 . Polymedia: Towards a new theory of digital media in interpersonal communication:. International Journal of Cultural Studies (8 2012). https:\/\/doi.org\/10.1177\/1367877912452486 10.1177\/1367877912452486 Mirca Madianou and Daniel Miller. 2012. Polymedia: Towards a new theory of digital media in interpersonal communication:. International Journal of Cultural Studies (8 2012). https:\/\/doi.org\/10.1177\/1367877912452486"},{"key":"e_1_2_1_51_1","volume-title":"Networked privacy: How teenagers negotiate context in social media","author":"Marwick Alice E","year":"2014","unstructured":"Alice E Marwick and danah boyd. 2014. Networked privacy: How teenagers negotiate context in social media . New Media & Society 16, 7 (11 2014 ), 1051--1067. https:\/\/doi.org\/10.1177\/1461444814543995 10.1177\/1461444814543995 Alice E Marwick and danah boyd. 2014. Networked privacy: How teenagers negotiate context in social media. New Media & Society 16, 7 (11 2014), 1051--1067. https:\/\/doi.org\/10.1177\/1461444814543995"},{"key":"e_1_2_1_52_1","volume-title":"The Politics of Privacy Theories: Moving from Norms to Vulnerabilities. (4","author":"McDonald Nora","year":"2020","unstructured":"Nora McDonald and Andrea Forte . 2020. The Politics of Privacy Theories: Moving from Norms to Vulnerabilities. (4 2020 ), 1--14. https:\/\/doi.org\/10.1145\/3313831.3376167 10.1145\/3313831.3376167 Nora McDonald and Andrea Forte. 2020. The Politics of Privacy Theories: Moving from Norms to Vulnerabilities. (4 2020), 1--14. https:\/\/doi.org\/10.1145\/3313831.3376167"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/01900692.2019.1575664"},{"key":"e_1_2_1_54_1","unstructured":"Metro. 2021. Navy officer 'filmed X-rated video at Faslane nuclear base' | Metro News. https:\/\/metro.co.uk\/2021\/02\/08\/navy-officer-filmed-x-rated-video-at-faslane-nuclear-base-14039731\/  Metro. 2021. Navy officer 'filmed X-rated video at Faslane nuclear base' | Metro News. https:\/\/metro.co.uk\/2021\/02\/08\/navy-officer-filmed-x-rated-video-at-faslane-nuclear-base-14039731\/"},{"key":"e_1_2_1_55_1","volume-title":"Memory in the Twenty-First Century: New Critical Perspectives from the Arts, Humanities, and Sciences","author":"Moncur Wendy","year":"2058","unstructured":"Wendy Moncur . 2016. Living digitally . In Memory in the Twenty-First Century: New Critical Perspectives from the Arts, Humanities, and Sciences . Palgrave Macmillan UK , 108--112. https:\/\/doi.org\/10.1057\/97811375 2058 6{_}13 10.1057\/9781137520586 Wendy Moncur. 2016. Living digitally. In Memory in the Twenty-First Century: New Critical Perspectives from the Arts, Humanities, and Sciences. Palgrave Macmillan UK, 108--112. https:\/\/doi.org\/10.1057\/9781137520586{_}13"},{"key":"e_1_2_1_56_1","unstructured":"NCSC. 2018. The cyber threat to UK business 2017--2018 report. https:\/\/www.ncsc.gov.uk\/information\/the-cyber-threat-to-uk-business-2017--2018-report  NCSC. 2018. The cyber threat to UK business 2017--2018 report. https:\/\/www.ncsc.gov.uk\/information\/the-cyber-threat-to-uk-business-2017--2018-report"},{"key":"e_1_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Helen Nissenbaum. 2009. Privacy in Context: Technology Policy and the Integrity of Social Life. https:\/\/dl.acm.org\/doi\/10.5555\/1822585  Helen Nissenbaum. 2009. Privacy in Context: Technology Policy and the Integrity of Social Life. https:\/\/dl.acm.org\/doi\/10.5555\/1822585","DOI":"10.1515\/9780804772891"},{"key":"e_1_2_1_58_1","volume-title":"A Contextual Approach to Privacy Online. Daedalus 140, 4 (10","author":"Nissenbaum Helen","year":"2011","unstructured":"Helen Nissenbaum . 2011. A Contextual Approach to Privacy Online. Daedalus 140, 4 (10 2011 ), 32--48. https:\/\/doi.org\/10.1162\/DAED{_}A{_}00113 10.1162\/DAED Helen Nissenbaum. 2011. A Contextual Approach to Privacy Online. Daedalus 140, 4 (10 2011), 32--48. https:\/\/doi.org\/10.1162\/DAED{_}A{_}00113"},{"key":"e_1_2_1_59_1","volume-title":"Sunlight alone is not a disinfectant: Consent and the futility of opening Big Data black boxes (without assistance)","author":"Obar Jonathan A.","year":"2020","unstructured":"Jonathan A. Obar . 2020. Sunlight alone is not a disinfectant: Consent and the futility of opening Big Data black boxes (without assistance) . Big Data and Society 7, 1 ( 2020 ). https:\/\/doi.org\/10.1177\/2053951720935615 10.1177\/2053951720935615 Jonathan A. Obar. 2020. Sunlight alone is not a disinfectant: Consent and the futility of opening Big Data black boxes (without assistance). Big Data and Society 7, 1 (2020). https:\/\/doi.org\/10.1177\/2053951720935615"},{"key":"e_1_2_1_60_1","unstructured":"Open Rights Group. [n.d.]. Who do they think you are? | Open Rights Group. https:\/\/www.openrightsgroup.org\/campaign\/who-do-they-think-you-are\/  Open Rights Group. [n.d.]. Who do they think you are? | Open Rights Group. https:\/\/www.openrightsgroup.org\/campaign\/who-do-they-think-you-are\/"},{"key":"e_1_2_1_61_1","volume-title":"Opportunities and challenges of the digital lifespan: views of service providers and citizens in the UK","author":"Orzech Kathryn M.","year":"2018","unstructured":"Kathryn M. Orzech , Wendy Moncur , Abigail Durrant , and Diego Trujillo-Pisanty . 2018. Opportunities and challenges of the digital lifespan: views of service providers and citizens in the UK . Information Communication and Society ( 2018 ). https:\/\/doi.org\/10.1080\/1369118X.2016.1257043 10.1080\/1369118X.2016.1257043 Kathryn M. Orzech, Wendy Moncur, Abigail Durrant, and Diego Trujillo-Pisanty. 2018. Opportunities and challenges of the digital lifespan: views of service providers and citizens in the UK. Information Communication and Society (2018). https:\/\/doi.org\/10.1080\/1369118X.2016.1257043"},{"key":"#cr-split#-e_1_2_1_62_1.1","doi-asserted-by":"crossref","unstructured":"Ga\u00eblle Ouvrein and Karen Verswijvel. 2019. Sharenting: Parental adoration or public humiliation? A focus group study on adolescents' experiences with sharenting against the background of their own impression management. Children and Youth Services Review 99 (4 2019) 319--327. https:\/\/doi.org\/10.1016\/j.childyouth.2019.02.011 10.1016\/j.childyouth.2019.02.011","DOI":"10.1016\/j.childyouth.2019.02.011"},{"key":"#cr-split#-e_1_2_1_62_1.2","doi-asserted-by":"crossref","unstructured":"Ga\u00eblle Ouvrein and Karen Verswijvel. 2019. Sharenting: Parental adoration or public humiliation? A focus group study on adolescents' experiences with sharenting against the background of their own impression management. Children and Youth Services Review 99 (4 2019) 319--327. https:\/\/doi.org\/10.1016\/j.childyouth.2019.02.011","DOI":"10.1016\/j.childyouth.2019.02.011"},{"key":"e_1_2_1_63_1","unstructured":"Alex Pentland. 2012. Reinventing society in the wake of big data. https:\/\/www.edge.org\/conversation\/alex_sandy_pentland-reinventing-society-in-the-wake-of-big-data  Alex Pentland. 2012. Reinventing society in the wake of big data. https:\/\/www.edge.org\/conversation\/alex_sandy_pentland-reinventing-society-in-the-wake-of-big-data"},{"key":"e_1_2_1_64_1","volume-title":"Why data is not enough: Digital traces as control of self and self-control","author":"Reigeluth Tyler","year":"2014","unstructured":"Tyler Reigeluth . 2014. Why data is not enough: Digital traces as control of self and self-control . Surveillance and Society 12, 2 (5 2014 ), 243--254. https:\/\/doi.org\/10.24908\/ss.v12i2.4741 10.24908\/ss.v12i2.4741 Tyler Reigeluth. 2014. Why data is not enough: Digital traces as control of self and self-control. Surveillance and Society 12, 2 (5 2014), 243--254. https:\/\/doi.org\/10.24908\/ss.v12i2.4741"},{"key":"e_1_2_1_65_1","volume-title":"The Right to Be Forgotten. Stanford Law Review Online 64","author":"Rosen Jeffrey","year":"2011","unstructured":"Jeffrey Rosen . 2011. The Right to Be Forgotten. Stanford Law Review Online 64 ( 2011 ). https:\/\/heinonline.org\/HOL\/Page?handle=hein.journals\/slro64&id=89&div=17&collection=journals Jeffrey Rosen. 2011. The Right to Be Forgotten. Stanford Law Review Online 64 (2011). https:\/\/heinonline.org\/HOL\/Page?handle=hein.journals\/slro64&id=89&div=17&collection=journals"},{"key":"e_1_2_1_66_1","volume-title":"Conference on Human Factors in Computing Systems - Proceedings (2009","author":"Ryan William","year":"2034","unstructured":"William Ryan , Martin Siegel , Erik Stolterman , Tonya Thompson , Heekyoung Jung , and William R. Hazlewood . 2009. Device Ecology Mapper: A tool for studying users' ecosystems of interactive artifacts . Conference on Human Factors in Computing Systems - Proceedings (2009 ), 4327--4332. https:\/\/doi.org\/10.1145\/15 2034 0.1520661 10.1145\/1520340.1520661 William Ryan, Martin Siegel, Erik Stolterman, Tonya Thompson, Heekyoung Jung, and William R. Hazlewood. 2009. Device Ecology Mapper: A tool for studying users' ecosystems of interactive artifacts. Conference on Human Factors in Computing Systems - Proceedings (2009), 4327--4332. https:\/\/doi.org\/10.1145\/1520340.1520661"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025886"},{"key":"e_1_2_1_68_1","volume-title":"Conference on Human Factors in Computing Systems - Proceedings (5","author":"Seberger John S.","year":"2021","unstructured":"John S. Seberger , Marissel Llavore , Nicholas Nye Wyant , Irina Shklovski , and Sameer Patil . 2021 . Empowering resignation there's an app for that . Conference on Human Factors in Computing Systems - Proceedings (5 2021). https:\/\/doi.org\/10.1145\/3411764.3445293 10.1145\/3411764.3445293 John S. Seberger, Marissel Llavore, Nicholas Nye Wyant, Irina Shklovski, and Sameer Patil. 2021. Empowering resignation there's an app for that. Conference on Human Factors in Computing Systems - Proceedings (5 2021). https:\/\/doi.org\/10.1145\/3411764.3445293"},{"key":"e_1_2_1_69_1","volume-title":"Sellen and Steve Whittaker","author":"Abigail","year":"2010","unstructured":"Abigail J. Sellen and Steve Whittaker . 2010 . Beyond total capture: A constructive critique of lifelogging. Commun. ACM 53, 5 (5 2010), 70--77. https:\/\/doi.org\/10.1145\/1735223.1735243 10.1145\/1735223.1735243 Abigail J. Sellen and Steve Whittaker. 2010. Beyond total capture: A constructive critique of lifelogging. Commun. ACM 53, 5 (5 2010), 70--77. https:\/\/doi.org\/10.1145\/1735223.1735243"},{"key":"e_1_2_1_70_1","volume-title":"Halla Hrund Sk\u00falad\u00f3ttir, and H\u00f6skuldur Borgthorsson","author":"Shklovski Irina","year":"2014","unstructured":"Irina Shklovski , Scott D Mainwaring , Halla Hrund Sk\u00falad\u00f3ttir, and H\u00f6skuldur Borgthorsson . 2014 . Leakiness and Creepiness in App Space : Perceptions of Privacy and Mobile App Use . (2014). https:\/\/doi.org\/10.1145\/2556288.2557421 10.1145\/2556288.2557421 Irina Shklovski, Scott D Mainwaring, Halla Hrund Sk\u00falad\u00f3ttir, and H\u00f6skuldur Borgthorsson. 2014. Leakiness and Creepiness in App Space: Perceptions of Privacy and Mobile App Use. (2014). https:\/\/doi.org\/10.1145\/2556288.2557421"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432951"},{"key":"e_1_2_1_72_1","unstructured":"Robert Sprague. 2011. Invasion of the Social Networks: Blurring the Line between Personal Life and the Employment Relationship. University of Louisville Law Review 50 (2011).  Robert Sprague. 2011. Invasion of the Social Networks: Blurring the Line between Personal Life and the Employment Relationship. University of Louisville Law Review 50 (2011)."},{"key":"e_1_2_1_73_1","volume-title":"Conference on Human Factors in Computing Systems - Proceedings. Association for Computing Machinery","author":"Strohmayer Angelika","year":"2019","unstructured":"Angelika Strohmayer , Jenn Clamen , and Mary Laing . 2019 . Technologies for social justice lessons from sex workers on the front lines . In Conference on Human Factors in Computing Systems - Proceedings. Association for Computing Machinery , New York, NY, USA, 1--14. https:\/\/doi.org\/10.1145\/3290605.3300882 10.1145\/3290605.3300882 Angelika Strohmayer, Jenn Clamen, and Mary Laing. 2019. Technologies for social justice lessons from sex workers on the front lines. In Conference on Human Factors in Computing Systems - Proceedings. Association for Computing Machinery, New York, NY, USA, 1--14. https:\/\/doi.org\/10.1145\/3290605.3300882"},{"key":"e_1_2_1_74_1","volume-title":"Identifying Participants in the Personal Genome Project by Name (A Re-identification Experiment). SSRN Electronic Journal","author":"Sweeney Latanya","year":"2013","unstructured":"Latanya Sweeney , Akua Abu , and Julia Winn . 2013. Identifying Participants in the Personal Genome Project by Name (A Re-identification Experiment). SSRN Electronic Journal ( 2013 ), 1--4. https:\/\/doi.org\/10.2139\/ssrn.2257732 10.2139\/ssrn.2257732 Latanya Sweeney, Akua Abu, and Julia Winn. 2013. Identifying Participants in the Personal Genome Project by Name (A Re-identification Experiment). SSRN Electronic Journal (2013), 1--4. https:\/\/doi.org\/10.2139\/ssrn.2257732"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415205"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1177\/0022185617723380"},{"key":"e_1_2_1_77_1","volume-title":"Communication & Society","author":"Tufekci Zeynep","year":"2008","unstructured":"Zeynep Tufekci . 2008. GROOMING, GOSSIP, FACEBOOK AND MYSPACE. Information , Communication & Society ( 2008 ). https:\/\/doi.org\/10.1080\/13691180801999050 10.1080\/13691180801999050 Zeynep Tufekci. 2008. GROOMING, GOSSIP, FACEBOOK AND MYSPACE. Information, Communication & Society (2008). https:\/\/doi.org\/10.1080\/13691180801999050"},{"key":"e_1_2_1_79_1","volume-title":"A future-proof past: Designing for remembering experiences. Memory Studies 7, 3 (7","author":"van den Hoven Elise","year":"2014","unstructured":"Elise van den Hoven . 2014. A future-proof past: Designing for remembering experiences. Memory Studies 7, 3 (7 2014 ), 370--384. https:\/\/doi.org\/10.1177\/1750698014530625 10.1177\/1750698014530625 Elise van den Hoven. 2014. A future-proof past: Designing for remembering experiences. Memory Studies 7, 3 (7 2014), 370--384. https:\/\/doi.org\/10.1177\/1750698014530625"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820017"},{"key":"e_1_2_1_81_1","volume-title":"Yong Liao, Marios Iliofotou, Antonio Nucci, Zhi Li Zhang, and Aleksandar Kuzmanovic.","author":"Xia Ning","year":"2013","unstructured":"Ning Xia , Han Hee Song , Yong Liao, Marios Iliofotou, Antonio Nucci, Zhi Li Zhang, and Aleksandar Kuzmanovic. 2013 . Mosaic : Quantifying privacy leakage in mobile networks. Vol. 43 . 279--290 pages. https:\/\/doi.org\/10.1145\/2534169.2486008 10.1145\/2534169.2486008 Ning Xia, Han Hee Song, Yong Liao, Marios Iliofotou, Antonio Nucci, Zhi Li Zhang, and Aleksandar Kuzmanovic. 2013. Mosaic: Quantifying privacy leakage in mobile networks. Vol. 43. 279--290 pages. https:\/\/doi.org\/10.1145\/2534169.2486008"},{"key":"e_1_2_1_82_1","volume-title":"TAPESTRY: A De-centralized Service for Trusted Interaction Online","author":"Yang Yifan","year":"2020","unstructured":"Yifan Yang , Daniel Cooper , John Collomosse , Catalin Dragan , Mark Manulis , Jo Briggs , Jamie Steane , Arthi Manohar , Wendy Moncur , and Helen Jones . 2020 . TAPESTRY: A De-centralized Service for Trusted Interaction Online . IEEE Transactions on Services Computing ( 2020). https:\/\/doi.org\/10.1109\/TSC.2020.2993081 10.1109\/TSC.2020.2993081 Yifan Yang, Daniel Cooper, John Collomosse, Catalin Dragan, Mark Manulis, Jo Briggs, Jamie Steane, Arthi Manohar, Wendy Moncur, and Helen Jones. 2020. TAPESTRY: A De-centralized Service for Trusted Interaction Online. IEEE Transactions on Services Computing (2020). https:\/\/doi.org\/10.1109\/TSC.2020.2993081"},{"key":"e_1_2_1_83_1","volume-title":"Young and Anabel Quan-Haase","author":"Alyson","year":"2009","unstructured":"Alyson L. Young and Anabel Quan-Haase . 2009 . Information revelation and internet privacy concerns on social network sites. (2009), 265. https:\/\/doi.org\/10.1145\/1556460.1556499 10.1145\/1556460.1556499 Alyson L. Young and Anabel Quan-Haase. 2009. Information revelation and internet privacy concerns on social network sites. (2009), 265. https:\/\/doi.org\/10.1145\/1556460.1556499"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555214","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3555214","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:14Z","timestamp":1750182554000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555214"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":82,"journal-issue":{"issue":"CSCW2","published-print":{"date-parts":[[2022,11,7]]}},"alternative-id":["10.1145\/3555214"],"URL":"https:\/\/doi.org\/10.1145\/3555214","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}