{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:07Z","timestamp":1750220047188,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,3]],"date-time":"2023-04-03T00:00:00Z","timestamp":1680480000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,3]]},"DOI":"10.1145\/3583961.3583970","type":"proceedings-article","created":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T18:12:41Z","timestamp":1685383961000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Contextualit\u00e9 des questions de privacy dans l'utilisation de services interactifs et cons\u00e9quences pour la conception"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2807-6894","authenticated-orcid":false,"given":"Myriam","family":"FREJUS","sequence":"first","affiliation":[{"name":"EDF R&amp;D, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5008-8088","authenticated-orcid":false,"given":"Julien","family":"GUIBOURDENCHE","sequence":"additional","affiliation":[{"name":"AKTEN &amp; University of Geneva, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9644-990X","authenticated-orcid":false,"given":"Dominique","family":"MARTINI","sequence":"additional","affiliation":[{"name":"ITG, France"}]}],"member":"320","published-online":{"date-parts":[[2023,5,29]]},"reference":[{"volume-title":"CHI EA '99: CHI '99 Extended Abstracts on Human Factors in Computing Systems","author":"Ackerman M.","key":"e_1_3_2_1_1_1","unstructured":"M. Ackerman and L. Cranor , 1999 Privacy critics: UI components to safeguard users' privacy . CHI EA '99: CHI '99 Extended Abstracts on Human Factors in Computing Systems M. Ackerman and L. Cranor, 1999 Privacy critics: UI components to safeguard users' privacy. CHI EA '99: CHI '99 Extended Abstracts on Human Factors in Computing Systems"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the ACM 1999 Conference on Electronic Commerce. New York: ACM.","author":"Ackerman M.","year":"1999","unstructured":"M. Ackerman , L., Cranor & J. Reagle . 1999 . Privacy in e-commerce: Examining user scenarios and privacy preferences . Proceedings of the ACM 1999 Conference on Electronic Commerce. New York: ACM. M. Ackerman, L., Cranor & J. Reagle. 1999. Privacy in e-commerce: Examining user scenarios and privacy preferences. Proceedings of the ACM 1999 Conference on Electronic Commerce. New York: ACM."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"M. Ackerman T. Darrell and D. J. Weitzner .2001 Privacy in Context. Human-Computer Interaction 16(2)  M. Ackerman T. Darrell and D. J. Weitzner .2001 Privacy in Context. Human-Computer Interaction 16(2)","DOI":"10.1207\/S15327051HCI16234_03"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_1_5_1","volume-title":"Cambridge, MA: MIT Press.","author":"Agre P.","year":"1997","unstructured":"P. Agre and M. Rotenberg (Eds.). 1997 . Technology and privacy: The new technological landscape. Cambridge, MA: MIT Press. P. Agre and M. Rotenberg (Eds.). 1997. Technology and privacy: The new technological landscape. Cambridge, MA: MIT Press."},{"key":"e_1_3_2_1_6_1","unstructured":"M. Alaoui M. Lewkowicz and A. Seffah. 2012. Increasing Elderly Social Relationships Through TV-Based Services. HI\u201912 January 28\u201330 2012 Miami Florida USA.  M. Alaoui M. Lewkowicz and A. Seffah. 2012. Increasing Elderly Social Relationships Through TV-Based Services. HI\u201912 January 28\u201330 2012 Miami Florida USA."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1016\/j.procs.2019.04.088","article-title":"A Method Toward Privacy Protection in Context-Aware Environment","volume":"151","author":"Alawadhia R.","year":"2019","unstructured":"R. Alawadhia and T. Hussain . 2019 . A Method Toward Privacy Protection in Context-Aware Environment . Procedia Computer Science 151 (2019) 659 \u2013 666 R. Alawadhia and T. Hussain. 2019. A Method Toward Privacy Protection in Context-Aware Environment. Procedia Computer Science 151 (2019) 659\u2013666","journal-title":"Procedia Computer Science"},{"issue":"1","key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","first-page":"81","DOI":"10.5840\/monist200891114","article-title":"Privacy without the right to privacy","volume":"91","author":"Anderson S.A.","year":"1991","unstructured":"S.A. Anderson . 1991 . Privacy without the right to privacy . The Monist , Vol. 91 , No. 1 , pp. 81 - 107 . Oxford University Press S.A. Anderson. 1991. Privacy without the right to privacy. The Monist, Vol. 91, No. 1, pp. 81-107. Oxford University Press","journal-title":"The Monist"},{"key":"e_1_3_2_1_9_1","volume-title":"CHI 2012","author":"Barkhuus L.","year":"2012","unstructured":"L. Barkhuus . 2012 . The Mismeasurement of Privacy: Using Contextual Integrity to Reconsider Privacy in HCI . CHI 2012 , May 5 \u201310 , 2012, Austin, Texas, USA L. Barkhuus. 2012. The Mismeasurement of Privacy: Using Contextual Integrity to Reconsider Privacy in HCI. CHI 2012, May 5\u201310, 2012, Austin, Texas, USA"},{"key":"e_1_3_2_1_10_1","volume-title":"Design for Privacy in Ubiquitous Computing Environments. Proceedings of the Third European Conference on Computer-Supported Cooperative Work","author":"Bellotti V.","year":"1993","unstructured":"V. Bellotti and A. Sellen . 1993 . Design for Privacy in Ubiquitous Computing Environments. Proceedings of the Third European Conference on Computer-Supported Cooperative Work , 13-17 September , 1993 , Milan, Italy. G. De Michelis, C. Simone and K Schmidt (Editors) V. Bellotti and A. Sellen. 1993. Design for Privacy in Ubiquitous Computing Environments. Proceedings of the Third European Conference on Computer-Supported Cooperative Work, 13-17 September, 1993, Milan, Italy. G. De Michelis, C. Simone and K Schmidt (Editors)"},{"issue":"4","key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","first-page":"355","DOI":"10.3917\/th.724.0355","article-title":"L'adoption des technologies en situation professionnelle\u00a0: quelle articulation possible entre acceptabilit\u00e9 et acceptation","volume":"72","author":"Bobillier Chaumon M.E.","year":"2009","unstructured":"M.E. Bobillier Chaumon and M. Dubois . 2009 . L'adoption des technologies en situation professionnelle\u00a0: quelle articulation possible entre acceptabilit\u00e9 et acceptation ? Travail Humain , 72 ( 4 ), 355 - 382 . M.E. Bobillier Chaumon and M. Dubois. 2009. L'adoption des technologies en situation professionnelle\u00a0: quelle articulation possible entre acceptabilit\u00e9 et acceptation ? Travail Humain, 72(4), 355-382.","journal-title":"Travail Humain"},{"volume-title":"The transparent society","author":"Brin D.","key":"e_1_3_2_1_12_1","unstructured":"D. Brin . 1999. The transparent society . New York : Perseus . D. Brin. 1999. The transparent society. New York: Perseus."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of HCI 2000 Conference on People and Computers XIV\u2013Usability or Else! (pp. 405-424)","author":"A.","year":"2000","unstructured":"Brostoff, S., & Sasse, A. ( 2000 ). Are passfaces more usable than passwords? In S. Mc-Donald, Y. Waern, & G. Cockton (Eds.) , Proceedings of HCI 2000 Conference on People and Computers XIV\u2013Usability or Else! (pp. 405-424) . London : Springer. Brostoff, S., & Sasse, A. (2000). Are passfaces more usable than passwords? In S. Mc-Donald, Y. Waern, & G. Cockton (Eds.), Proceedings of HCI 2000 Conference on People and Computers XIV\u2013Usability or Else! (pp. 405-424). London: Springer."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"B. Cahour C. Brassac P. Vermersch J. Bouraouis B. Pachoud and P. Salembier. 2007. \u00c9tude de l'exp\u00e9rience du sujet pour l'\u00e9valuation de nouvelles technologies : l'exemple d'une communication m\u00e9di\u00e9e. Revue d'anthropologie des connaissances vol. 1 1(1) 85-120.  B. Cahour C. Brassac P. Vermersch J. Bouraouis B. Pachoud and P. Salembier. 2007. \u00c9tude de l'exp\u00e9rience du sujet pour l'\u00e9valuation de nouvelles technologies : l'exemple d'une communication m\u00e9di\u00e9e. Revue d'anthropologie des connaissances vol. 1 1(1) 85-120.","DOI":"10.3917\/rac.001.0085"},{"key":"e_1_3_2_1_15_1","unstructured":"A. Cavoukian. 2009. Privacy by design: the 7 foundational principles. Information and Privacy Commissioner of Ontario.  A. Cavoukian. 2009. Privacy by design: the 7 foundational principles. Information and Privacy Commissioner of Ontario."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"A. Cavoukian J. Polonetsky and C. Wolf. 2010. SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation. IDIS (2010) 3:275\u2013294. DOI 10.1007\/s12394-010-0046-y  A. Cavoukian J. Polonetsky and C. Wolf. 2010. SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation. IDIS (2010) 3:275\u2013294. DOI 10.1007\/s12394-010-0046-y","DOI":"10.1007\/s12394-010-0046-y"},{"key":"e_1_3_2_1_17_1","unstructured":"A. Cavoukian and B. Weiss. 2012. Privacy by Design and User Interfaces: Emerging Design Criteria - Keep it User-Centric (Office of the Information and Privacy Commissioner Ontario Canada June  A. Cavoukian and B. Weiss. 2012. Privacy by Design and User Interfaces: Emerging Design Criteria - Keep it User-Centric (Office of the Information and Privacy Commissioner Ontario Canada June"},{"key":"e_1_3_2_1_18_1","first-page":"5","article-title":"Information Technology and","volume":"31","author":"Clarke R.","year":"1988","unstructured":"R. Clarke . 1988 . Information Technology and Dataveillance. Commun. ACM 31 , 5 (May 1988) 498-512 R. Clarke. 1988. Information Technology and Dataveillance. Commun. ACM 31,5 (May 1988) 498-512","journal-title":"Dataveillance. Commun. ACM"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"R. Compa\u00f1\u00f3 and W. Lusoli. 2010. The Policy Maker's Anguish: Regulating Personal Data Behavior Between Paradoxes and Dilemmas. In Economics of Information Security and Privacy (pp. 169-185). Springer US  R. Compa\u00f1\u00f3 and W. Lusoli. 2010. The Policy Maker's Anguish: Regulating Personal Data Behavior Between Paradoxes and Dilemmas. In Economics of Information Security and Privacy (pp. 169-185). Springer US","DOI":"10.1007\/978-1-4419-6967-5_9"},{"key":"e_1_3_2_1_20_1","volume-title":"Mahwah, NJ: Lawrence Erlbaum Associates.","author":"Cranor L.","year":"1998","unstructured":"L. Cranor and J. Reagle . 1998 . Designing a social protocol: Lessons learned from the platform for privacy preferences project. InJ. K. MacKie-Mason, & D. Waterman (Eds.), Telephony, the Internet , and the media. Mahwah, NJ: Lawrence Erlbaum Associates. L. Cranor and J. Reagle. 1998. Designing a social protocol: Lessons learned from the platform for privacy preferences project. InJ. K. MacKie-Mason, & D. Waterman (Eds.), Telephony, the Internet, and the media. Mahwah, NJ: Lawrence Erlbaum Associates."},{"key":"e_1_3_2_1_21_1","unstructured":"G. Danezis J. Domingo-Ferrer M. Hansen J. Hoepman D. Metayer R. Tirtea & S. Schiffner. 2014. Privacy and data protection by design-from policy to engineering. ENISA.  G. Danezis J. Domingo-Ferrer M. Hansen J. Hoepman D. Metayer R. Tirtea & S. Schiffner. 2014. Privacy and data protection by design-from policy to engineering. ENISA."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/j.ijhcs.2005.04.021","article-title":"In the eye of the beholder: A visualization-based approach to information system security","volume":"63","author":"DePaula R.","year":"2005","unstructured":"R. DePaula , X. Ding , P. Dourish , K. Nies , B. Pillet , D. Redmiles , 2005 . In the eye of the beholder: A visualization-based approach to information system security . International Journal of Human-Computer Studies , 63 , 5 - 24 . R. DePaula, X. Ding, P. Dourish, K. Nies, B. Pillet, D. Redmiles, 2005. In the eye of the beholder: A visualization-based approach to information system security. International Journal of Human-Computer Studies, 63, 5-24.","journal-title":"International Journal of Human-Computer Studies"},{"issue":"8","key":"e_1_3_2_1_23_1","first-page":"1","article-title":"A review on applications of ambient assisted living","volume":"176","author":"Desai A.","year":"2017","unstructured":"A. Desai and R. Jhaveri . 2017 . A review on applications of ambient assisted living . Int. J. Comput. Appl. 176 ( 8 ), 1 \u2013 7 . A. Desai and R. Jhaveri. 2017. A review on applications of ambient assisted living. Int. J. Comput. Appl. 176(8), 1\u20137.","journal-title":"Int. J. Comput. Appl."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"A. K. Dey P.J. Brown and G. D. Abowd. 1999. Towards a better understanding of context and context-awareness. In Handheld and ubiquitous computing (pp. 304-307). Springer Berlin Heidelberg.  A. K. Dey P.J. Brown and G. D. Abowd. 1999. Towards a better understanding of context and context-awareness. In Handheld and ubiquitous computing (pp. 304-307). Springer Berlin Heidelberg.","DOI":"10.1007\/3-540-48157-5_29"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci2103_2"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"E. Elias M.E. Chaumon and M. Vacher. 2018. Methods to Design Home Support for Elders. In J. Zhou and G. Salvendy (Eds.): Human Aspects of ITfor the Aged Population. ITAP. Springer International Publishing AG.  E. Elias M.E. Chaumon and M. Vacher. 2018. Methods to Design Home Support for Elders. In J. Zhou and G. Salvendy (Eds.): Human Aspects of ITfor the Aged Population. ITAP. Springer International Publishing AG.","DOI":"10.1007\/978-3-319-92037-5_21"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008648532192"},{"issue":"1","key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","first-page":"22","DOI":"10.2307\/2787117","article-title":"Secrecy, trust, and dangerous leisure: Generating group cohesion in voluntary organizations","volume":"59","author":"Fine G. A.","year":"1996","unstructured":"G. A. Fine and L. Holyfield . 1996 . Secrecy, trust, and dangerous leisure: Generating group cohesion in voluntary organizations . Social Psychology Quarterly , 59 ( 1 ), 22 \u2013 38 . G. A. Fine and L. Holyfield. 1996. Secrecy, trust, and dangerous leisure: Generating group cohesion in voluntary organizations. Social Psychology Quarterly, 59(1), 22\u201338.","journal-title":"Social Psychology Quarterly"},{"volume-title":"Proceedings of the ACM\/SIGSAC New Security Paradigms Workshop (pp. 49-57)","author":"Flechais I.","key":"e_1_3_2_1_29_1","unstructured":"I. Flechais , M.A. Sasse and S. Hailes . 2003. Bringing security home: A process for developing secure and useable systems . Proceedings of the ACM\/SIGSAC New Security Paradigms Workshop (pp. 49-57) . New York : ACM. I. Flechais, M.A. Sasse and S. Hailes. 2003. Bringing security home: A process for developing secure and useable systems. Proceedings of the ACM\/SIGSAC New Security Paradigms Workshop (pp. 49-57). New York: ACM."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"M. Fr\u00e9jus. 2019. \u00c9largissement et renouvellement des questions trait\u00e9es par l'ergonomie dans le domaine du d\u00e9veloppement durable : retour sur 12 ans de travaux sur les activit\u00e9s domestiques et la ma\u00eetrise des consommations \u00e9nerg\u00e9tiques. Psychologie Fran\u00e7aise. Volume 64 Issue 2 June 2019 Pages 179-196.  M. Fr\u00e9jus. 2019. \u00c9largissement et renouvellement des questions trait\u00e9es par l'ergonomie dans le domaine du d\u00e9veloppement durable : retour sur 12 ans de travaux sur les activit\u00e9s domestiques et la ma\u00eetrise des consommations \u00e9nerg\u00e9tiques. Psychologie Fran\u00e7aise. Volume 64 Issue 2 June 2019 Pages 179-196.","DOI":"10.1016\/j.psfr.2018.07.002"},{"key":"e_1_3_2_1_31_1","volume-title":"Ahram, T.Z., Falc\u00e3o, C.S. (eds) Advances in Usability, User Experience, Wearable and Assistive Technology. AHFE","author":"Fr\u00e9jus M.","year":"2021","unstructured":"M. Fr\u00e9jus & J. Guibourdenche 2021. Quantified self for others: lessons learned from the evaluation of a remote monitoring service of the activities of the elderly . In: Ahram, T.Z., Falc\u00e3o, C.S. (eds) Advances in Usability, User Experience, Wearable and Assistive Technology. AHFE 2021 . Lecture Notes in Networks and Systems, vol 275. Springer , Cham. M. Fr\u00e9jus & J. Guibourdenche 2021. Quantified self for others: lessons learned from the evaluation of a remote monitoring service of the activities of the elderly. In: Ahram, T.Z., Falc\u00e3o, C.S. (eds) Advances in Usability, User Experience, Wearable and Assistive Technology. AHFE 2021. Lecture Notes in Networks and Systems, vol 275. Springer, Cham."},{"key":"e_1_3_2_1_32_1","volume-title":"AHFE International Conference. AHFE Open Access, vol 47","author":"Fr\u00e9jus M.","year":"2022","unstructured":"M. Fr\u00e9jus , D. Lahoual & M. Gras-Gentiletti 2022 . Making Human-AI Interactions Sustainable: 7 Key Questions for a Human-Centered Perspective on AI. In: Francisco Rebelo (eds) Ergonomics In Design . AHFE International Conference. AHFE Open Access, vol 47 . AHFE International, USA. M. Fr\u00e9jus, D. Lahoual & M. Gras-Gentiletti 2022. Making Human-AI Interactions Sustainable: 7 Key Questions for a Human-Centered Perspective on AI. In: Francisco Rebelo (eds) Ergonomics In Design. AHFE International Conference. AHFE Open Access, vol 47. AHFE International, USA."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.2307\/1229519"},{"issue":"4","key":"e_1_3_2_1_34_1","first-page":"21","article-title":"Privacy and the limits of the law","volume":"89","author":"Gavison R.","year":"1980","unstructured":"R. Gavison . 1980 . Privacy and the limits of the law . Yale Law Journal , 89 , 4 , 21 - 471 . R. Gavison. 1980. Privacy and the limits of the law. Yale Law Journal, 89, 4,21-471.","journal-title":"Yale Law Journal"},{"key":"e_1_3_2_1_35_1","first-page":"12","article-title":"Analyse de contextes d'activit\u00e9 domestique pour la conception de syst\u00e8mes diffus \u00e9nerg\u00e9tiquement efficients","author":"Guibourdenche J.","year":"2015","unstructured":"J. Guibourdenche , J. Vacherand-Revel , M., Fr\u00e9jus and Y. Haradji . 2015 . Analyse de contextes d'activit\u00e9 domestique pour la conception de syst\u00e8mes diffus \u00e9nerg\u00e9tiquement efficients . Activit\u00e9s , 12 - 11 . J. Guibourdenche, J. Vacherand-Revel, M., Fr\u00e9jus and Y. Haradji. 2015. Analyse de contextes d'activit\u00e9 domestique pour la conception de syst\u00e8mes diffus \u00e9nerg\u00e9tiquement efficients. Activit\u00e9s, 12-1.","journal-title":"Activit\u00e9s"},{"key":"e_1_3_2_1_36_1","unstructured":"J. Hong and J. Landay. 2004. An Architecture for Privacy-Sensitive Ubiquitous Computing. MobiSys'04 June 6\u20139 2004 Boston Massachusetts USA.  J. Hong and J. Landay. 2004. An Architecture for Privacy-Sensitive Ubiquitous Computing. MobiSys'04 June 6\u20139 2004 Boston Massachusetts USA."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"X. Jiang J.I. Hong and J. A. Landay. 2002. Approximate information flows: Socially-based modeling of privacy in ubiquitous computing. In Ubicomp 2002: ubiquitous computing (pp. 176-193). Springer Berlin Heidelberg  X. Jiang J.I. Hong and J. A. Landay. 2002. Approximate information flows: Socially-based modeling of privacy in ubiquitous computing. In Ubicomp 2002: ubiquitous computing (pp. 176-193). Springer Berlin Heidelberg","DOI":"10.1007\/3-540-45809-3_14"},{"volume-title":"Proc. of CHI \u201809","author":"Klasnja P.","key":"e_1_3_2_1_38_1","unstructured":"P. Klasnja , S. Consolvo , J. Jung , B.M. Greenstein , L. LeGrand , P. Powledge and D. Wetherall . 2009. When I am on Wi-Fi, I am fearless: privacy concerns and practices in everyday Wi-Fi use . In Proc. of CHI \u201809 . ACM, New York, NY, USA. P. Klasnja, S. Consolvo, J. Jung, B.M. Greenstein, L. LeGrand, P. Powledge and D. Wetherall. 2009. When I am on Wi-Fi, I am fearless: privacy concerns and practices in everyday Wi-Fi use. In Proc. of CHI \u201809. ACM, New York, NY, USA."},{"key":"#cr-split#-e_1_3_2_1_39_1.1","doi-asserted-by":"crossref","unstructured":"T. Matzner and C. Ochs. 2019. Privacy. Internet Policy Review 8(4). DOI: 10.14763\/2019.4.1427 10.14763\/2019.4.1427","DOI":"10.14763\/2019.4.1427"},{"key":"#cr-split#-e_1_3_2_1_39_1.2","doi-asserted-by":"crossref","unstructured":"T. Matzner and C. Ochs. 2019. Privacy. Internet Policy Review 8(4). DOI: 10.14763\/2019.4.1427","DOI":"10.14763\/2019.4.1427"},{"key":"e_1_3_2_1_40_1","volume-title":"Delete: The Virtue of Forgetting in the Digital Age","author":"Mayer-Sch\u00f6nberger D.","year":"2009","unstructured":"D. Mayer-Sch\u00f6nberger . 2009 . Delete: The Virtue of Forgetting in the Digital Age . Princeton University Press , Princeton D. Mayer-Sch\u00f6nberger. 2009. Delete: The Virtue of Forgetting in the Digital Age. Princeton University Press, Princeton"},{"key":"e_1_3_2_1_41_1","first-page":"78","volume-title":"F.F.-H. Nah and C.-H","author":"Mc Creary F.","unstructured":"F. Mc Creary , A. Zafiroglu & H. Patterson . 2016. The Contextual Complexity of Privacy in Smart Homes and Smart Buildings . In F.F.-H. Nah and C.-H . Tan (Eds.): HCIBGO 2016, Part II, LNCS 9752, pp. 67\u2013 78 . F. Mc Creary, A. Zafiroglu & H. Patterson. 2016. The Contextual Complexity of Privacy in Smart Homes and Smart Buildings. In F.F.-H. Nah and C.-H. Tan (Eds.): HCIBGO 2016, Part II, LNCS 9752, pp. 67\u201378."},{"key":"e_1_3_2_1_42_1","first-page":"50","volume-title":"Proceedings of the 28th International Conference on Software Engineering","author":"Nehmer J.","unstructured":"J. Nehmer , M., Becker, A., Karshmer and R. Lamm . 2006. Living assistance systems: an ambient intelligence approach . In: Proceedings of the 28th International Conference on Software Engineering , pp. 43\u2013 50 . J. Nehmer, M., Becker, A., Karshmer and R. Lamm. 2006. Living assistance systems: an ambient intelligence approach. In: Proceedings of the 28th International Conference on Software Engineering, pp. 43\u201350."},{"key":"e_1_3_2_1_43_1","volume-title":"July","author":"Nilsson T.","year":"2018","unstructured":"T. Nilsson , A. Crabtree , J. Fische & B. Koleva . 2018. Breaching the Future: Understanding Human Challenges of Autonomous Systems for the Home , July 2018 . Rapport DOI: 10.13140\/RG.2.2.23719.85920. Project : Future Everyday Interaction with the Autonomous Internet of Things . 10.13140\/RG.2.2.23719.85920 T. Nilsson, A. Crabtree, J. Fische & B. Koleva. 2018. Breaching the Future: Understanding Human Challenges of Autonomous Systems for the Home, July 2018. Rapport DOI: 10.13140\/RG.2.2.23719.85920. Project: Future Everyday Interaction with the Autonomous Internet of Things."},{"key":"e_1_3_2_1_44_1","unstructured":"H. Nissenbaum. 2004. Privacy as Contextual Integrity. Washington Law Review 79 (30).  H. Nissenbaum. 2004. Privacy as Contextual Integrity. Washington Law Review 79 (30)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.11.4.404.14600"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of CHI","author":"Patterson H.","year":"2016","unstructured":"H. Patterson , A. Zafiroglu & F. McCreary . 2016 . Facets: a framework for developing privacy-minded usages . In: Proceedings of CHI 2016. H. Patterson, A. Zafiroglu & F. McCreary. 2016. Facets: a framework for developing privacy-minded usages. In: Proceedings of CHI 2016."},{"key":"e_1_3_2_1_48_1","first-page":"84","volume-title":"Boca Raton, FL: CRC Press.","author":"Poizat G.","year":"2013","unstructured":"G. Poizat , M., Fr\u00e9jus and Y. Haradji . 2013 . Domestic ergonomics: contribution to the design of a smart home lighting service. In J. C. Spohrer & L. E. Freund (Eds.), Advances in the human side of service engineering design (pp. 84 - 93 ). Boca Raton, FL: CRC Press. G. Poizat, M., Fr\u00e9jus and Y. Haradji. 2013. Domestic ergonomics: contribution to the design of a smart home lighting service. In J. C. Spohrer & L. E. Freund (Eds.), Advances in the human side of service engineering design (pp. 84-93). Boca Raton, FL: CRC Press."},{"key":"e_1_3_2_1_49_1","unstructured":"P. Rabardel. 1995. Les hommes et les technologies : Approche cognitive des instruments contemporains. Paris : Armand Colin.  P. Rabardel. 1995. Les hommes et les technologies : Approche cognitive des instruments contemporains. Paris : Armand Colin."},{"issue":"1","key":"e_1_3_2_1_50_1","first-page":"26","article-title":"Privacy, intimacy, and personhood","volume":"6","author":"Reiman J.","year":"1976","unstructured":"J. Reiman . 1976 . Privacy, intimacy, and personhood . Philos. Publ. Aff. 6 ( 1 ), 26 \u2013 44 . J. Reiman. 1976. Privacy, intimacy, and personhood. Philos. Publ. Aff. 6(1), 26\u201344.","journal-title":"Philos. Publ. Aff."},{"key":"e_1_3_2_1_51_1","volume-title":"International Conference on Engineering Design (ICED)","author":"Rostama G.","year":"2017","unstructured":"G. Rostama , A. Bekhradi & B. Yannou . 2017 . From privacy by design to design for privacy . International Conference on Engineering Design (ICED) , Aug 2017, Vancouver, Canada. G. Rostama, A. Bekhradi & B. Yannou. 2017. From privacy by design to design for privacy. International Conference on Engineering Design (ICED), Aug 2017, Vancouver, Canada."},{"volume-title":"Secrets and lies: Digital security in a networked world","author":"Schneier B.","key":"e_1_3_2_1_52_1","unstructured":"B. Schneier . 2000. Secrets and lies: Digital security in a networked world . New York : Wiley . B. Schneier. 2000. Secrets and lies: Digital security in a networked world. New York: Wiley."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"e_1_3_2_1_54_1","volume-title":"Understanding privacy","author":"Solove D.","year":"2008","unstructured":"D. Solove . 2008. Understanding privacy . Harvard University Press 2008 . D. Solove. 2008. Understanding privacy. Harvard University Press 2008."},{"volume-title":"Plans and situated actions: The Problem of Human-Machine Communication","author":"Suchman L.","key":"e_1_3_2_1_55_1","unstructured":"L. Suchman . 1987. Plans and situated actions: The Problem of Human-Machine Communication . New York : Cambridge University Press . L. Suchman. 1987. Plans and situated actions: The Problem of Human-Machine Communication. New York: Cambridge University Press."},{"key":"e_1_3_2_1_56_1","volume-title":"Workshop on Bridging the gap between privacy by design and privacy in practice at CHI 16","author":"Sundar S.","year":"2016","unstructured":"S. Sundar , J. Kim , J. Gambino & M.B. Rosson . 2016 . Six ways to enact Privacy by Design: Cognitive heuristics that predict users online information disclosure . Workshop on Bridging the gap between privacy by design and privacy in practice at CHI 16 . S. Sundar, J. Kim, J. Gambino & M.B. Rosson. 2016. Six ways to enact Privacy by Design: Cognitive heuristics that predict users online information disclosure. Workshop on Bridging the gap between privacy by design and privacy in practice at CHI 16."},{"key":"e_1_3_2_1_57_1","first-page":"81","volume-title":"Course-of-action analysis and course-of-action centered design. Handbook of cognitive task design","author":"Theureau J.","unstructured":"J. Theureau . 2003. Course-of-action analysis and course-of-action centered design. Handbook of cognitive task design , pp. 55\u2013 81 . J. Theureau. 2003. Course-of-action analysis and course-of-action centered design. Handbook of cognitive task design, pp. 55\u201381."},{"volume-title":"Communication pr\u00e9sent\u00e9e au S\u00e9minaire ErgoIDF","author":"Theureau J.","key":"e_1_3_2_1_58_1","unstructured":"J. Theureau . 2011. Appropriations 1, 2 & 3. Communication pr\u00e9sent\u00e9e au S\u00e9minaire ErgoIDF , Cnam, Paris, France , Juin . J. Theureau. 2011. Appropriations 1, 2 & 3. Communication pr\u00e9sent\u00e9e au S\u00e9minaire ErgoIDF, Cnam, Paris, France, Juin."},{"key":"e_1_3_2_1_59_1","unstructured":"J. Theureau. 2015. Le cours d'action. L'enaction et l'exp\u00e9rience. Toulouse : Octar\u00e8s.  J. Theureau. 2015. Le cours d'action. L'enaction et l'exp\u00e9rience. Toulouse : Octar\u00e8s."},{"volume-title":"UbiComp '18","author":"Toch E.","key":"e_1_3_2_1_60_1","unstructured":"E. Toch and Y. Birman . 2018. Towards Behavioral Privacy: How to Understand AI's Privacy Threats in Ubiquitous Computing . UbiComp '18 , 931\u2013936. E. Toch and Y. Birman. 2018. Towards Behavioral Privacy: How to Understand AI's Privacy Threats in Ubiquitous Computing. UbiComp '18, 931\u2013936."},{"key":"e_1_3_2_1_61_1","volume-title":"Mobile phones and privacy","author":"Urban J.","year":"2012","unstructured":"J. Urban , C.J. Hoofnagle & S. Li . 2012. Mobile phones and privacy . Center for the Study of Law and Society. http:\/\/emsoc.be\/wp-content\/uploads\/ 2012 \/07\/SSRN-id2103405.pdf J. Urban, C.J. Hoofnagle & S. Li. 2012. Mobile phones and privacy. Center for the Study of Law and Society. http:\/\/emsoc.be\/wp-content\/uploads\/2012\/07\/SSRN-id2103405.pdf"},{"key":"e_1_3_2_1_62_1","unstructured":"R. Warner and R. Sloan. 2013. Beyond notice and choice: privacy norms and consent. J. High Technol. Law.  R. Warner and R. Sloan. 2013. Beyond notice and choice: privacy norms and consent. J. High Technol. Law."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.2307\/1321160"},{"volume-title":"Privacy and Freedom. New York","author":"Westin F","key":"e_1_3_2_1_64_1","unstructured":"A. F Westin . 1967. Privacy and Freedom. New York NY : Atheneum . A.F Westin. 1967. Privacy and Freedom. New York NY: Atheneum."},{"volume-title":"Proceedings of the Ninth USENIX Security Symposium.","author":"Whitten A.","key":"e_1_3_2_1_65_1","unstructured":"A. Whitten and D. Tygar . 1999. Why Johnny can't encrypt: A usability evaluation of PGP 5.0 . Proceedings of the Ninth USENIX Security Symposium. A. Whitten and D. Tygar. 1999. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. Proceedings of the Ninth USENIX Security Symposium."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"crossref","unstructured":"W. Xu. 2019. Toward Human-Centered AI: A Perspective from Human- Computer Interaction. Interactions july-august ACM.  W. Xu. 2019. Toward Human-Centered AI: A Perspective from Human- Computer Interaction. Interactions july-august ACM.","DOI":"10.1145\/3328485"},{"volume-title":"Proceedings of the 2012 ACM Conference on Ubiquitous Computing.","author":"Yang R.","key":"e_1_3_2_1_67_1","unstructured":"R. Yang and M.W. Newman . 2012. Living with an intelligent thermostat: advanced control for heating and cooling systems . Proceedings of the 2012 ACM Conference on Ubiquitous Computing. R. Yang and M.W. Newman. 2012. Living with an intelligent thermostat: advanced control for heating and cooling systems. Proceedings of the 2012 ACM Conference on Ubiquitous Computing."}],"event":{"name":"IHM '23: 34th International Francophone Conference on Human-Computer Interaction","acronym":"IHM '23","location":"TROYES France"},"container-title":["IHM '23: Proceedings of the 34th Conference on l'Interaction Humain-Machine"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583961.3583970","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3583961.3583970","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:04Z","timestamp":1750183684000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583961.3583970"}},"subtitle":["The Contextuality of Privacy Issues in Interactive Services, and its Consequences for Design"],"short-title":[],"issued":{"date-parts":[[2023,4,3]]},"references-count":68,"alternative-id":["10.1145\/3583961.3583970","10.1145\/3583961"],"URL":"https:\/\/doi.org\/10.1145\/3583961.3583970","relation":{},"subject":[],"published":{"date-parts":[[2023,4,3]]},"assertion":[{"value":"2023-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}