{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:54:40Z","timestamp":1756000480803,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["EXC 2092 CASA - 390781972"],"award-info":[{"award-number":["EXC 2092 CASA - 390781972"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Scottish Informatics & Computer Science Alliance"},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/V008870\/1, EP\/S035362\/1"],"award-info":[{"award-number":["EP\/V008870\/1, EP\/S035362\/1"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,11]]},"DOI":"10.1145\/3613904.3642623","type":"proceedings-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:38:25Z","timestamp":1715416705000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Out-of-Device Privacy Unveiled: Designing and Validating the Out-of-Device Privacy Scale (ODPS)"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2961-3500","authenticated-orcid":false,"given":"Habiba","family":"Farzand","sequence":"first","affiliation":[{"name":"University of Glasgow, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7129-9642","authenticated-orcid":false,"given":"Karola","family":"Marky","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7051-5200","authenticated-orcid":false,"given":"Mohamed","family":"Khamis","sequence":"additional","affiliation":[{"name":"University of Glasgow, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"e_1_3_3_3_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025461"},{"key":"e_1_3_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563693"},{"key":"e_1_3_3_3_3_1","unstructured":"Amazon. 2023. Amazon Listing - PerfectPrime IR203 (IR) Infrared Thermal Imager Camera. Accessed: 2023-01-13."},{"key":"e_1_3_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02723327"},{"key":"e_1_3_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546155.3546706"},{"key":"e_1_3_3_3_6_1","volume-title":"Privacy in the digital age: a review of information privacy research in information systems. MIS quarterly","author":"B\u00e9langer France","year":"2011","unstructured":"France B\u00e9langer and Robert\u00a0E Crossler. 2011. Privacy in the digital age: a review of information privacy research in information systems. MIS quarterly (2011), 1017\u20131041."},{"key":"e_1_3_3_3_7_1","volume-title":"Comparative fit indexes in structural models.Psychological bulletin 107, 2","author":"Bentler M","year":"1990","unstructured":"Peter\u00a0M Bentler. 1990. Comparative fit indexes in structural models.Psychological bulletin 107, 2 (1990), 238."},{"key":"e_1_3_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.62"},{"key":"e_1_3_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpubh.2018.00149"},{"key":"e_1_3_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20459"},{"volume-title":"Doing better statistics in human-computer interaction","author":"Cairns Paul","key":"e_1_3_3_3_11_1","unstructured":"Paul Cairns. 2019. Doing better statistics in human-computer interaction. Cambridge University Press."},{"key":"e_1_3_3_3_12_1","volume-title":"Experimental methods in human-computer interaction. Encyclopedia of Human-Computer Interaction","author":"Cairns Paul","year":"2016","unstructured":"Paul Cairns, M Soegaard, and RF Dam. 2016. Experimental methods in human-computer interaction. Encyclopedia of Human-Computer Interaction (2016)."},{"key":"e_1_3_3_3_13_1","unstructured":"Canva. 2022. Canva. https:\/\/www.canva.com"},{"key":"e_1_3_3_3_14_1","volume-title":"A study of a measure of sampling adequacy for factor-analytic correlation matrices. Multivariate behavioral research 12, 1","author":"Cerny A","year":"1977","unstructured":"Barbara\u00a0A Cerny and Henry\u00a0F Kaiser. 1977. A study of a measure of sampling adequacy for factor-analytic correlation matrices. Multivariate behavioral research 12, 1 (1977), 43\u201347."},{"key":"e_1_3_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383413"},{"key":"e_1_3_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1177\/154193120304701102"},{"key":"e_1_3_3_3_17_1","volume-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS","author":"Colnago Jessica","year":"2022","unstructured":"Jessica Colnago, Lorrie\u00a0Faith Cranor, Alessandro Acquisti, and Kate\u00a0Hazel Stanton. 2022. Is it a concern or a preference? An investigation into the ability of privacy scales to capture and distinguish granular privacy constructs. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). 331\u2013346."},{"key":"e_1_3_3_3_18_1","volume-title":"Further evidence on response sets and test design. Educational and psychological measurement 10, 1","author":"Cronbach J","year":"1950","unstructured":"Lee\u00a0J Cronbach. 1950. Further evidence on response sets and test design. Educational and psychological measurement 10, 1 (1950), 3\u201331."},{"key":"e_1_3_3_3_19_1","volume-title":"A new scale of social desirability independent of psychopathology.Journal of consulting psychology 24, 4","author":"Crowne P","year":"1960","unstructured":"Douglas\u00a0P Crowne and David Marlowe. 1960. A new scale of social desirability independent of psychopathology.Journal of consulting psychology 24, 4 (1960), 349."},{"key":"e_1_3_3_3_20_1","volume-title":"Powering for Privacy: Improving User Trust in Smart Speaker Microphones with Intentional Powering and Perceptible Assurance. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Do Youngwook","year":"2023","unstructured":"Youngwook Do, Nivedita Arora, Ali Mirzazadeh, Injoo Moon, Eryue Xu, Zhihan Zhang, Gregory\u00a0D. Abowd, and Sauvik Das. 2023. Powering for Privacy: Improving User Trust in Smart Speaker Microphones with Intentional Powering and Perceptible Assurance. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 2473\u20132490. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/do"},{"key":"e_1_3_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702249"},{"key":"e_1_3_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025636"},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3473856.3474006"},{"key":"e_1_3_3_3_24_1","volume-title":"Proceedings of the Eighteenth USENIX Conference on Usable Privacy and Security. USENIX Association, USA.","author":"Farzand Habiba","year":"2022","unstructured":"Habiba Farzand, Karola Marky, and Mohamed Khamis. 2022. I Hate When People Do This; There\u2019sa Lot of Sensitive Content for Me\": A Typology of Perceived Privacy-Sensitive Content in Shoulder Surfing Scenarios. In Proceedings of the Eighteenth USENIX Conference on Usable Privacy and Security. USENIX Association, USA."},{"key":"e_1_3_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3549015.3554211"},{"key":"e_1_3_3_3_26_1","volume-title":"Proceedings of the Nineteenth USENIX Conference on Usable Privacy and Security. USENIX Association, USA.","author":"Farzand Habiba","year":"2023","unstructured":"Habiba Farzand, Karola Marky, and Mohamed Khamis. 2023. \"... It\u2019s very unacceptable for someone to peek into your privacy.\" Chronicles of Shoulder Surfing: Exploring Deep into a Longitudinal Diary Study. In Proceedings of the Nineteenth USENIX Conference on Usable Privacy and Security. USENIX Association, USA."},{"key":"e_1_3_3_3_27_1","volume-title":"Proceedings of the Nineteenth USENIX Conference on Usable Privacy and Security. USENIX Association, USA.","author":"Farzand Habiba","year":"2023","unstructured":"Habiba Farzand, Karola Marky, and Mohamed Khamis. 2023. \"... It\u2019s very unacceptable for someone to peek into your privacy.\" Chronicles of Shoulder Surfing: Exploring Deep into a Longitudinal Diary Study. In Proceedings of the Nineteenth USENIX Conference on Usable Privacy and Security. USENIX Association, USA."},{"key":"e_1_3_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00019"},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(11)70116-6"},{"key":"e_1_3_3_3_30_1","volume-title":"NJ 730","author":"Hair F","year":"1998","unstructured":"Joseph\u00a0F Hair, RE Anderson, RL Tatham, and WC Black. 1998. Multivariate data analysis prentice hall. Upper Saddle River, NJ 730 (1998)."},{"key":"e_1_3_3_3_31_1","volume-title":"10th Symposium On Usable Privacy and Security ({ SOUPS}","author":"Harbach Marian","year":"2014","unstructured":"Marian Harbach, Emanuel Von\u00a0Zezschwitz, Andreas Fichtner, Alexander De\u00a0Luca, and Matthew Smith. 2014. It\u2019s a hard lock life: A field study of smartphone (un) locking behavior and risk perception. In 10th Symposium On Usable Privacy and Security ({ SOUPS} 2014). 213\u2013230."},{"key":"e_1_3_3_3_32_1","volume-title":"10th symposium on usable privacy and security (SOUPS","author":"Harbach Marian","year":"2014","unstructured":"Marian Harbach, Emanuel Von\u00a0Zezschwitz, Andreas Fichtner, Alexander De\u00a0Luca, and Matthew Smith. 2014. { It\u2019s} a hard lock life: A field study of smartphone ({ Un) Locking} behavior and risk perception. In 10th symposium on usable privacy and security (SOUPS 2014). 213\u2013230."},{"key":"e_1_3_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581496"},{"key":"e_1_3_3_3_34_1","volume-title":"A brief tutorial on the development of measures for use in survey questionnaires. Organizational research methods 1, 1","author":"Hinkin R","year":"1998","unstructured":"Timothy\u00a0R Hinkin. 1998. A brief tutorial on the development of measures for use in survey questionnaires. Organizational research methods 1, 1 (1998), 104\u2013121."},{"key":"e_1_3_3_3_35_1","volume-title":"Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural equation modeling: a multidisciplinary journal 6, 1","author":"Bentler Hu","year":"1999","unstructured":"Li-tze Hu and Peter\u00a0M Bentler. 1999. Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural equation modeling: a multidisciplinary journal 6, 1 (1999), 1\u201355."},{"key":"e_1_3_3_3_36_1","volume-title":"Privacy on and off the Internet: What consumers want. Privacy and American Business","author":"Interactive Harris","year":"2002","unstructured":"Harris Interactive. 2002. Privacy on and off the Internet: What consumers want. Privacy and American Business (2002), 1\u2013127."},{"key":"e_1_3_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64701-2_15"},{"key":"e_1_3_3_3_38_1","volume-title":"An index of factorial simplicity. psychometrika 39, 1","author":"Kaiser F","year":"1974","unstructured":"Henry\u00a0F Kaiser. 1974. An index of factorial simplicity. psychometrika 39, 1 (1974), 31\u201336."},{"key":"e_1_3_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.3390\/mti2030045"},{"key":"e_1_3_3_3_40_1","volume-title":"Confirmatory and exploratory factor analysis for validating the phlegm pattern questionnaire for healthy subjects. Evidence-Based Complementary and Alternative Medicine 2016","author":"Kim Hyunho","year":"2016","unstructured":"Hyunho Kim, Boncho Ku, Jong\u00a0Yeol Kim, Young-Jae Park, Young-Bae Park, 2016. Confirmatory and exploratory factor analysis for validating the phlegm pattern questionnaire for healthy subjects. Evidence-Based Complementary and Alternative Medicine 2016 (2016)."},{"volume-title":"Handbook of psychological testing","author":"Kline Paul","key":"e_1_3_3_3_41_1","unstructured":"Paul Kline. 2013. Handbook of psychological testing. Routledge."},{"key":"e_1_3_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1111\/jopy.12662"},{"key":"e_1_3_3_3_43_1","volume-title":"Power analysis and determination of sample size for covariance structure modeling.Psychological methods 1, 2","author":"MacCallum C","year":"1996","unstructured":"Robert\u00a0C MacCallum, Michael\u00a0W Browne, and Hazuki\u00a0M Sugawara. 1996. Power analysis and determination of sample size for covariance structure modeling.Psychological methods 1, 2 (1996), 130."},{"key":"e_1_3_3_3_44_1","volume-title":"Internet users","author":"Malhotra K","year":"2004","unstructured":"Naresh\u00a0K Malhotra, Sung\u00a0S Kim, and James Agarwal. 2004. Internet users\u2019 information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research 15, 4 (2004), 336\u2013355."},{"key":"e_1_3_3_3_45_1","volume-title":"Scale development: ten main limitations and recommendations to improve future research practices. Psicologia: Reflex\u00e3o e Cr\u00edtica 30","author":"Morgado FR","year":"2017","unstructured":"Fabiane\u00a0FR Morgado, Juliana\u00a0FF Meireles, Clara\u00a0M Neves, Ana Amaral, and Maria\u00a0EC Ferreira. 2017. Scale development: ten main limitations and recommendations to improve future research practices. Psicologia: Reflex\u00e3o e Cr\u00edtica 30 (2017)."},{"key":"e_1_3_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2012.83"},{"key":"e_1_3_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493223"},{"key":"e_1_3_3_3_48_1","doi-asserted-by":"crossref","unstructured":"Richard\u00a0G Netemeyer William\u00a0O Bearden and Subhash Sharma. 2003. Scaling procedures: Issues and applications. sage publications.","DOI":"10.4135\/9781412985772"},{"volume-title":"Psychometric theory","author":"Nunnally C","key":"e_1_3_3_3_49_1","unstructured":"Jum\u00a0C Nunnally.1967. Psychometric theory. McGraw-hill."},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0029"},{"key":"e_1_3_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2009.03.009"},{"key":"e_1_3_3_3_52_1","volume-title":"https:\/\/www.prolific.co\/ Retrieved","author":"Prolific","year":"2023","unstructured":"Prolific. 2023. Prolific | Online participant recruitment for surveys and market research. https:\/\/www.prolific.co\/ Retrieved September 01, 2023."},{"volume-title":"Qualtrics - Leading Experience Management and Survey Software. https:\/\/www.qualtrics.com\/uk\/?rid=ip&prevsite=en&newsite=uk&geo=GB&geomatch=uk Retrieved","year":"2021","key":"e_1_3_3_3_53_1","unstructured":"Qualtrics. 2021. Qualtrics - Leading Experience Management and Survey Software. https:\/\/www.qualtrics.com\/uk\/?rid=ip&prevsite=en&newsite=uk&geo=GB&geomatch=uk Retrieved February 11, 2021."},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1177\/01466216970212006"},{"key":"e_1_3_3_3_55_1","volume-title":"Standards for Internet-based experimenting.Experimental psychology 49, 4","author":"Reips Ulf-Dietrich","year":"2002","unstructured":"Ulf-Dietrich Reips. 2002. Standards for Internet-based experimenting.Experimental psychology 49, 4 (2002), 243."},{"key":"e_1_3_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3282894.3282919"},{"key":"e_1_3_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29387-1_5"},{"volume-title":"Developmental Psychology. Vol.\u00a06","author":"Schinka A","key":"e_1_3_3_3_58_1","unstructured":"John\u00a0A Schinka and Wayne\u00a0F Velicer. 2003. Handbook of Psychology, Developmental Psychology. Vol.\u00a06. John Wiley & Sons."},{"key":"e_1_3_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2636090"},{"key":"e_1_3_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1080\/10705511.2018.1449653"},{"key":"e_1_3_3_3_61_1","volume-title":"Public privacy: camera surveillance of public places and the right to anonymity. Miss. lJ 72","author":"Slobogin Christopher","year":"2002","unstructured":"Christopher Slobogin. 2002. Public privacy: camera surveillance of public places and the right to anonymity. Miss. lJ 72 (2002), 213."},{"key":"e_1_3_3_3_62_1","volume-title":"Information privacy: Measuring individuals","author":"Smith H\u00a0Jeff","year":"1996","unstructured":"H\u00a0Jeff Smith, Sandra\u00a0J Milberg, and Sandra\u00a0J Burke. 1996. Information privacy: Measuring individuals\u2019 concerns about organizational practices. MIS quarterly (1996), 167\u2013196."},{"key":"e_1_3_3_3_63_1","volume-title":"8thEdn. Ames: Iowa State Univ","author":"Snedecor W","year":"1989","unstructured":"George\u00a0W Snedecor and Witiiam\u00a0G Cochran. 1989. Statistical methods, 8thEdn. Ames: Iowa State Univ. Press Iowa 54 (1989), 71\u201382."},{"key":"e_1_3_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.15288\/jsad.2022.83.582"},{"key":"e_1_3_3_3_65_1","doi-asserted-by":"publisher","DOI":"10.1177\/0011000006288127"},{"key":"e_1_3_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23130"},{"key":"e_1_3_3_3_67_1","volume-title":"A beginner\u2019s guide to factor analysis: Focusing on exploratory factor analysis. Tutorials in quantitative methods for psychology 9, 2","author":"Yong An\u00a0Gie","year":"2013","unstructured":"An\u00a0Gie Yong, Sean Pearce, 2013. A beginner\u2019s guide to factor analysis: Focusing on exploratory factor analysis. Tutorials in quantitative methods for psychology 9, 2 (2013), 79\u201394."},{"key":"e_1_3_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858232"}],"event":{"name":"CHI '24: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGACCESS ACM Special Interest Group on Accessible Computing"],"location":"Honolulu HI USA","acronym":"CHI '24"},"container-title":["Proceedings of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642623","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613904.3642623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:11Z","timestamp":1750290251000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642623"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,11]]},"references-count":68,"alternative-id":["10.1145\/3613904.3642623","10.1145\/3613904"],"URL":"https:\/\/doi.org\/10.1145\/3613904.3642623","relation":{},"subject":[],"published":{"date-parts":[[2024,5,11]]},"assertion":[{"value":"2024-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}