{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:58:46Z","timestamp":1776113926086,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":82,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Research Foundation","award":["EXC 2092 CASA - 390781972"],"award-info":[{"award-number":["EXC 2092 CASA - 390781972"]}]},{"name":"dtec.bw - Center for Digitization and Technology Research of the Bundeswehr","award":["MuQuaNet"],"award-info":[{"award-number":["MuQuaNet"]}]},{"name":"European Union - NextGeneration EU"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,11]]},"DOI":"10.1145\/3613904.3642863","type":"proceedings-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:38:25Z","timestamp":1715416705000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Do You Need to Touch? Exploring Correlations between Personal Attributes and Preferences for Tangible Privacy Mechanisms"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0514-9846","authenticated-orcid":false,"given":"Sarah","family":"Delgado Rodriguez","sequence":"first","affiliation":[{"name":"University of the Bundeswehr Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7025-2981","authenticated-orcid":false,"given":"Priyasha","family":"Chatterjee","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0861-9628","authenticated-orcid":false,"given":"Anh","family":"Dao Phuong","sequence":"additional","affiliation":[{"name":"Ludwig-Maximilians-Universit\u00e4t, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8354-2195","authenticated-orcid":false,"given":"Florian","family":"Alt","sequence":"additional","affiliation":[{"name":"University of the Bundeswehr Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7129-9642","authenticated-orcid":false,"given":"Karola","family":"Marky","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"e_1_3_3_3_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415187"},{"key":"e_1_3_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517652"},{"key":"e_1_3_3_3_3_1","volume-title":"A privacy paradox: Social networking in the United States. First Monday","author":"Barnes B","year":"2006","unstructured":"Susan\u00a0B Barnes. 2006. A privacy paradox: Social networking in the United States. First Monday (2006)."},{"key":"e_1_3_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2611009.2611036"},{"key":"e_1_3_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240490507956"},{"key":"e_1_3_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.21315\/mjms2018.25.6.9"},{"key":"e_1_3_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445691"},{"key":"e_1_3_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866218.1866229"},{"key":"e_1_3_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376389"},{"key":"e_1_3_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054985"},{"key":"e_1_3_3_3_11_1","volume-title":"About face: the essentials of interaction design","author":"Cooper Alan","unstructured":"Alan Cooper, Robert Reimann, David Cronin, and Christopher Noessel. 2014. About face: the essentials of interaction design. John Wiley & Sons."},{"key":"e_1_3_3_3_12_1","volume-title":"Construct validity in psychological tests.Psychological bulletin 52, 4","author":"Cronbach J","year":"1955","unstructured":"Lee\u00a0J Cronbach and Paul\u00a0E Meehl. 1955. Construct validity in psychological tests.Psychological bulletin 52, 4 (1955), 281."},{"key":"e_1_3_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367733"},{"key":"e_1_3_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.18420\/muc2021-mci-ws09-393"},{"key":"e_1_3_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451825"},{"key":"e_1_3_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546155.3546640"},{"key":"e_1_3_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3469845"},{"key":"e_1_3_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3494983"},{"key":"e_1_3_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702450"},{"key":"e_1_3_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858214"},{"key":"e_1_3_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702249"},{"key":"e_1_3_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_3_3_3_23_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019","author":"Faklaris Cori","year":"2019","unstructured":"Cori Faklaris, Laura\u00a0A. Dabbish, and Jason\u00a0I. Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA, 61\u201377. https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/faklaris"},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445148"},{"key":"e_1_3_3_3_25_1","doi-asserted-by":"crossref","unstructured":"AP Field. 2005. Discovering statistics using SPSS.","DOI":"10.53841\/bpspag.2005.1.56.31"},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1023813.1023819"},{"key":"e_1_3_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2018.1456150"},{"key":"e_1_3_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517504"},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300498"},{"key":"e_1_3_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1377999.1378021"},{"key":"e_1_3_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/274644.274647"},{"key":"e_1_3_3_3_32_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"He Weijia","year":"2018","unstructured":"Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus D\u00fcrmuth, Earlence Fernandes, and Blase Ur. 2018. Rethinking Access Control and Authentication for the Home Internet of Things (IoT). In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 255\u2013272. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/he"},{"key":"e_1_3_3_3_33_1","volume-title":"trust, and self-disclosure online. Human\u2013Computer Interaction 25, 1","author":"Joinson N","year":"2010","unstructured":"Adam\u00a0N Joinson, Ulf-Dietrich Reips, Tom Buchanan, and Carina B\u00a0Paine Schofield. 2010. Privacy, trust, and self-disclosure online. Human\u2013Computer Interaction 25, 1 (2010), 1\u201324."},{"key":"e_1_3_3_3_34_1","volume-title":"The application of electronic computers to factor analysis. Educational and psychological measurement 20, 1","author":"Kaiser F","year":"1960","unstructured":"Henry\u00a0F Kaiser. 1960. The application of electronic computers to factor analysis. Educational and psychological measurement 20, 1 (1960), 141\u2013151."},{"key":"e_1_3_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_3_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461778.3462073"},{"key":"e_1_3_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173225.3173234"},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420108"},{"key":"e_1_3_3_3_39_1","volume-title":"Privacy indexes: a survey of Westin\u2019s studies","author":"Kumaraguru Ponnurangam","unstructured":"Ponnurangam Kumaraguru and Lorrie\u00a0Faith Cranor. 2005. Privacy indexes: a survey of Westin\u2019s studies. Carnegie Mellon University, School of Computer Science, Institute for\u00a0\u2026."},{"key":"e_1_3_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490149.3501313"},{"key":"e_1_3_3_3_41_1","doi-asserted-by":"crossref","unstructured":"Meng Liang Yanhong Li Thomas Weber and Heinrich Hussmann. 2021. Tangible interaction for children\u2019s creative learning: A review. In Creativity and Cognition. 1\u201314.","DOI":"10.1145\/3450741.3465262"},{"key":"e_1_3_3_3_42_1","volume-title":"Proceedings of the Tenth USENIX Conference on Usable Privacy and Security","author":"Lin Jialiu","year":"2014","unstructured":"Jialiu Lin, Bin Liu, Norman Sadeh, and Jason\u00a0I. Hong. 2014. Modeling Users\u2019 Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings. In Proceedings of the Tenth USENIX Conference on Usable Privacy and Security (Menlo Park, CA) (SOUPS \u201914). USENIX Association, USA, 199\u2013212."},{"key":"e_1_3_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568035"},{"key":"e_1_3_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_3_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301293.3302371"},{"key":"e_1_3_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490632.3490664"},{"key":"e_1_3_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376189"},{"key":"e_1_3_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420164"},{"key":"e_1_3_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985347.1985353"},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3294109.3302934"},{"key":"e_1_3_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892475"},{"key":"e_1_3_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3430524.3440626"},{"key":"e_1_3_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3430506"},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3569009.3572903"},{"key":"e_1_3_3_3_55_1","volume-title":"User Centered System Design","author":"Norman A.","unstructured":"Donald\u00a0A. Norman and Stephen\u00a0W. Draper. 1986. User Centered System Design; New Perspectives on Human-Computer Interaction. L. Erlbaum Associates Inc., USA."},{"key":"e_1_3_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1086\/378619"},{"key":"e_1_3_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376840"},{"key":"e_1_3_3_3_58_1","unstructured":"Sarah\u00a0Delgado Rodriguez Oliver Hein Ismael\u00a0Prieto Romero Lukas Mecke Felix Dietz Sarah Prange and Florian Alt. [n. d.]. Shake-It-All: A Toolkit for Sensing Tangible Interactions on Everyday Objects. ([n. d.])."},{"key":"e_1_3_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380116.2380189"},{"key":"e_1_3_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376264"},{"key":"e_1_3_3_3_61_1","volume-title":"The TAC paradigm: specifying tangible user interfaces. Personal and ubiquitous computing 8","author":"Shaer Orit","year":"2004","unstructured":"Orit Shaer, Nancy Leland, Eduardo\u00a0H Calvillo-Gamez, and Robert\u00a0JK Jacob. 2004. The TAC paradigm: specifying tangible user interfaces. Personal and ubiquitous computing 8 (2004), 359\u2013369."},{"key":"e_1_3_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0296-5"},{"key":"e_1_3_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557421"},{"key":"e_1_3_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.2307\/249477"},{"key":"e_1_3_3_3_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376585"},{"key":"e_1_3_3_3_66_1","unstructured":"Charles Stangor and Jennifer Walinga. 2014. Introduction to psychology. BCcampus."},{"key":"e_1_3_3_3_67_1","volume-title":"The use of Cronbach\u2019s alpha when developing and reporting research instruments in science education. Research in science education 48, 6","author":"Taber S","year":"2018","unstructured":"Keith\u00a0S Taber. 2018. The use of Cronbach\u2019s alpha when developing and reporting research instruments in science education. Research in science education 48, 6 (2018), 1273\u20131296."},{"key":"e_1_3_3_3_68_1","unstructured":"Christian Tiefenau Maximilian H\u00e4ring Eva Gerlitz and Emanuel von Zezschwitz. 2019. Making Privacy Graspable: Can we Nudge Users to use Privacy Enhancing Techniques?arxiv:1911.07701\u00a0[cs.HC] https:\/\/arxiv.org\/abs\/1911.07701"},{"key":"e_1_3_3_3_69_1","volume-title":"Nineteenth Symposium on Usable Privacy and Security (SOUPS","author":"Turner Mark","year":"2023","unstructured":"Mark Turner, Martin Schmitz, Morgan\u00a0Masichi Bierey, Mohamed Khamis, and Karola Marky. 2023. Tangible 2FA \u2013 An In-the-Wild Investigation of User-Defined Tangibles for Two-Factor Authentication. In Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023). 245\u2013261."},{"key":"e_1_3_3_3_70_1","volume-title":"Emerging frameworks for tangible user interfaces. IBM systems journal 39, 3.4","author":"Ullmer Brygg","year":"2000","unstructured":"Brygg Ullmer and Hiroshi Ishii. 2000. Emerging frameworks for tangible user interfaces. IBM systems journal 39, 3.4 (2000), 915\u2013931."},{"key":"e_1_3_3_3_71_1","volume-title":"ACM Conference on Computer Science, Vol.\u00a0418","author":"Weiser D","year":"1994","unstructured":"Mark\u00a0D Weiser. 1994. Ubiquitous computing. In ACM Conference on Computer Science, Vol.\u00a0418. 197530\u2013197680."},{"key":"e_1_3_3_3_72_1","unstructured":"Alan\u00a0F. Westin. 1967. PRIVACY AND FREEDOM."},{"key":"e_1_3_3_3_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546719"},{"key":"e_1_3_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581167"},{"key":"e_1_3_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2016.09.006"},{"key":"e_1_3_3_3_76_1","volume-title":"10th Symposium On Usable Privacy and Security (SOUPS 2014","author":"Woodruff Allison","year":"2014","unstructured":"Allison Woodruff, Vasyl Pihur, Sunny Consolvo, Laura Brandimarte, and Alessandro Acquisti. 2014. Would a Privacy Fundamentalist Sell Their DNA for $1000...If Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and Consequences. In 10th Symposium On Usable Privacy and Security (SOUPS 2014). USENIX Association, Menlo Park, CA, 1\u201318. https:\/\/www.usenix.org\/conference\/soups2014\/proceedings\/presentation\/woodruff"},{"key":"e_1_3_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311957.3361863"},{"key":"e_1_3_3_3_78_1","volume-title":"28th USENIX Security Symposium USENIX Security 19)","author":"Zeng Eric","year":"2019","unstructured":"Eric Zeng and Franziska Roesner. 2019. Understanding and improving security and privacy in multi-user smart homes: a design exploration and in-home user study. In 28th USENIX Security Symposium USENIX Security 19). 159\u2013176. https:\/\/www.usenix.org\/system\/files\/sec19-zeng.pdf"},{"key":"e_1_3_3_3_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"key":"e_1_3_3_3_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847733"},{"key":"e_1_3_3_3_81_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0009"},{"key":"e_1_3_3_3_82_1","doi-asserted-by":"publisher","unstructured":"Tomasz Zukowski and Irwin Brown. 2007. Examining the Influence of Demographic Factors on Internet Users\u2019 Information Privacy Concerns. In Proceedings of the 2007 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries (Port Elizabeth South Africa) (SAICSIT \u201907). Association for Computing Machinery New York NY USA 197\u2013204. https:\/\/doi.org\/10.1145\/1292491.1292514","DOI":"10.1145\/1292491.1292514"}],"event":{"name":"CHI '24: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Proceedings of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642863","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613904.3642863","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:57:01Z","timestamp":1750291021000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642863"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,11]]},"references-count":82,"alternative-id":["10.1145\/3613904.3642863","10.1145\/3613904"],"URL":"https:\/\/doi.org\/10.1145\/3613904.3642863","relation":{},"subject":[],"published":{"date-parts":[[2024,5,11]]},"assertion":[{"value":"2024-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}