{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:03:20Z","timestamp":1775815400661,"version":"3.50.1"},"reference-count":78,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW1","license":[{"start":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T00:00:00Z","timestamp":1713312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000026","name":"National Institutes on Drug Abuse","doi-asserted-by":"crossref","award":["3R34DA050341-01S3"],"award-info":[{"award-number":["3R34DA050341-01S3"]}],"id":[{"id":"10.13039\/100000026","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2024,4,17]]},"abstract":"<jats:p>Informed consent is a cornerstone of ethical human subject research. This practice demonstrates the ethical principle of \"respect for persons.\" Our study was designed to imagine an informed consent future, specifically in a digital health context in which informed consent processes are mediated by sociotechnical systems. Design speed-dating workshops were conducted to explore dimensions of the consent communication design space, including social media, interactive quizzes, chat-bots, annotation tools, and virtual learning sessions. To explore both the user experience and how futuristic consent processes might be facilitated, the workshops involved people eligible to participate in digital health research (N=21) and service providers (N=20), including researchers and IRB members. Our findings offer five principles to improve digital informed consent processes: be concise, promote transparency, value time and effort, cultivate trust, and navigate platform risks.<\/jats:p>","DOI":"10.1145\/3637330","type":"journal-article","created":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T10:05:31Z","timestamp":1714385131000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Exploring the Future of Informed Consent: Applying a Service Design Approach"],"prefix":"10.1145","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7539-4871","authenticated-orcid":false,"given":"Brian James","family":"McInnis","sequence":"first","affiliation":[{"name":"University of California San Diego, La Jolla, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-6153-006X","authenticated-orcid":false,"given":"Ramona","family":"Pindus","sequence":"additional","affiliation":[{"name":"University of California San Diego, La Jolla, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3587-7900","authenticated-orcid":false,"given":"Daniah","family":"Kareem","sequence":"additional","affiliation":[{"name":"University of California San Diego, La Jolla, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6565-0272","authenticated-orcid":false,"given":"Savannah","family":"Gamboa","sequence":"additional","affiliation":[{"name":"University of California San Diego, La Jolla, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6819-1796","authenticated-orcid":false,"given":"Camille","family":"Nebeker","sequence":"additional","affiliation":[{"name":"University of California San Diego, La Jolla, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,4,26]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1525\/JER.2008.3.3.27"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.52"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820012"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2117261118"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1177\/1744987107081254"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.2196\/JMIR.6634"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1038\/SDATA.2016.11"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3242587.3242598"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1525\/JER.2007.2.4.69"},{"key":"e_1_2_1_10_1","volume-title":"Teaching students to study online communities ethically. Journal of Information Ethics","author":"Bruckman Amy","unstructured":"Amy Bruckman. 2006. Teaching students to study online communities ethically. Journal of Information Ethics , Vol. Fall (2006), 82--95."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-019-0129--6"},{"key":"e_1_2_1_12_1","unstructured":"Karen S. Cook Russell Hardin and Margaret Levi. 2005. Cooperation without trust? Russell Sage Foundation. 1--272 pages."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1525\/JER.2014.9.1.58\/0"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/1556264617737163"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/23294515.2020.1847214"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.2196\/MHEALTH.6521"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3443438"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","unstructured":"Sarah Dunseath Nadir Weibel Cinnamon S. Bloss and Camille Nebeker. 2018. NIH support of mobile imaging pervasive sensing social media and location tracking (MISST) research: laying the foundation to examine research ethics in the digital age. npj Digital Medicine 2018 1:1 Vol. 1 1 (1 2018) 1--6. https:\/\/doi.org\/10.1038\/s41746-017-0001--5","DOI":"10.1038\/s41746-017-0001--5"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432928"},{"key":"e_1_2_1_20_1","volume-title":"The presentation of self in everyday life. Allen Lane","author":"Goffman Erving","unstructured":"Erving Goffman. 1969. The presentation of self in everyday life. Allen Lane, London, England."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858364"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444819876944"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1093\/ABM\/KAAA018"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","unstructured":"Karen Holtzblatt and Hugh Beyer. 2017. Chapter 6: The Affinity Diagram. In Contextual Design. Morgan Kaufmann 127--146. https:\/\/doi.org\/10.1016\/B978-0--12--800894--2.00006--5","DOI":"10.1016\/B978-0--12--800894--2.00006--5"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1001\/JAMANETWORKOPEN.2019.2542"},{"key":"e_1_2_1_26_1","volume-title":"Turtle","author":"Ryan Kenneth John","year":"1979","unstructured":"Kenneth John Ryan, Joseph V. Brady, Robert E. Cooke, Dorothy I. Height, Albert R. Jonsen, Patricia King, Karen Lebacqz, David W. Louisell, Donald W. Seldin, Elliot Stellar, and Robert H. Turtle. 1979. The Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research. Technical Report. Department of Health, Education, and Welfare, Washington, DC."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.4103\/PICR.PICR_147_16"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1038\/ejhg.2014.71"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820072"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1525\/JER.2013.8.1.8\/0"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441922"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2011.563797"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3231644.3231662"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376179"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493446"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.31486\/TOJ.19.0088"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702566"},{"key":"e_1_2_1_38_1","volume-title":"Conflict in a New England Town Meeting. The Massachusetts Review","author":"Mansbridge Jane","year":"1976","unstructured":"Jane Mansbridge. 1976. Conflict in a New England Town Meeting. The Massachusetts Review (1976)."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1525\/JER.2006.1.1.25"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1525\/JER.2007.2.3.39"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.2307\/258792"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476074"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858539"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2968077"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466245"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1525\/JER.2008.3.1.89"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702481"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.17226\/25094"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1177\/2055207619901085"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1080\/23294515.2017.1403980"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.2196\/MHEALTH.6494"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.4103\/2231--4040.116779"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300745"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi13050132"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1186\/S13063-020-04969-W\/TABLES\/1"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1525\/JER.2012.7.5.44\/0"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445465"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642918.2647409"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/223355.223735"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300622"},{"key":"e_1_2_1_61_1","volume-title":"Peter Sheridan Dodds, and Duncan J. Watts","author":"Salganik Matthew J.","year":"2006","unstructured":"Matthew J. Salganik, Peter Sheridan Dodds, and Duncan J. Watts. 2006. Experimental Study of Inequality and Unpredictability in an Artificial Cultural Market. Science, Vol. 311, 5762 (2006). http:\/\/science.sciencemag.org\/content\/311\/5762\/854"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1525\/JER.2008.3.2.5"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/174809.174813"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/332040.332456"},{"key":"e_1_2_1_65_1","volume-title":"Layers of silence, arenas of voice: The ecology of visible and invisible work. Computer supported cooperative work (CSCW)","author":"Star Susan Leigh","year":"1999","unstructured":"Susan Leigh Star and Anselm Strauss. 1999. Layers of silence, arenas of voice: The ecology of visible and invisible work. Computer supported cooperative work (CSCW) , Vol. 8, 1--2 (1999), 9--30."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359229"},{"key":"e_1_2_1_67_1","doi-asserted-by":"crossref","unstructured":"Kate Starbird Ahmer Arif Tom Wilson Katherine Van Koevering Katya Yefimova and Daniel Scarnecchia. 2018. Ecosystem or Echo-System? Exploring Content Sharing across Alternative Media Domains. Technical Report. http:\/\/syriacivildefense.org","DOI":"10.1609\/icwsm.v12i1.15009"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858551"},{"key":"e_1_2_1_69_1","volume-title":"This is Service Design Thinking: Basics, tools, and cases","author":"Stickdorn Marc","unstructured":"Marc Stickdorn and Jakob Schneider. 2011. This is Service Design Thinking: Basics, tools, and cases. John Wiley & Sons, Inc, Hoboken, New Jersey."},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1002\/wps.20883"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025811"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820078"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/S10606-021-09404--5"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1525\/JER.2009.4.2.59\/0"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1609\/HCOMP.V7I1.5283"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1525\/JER.2006.1.1.9"},{"key":"e_1_2_1_77_1","volume-title":"Can you really study an army in the laboratory. A sociological reader on complex organizations","author":"Morris Zelditch Jr.","year":"1969","unstructured":"Morris Zelditch Jr. 1969. Can you really study an army in the laboratory. A sociological reader on complex organizations (1969), 528--539."},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.SHEJI.2017.08.003"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637330","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3637330","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:16:36Z","timestamp":1755882996000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637330"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,17]]},"references-count":78,"journal-issue":{"issue":"CSCW1","published-print":{"date-parts":[[2024,4,17]]}},"alternative-id":["10.1145\/3637330"],"URL":"https:\/\/doi.org\/10.1145\/3637330","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,17]]},"assertion":[{"value":"2024-04-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}