{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T03:45:13Z","timestamp":1773805513878,"version":"3.50.1"},"reference-count":103,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW1","license":[{"start":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T00:00:00Z","timestamp":1713312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1640640 and 1640697"],"award-info":[{"award-number":["1640640 and 1640697"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2024,4,17]]},"abstract":"<jats:p>Privacy is an important topic in HCI and social computing research, and the theory of contextual integrity (CI) is increasingly used to understand how sociotechnical systems-and the new kinds of information flows they introduce-can violate privacy. In empirical research, CI can serve as a conceptual framework for explaining the contextual nature of privacy as well as an analytical framework for evaluating privacy attitudes and behaviors. Analytical applications of CI in HCI primarily employ quantitative methods to identify appropriate information flows but rarely engage with the full CI framework to evaluate such flows. In this paper, we present a roadmap to guide HCI and social computing researchers on how to apply the full CI framework to qualitative projects. To help researchers envision what such an analysis can look like, each step includes an example analysis using interview data from projects on privacy and fitness tracking. We conclude by discussing how harnessing the full CI framework can address critiques of CI and identify opportunities for further theory development.<\/jats:p>","DOI":"10.1145\/3653710","type":"journal-article","created":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T10:05:31Z","timestamp":1714385131000},"page":"1-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["A Roadmap for Applying the Contextual Integrity Framework in Qualitative Privacy Research"],"prefix":"10.1145","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9244-7915","authenticated-orcid":false,"given":"Priya C.","family":"Kumar","sequence":"first","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4229-4847","authenticated-orcid":false,"given":"Michael","family":"Zimmer","sequence":"additional","affiliation":[{"name":"Marquette University, Milwaukee, WI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9362-9032","authenticated-orcid":false,"given":"Jessica","family":"Vitak","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,4,26]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445122"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415187"},{"key":"e_1_2_1_3_1","volume-title":"Apple and Google are building a virus-tracking system. Health officials say it will be practically useless. Washington Post. Retrieved","author":"Albergotti Reed","year":"2023","unstructured":"Reed Albergotti and Drew Harwell. 2020. Apple and Google are building a virus-tracking system. Health officials say it will be practically useless. Washington Post. Retrieved January 6, 2023 from https:\/\/www.washingtonpost.com\/technology\/2020\/05\/15\/app-apple-google-virus\/"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214262"},{"key":"e_1_2_1_5_1","volume-title":"28th USENIX Security Symposium","author":"Apthorpe Noah","year":"2019","unstructured":"Noah Apthorpe, Sarah Varghese, and Nick Feamster. 2019. Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus {COPPA}. In 28th USENIX Security Symposium, 2019. 123--140. Retrieved from https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/apthorpe"},{"key":"e_1_2_1_6_1","volume-title":"Time. Retrieved","author":"Austin Patrick Lucas","year":"2019","unstructured":"Patrick Lucas Austin. 2019. The Real Reason Google Is Buying Fitbit. Time. Retrieved October 14, 2023 from https:\/\/time.com\/5717726\/google-fitbit\/"},{"key":"e_1_2_1_7_1","volume-title":"Literature Review: Examining Contextual Integrity within Human-Computer Interaction.","author":"Badillo-Urquiola Karla","year":"2018","unstructured":"Karla Badillo-Urquiola, Xinru Page, and Pamela Wisniewski. 2018. Literature Review: Examining Contextual Integrity within Human-Computer Interaction. September 2018. Princeton, N.J., 1--4."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3272973.3273012"},{"key":"e_1_2_1_9_1","volume-title":"AAAI 2018","author":"Ballinger Brandon","year":"2018","unstructured":"Brandon Ballinger, Johnson Hsieh, Avesh Singh, Nimit Sohoni, Jack Wang, Geoffrey H. Tison, Gregory M. Marcus, Jose M. Sanchez, Carol Maguire, Jeffrey E. Olgin, and Mark J. Pletcher. 2018. DeepHeart: Semi-supervised sequence learning for cardiovascular risk prediction. In AAAI 2018. Retrieved April 19, 2018 from https:\/\/arxiv.org\/abs\/1802.02511"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207727"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1561\/3300000016"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998305"},{"key":"e_1_2_1_13_1","volume-title":"The Poverty of Privacy Rights","author":"Bridges Khiara M.","unstructured":"Khiara M. Bridges. 2017. The Poverty of Privacy Rights. Stanford University Press."},{"key":"e_1_2_1_14_1","volume-title":"Gizmodo. Retrieved","author":"Brown Kristen V.","year":"2017","unstructured":"Kristen V. Brown. 2017. When an insurer sells you an Apple Watch For $25, how much are you giving away? Gizmodo. Retrieved April 19, 2018 from https:\/\/gizmodo.com\/when-an-insurer-sells-you-an-apple-watch-for-25-how-m-1819912738"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441837"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819996"},{"key":"e_1_2_1_17_1","unstructured":"Michelle M. Christovich. 2016. Why Should We Care What Fitbit Shares - A Proposed Statutory Solution to Protect Sensitive Personal Fitness Information. Hastings Comm. & Ent. L.J. 38 (2016) 91--116."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492830"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2196\/10527"},{"key":"e_1_2_1_20_1","volume-title":"Fitbit Help. Retrieved","author":"How","year":"2023","unstructured":"Fitbit. How do I connect Fitbit with another app? Fitbit Help. Retrieved October 14, 2023 from https:\/\/help.fitbit.com\/articles\/en_US\/Help_article\/1742.htm"},{"key":"e_1_2_1_21_1","volume-title":"Fitbit Help. Retrieved","author":"What","year":"2023","unstructured":"Fitbit. What should I know about participating in a Fitbit Care program? Fitbit Help. Retrieved October 14, 2023 from https:\/\/help.fitbit.com\/articles\/en_US\/Help_article\/1760.htm"},{"key":"e_1_2_1_22_1","volume-title":"Fitbit Health Solutions. Retrieved","author":"Health Fitbit's Population","year":"2023","unstructured":"Fitbit. Fitbit's Population Health and Wellness Solution: Fitbit Care. Fitbit Health Solutions. Retrieved October 14, 2023 from https:\/\/healthsolutions.fitbit.com\/what-is-fitbit-care\/"},{"key":"e_1_2_1_23_1","volume-title":"Retrieved","author":"Team Fitbit","year":"2016","unstructured":"Fitbit Team. 2016. Fitbit introduces ?Fitbit Group Health.\" The Keyword. Retrieved October 14, 2023 from https:\/\/blog.google\/products\/fitbit\/fitbit-introduces-fitbit-group-health\/"},{"key":"e_1_2_1_24_1","volume-title":"The Keyword. Retrieved","author":"Team Fitbit","year":"2018","unstructured":"Fitbit Team. 2018. Fitbit and Google partner to innovate digital health, wearables. The Keyword. Retrieved October 14, 2023 from https:\/\/blog.google\/products\/fitbit\/fitbit-and-google-partner-innovate-digital-health-wearables\/"},{"key":"e_1_2_1_25_1","volume-title":"The Keyword. Retrieved","author":"Team Fitbit","year":"2019","unstructured":"Fitbit Team. 2019. Bristol-Myers Squibb-Pfizer Alliance and Fitbit collaborate. The Keyword. Retrieved October 14, 2023 from https:\/\/blog.google\/products\/fitbit\/bristol-myers-squibb-pfizer-alliance-and-fitbit-collaborate\/"},{"key":"e_1_2_1_26_1","volume-title":"Tracking for health","author":"Fox Susannah","year":"2016","unstructured":"Susannah Fox and Maeve Duggan. 2013. Tracking for health. Pew Research Center: Internet & Technology. Retrieved November 21, 2016 from http:\/\/www.pewinternet.org\/2013\/01\/28\/tracking-for-health\/"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3557888"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1162\/99608f92.edf2fc97"},{"key":"e_1_2_1_29_1","volume-title":"Vox. Retrieved","author":"Ghaffary Shirin","year":"2019","unstructured":"Shirin Ghaffary and Rani Molla. 2019. Google says it won't use your Fitbit data to target you with ads. But what else will it do? Vox. Retrieved October 14, 2023 from https:\/\/www.vox.com\/recode\/2019\/11\/1\/20943583\/google-fitbit-acquisition-privacy-antitrust"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1177\/20563051211033824"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557398"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1111\/eulj.12273"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376415"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v25i11.11095"},{"key":"e_1_2_1_35_1","unstructured":"Jane Henriksen-Bulmer. 2019. Incorporating contextual integrity into privacy decision making: a risk based approach. Doctoral Thesis. Bournemouth University. Retrieved January 8 2024 from https:\/\/eprints.bournemouth.ac.uk\/32385\/"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-010--9224--8"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479868"},{"key":"e_1_2_1_38_1","volume-title":"Jones and Ellen LeClere","author":"Kyle M.","year":"2018","unstructured":"Kyle M. L. Jones and Ellen LeClere. 2018. Contextual expectations and emerging informational harms: A primer on academic library participation in learning analytics initiatives. In Applying library values to emerging technology: decision-making in the age of open access, maker spaces, and the ever-changing library, Peter D. Fernandez and Kelly Tilton (eds.). Association of College and Research Libraries, a division of the American Library Association, Chicago, Illinois, 357--371."},{"key":"e_1_2_1_39_1","volume-title":"Bunch","author":"Keisler-Starkey Katherine","year":"2021","unstructured":"Katherine Keisler-Starkey and Lisa N. Bunch. 2021. Health Insurance Coverage in the United States: 2020. U.S. Census Bureau, Washington, DC. Retrieved from https:\/\/www.census.gov\/library\/publications\/2021\/demo\/p60--274.html"},{"key":"e_1_2_1_40_1","volume-title":"Metadata in Context - An Ontological and Normative Analysis of the NSA's Bulk Telephony Metadata Collection Program. ISJLP 13, 2 (2017","author":"Kift Paula","year":"2016","unstructured":"Paula Kift and Helen Nissenbaum. 2016. Metadata in Context - An Ontological and Normative Analysis of the NSA's Bulk Telephony Metadata Collection Program. ISJLP 13, 2 (2017 2016), 333--372."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359260"},{"key":"e_1_2_1_42_1","volume-title":"Nicholas Proferes, and Jennifer Romano (Eds.).","author":"Knijnenburg Bart P.","year":"2021","unstructured":"Bart P. Knijnenburg, Xinru Page, Pamela Wisniewski, Heather Richter Lipford, Nicholas Proferes, and Jennifer Romano (Eds.). 2021. Modern socio-technical perspectives on Privivacy. Springer Naturre, Gewerbestrasse, Switzerland."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1080\/23808985.1988.11678690"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1108\/ILS-02--2022-0022"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.17645\/mac.v8i4.3236"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134699"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.241"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-020-04668--1"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ahj.2021.04.003"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1161\/CIRCULATIONAHA.122.060291"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479504"},{"key":"e_1_2_1_52_1","volume-title":"Springer Berlin Heidelberg, 9--17. Retrieved","author":"Margulis Stephen T.","year":"2014","unstructured":"Stephen T. Margulis. 2011. Three Theories of Privacy: An Overview. In Privacy Online, Sabine Trepte and Leonard Reinecke (eds.). Springer Berlin Heidelberg, 9--17. Retrieved April 6, 2014 from http:\/\/link.springer.com.proxy.lib.umich.edu\/chapter\/10.1007\/978--3--642--21521--6_2"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-012-1215-8"},{"key":"e_1_2_1_54_1","volume-title":"Colum. Sci. & Tech. L. Rev. 18","author":"Martin Kirsten","year":"2016","unstructured":"Kirsten Martin and Helen Nissenbaum. 2016. Measuring Privacy: An Empirical Test Using Context to Expose Confounding Variables. Colum. Sci. & Tech. L. Rev. 18, (2017 2016), 176--218."},{"key":"e_1_2_1_55_1","first-page":"111","article-title":"Privacy Interests in Public Records: An Empirical Investigation","volume":"31","author":"Martin Kirsten","year":"2017","unstructured":"Kirsten Martin and Helen Nissenbaum. 2017. Privacy Interests in Public Records: An Empirical Investigation,. Harvard Journal of Law and Technology 31, 1 (2017), 111--143.","journal-title":"Harvard Journal of Law and Technology"},{"key":"e_1_2_1_56_1","first-page":"252","article-title":"What is it about Location","volume":"35","author":"Martin Kirsten","year":"2020","unstructured":"Kirsten Martin and Helen Nissenbaum. 2020. What is it about Location? Berkeley Technology Law Journal 35, 1 (2020), 252--326.","journal-title":"Berkeley Technology Law Journal"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444810365313"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543995"},{"key":"e_1_2_1_59_1","volume-title":"The private is political: networked privacy and social media","author":"Marwick Alice Emily","unstructured":"Alice Emily Marwick. 2023. The private is political: networked privacy and social media. Yale University Press, New Haven."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376167"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1017\/9781108749978.011"},{"key":"e_1_2_1_62_1","volume-title":"Google Cloud Blog. Retrieved","author":"Moore Gregory J.","year":"2018","unstructured":"Gregory J. Moore. 2018. New collaboration with Fitbit to drive positive health outcomes. Google Cloud Blog. Retrieved October 14, 2023 from https:\/\/cloud.google.com\/blog\/topics\/inside-google-cloud\/new-collaboration-fitbit-drive-positive-health-outcomes"},{"key":"e_1_2_1_63_1","volume-title":"Retrieved","author":"National Institutes of Health.","year":"2023","unstructured":"National Institutes of Health. 2023. Research Roundup: All of Us Participants' Fitbit Data Drive New Research. All of Us Research Program | NIH. Retrieved October 14, 2023 from https:\/\/allofus.nih.gov\/news-events\/announcements\/research-roundup-all-us-participants-fitbit-data-drive-new-research"},{"key":"e_1_2_1_64_1","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"Nissenbaum Helen","unstructured":"Helen Nissenbaum. 2010. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press, Stanford, CA."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107280557.016"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1515\/til-2019-0008"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444816688896"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502066"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--1--84628--901--9_10"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2685553.2699336"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","unstructured":"Mika Pantzar and Minna Ruckenstein. 2017. Living the metrics: Self-tracking and situated objectivity. DIGITAL HEALTH 3 (2017) 1--10. https:\/\/doi.org\/10.1177\/2055207617712590","DOI":"10.1177\/2055207617712590"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2242144"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3115768"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2019.3353"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1978945"},{"key":"e_1_2_1_77_1","volume-title":"Google taps fitness tracker market with $2.1 billion bid for Fitbit","author":"Rana Akanksha","year":"2023","unstructured":"Akanksha Rana and Noor Zainab Hussain. 2019. Google taps fitness tracker market with $2.1 billion bid for Fitbit. Reuters. Retrieved October 14, 2023 from https:\/\/www.reuters.com\/article\/us-fitbit-m-a-alphabet-idUSKBN1XB47G"},{"key":"e_1_2_1_78_1","volume-title":"Washington Post. Retrieved","author":"Rowland Christopher","year":"2019","unstructured":"Christopher Rowland. 2019. With fitness trackers in the workplace, bosses can monitor your every step - and possibly more. Washington Post. Retrieved January 14, 2023 from https:\/\/www.washingtonpost.com\/business\/economy\/with-fitness-trackers-in-the-workplace-bosses-can-monitor-your-every-step--and-possibly-more\/2019\/02\/15\/75ee0848--2a45--11e9-b011-d8500644dc98_story.html"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","unstructured":"Madelyn Rose Sanfilippo Brett M. Frischmann and Katherine J. Strandburg (Eds.). 2021. Governing Privacy in Knowledge Commons (1st ed.). Cambridge University Press. https:\/\/doi.org\/10.1017\/9781108749978","DOI":"10.1017\/9781108749978"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470660"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557421"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.24633"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1609\/hcomp.v4i1.13271"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415172"},{"key":"e_1_2_1_85_1","volume-title":"Health Data Management. Retrieved","author":"Slabodkin Gret","year":"2020","unstructured":"Gret Slabodkin. 2020. Fitbit looks to expand healthcare partnerships in 2020. Health Data Management. Retrieved October 14, 2023 from https:\/\/www.healthdatamanagement.com\/articles\/[object Object]"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-021-04863--8"},{"key":"e_1_2_1_87_1","volume-title":"CNBC. Retrieved","author":"Stevenson Abigail","year":"2016","unstructured":"Abigail Stevenson. 2016. Fitbit CEO reveals he's transforming the mission and purpose of the company. CNBC. Retrieved October 14, 2023 from https:\/\/www.cnbc.com\/2016\/10\/06\/fitbit-ceo-reveals-hes-transforming-the-mission-and-purpose-of-the-company.html"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.3390\/s17061277"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/2494091.2494123"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445517"},{"key":"e_1_2_1_91_1","first-page":"0","article-title":"When Do Data Collection and Use Become a Matter of Concern? A Cross-Cultural Comparison of U.","volume":"17","author":"Vitak Jessica","year":"2023","unstructured":"Jessica Vitak, Yuting Liao, Anouk Mols, Daniel Trottier, Michael Zimmer, Priya C. Kumar, and Jason Pridmore. 2023. When Do Data Collection and Use Become a Matter of Concern? A Cross-Cultural Comparison of U.S. and Dutch Privacy Attitudes. International Journal of Communication 17, 0 (January 2023), 28.","journal-title":"S. and Dutch Privacy Attitudes. International Journal of Communication"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/2685553.2685554"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305120948250"},{"key":"e_1_2_1_94_1","volume-title":"About one-in-five Americans use a smart watch or fitness tracker","author":"Vogels Emily A.","year":"2023","unstructured":"Emily A. Vogels. 2020. About one-in-five Americans use a smart watch or fitness tracker. Pew Research Center. Retrieved January 14, 2023 from https:\/\/www.pewresearch.org\/fact-tank\/2020\/01\/09\/about-one-in-five-americans-use-a-smart-watch-or-fitness-tracker\/"},{"key":"e_1_2_1_95_1","volume-title":"Numbered lives: life and death in quantum media","author":"Wernimont Jacqueline","unstructured":"Jacqueline Wernimont. 2018. Numbered lives: life and death in quantum media. The MIT Press, Cambridge, MA."},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--82786--1_2"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.24232"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819948"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533222"},{"key":"e_1_2_1_101_1","first-page":"109","article-title":"Privacy on Planet Google: Using the Theory of ?Contextual Integrity\" to Expose the Privacy Threads of Google's Quest for the Perfect Search Engine","volume":"3","author":"Zimmer Michael","year":"2008","unstructured":"Michael Zimmer. 2008. Privacy on Planet Google: Using the Theory of ?Contextual Integrity\" to Expose the Privacy Threads of Google's Quest for the Perfect Search Engine. Journal of Business & Technology Law 3, 2 (2008), 109--126.","journal-title":"Journal of Business & Technology Law"},{"key":"e_1_2_1_102_1","volume-title":"Addressing conceptual gaps in big data research ethics: An application of contextual integrity. Social Media + Society 4, 2","author":"Zimmer Michael","year":"2018","unstructured":"Michael Zimmer. 2018. Addressing conceptual gaps in big data research ethics: An application of contextual integrity. Social Media + Society 4, 2 (2018)."},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1543442"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3653710","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3653710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:23:46Z","timestamp":1755883426000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3653710"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,17]]},"references-count":103,"journal-issue":{"issue":"CSCW1","published-print":{"date-parts":[[2024,4,17]]}},"alternative-id":["10.1145\/3653710"],"URL":"https:\/\/doi.org\/10.1145\/3653710","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,17]]},"assertion":[{"value":"2024-04-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}