{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:56:45Z","timestamp":1776117405075,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":73,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T00:00:00Z","timestamp":1728604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2311102"],"award-info":[{"award-number":["2311102"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,13]]},"DOI":"10.1145\/3654777.3676380","type":"proceedings-article","created":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T10:50:36Z","timestamp":1728643836000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Feminist Interaction Techniques: Social Consent Signals to Deter NCIM Screenshots"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-3720-7086","authenticated-orcid":false,"given":"Li","family":"Qiwei","sequence":"first","affiliation":[{"name":"School of Information, University of Michigan, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6961-7779","authenticated-orcid":false,"given":"Francesca","family":"Lameiro","sequence":"additional","affiliation":[{"name":"School of Information, University of Michigan, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6068-5892","authenticated-orcid":false,"given":"Shefali","family":"Patel","sequence":"additional","affiliation":[{"name":"School of Information, University of Michigan, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0123-8174","authenticated-orcid":false,"given":"Cristi","family":"Isaula-Reyes","sequence":"additional","affiliation":[{"name":"University of Michigan, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1911-836X","authenticated-orcid":false,"given":"Eytan","family":"Adar","sequence":"additional","affiliation":[{"name":"School of Information, University of Michigan, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3047-7059","authenticated-orcid":false,"given":"Eric","family":"Gilbert","sequence":"additional","affiliation":[{"name":"School of Information, University of Michigan, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8688-1595","authenticated-orcid":false,"given":"Sarita","family":"Schoenebeck","sequence":"additional","affiliation":[{"name":"School of Information, University of Michigan, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,10,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The intellectual challenge of CSCW: the gap between social requirements and technical feasibility. Human\u2013Computer Interaction 15, 2-3","author":"Ackerman S","year":"2000","unstructured":"Mark\u00a0S Ackerman. 2000. The intellectual challenge of CSCW: the gap between social requirements and technical feasibility. Human\u2013Computer Interaction 15, 2-3 (2000), 179\u2013203."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/math11071730"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753521"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2133"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2668332.2668339"},{"key":"e_1_3_2_1_6_1","volume-title":"Sharenting\u2013Why do parents violate their children\u2019s privacy?The New Educational Review 54","author":"Brosch Anna","year":"2018","unstructured":"Anna Brosch. 2018. Sharenting\u2013Why do parents violate their children\u2019s privacy?The New Educational Review 54 (2018), 75\u201385."},{"key":"e_1_3_2_1_7_1","first-page":"1870","article-title":"Sexual privacy","volume":"128","author":"Citron Danielle\u00a0Keats","year":"2018","unstructured":"Danielle\u00a0Keats Citron. 2018. Sexual privacy. Yale LJ 128 (2018), 1870.","journal-title":"Yale LJ"},{"key":"e_1_3_2_1_8_1","volume-title":"The Fight for Privacy: Protecting Dignity, Identity and Love in our Digital Age","author":"Citron Danielle\u00a0Keats","unstructured":"Danielle\u00a0Keats Citron. 2022. The Fight for Privacy: Protecting Dignity, Identity and Love in our Digital Age. W.W. Norton & Company."},{"key":"e_1_3_2_1_9_1","first-page":"345","article-title":"Criminalizing revenge porn","volume":"49","author":"Citron Danielle\u00a0Keats","year":"2014","unstructured":"Danielle\u00a0Keats Citron and Mary\u00a0Anne Franks. 2014. Criminalizing revenge porn. Wake Forest L. Rev. 49 (2014), 345.","journal-title":"Wake Forest L. Rev."},{"key":"e_1_3_2_1_10_1","volume-title":"Design justice: Community-led practices to build the worlds we need","author":"Costanza-Chock Sasha","unstructured":"Sasha Costanza-Chock. 2020. Design justice: Community-led practices to build the worlds we need. The MIT Press."},{"key":"e_1_3_2_1_11_1","unstructured":"Emily\u00a0M Cramer Yoonmo Sang and Sunyoung Park. [n. d.]. Uses and Gratifications of the Screenshot in Human Communication: An Exploratory Study [1]. ([n. d.])."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-14291-z"},{"key":"e_1_3_2_1_13_1","volume-title":"The corporate cultivation of digital resignation. New media & society 21, 8","author":"Draper A","year":"2019","unstructured":"Nora\u00a0A Draper and Joseph Turow. 2019. The corporate cultivation of digital resignation. New media & society 21, 8 (2019), 1824\u20131839."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858409"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2468823"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174241"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134681"},{"key":"e_1_3_2_1_18_1","volume-title":"Value-sensitive design. interactions 3, 6","author":"Friedman Batya","year":"1996","unstructured":"Batya Friedman. 1996. Value-sensitive design. interactions 3, 6 (1996), 16\u201323."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2002.994366"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/332040.332433"},{"key":"e_1_3_2_1_21_1","unstructured":"Christine Geeng. [n. d.]. Usable Sexurity: Studying People\u2019s Concerns and Strategies When Sexting. ([n. d.])."},{"key":"e_1_3_2_1_22_1","volume-title":"Concerns and Strategies When Sexting. In Sixteenth Symposium on Usable Privacy and Security (SOUPS","author":"Geeng Christine","year":"2020","unstructured":"Christine Geeng, Jevan Hutson, and Franziska Roesner. 2020. Usable Sexurity: Studying { People\u2019s} Concerns and Strategies When Sexting. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). 127\u2013144."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3450404"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.3390\/e25020288"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1037\/e577632012-009"},{"key":"e_1_3_2_1_26_1","volume-title":"Advances in psychology. Vol.\u00a052","author":"Hart G","unstructured":"Sandra\u00a0G Hart and Lowell\u00a0E Staveland. 1988. Development of NASA-TLX (Task Load Index): Results of empirical and theoretical research. In Advances in psychology. Vol.\u00a052. Elsevier, 139\u2013183."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.175"},{"key":"e_1_3_2_1_28_1","volume-title":"Image-based sexual abuse: A study on the causes and consequences of non-consensual nude or sexual imagery","author":"Henry Nicola","unstructured":"Nicola Henry, Clare McGlynn, Asher Flynn, Kelly Johnson, Anastasia Powell, and Adrian\u00a0J Scott. 2020. Image-based sexual abuse: A study on the causes and consequences of non-consensual nude or sexual imagery. Routledge."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813603"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813603"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445778"},{"key":"e_1_3_2_1_32_1","unstructured":"Cyber Civil\u00a0Rights Initiative. 2014. Revenge Porn Statistics. (2014). https:\/\/www.cybercivilrights.org\/wp-content\/uploads\/2014\/12\/RPStatistics.pdf"},{"key":"e_1_3_2_1_33_1","volume-title":"What\u2019s communication got to do with it? Gesture in children blind from birth.Developmental psychology 33, 3","author":"Iverson M","year":"1997","unstructured":"Jana\u00a0M Iverson and Susan Goldin-Meadow. 1997. What\u2019s communication got to do with it? Gesture in children blind from birth.Developmental psychology 33, 3 (1997), 453."},{"key":"e_1_3_2_1_34_1","unstructured":"Xiao-Dan Jiang Shi-Ming Yu De-Feng He Yong-Liang Liu and Zhe-Ming Lu. [n. d.]. Information Leakage Source Tracing Based on Robust Image Watermarking Against Mobile Instant Messaging. ([n. d.])."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1186\/s41235-016-0004-9"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 10th International Conference on Cyber Warfare and Security. 162\u2013169","author":"Khan Zubeida\u00a0Casmod","year":"2015","unstructured":"Zubeida\u00a0Casmod Khan, Thulani Mashiane, and Nobubele\u00a0A Shozi. 2015. Snapchat media retrieval for novice device users. In Proceedings of the 10th International Conference on Cyber Warfare and Security. 162\u2013169."},{"key":"e_1_3_2_1_37_1","unstructured":"Una Lee and Dann Toliver. 2017. Building Consentful Tech. Technical Report. http:\/\/www.consentfultech.io\/wp-content\/uploads\/2019\/10\/Building-Consentful-Tech.pdf"},{"key":"e_1_3_2_1_38_1","first-page":"919","article-title":"We, the Paparazzi: Developing a Privacy Paradigm for Digital Video","volume":"95","author":"Lipton D","year":"2009","unstructured":"Jacqueline\u00a0D Lipton. 2009. We, the Paparazzi: Developing a Privacy Paradigm for Digital Video. Iowa L. Rev. 95 (2009), 919.","journal-title":"Iowa L. Rev."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560905.3568514"},{"key":"e_1_3_2_1_40_1","volume-title":"Practices Online. In 30th USENIX Security Symposium (USENIX Security 21)","author":"McDonald Allison","year":"2021","unstructured":"Allison McDonald, Catherine Barwulor, Michelle\u00a0L Mazurek, Florian Schaub, and Elissa\u00a0M Redmiles. 2021. \" It\u2019s stressful having all these phones\": Investigating Sex Workers\u2019 Safety Goals, Risks, and Practices Online. In 30th USENIX Security Symposium (USENIX Security 21). 375\u2013392."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1177\/0964663920947791"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of graphics interface","author":"Morris Meredith\u00a0Ringel","year":"2010","unstructured":"Meredith\u00a0Ringel Morris, Jacob\u00a0O Wobbrock, and Andrew\u00a0D Wilson. 2010. Understanding users\u2019 preferences for surface gestures. In Proceedings of graphics interface 2010. 261\u2013268."},{"key":"e_1_3_2_1_43_1","unstructured":"Cornelia M\u00fcller Alan Cienki Ellen Fricke Silva Ladewig David McNeill and Sedinha Tessendorf. 2013. Body-Language-Communication. Volume 1. Walter de Gruyter."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23002"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1177\/1524838020958057"},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 6, CSCW2","author":"Bin\u00a0Habib Pias Sabid","year":"2022","unstructured":"Sabid Bin\u00a0Habib Pias, Imtiaz Ahmad, Taslima Akter, Apu Kapadia, and Adam\u00a0J Lee. 2022. Decaying Photos for Enhanced Privacy: User Perceptions Towards Temporal Redactions and\u2019Trusted\u2019Platforms. Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022), 1\u201330."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598510.2598522"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.11.009"},{"key":"e_1_3_2_1_49_1","volume-title":"Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual Abuse. arXiv preprint arXiv:2403.04659","author":"Qin Lucy","year":"2024","unstructured":"Lucy Qin, Vaughn Hamilton, Sharon Wang, Yigit Aydinalp, Marin Scarlett, and Elissa\u00a0M Redmiles. 2024. \" Did They Consent to That?\": Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual Abuse. arXiv preprint arXiv:2403.04659 (2024)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753458"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infbeh.2007.02.010"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Deborah Schiffrin. 1974. Handwork as ceremony: The case of the handshake. (1974).","DOI":"10.1515\/semi.1974.12.3.189"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094562.1094569"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1177\/14614448231188929"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67235-9_3"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3204949.3204973"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451817"},{"key":"e_1_3_2_1_58_1","volume-title":"Digital Black Feminism","author":"Steele Catherine\u00a0Knight","unstructured":"Catherine\u00a0Knight Steele. 2021. Digital black feminism. In Digital Black Feminism. New York University Press."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2685553.2685561"},{"key":"e_1_3_2_1_60_1","volume-title":"29th USENIX security symposium (USENIX Security 20). 1893\u20131909.","author":"Tseng Emily","unstructured":"Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2020. The tools and tactics used in intimate partner surveillance: An analysis of online infidelity forums. In 29th USENIX security symposium (USENIX Security 20). 1893\u20131909."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3636458"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3508398.3511517"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2017.06.010"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1080\/10538712.2022.2067093"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557413"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518866"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518866"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294211.1294238"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0909197106"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790106"},{"key":"e_1_3_2_1_71_1","first-page":"90","article-title":"Body language in business negotiation","volume":"3","author":"Zhou Hui","year":"2008","unstructured":"Hui Zhou and Tingqin Zhang. 2008. Body language in business negotiation. International Journal of Business and Management 3, 2 (2008), 90\u201396.","journal-title":"International Journal of Business and Management"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117820"},{"key":"e_1_3_2_1_73_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Zou Yixin","year":"2021","unstructured":"Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin Roundy, Florian Schaub, and Acar Tamersoy. 2021. The role of computer security customer support in helping survivors of intimate partner violence. In 30th USENIX Security Symposium (USENIX Security 21). 429\u2013446."}],"event":{"name":"UIST '24: The 37th Annual ACM Symposium on User Interface Software and Technology","location":"Pittsburgh PA USA","acronym":"UIST '24"},"container-title":["Proceedings of the 37th Annual ACM Symposium on User Interface Software and Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3654777.3676380","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3654777.3676380","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T21:15:31Z","timestamp":1754342131000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3654777.3676380"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,11]]},"references-count":73,"alternative-id":["10.1145\/3654777.3676380","10.1145\/3654777"],"URL":"https:\/\/doi.org\/10.1145\/3654777.3676380","relation":{},"subject":[],"published":{"date-parts":[[2024,10,11]]},"assertion":[{"value":"2024-10-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}