{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:02:41Z","timestamp":1776103361656,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2055123,CNS-2206950, CNS-1933208"],"award-info":[{"award-number":["CNS-2055123,CNS-2206950, CNS-1933208"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690342","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"4197-4211","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["\"I Had Sort of a Sense that I Was Always Being Watched...Since I Was\": Examining Interpersonal Discomfort From Continuous Location-Sharing Applications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-2624-9195","authenticated-orcid":false,"given":"Kevin","family":"Childs","sequence":"first","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9173-3359","authenticated-orcid":false,"given":"Cassidy","family":"Gibson","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3522-4282","authenticated-orcid":false,"given":"Anna","family":"Crowder","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9806-5887","authenticated-orcid":false,"given":"Kevin","family":"Warren","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4717-6316","authenticated-orcid":false,"given":"Carson","family":"Stillman","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3930-8128","authenticated-orcid":false,"given":"Elissa M.","family":"Redmiles","sequence":"additional","affiliation":[{"name":"Georgetown University, Washington DC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5131-3355","authenticated-orcid":false,"given":"Eakta","family":"Jain","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7143-5189","authenticated-orcid":false,"given":"Patrick","family":"Traynor","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7498-4239","authenticated-orcid":false,"given":"Kevin R. B.","family":"Butler","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2024. Apple Check-In. https:\/\/support.apple.com\/guide\/iphone\/use-check-iniphc143bb7e9\/ ios"},{"key":"e_1_3_2_1_2_1","unstructured":"2024. Apple Find My. https:\/\/www.apple.com\/icloud\/find-my\/"},{"key":"e_1_3_2_1_3_1","unstructured":"2024. life360. https:\/\/www.life360.com\/"},{"key":"e_1_3_2_1_4_1","unstructured":"2024. Presentations. https:\/\/investor.snap.com\/events-and-presentations\/ presentations\/default.aspx"},{"key":"e_1_3_2_1_5_1","unstructured":"2024. Prolific. https:\/\/www.prolific.com"},{"key":"e_1_3_2_1_6_1","unstructured":"2024. T-Mobile FamilyWhere app. https:\/\/www.t-mobile.com\/support\/plansfeatures\/ t-mobile-familywhere-app"},{"key":"e_1_3_2_1_7_1","unstructured":"2024. Zoom. https:\/\/www.zoom.com"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Saleh Afroogh Amir Esmalian Ali Mostafavi Ali Akbari Kambiz Rasoulkhani Shahriar Esmaeili and Ehsan Hajiramezanali. 2022. Tracing app technology: an ethical review in the COVID-19 era and directions for post-COVID-19. Ethics and Inf. Technol. (2022).","DOI":"10.1007\/s10676-022-09659-6"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/PASSAT\/SocialCom.2011.119"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0102"},{"key":"e_1_3_2_1_11_1","unstructured":"Hazim Almuhimedi. 2017. Helping Smartphone Users Manage their Privacy through Nudges. Ph.D. Dissertation. Carnegie Mellon University USA."},{"key":"e_1_3_2_1_12_1","volume-title":"Driving with Guidance: Exploring the Trade-Off Between GPS Utility and Privacy Concerns Among Drivers. arXiv preprint arXiv:2309.12601","author":"AlSaqabi Yousef","year":"2023","unstructured":"Yousef AlSaqabi and Souti Chattopadhyay. 2023. Driving with Guidance: Exploring the Trade-Off Between GPS Utility and Privacy Concerns Among Drivers. arXiv preprint arXiv:2309.12601 (2023)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432699"},{"key":"e_1_3_2_1_14_1","unstructured":"Daniel G Borkowski Hingsum F Fung Hadi F Habal Kenneth Chao Sheng-roan Kai and II Robert D Packard. 1996. Cellular network-based location system."},{"key":"e_1_3_2_1_15_1","unstructured":"Paige M. Boshell. 2019. The Power of Place: Geolocation Tracking and Privacy. (2019)."},{"key":"e_1_3_2_1_16_1","volume-title":"Thematic analysis","author":"Braun Virginia","unstructured":"Virginia Braun and Victoria Clarke. 2012. Thematic analysis. American Psychological Association."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00061"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0057"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376240"},{"key":"e_1_3_2_1_20_1","volume-title":"Power, equity and commitment in exchange networks. American sociological review","author":"Cook Karen S","year":"1978","unstructured":"Karen S Cook and Richard M Emerson. 1978. Power, equity and commitment in exchange networks. American sociological review (1978)."},{"key":"e_1_3_2_1_21_1","unstructured":"Karen S Cook and Richard Marc Emerson. 1987. Social exchange theory. (1987)."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the International Conference on Web Intelligence, Mining and Semantics.","author":"Dalecke Sandor","year":"2020","unstructured":"Sandor Dalecke and Randi Karlsen. 2020. Designing dynamic and personalized nudges. In Proceedings of the International Conference on Web Intelligence, Mining and Semantics."},{"key":"e_1_3_2_1_23_1","volume-title":"Measuring agreement for multinomial data. Biometrics","author":"Davies Mark","year":"1982","unstructured":"Mark Davies and Joseph L Fleiss. 1982. Measuring agreement for multinomial data. Biometrics (1982)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1177\/0022002795039004003"},{"key":"e_1_3_2_1_25_1","unstructured":"Abby Dennis. 2020. How Google's Surveillance Technology Endangers Communities of Color. (2020)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/0886260507313526"},{"key":"e_1_3_2_1_27_1","volume-title":"Coercion in intimate partner violence: Toward a new conceptualization. Sex roles","author":"Dutton Mary Ann","year":"2005","unstructured":"Mary Ann Dutton and Lisa A Goodman. 2005. Coercion in intimate partner violence: Toward a new conceptualization. Sex roles (2005)."},{"key":"e_1_3_2_1_28_1","volume-title":"Emergent issues in families experiencing adolescent-to-parent abuse. Western Journal of Communication (includes Communication Reports) 68, 4","author":"Eckstein Nancy J","year":"2004","unstructured":"Nancy J Eckstein. 2004. Emergent issues in families experiencing adolescent-to-parent abuse. Western Journal of Communication (includes Communication Reports) 68, 4 (2004), 365--388."},{"key":"e_1_3_2_1_29_1","volume-title":"The Logic of Inductive Inference. Journal of the Royal Statistical Society","author":"Fisher R. A.","year":"1935","unstructured":"R. A. Fisher. 1935. The Logic of Inductive Inference. Journal of the Royal Statistical Society (1935)."},{"key":"e_1_3_2_1_30_1","volume-title":"Resource theory of social exchange. Handbook of social resource theory: Theoretical extensions, empirical insights, and social applications","author":"Foa Edna B","year":"2012","unstructured":"Edna B Foa and Uriel G Foa. 2012. Resource theory of social exchange. Handbook of social resource theory: Theoretical extensions, empirical insights, and social applications (2012)."},{"key":"e_1_3_2_1_31_1","volume-title":"Social theory re-wired","author":"Foucault Michel","unstructured":"Michel Foucault. 2023. Discipline and punish. In Social theory re-wired. Routledge."},{"key":"e_1_3_2_1_32_1","unstructured":"John RP French Bertram Raven et al. 1959. The bases of social power. Studies in social power (1959)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0101"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1281242"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Havron Sam","year":"2019","unstructured":"Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2019. Clinical Computer Security for Victims of Intimate Partner Violence. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_36_1","unstructured":"George C Homans. 1974. Social behavior: Its elementary forms. (1974)."},{"key":"e_1_3_2_1_37_1","volume-title":"How the Find My App Became an Accidental Friendship Fixture. The New York Times","author":"Huang Kalley","year":"2022","unstructured":"Kalley Huang. 2022. How the Find My App Became an Accidental Friendship Fixture. The New York Times (2022). https:\/\/www.nytimes.com\/2022\/08\/20\/technology\/find-my-app-friends.html"},{"key":"e_1_3_2_1_38_1","unstructured":"Alice Karanja and Daniel W Engels. 2018. Unintended Consequences of Location Information: Privacy Implications of Location Information Used in Advertising and Social Media. (2018)."},{"key":"e_1_3_2_1_39_1","unstructured":"Andrew Laningham. 2022. Are Location Sharing Features More Than a Convenient Tool? https:\/\/theharrispoll.com\/briefs\/location-sharing-features\/"},{"key":"e_1_3_2_1_40_1","volume-title":"Jinjuan Heidi Feng, and Harry Hochheiser","author":"Lazar Jonathan","year":"2017","unstructured":"Jonathan Lazar, Jinjuan Heidi Feng, and Harry Hochheiser. 2017. Research methods in human-computer interaction. Morgan Kaufmann."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/"},{"key":"e_1_3_2_1_42_1","volume-title":"The structure of interpersonal behavior. Sociometry","author":"Longabaugh Richard","year":"1966","unstructured":"Richard Longabaugh. 1966. The structure of interpersonal behavior. Sociometry (1966)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979296"},{"key":"e_1_3_2_1_44_1","volume-title":"Privacy and Power: Acknowledging the Importance of Privacy Research and Design for Vulnerable Populations. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems.","author":"McDonald Nora","unstructured":"Nora McDonald, Karla Badillo-Urquiola, Morgan G. Ames, Nicola Dell, Elizabeth Keneski, Manya Sleeper, and Pamela J. Wisniewski. 2020. Privacy and Power: Acknowledging the Importance of Privacy Research and Design for Vulnerable Populations. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems."},{"key":"e_1_3_2_1_45_1","volume-title":"Principle of operation of NAVSTAR and system characteristics. Navigation","author":"Milliken Robert J","year":"1978","unstructured":"Robert J Milliken and Curt J Zoller. 1978. Principle of operation of NAVSTAR and system characteristics. Navigation (1978)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502136"},{"key":"e_1_3_2_1_47_1","volume-title":"Power in negotiated and reciprocal exchange. American sociological review","author":"Molm Linda D","year":"1999","unstructured":"Linda D Molm, Gretchen Peterson, and Nobuyuki Takahashi. 1999. Power in negotiated and reciprocal exchange. American sociological review (1999)."},{"key":"e_1_3_2_1_48_1","volume-title":"Risk and trust in social exchange: An experimental test of a classical proposition. American journal of sociology","author":"Molm Linda D","year":"2000","unstructured":"Linda D Molm, Nobuyuki Takahashi, and Gretchen Peterson. 2000. Risk and trust in social exchange: An experimental test of a classical proposition. American journal of sociology (2000)."},{"key":"e_1_3_2_1_49_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79 (2004), 119.","journal-title":"Wash. L. Rev."},{"key":"e_1_3_2_1_50_1","volume-title":"You're virtually there?: Mobile communication practices, locational information sharing and place attachment. First Monday","author":"Ozkul Didem","year":"2013","unstructured":"Didem Ozkul. 2013. 'You're virtually there?: Mobile communication practices, locational information sharing and place attachment. First Monday (2013)."},{"key":"e_1_3_2_1_51_1","volume-title":"The social system","author":"Parsons Talcott","unstructured":"Talcott Parsons. 2013. The social system. Routledge."},{"key":"e_1_3_2_1_52_1","volume-title":"Social influence and power","author":"Raven Bertram Herbert","unstructured":"Bertram Herbert Raven. 1964. Social influence and power. University of California, Department of Psychology California (US)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2957276.2957289"},{"key":"e_1_3_2_1_54_1","volume-title":"Extended Abstracts of the CHI Conference on Human Factors in Computing Systems.","author":"Schneegass Christina","year":"2021","unstructured":"Christina Schneegass, Diana Irmscher, Florian Bemmann, and Daniel Buschek. 2021. LYLO -- Exploring Disclosed Configurations for Inter-Personal Location Sharing. In Extended Abstracts of the CHI Conference on Human Factors in Computing Systems."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10896-009-9264-1"},{"key":"e_1_3_2_1_56_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Stephenson Sophie","year":"2023","unstructured":"Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, and Rahul Chatterjee. 2023. Abuse Vectors: A Framework for Conceptualizing {IoT-Enabled} Interpersonal Abuse. In 32nd USENIX Security Symposium (USENIX Security 23). 69--86."},{"key":"e_1_3_2_1_57_1","volume-title":"The Ethical Implications of Digital Contact Tracing for LGBTQIA Communities. CoRR","author":"van Zyl Izak","year":"2021","unstructured":"Izak van Zyl and Nyx McLean. 2021. The Ethical Implications of Digital Contact Tracing for LGBTQIA Communities. CoRR (2021)."},{"key":"e_1_3_2_1_58_1","unstructured":"Navendu Vasavada. 2016. Fisher's Test for Exact Count Data Calculator with follow-up Chi-squared test. https:\/\/astatsa.com\/FisherTest\/"},{"key":"e_1_3_2_1_59_1","volume-title":"Guyonne Rogier, and Renata Tambelli.","author":"Velotti Patrizia","year":"2018","unstructured":"Patrizia Velotti, Sara Beomonte Zobel, Guyonne Rogier, and Renata Tambelli. 2018. Exploring relationships: A systematic review on intimate partner violence and attachment. Frontiers in psychology 9 (2018), 1166."},{"key":"e_1_3_2_1_60_1","volume-title":"Correcting for Acquiescent Response Bias in the Absence of a Balanced Scale: An Application to Class Consciousness. Sociological Methods & Research","year":"1992","unstructured":"DorothyWatson. 1992. Correcting for Acquiescent Response Bias in the Absence of a Balanced Scale: An Application to Class Consciousness. Sociological Methods & Research (1992)."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690342","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690342","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:10:21Z","timestamp":1755843021000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690342"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":60,"alternative-id":["10.1145\/3658644.3690342","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690342","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}