{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:46:20Z","timestamp":1776113180274,"version":"3.50.1"},"reference-count":62,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T00:00:00Z","timestamp":1736467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"BMBF","award":["16KIS1892"],"award-info":[{"award-number":["16KIS1892"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,1,10]]},"abstract":"<jats:p>\n            Investigating digital privacy behavior requires consideration of its contextual nuances and the underlying social norms. This study delves into users' joint articulation of such norms by probing their implicit assumptions and \"common sense\" surrounding privacy conventions. To achieve this, we introduce\n            <jats:italic toggle=\"yes\">Privacy Taboo,<\/jats:italic>\n            a card game designed to serve as a playful breaching interview method, fostering discourse on unwritten privacy rules. Through nine interviews involving pairs of participants (n=18), we explore the decision-making and collective negotiation of privacy's vagueness. Our findings demonstrate individuals' ability to articulate their information needs when consenting to fictive data requests, even when contextual cues are limited. By shedding light on the social construction of privacy, this research contributes to a more comprehensive understanding of usable privacy, thereby facilitating the development of democratic privacy frameworks. Moreover, we posit\n            <jats:italic toggle=\"yes\">Privacy Taboo<\/jats:italic>\n            as a versatile tool adaptable to diverse domains of application and research.\n          <\/jats:p>","DOI":"10.1145\/3701202","type":"journal-article","created":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T16:06:46Z","timestamp":1736525206000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Playing with Privacy: Exploring the Social Construction of Privacy Norms Through a Card Game"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4092-0349","authenticated-orcid":false,"given":"Jenny","family":"Berkholz","sequence":"first","affiliation":[{"name":"University of Siegen, Siegen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0986-5130","authenticated-orcid":false,"given":"Aniqa","family":"Rahman","sequence":"additional","affiliation":[{"name":"University of Siegen, Siegen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7785-5061","authenticated-orcid":false,"given":"Gunnar","family":"Stevens","sequence":"additional","affiliation":[{"name":"University of Siegen &amp; Bonn-Rhein-Sieg University of Applied Science, Siegen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,1,10]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670528"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01883.x"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2018.09.002"},{"key":"e_1_2_1_4_1","volume-title":"Toward a sociology of privacy. Annual review of sociology","author":"Anthony Denise","year":"2017","unstructured":"Denise Anthony, Celeste Campos-Castillo, and Christine Horne. 2017. Toward a sociology of privacy. Annual review of sociology, Vol. 43 (2017), 249--269."},{"key":"e_1_2_1_5_1","volume-title":"VS Verlag f\u00fcr Sozialwissenschaften","author":"Bohnsack Ralf","unstructured":"Ralf Bohnsack. 1999. Gruppendiskussionsverfahren. VS Verlag f\u00fcr Sozialwissenschaften, Wiesbaden. 123--142 pages."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951715608406"},{"key":"e_1_2_1_7_1","volume-title":"Distinction: A social critique of the judgement of taste","author":"Bourdieu Pierre","year":"1984","unstructured":"Pierre Bourdieu. 1984. Distinction: A social critique of the judgement of taste. Harvard university press, Cambridge, MA, USA."},{"key":"e_1_2_1_8_1","volume-title":"Thematic Analysis","author":"Braun Virginia","unstructured":"Virginia Braun and Victoria Clarke. 2012. Thematic Analysis. American Psychological Association, Washington, DC. 57--71 pages."},{"key":"e_1_2_1_9_1","volume-title":"An extended privacy calculus model for e-commerce transactions. Information systems research","author":"Dinev Tamara","year":"2006","unstructured":"Tamara Dinev and Paul Hart. 2006. An extended privacy calculus model for e-commerce transactions. Information systems research, Vol. 17, 1 (2006), 61--80."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3469845"},{"key":"e_1_2_1_11_1","volume-title":"Human Factors in Privacy Research","author":"Distler Verena","unstructured":"Verena Distler, Matthias Fassl, Hana Habib, Katharina Krombholz, Gabriele Lenzini, Carine Lallemand, Vincent Koenig, and Lorrie Faith Cranor. 2023. Empirical Research Methods in Usable Privacy and Security. In Human Factors in Privacy Research. Springer International Publishing Cham, Switzerland, 29--53."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124855"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287585"},{"key":"e_1_2_1_14_1","volume-title":"Truth, Strategy","author":"Foucault Michel","unstructured":"Michel Foucault. 1979. Power, Truth, Strategy. Feral Publications, Sydney."},{"key":"e_1_2_1_15_1","volume-title":"Studies of the routine grounds of everyday activities. Social problems","author":"Garfinkel Harold","year":"1964","unstructured":"Harold Garfinkel. 1964. Studies of the routine grounds of everyday activities. Social problems, Vol. 11, 3 (1964), 225--250."},{"key":"e_1_2_1_16_1","volume-title":"Usable security: History, themes, and challenges","author":"Garfinkel Simson","unstructured":"Simson Garfinkel and Heather Richter Lipford. 2014. Usable security: History, themes, and challenges. Morgan & Claypool Publishers, San Rafael, California."},{"key":"e_1_2_1_17_1","volume-title":"Human Factors in Privacy Research","author":"Gerber Nina","unstructured":"Nina Gerber and Alina St\u00f6ver. 2023. From the Privacy Calculus to Crossing the Rubicon: An Introduction to Theoretical Models of User Privacy Behavior. In Human Factors in Privacy Research. Springer International Publishing Cham, Switzerland, 11--25."},{"key":"e_1_2_1_18_1","volume-title":"The SAGE handbook of new approaches in management and organization","author":"Gherardi Silvia","unstructured":"Silvia Gherardi. 2008. Situated knowledge and situated action: What do practice-based studies promise. In The SAGE handbook of new approaches in management and organization. Sage London, Limited, United Kingdom, 516--525."},{"key":"e_1_2_1_19_1","volume-title":"Asylums: Essays on the Social Situation of Mental Patients and Other Inmates","author":"Goffman Erving","unstructured":"Erving Goffman. 1961. The Underlife of a Public Institution: A Study of Ways of Making Out in a Mental Hospital. In Asylums: Essays on the Social Situation of Mental Patients and Other Inmates. Anchor Books, New York, NY, 172--320."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3585676"},{"key":"e_1_2_1_21_1","volume-title":"The inequality reader","author":"Hargittai Eszter","unstructured":"Eszter Hargittai. 2018. The digital reproduction of inequality. In The inequality reader. Routledge, New York, NY, USA, 660--670."},{"key":"e_1_2_1_22_1","volume-title":"technology, and norms: The case of smart meters. Social science research","author":"Horne Christine","year":"2015","unstructured":"Christine Horne, Brice Darras, Elyse Bean, Anurag Srivastava, and Scott Frickel. 2015. Privacy, technology, and norms: The case of smart meters. Social science research, Vol. 51 (2015), 64--76."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2008.11.002"},{"key":"e_1_2_1_24_1","unstructured":"ISO. 03.08.2024. ISO\/IEC 27001:2022. https:\/\/www.iso.org\/standard\/27001"},{"key":"e_1_2_1_25_1","volume-title":"Personal information management systems: a user-centric privacy utopia? Published in Internet Policy Review (18","author":"Janssen Heleen","year":"2020","unstructured":"Heleen Janssen, Jennifer Cobbe, and Jatinder Singh. 2020. Personal information management systems: a user-centric privacy utopia? Published in Internet Policy Review (18 December 2020), Vol. 9, 4 (2020), 1--25."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92182-8_18"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_2_1_28_1","volume-title":"Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & security","author":"Kokolakis Spyros","year":"2017","unstructured":"Spyros Kokolakis. 2017. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & security, Vol. 64 (2017), 122--134."},{"key":"e_1_2_1_29_1","first-page":"703","article-title":"The Birth of Privacy Law: A Century Since Warren and Brandeis","volume":"39","author":"Kramer Irwin R","year":"1989","unstructured":"Irwin R Kramer. 1989. The Birth of Privacy Law: A Century Since Warren and Brandeis. Catholic University Law Review, Vol. 39 (1989), 703.","journal-title":"Catholic University Law Review"},{"key":"e_1_2_1_30_1","volume-title":"Connected' presence: The emergence of a new repertoire for managing social relationships in a changing communication technoscape. Environment and planning D: Society and space","author":"Licoppe Christian","year":"2004","unstructured":"Christian Licoppe. 2004. 'Connected' presence: The emergence of a new repertoire for managing social relationships in a changing communication technoscape. Environment and planning D: Society and space, Vol. 22, 1 (2004), 135--156."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702142"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173754"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1751-9020.2010.00285.x"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579523"},{"key":"e_1_2_1_36_1","volume-title":"Do-It-yourself data protection-Empowerment or burden? Data protection on the move: Current developments in ICT and privacy\/data protection","author":"Matzner Tobias","year":"2016","unstructured":"Tobias Matzner, Philipp K Masur, Carsten Ochs, and Thilo von Pape. 2016. Do-It-yourself data protection-Empowerment or burden? Data protection on the move: Current developments in ICT and privacy\/data protection, Vol. 24 (2016), 277--305."},{"key":"e_1_2_1_37_1","volume-title":"Soziologie und Anthropologie. 2. Gabentausch","author":"Mauss Marcel","unstructured":"Marcel Mauss. 1997. Soziologie und Anthropologie. 2. Gabentausch; Soziologie und Psychologie; Todesvorstellungen; K\u00f6rpertechniken; Begriff der Person. Fischer-Taschenbuch-Verlag, Wiesbaden."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cobeha.2015.04.006"},{"key":"e_1_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Maurice Merleau-Ponty. 2012. Phenomenology of perception (DA Landes trans.).","DOI":"10.4324\/9780203720714"},{"key":"e_1_2_1_40_1","volume-title":"The future of audiences: A foresight analysis of interfaces and engagement","author":"Mollen Anne","unstructured":"Anne Mollen and Frederik Dhaenens. 2018. Audiences' coping practices with intrusive interfaces: Researching audiences in algorithmic, datafied, platform societies. In The future of audiences: A foresight analysis of interfaces and engagement. Springer International Publishing AG, Switzerland, 43--60."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1177\/2050157920970582"},{"key":"e_1_2_1_42_1","volume-title":"Introducing dyadic interviews as a method for collecting qualitative data. Qualitative health research","author":"Morgan David L","year":"2013","unstructured":"David L Morgan, Jutta Ataie, Paula Carder, and Kim Hoffman. 2013. Introducing dyadic interviews as a method for collecting qualitative data. Qualitative health research, Vol. 23, 9 (2013), 1276--1284."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340631.3394841"},{"key":"e_1_2_1_44_1","volume-title":"Home and Work: Negotiating Boundaries Through Everyday Life","author":"Nippert-Eng Christena E","unstructured":"Christena E Nippert-Eng. 1996. Home and Work: Negotiating Boundaries Through Everyday Life. Chicago: Univ."},{"key":"e_1_2_1_45_1","volume-title":"Privacy in Context","author":"Nissenbaum Helen","unstructured":"Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. In Privacy in Context. Stanford University Press, USA."},{"key":"e_1_2_1_46_1","volume-title":"Reflexive Wissensproduktion","author":"Oevermann Ulrich","unstructured":"Ulrich Oevermann. 2013. Objektive Hermeneutik als Methodologie der Erfahrungswissenschaften von der sinnstrukturierten Welt. In Reflexive Wissensproduktion. Springer, Wiesbaden, Germany, 69--98."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v15i8.3075"},{"key":"e_1_2_1_48_1","article-title":"Putting the Right P in PIMS: Normative Challenges for Protecting Vulnerable People's Data through Personal Information Management Systems","volume":"13","author":"Piasecki Stanislaw","year":"2022","unstructured":"Stanislaw Piasecki, Jiahong Chen, and Derek McAuley. 2022. Putting the Right P in PIMS: Normative Challenges for Protecting Vulnerable People's Data through Personal Information Management Systems. European Journal of Law and Technology, Vol. 13, 3 (2022).","journal-title":"European Journal of Law and Technology"},{"key":"e_1_2_1_49_1","volume-title":"Modern Socio-Technical Perspectives on Privacy","author":"Proferes Nicholas","unstructured":"Nicholas Proferes. 2022. The development of privacy norms. In Modern Socio-Technical Perspectives on Privacy. Springer International Publishing, Cham, 79--90."},{"key":"e_1_2_1_50_1","volume-title":"New Directions in Third Wave Human-Computer Interaction","author":"Rapp Amon","unstructured":"Amon Rapp. 2018. Autoethnography in human-computer interaction: Theory and practice. In New Directions in Third Wave Human-Computer Interaction: Volume 2-Methodologies. Springer, Heidelberg, Germany, 25--42."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v12i3.4958"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188671"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1609\/hcomp.v7i1.5266"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951720923377"},{"key":"e_1_2_1_55_1","first-page":"477","article-title":"A taxonomy of privacy. U. Pa. l","volume":"154","author":"Solove Daniel J","year":"2005","unstructured":"Daniel J Solove. 2005. A taxonomy of privacy. U. Pa. l. Rev., Vol. 154 (2005), 477.","journal-title":"Rev."},{"key":"e_1_2_1_56_1","volume-title":"Negotiations: Varieties, contexts, processes, and social order.","author":"Strauss Anselm","year":"1978","unstructured":"Anselm Strauss. 1978. Negotiations: Varieties, contexts, processes, and social order. Vol. 114. Jossey-Bass San Francisco, San Francisco."},{"key":"e_1_2_1_57_1","volume-title":"Psychiatric ideologies and institutions","author":"Strauss Anselm","unstructured":"Anselm Strauss. 2017. Psychiatric ideologies and institutions. Routledge, London."},{"key":"e_1_2_1_58_1","volume-title":"Grounded theory in practice","author":"Strauss Anselm","unstructured":"Anselm Strauss and Juliet M Corbin. 1997. Grounded theory in practice. Sage, Thousand Oaks."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2926676.2926687"},{"key":"e_1_2_1_60_1","first-page":"59","article-title":"A theory of creepy: technology, privacy and shifting social norms","volume":"16","author":"Tene Omer","year":"2013","unstructured":"Omer Tene and Jules Polonetsky. 2013. A theory of creepy: technology, privacy and shifting social norms. Yale JL & Tech., Vol. 16 (2013), 59.","journal-title":"Yale JL & Tech."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209811.3209818"},{"key":"e_1_2_1_62_1","first-page":"166","article-title":"Privacy and freedom","volume":"25","author":"Westin Alan F","year":"1968","unstructured":"Alan F Westin. 1968. Privacy and freedom. Washington and Lee Law Review, Vol. 25, 1 (1968), 166.","journal-title":"Washington and Lee Law Review"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701202","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3701202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T14:25:01Z","timestamp":1755872701000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701202"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,10]]},"references-count":62,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,10]]}},"alternative-id":["10.1145\/3701202"],"URL":"https:\/\/doi.org\/10.1145\/3701202","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,10]]},"assertion":[{"value":"2025-01-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}