{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:21:01Z","timestamp":1776093661800,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100016964","name":"Werner Siemens-Stiftung","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016964","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3713654","type":"proceedings-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T03:20:47Z","timestamp":1745464847000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Out of Sight, Out of Mind? Exploring Data Protection Practices for Personal Data in Usable Security &amp; Privacy Studies"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8483-4042","authenticated-orcid":false,"given":"Florin","family":"Martius","sequence":"first","affiliation":[{"name":"University of Bonn, Bonn, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8126-1306","authenticated-orcid":false,"given":"Luisa","family":"Jansen","sequence":"additional","affiliation":[{"name":"Institute of Psychology, University of Bern, Bern, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5613-0646","authenticated-orcid":false,"given":"Lukas","family":"Struck","sequence":"additional","affiliation":[{"name":"Universit\u00e4t Bonn, Bonn, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1884-4749","authenticated-orcid":false,"given":"Arthi","family":"Arumugam","sequence":"additional","affiliation":[{"name":"University of Bonn, Bonn, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5844-559X","authenticated-orcid":false,"given":"Lisa","family":"Geierhaas","sequence":"additional","affiliation":[{"name":"University of Bonn, Bonn, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5735-178X","authenticated-orcid":false,"given":"Anna-Marie","family":"Ortloff","sequence":"additional","affiliation":[{"name":"University of Bonn, Bonn, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2724-1379","authenticated-orcid":false,"given":"Matthew","family":"Smith","sequence":"additional","affiliation":[{"name":"University of Bonn, Bonn, Germany and Fraunhofer FKIE, Bonn, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0904-1437","authenticated-orcid":false,"given":"Christian","family":"Tiefenau","sequence":"additional","affiliation":[{"name":"University of Bonn, Bonn, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_3_2_2","unstructured":"ACM 2021. ACM Publications Policy on Research Involving Human Participants and Subjects. https:\/\/www.acm.org\/publications\/policies\/research-involving-human-participants-and-subjects"},{"key":"e_1_3_3_3_3_2","doi-asserted-by":"publisher","unstructured":"Amrei Bahr Christine Blume Kristin Eichhorn and Sebastian Kubon. 2021. With #IchBinHanna German academia protests against a law that forces researchers out. Nature Human Behaviour 5 9 (Aug. 2021) 1114\u20131115. 10.1038\/s41562-021-01178-6","DOI":"10.1038\/s41562-021-01178-6"},{"key":"e_1_3_3_3_4_2","doi-asserted-by":"publisher","unstructured":"Siviwe Bangani and Mathew Moyo. 2019. Data Sharing Practices Among Researchers at South African Universities. Data Science Journal 18 1 (July 2019) 28. 10.5334\/dsj-2019-028","DOI":"10.5334\/dsj-2019-028"},{"key":"e_1_3_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376718"},{"key":"e_1_3_3_3_6_2","first-page":"27","volume-title":"Die Forschungsklauseln im neuen Datenschutzrecht","author":"Bernhardt Ute","year":"2018","unstructured":"Ute Bernhardt, Ingo Ruhmann, and Thilo Weichert. 2018. Die Forschungsklauseln im neuen Datenschutzrecht. Technical Report. Netzwerk Datenschutz. 27 pages."},{"key":"e_1_3_3_3_7_2","unstructured":"Legislative\u00a0Services Branch. 2000. Consolidated Federal Laws of Canada Personal Information Protection and Electronic Documents Act. https:\/\/laws-lois.justice.gc.ca\/eng\/acts\/p-8.6\/index.html"},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858313"},{"key":"e_1_3_3_3_9_2","volume-title":"Constructing grounded theory (2. ed ed.)","author":"Charmaz Kathy","year":"2014","unstructured":"Kathy Charmaz. 2014. Constructing grounded theory (2. ed ed.). SAGE, Los Angeles, Calif."},{"key":"e_1_3_3_3_10_2","unstructured":"Cal.\u00a0Civil Code. 2018. 1.81.5. California Consumer Privacy Act of 2018 [1798.100 - 1798.199.100]. https:\/\/leginfo.legislature.ca.gov\/faces\/codes_displayText.xhtml?division=3.&part=4.&lawCode=CIV&title=1.81.5"},{"key":"e_1_3_3_3_11_2","unstructured":"Utah Code. 2022. Chapter 61 Utah Consumer Privacy Act. https:\/\/le.utah.gov\/xcode\/Title13\/Chapter61\/13-61.html"},{"key":"e_1_3_3_3_12_2","unstructured":"DMP DCC [n. d.]. Checklist for a Data Management Plan. https:\/\/www.dcc.ac.uk\/DMPs\/Checklist"},{"key":"e_1_3_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.29085\/9781856048910.006"},{"key":"e_1_3_3_3_14_2","doi-asserted-by":"publisher","unstructured":"Edward\u00a0S. Dove. 2018. The EU General Data Protection Regulation: Implications for International Scientific Research in the Digital Era. Journal of Law Medicine & Ethics 46 4 (Dec. 2018) 1013\u20131030. 10.1177\/1073110518822003","DOI":"10.1177\/1073110518822003"},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"publisher","unstructured":"Rossana Ducato. 2020. Data protection scientific research and the role of information. Computer Law & Security Review 37 (July 2020) 105412. 10.1016\/j.clsr.2020.105412","DOI":"10.1016\/j.clsr.2020.105412"},{"key":"e_1_3_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188395"},{"key":"e_1_3_3_3_17_2","first-page":"39","volume-title":"Responsible Research and Innovation (RRI), Science and Technology","year":"2013","unstructured":"EU 2013. Responsible Research and Innovation (RRI), Science and Technology. Technical Report 1096 \/ SP401. European Commission. 39 pages. https:\/\/europa.eu\/eurobarometer\/surveys\/detail\/1096"},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"publisher","unstructured":"Jos\u00e9 Fernandes Carolina Machado and Lu\u00eds Amaral. 2022. Identifying critical success factors for the General Data Protection Regulation implementation in higher education institutions. Digital Policy Regulation and Governance 24 4 (Sept. 2022) 355\u2013379. 10.1108\/DPRG-03-2021-0041","DOI":"10.1108\/DPRG-03-2021-0041"},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-79-2"},{"key":"e_1_3_3_3_20_2","doi-asserted-by":"publisher","unstructured":"Nollaig Frost Sevasti\u00a0Melissa Nolas Belinda Brooks-Gordon Cigdem Esin Amanda Holt Leila Mehdizadeh and Pnina Shinebourne. 2010. Pluralism in qualitative research: the impact of different researchers and qualitative approaches on the analysis of qualitative data. Qualitative Research 10 4 (Aug. 2010) 441\u2013460. 10.1177\/1468794110366802","DOI":"10.1177\/1468794110366802"},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376647"},{"key":"e_1_3_3_3_22_2","unstructured":"GDPR.EU 2018. Does the GDPR apply to companies outside of the EU?https:\/\/gdpr.eu\/companies-outside-of-europe\/"},{"key":"e_1_3_3_3_23_2","doi-asserted-by":"publisher","unstructured":"Travis Greene Galit Shmueli Soumya Ray and Jan Fell. 2019. Adjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers. Big Data 7 3 (Sept. 2019) 140\u2013162. 10.1089\/big.2018.0176 Publisher: Mary Ann Liebert Inc. publishers.","DOI":"10.1089\/big.2018.0176"},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"publisher","unstructured":"Marilys Guillemin Emma Barnard Anton Allen Paul Stewart Hannah Walker Doreen Rosenthal and Lynn Gillam. 2018. Do Research Participants Trust Researchers or Their Institution? Journal of Empirical Research on Human Research Ethics 13 3 (July 2018) 285\u2013294. 10.1177\/1556264618763253","DOI":"10.1177\/1556264618763253"},{"key":"e_1_3_3_3_25_2","doi-asserted-by":"publisher","unstructured":"Marilys Guillemin Lynn Gillam Emma Barnard Paul Stewart Hannah Walker and Doreen Rosenthal. 2016. \u201cDoing Trust\u201d: How Researchers Conceptualize and Enact Trust in Their Research Practice. Journal of Empirical Research on Human Research Ethics 11 4 (Oct. 2016) 370\u2013381. 10.1177\/1556264616668975","DOI":"10.1177\/1556264616668975"},{"key":"e_1_3_3_3_26_2","doi-asserted-by":"crossref","unstructured":"Dara Hallinan Franziska Boehm Annika K\u00fclpmann and Malte Elson. 2023. (Un)informed Consent in Psychological Research: An Empirical Study on Consent in Psychological Research and the GDPR. Journal of Open Access to Law 11 (2023) 1\u201328.","DOI":"10.31234\/osf.io\/ugxam"},{"key":"e_1_3_3_3_27_2","doi-asserted-by":"publisher","unstructured":"Carol\u00a0A. Heimer and JuLeigh Petty. 2010. Bureaucratic Ethics: IRBs and the Legal Regulation of Human Subjects Research. Annual Review of Law and Social Science 6 1 (Dec. 2010) 601\u2013626. 10.1146\/annurev.lawsocsci.093008.131454","DOI":"10.1146\/annurev.lawsocsci.093008.131454"},{"key":"e_1_3_3_3_28_2","unstructured":"HIPAA 1996. Health Insurance Portability and Accountability Act. 169\u00a0pages. https:\/\/www.govinfo.gov\/content\/pkg\/PLAW-104publ191\/pdf\/PLAW-104publ191.pdf"},{"key":"e_1_3_3_3_29_2","doi-asserted-by":"publisher","unstructured":"Ian Hussey. 2023. Data is not available upon request. 10.31234\/osf.io\/jbu9r","DOI":"10.31234\/osf.io\/jbu9r"},{"key":"e_1_3_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-3049-15"},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-28643-86"},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"publisher","unstructured":"T.J. Kasperbauer Colin Halverson Abby Garcia and Peter\u00a0H. Schwartz. 2022. Biobank Participants\u2019 Attitudes Toward Data Sharing and Privacy: The Role of Trust in Reducing Perceived Risks. Journal of Empirical Research on Human Research Ethics 17 1-2 (Feb. 2022) 167\u2013176. 10.1177\/15562646211055282","DOI":"10.1177\/15562646211055282"},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"publisher","unstructured":"Mary\u00a0Anne Kennan and Lina Markauskaite. 2015. Research Data Management Practices: A Snapshot in Time. International Journal of Digital Curation 10 2 (July 2015) 69\u201395. 10.2218\/ijdc.v10i2.329","DOI":"10.2218\/ijdc.v10i2.329"},{"key":"e_1_3_3_3_34_2","doi-asserted-by":"publisher","unstructured":"Mohammed\u00a0I.U. Khan Lawrence Mbuagbaw Matthew Holek Faris Bdair Zoha\u00a0H. Durrani Katie Mellor Saskia Eddy Sandra\u00a0M. Eldridge Claire\u00a0L. Chan Michael\u00a0J. Campbell Christine\u00a0M. Bond Sally Hopewell Gillian\u00a0A. Lancaster and Lehana Thabane. 2021. Transparency of Informed Consent in Pilot and Feasibility Studies is Inadequate: A Single-Center Quality Assurance Study. Pilot and Feasibility Studies 7 1 (Dec. 2021) 96. 10.1186\/s40814-021-00828-w","DOI":"10.1186\/s40814-021-00828-w"},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"publisher","unstructured":"Nicole\u00a0M Krause Dominique Brossard Dietram\u00a0A Scheufele Michael\u00a0A Xenos and Keith Franke. 2019. The polls\u2014trends: Americans\u2019 trust in science and scientists. Public Opinion Quarterly 83 (Sept. 2019) nfz041. 10.1093\/poq\/nfz041","DOI":"10.1093\/poq\/nfz041"},{"key":"e_1_3_3_3_36_2","unstructured":"Nevada Legislature. 2019. Senate Bill No. 220 - AN ACT relating to Internet privacy; prohibiting an operator of an Internet website or online service which collects certain information from consumers in this State from making any sale of certain information about a consumer if so directed by the consumer; and providing other matters properly relating thereto.https:\/\/www.leg.state.nv.us\/App\/NELIS\/REL\/80th2019\/Bill\/6365\/Text"},{"key":"e_1_3_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376238"},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"publisher","unstructured":"Konstantinos Mersinas Maria Bada and Steven Furnell. 2025. Cybersecurity behavior change: A conceptualization of ethical principles for behavioral interventions. Computers & Security 148 (Jan. 2025) 104025. 10.1016\/j.cose.2024.104025","DOI":"10.1016\/j.cose.2024.104025"},{"key":"e_1_3_3_3_39_2","doi-asserted-by":"publisher","unstructured":"Michelle\u00a0N. Meyer. 2018. Practical Tips for Ethical Data Sharing. Advances in Methods and Practices in Psychological Science 1 1 (March 2018) 131\u2013144. 10.1177\/2515245917747656","DOI":"10.1177\/2515245917747656"},{"key":"e_1_3_3_3_40_2","doi-asserted-by":"publisher","unstructured":"William\u00a0K. Michener. 2015. Ten Simple Rules for Creating a Good Data Management Plan. PLOS Computational Biology 11 10 (Oct. 2015) e1004525. 10.1371\/journal.pcbi.1004525","DOI":"10.1371\/journal.pcbi.1004525"},{"key":"e_1_3_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_3_3_3_42_2","doi-asserted-by":"publisher","unstructured":"Michael Nii\u00a0Laryeafio and Omoruyi\u00a0Courage Ogbewe. 2023. Ethical consideration dilemma: systematic review of ethics in qualitative data collection through interviews. Journal of Ethics in Entrepreneurship and Technology 3 2 (Dec. 2023) 94\u2013110. 10.1108\/JEET-09-2022-0014","DOI":"10.1108\/JEET-09-2022-0014"},{"key":"e_1_3_3_3_43_2","doi-asserted-by":"publisher","unstructured":"Linda Nordling. 2023. Falling behind: Postdocs in their thirties tire of putting life on hold. Nature 622 7984 (Oct. 2023) 881\u2013883. 10.1038\/d41586-023-03296-9","DOI":"10.1038\/d41586-023-03296-9"},{"key":"e_1_3_3_3_44_2","doi-asserted-by":"publisher","unstructured":"B.\u00a0A. Nosek G. Alter G.\u00a0C. Banks D. Borsboom S.\u00a0D. Bowman S.\u00a0J. Breckler S. Buck C.\u00a0D. Chambers G. Chin G. Christensen M. Contestabile A. Dafoe E. Eich J. Freese R. Glennerster D. Goroff D.\u00a0P. Green B. Hesse M. Humphreys J. Ishiyama D. Karlan A. Kraut A. Lupia P. Mabry T. Madon N. Malhotra E. Mayo-Wilson M. McNutt E. Miguel E.\u00a0Levy Paluck U. Simonsohn C. Soderberg B.\u00a0A. Spellman J. Turitto G. VandenBos S. Vazire E.\u00a0J. Wagenmakers R. Wilson and T. Yarkoni. 2015. Promoting an open research culture. Science 348 6242 (June 2015) 1422\u20131425. 10.1126\/science.aab2374","DOI":"10.1126\/science.aab2374"},{"key":"e_1_3_3_3_45_2","unstructured":"State of Connecticut. 2022. Senate Bill 6: An Act Concerning Personal Data Privacy and Online Monitoring (The Connecticut Data Privacy Act). https:\/\/www.cga.ct.gov\/2022\/ACT\/PA\/PDF\/2022PA-00015-R00SB-00006-PA.PDF"},{"key":"e_1_3_3_3_46_2","unstructured":"Code of Virginia. 2021. Chapter 53. Consumer Data Protection Act.https:\/\/law.lis.virginia.gov\/vacodefull\/title59.1\/chapter53\/"},{"key":"e_1_3_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580766"},{"key":"e_1_3_3_3_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445410"},{"key":"e_1_3_3_3_49_2","first-page":"1","volume-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)","author":"Pfeffer Katharina","year":"2022","unstructured":"Katharina Pfeffer, Alexandra Mai, Edgar Weippl, Emilee Rader, and Katharina Krombholz. 2022. Replication: Stories as Informal Lessons about Security. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). USENIX Association, Boston, MA, 1\u201318. https:\/\/www.usenix.org\/conference\/soups2022\/presentation\/pfeffer"},{"key":"e_1_3_3_3_50_2","unstructured":"Andreas Pfitzmann and Marit Hansen. 2010. A terminology for talking about privacy by data minimization: Anonymity unlinkability undetectability unobservability pseudonymity and identity management. http:\/\/dud.inf.tu-dresden.de\/literatur\/Anon_Terminology_v0.34.pdf"},{"key":"e_1_3_3_3_51_2","doi-asserted-by":"publisher","unstructured":"Emilee Rader and Rick Wash. 2015. Identifying patterns in informal sources of security information. Journal of Cybersecurity 1 1 (12 2015) 121\u2013144. 10.1093\/cybsec\/tyv008 arXiv:https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/1\/1\/121\/7002665\/tyv008.pdf","DOI":"10.1093\/cybsec\/tyv008"},{"key":"e_1_3_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335364"},{"key":"e_1_3_3_3_53_2","doi-asserted-by":"crossref","unstructured":"Joel\u00a0R. Reidenberg Travis Breaux Lorrie\u00a0Faith Cranor Bran Fench Amanda Grannis James\u00a0T. Graves Fei Liu Aleecia McDonald Thomas\u00a0B. Norton Rohan Ramanath N.\u00a0Cameron Russel Norman Sadeh and Florian Schaub. 2015. Disagreeable privacy policies: Mismatches between meaning and users\u2019 understanding. Berkeley Journal of International Law 1 30 (2015) 39\u201388.","DOI":"10.2139\/ssrn.2418297"},{"key":"e_1_3_3_3_54_2","doi-asserted-by":"publisher","unstructured":"Arianna Rossi and Gabriele Lenzini. 2020. Transparency by design in data-informed research: A collection of information design patterns. Computer Law & Security Review 37 (July 2020) 105402. 10.1016\/j.clsr.2020.105402","DOI":"10.1016\/j.clsr.2020.105402"},{"key":"e_1_3_3_3_55_2","doi-asserted-by":"publisher","unstructured":"Antti\u00a0Mikael Rousi Reid\u00a0Isaac Boehm and Yan Wang. 2024. Data stewardship: case studies from North American Dutch and Finnish universities. Journal of Documentation 80 7 (Sept. 2024) 306\u2013324. 10.1108\/JD-12-2023-0264","DOI":"10.1108\/JD-12-2023-0264"},{"key":"e_1_3_3_3_56_2","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2024.556"},{"key":"e_1_3_3_3_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580848"},{"key":"e_1_3_3_3_58_2","doi-asserted-by":"publisher","unstructured":"Shruti Sannon and Andrea Forte. 2022. Privacy Research with Marginalized Groups: What We Know What\u2019s Needed and What\u2019s Next. Proc. ACM Hum.-Comput. Interact. 6 CSCW2 (Nov. 2022) 455:1\u2013455:33. 10.1145\/3555556","DOI":"10.1145\/3555556"},{"key":"e_1_3_3_3_59_2","doi-asserted-by":"publisher","DOI":"10.1017\/9781316831960.021"},{"key":"e_1_3_3_3_60_2","doi-asserted-by":"publisher","unstructured":"James Scheibner Marcello Ienca Sotiria Kechagia Juan\u00a0Ramon Troncoso-Pastoriza Jean\u00a0Louis Raisaro Jean-Pierre Hubaux Jacques Fellay and Effy Vayena. 2020. Data protection and ethics requirements for multisite research with health data: a comparative examination of legislative governance frameworks and the role of data protection technologies. Journal of Law and the Biosciences 7 1 (July 2020) lsaa010. 10.1093\/jlb\/lsaa010","DOI":"10.1093\/jlb\/lsaa010"},{"key":"e_1_3_3_3_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/3655038.3666093"},{"key":"e_1_3_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173589"},{"key":"e_1_3_3_3_63_2","doi-asserted-by":"publisher","unstructured":"Nguyen\u00a0Thanh Tam Nguyen\u00a0Tien Huy Le\u00a0Thi\u00a0Bich Thoa Nguyen\u00a0Phuoc Long Nguyen Thi\u00a0Huyen Trang Kenji Hirayama and Juntra Karbwang. 2015. Participants\u2019 understanding of informed consent in clinical trials over three decades: systematic review and meta-analysis. Bulletin of the World Health Organization 93 3 (March 2015) 186\u2013198H. 10.2471\/BLT.14.141390 Publisher: World Health Organization.","DOI":"10.2471\/BLT.14.141390"},{"key":"e_1_3_3_3_64_2","unstructured":"The European Parliament And The Council Of The\u00a0European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons With Regard to the Processing of Personal Data and on the Free Movement of Such Data and Repealing Directive 95\/46\/EC (General Data Protection Regulation). 88\u00a0pages. https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"e_1_3_3_3_65_2","doi-asserted-by":"publisher","unstructured":"Evert-Ben van Veen. 2018. Observational Health Research in Europe: Understanding the General Data Protection Regulation and Underlying Debate. European Journal of Cancer 104 (Nov. 2018) 70\u201380. 10.1016\/j.ejca.2018.09.032","DOI":"10.1016\/j.ejca.2018.09.032"},{"key":"e_1_3_3_3_66_2","doi-asserted-by":"crossref","unstructured":"Ashley\u00a0Marie Walker Yaxing Yao Christine Geeng Roberto Hoyle and Pamela Wisniewski. 2019. Moving Beyond \u2019One Size Fits All\u2019 Research Considerations for Working with Vulnerable Populations. Interactions 26 6 (2019) 34\u201339.","DOI":"10.1145\/3358904"},{"key":"e_1_3_3_3_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3027089"},{"key":"e_1_3_3_3_68_2","doi-asserted-by":"publisher","unstructured":"Travis Weller and Amalia Monroe-Gulick. 2014. Understanding methodological and disciplinary differences in the data practices of academic researchers. Library Hi Tech 32 3 (Sept. 2014) 467\u2013482. 10.1108\/LHT-02-2014-0021","DOI":"10.1108\/LHT-02-2014-0021"},{"key":"e_1_3_3_3_69_2","doi-asserted-by":"publisher","unstructured":"Christian Wendelborn Michael Anger and Christoph Schickhardt. 2023. What is data stewardship? Towards a comprehensive understanding. Journal of Biomedical Informatics 140 (April 2023) 104337. 10.1016\/j.jbi.2023.104337","DOI":"10.1016\/j.jbi.2023.104337"},{"key":"e_1_3_3_3_70_2","doi-asserted-by":"publisher","unstructured":"Arne\u00a0Freya Zillich Daniela Schl\u00fctz Eva-Maria Roehse Wiebke M\u00f6hring and Elena Link. 2024. Forschungsethische Prinzipien und methodische G\u00fcte in der Umfrageforschung. Publizistik 69 3 (July 2024) 237\u2013266. 10.1007\/s11616-024-00845-8","DOI":"10.1007\/s11616-024-00845-8"}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713654","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3713654","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:03:47Z","timestamp":1751605427000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713654"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":69,"alternative-id":["10.1145\/3706598.3713654","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3713654","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}