{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:21:50Z","timestamp":1776111710660,"version":"3.50.1"},"reference-count":59,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T00:00:00Z","timestamp":1746144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Vetenskapsr\u00e5det","doi-asserted-by":"publisher","award":["2023-04032"],"award-info":[{"award-number":["2023-04032"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100030798","name":"Digital Futures","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100030798","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Stiftelsen f\u00f6r strategisk forskning","award":["CHI19-0034"],"award-info":[{"award-number":["CHI19-0034"]}]},{"DOI":"10.13039\/501100006374","name":"European Research Council","doi-asserted-by":"publisher","award":["101043637"],"award-info":[{"award-number":["101043637"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011898","name":"Marianne and Marcus Wallenberg Foundation","doi-asserted-by":"crossref","award":["2019.0228"],"award-info":[{"award-number":["2019.0228"]}],"id":[{"id":"10.13039\/501100011898","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,5,2]]},"abstract":"<jats:p>\n            We present a large-scale, qualitative interview study that examines how an intimate technology within reproductive health comes to be chosen and trusted as a mode of contraception and how its use is shared between partners. We conducted 133 semi-structured interviews with\n            <jats:italic toggle=\"yes\">primary users<\/jats:italic>\n            of Natural Cycles, focusing specifically on its use as\n            <jats:italic toggle=\"yes\">a digital contraceptive.<\/jats:italic>\n            Our interpretive analysis, first, sheds light on perceptions of risks and benefits, along with how, and by whom, the decision to adopt Natural Cycles got made. Second, we discuss participants' and their partners' gradual development of trust in the system, and how this intertwines with interpersonal trust. Third, we consider the shared use of Natural Cycles, including partner involvement in temperature tracking, the sharing of intimate data, and navigating specific choices and risks regarding sex and contraception. We make a primarily empirical contribution to Computer Supported Cooperative Work (CSCW) research on shared uses of technology and the sharing of intimate data, and highlight avenues for future work to foster understanding of intimate technologies and their shared use in relational settings.\n          <\/jats:p>","DOI":"10.1145\/3711064","type":"journal-article","created":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T01:35:05Z","timestamp":1746236105000},"page":"1-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Shared Use of Intimate Technology: A Large-Scale Qualitative Study on the Use of Natural Cycles as a Digital Contraceptive"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9100-3826","authenticated-orcid":false,"given":"Airi","family":"Lampinen","sequence":"first","affiliation":[{"name":"Stockholm University, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9472-3805","authenticated-orcid":false,"given":"Madeline","family":"Balaam","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3443-5806","authenticated-orcid":false,"given":"Deepika","family":"Yadav","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7673-0822","authenticated-orcid":false,"given":"Nadia","family":"Campo Woytuk","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2154-6945","authenticated-orcid":false,"given":"Marianela","family":"Ciolfi Felice","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0767-6973","authenticated-orcid":false,"given":"Joo Young","family":"Park","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4123-617X","authenticated-orcid":false,"given":"Rebeca","family":"Blanco Cardozo","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2025,5,2]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"2020. Natural Cycles: Natural Birth Control | No Hormones or Side Effects. https:\/\/www.naturalcycles.com\/"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134652"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467--9566.13570"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858119"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702328"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025740"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581101"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432909"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/1460458219864730"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/1609406919880692"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466132"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675206"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376471"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642042"},{"key":"e_1_2_1_15_1","volume-title":"Online trust, trustworthiness, or assurance? Daedalus 140, 4","author":"Cheshire Coye","year":"2011","unstructured":"Coye Cheshire. 2011. Online trust, trustworthiness, or assurance? Daedalus 140, 4 (2011), 49--58. MIT Press Cambridge, MA, USA."},{"key":"e_1_2_1_16_1","unstructured":"Karen S. Cook Russell Hardin and Margaret Levi. 2005. Cooperation without trust? Russell Sage Foundation."},{"key":"e_1_2_1_17_1","volume-title":"eTrust: Forming relationships in the online world","author":"Cook Karen S.","unstructured":"Karen S. Cook, Chris Snijders, Vincent Buskens, and Coye Cheshire. 2009. eTrust: Forming relationships in the online world. Russell Sage Foundation."},{"key":"e_1_2_1_18_1","volume-title":"Trust building via risk taking: A cross-societal experiment. Social psychology quarterly 68, 2","author":"Cook Karen S.","year":"2005","unstructured":"Karen S. Cook, Toshio Yamagishi, Coye Cheshire, Robin Cooper, Masafumi Matsuda, and Rie Mashima. 2005. Trust building via risk taking: A cross-societal experiment. Social psychology quarterly 68, 2 (2005), 121--142. Sage Publications, Los Angeles, CA, USA."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445189"},{"key":"e_1_2_1_20_1","unstructured":"Natural Cycles. [n. d.]. How long will it take for the algorithm to get to know my cycle? https:\/\/help.naturalcycles.com\/hc\/en-us\/articles\/360003313193-How-long-will-it-take-for-the-algorithm-to-get-to-know-my-cycle"},{"key":"e_1_2_1_21_1","unstructured":"Natural Cycles. [n. d.]. When and how to measure your temperature with a basal thermometer. https:\/\/help.naturalcycles.com\/hc\/en-us\/articles\/360003290614-When-and-how-to-measure-your-temperaturewith-a-basal-thermometer"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305120915606"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025635"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.2196\/47131"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmjsrh-2020--200862"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467--9566.13793"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467--9566.13199"},{"key":"e_1_2_1_28_1","volume-title":"CSCW3","author":"Haapoja Jesse","year":"2021","unstructured":"Jesse Haapoja, Airi Lampinen, and Kari Mikko Vesala. 2021. Personalised Services in Social Situations: Principal-Agent Relationships in Account Sharing. Proceedings of the ACM on Human-Computer Interaction 4, CSCW3 (2021), 1--21. Publisher: ACM New York, NY, USA."},{"key":"e_1_2_1_29_1","volume-title":"Trust and trustworthiness","author":"Hardin Russell","unstructured":"Russell Hardin. 2002. Trust and trustworthiness. Russell Sage Foundation."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998347"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376528"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395550"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.2478\/v10199-011-0040--1"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2957276.2957296"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979324"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531665"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479596"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951718786314"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610073"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445132"},{"key":"e_1_2_1_41_1","unstructured":"Natural Cycles. 2024. How natural Cycles works. https:\/\/help.naturalcycles.com\/hc\/en-us\/articles\/360003306893--How-Natural-Cycles-works"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-023-09474--7"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563657.3596062"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/13625187.2020.1867844"},{"key":"e_1_2_1_45_1","volume-title":"Design and Global Development: Third International Conference, IDGD 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19--24, 2009. Proceedings 3. Springer, 395--403","author":"Rangaswamy Nimmi","year":"2009","unstructured":"Nimmi Rangaswamy and Supriya Singh. 2009. Personalizing the shared mobile phone. In Internationalization, Design and Global Development: Third International Conference, IDGD 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19--24, 2009. Proceedings 3. Springer, 395--403."},{"key":"e_1_2_1_46_1","volume-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022","author":"Rostami Asreen","year":"2022","unstructured":"Asreen Rostami, Minna Vigren, Shahid Raza, and Barry Brown. 2022. Being Hacked: Understanding Victims' Experiences of {IoT} Hacking. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). 613--631. https:\/\/www.usenix.org\/conference\/soups2022\/presentation\/rostami"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444819875990"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240759"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3641000"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174110"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998228"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971485.2996748"},{"key":"e_1_2_1_53_1","volume-title":"29th USENIX security symposium (USENIX Security 20). 1893--1909. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/tseng","author":"Tseng Emily","unstructured":"Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2020. The tools and tactics used in intimate partner surveillance: An analysis of online infidelity forums. In 29th USENIX security symposium (USENIX Security 20). 1893--1909. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/tseng"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376653"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/0272--7358(95)00007-C"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820017"},{"key":"e_1_2_1_57_1","volume-title":"Local use and sharing of mobile phones. Wireless world: Social and interactional aspects of the mobile age 99","author":"Weilenmann Alexandra","year":"2001","unstructured":"Alexandra Weilenmann and Catrine Larsson. 2001. Local use and sharing of mobile phones. Wireless world: Social and interactional aspects of the mobile age 99 (2001), 115. Springer Verlag, Godalming."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467--954X.1990.tb03349.x"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581411"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711064","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T00:49:55Z","timestamp":1755737395000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711064"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,2]]},"references-count":59,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,5,2]]}},"alternative-id":["10.1145\/3711064"],"URL":"https:\/\/doi.org\/10.1145\/3711064","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,2]]},"assertion":[{"value":"2025-05-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}