{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T02:35:36Z","timestamp":1772937336065,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2026,10,17]],"date-time":"2026-10-17T00:00:00Z","timestamp":1792195200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2211896, 2339431, 2401775, 2349350"],"award-info":[{"award-number":["2211896, 2339431, 2401775, 2349350"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,18]]},"DOI":"10.1145\/3715070.3749278","type":"proceedings-article","created":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T05:55:41Z","timestamp":1760680541000},"page":"504-508","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["\"Like, Are You Okay With Being Recorded?\": Understanding and Designing for Consent to Recording and Livestreaming"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-7736-569X","authenticated-orcid":false,"given":"Devin","family":"Tebbe","sequence":"first","affiliation":[{"name":"University of Michigan-Flint, Flint, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0053-0528","authenticated-orcid":false,"given":"Yosr","family":"Aissa","sequence":"additional","affiliation":[{"name":"University of Michigan-Flint, Flint, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-2741-1010","authenticated-orcid":false,"given":"Braeden","family":"Burger","sequence":"additional","affiliation":[{"name":"University of Michigan-Flint, Flint, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6854-5336","authenticated-orcid":false,"given":"Douglas","family":"Zytko","sequence":"additional","affiliation":[{"name":"University of Michigan-Flint, Flint, Michigan, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,10,17]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR62088.2024.00090"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","unstructured":"Ashwaq Alsoubai Jihye Song Afsaneh Razi Nurun Naher Munmun De\u00a0Choudhury and Pamela\u00a0J. Wisniewski. 2022. From \u2019Friends with Benefits\u2019 to \u2019Sextortion:\u2019 A Nuanced Investigation of Adolescents\u2019 Online Sexual Risk Experiences. Proc. ACM Hum.-Comput. Interact. 6 CSCW2 Article 411 (Nov. 2022) 32\u00a0pages. 10.1145\/3555136","DOI":"10.1145\/3555136"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","unstructured":"Katie\u00a0E. Anderson. 2018. Getting acquainted with social networks and apps: streaming video games on Twitch.tv. Library Hi Tech News 35 9 (2018) 7\u201310. 10.1108\/LHTN-08-2018-0054","DOI":"10.1108\/LHTN-08-2018-0054"},{"key":"e_1_3_3_1_5_2","unstructured":"Kathleen\u00a0C Basile Sharon\u00a0G Smith Matthew Breiding Michele\u00a0C Black and Reshma\u00a0R Mahendra. 2014. Sexual violence surveillance: Uniform definitions and recommended data elements. Version 2.0. (2014)."},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","unstructured":"Samantha Bates. 2017. Revenge Porn and Mental Health: A Qualitative Analysis of the Mental Health Effects of Revenge Porn on Female Survivors. Feminist Criminology 12 1 (2017) 22\u201342. 10.1177\/1557085116654565 arXiv:https:\/\/doi.org\/10.1177\/1557085116654565","DOI":"10.1177\/1557085116654565"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642871"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Virginia Braun and Victoria Clarke. 2021. Thematic Analysis: A Practical Guide. (2021) 1\u2013376.","DOI":"10.53841\/bpsqmip.2022.1.33.46"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713236"},{"key":"e_1_3_3_1_10_2","unstructured":"CapCut. 2025. https:\/\/www.capcut.com\/resource\/hidden-screen-recorder"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445435"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/RO-MAN57019.2023.10309539"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557352"},{"key":"e_1_3_3_1_14_2","volume-title":"Graphics Interface 2023 - second deadline","author":"Do Youngwook","year":"2023","unstructured":"Youngwook Do, Frederik Brudy, George\u00a0W. Fitzmaurice, and Fraser Anderson. 2023. Vice VRsa: Balancing Bystander\u2019s and VR user\u2019s Privacy through Awareness Cues Inside and Outside VR. In Graphics Interface 2023 - second deadline. https:\/\/openreview.net\/forum?id=gItvr7Xl66"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","unstructured":"Cori Faklaris Francesco Cafaro Asa Blevins Matthew\u00a0A. O\u2019Haver and Neha Singhal. 2020. A Snapshot of Bystander Attitudes about Mobile Live-Streaming Video in Public Settings. Informatics 7 2 (2020). 10.3390\/informatics7020010","DOI":"10.3390\/informatics7020010"},{"key":"e_1_3_3_1_16_2","volume-title":"Global and regional estimates of violence against women: prevalence and health effects of intimate partner violence and non-partner sexual violence","author":"Garc\u00eda-Moreno Claudia","year":"2013","unstructured":"Claudia Garc\u00eda-Moreno, Christina Pallitto, Karen Devries, Heidi St\u00f6ckl, Charlotte Watts, and Naeema Abrahams. 2013. Global and regional estimates of violence against women: prevalence and health effects of intimate partner violence and non-partner sexual violence. World Health Organization."},{"key":"e_1_3_3_1_17_2","series-title":"(SOUPS \u201924)","volume-title":"Proceedings of the Twentieth USENIX Conference on Usable Privacy and Security","author":"Geeng Chris","year":"2024","unstructured":"Chris Geeng, Natalie Chen, Kieron\u00a0Ivy Turk, Jevan Hutson, and Damon McCoy. 2024. \"Say I\u2019m in public...I don\u2019t want my nudes to pop up.\": user threat models for using vault applications. In Proceedings of the Twentieth USENIX Conference on Usable Privacy and Security (Philadelphia, PA, USA) (SOUPS \u201924). USENIX Association, USA, Article 23, 19\u00a0pages."},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.5406\/illinois\/9780252038983.001.0001"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/ETHICS.2014.6893423"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3715336.3735825"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445778"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","unstructured":"Yao Li Yubo Kou Je\u00a0Seok Lee and Alfred Kobsa. 2018. Tell Me Before You Stream Me: Managing Information Disclosure in Video Game Live Streaming. Proc. ACM Hum.-Comput. Interact. 2 CSCW Article 107 (Nov. 2018) 18\u00a0pages. 10.1145\/3274376","DOI":"10.1145\/3274376"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","unstructured":"Georgina Mclocklin Blerina Kellezi Clifford Stevenson and Jennifer\u00a0Mackay and. 2024. Disclosure Decisions and Help-Seeking Experiences Amongst Victim-Survivors of Non-Consensual Intimate Image Distribution. Victims & Offenders 0 0 (2024) 1\u201327. 10.1080\/15564886.2024.2329107 arXiv:https:\/\/doi.org\/10.1080\/15564886.2024.2329107","DOI":"10.1080\/15564886.2024.2329107"},{"key":"e_1_3_3_1_24_2","unstructured":"NVIDIA. 2022. https:\/\/www.nvidia.com\/en-ph\/geforce\/geforce-experience\/shadowplay\/"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR52148.2021.00036"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","unstructured":"Anastasia Powell and Nicola Henry. 2019. Technology-Facilitated Sexual Violence Victimization: Results From an Online Survey of Australian Adults. Journal of Interpersonal Violence 34 17 (2019) 3637\u20133665. 10.1177\/0886260516672055","DOI":"10.1177\/0886260516672055"},{"key":"e_1_3_3_1_27_2","first-page":"55","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Qin Lucy","year":"2024","unstructured":"Lucy Qin, Vaughn Hamilton, Sharon Wang, Yigit Aydinalp, Marin Scarlett, and Elissa\u00a0M Redmiles. 2024. \" Did They { F*** ing} Consent to That?\": Safer Digital Intimacy via Proactive Protection Against { Image-Based} Sexual Abuse. In 33rd USENIX Security Symposium (USENIX Security 24). 55\u201372."},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","unstructured":"Kelsea Schulenberg Guo Freeman Lingyuan Li and Catherine Barwulor. 2023. \"Creepy Towards My Avatar Body Creepy Towards My Body\": How Women Experience and Manage Harassment Risks in Social Virtual Reality. Proc. ACM Hum.-Comput. Interact. 7 CSCW2 Article 236 (oct 2023) 29\u00a0pages. 10.1145\/3610027","DOI":"10.1145\/3610027"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","unstructured":"Kelsea Schulenberg Lingyuan Li Caitlin Lancaster Douglas Zytko and Guo Freeman. 2023. \"We Don\u2019t Want a Bird Cage We Want Guardrails\": Understanding & Designing for Preventing Interpersonal Harm in Social VR through the Lens of Consent. Proc. ACM Hum.-Comput. Interact. 7 CSCW2 (Oct. 2023). 10.1145\/3610172Place: New York NY USA Publisher: Association for Computing Machinery.","DOI":"10.1145\/3610172"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/VR.2017.7892258"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445107"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858374"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3678884.3681915"},{"key":"e_1_3_3_1_34_2","unstructured":"UnfoldLabs. 2023. 2023 Screen-Recording Software Market Growth Trends. https:\/\/unfoldlabs.medium.com\/2023-screen-recording-software-market-growth-trends-105ddf9002ee"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713226"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","unstructured":"Donghee\u00a0Yvette Wohn and Guo Freeman. 2020. Live Streaming Playing and Money Spending Behaviors in eSports. Games and Culture 15 1 (2020) 73\u201388. 10.1177\/1555412019859184 arXiv:https:\/\/doi.org\/10.1177\/1555412019859184","DOI":"10.1177\/1555412019859184"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","unstructured":"Yanlai Wu Xinning Gui Pamela\u00a0J. Wisniewski and Yao Li. 2023. Do Streamers Care about Bystanders\u2019 Privacy? An Examination of Live Streamers\u2019 Considerations and Strategies for Bystanders\u2019 Privacy Management. Proc. ACM Hum.-Comput. Interact. 7 CSCW1 Article 127 (April 2023) 29\u00a0pages. 10.1145\/3579603","DOI":"10.1145\/3579603"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"publisher","unstructured":"Yanlai Wu Yao Li and Xinning Gui. 2022. \"I Am Concerned But...\": Streamers\u2019 Privacy Concerns and Strategies In Live Streaming Information Disclosure. Proc. ACM Hum.-Comput. Interact. 6 CSCW2 Article 379 (Nov. 2022) 31\u00a0pages. 10.1145\/3555104","DOI":"10.1145\/3555104"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"publisher","unstructured":"Douglas Zytko and Jonathan Chan. 2023. The Dating Metaverse: Why We Need to Design for Consent in Social VR. IEEE Transactions on Visualization and Computer Graphics 29 5 (2023) 2489\u20132498. 10.1109\/TVCG.2023.3247065","DOI":"10.1109\/TVCG.2023.3247065"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3500868.3561201"}],"event":{"name":"CSCW Companion '25: Companion of the Computer-Supported Cooperative Work and Social Computing","location":"Bergen Norway","acronym":"CSCW Companion '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Companion Publication of the 2025 Conference on Computer-Supported Cooperative Work and Social Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3715070.3749278","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3715070.3749278","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3715070.3749278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T17:49:02Z","timestamp":1767980942000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3715070.3749278"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,17]]},"references-count":39,"alternative-id":["10.1145\/3715070.3749278","10.1145\/3715070"],"URL":"https:\/\/doi.org\/10.1145\/3715070.3749278","relation":{},"subject":[],"published":{"date-parts":[[2025,10,17]]},"assertion":[{"value":"2025-10-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}