{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:58:07Z","timestamp":1773482287925,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":82,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,3,8]]},"DOI":"10.1145\/3731459.3773309","type":"proceedings-article","created":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T13:35:51Z","timestamp":1772890551000},"page":"1-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Two-Week In-the-Wild Study of Screen Filters and Camera Sliders for Smartphone Privacy in Public Spaces"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-3986-6434","authenticated-orcid":false,"given":"Andreas A.","family":"Tjeldflaat","sequence":"first","affiliation":[{"name":"University of Bergen, Bergen, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2007-0263","authenticated-orcid":false,"given":"Piero","family":"Romare","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology and University of Gothenburg, Gothenburg, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5999-8129","authenticated-orcid":false,"given":"Yuki","family":"Onishi","sequence":"additional","affiliation":[{"name":"University of Bergen, Bergen, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9562-5147","authenticated-orcid":false,"given":"Morten","family":"Fjeld","sequence":"additional","affiliation":[{"name":"t2i Lab, Chalmers University of Technology, Gothenburg, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9367-6987","authenticated-orcid":false,"given":"Bj\u00f8rn","family":"S\u00e6trevik","sequence":"additional","affiliation":[{"name":"Faculty of Psychology, University of Bergen, Bergen, Norway"}]}],"member":"320","published-online":{"date-parts":[[2026,3,7]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/VRW55335.2022.00139"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"crossref","unstructured":"Anne Adams and Martina\u00a0Angela Sasse. 1999. Users are not the enemy. Commun. ACM 42 12 (1999) 40\u201346.","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"crossref","unstructured":"Imtiaz Ahmad Taslima Akter Zachary Buher Rosta Farzan Apu Kapadia and Adam\u00a0J Lee. 2022. Tangible privacy for smart voice assistants: Bystanders\u2019 perceptions of physical device controls. Proceedings of the ACM on Human-Computer Interaction 6 CSCW2 (2022) 1\u201331.","DOI":"10.1145\/3555089"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"crossref","unstructured":"Imtiaz Ahmad Rosta Farzan Apu Kapadia and Adam\u00a0J Lee. 2020. Tangible privacy: Towards user-centric sensor designs for bystander privacy. Proceedings of the ACM on Human-Computer Interaction 4 CSCW2 (2020) 1\u201328.","DOI":"10.1145\/3415187"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31500-9_6"},{"key":"e_1_3_3_2_7_2","volume-title":"The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding","author":"Altman I.","year":"1975","unstructured":"I. Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding. Brooks\/Cole Publishing Company. https:\/\/books.google.it\/books?id=GLBPAAAAMAAJ"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207727"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Ardion Beldad and Margareta\u00a0Citra Kusumadewi. 2015. Here\u2019s my location for your information: The impact of trust benefits and social influence on location sharing application use among Indonesian university students. Computers in human behavior 49 (2015) 102\u2013110.","DOI":"10.1016\/j.chb.2015.02.047"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Sebastian Benthall Seda G\u00fcrses Helen Nissenbaum et\u00a0al. 2017. Contextual integrity through the lens of computer science. Foundations and Trends\u00ae in Privacy and Security 2 1 (2017) 1\u201369.","DOI":"10.1561\/3300000016"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/1935701.1935815"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/1935701.1935740"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-27139-2_2"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Leon Bo\u0161njak and Bo\u0161tjan Brumen. 2020. Shoulder surfing experiments: A systematic literature review. Computers & Security 99 (2020) 102023.","DOI":"10.1016\/j.cose.2020.102023"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"crossref","unstructured":"August Bourgeus Laurens Vandercruysse and Nanouk Verhulst. 2024. Understanding contextual expectations for sharing wearables\u2019 data: Insights from a vignette study. Computers in Human Behavior Reports 15 (2024) 100443.","DOI":"10.1016\/j.chbr.2024.100443"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"crossref","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3 2 (2006) 77\u2013101.","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"crossref","unstructured":"Saba\u00a0Rebecca Brause and Grant Blank. 2024. \u2018There are some things that I would never ask Alexa\u2019\u2013privacy work contextual integrity and smart speaker assistants. Information Communication & Society 27 1 (2024) 182\u2013197.","DOI":"10.1080\/1369118X.2023.2193241"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"Karoline Brehm and Yan Shvartzshnaider. 2023. Understanding privacy in virtual reality classrooms: A contextual integrity perspective. IEEE Security & Privacy 22 1 (2023) 53\u201362.","DOI":"10.1109\/MSEC.2023.3336802"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/2611009.2611028"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"crossref","unstructured":"Matteo Cardaioli Mauro Conti Gabriele Orazi Pier\u00a0Paolo Tricomi and Gene Tsudik. 2023. BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication. Pervasive and Mobile Computing 92 (2023) 101801.","DOI":"10.1016\/j.pmcj.2023.101801"},{"key":"e_1_3_3_2_21_2","first-page":"1","volume-title":"The 25th Annual International Conference on Mobile Computing and Networking","author":"Chen Chun-Yu","year":"2019","unstructured":"Chun-Yu Chen, Bo-Yao Lin, Junding Wang, and Kang\u00a0G Shin. 2019. Keep others from peeking at your mobile device screen!. In The 25th Annual International Conference on Mobile Computing and Networking. 1\u201316."},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376304"},{"key":"e_1_3_3_2_23_2","first-page":"653","volume-title":"Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)","author":"Cohney Shaanan","year":"2021","unstructured":"Shaanan Cohney, Ross Teixeira, Anne Kohlbrenner, Arvind Narayanan, Mihir Kshirsagar, Yan Shvartzshnaider, and Madelyn Sanfilippo. 2021. Virtual classrooms and real harms: Remote learning at { US}. universities. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). 653\u2013674."},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Mathieu Cunche. 2014. I know your MAC address: targeted tracking of individual using Wi-Fi. Journal of Computer Virology and Hacking Techniques 10 4 (2014) 219\u2013227.","DOI":"10.1007\/s11416-013-0196-1"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642863"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3568444.3570585"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"crossref","unstructured":"Tobias Dienlin and Sabine Trepte. 2015. Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors. European journal of social psychology 45 3 (2015) 285\u2013297.","DOI":"10.1002\/ejsp.2049"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"crossref","unstructured":"Youngwook Do Jung\u00a0Wook Park Yuxi Wu Avinandan Basu Dingtian Zhang Gregory\u00a0D Abowd and Sauvik Das. 2021. Smart webcam cover: exploring the design of an intelligent webcam cover to improve usability and trust. Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 5 4 (2021) 1\u201321.","DOI":"10.1145\/3494983"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025636"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"crossref","unstructured":"Michael\u00a0P Escudier Jorge\u00a0A Tricio and Edward\u00a0W Odell. 2014. Student Acceptability of High-Stakes e-Assessment in Dental Education: Using Privacy Screen Filters to Control Cheating. Journal of dental education 78 4 (2014) 558\u2013566.","DOI":"10.1002\/j.0022-0337.2014.78.4.tb05706.x"},{"key":"e_1_3_3_2_31_2","first-page":"10","volume-title":"Informatics","author":"Faklaris Cori","year":"2020","unstructured":"Cori Faklaris, Francesco Cafaro, Asa Blevins, Matthew\u00a0A O\u2019Haver, and Neha Singhal. 2020. A snapshot of bystander attitudes about mobile live-streaming video in public settings. In Informatics , Vol.\u00a07. MDPI, 10."},{"key":"e_1_3_3_2_32_2","unstructured":"Habiba Farzand. 2025. Understanding shoulder surfing and informing the design of protection mechanisms. Ph.\u00a0D. Dissertation. University of Glasgow."},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3473856.3474006"},{"key":"e_1_3_3_2_34_2","unstructured":"Habiba Farzand Shaun Macdonald Karola Marky and Mohamed Khamis. 2024. \" What you think is private is no longer\"\u2013Investigating the Aftermath of Shoulder Surfing on Smartphones in Everyday Life through the Eyes of the Victims. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2411.18265 (2024)."},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3549015.3554211"},{"key":"e_1_3_3_2_36_2","unstructured":"Habiba Farzand Karola Marky and Mohamed Khamis. 2024. SoK: Privacy Personalised\u2013Mapping Personal Attributes\\ & Preferences of Privacy Mechanisms for Shoulder Surfing. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2411.18380 (2024)."},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-54158-2"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"crossref","unstructured":"Nina Gerber Paul Gerber and Melanie Volkamer. 2018. Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & security 77 (2018) 226\u2013261.","DOI":"10.1016\/j.cose.2018.04.002"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3623509.3633388"},{"key":"e_1_3_3_2_40_2","first-page":"213","volume-title":"10th symposium on usable privacy and security (SOUPS 2014)","author":"Harbach Marian","year":"2014","unstructured":"Marian Harbach, Emanuel Von\u00a0Zezschwitz, Andreas Fichtner, Alexander De\u00a0Luca, and Matthew Smith. 2014. { It\u2019s} a hard lock life: A field study of smartphone ({ Un) Locking} behavior and risk perception. In 10th symposium on usable privacy and security (SOUPS 2014). 213\u2013230."},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"crossref","unstructured":"Mohamed Khamis Malin Eiband Martin Z\u00fcrn and Heinrich Hussmann. 2018. Eyespot: Leveraging gaze to protect private text content on mobile devices from shoulder surfing. Multimodal Technologies and Interaction 2 3 (2018) 45.","DOI":"10.3390\/mti2030045"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"crossref","unstructured":"Hobin Kim Wonho Song Joseph Seering and Min\u00a0Suk Kang. 2025. Understanding User Privacy Perceptions in Video Conferencing: Insights from a Feature-Specific User Study. Proceedings on Privacy Enhancing Technologies (2025).","DOI":"10.56553\/popets-2025-0096"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"crossref","unstructured":"Mehrdad Koohikamali Natalie Gerhart and Mohammadreza Mousavizadeh. 2015. Location disclosure on LB-SNAs: The role of incentives on sharing behavior. Decision Support Systems 71 (2015) 78\u201387.","DOI":"10.1016\/j.dss.2015.01.008"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2015.23001"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3365610.3368412"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"crossref","unstructured":"Priya\u00a0C Kumar Michael Zimmer and Jessica Vitak. 2024. A roadmap for applying the contextual integrity framework in qualitative privacy research. Proceedings of the ACM on Human-Computer Interaction 8 CSCW1 (2024) 1\u201329.","DOI":"10.1145\/3653710"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"crossref","unstructured":"Charles\u00a0E Lance Marcus\u00a0M Butts and Lawrence\u00a0C Michels. 2006. The sources of four commonly reported cutoff criteria: What did they really say?Organizational research methods 9 2 (2006) 202\u2013220.","DOI":"10.1177\/1094428105284919"},{"key":"e_1_3_3_2_48_2","first-page":"422","volume-title":"International Conference on Financial Cryptography and Data Security","author":"Lang Juan","year":"2016","unstructured":"Juan Lang, Alexei Czeskis, Dirk Balfanz, Marius Schilder, and Sampath Srinivas. 2016. Security keys: Practical cryptographic second factors for the modern web. In International Conference on Financial Cryptography and Data Security. Springer, 422\u2013440."},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978397"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"crossref","unstructured":"Sonia Livingstone. 2008. Taking risky opportunities in youthful content creation: teenagers\u2019 use of social networking sites for intimacy privacy and self-expression. New media & society 10 3 (2008) 393\u2013411.","DOI":"10.1177\/1461444808089415"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173754"},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2016.23014"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"crossref","unstructured":"Nathan Malkin. 2022. Contextual integrity explained: A more usable privacy definition. IEEE Security & Privacy 21 1 (2022) 58\u201365.","DOI":"10.1109\/MSEC.2022.3201585"},{"key":"e_1_3_3_2_54_2","first-page":"159","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)","author":"Marques Diogo","year":"2016","unstructured":"Diogo Marques, Ildar Muslukhov, Tiago Guerreiro, Lu\u00eds Carri\u00e7o, and Konstantin Beznosov. 2016. Snooping on mobile phones: Prevalence and trends. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX, Denver, USA, 159\u2013174."},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"crossref","unstructured":"Mary\u00a0L McHugh. 2012. Interrater reliability: the kappa statistic. Biochemia medica 22 3 (2012) 276\u2013282.","DOI":"10.11613\/BM.2012.031"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/3294109.3302934"},{"key":"e_1_3_3_2_57_2","doi-asserted-by":"crossref","unstructured":"Vikram Mehta Daniel Gooch Arosha Bandara Blaine Price and Bashar Nuseibeh. 2021. Privacy care: A tangible interaction framework for privacy management. ACM Transactions on Internet Technology (TOIT) 21 1 (2021) 1\u201332.","DOI":"10.1145\/3430506"},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"crossref","unstructured":"Jason Nicholson George\u00a0E Higgins and Catherine\u00a0D Marcum. 2025. How much protection is enough? Predicting the use of webcam protective measures through the lens of low self-control and social learning. Security Journal 38 1 (2025) 2.","DOI":"10.1057\/s41284-024-00451-3"},{"key":"e_1_3_3_2_59_2","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79 (2004) 119."},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702164"},{"key":"e_1_3_3_2_61_2","first-page":"357","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019)","author":"Reese Ken","year":"2019","unstructured":"Ken Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent Seamons. 2019. A Usability Study of Five Two-Factor Authentication Methods. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA, 357\u2013370. https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/reese"},{"key":"e_1_3_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00067"},{"key":"e_1_3_3_2_63_2","volume-title":"MuC (Workshopband)","author":"Rodriguez Sarah\u00a0Delgado","year":"2021","unstructured":"Sarah\u00a0Delgado Rodriguez, Sarah Prange, and Florian Alt. 2021. Take Your Security and Privacy Into Your Own Hands! Why Security and Privacy Assistants Should be Tangible.. In MuC (Workshopband)."},{"key":"e_1_3_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/3447526.3472058"},{"key":"e_1_3_3_2_65_2","doi-asserted-by":"crossref","unstructured":"Mariah Schrum Muyleng Ghuy Erin Hedlund-Botti Manisha Natarajan Michael Johnson and Matthew Gombolay. 2023. Concerning trends in likert scale usage in human-robot interaction: Towards improving best practices. ACM Transactions on Human-Robot Interaction 12 3 (2023) 1\u201332.","DOI":"10.1145\/3572784"},{"key":"e_1_3_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3371382.3380739"},{"key":"e_1_3_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/3643834.3661569"},{"key":"e_1_3_3_2_68_2","doi-asserted-by":"crossref","unstructured":"Sarah Spiekermann. 2009. RFID and privacy: what consumers really want and fear. Personal and Ubiquitous Computing 13 (2009) 423\u2013434.","DOI":"10.1007\/s00779-008-0215-2"},{"key":"e_1_3_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/765891.765967"},{"key":"e_1_3_3_2_70_2","first-page":"5449","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Tang Brian\u00a0Jay","year":"2023","unstructured":"Brian\u00a0Jay Tang and Kang\u00a0G. Shin. 2023. Eye-Shield: Real-Time Protection of Mobile Device Screen Information from Shoulder Surfing. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 5449\u20135466. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/tang"},{"key":"e_1_3_3_2_71_2","unstructured":"Jenny Tang Lujo Bauer and Nicolas Christin. 2025. Misuse Misreporting Misinterpretation of Statistical Methods in Usable Privacy and Security Papers. (2025)."},{"key":"e_1_3_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1145\/3715070.3749278"},{"key":"e_1_3_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445491"},{"key":"e_1_3_3_2_74_2","doi-asserted-by":"crossref","unstructured":"Yaacov Trope and Nira Liberman. 2010. Construal-level theory of psychological distance.Psychological review 117 2 (2010) 440.","DOI":"10.1037\/a0018963"},{"key":"e_1_3_3_2_75_2","doi-asserted-by":"crossref","unstructured":"Ellen Van\u00a0Gool Joris Van\u00a0Ouytsel Koen Ponnet and Michel Walrave. 2015. To share or not to share? Adolescents\u2019 self-disclosure about peer relationships on Facebook: An application of the Prototype Willingness Model. Computers in Human Behavior 44 (2015) 230\u2013239.","DOI":"10.1016\/j.chb.2014.11.036"},{"key":"e_1_3_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858120"},{"key":"e_1_3_3_2_77_2","doi-asserted-by":"crossref","unstructured":"Mengyuan Wang Hongbo Jiang Peng Peng and Youhuan Li. 2023. Accurately estimating frequencies of relations with relation privacy preserving in decentralized networks. IEEE Transactions on Mobile Computing 23 5 (2023) 6408\u20136422.","DOI":"10.1109\/TMC.2023.3320669"},{"key":"e_1_3_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.25"},{"key":"e_1_3_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-82786-1_2"},{"key":"e_1_3_3_2_80_2","doi-asserted-by":"crossref","unstructured":"Yanlai Wu Xinning Gui Pamela\u00a0J Wisniewski and Yao Li. 2023. Do streamers care about bystanders\u2019 privacy? an examination of live streamers\u2019 considerations and strategies for bystanders\u2019 privacy management. Proceedings of the ACM on Human-Computer Interaction 7 CSCW1 (2023) 1\u201329.","DOI":"10.1145\/3579603"},{"key":"e_1_3_3_2_81_2","doi-asserted-by":"crossref","unstructured":"Heng Xu Hock-Hai Teo Bernard\u00a0CY Tan and Ritu Agarwal. 2012. Research note\u2014effects of individual self-protection industry self-regulation and government regulation on privacy concerns: a study of location-based services. Information systems research 23 4 (2012) 1342\u20131363.","DOI":"10.1287\/isre.1120.0416"},{"key":"e_1_3_3_2_82_2","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557347"},{"key":"e_1_3_3_2_83_2","first-page":"137","volume-title":"Computer Graphics Forum","author":"Zhang Songheng","year":"2023","unstructured":"Songheng Zhang, Dong Ma, and Yong Wang. 2023. Don\u2019t Peek at My Chart: Privacy-preserving Visualization for Mobile Devices. In Computer Graphics Forum , Vol.\u00a042. Wiley Online Library, 137\u2013148."}],"event":{"name":"TEI '26: Twentieth International Conference on Tangible, Embedded, and Embodied Interaction","location":"Chicago IL USA","acronym":"TEI '26","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the Twentieth International Conference on Tangible, Embedded, and Embodied Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3731459.3773309","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:40:09Z","timestamp":1773481209000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3731459.3773309"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,7]]},"references-count":82,"alternative-id":["10.1145\/3731459.3773309","10.1145\/3731459"],"URL":"https:\/\/doi.org\/10.1145\/3731459.3773309","relation":{},"subject":[],"published":{"date-parts":[[2026,3,7]]},"assertion":[{"value":"2026-03-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}