{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T15:10:07Z","timestamp":1759158607854,"version":"3.44.0"},"reference-count":86,"publisher":"Association for Computing Machinery (ACM)","issue":"5","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,9,30]]},"abstract":"<jats:p>Today\u2019s context-aware mobile phones allow developers to build intelligent and adaptive applications. The data demand induced by context awareness leads to decreased trust and increased privacy concerns. However, users\u2019 deeper reasons and real-world fears that underlie these concerns are not fully understood. We conducted an online survey (N=100) and semi-structured interviews (N=20) to understand users\u2019 concerns about smartphone data privacy. We investigated three key areas: general user understanding and misconceptions, specific in-depth concerns, and mitigation strategies. We found that effective transparency and control are the central themes across all areas. Users are concerned about privacy issues negatively impacting their lives, especially through financial loss, physical harm, or manipulation. We show that privacy measures should be implemented with a stronger focus on the user by keeping the user in the loop through transparency and control.<\/jats:p>","DOI":"10.1145\/3743719","type":"journal-article","created":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T14:28:48Z","timestamp":1757428128000},"page":"1-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["European Users' In-Depth Privacy Concerns with Smartphone Data Collection MHCI038"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5759-4976","authenticated-orcid":false,"given":"Florian","family":"Bemmann","sequence":"first","affiliation":[{"name":"LMU Munich","place":["Munich, Germany"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9743-3819","authenticated-orcid":false,"given":"Maximiliane","family":"Windl","sequence":"additional","affiliation":[{"name":"LMU Munich","place":["Munich, Germany"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2859-7536","authenticated-orcid":false,"given":"Tobias","family":"Knobloch","sequence":"additional","affiliation":[{"name":"LMU Munich","place":["Munich, Germany"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5462-8782","authenticated-orcid":false,"given":"Sven","family":"Mayer","sequence":"additional","affiliation":[{"name":"LMU Munich","place":["Munich, Germany"]},{"name":"TU Dortmund University","place":["Munich, Germany"]}]}],"member":"320","published-online":{"date-parts":[[2025,9,9]]},"reference":[{"key":"e_1_3_4_2_2","series-title":"(SOUPS\u201922)","first-page":"387","volume-title":"Eighteenth Symposium on Usable Privacy and Security","author":"Afnan Tanisha","year":"2022","unstructured":"Tanisha Afnan, Yixin Zou, Maryam Mustafa, Mustafa Naseem, and Florian Schaub. 2022. Aunties, Strangers, and the FBI: Online Privacy Concerns and Experiences of Muslim-American Women. In Eighteenth Symposium on Usable Privacy and Security(SOUPS\u201922). USENIX Association, USA, 387\u2013406. https:\/\/www.usenix.org\/system\/files\/soups2022-afnan.pdf"},{"key":"e_1_3_4_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-69746-3_2"},{"key":"e_1_3_4_4_2","doi-asserted-by":"publisher","unstructured":"Akbar Ali Nasir Ayub Muhammad Shiraz Niamat Ullah Abdullah Gani and Muhammad\u00a0Ahsan Qureshi. 2021. Traffic Efficiency Models for Urban Traffic Management Using Mobile Crowd Sensing: A Survey. Sustainability 13 23 (2021) 13068. 10.3390\/su132313068","DOI":"10.3390\/su132313068"},{"key":"e_1_3_4_5_2","volume-title":"The environment and social behavior: privacy, personal space, territory, and crowding.","author":"Altman Irwin","year":"1975","unstructured":"Irwin Altman. 1975. The environment and social behavior: privacy, personal space, territory, and crowding.ERIC, USA."},{"key":"e_1_3_4_6_2","doi-asserted-by":"publisher","DOI":"10.5555\/3361476.3361480"},{"key":"e_1_3_4_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501616"},{"key":"e_1_3_4_8_2","doi-asserted-by":"publisher","unstructured":"Nat\u00e3\u00a0M Barbosa Joon\u00a0S Park Yaxing Yao and Yang Wang. 2019. \u201cWhat if?\u201d Predicting Individual Users\u2019 Smart Home Privacy Preferences and Their Changes. Proceedings on Privacy Enhancing Technologies 2019 4 (2019) 211\u2013231. 10.2478\/popets-2019-0066","DOI":"10.2478\/popets-2019-0066"},{"key":"e_1_3_4_9_2","doi-asserted-by":"publisher","unstructured":"Florian Bemmann and Daniel Buschek. 2020. Languagelogger: A mobile keyboard application for studying language use in everyday text communication in the wild. Proceedings of the ACM on Human-Computer Interaction 4 EICS (2020) 1\u201324. 10.1145\/3397872","DOI":"10.1145\/3397872"},{"key":"e_1_3_4_10_2","doi-asserted-by":"publisher","unstructured":"Florian Bemmann and Sven Mayer. 2024. The Impact of Data Privacy on Users\u2019 Smartphone App Adoption Decisions. Proc. ACM Hum.-Comput. Interact. 8 MHCI Article MHCI038 (Sept. 2024) 23\u00a0pages. 10.1145\/3676525","DOI":"10.1145\/3676525"},{"key":"e_1_3_4_11_2","doi-asserted-by":"publisher","unstructured":"Florian Bemmann Maximiliane Windl Jonas Erbe Sven Mayer and Heinrich Hussmann. 2022. The Influence of Transparency and Control on the Willingness of Data Sharing in Adaptive Mobile Apps. Proc. ACM Hum.-Comput. Interact. 6 MHCI Article MHCI038 (Sept. 2022) 26\u00a0pages. 10.1145\/3546724","DOI":"10.1145\/3546724"},{"key":"e_1_3_4_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/2037373.2037431"},{"key":"e_1_3_4_13_2","unstructured":"Jan\u00a0Lauren Boyles Aaron Smith and Mary Madden. 2012. Privacy and data management on mobile devices. Pew Internet & American Life Project 4 (2012) 1\u201319."},{"key":"e_1_3_4_14_2","doi-asserted-by":"publisher","unstructured":"Petter\u00a0Bae Brandtzaeg Antoine Pultier and Gro\u00a0Mette Moen. 2019. Losing Control to Data-Hungry Apps: A Mixed-Methods Approach to Mobile App Privacy. Social Science Computer Review 37 4 (2019) 466\u2013488. arXiv:https:\/\/doi.org\/10.1177\/089443931877770610.1177\/0894439318777706","DOI":"10.1177\/0894439318777706"},{"key":"e_1_3_4_15_2","doi-asserted-by":"crossref","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3 2 (2006) 77\u2013101.","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_4_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078847"},{"key":"e_1_3_4_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/2037373.2037400"},{"key":"e_1_3_4_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335358"},{"key":"e_1_3_4_19_2","doi-asserted-by":"publisher","unstructured":"Delphine Christin Andreas Reinhardt Salil\u00a0S Kanhere and Matthias Hollick. 2011. A survey on privacy in mobile participatory sensing applications. Journal of systems and software 84 11 (2011) 1928\u20131946. 10.1016\/j.jss.2011.06.073","DOI":"10.1016\/j.jss.2011.06.073"},{"key":"e_1_3_4_20_2","first-page":"331","volume-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)","author":"Colnago Jessica","year":"2022","unstructured":"Jessica Colnago, Lorrie\u00a0Faith Cranor, Alessandro Acquisti, and Kate\u00a0Hazel Stanton. 2022. Is it a concern or a preference? An investigation into the ability of privacy scales to capture and distinguish granular privacy constructs. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). USENIX Association, USA, 331\u2013346. https:\/\/www.usenix.org\/conference\/soups2022\/presentation\/colnago"},{"key":"e_1_3_4_21_2","first-page":"9","volume-title":"Symposium on Usable Privacy and Security (SOUPS)","author":"Coopamootoo Kovila\u00a0PL","year":"2014","unstructured":"Kovila\u00a0PL Coopamootoo and Thomas Gro\u00df. 2014. Mental models: an approach to identify privacy concern and behavior. In Symposium on Usable Privacy and Security (SOUPS). USENIX Association, USA, 9\u201311."},{"key":"e_1_3_4_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.180"},{"key":"e_1_3_4_23_2","volume-title":"The nature of explanation","author":"Craik Kenneth James\u00a0Williams","year":"1967","unstructured":"Kenneth James\u00a0Williams Craik. 1967. The nature of explanation. Vol.\u00a0445. CUP Archive, Cambridge, UK."},{"key":"e_1_3_4_24_2","doi-asserted-by":"publisher","unstructured":"Mary\u00a0J Culnan and Pamela\u00a0K Armstrong. 1999. Information privacy concerns procedural fairness and impersonal trust: An empirical investigation. Organization science 10 1 (1999) 104\u2013115. 10.1287\/orsc.10.1.104","DOI":"10.1287\/orsc.10.1.104"},{"key":"e_1_3_4_25_2","doi-asserted-by":"publisher","unstructured":"Kenan Degirmenci. 2020. Mobile users\u2019 information privacy concerns and the role of app permission requests. International Journal of Information Management 50 (2020) 261\u2013272. 10.1016\/j.ijinfomgt.2019.05.010","DOI":"10.1016\/j.ijinfomgt.2019.05.010"},{"key":"e_1_3_4_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3568444.3570585"},{"key":"e_1_3_4_27_2","doi-asserted-by":"publisher","unstructured":"Paula Delgado-Santos Giuseppe Stragapede Ruben Tolosana Richard Guest Farzin Deravi and Ruben Vera-Rodriguez. 2022. A Survey of Privacy Vulnerabilities of Mobile Device Sensors. ACM Comput. Surv. 54 11s Article MHCI038 (sep 2022) 30\u00a0pages. 10.1145\/3510579","DOI":"10.1145\/3510579"},{"key":"e_1_3_4_28_2","volume-title":"Scale Development: Theory and Applications","author":"DeVellis Robert\u00a0F","year":"2021","unstructured":"Robert\u00a0F DeVellis and Carolyn\u00a0T Thorpe. 2021. Scale Development: Theory and Applications. Vol.\u00a026. SAGE Publications, Thousand Oaks, CA, USA."},{"key":"e_1_3_4_29_2","doi-asserted-by":"publisher","unstructured":"Leyla Dogruel Sven Joeckel and Nicholas\u00a0D Bowman. 2015. Choosing the right app: An exploratory perspective on heuristic decision processes for smartphone app selection. Mobile Media & Communication 3 1 (2015) 125\u2013144. 10.1177\/2050157914557509","DOI":"10.1177\/2050157914557509"},{"key":"e_1_3_4_30_2","doi-asserted-by":"publisher","unstructured":"Aarthi Easwara\u00a0Moorthy and Kim-Phuong\u00a0L Vu. 2015. Privacy concerns for use of voice activated personal assistant in the public space. International Journal of Human-Computer Interaction 31 4 (2015) 307\u2013335. 10.1080\/10447318.2014.986642","DOI":"10.1080\/10447318.2014.986642"},{"key":"e_1_3_4_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31205-2_25"},{"key":"e_1_3_4_32_2","doi-asserted-by":"publisher","unstructured":"Serge Egelman Adrienne\u00a0Porter Felt and David Wagner. 2013. Choice architecture and smartphone privacy: There\u2019sa price for that. The economics of information security and privacy (2013) 211\u2013236. 10.1007\/978-3-642-39498-0_10","DOI":"10.1007\/978-3-642-39498-0_10"},{"key":"e_1_3_4_33_2","doi-asserted-by":"publisher","unstructured":"Fenia Ferra Isabel Wagner Eerke Boiten Lee Hadlington Ismini Psychoula and Richard Snape. 2020. Challenges in assessing privacy impact: Tales from the front lines. Security and Privacy 3 2 (2020) e101. 10.1002\/spy2.101","DOI":"10.1002\/spy2.101"},{"key":"e_1_3_4_34_2","doi-asserted-by":"publisher","unstructured":"Thomas Franke Christiane Attig and Daniel Wessel. 2019. A personal resource for technology interaction: development and validation of the affinity for technology interaction (ATI) scale. International Journal of Human\u2013Computer Interaction 35 6 (2019) 456\u2013467. 10.1080\/10447318.2018.1456150","DOI":"10.1080\/10447318.2018.1456150"},{"key":"e_1_3_4_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517504"},{"key":"e_1_3_4_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSNet56116.2022.9955623"},{"key":"e_1_3_4_37_2","doi-asserted-by":"publisher","unstructured":"Marco Furini Silvia Mirri Manuela Montangero and Catia Prandi. 2020. Privacy perception when using smartphone applications. Mobile Networks and Applications 25 3 (2020) 1055\u20131061. 10.1007\/s11036-020-01529-z","DOI":"10.1007\/s11036-020-01529-z"},{"key":"e_1_3_4_38_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-531-92076-4"},{"key":"e_1_3_4_39_2","unstructured":"Christel Hopf. 2012. 5.2 Qualitative Interviews\u2013ein \u00dcberblick. Qualitative Forschung. Ein Handbuch 9 (2012) 349\u2013360."},{"key":"e_1_3_4_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00002"},{"key":"e_1_3_4_41_2","doi-asserted-by":"publisher","unstructured":"Tun-Min\u00a0Catherine Jai and Nancy\u00a0J King. 2016. Privacy versus reward: Do loyalty programs increase consumers\u2019 willingness to share personal information with third-party advertisers and data brokers? Journal of Retailing and Consumer Services 28 (2016) 296\u2013303. 10.1016\/j.jretconser.2015.01.005","DOI":"10.1016\/j.jretconser.2015.01.005"},{"key":"e_1_3_4_42_2","volume-title":"Mental models: Towards a cognitive science of language, inference, and consciousness","author":"Johnson-Laird Philip\u00a0Nicholas","year":"1983","unstructured":"Philip\u00a0Nicholas Johnson-Laird. 1983. Mental models: Towards a cognitive science of language, inference, and consciousness. Number\u00a06. Harvard University Press, Cambridge, MA, USA."},{"key":"e_1_3_4_43_2","doi-asserted-by":"publisher","unstructured":"Paul\u00a0E Ketelaar and Mark Van\u00a0Balen. 2018. The smartphone as your follower: The role of smartphone literacy in the relation between privacy concerns attitude and behaviour towards phone-embedded tracking. Computers in Human Behavior 78 (2018) 174\u2013182. 10.1016\/j.chb.2017.09.034","DOI":"10.1016\/j.chb.2017.09.034"},{"key":"e_1_3_4_44_2","doi-asserted-by":"publisher","unstructured":"Florian Keusch Bella Struminskaya Christopher Antoun Mick\u00a0P Couper and Frauke Kreuter. 2019. Willingness to participate in passive mobile data collection. Public opinion quarterly 83 S1 (2019) 210\u2013235. 10.1093\/poq\/nfz007","DOI":"10.1093\/poq\/nfz007"},{"key":"e_1_3_4_45_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01516-8_13"},{"key":"e_1_3_4_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2019.8730874"},{"key":"e_1_3_4_47_2","doi-asserted-by":"publisher","unstructured":"Ya-Cheng Li and Shin-Ming Cheng. 2018. Privacy preserved mobile sensing using region-based group signature. IEEE Access 6 (2018) 61556\u201361568. 10.1109\/ACCESS.2018.2868502","DOI":"10.1109\/ACCESS.2018.2868502"},{"key":"e_1_3_4_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_3_4_49_2","doi-asserted-by":"publisher","DOI":"10.5555\/3235838.3235856"},{"key":"e_1_3_4_50_2","doi-asserted-by":"publisher","unstructured":"Changchang Liu Supriyo Chakraborty and Prateek Mittal. 2017. DEEProtect: Enabling Inference-based Access Control on Mobile Sensing Applications. arxiv:https:\/\/arXiv.org\/abs\/1702.06159\u00a0[cs.CR] 10.48550\/arXiv.1702.06159","DOI":"10.48550\/arXiv.1702.06159"},{"key":"e_1_3_4_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3054779"},{"key":"e_1_3_4_52_2","doi-asserted-by":"publisher","unstructured":"Elsa Macias Alvaro Suarez and Jaime Lloret. 2013. Mobile sensing systems. Sensors 13 12 (2013) 17292\u201317321. 10.3390\/s131217292","DOI":"10.3390\/s131217292"},{"key":"e_1_3_4_53_2","doi-asserted-by":"publisher","unstructured":"Naresh\u00a0K Malhotra Sung\u00a0S Kim and James Agarwal. 2004. Internet users\u2019 information privacy concerns (IUIPC): The construct the scale and a causal model. Information systems research 15 4 (2004) 336\u2013355. 10.1287\/isre.1040.0032","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_3_4_54_2","doi-asserted-by":"publisher","unstructured":"Haroon\u00a0Iqbal Maseeh Shamsun Nahar Charles Jebarajakirthy Mitchell Ross Denni Arli Manish Das Mehak Rehman and Hafiz\u00a0Ahmad Ashraf. 2023. Exploring the privacy concerns of smartphone app users: a qualitative approach. Marketing Intelligence & Planning 41 7 (2023) 945\u2013969. 10.1108\/mip-11-2022-0515","DOI":"10.1108\/mip-11-2022-0515"},{"key":"e_1_3_4_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858063"},{"key":"e_1_3_4_56_2","unstructured":"Aleecia\u00a0M McDonald and Lorrie\u00a0Faith Cranor. 2008. The cost of reading privacy policies. I\/S: A Journal of Law and Policy for the Information Society 4 (2008) 543\u2013568."},{"key":"e_1_3_4_57_2","doi-asserted-by":"publisher","unstructured":"Caroline\u00a0Lancelot Miltgen and H\u00a0Jeff Smith. 2015. Exploring information privacy regulation risks trust and behavior. Information & Management 52 6 (2015) 741\u2013759. 10.1016\/j.im.2015.06.006","DOI":"10.1016\/j.im.2015.06.006"},{"key":"e_1_3_4_58_2","doi-asserted-by":"publisher","unstructured":"Nurul Momen Majid Hatamian and Lothar Fritsch. 2019. Did app privacy improve after the GDPR? IEEE Security & Privacy 17 6 (2019) 10\u201320. 10.1109\/MSEC.2019.2938445","DOI":"10.1109\/MSEC.2019.2938445"},{"key":"e_1_3_4_59_2","doi-asserted-by":"crossref","unstructured":"Helen Nissenbaum. 2011. Privacy in context: Technology policy and the integrity of social life. Journal of Information Policy 1 (2011) 149\u2013151.","DOI":"10.5325\/jinfopoli.1.2011.0149"},{"key":"e_1_3_4_60_2","doi-asserted-by":"publisher","unstructured":"Jonathan\u00a0A. Obar. 2016. The Biggest Lie on the Internet: Ignoring the Privacy Policies and Terms of Service Policies of Social Networking Services. SSRN Electronic Journal (2016) 37. 10.2139\/ssrn.2757465","DOI":"10.2139\/ssrn.2757465"},{"key":"e_1_3_4_61_2","doi-asserted-by":"publisher","unstructured":"Obi Ogbanufe and Robert Pavur. 2022. Going through the emotions of regret and fear: Revisiting protection motivation for identity theft protection. International Journal of Information Management 62 (2022) 102432. 10.1016\/j.ijinfomgt.2021.102432","DOI":"10.1016\/j.ijinfomgt.2021.102432"},{"key":"e_1_3_4_62_2","volume-title":"FSA: Fisheries Stock Analysis","author":"Ogle Derek\u00a0H.","year":"2022","unstructured":"Derek\u00a0H. Ogle, Jason\u00a0C. Doll, Powell Wheeler, and Alexis Dinno. 2022. FSA: Fisheries Stock Analysis. R package version 0.9.3."},{"key":"e_1_3_4_63_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-85610-6_20"},{"key":"e_1_3_4_64_2","doi-asserted-by":"publisher","DOI":"10.1109\/SmartWorld.2018.00317"},{"key":"e_1_3_4_65_2","doi-asserted-by":"publisher","unstructured":"Melanie Revilla Mick\u00a0P Couper and Carlos Ochoa. 2019. Willingness of online panelists to perform additional tasks. Methods data analyses: a journal for quantitative methods and survey methodology (mda) 13 2 (2019) 223\u2013252. 10.12758\/mda.2018.01","DOI":"10.12758\/mda.2018.01"},{"key":"e_1_3_4_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557189"},{"key":"e_1_3_4_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/3481357.3481511"},{"key":"e_1_3_4_68_2","doi-asserted-by":"publisher","unstructured":"Albrecht Schmidt Michael Beigl and Hans Gellersen. 1999. There is more to context than location. Computers & Graphics 23 6 (1999) 893\u2013901. 10.1016\/S0097-8493(99)00120-X","DOI":"10.1016\/S0097-8493(99)00120-X"},{"key":"e_1_3_4_69_2","doi-asserted-by":"publisher","DOI":"10.18420\/inf202076"},{"key":"e_1_3_4_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557421"},{"key":"e_1_3_4_71_2","doi-asserted-by":"publisher","unstructured":"Janice\u00a0C Sipior Burke\u00a0T Ward and Linda Volonino. 2014. Privacy concerns associated with smartphone use. Journal of Internet Commerce 13 3-4 (2014) 177\u2013193. 10.1080\/15332861.2014.947902","DOI":"10.1080\/15332861.2014.947902"},{"key":"e_1_3_4_72_2","doi-asserted-by":"publisher","unstructured":"Edith\u00a0G Smit Guda Van\u00a0Noort and Hilde\u00a0AM Voorveld. 2014. Understanding online behavioural advertising: User knowledge privacy concerns and online coping behaviour in Europe. Computers in Human Behavior 32 (2014) 15\u201322. 10.1016\/j.chb.2013.11.008","DOI":"10.1016\/j.chb.2013.11.008"},{"key":"e_1_3_4_73_2","unstructured":"Sabine Trepte and Philipp\u00a0K Masur. 2016. Cultural differences in social media use privacy and self-disclosure: Research report on a multicultural study. (2016)."},{"key":"e_1_3_4_74_2","doi-asserted-by":"publisher","unstructured":"Joris van Hoboken and R\u00a0\u00d3 Fathaigh. 2021. Smartphone platforms as privacy regulators. Computer Law & Security Review 41 (2021) 105557. 10.1016\/j.clsr.2021.105557","DOI":"10.1016\/j.clsr.2021.105557"},{"key":"e_1_3_4_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025556"},{"key":"e_1_3_4_76_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21599-5_11"},{"key":"e_1_3_4_77_2","doi-asserted-by":"publisher","unstructured":"Yongfeng Wang Zheng Yan Wei Feng and Shushu Liu. 2020. Privacy protection in mobile crowd sensing: a survey. World Wide Web 23 1 (2020) 421\u2013452. 10.1007\/s11280-019-00745-2","DOI":"10.1007\/s11280-019-00745-2"},{"key":"e_1_3_4_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_3_4_79_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-59817-7"},{"key":"e_1_3_4_80_2","doi-asserted-by":"publisher","unstructured":"Maximiliane Windl Alexander Hiesinger Robin Welsch Albrecht Schmidt and Sebastian\u00a0S. Feger. 2022. SaferHome: Interactive Physical and Digital Smart Home Dashboards for Communicating Privacy Assessments to Owners and Bystanders. Proc. ACM Hum.-Comput. Interact. 6 ISS Article MHCI038 (Nov. 2022) 20\u00a0pages. 10.1145\/3567739","DOI":"10.1145\/3567739"},{"key":"e_1_3_4_81_2","doi-asserted-by":"publisher","unstructured":"Maximiliane Windl and Sven Mayer. 2022. The Skewed Privacy Concerns of Bystanders in Smart Environments. Proc. ACM Hum.-Comput. Interact. 6 MHCI Article MHCI038 (Sept. 2022) 21\u00a0pages. 10.1145\/3546719","DOI":"10.1145\/3546719"},{"key":"e_1_3_4_82_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581167"},{"key":"e_1_3_4_83_2","doi-asserted-by":"publisher","unstructured":"Verena\u00a0M Wottrich Eva\u00a0A van Reijmersdal and Edith\u00a0G Smit. 2018. The privacy trade-off for mobile app downloads: The roles of app value intrusiveness and privacy concerns. Decision support systems 106 (2018) 44\u201352. 10.1016\/j.dss.2017.12.003","DOI":"10.1016\/j.dss.2017.12.003"},{"key":"e_1_3_4_84_2","doi-asserted-by":"publisher","DOI":"10.1145\/3417313.3429383"},{"key":"e_1_3_4_85_2","doi-asserted-by":"publisher","unstructured":"Tevfik\u00a0Sukru Yaprakli and Musa Unalan. 2017. Consumer Privacy in the Era of Big Data: A Survey of Smartphone Users\u2019 Concerns. PressAcademia Procedia 4 1 (2017) 1\u201310. 10.17261\/Pressacademia.2017.509","DOI":"10.17261\/Pressacademia.2017.509"},{"key":"e_1_3_4_86_2","doi-asserted-by":"publisher","DOI":"10.5555\/3235924.3235931"},{"key":"e_1_3_4_87_2","doi-asserted-by":"publisher","unstructured":"Ying Zhao and Jinjun Chen. 2022. A survey on differential privacy for unstructured data content. ACM Computing Surveys (CSUR) 54 10s (2022) 1\u201328. 10.1145\/3490237","DOI":"10.1145\/3490237"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3743719","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T14:45:35Z","timestamp":1759157135000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3743719"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,9]]},"references-count":86,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9,30]]}},"alternative-id":["10.1145\/3743719"],"URL":"https:\/\/doi.org\/10.1145\/3743719","relation":{},"ISSN":["2573-0142"],"issn-type":[{"type":"electronic","value":"2573-0142"}],"subject":[],"published":{"date-parts":[[2025,9,9]]},"assertion":[{"value":"2025-09-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}