{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T07:56:33Z","timestamp":1776930993490,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":99,"publisher":"ACM","funder":[{"name":"The Research Council of Finland","award":["330124"],"award-info":[{"award-number":["330124"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,4,13]]},"DOI":"10.1145\/3772318.3790467","type":"proceedings-article","created":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T04:12:26Z","timestamp":1776053546000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Do Users Even Care If Reused Smart Garments Reveal Earlier Users' Data?"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8486-031X","authenticated-orcid":false,"given":"Camilo","family":"Sanchez","sequence":"first","affiliation":[{"name":"Aalto University, Helsinki, Uusimaa, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6252-7244","authenticated-orcid":false,"given":"Felix","family":"Anand Epp","sequence":"additional","affiliation":[{"name":"Aalto University, Espoo, Finland and University of Helsinki, Helsinki, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7260-8670","authenticated-orcid":false,"given":"Antti","family":"Salovaara","sequence":"additional","affiliation":[{"name":"Aalto University, Espoo, Finland"}]}],"member":"320","published-online":{"date-parts":[[2026,4,13]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","unstructured":"Muhammad\u00a0Sadi Adamu. 2023. No More \u201cSolutionism\u201d or \u201cSaviourism\u201d in Futuring African HCI: A Manyfesto. ACM Trans. Comput.-Hum. Interact. 30 2 Article 21 (4 2023) 42\u00a0pages. 10.1145\/3571811","DOI":"10.1145\/3571811"},{"key":"e_1_3_3_2_3_2","volume-title":"The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding","author":"Altman Irwin","year":"1975","unstructured":"Irwin Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding. Brooks\/Cole, Monterey, CA, USA."},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2018.04.027"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422488"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858509"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","unstructured":"Maria B\u00e4ck and Elina Kestil\u00e4. 2009. Social Capital and Political Trust in Finland: An Individual-level Assessment. Scandinavian Political Studies 32 2 (June 2009) 171\u2013194. 10.1111\/j.1467-9477.2008.00218.x","DOI":"10.1111\/j.1467-9477.2008.00218.x"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2023-78"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","unstructured":"Syagnik\u00a0(Sy) Banerjee Thomas Hemphill and Phil Longstreet. 2018. Wearable Devices and Healthcare: Data Sharing and Privacy. Information Society 34 1 (Jan. 2018) 49\u201357. 10.1080\/01972243.2017.1391912","DOI":"10.1080\/01972243.2017.1391912"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","unstructured":"Shaowen Bardzell. 2018. Utopias of Participation: Feminism Design and the Futures. ACM Trans. Comput.-Hum. Interact. 25 1 Article 6 (Feb. 2018) 24\u00a0pages. 10.1145\/3127359","DOI":"10.1145\/3127359"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207727"},{"key":"e_1_3_3_2_12_2","series-title":"ICED17","first-page":"509","volume-title":"Proceedings of the 21st International Conference on Engineering Design","volume":"8","author":"Baxter Weston","year":"2018","unstructured":"Weston Baxter, Marco Aurisicchio, Ruth Mugge, and Peter R.\u00a0N. Childs. 2018. Positive and Negative Contamination in User Interactions. In Proceedings of the 21st International Conference on Engineering Design (Vancouver, Canada) (ICED17, Vol.\u00a08: Human Behaviour in Design). The Design Society, Glasgow, Scotland, United Kingdom, 509\u2013518."},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","unstructured":"Genevieve Bell and Paul Dourish. 2007. Yesterday\u2019s Tomorrows: Notes on Ubiquitous Computing\u2019s Dominant Vision. Personal and Ubiquitous Computing 11 2 (Jan. 2007) 133\u2013143. 10.1007\/s00779-006-0071-x","DOI":"10.1007\/s00779-006-0071-x"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.4324\/9780203434536"},{"key":"e_1_3_3_2_15_2","first-page":"115","volume-title":"Foundations of Futures Studies: Human Science for a New Era","author":"Bell Wendell","year":"2009","unstructured":"Wendell Bell. 2009. Assumptions of Futures Studies. In Foundations of Futures Studies: Human Science for a New Era. Vol.\u00a01. Transaction Publishers, New Brunswick, Canada, 115\u2013164."},{"key":"e_1_3_3_2_16_2","first-page":"73","volume-title":"Foundations of Futures Studies: Human Science for a New Era","author":"Bell Wendell","year":"2009","unstructured":"Wendell Bell. 2009. The Purpose of Futures Studies. In Foundations of Futures Studies: Human Science for a New Era. Vol.\u00a01. Transaction Publishers, New Brunswick, Canada, 73\u2013114."},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208347"},{"key":"e_1_3_3_2_18_2","unstructured":"Julian Bleecker. 2009. Design Fiction: A Short Essay on Design Science Fact and Fiction. https:\/\/www.nearfuturelaboratory.com\/blog\/2009\/03\/design-fiction-a-short-essay-on-design-science-fact-and-fiction\/"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240705"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/2317956.2318014"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3461778.3462002"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979185"},{"key":"e_1_3_3_2_23_2","unstructured":"Stuart Candy. 2010. The Futures of Everyday Life: Politics and the Design of Experiential Scenarios. Ph.\u00a0D. Dissertation. University of Hawaii USA."},{"key":"e_1_3_3_2_24_2","first-page":"3","volume-title":"Design and Futures","author":"Candy Stuart","year":"2019","unstructured":"Stuart Candy and Kelly Kornet. 2019. Turning Foresight Inside Out: An Introduction to Ethnographic Experiential Futures. In Design and Futures, Stuart Candy and Cher Potter (Eds.). Tamkang University Press, Taipei, Taiwan, 3\u201322."},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","unstructured":"Youngjin Chae and Juan Hinestroza. 2020. Building Circular Economy for Smart Textiles Smart Clothing and Future Wearables. Material\u2019s Circular Economy 2 Article 2 (2020) 4\u00a0pages. 10.1007\/s42824-020-00002-2","DOI":"10.1007\/s42824-020-00002-2"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","unstructured":"Gilsoo Cho Seungsin Lee and Jayoung Cho. 2009. Review and Reappraisal of Smart Clothing. International Journal of Human\u2013Computer Interaction 25 6 (2009) 582\u2013617. 10.1080\/10447310902997744","DOI":"10.1080\/10447310902997744"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858081"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/1858171.1858173"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","unstructured":"Nora\u00a0A. Draper and Joseph Turow. 2019. The Corporate Cultivation of Digital Resignation. New Media and Society 21 8 (Aug. 2019) 1824\u20131839. 10.1177\/1461444819833331","DOI":"10.1177\/1461444819833331"},{"key":"e_1_3_3_2_30_2","volume-title":"Speculative Everything : Design, Fiction, and Social Dreaming","author":"Dunne Anthony","year":"2013","unstructured":"Anthony Dunne and Fiona Raby. 2013. Speculative Everything : Design, Fiction, and Social Dreaming. MIT Press, Cambridge, MA, USA."},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025503"},{"key":"e_1_3_3_2_32_2","volume-title":"The Fashioned Body: Fashion, Dress and Modern Social Theory (2 ed.)","author":"Entwistle Joanne","year":"2015","unstructured":"Joanne Entwistle. 2015. The Fashioned Body: Fashion, Dress and Modern Social Theory (2 ed.). Polity Press, Cambridge."},{"key":"e_1_3_3_2_33_2","unstructured":"Felix\u00a0Anand Epp. 2023. Augmenting Appearance with Wearable Technology: Open-Ended Practices-Oriented Design for Adornment and Identity as Routes to Adoption. Ph.\u00a0D. Dissertation. Aalto University Helsinki Finland."},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420137"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517733"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3532106.3534570"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","unstructured":"Laura\u00a0E. Forlano and Megan\u00a0K. Halpern. 2023. Speculative Histories Just Futures: From Counterfactual Artifacts to Counterfactual Actions. ACM Trans. Comput.-Hum. Interact. 30 2 Article 22 (April 2023) 37\u00a0pages. 10.1145\/3577212","DOI":"10.1145\/3577212"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208562"},{"key":"e_1_3_3_2_39_2","volume-title":"Studies in Ethnomethodology","author":"Garfinkel Harold","year":"1967","unstructured":"Harold Garfinkel. 1967. Studies in Ethnomethodology. Prentice Hall, Englewood Cliffs, NJ, USA."},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","unstructured":"Bruce Gilley. 2012. Authoritarian Environmentalism and China\u2019s Response to Climate Change. Environmental Politics 21 2 (March 2012) 287\u2013307. 10.1080\/09644016.2012.651904","DOI":"10.1080\/09644016.2012.651904"},{"key":"e_1_3_3_2_41_2","first-page":"1","volume-title":"Futures Research Methodology: Version 3.0","author":"Glenn Jerome\u00a0C.","year":"2009","unstructured":"Jerome\u00a0C. Glenn. 2009. The Futures Wheel. In Futures Research Methodology: Version 3.0, Jerome\u00a0C. Glenn and Theodore\u00a0J. Gordon (Eds.). The Millennium Project, Washington, DC, USA, Chapter\u00a06, 1\u201317."},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851685"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21752-5_4"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPS-ISA50397.2020.00013"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226276663.003.0001"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420130"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","unstructured":"Youngho Kim Tae Oh and Jeongnyeo Kim. 2015. Analyzing User Awareness of Privacy Data Leak[s] in Mobile Applications. Mobile Information Systems 2015 Article 69489 (2015) 12\u00a0pages. 10.1155\/2015\/369489","DOI":"10.1155\/2015\/369489"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"publisher","unstructured":"Julian Kirchherr Denise Reike and Marko Hekkert. 2017. Conceptualizing the Circular Economy: An Analysis of 114 Definitions. Resources Conservation and Recycling 127 (Dec. 2017) 221\u2013232. 10.1016\/j.resconrec.2017.09.005","DOI":"10.1016\/j.resconrec.2017.09.005"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"publisher","unstructured":"Spyros Kokolakis. 2017. Privacy Attitudes and Privacy Behaviour: A Review of Current Research on the Privacy Paradox Phenomenon. Computers & Security 64 (Jan. 2017) 122\u2013134. 10.1016\/j.cose.2015.07.002","DOI":"10.1016\/j.cose.2015.07.002"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376526"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979420"},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"publisher","unstructured":"Susan Lechelt Katerina Gorkovenko and Chris Speed. 2024. On Disused Connected Devices: Understanding Disuse \u201cHolding On \u201d and Barriers to Circularity. ACM J. Comput. Sustain. Soc. 2 2 Article 17 (May 2024) 27\u00a0pages. 10.1145\/3651171","DOI":"10.1145\/3651171"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","unstructured":"H. Leino-Kilpi M. V\u00e4lim\u00e4ki T. Dassen M. Gasull C. Lemonidou A. Scott and M. Arndt. 2001. Privacy: A Review of the Literature. International Journal of Nursing Studies 38 6 (Dec. 2001) 663\u2013671. 10.1016\/S0020-7489(00)00111-5","DOI":"10.1016\/S0020-7489(00)00111-5"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025742"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858506"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813668"},{"key":"e_1_3_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466216"},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"publisher","unstructured":"Steve Mann. 1996. Smart Clothing: The Shift to Wearable Computing. Commun. ACM 39 8 (Aug. 1996) 23\u201324. 10.1145\/232014.232021","DOI":"10.1145\/232014.232021"},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174036"},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.4324\/9781351048002"},{"key":"e_1_3_3_2_61_2","doi-asserted-by":"publisher","unstructured":"Tim Moesgen Antti Salovaara Felix\u00a0A. Epp and Camilo Sanchez. 2023. Designing for Uncertain Futures: An Anticipatory Approach. Interactions 30 6 (Nov. 2023) 36\u201341. 10.1145\/3624698","DOI":"10.1145\/3624698"},{"key":"e_1_3_3_2_62_2","first-page":"78","volume-title":"Design Futures Literacies: Extended Essays","author":"Morrison Andrew","year":"2023","unstructured":"Andrew Morrison and Manuela Celi. 2023. Plurality and Futures: Knowing through Design. In Design Futures Literacies: Extended Essays , Andrew Morrison (Ed.). Vol.\u00a02. Oslo School of Architecture and Design, Oslo, Norway, 78\u201383."},{"key":"e_1_3_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_17"},{"key":"e_1_3_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/1394445.1394446"},{"key":"e_1_3_3_2_65_2","unstructured":"Helen Nissenbaum. 2004. Privacy as Contextual Integrity. Washington Law Review 79 1 (2004) 119\u2013158."},{"key":"e_1_3_3_2_66_2","doi-asserted-by":"publisher","unstructured":"Yuqi Niu Weidong Qiu Peng Tang Lifan Wang Shuo Chen Shujun Li Nadin K\u00f6kciyan and Ben Niu. 2025. Everyone\u2019s Privacy Matters! An Analysis of Privacy Leakage from Real-World Facial Images on Twitter and Associated User Behaviors. Proc. ACM Hum.-Comput. Interact. 9 2 Article CSCW069 (May 2025) 38\u00a0pages. 10.1145\/3710967","DOI":"10.1145\/3710967"},{"key":"e_1_3_3_2_67_2","first-page":"303","volume-title":"Circular Transitions a Mistra Future Fashion Conference on Textile Design and the Circular Economy","author":"O\u2019Mahony Marie","year":"2016","unstructured":"Marie O\u2019Mahony and Alison Gwilt. 2016. Where Does Wearable Technology Fit in the Circular Economy? In Circular Transitions a Mistra Future Fashion Conference on Textile Design and the Circular Economy, Rebecca Earley and Kate Goldsworthy (Eds.). University of the Arts London, London, United Kingdom, 303\u2013315."},{"key":"e_1_3_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_3_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025858"},{"key":"e_1_3_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/2659651.2659683"},{"key":"e_1_3_3_2_71_2","doi-asserted-by":"publisher","unstructured":"Sandra Petronio and Jeffrey\u00a0T. Child. 2020. Conceptualization and Operationalization: Utility of Communication Privacy Management Theory. Current Opinion in Psychology 31 (Feb. 2020) 76\u201382. 10.1016\/j.copsyc.2019.08.009","DOI":"10.1016\/j.copsyc.2019.08.009"},{"key":"e_1_3_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63023-6"},{"key":"e_1_3_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208278"},{"key":"e_1_3_3_2_74_2","doi-asserted-by":"publisher","unstructured":"Abderahman Rejeb Zailani Suhaiza Karim Rejeb Stefan Seuring and Horst Treiblmaier. 2022. The Internet of Things and the Circular Economy: A Systematic Literature Review and Research Agenda. Journal of Cleaner Production 350 (May 2022) 131439. 10.1016\/j.jclepro.2022.131439","DOI":"10.1016\/j.jclepro.2022.131439"},{"key":"e_1_3_3_2_75_2","volume-title":"The Social Impact of Computers","author":"Rosenberg Richard\u00a0S.","year":"1992","unstructured":"Richard\u00a0S. Rosenberg. 1992. The Social Impact of Computers. Academic Press, Boston, MA, USA."},{"key":"e_1_3_3_2_76_2","doi-asserted-by":"publisher","unstructured":"Gene Rowe and George Wright. 1999. The Delphi Technique as a Forecasting Tool: Issues and Analysis. International Journal of Forecasting 15 4 (Oct. 1999) 353\u2013375. 10.1016\/S0169-2070(99)00018-7","DOI":"10.1016\/S0169-2070(99)00018-7"},{"key":"e_1_3_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025658"},{"key":"e_1_3_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713565"},{"key":"e_1_3_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713759"},{"key":"e_1_3_3_2_80_2","doi-asserted-by":"publisher","unstructured":"Ziauddin Sardar and John\u00a0A. Sweeney. 2016. The Three Tomorrows of Postnormal Times. Futures 75 (Jan. 2016) 13\u00a0pages. 10.1016\/j.futures.2015.10.004","DOI":"10.1016\/j.futures.2015.10.004"},{"key":"e_1_3_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.4108\/icst.pervasivehealth.2011.246031"},{"key":"e_1_3_3_2_82_2","unstructured":"Paul J.\u00a0H. Schoemaker. 1995. Scenario Planning: A Tool for Strategic Thinking. Sloan Management Review 36 2 (1995) 25\u201350."},{"key":"e_1_3_3_2_83_2","doi-asserted-by":"publisher","unstructured":"L.\u00a0H. Segura\u00a0Anaya Abeer Alsadoon N. Costadopoulos and P.\u00a0W.\u00a0C. Prasad. 2018. Ethical Implications of User Perceptions of Wearable Devices. Science and Engineering Ethics 24 1 (Feb. 2018) 28\u00a0pages. 10.1007\/s11948-017-9872-8","DOI":"10.1007\/s11948-017-9872-8"},{"key":"e_1_3_3_2_84_2","doi-asserted-by":"publisher","unstructured":"Mudasir\u00a0Akbar Shah Bilal\u00a0Masood Pirzada Gareth Price Abel\u00a0L. Shibiru and Ahsanulhaq Qurashi. 2022. Applications of Nanotechnology in [the] Smart Textile Industry: A Critical Review. Journal of Advanced Research 38 (May 2022) 55\u201375. 10.1016\/j.jare.2022.01.008","DOI":"10.1016\/j.jare.2022.01.008"},{"key":"e_1_3_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557421"},{"key":"e_1_3_3_2_86_2","doi-asserted-by":"publisher","unstructured":"Bruce Sterling. 2009. Design Fiction. Interactions 16 3 (May 2009) 20\u201324. 10.1145\/1516016.1516021","DOI":"10.1145\/1516016.1516021"},{"key":"e_1_3_3_2_87_2","doi-asserted-by":"publisher","unstructured":"Sakari Tamminen and Elisabet Holmgren. 2016. The Anthropology of Wearables: The Self the Social and the Autobiographical. Ethnographic Praxis in Industry Conference Proceedings 2016 1 (Nov. 2016) 154\u2013174. 10.1111\/1559-8918.2016.01083","DOI":"10.1111\/1559-8918.2016.01083"},{"key":"e_1_3_3_2_88_2","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226180458.001.0001"},{"key":"e_1_3_3_2_89_2","doi-asserted-by":"publisher","unstructured":"Timm Teubner and Christoph\u00a0M. Flath. 2019. Privacy in the Sharing Economy. Journal of the Association for Information Systems 20 3 (2019) 213\u2013242. 10.17705\/1jais.00534","DOI":"10.17705\/1jais.00534"},{"key":"e_1_3_3_2_90_2","doi-asserted-by":"publisher","unstructured":"Bill Tomlinson Eli Blevis Bonnie Nardi Donald\u00a0J. Patterson M.\u00a0Six Silberman and Yue Pan. 2013. Collapse Informatics and Practice: Theory Method and Design. ACM Trans. Comput.-Hum. Interact. 20 4 Article 24 (Sept. 2013) 26\u00a0pages. 10.1145\/2493431","DOI":"10.1145\/2493431"},{"key":"e_1_3_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.4324\/9781003244677-2"},{"key":"e_1_3_3_2_92_2","volume-title":"Scenarios: The Art of Strategic Conversation (2 ed.)","author":"Heijden Kees van\u00a0der","year":"2005","unstructured":"Kees van\u00a0der Heijden. 2005. Scenarios: The Art of Strategic Conversation (2 ed.). John Wiley & Sons, Chichester, England, UK."},{"key":"e_1_3_3_2_93_2","doi-asserted-by":"publisher","unstructured":"Susan\u00a0A. van \u2019t Klooster and Marjolein B.\u00a0A. van Asselt. 2006. Practising the Scenario-Axes Technique. Futures 38 1 (2006) 15\u201330. 10.1016\/j.futures.2005.04.019","DOI":"10.1016\/j.futures.2005.04.019"},{"key":"e_1_3_3_2_94_2","doi-asserted-by":"publisher","unstructured":"Annamari V\u00e4nsk\u00e4 Sini Mickelsson Daria Morozova Heidi H\u00e4rk\u00f6nen Olga Gurova and Elina Pirjatanniemi. 2023. Arctic Childhood in Data-Driven Culture: Wearable Technology and Children\u2019s Right to Privacy in Finland. Critical Studies in Fashion & Beauty 14 2 (Dec. 2023) 261\u2013283. 10.1386\/csfb_00067_1","DOI":"10.1386\/csfb_00067_1"},{"key":"e_1_3_3_2_95_2","doi-asserted-by":"publisher","unstructured":"Anne P.\u00a0M. Velenturf and Phil Purnell. 2021. Principles for a Sustainable Circular Economy. Sustainable Production and Consumption 27 (July 2021) 1437\u20131457. 10.1016\/j.spc.2021.02.018","DOI":"10.1016\/j.spc.2021.02.018"},{"key":"e_1_3_3_2_96_2","doi-asserted-by":"publisher","DOI":"10.2760\/115376"},{"key":"e_1_3_3_2_97_2","doi-asserted-by":"publisher","unstructured":"Mika Westerlund. 2019. The Emergence of Deepfake Technology: A Review. Technology Innovation Management Review 9 (11 2019) 40\u201353. 10.22215\/timreview\/1282","DOI":"10.22215\/timreview\/1282"},{"key":"e_1_3_3_2_98_2","doi-asserted-by":"publisher","unstructured":"Richmond\u00a0Y. Wong Deirdre\u00a0K. Mulligan Ellen Van\u00a0Wyk James Pierce and John Chuang. 2017. Eliciting Values Reflections by Engaging Privacy Futures Using Design Workbooks. Proceedings of the ACM on Human-Computer Interaction 1 CSCW (Dec. 2017) 1\u201326. 10.1145\/3134746","DOI":"10.1145\/3134746"},{"key":"e_1_3_3_2_99_2","doi-asserted-by":"publisher","unstructured":"Serena Zheng Noah Apthorpe Marshini Chetty and Nick Feamster. 2018. User Perceptions of Smart Home IoT Privacy. Proc. ACM Hum.-Comput. Interact. 2 CSCW Article 200 (Nov. 2018) 20\u00a0pages. 10.1145\/3274469","DOI":"10.1145\/3274469"},{"key":"e_1_3_3_2_100_2","doi-asserted-by":"publisher","unstructured":"Shoshana Zuboff. 2015. Big Other: Surveillance Capitalism and the Prospects of an Information Civilization. Journal of Information Technology 30 1 (2015) 75\u201389. 10.1057\/jit.2015.5","DOI":"10.1057\/jit.2015.5"}],"event":{"name":"CHI 2026: CHI Conference on Human Factors in Computing Systems","location":"Barcelona Spain","acronym":"CHI '26","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2026 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3772318.3790467","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T09:24:31Z","timestamp":1776417871000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3772318.3790467"}},"subtitle":["Anticipating Privacy Implications in the Circular Economy"],"short-title":[],"issued":{"date-parts":[[2026,4,13]]},"references-count":99,"alternative-id":["10.1145\/3772318.3790467","10.1145\/3772318"],"URL":"https:\/\/doi.org\/10.1145\/3772318.3790467","relation":{},"subject":[],"published":{"date-parts":[[2026,4,13]]},"assertion":[{"value":"2026-04-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}