{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T11:02:53Z","timestamp":1776423773388,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":84,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,4,13]]},"DOI":"10.1145\/3772318.3791893","type":"proceedings-article","created":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T04:12:28Z","timestamp":1776053548000},"page":"1-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Cards for Surfacing Mental Models and Exploring Privacy Concerns: A Case Study of Voice-First Ambient Interfaces with Older Adults"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1845-0240","authenticated-orcid":false,"given":"Andrea","family":"Cuadra","sequence":"first","affiliation":[{"name":"Computer Science, Olin College, Needham, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9904-6081","authenticated-orcid":false,"given":"Samar","family":"Sabie","sequence":"additional","affiliation":[{"name":"Computer Science, University of Toronto, Toronto, Ontario, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5954-916X","authenticated-orcid":false,"given":"Yan","family":"Shvartzshnaider","sequence":"additional","affiliation":[{"name":"York University, Toronto, Ontario, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6477-0096","authenticated-orcid":false,"given":"Deborah","family":"Estrin","sequence":"additional","affiliation":[{"name":"Computer Science, Cornell Tech, New York, New York, USA"}]}],"member":"320","published-online":{"date-parts":[[2026,4,13]]},"reference":[{"key":"e_1_3_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395516"},{"key":"e_1_3_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445122"},{"key":"e_1_3_3_3_4_2","doi-asserted-by":"crossref","unstructured":"Nada Alhirabi Stephanie Beaumont Jose\u00a0Tomas Llanos Dulani Meedeniya Omer Rana and Charith Perera. 2023. PARROT: Interactive privacy-aware internet of things application design tool. Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 7 1 (2023) 1\u201337.","DOI":"10.1145\/3580880"},{"key":"e_1_3_3_3_5_2","doi-asserted-by":"crossref","unstructured":"Noah Apthorpe Yan Shvartzshnaider Arunesh Mathur Dillon Reisman and Nick Feamster. 2018. Discovering smart home internet of things privacy norms using contextual integrity. Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 2 2 (2018) 1\u201323.","DOI":"10.1145\/3214262"},{"key":"e_1_3_3_3_6_2","first-page":"123","volume-title":"28th { USENIX} Security Symposium ({ USENIX} Security 19)","author":"Apthorpe Noah","year":"2019","unstructured":"Noah Apthorpe, Sarah Varghese, and Nick Feamster. 2019. Evaluating the Contextual Integrity of Privacy Regulation: Parents\u2019 IoT Toy Privacy Norms Versus { COPPA}. In 28th { USENIX} Security Symposium ({ USENIX} Security 19). 123\u2013140."},{"key":"e_1_3_3_3_7_2","unstructured":"Artefact Group. 2013. The Tarot Cards of Tech. http:\/\/tarotcardsoftech.artefactgroup.com\/."},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3323697"},{"key":"e_1_3_3_3_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207727"},{"key":"e_1_3_3_3_10_2","volume-title":"Senior centers: Opportunities for successful aging","author":"Beisgen Beverly","year":"2003","unstructured":"Beverly Beisgen and Marilyn Kraitchman. 2003. Senior centers: Opportunities for successful aging. Springer Publishing Company."},{"key":"e_1_3_3_3_11_2","doi-asserted-by":"crossref","unstructured":"Frank Bentley Chris Luvogt Max Silverman Rushani Wirasinghe Brooke White and Danielle Lottridge. 2018. Understanding the long-term use of smart speaker assistants. Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 2 3 (2018) 1\u201324.","DOI":"10.1145\/3264901"},{"key":"e_1_3_3_3_12_2","doi-asserted-by":"crossref","unstructured":"Jenny Berkholz Aniqa Rahman and Gunnar Stevens. 2025. Playing with Privacy: Exploring the Social Construction of Privacy Norms Through a Card Game. Proceedings of the ACM on Human-Computer Interaction 9 1 (2025) 1\u201323.","DOI":"10.1145\/3701202"},{"key":"e_1_3_3_3_13_2","volume-title":"Sixteenth symposium on usable privacy and security (SOUPS 2020)","author":"Bonilla Karen","year":"2020","unstructured":"Karen Bonilla and Aqueasha Martin-Hammond. 2020. Older adults\u2019 perceptions of intelligent voice assistant privacy, transparency, and online privacy guidelines. In Sixteenth symposium on usable privacy and security (SOUPS 2020)."},{"key":"e_1_3_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208560"},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/1952222.1952314"},{"key":"e_1_3_3_3_16_2","volume-title":"Thematic analysis: A practical guide","author":"Braun Virginia","year":"2021","unstructured":"Virginia Braun and Victoria Clarke. 2021. Thematic analysis: A practical guide. Sage."},{"key":"e_1_3_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501945"},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"crossref","unstructured":"Robin Brewer Christina Harrington and Courtney Heldreth. 2024. INTERSECTIONAL AGEISM: HOW BLACK OLDER ADULTS ENVISION A FUTURE WITH CONVERSATIONAL TECHNOLOGIES. Innovation in Aging 8 Suppl 1 (2024) 442.","DOI":"10.1093\/geroni\/igae098.1439"},{"key":"e_1_3_3_3_19_2","first-page":"77","volume-title":"Conference on fairness, accountability and transparency","author":"Buolamwini Joy","year":"2018","unstructured":"Joy Buolamwini and Timnit Gebru. 2018. Gender shades: Intersectional accuracy disparities in commercial gender classification. In Conference on fairness, accountability and transparency. PMLR, 77\u201391."},{"key":"e_1_3_3_3_20_2","unstructured":"US\u00a0Census Bureau. [n. d.]. Older People Projected to Outnumber Children. Retrieved 2021-09-01 from https:\/\/www.census.gov\/newsroom\/press-releases\/2018\/cb18-41-population-projections.html.."},{"key":"e_1_3_3_3_21_2","unstructured":"Ryan Calo. 2009. People can be so fake: A new dimension to privacy and technology scholarship. Penn St. L. Rev. 114 (2009) 809."},{"key":"e_1_3_3_3_22_2","doi-asserted-by":"crossref","unstructured":"John\u00a0M Carroll and Judith\u00a0Reitman Olson. 1988. Mental models in human-computer interaction. Handbook of human-computer interaction (1988) 45\u201365.","DOI":"10.1016\/B978-0-444-70536-5.50007-5"},{"key":"e_1_3_3_3_23_2","doi-asserted-by":"crossref","unstructured":"Jay\u00a0Pil Choi Doh-Shin Jeon and Byung-Cheol Kim. 2019. Privacy and personal data collection with information externalities. Journal of Public Economics 173 (2019) 113\u2013124.","DOI":"10.1016\/j.jpubeco.2019.02.001"},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"crossref","unstructured":"Jane Chung Jisook Ko Yong\u00a0K Choi Amanda Lazar Kristen Fessele and Suzanne Ameringer. 2025. Developing the ASSIST Survey to Guide a Smart Speaker\u2013Based Chronic Disease Management Intervention for Underserved Older Adults. Research in Gerontological Nursing (2025) 1\u201310.","DOI":"10.3928\/19404921-20250516-01"},{"key":"e_1_3_3_3_25_2","doi-asserted-by":"crossref","unstructured":"Jonathan Cinnamon. 2017. Social injustice in surveillance capitalism. Surveillance & Society 15 5 (2017) 609\u2013625.","DOI":"10.24908\/ss.v15i5.6433"},{"key":"e_1_3_3_3_26_2","doi-asserted-by":"crossref","unstructured":"Diane\u00a0J Cook Juan\u00a0C Augusto and Vikramaditya\u00a0R Jakkula. 2009. Ambient intelligence: Technologies applications and opportunities. Pervasive and mobile computing 5 4 (2009) 277\u2013298.","DOI":"10.1016\/j.pmcj.2009.04.001"},{"key":"e_1_3_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3563657.3596104"},{"key":"e_1_3_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642336"},{"key":"e_1_3_3_3_29_2","unstructured":"AJ Dellinger. 2019. An Amazon employee might have listened to your Alexa recording. https:\/\/www.engadget.com\/2019-04-11-amazon-alexa-voice-recording-human-review.html"},{"key":"e_1_3_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3714038"},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"crossref","unstructured":"Alan Dix. 2010. Human\u2013computer interaction: A stable discipline a nascent science and the growth of the long tail. Interacting with computers 22 1 (2010) 13\u201327.","DOI":"10.1016\/j.intcom.2009.11.007"},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580771"},{"key":"e_1_3_3_3_33_2","volume-title":"Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor","author":"Eubanks Virginia","year":"2018","unstructured":"Virginia Eubanks. 2018. Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor. St. Martin\u2019s Press, New York, NY."},{"key":"e_1_3_3_3_34_2","doi-asserted-by":"crossref","unstructured":"Szymon Fedor Robert Lewis Paola Pedrelli David Mischoulon Joshua Curtiss and Rosalind\u00a0W Picard. 2023. Wearable technology in clinical practice for depressive disorder. New England Journal of Medicine 389 26 (2023) 2457\u20132466.","DOI":"10.1056\/NEJMra2215898"},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208562"},{"key":"e_1_3_3_3_36_2","doi-asserted-by":"publisher","unstructured":"Bill Gaver Tony Dunne and Elena Pacenti. 1999. Design: Cultural probes. Interactions 6 1 (jan 1999) 21\u201329. 10.1145\/291224.291235","DOI":"10.1145\/291224.291235"},{"key":"e_1_3_3_3_37_2","doi-asserted-by":"crossref","unstructured":"Nancy\u00a0M Gell Dori\u00a0E Rosenberg George Demiris Andrea\u00a0Z LaCroix and Kushang\u00a0V Patel. 2015. Patterns of technology use among older adults with and without disabilities. The Gerontologist 55 3 (2015) 412\u2013421.","DOI":"10.1093\/geront\/gnt166"},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517621"},{"key":"e_1_3_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501995"},{"key":"e_1_3_3_3_40_2","unstructured":"Woodrow Hartzog. 2014. Unfair and deceptive robots. Md. L. Rev. 74 (2014) 785."},{"key":"e_1_3_3_3_41_2","first-page":"1","volume-title":"Proceedings of the 23rd ACM International Conference on Intelligent Virtual Agents","author":"Horstmann Aike\u00a0C","year":"2023","unstructured":"Aike\u00a0C Horstmann, Clara Strathmann, Lea Lambrich, and Nicole\u00a0C Kr\u00e4mer. 2023. Alexa, What\u2019s Inside of You: A Qualitative Study to Explore Users\u2019 Mental Models of Intelligent Voice Assistants. In Proceedings of the 23rd ACM International Conference on Intelligent Virtual Agents. 1\u201310."},{"key":"e_1_3_3_3_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580712"},{"key":"e_1_3_3_3_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713578"},{"key":"e_1_3_3_3_44_2","first-page":"17","volume-title":"IJCAI 2017 Workshop on artificial intelligence in affective computing","author":"Jaques Natasha","year":"2017","unstructured":"Natasha Jaques, Sara Taylor, Akane Sano, Rosalind Picard, et\u00a0al. 2017. Predicting tomorrow\u2019s mood, health, and stress level using personalized multitask learning and domain adaptation. In IJCAI 2017 Workshop on artificial intelligence in affective computing. PMLR, 17\u201333."},{"key":"e_1_3_3_3_45_2","doi-asserted-by":"crossref","unstructured":"Pegah Karimi and Aqueasha Martin-Hammond. 2025. Designing Intelligent Voice Assistants for Older Adults\u2019 Collaborative Care: Exploring Supportive and Non-Supportive Interactions. Proceedings of the ACM on Human-Computer Interaction 9 7 (2025) 1\u201335.","DOI":"10.1145\/3757465"},{"key":"e_1_3_3_3_46_2","doi-asserted-by":"crossref","unstructured":"Maryam Khalid and Akane Sano. 2023. Exploiting social graph networks for emotion prediction. Scientific Reports 13 1 (2023) 6069.","DOI":"10.1038\/s41598-023-32825-9"},{"key":"e_1_3_3_3_47_2","unstructured":"Shahedul\u00a0Huq Khandkar. 2009. Open coding. University of Calgary 23 (2009) 2009."},{"key":"e_1_3_3_3_48_2","doi-asserted-by":"crossref","unstructured":"Patrick K\u00fchtreiber Hauke Bock Viktoriya Pak Luca\u00a0Hern\u00e1ndez Acosta Katrin H\u00f6ffler and Delphine Reinhardt. 2025. A Multi-Factorial Comparative Analysis of Perceived Privacy Violations Caused by Smart Speakers in Germany and the UK. ACM Transactions on Computer-Human Interaction 32 5 (2025) 1\u201338.","DOI":"10.1145\/3736163"},{"key":"e_1_3_3_3_49_2","doi-asserted-by":"crossref","unstructured":"Priya\u00a0C Kumar Michael Zimmer and Jessica Vitak. 2024. A Roadmap for Applying the Contextual Integrity Framework in Qualitative Privacy Research. Proceedings of the ACM on Human-Computer Interaction 8 CSCW1 (2024) 1\u201329.","DOI":"10.1145\/3653710"},{"key":"e_1_3_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/HRI.2019.8673274"},{"key":"e_1_3_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702142"},{"key":"e_1_3_3_3_52_2","doi-asserted-by":"crossref","unstructured":"Kirsten Martin and Helen Nissenbaum. 2016. Measuring privacy: an empirical test using context to expose confounding variables. Colum. Sci. & Tech. L. Rev. 18 (2016) 176.","DOI":"10.2139\/ssrn.2709584"},{"key":"e_1_3_3_3_53_2","doi-asserted-by":"crossref","unstructured":"Niharika Mathur Tamara Zubatiy Agata Rozga Jodi Forlizzi and Elizabeth Mynatt. 2025. \" Sometimes You Need Facts and Sometimes a Hug\": Understanding Older Adults\u2019 Preferences for Explanations in LLM-Based Conversational AI Systems. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2510.06697 (2025).","DOI":"10.1145\/3772318.3790812"},{"key":"e_1_3_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.1515\/9780804772891"},{"key":"e_1_3_3_3_55_2","doi-asserted-by":"crossref","unstructured":"Helen Nissenbaum. 2019. Contextual integrity up and down the data food chain. Theoretical inquiries in law 20 1 (2019) 221\u2013256.","DOI":"10.1515\/til-2019-0008"},{"key":"e_1_3_3_3_56_2","doi-asserted-by":"crossref","DOI":"10.18574\/nyu\/9781479833641.001.0001","volume-title":"Algorithms of oppression","author":"Noble Safiya\u00a0Umoja","year":"2018","unstructured":"Safiya\u00a0Umoja Noble. 2018. Algorithms of oppression: How search engines reinforce racism. In Algorithms of oppression. New York university press."},{"key":"e_1_3_3_3_57_2","doi-asserted-by":"crossref","unstructured":"Katherine O\u2019Brien Anna Liggett Vanessa Ramirez-Zohfeld Priya Sunkara and Lee\u00a0A Lindquist. 2020. Voice-Controlled Intelligent Personal Assistants to Support Aging in Place. Journal of the American Geriatrics Society 68 1 (2020) 176\u2013179.","DOI":"10.1111\/jgs.16217"},{"key":"e_1_3_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3360322.3360851"},{"key":"e_1_3_3_3_59_2","doi-asserted-by":"crossref","unstructured":"Alisha Pradhan Shaan Chopra Pooja Upadhyay Robin Brewer and Amanda Lazar. 2025. Understanding entangled human-technology-world relations: use of intelligent voice assistants by older adults. Information research 30 (2025) 1049.","DOI":"10.47989\/ir30iConf47119"},{"key":"e_1_3_3_3_60_2","doi-asserted-by":"crossref","unstructured":"Alisha Pradhan Sheena Erete Shaan Chopra Pooja Upadhyay Oluwaseun Sule and Amanda Lazar. 2025. \u2019No not that voice again!\u2019: Engaging Older Adults in Design of Anthropomorphic Voice Assistants. Proceedings of the ACM on Human-Computer Interaction 9 2 (2025) 1\u201330.","DOI":"10.1145\/3711039"},{"key":"e_1_3_3_3_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174033"},{"key":"e_1_3_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-82786-1_5"},{"key":"e_1_3_3_3_63_2","doi-asserted-by":"crossref","unstructured":"Valeria Righi Sergio Sayago and Josep Blat. 2017. When we talk about older people in HCI who are we talking about? Towards a \u2018turn to community\u2019in the design of technologies for a growing ageing population. International Journal of Human-Computer Studies 108 (2017) 15\u201331.","DOI":"10.1016\/j.ijhcs.2017.06.005"},{"key":"e_1_3_3_3_64_2","unstructured":"Tom Ritchey. 2013. Wicked problems. Acta morphologica generalis 2 1 (2013)."},{"key":"e_1_3_3_3_65_2","doi-asserted-by":"crossref","unstructured":"Armin Shahrokni Amy Tin Robert\u00a0J Downey Vivian Strong Sanam Mahmoudzadeh Manpreet\u00a0K Boparai Sincere McMillan Andrew Vickers and Beatriz Korc-Grodzicki. 2017. Electronic rapid fitness assessment: a novel tool for preoperative evaluation of the geriatric oncology patient. Journal of the National Comprehensive Cancer Network 15 2 (2017) 172\u2013179.","DOI":"10.6004\/jnccn.2017.0018"},{"key":"e_1_3_3_3_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3565698.3565774"},{"key":"e_1_3_3_3_67_2","doi-asserted-by":"crossref","unstructured":"Hasti Sharifi. 2025. Helping Older Adults with Ongoing Mobile Technology Use: Challenges and Design Opportunities. Ph.\u00a0D. Dissertation. University of Illinois at Chicago.","DOI":"10.1145\/3706599.3719892"},{"key":"e_1_3_3_3_68_2","doi-asserted-by":"publisher","DOI":"10.1609\/hcomp.v4i1.13271"},{"key":"e_1_3_3_3_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/3543829.3543841"},{"key":"e_1_3_3_3_70_2","doi-asserted-by":"crossref","unstructured":"Jianna So Samantha Estrada Matthew J\u00f6rke Eva Bianchi Maria Wang Nava Haghighi Kristen\u00a0L Fessele James\u00a0A Landay and Andrea Cuadra. 2024. \" They Make Us Old Before We\u2019re Old\": Designing Ethical Health Technology with and for Older Adults. Proceedings of the ACM on Human-Computer Interaction 8 CSCW2 (2024) 1\u201330.","DOI":"10.1145\/3687017"},{"key":"e_1_3_3_3_71_2","doi-asserted-by":"crossref","unstructured":"Daniel\u00a0J Solove. 2021. The myth of the privacy paradox. Geo. Wash. L. Rev. 89 (2021) 1.","DOI":"10.2139\/ssrn.3536265"},{"key":"e_1_3_3_3_72_2","doi-asserted-by":"crossref","unstructured":"Hillary\u00a0B Spangler Tiffany\u00a0M Driesse David\u00a0H Lynch Xiaohui Liang Robert\u00a0M Roth David Kotz Karen Fortuna and John\u00a0A Batsis. 2022. Privacy concerns of older adults using voice assistant systems. Journal of the American Geriatrics Society 70 12 (2022) 3643.","DOI":"10.1111\/jgs.18009"},{"key":"e_1_3_3_3_73_2","doi-asserted-by":"crossref","unstructured":"Luke Stark. 2016. The emotional context of information privacy. The Information Society 32 1 (2016) 14\u201327.","DOI":"10.1080\/01972243.2015.1107167"},{"key":"e_1_3_3_3_74_2","doi-asserted-by":"publisher","DOI":"10.1177\/1071181320641004"},{"key":"e_1_3_3_3_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/3369457.3369506"},{"key":"e_1_3_3_3_76_2","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/12482.001.0001"},{"key":"e_1_3_3_3_77_2","doi-asserted-by":"publisher","DOI":"10.4324\/9781003323686-4"},{"key":"e_1_3_3_3_78_2","volume-title":"The Voice Catchers","author":"Turow Joseph","year":"2021","unstructured":"Joseph Turow. 2021. The Voice Catchers. Yale University Press."},{"key":"e_1_3_3_3_79_2","doi-asserted-by":"crossref","unstructured":"Joseph Turow and Nick Couldry. 2018. Media as data extraction: Towards a new map of a transformed communications field. Journal of Communication 68 2 (2018) 415\u2013423.","DOI":"10.1093\/joc\/jqx011"},{"key":"e_1_3_3_3_80_2","doi-asserted-by":"crossref","unstructured":"Claudia Vesel Homa Rashidisabet John Zulueta Jonathan\u00a0P Stange Jennifer Duffecy Faraz Hussain Andrea Piscitello John Bark Scott\u00a0A Langenecker Shannon Young et\u00a0al. 2020. Effects of mood and aging on keystroke dynamics metadata and their diurnal patterns in a large open-science sample: A BiAffect iOS study. Journal of the American Medical Informatics Association 27 7 (2020) 1007\u20131018.","DOI":"10.1093\/jamia\/ocaa057"},{"key":"e_1_3_3_3_81_2","doi-asserted-by":"crossref","unstructured":"John Vines Gary Pritchard Peter Wright Patrick Olivier and Katie Brittain. 2015. An age-old problem: Examining the discourses of ageing in HCI and strategies for future research. ACM Transactions on Computer-Human Interaction (TOCHI) 22 1 (2015) 1\u201327.","DOI":"10.1145\/2696867"},{"key":"e_1_3_3_3_82_2","unstructured":"Kathleen\u00a0D Vohs Roy\u00a0F Baumeister Jean\u00a0M Twenge Brandon\u00a0J Schmeichel Dianne\u00a0M Tice and Jennifer Crocker. 2005. Decision fatigue exhausts self-regulatory resources\u2014But so does accommodating to unchosen alternatives. Manuscript submitted for publication (2005) 1\u201355."},{"key":"e_1_3_3_3_83_2","first-page":"1","volume-title":"10th Symposium On Usable Privacy and Security (SOUPS 2014)","author":"Woodruff Allison","year":"2014","unstructured":"Allison Woodruff, Vasyl Pihur, Sunny Consolvo, Laura Brandimarte, and Alessandro Acquisti. 2014. Would a Privacy Fundamentalist Sell Their { DNA} for {$1000...If} Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and Consequences. In 10th Symposium On Usable Privacy and Security (SOUPS 2014). 1\u201318."},{"key":"e_1_3_3_3_84_2","doi-asserted-by":"crossref","unstructured":"Michael Zimmer. 2018. Addressing conceptual gaps in big data research ethics: An application of contextual integrity. Social Media+ Society 4 2 (2018) 2056305118768300.","DOI":"10.1177\/2056305118768300"},{"key":"e_1_3_3_3_85_2","doi-asserted-by":"crossref","unstructured":"Shoshana Zuboff. 2015. Big other: surveillance capitalism and the prospects of an information civilization. Journal of Information Technology 30 1 (2015) 75\u201389.","DOI":"10.1057\/jit.2015.5"}],"event":{"name":"CHI 2026: CHI Conference on Human Factors in Computing Systems","location":"Barcelona Spain","acronym":"CHI '26","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2026 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3772318.3791893","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T10:08:17Z","timestamp":1776420497000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3772318.3791893"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,13]]},"references-count":84,"alternative-id":["10.1145\/3772318.3791893","10.1145\/3772318"],"URL":"https:\/\/doi.org\/10.1145\/3772318.3791893","relation":{},"subject":[],"published":{"date-parts":[[2026,4,13]]},"assertion":[{"value":"2026-04-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}