{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T17:18:47Z","timestamp":1763227127041,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031055621"},{"type":"electronic","value":"9783031055638"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-05563-8_24","type":"book-chapter","created":{"date-parts":[[2022,5,13]],"date-time":"2022-05-13T20:08:55Z","timestamp":1652472535000},"page":"383-405","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A User Study to Evaluate a Web-Based Prototype for Smart Home Internet of Things Device Management"],"prefix":"10.1007","author":[{"given":"Leena","family":"Alghamdi","sequence":"first","affiliation":[]},{"given":"Ashwaq","family":"Alsoubai","sequence":"additional","affiliation":[]},{"given":"Mamtaj","family":"Akter","sequence":"additional","affiliation":[]},{"given":"Faisal","family":"Alghamdi","sequence":"additional","affiliation":[]},{"given":"Pamela","family":"Wisniewski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,16]]},"reference":[{"key":"24_CR1","unstructured":"Living in a glass house. In: Proceedings of the 13th International Conference on Ubiquitous Computing. https:\/\/dl.acm.org\/doi\/10.1145\/2030112.2030118"},{"key":"24_CR2","unstructured":"Smart homes, comfort and data capture, January 2016. https:\/\/www.pewresearch.org\/internet\/2016\/01\/14\/scenario-home-activities-comfort-and-data-capture\/"},{"key":"24_CR3","doi-asserted-by":"publisher","unstructured":"Arabo, A., Brown, I., El-Moussa, F.: Privacy in the age of mobility and smart devices in smart homes. In: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing, pp. 819\u2013826, September 2012. https:\/\/doi.org\/10.1109\/SocialCom-PASSAT.2012.108","DOI":"10.1109\/SocialCom-PASSAT.2012.108"},{"issue":"5","key":"24_CR4","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MSEC.2019.2914190","volume":"17","author":"M Balliu","year":"2019","unstructured":"Balliu, M., Bastys, I., Sabelfeld, A.: Securing IoT apps. IEEE Secur. Priv. 17(5), 22\u201329 (2019). https:\/\/doi.org\/10.1109\/MSEC.2019.2914190","journal-title":"IEEE Secur. Priv."},{"key":"24_CR5","doi-asserted-by":"publisher","unstructured":"Boeckl, K., et al.: Considerations for managing internet of things (IoT) cybersecurity and privacy risks. Technical report NIST IR 8228, National Institute of Standards and Technology, Gaithersburg, MD, June 2019. https:\/\/doi.org\/10.6028\/NIST.IR.8228, https:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2019\/NIST.IR.8228.pdf","DOI":"10.6028\/NIST.IR.8228"},{"key":"24_CR6","doi-asserted-by":"publisher","unstructured":"Clawson, J., Pater, J., Miller, A., Mynatt, E., Mamykina, L.: No longer wearing: investigating the abandonment of personal health-tracking technologies on craigslist, pp. 647\u2013658 (2015). https:\/\/doi.org\/10.1145\/2750858.2807554","DOI":"10.1145\/2750858.2807554"},{"issue":"4","key":"24_CR7","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1037\/h0040957","volume":"52","author":"LJ Cronbach","year":"1955","unstructured":"Cronbach, L.J., Meehl, P.E.: Construct validity in psychological tests. Psychol. Bull. 52(4), 281 (1955)","journal-title":"Psychol. Bull."},{"key":"24_CR8","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.jss.2016.06.059","volume":"119","author":"CK Dehury","year":"2016","unstructured":"Dehury, C.K., Sahoo, P.K.: Design and implementation of a novel service management framework for IoT devices in cloud. J. Syst. Softw. 119, 149\u2013161 (2016)","journal-title":"J. Syst. Softw."},{"key":"24_CR9","doi-asserted-by":"publisher","unstructured":"Delicato, F., Pires, P., Avila Barros, T., Batista, T., Costa, B.: A platform for integrating physical devices in the internet of things (2014). https:\/\/doi.org\/10.1109\/EUC.2014.42","DOI":"10.1109\/EUC.2014.42"},{"key":"24_CR10","doi-asserted-by":"publisher","unstructured":"Epstein, D.A., Caraway, M., Johnston, C., Ping, A., Fogarty, J., Munson, S.A.: Beyond abandonment to next steps: understanding and designing for life after personal informatics tool use. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI 2016, pp. 1109\u20131113. Association for Computing Machinery (2016). https:\/\/doi.org\/10.1145\/2858036.2858045","DOI":"10.1145\/2858036.2858045"},{"key":"24_CR11","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-030-93956-4_6","volume-title":"Emerging Information Security and Applications","author":"SD Gupta","year":"2022","unstructured":"Gupta, S.D., Kaplan, S., Nygaard, A., Ghanavati, S.: A two-fold study to investigate users\u2019 perception of IoT information sensitivity levels and their willingness to share the information. In: Meng, W., Katsikas, S.K. (eds.) EISA 2021. Communications in Computer and Information Science, pp. 87\u2013107. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-93956-4_6"},{"key":"24_CR12","first-page":"34","volume":"2006","author":"A Hilton","year":"2006","unstructured":"Hilton, A., Armstrong, R.A.: Statnote 6: post-hoc ANOVA tests. Microbiologist 2006, 34\u201336 (2006)","journal-title":"Microbiologist"},{"key":"24_CR13","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1016\/j.future.2017.03.001","volume":"76","author":"PP Jayaraman","year":"2017","unstructured":"Jayaraman, P.P., Yang, X., Yavari, A., Georgakopoulos, D., Yi, X.: Privacy preserving internet of things: from privacy techniques to a blueprint architecture and efficient implementation. Futur. Gener. Comput. Syst. 76, 540\u2013549 (2017)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"24_CR14","doi-asserted-by":"publisher","unstructured":"Kr\u00f6ger, J.L., Gellrich, L., Pape, S., Brause, S.R., Ullrich, S.:Personal information inference from voice recordings: user awareness and privacy concerns. Proc. Priv. Enhanc. Technol. 2022(1), 6\u201327 (2021). https:\/\/doi.org\/10.2478\/popets-2022-0002, https:\/\/www.sciendo.com\/article\/10.2478\/popets-2022-0002","DOI":"10.2478\/popets-2022-0002"},{"key":"24_CR15","doi-asserted-by":"publisher","unstructured":"Kunal, D., Tushar, D., Pooja, U., Vaibhav, Z., Lodha, V.: Smart home automation using IoT. Int. J. Adv. Res. Comput. Commun. Eng. 5(2), 3. https:\/\/doi.org\/10.17148\/IJARCCE.2016.52131","DOI":"10.17148\/IJARCCE.2016.52131"},{"key":"24_CR16","doi-asserted-by":"publisher","unstructured":"Lau, J., Zimmerman, B., Schaub, F.: Alexa, are you listening? Privacy perceptions, concerns and privacy-seeking behaviors with smart speakers. Proc. ACM Hum.-Comput. Interact. 2(CSCW), 102:1\u2013102:31 (2018). https:\/\/doi.org\/10.1145\/3274371","DOI":"10.1145\/3274371"},{"key":"24_CR17","unstructured":"Martin, C.: Smart home technology hits 69% penetration in U.S. https:\/\/www.mediapost.com\/publications\/article\/341320\/smart-home-technology-hits-69-penetration-in-us.html"},{"key":"24_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-319-39399-5_7","volume-title":"HCI in Business, Government, and Organizations: Information Systems","author":"F McCreary","year":"2016","unstructured":"McCreary, F., Zafiroglu, A., Patterson, H.: The contextual complexity of privacy in smart homes and smart buildings. In: Nah, F.F.-H.F.-H., Tan, C.-H. (eds.) HCIBGO 2016. LNCS, vol. 9752, pp. 67\u201378. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39399-5_7"},{"key":"24_CR19","unstructured":"Molla, R.: People say they care about privacy but they continue to buy devices that can spy on them, May 2019. https:\/\/www.vox.com\/recode\/2019\/5\/13\/18547235\/trust-smart-devices-privacy-security"},{"key":"24_CR20","unstructured":"Naeini, P.E., et al.: Privacy expectations and preferences in an IoT world, pp. 399\u2013412 (2017). https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/naeini"},{"key":"24_CR21","doi-asserted-by":"publisher","unstructured":"Page, X., Bahirat, P., Safi, M.I., Knijnenburg, B.P., Wisniewski, P.: The internet of what? Understanding differences in perceptions and adoption for the internet of things 2(4), 183:1\u2013183:22 (2018). https:\/\/doi.org\/10.1145\/3287061","DOI":"10.1145\/3287061"},{"key":"24_CR22","doi-asserted-by":"publisher","unstructured":"Piyare, R., Tazil, M.: Bluetooth based home automation system using cell phone. In: 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE), pp. 192\u2013195, June 2011. https:\/\/doi.org\/10.1109\/ISCE.2011.5973811. iSSN 2159-1423","DOI":"10.1109\/ISCE.2011.5973811"},{"key":"24_CR23","doi-asserted-by":"publisher","unstructured":"Saeidi, M., Calvert, M., Au, A.W., Sarma, A., Bobba, R.B.: If this then that: exploring users\u2019 concerns with IFTTT applets. Proc. Priv. Enhanc. Technol. 2022(1), 166\u2013186 (2021). https:\/\/doi.org\/10.2478\/popets-2022-0009, https:\/\/www.sciendo.com\/article\/10.2478\/popets-2022-0009","DOI":"10.2478\/popets-2022-0009"},{"key":"24_CR24","unstructured":"Shrestha, B., Mali, S., Joseph, A., Singh, K.J.: Web and android based automation using IoT, p. 4 (2017)"},{"key":"24_CR25","doi-asserted-by":"publisher","unstructured":"Silva, J.D.C., Rodrigues, J.J.P.C., Saleem, K., Kozlov, S.A., Rabelo, R.A.L.: M4DN.IoT-a networks and devices management platform for internet of things. IEEE Access 7, 53305\u201353313 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2909436, https:\/\/ieeexplore.ieee.org\/document\/8681396\/","DOI":"10.1109\/ACCESS.2019.2909436"},{"issue":"4","key":"24_CR26","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/0169-7439(89)80095-4","volume":"6","author":"L St","year":"1989","unstructured":"St, L., Wold, S., et al.: Analysis of variance (ANOVA). Chemom. Intell. Lab. Syst. 6(4), 259\u2013272 (1989)","journal-title":"Chemom. Intell. Lab. Syst."},{"key":"24_CR27","doi-asserted-by":"publisher","unstructured":"Tabassum, M., Kropczynski, J., Wisniewski, P., Lipford, H.R.: Smart home beyond the home: a case for community-based access control. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1\u201312. Association for Computing Machinery, New York, April 2020. https:\/\/doi.org\/10.1145\/3313831.3376255","DOI":"10.1145\/3313831.3376255"},{"issue":"6","key":"24_CR28","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1016\/j.bushor.2015.06.005","volume":"58","author":"BD Weinberg","year":"2015","unstructured":"Weinberg, B.D., Milne, G.R., Andonova, Y.G., Hajjat, F.M.: Internet of things: Convenience vs. privacy and secrecy. Bus. Horiz. 58(6), 615\u2013624 (2015)","journal-title":"Bus. Horiz."},{"key":"24_CR29","doi-asserted-by":"crossref","unstructured":"Wisniewski, P., Safi, M.I., Patil, S., Page, X.: Predicting smartphone location-sharing decisions through self-reflection on past privacy behavior. J. Cybersecur. 6(1), tyaa014 (2020)","DOI":"10.1093\/cybsec\/tyaa014"},{"key":"24_CR30","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","volume":"42","author":"P Zhang","year":"2014","unstructured":"Zhang, P., Vasilakos, A.: A survey on trust management for internet of things. J. Netw. Comput. Appl. 42, 120\u2013134 (2014). https:\/\/doi.org\/10.1016\/j.jnca.2014.01.014","journal-title":"J. Netw. Comput. Appl."},{"key":"24_CR31","doi-asserted-by":"publisher","unstructured":"Zheng, S., Apthorpe, N., Chetty, M., Feamster, N.: User perceptions of smart home IoT privacy. Proc. ACM Hum.-Comput. Interact. 2(CSCW), 200:1\u2013200:20 (2018). https:\/\/doi.org\/10.1145\/3274469","DOI":"10.1145\/3274469"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-05563-8_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T18:01:24Z","timestamp":1709834484000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-05563-8_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031055621","9783031055638"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-05563-8_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"16 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2022.hci.international\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}