{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T12:26:31Z","timestamp":1770639991822,"version":"3.49.0"},"reference-count":67,"publisher":"Informa UK Limited","issue":"9","license":[{"start":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T00:00:00Z","timestamp":1720656000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002347","name":"German Federal Ministry of Education and Research and the Hessian Ministry of Higher Education, Research, Science and the Arts","doi-asserted-by":"publisher","award":["236615297"],"award-info":[{"award-number":["236615297"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005714","name":"Technische Universit\u00e4t Darmstadt","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005714","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2025,5,28]]},"DOI":"10.1080\/0144929x.2024.2374889","type":"journal-article","created":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T13:53:10Z","timestamp":1720705990000},"page":"1766-1786","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":1,"title":["Building trust in remote attestation through transparency \u2013 a qualitative user study on observable attestation"],"prefix":"10.1080","volume":"44","author":[{"given":"Sebastian","family":"Linsner","sequence":"first","affiliation":[{"name":"PEASEC, Technical University of Darmstadt","place":["Darmstadt, Germany"]}]},{"given":"Kilian","family":"Demuth","sequence":"additional","affiliation":[{"name":"PEASEC, Technical University of Darmstadt","place":["Darmstadt, Germany"]}]},{"given":"Sebastian","family":"Surminski","sequence":"additional","affiliation":[{"name":"University of Duisburg-Essen","place":["Essen, Germany"]}]},{"given":"Lucas","family":"Davi","sequence":"additional","affiliation":[{"name":"University of Duisburg-Essen","place":["Essen, Germany"]}]},{"given":"Christian","family":"Reuter","sequence":"additional","affiliation":[{"name":"PEASEC, Technical University of Darmstadt","place":["Darmstadt, Germany"]}]}],"member":"301","published-online":{"date-parts":[[2024,7,11]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3549015.3554205"},{"key":"e_1_3_3_3_1","unstructured":"Abdi Noura Kopo M. Ramokapane and Jose M. Such. 2019. \u201cMore than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants.\u201d In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019) 451\u2013466. Santa Clara CA: USENIX Association. https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/abdi."},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2905020"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23420"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-6048-4_29"},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.3390\/technologies6030064"},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/Access.6287639"},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00013"},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0064"},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIoT.6488907"},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.9739"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS48487.2020.00036"},{"key":"e_1_3_3_15_1","unstructured":"Architecure ARM. 2009. ARM Security Technology: Building a Secure System using TrustZone Technology. white paper. ARM Limited."},{"key":"e_1_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2560919"},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0009"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1093\/acrefore\/9780190228637.013.1360"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744922"},{"key":"e_1_3_3_20_1","unstructured":"Business Wire. 2021. Strategy Analytics: Global Smart Speaker Sales Cross 150 Million Units for 2020 Following Robust Q4 Demand. 2023 Business Wire Inc. https:\/\/www.businesswire.com\/news\/home\/20210303005852\/en\/Strategy-Analytics-Global-Smart-Speaker-Sales-Cross-150-Million-Units-for-2020-Following-Robust-Q4-Demand."},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2018.8383885"},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SDS.2019.8768670"},{"key":"e_1_3_3_23_1","unstructured":"Costan Victor and Srinivas Devadas. 2016. Intel SGX explained. Cryptology ePrint Archive Paper 2016 086 (2016) 118. https:\/\/eprint.iacr.org\/2016\/086."},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.10206"},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3412383"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00112"},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.08.004"},{"key":"e_1_3_3_28_1","unstructured":"Gerber Nina Benjamin Reinheimer and Melanie Volkamer. 2018. \u201cHome Sweet Home? Investigating Users' Awareness of Smart Home Privacy Threats.\u201d In Proceedings of an Interactive Workshop on the Human aspects of Smarthome Security and Privacy (WSSP). Baltimore MD USA: USENIX Association."},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.025"},{"key":"e_1_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.62"},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270348"},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592824"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.3390\/en14237913"},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIoT.6488907"},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101945"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451633"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0035"},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.3390\/informatics6010008"},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101856"},{"key":"e_1_3_3_42_1","unstructured":"Moss Simon. 2016. Acquiescence Bias. Sicotests. Accessed 23 May 2023. https:\/\/www.sicotests.com\/newpsyarticle\/Acquiescence-bias."},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.3390\/jcp2010005"},{"key":"e_1_3_3_44_1","unstructured":"Nunes Ivan De Oliveira Karim Eldefrawy Norrathep Rattanavipanon Michael Steiner and Gene Tsudik. 2019. \u201cVRASED: A Verified Hardware\/Software Co-Design for Remote Attestation.\u201d In Proceedings of the 28th USENIX Conference on Security Symposium (Santa Clara CA USA) (SEC'19) 1429\u20131446. USA: USENIX Association."},{"key":"e_1_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586180"},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11109-010-9112-2"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3414173"},{"key":"e_1_3_3_48_1","unstructured":"OWASP. 2018. Internet of Things (IoT) Top. Accessed 3 July 2022. https:\/\/owasp.org\/www-pdf-archive\/OWASP-IoT-Top-10-2018-final.pdf."},{"key":"e_1_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.10.005"},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.32"},{"key":"e_1_3_3_51_1","unstructured":"Pfeffer Katharina Alexandra Mai Adrian Dabrowski Matthias Gusenbauer Philipp Schindler Edgar Weippl Michael Franz and Katharina Krombholz. 2021. \u201cOn the Usability of Authenticity Checks for Hardware Security Tokens.\u201d In 30th USENIX Security Symposium (USENIX Security 21) 37\u201354. USENIX Association virtual event. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/pfeffer."},{"key":"e_1_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICESC48915.2020.9155999"},{"key":"e_1_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2019.119724"},{"key":"e_1_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"e_1_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0009"},{"key":"e_1_3_3_56_1","unstructured":"Sasse M. Angela and Ivan Flechais. 2005. \u201cUsable Security: Why Do We Need It? How Do We Get It?\u201d In Security and Usability: Designing Secure Systems That People Can Use edited by L. F. Cranor and S. Garfinkel 13\u201330. Sebastopol US: O'Reilly."},{"key":"e_1_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.9781\/ijimai.2017.09.001"},{"key":"e_1_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2018.8323686"},{"key":"e_1_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"e_1_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484788"},{"key":"e_1_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3577923.3583652"},{"key":"e_1_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2019.1646777"},{"key":"e_1_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00029"},{"key":"e_1_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3527153"},{"key":"e_1_3_3_65_1","unstructured":"Zeng Eric Shrirang Mare and Franziska Roesner. 2017. \u201cEnd User Security and Privacy Concerns with Smart Homes.\u201d In Proceedings of the Thirteenth USENIX Conference on Usable Privacy and Security (Santa Clara CA USA) (SOUPS '17 Vol. 220) 65\u201380. USA: USENIX Association."},{"key":"e_1_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2014.58"},{"key":"e_1_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"key":"e_1_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0209472"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2024.2374889","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T08:21:15Z","timestamp":1748334075000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2024.2374889"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,11]]},"references-count":67,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2025,5,28]]}},"alternative-id":["10.1080\/0144929X.2024.2374889"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2024.2374889","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,11]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-06-23","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-07-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}