{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T01:24:14Z","timestamp":1773883454247,"version":"3.50.1"},"reference-count":140,"publisher":"Informa UK Limited","issue":"18","funder":[{"name":"SD\/COMP Joint Research Scheme","award":["P0042739"],"award-info":[{"award-number":["P0042739"]}]},{"name":"Projects of Strategic Importance of The HK Polytechnic University","award":["P0036851"],"award-info":[{"award-number":["P0036851"]}]},{"name":"PolyU Research Institute of AIoT","award":["P0043542\/P0038260"],"award-info":[{"award-number":["P0043542\/P0038260"]}]},{"name":"PolyU Research Centre for Future (Caring) Mobility","award":["P0042701"],"award-info":[{"award-number":["P0042701"]}]},{"name":"School of Design Collaborative Research Funding","award":["P0035075"],"award-info":[{"award-number":["P0035075"]}]},{"name":"Hong Kong RGC Project","award":["PolyU15219319"],"award-info":[{"award-number":["PolyU15219319"]}]},{"name":"Laboratory for Artificial Intelligence in Design","award":["RP2-4"],"award-info":[{"award-number":["RP2-4"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2024,9,16]]},"DOI":"10.1080\/10447318.2023.2228997","type":"journal-article","created":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T06:44:03Z","timestamp":1689749043000},"page":"5003-5025","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":5,"title":["Data Transparency Design in Internet of Things: A Systematic Review"],"prefix":"10.1080","volume":"40","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1808-9579","authenticated-orcid":false,"given":"Yonghao","family":"Long","sequence":"first","affiliation":[{"name":"School of Design, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1886-6705","authenticated-orcid":false,"given":"Yujie","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Design, The Hong Kong Polytechnic University, Hong Kong, China"},{"name":"Laboratory for Artificial Intelligence in Design, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8873-2983","authenticated-orcid":false,"given":"Kun Pyo","family":"Lee","sequence":"additional","affiliation":[{"name":"School of Design, The Hong Kong Polytechnic University, Hong Kong, China"},{"name":"Laboratory for Artificial Intelligence in Design, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9835-9932","authenticated-orcid":false,"given":"Stephen Jia","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Design, The Hong Kong Polytechnic University, Hong Kong, China"},{"name":"Laboratory for Artificial Intelligence in Design, Hong Kong, China"}]}],"member":"301","published-online":{"date-parts":[[2023,7,18]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240683"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415187"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57404-8\\25"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100492"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502097"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/COINS51742.2021.9524236"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2020.07.002"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3434186"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2020.101477"},{"key":"e_1_3_2_11_1","first-page":"585","volume-title":"28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14\u201316, 2019","author":"Andow B.","year":"2019","unstructured":"Andow, B., Mahmud, S. Y., Wang, W., Whitaker, J., Enck, W., Reaves, B., Singh, K., & Xie, T. (2019). Policylint: Investigating internal privacy policy contradictions on google play. In N. Heninger & P. Traynor (Eds.), 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14\u201316, 2019 (pp. 585\u2013602). USENIX Association."},{"issue":"7","key":"e_1_3_2_12_1","first-page":"97","article-title":"That \u2018internet of things\u2019 thing","volume":"22","author":"Ashton K.","year":"2009","unstructured":"Ashton, K. (2009). That \u2018internet of things\u2019 thing. RFID Journal, 22(7), 97\u2013114.","journal-title":"RFID Journal,"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"e_1_3_2_14_1","volume-title":"Principles of model checking","author":"Baier C.","year":"2008","unstructured":"Baier, C., & Katoen, J. (2008). Principles of model checking. MIT Press."},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3055154"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2021.3110617"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3502288"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1177\/0001839212453028"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.5465\/annals.2014.0076"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.2890190"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2019.0150"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00023"},{"key":"e_1_3_2_23_1","unstructured":"Centers for Disease Control and Prevention. (1996). Health insurance portability and accountability act of 1996 (HIPAA). https:\/\/www.cdc.gov\/phlp\/publications\/topic\/hipaa.html."},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.011"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3418499"},{"key":"e_1_3_2_26_1","first-page":"185","volume-title":"Sixteenth Symposium on usable privacy and security, SOUPS 2020, August 7\u201311, 2020","author":"Chalhoub G.","year":"2020","unstructured":"Chalhoub, G., Flechais, I., Nthala, N., & Abu-Salma, R. (2020). Innovation inaction or in action? the role of user experience in the security and privacy design of smart home cameras. In H. R. Lipford & S. Chiasson (Eds.), Sixteenth Symposium on usable privacy and security, SOUPS 2020, August 7\u201311, 2020 (pp. 185\u2013204). USENIX Association."},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/357360.357365"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00070"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00056"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.4251118"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367733"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.181"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373477.3373485"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376342"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241815.3241869"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_3_2_37_1","unstructured":"European Commission. (2018). General data protection regulation. https:\/\/gdpr-info.eu\/"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12180"},{"key":"e_1_3_2_39_1","first-page":"483","volume-title":"30th USENIX Security Symposium, USENIX Security 2021, August 11\u201313, 2021","author":"Farke F. M.","year":"2021","unstructured":"Farke, F. M., Balash, D. G., Golla, M., D\u00fcrmuth, M., & Aviv, A. J. (2021). Are privacy dashboards good for end users? Evaluating user perceptions and reactions to Google\u2019s my activity. In M. Bailey & R. Greenstadt (Eds.), 30th USENIX Security Symposium, USENIX Security 2021, August 11\u201313, 2021 (pp. 483\u2013500). USENIX Association."},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-020-00276-4"},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3326320"},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3462244.3479885"},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475552"},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41110-7_7"},{"key":"e_1_3_2_45_1","unstructured":"Gibson J. J. (1977). A theory of affordances. In R. Shaw & J. Bransford (Eds.) Perceiving acting and knowing: Toward an ecological psychology (pp. 67\u201382). Lawrence Erlbaum Associates Inc."},{"key":"e_1_3_2_46_1","doi-asserted-by":"crossref","unstructured":"Gupta S. D. Kaplan S. Nygaard A. Ghanavati S. (2021). A two-fold study to investigate users\u2019 perception of IoT information sensitivity levels and their willingness to share the information. In International Symposium on Emerging Information Security and Applications (pp. 87\u2013107). Springer.","DOI":"10.1007\/978-3-030-93956-4_6"},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11172777"},{"key":"e_1_3_2_48_1","first-page":"531","volume-title":"27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15\u201317, 2018","author":"Harkous H.","year":"2018","unstructured":"Harkous, H., Fawaz, K., Lebret, R., Schaub, F., Shin, K. G., & Aberer, K. (2018). Polisis: Automated analysis and presentation of privacy policies using deep learning. In W. Enck & A. P. Felt (Eds.), 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15\u201317, 2018 (pp. 531\u2013548). USENIX Association."},{"key":"e_1_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-79318-0\\5"},{"key":"e_1_3_2_50_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00261ED1V01Y201003HCI008"},{"key":"e_1_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03315-5\\5"},{"key":"e_1_3_2_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55415-5\\38"},{"key":"e_1_3_2_53_1","doi-asserted-by":"crossref","unstructured":"Hosseini M. Shahri A. Phalp K. & Ali R. (2016). Foundations for transparency requirements engineering [Paper presentation]. In International Working Conference on Requirements Engineering: foundation for Software Quality (pp. 225\u2013231). Springer.","DOI":"10.1007\/978-3-319-30282-9_15"},{"key":"e_1_3_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397333"},{"key":"e_1_3_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483277"},{"key":"e_1_3_2_56_1","unstructured":"IFTTT. (2022). Retrieved from https:\/\/ifttt.com."},{"key":"e_1_3_2_57_1","unstructured":"International Organization for Standardization. (2017). ISO\/IEC 19944:2017 information technology\u2014cloud computing\u2014cloud services and devices: Data flow data categories and data use. https:\/\/www.iso.org\/standard\/66674.html."},{"key":"e_1_3_2_58_1","unstructured":"ISO\/IEC 29100. (2011). Information technology\u2014security techniques\u2014privacy framework. International Organization for Standardization Std 29(100) 2011."},{"key":"e_1_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/STAST.2013.11"},{"key":"e_1_3_2_60_1","doi-asserted-by":"publisher","DOI":"10.1108\/TG-02-2017-0015"},{"key":"e_1_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21041284"},{"key":"e_1_3_2_62_1","doi-asserted-by":"crossref","unstructured":"Kani-Zabihi E. & Helmhout M. (2011). Increasing service users\u2019 privacy awareness by introducing on-line interactive privacy features [Paper presentation]. In Nordic Conference on Secure IT Systems (pp. 131\u2013148). Springer.","DOI":"10.1007\/978-3-642-29615-4_10"},{"key":"e_1_3_2_63_1","unstructured":"Keele S. (2007). Guidelines for performing systematic literature reviews in software engineering (Technical Report.). Citeseer."},{"key":"e_1_3_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_3_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173967"},{"key":"e_1_3_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025556"},{"key":"e_1_3_2_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2021.102442"},{"key":"e_1_3_2_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100179"},{"key":"e_1_3_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451633"},{"key":"e_1_3_2_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45427-6\\23"},{"key":"e_1_3_2_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2018.2872313"},{"key":"e_1_3_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"e_1_3_2_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2018.8480260"},{"key":"e_1_3_2_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2013.02.002"},{"key":"e_1_3_2_75_1","doi-asserted-by":"publisher","DOI":"10.1177\/0170840620970728"},{"key":"e_1_3_2_76_1","doi-asserted-by":"publisher","DOI":"10.3390\/app9091887"},{"key":"e_1_3_2_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"e_1_3_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3446389"},{"key":"e_1_3_2_79_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_3_2_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428361.3428464"},{"key":"e_1_3_2_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420164"},{"key":"e_1_3_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2406367.2406435"},{"key":"e_1_3_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2669062.2669077"},{"key":"e_1_3_2_84_1","doi-asserted-by":"publisher","DOI":"10.3390\/informatics6010008"},{"key":"e_1_3_2_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3294109.3302934"},{"key":"e_1_3_2_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892475"},{"key":"e_1_3_2_87_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101856"},{"key":"e_1_3_2_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449119"},{"key":"e_1_3_2_89_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100107"},{"key":"e_1_3_2_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2765539"},{"key":"e_1_3_2_91_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2021.1913859"},{"key":"e_1_3_2_92_1","unstructured":"Naeini P. E. Bhagavatula S. Habib H. Degeling M. Bauer L. Cranor L. F. & Sadeh N. M. (2017). Privacy expectations and preferences in an IoT world. In Thirteenth Symposium on usable privacy and security SOUPS 2017 Santa Clara CA USA July 12\u201314 2017 (pp. 399\u2013412). USENIX Association."},{"key":"e_1_3_2_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00112"},{"key":"e_1_3_2_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2021.3132398"},{"key":"e_1_3_2_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_3_2_96_1","unstructured":"National People\u2019s Congress. (2021). Personal information protection law. http:\/\/www.npc.gov.cn\/npc\/c30834\/202108\/a8c4e3672c74491a80b53a172bb753fe.shtml."},{"key":"e_1_3_2_97_1","volume-title":"The design of everyday things: Revised and expanded edition","author":"Norman D.","year":"2013","unstructured":"Norman, D. (2013). The design of everyday things: Revised and expanded edition. Basic books."},{"key":"e_1_3_2_98_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64330-0\\15"},{"key":"e_1_3_2_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/781498.781528"},{"key":"e_1_3_2_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323409"},{"key":"e_1_3_2_101_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.08.329"},{"key":"e_1_3_2_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560644"},{"key":"e_1_3_2_103_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22479-0\\10"},{"key":"e_1_3_2_104_1","volume-title":"Privacy patterns for internet of things: A handbook","author":"Perera C.","year":"2020","unstructured":"Perera, C., Alkhariji, L., Jeraisy, A., & Rana, O. (2020). Privacy patterns for internet of things: A handbook. Leanpub Publishers."},{"key":"e_1_3_2_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445067"},{"key":"e_1_3_2_106_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.destud.2013.10.001"},{"key":"e_1_3_2_107_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-70852-8\\14"},{"key":"e_1_3_2_108_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2022.131439"},{"key":"e_1_3_2_109_1","doi-asserted-by":"publisher","DOI":"10.1002\/cjas.1494"},{"key":"e_1_3_2_110_1","doi-asserted-by":"publisher","DOI":"10.1109\/COLCOM50121.2020.9219766"},{"key":"e_1_3_2_111_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100465"},{"key":"e_1_3_2_112_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2020.105402"},{"key":"e_1_3_2_113_1","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/9324035"},{"key":"e_1_3_2_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/3412841.3441949"},{"key":"e_1_3_2_115_1","first-page":"1095","volume-title":"31st USENIX security symposium, USENIX Security 2022, Boston, MA, USA, August 10\u201312, 2022","author":"Sharma R. A.","year":"2022","unstructured":"Sharma, R. A., Soltanaghaei, E., Rowe, A., & Sekar, V. (2022). Lumos: Identifying and localizing diverse hidden IoT devices in an unfamiliar environment. In K. R. B. Butler & K. Thomas (Eds.), 31st USENIX security symposium, USENIX Security 2022, Boston, MA, USA, August 10\u201312, 2022 (pp. 1095\u20131112). USENIX Association."},{"key":"e_1_3_2_116_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.3011052"},{"key":"e_1_3_2_117_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376585"},{"key":"e_1_3_2_118_1","volume-title":"Operating systems - internals and design principles","author":"Stallings W.","year":"2011","unstructured":"Stallings, W. (2011). Operating systems - internals and design principles (7th ed.). Pitman.","edition":"7"},{"key":"e_1_3_2_119_1","unstructured":"Sumsung. (2022). Smartthings. https:\/\/www.smartthings.com\/."},{"key":"e_1_3_2_120_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-022-01065-5"},{"key":"e_1_3_2_121_1","doi-asserted-by":"publisher","DOI":"10.1080\/23808985.2013.11679130"},{"key":"e_1_3_2_122_1","doi-asserted-by":"publisher","DOI":"10.1093\/ct\/qtz035"},{"key":"e_1_3_2_123_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849186"},{"key":"e_1_3_2_124_1","unstructured":"United Nations Conference on Trade and Development. (2021). Data protection and privacy legislation worldwide. https:\/\/unctad.org\/page\/data-protection-and-privacy-legislation-worldwide"},{"key":"e_1_3_2_125_1","doi-asserted-by":"publisher","DOI":"10.1080\/0960085X.2020.1761272"},{"key":"e_1_3_2_126_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"e_1_3_2_127_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2018.02.002"},{"key":"e_1_3_2_128_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42504-3\\27"},{"key":"e_1_3_2_129_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00029"},{"key":"e_1_3_2_130_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517688"},{"key":"e_1_3_2_131_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.109"},{"key":"e_1_3_2_132_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5552501"},{"key":"e_1_3_2_133_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300428"},{"key":"e_1_3_2_134_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"},{"key":"e_1_3_2_135_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103118"},{"key":"e_1_3_2_136_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3049141"},{"key":"e_1_3_2_137_1","doi-asserted-by":"publisher","DOI":"10.1002\/hsr2.863"},{"key":"e_1_3_2_138_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23522-2\\29"},{"key":"e_1_3_2_139_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382940"},{"key":"e_1_3_2_140_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"key":"e_1_3_2_141_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.795"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2023.2228997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T06:00:41Z","timestamp":1726725641000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2023.2228997"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,18]]},"references-count":140,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2024,9,16]]}},"alternative-id":["10.1080\/10447318.2023.2228997"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2023.2228997","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"value":"1044-7318","type":"print"},{"value":"1532-7590","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,18]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-12-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-04-12","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-05-31","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-07-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}