{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:40:40Z","timestamp":1767339640525,"version":"3.41.0"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T00:00:00Z","timestamp":1692576000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T00:00:00Z","timestamp":1692576000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,21]]},"DOI":"10.1109\/pst58708.2023.10320180","type":"proceedings-article","created":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T19:06:27Z","timestamp":1700679987000},"page":"1-12","source":"Crossref","is-referenced-by-count":3,"title":["Tapping into Privacy: A Study of User Preferences and Concerns on Trigger-Action Platforms"],"prefix":"10.1109","author":[{"given":"Piero","family":"Romare","sequence":"first","affiliation":[{"name":"Chalmers University of Technology,Department of Computer Science and Engineering,Gothenburg,Sweden"}]},{"given":"Victor","family":"Morel","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology,Department of Computer Science and Engineering,Gothenburg,Sweden"}]},{"given":"Farzaneh","family":"Karegar","sequence":"additional","affiliation":[{"name":"Karlstad University,Department of Mathematics and Computer Science,Karlstad,Sweden"}]},{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology,Department of Computer Science and Engineering,Gothenburg,Sweden"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3099584"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3057859"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179425"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557420"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445770"},{"key":"ref6","first-page":"100213","article-title":"An IoT-enabled intelligent automobile system for smart cities","volume-title":"Internet of Things","volume":"18","author":"Menon","year":"2022"},{"issue":"8","key":"ref7","first-page":"74","article-title":"Smart health: A context-aware health paradigm within smart cities","volume-title":"IEEE Communications Magazine","volume":"52","author":"Solanas","year":"2014"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131369"},{"key":"ref9","first-page":"120","article-title":"End-user development for personalizing applications, things, and robots","volume-title":"International Journal of Human-Computer Studies","volume":"131","author":"Patern\u00f2","year":"2019"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1007\/978-3-642-34638-5_6","article-title":"A Conundrum of Permissions: Installing Applications on an Android Smartphone","volume-title":"Financial Cryptography and Data Security","volume":"7398","author":"Kelley","year":"2012"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445148"},{"key":"ref12","first-page":"46","article-title":"Evolving privacy: From sensors to the Internet of Things","volume-title":"Future Generation Computer Systems","volume":"75","author":"Lopez","year":"2017"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1007\/978-3-319-18425-8_2","article-title":"Designing for End-User Development in the Internet of Things","volume-title":"End-User Development","volume":"9083","author":"Barricelli","year":"2015"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/978-3-319-39862-4_7","article-title":"End-User Development Tools for the Smart Home: A Systematic Literature Review","volume-title":"Distributed, Ambient and Pervasive Interactions","volume":"9749","author":"Fogli","year":"2016"},{"volume-title":"Privacy is the Boring Bit\u201d: User Perceptions and Behaviour in the Internet-of-Things","year":"2018","author":"Williams","key":"ref15"},{"issue":"5","key":"ref16","first-page":"618","article-title":"Internet of things: Privacy issues revisited","volume-title":"Computer Law & Security Review","volume":"31","author":"Weber","year":"2015"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052709"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464838"},{"issue":"1","key":"ref19","first-page":"166","article-title":"If This Context Then That Concern : Exploring users\u2019 concerns with IFTTT applets","volume-title":"Proceedings on Privacy Enhancing Technologies","volume":"2022","author":"Saeidi"},{"issue":"6","key":"ref20","first-page":"528","article-title":"Exploring the dimensions of individual privacy concerns in relation to the Internet of Things use situations","volume-title":"Digital Policy, Regulation and Governance","volume":"20","author":"Padyab","year":"2018"},{"journal-title":"Privacy Expectations and Preferences in an IoT World","author":"Emami-Naeini","key":"ref21"},{"key":"ref22","first-page":"273","article-title":"Willingness to provide personal information: Perspective of privacy calculus in iot services","volume-title":"Computers in Human Behavior","volume":"92","author":"Kim","year":"2019"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420108"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581558"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420164"},{"issue":"4","key":"ref27","first-page":"54","article-title":"I would have to evaluate their objections\u201d: Privacy tensions between smart home device owners and incidental users","volume-title":"Proceedings on Privacy Enhancing Technologies","volume":"2021","author":"Cobb"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"},{"article-title":"Designing and conducting focus group interviews","year":"2002","author":"Krueger","key":"ref29"},{"key":"ref30","first-page":"108","article-title":"The Users\u2019 Perspective on the Privacy-Utility Trade-offs in Health Recommender Systems","volume-title":"International Journal of Human-Computer Studies","volume":"121","author":"Valdez","year":"2019"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"ref32","first-page":"392","article-title":"Towards Security and Privacy for Multi-user Augmented Reality: Foundations with End Users","volume-title":"2018 IEEE Symposium on Security and Privacy (SP).","author":"Lebeck"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.25"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.4251118"},{"key":"ref35","first-page":"19","article-title":"\"wth..!?!\u201d experiences, reactions, and expectations related to online privacy panic situations","volume-title":"Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security","author":"Angulo"},{"key":"ref36","first-page":"191","article-title":"Analysis of critical success factors to mitigate privacy risks in iot devices","volume-title":"Procedia Computer Science","volume":"196","author":"Sitesh Mohanty","year":"2022"},{"volume-title":"Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions","year":"2016","author":"Liu","key":"ref37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3172944.3172982"},{"issue":"1","key":"ref39","first-page":"195","article-title":"The Best of Both Worlds: Mitigating Trade-offs Between Accuracy and User Burden in Capturing Mobile App Privacy Preferences","volume-title":"Proceedings on Privacy Enhancing Technologies","volume":"2020","author":"Smullen"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1108\/09685221211219155"}],"event":{"name":"2023 20th Annual International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2023,8,21]]},"location":"Copenhagen, Denmark","end":{"date-parts":[[2023,8,23]]}},"container-title":["2023 20th Annual International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10320127\/10319983\/10320180.pdf?arnumber=10320180","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:03:18Z","timestamp":1747803798000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10320180\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,21]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/pst58708.2023.10320180","relation":{},"subject":[],"published":{"date-parts":[[2023,8,21]]}}}