{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T16:52:03Z","timestamp":1767372723045,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,5]],"date-time":"2018-03-05T00:00:00Z","timestamp":1520208000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1640664"],"award-info":[{"award-number":["1640664"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,5]]},"DOI":"10.1145\/3172944.3172982","type":"proceedings-article","created":{"date-parts":[[2018,3,9]],"date-time":"2018-03-09T13:28:34Z","timestamp":1520602114000},"page":"165-176","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["A Data-Driven Approach to Developing IoT Privacy-Setting Interfaces"],"prefix":"10.1145","author":[{"given":"Paritosh","family":"Bahirat","sequence":"first","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Yangyang","family":"He","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Abhilash","family":"Menon","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Bart","family":"Knijnenburg","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,3,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_3"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Ajzen I. and Fishbein M. Attitude-behavior relations: A theoretical analysis and review of empirical research. Psychological bulletin 84 5 (1977).  Ajzen I. and Fishbein M. Attitude-behavior relations: A theoretical analysis and review of empirical research. Psychological bulletin 84 5 (1977).","DOI":"10.1037\/0033-2909.84.5.888"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Baron R. M. and Kenny D. A. The moderator--mediator variable distinction in social psychological research: Conceptual strategic and statistical considerations. Journal of personality and social psychology 51 6 (1986) 1173.  Baron R. M. and Kenny D. A. The moderator--mediator variable distinction in social psychological research: Conceptual strategic and statistical considerations. Journal of personality and social psychology 51 6 (1986) 1173.","DOI":"10.1037\/0022-3514.51.6.1173"},{"volume-title":"Pew Internet & American Life Project","year":"2012","author":"Boyles J. L.","key":"e_1_3_2_1_4_1"},{"volume-title":"Springer International Publishing","year":"2015","author":"Chow R.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47874-6_28"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772727"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073006"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985752"},{"volume-title":"University of California","year":"2015","author":"Knijnenburg B. P.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.06.003"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/765891.765952"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Lee H. and Kobsa A. Understanding user privacy in internet of things environments. Internet of Things (WF-IoT) (2016).  Lee H. and Kobsa A. Understanding user privacy in internet of things environments. Internet of Things (WF-IoT) (2016).","DOI":"10.1109\/WF-IoT.2016.7845392"},{"key":"e_1_3_2_1_17_1","first-page":"93","article-title":"Cross-cultural privacy prediction","volume":"2","author":"Li Y.","year":"2017","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"volume-title":"Proceedings of the 2016 Symposium on Usable Privacy and Security","year":"2016","author":"Liu B.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197507"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1057073"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2013.12.004"},{"volume-title":"Proceedings of the 2016 Symposium on Usable Privacy and Security","year":"2016","author":"Raber F.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0214-3"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.10.114"},{"key":"e_1_3_2_1_27_1","unstructured":"Watson J. Besmer A. and Lipford H. R.  Watson J. Besmer A. and Lipford H. R."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335373"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.25"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2016.09.006"}],"event":{"name":"IUI'18: 23rd International Conference on Intelligent User Interfaces","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Tokyo Japan","acronym":"IUI'18"},"container-title":["23rd International Conference on Intelligent User Interfaces"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3172944.3172982","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3172944.3172982","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3172944.3172982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:02:49Z","timestamp":1750215769000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3172944.3172982"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,5]]},"references-count":30,"alternative-id":["10.1145\/3172944.3172982","10.1145\/3172944"],"URL":"https:\/\/doi.org\/10.1145\/3172944.3172982","relation":{},"subject":[],"published":{"date-parts":[[2018,3,5]]},"assertion":[{"value":"2018-03-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}