{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T18:52:03Z","timestamp":1767034323632,"version":"3.41.0"},"reference-count":149,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2019,1,30]],"date-time":"2019-01-30T00:00:00Z","timestamp":1548806400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Federal Ministry for Economic Affairs and Technology","award":["KF2111503LF2"],"award-info":[{"award-number":["KF2111503LF2"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput.-Hum. Interact."],"published-print":{"date-parts":[[2019,2,28]]},"abstract":"<jats:p>\n            Smart Meters are a key component of increasing the power efficiency of the Smart Grid. To help manage the grid effectively, these meters are designed to collect information on power consumption and send it to third parties. With Smart Metering, for the first time, these cloud-connected sensing devices are legally mandated to be installed in the homes of millions of people worldwide. Via a multi-staged empirical study that utilized an open-ended questionnaire, focus groups, and a design probe, we examined how people characterize the tension between the utility of Smart Metering and its impact on privacy. Our findings show that people seek to make abstract Smart Metering data\n            <jats:italic>accountable<\/jats:italic>\n            by connecting it to their everyday practices. Our insight can inform the design of usable privacy configuration tools that help Smart Metering consumers relate abstract data with the real-world implications of its disclosure.\n          <\/jats:p>","DOI":"10.1145\/3281444","type":"journal-article","created":{"date-parts":[[2019,1,31]],"date-time":"2019-01-31T17:29:27Z","timestamp":1548955767000},"page":"1-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":41,"title":["It Is About What They Could Do with the Data"],"prefix":"10.1145","volume":"26","author":[{"given":"Timo","family":"Jakobi","sequence":"first","affiliation":[{"name":"University of Siegen, Siegen, Germany"}]},{"given":"Sameer","family":"Patil","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington, Bloomington, IN"}]},{"given":"Dave","family":"Randall","sequence":"additional","affiliation":[{"name":"University of Siegen, Siegen, Germany"}]},{"given":"Gunnar","family":"Stevens","sequence":"additional","affiliation":[{"name":"University of Siegen, Siegen, Germany"}]},{"given":"Volker","family":"Wulf","sequence":"additional","affiliation":[{"name":"University of Siegen, Siegen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,1,30]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_2_1_1_1","DOI":"10.1145\/344949.344988"},{"volume-title":"Encyclopedia of Human-Computer Interaction","author":"Abras Chadia","key":"e_1_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_3_1","DOI":"10.1145\/336992.336995"},{"unstructured":"Alessandro Acquisti. 2010. The Economics of Personal Data and the Economics of Privacy. Retrieved from https:\/\/www.heinz.cmu.edu\/acquisti\/papers\/acquisti-privacy-OECD-22-11-10.pdf.  Alessandro Acquisti. 2010. The Economics of Personal Data and the Economics of Privacy. Retrieved from https:\/\/www.heinz.cmu.edu\/acquisti\/papers\/acquisti-privacy-OECD-22-11-10.pdf.","key":"e_1_2_1_4_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_5_1","DOI":"10.1109\/MSP.2005.22"},{"doi-asserted-by":"crossref","unstructured":"Christian Aichele and Oliver D. Doleski (Eds.). 2013. Smart Meter Rollout: Praxisleitfaden zur Ausbringung intelligenter Z\u00e4hler. Springer Wiesbaden Germany.  Christian Aichele and Oliver D. Doleski (Eds.). 2013. Smart Meter Rollout: Praxisleitfaden zur Ausbringung intelligenter Z\u00e4hler. Springer Wiesbaden Germany.","key":"e_1_2_1_6_1","DOI":"10.1007\/978-3-8348-2440-0"},{"doi-asserted-by":"publisher","key":"e_1_2_1_7_1","DOI":"10.1111\/j.1540-4560.1977.tb01883.x"},{"doi-asserted-by":"publisher","key":"e_1_2_1_8_1","DOI":"10.1016\/j.comnet.2010.05.010"},{"doi-asserted-by":"publisher","key":"e_1_2_1_9_1","DOI":"10.5555\/2017284.2017287"},{"doi-asserted-by":"publisher","key":"e_1_2_1_10_1","DOI":"10.1145\/2501604.2501616"},{"doi-asserted-by":"publisher","key":"e_1_2_1_11_1","DOI":"10.1145\/2207676.2207727"},{"doi-asserted-by":"publisher","key":"e_1_2_1_12_1","DOI":"10.1007\/978-94-011-2094-4_6"},{"doi-asserted-by":"publisher","key":"e_1_2_1_13_1","DOI":"10.1145\/1240624.1240789"},{"volume-title":"The Oxford Handbook of the Digital Economy","author":"Brandimarte Laura","key":"e_1_2_1_14_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_15_1","DOI":"10.1191\/1478088706qp063oa"},{"doi-asserted-by":"publisher","key":"e_1_2_1_16_1","DOI":"10.1145\/1073001.1073005"},{"doi-asserted-by":"publisher","key":"e_1_2_1_17_1","DOI":"10.1007\/s00779-012-0513-6"},{"doi-asserted-by":"publisher","key":"e_1_2_1_18_1","DOI":"10.1136\/amiajnl-2012-001023"},{"unstructured":"Ann Cavoukian. 2012. Operationalizing Privacy by Design: A Guide to Implementing Strong Privacy Practices.Information and Privacy Commissioner of Ontario Canada. http:\/\/www.ontla.on.ca\/library\/repository\/mon\/26012\/320221.pdf.  Ann Cavoukian. 2012. Operationalizing Privacy by Design: A Guide to Implementing Strong Privacy Practices.Information and Privacy Commissioner of Ontario Canada. http:\/\/www.ontla.on.ca\/library\/repository\/mon\/26012\/320221.pdf.","key":"e_1_2_1_19_1"},{"unstructured":"Ann Cavoukian and Alexander Dix. 2012. Smart Meters in Europe: Privacy by Design at Its Best. Information and Privacy Commissioner of Ontario Canada.  Ann Cavoukian and Alexander Dix. 2012. Smart Meters in Europe: Privacy by Design at Its Best. Information and Privacy Commissioner of Ontario Canada.","key":"e_1_2_1_20_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_21_1","DOI":"10.7146\/aahcc.v1i1.21312"},{"doi-asserted-by":"publisher","key":"e_1_2_1_22_1","DOI":"10.1016\/j.chb.2004.06.004"},{"volume-title":"Privacy impact assessment: Its origins and development. Computer Law 8 Security Review 25, 2","year":"2009","author":"Clarke Roger","key":"e_1_2_1_23_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_24_1","DOI":"10.1016\/j.enpol.2011.05.024"},{"doi-asserted-by":"publisher","key":"e_1_2_1_25_1","DOI":"10.1046\/j.1365-2648.1997.t01-25-00999.x"},{"doi-asserted-by":"publisher","key":"e_1_2_1_26_1","DOI":"10.1145\/1013115.1013125"},{"doi-asserted-by":"publisher","key":"e_1_2_1_27_1","DOI":"10.1007\/978-3-319-20499-4_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_28_1","DOI":"10.1007\/s10606-017-9276-y"},{"volume-title":"O\u2019Reilly Media","author":"Cranor Lorrie","key":"e_1_2_1_29_1"},{"volume-title":"Smart Metering and Privacy in Europe: Lessons from the Dutch Case","author":"Cuijpers Colette","key":"e_1_2_1_30_1"},{"unstructured":"George Danezis and Seda G\u00fcrses. 2010. A critical review of 10 years of Privacy Technology. https:\/\/homes.esat.kuleuven.be\/sguerses\/papers\/DanezisGuersesSurveillancePets2010.pdf.  George Danezis and Seda G\u00fcrses. 2010. A critical review of 10 years of Privacy Technology. https:\/\/homes.esat.kuleuven.be\/sguerses\/papers\/DanezisGuersesSurveillancePets2010.pdf.","key":"e_1_2_1_31_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_32_1","DOI":"10.1287\/isre.1060.0080"},{"doi-asserted-by":"publisher","key":"e_1_2_1_33_1","DOI":"10.5555\/1531407.1531415"},{"key":"e_1_2_1_34_1","first-page":"137","article-title":"Consumers\u2019 privacy concerns and implications for a privacy preserving smart grid architecture -- results of an austrian study. Energy Research 8 Social Science","volume":"9","author":"D\u00f6belt Susen","year":"2015","journal-title":"Special Issue on Smart Grids and the Social Sciences"},{"volume-title":"Proceedings of the Americas Conference on Information Systems(AMCIS 2007","year":"2007","author":"Dwyer Catherine","key":"e_1_2_1_35_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_36_1","DOI":"10.1109\/SMARTGRID.2010.5622050"},{"doi-asserted-by":"publisher","key":"e_1_2_1_37_1","DOI":"10.1007\/978-3-642-31284-7_33"},{"unstructured":"European Commission. 1995. Country fiches for electricity smart metering Accompanying the document. Report from the Commission Benchmarking smart metering deployment in the EU-27 with a focus on electricity. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri&equals;celex:52014SC0188.  European Commission. 1995. Country fiches for electricity smart metering Accompanying the document. Report from the Commission Benchmarking smart metering deployment in the EU-27 with a focus on electricity. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri&equals;celex:52014SC0188.","key":"e_1_2_1_38_1"},{"unstructured":"European Parliament and Council of the European Union. 1995. Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. DOI:http:\/\/data.europa.eu\/eli\/dir\/1995\/46\/oj.  European Parliament and Council of the European Union. 1995. Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. DOI:http:\/\/data.europa.eu\/eli\/dir\/1995\/46\/oj.","key":"e_1_2_1_39_1"},{"unstructured":"European Parliament and Council of the European Union. 2009. Directive 2009\/136\/EC of the European Parliament and of the Council of 25 November 2009 amending Directive 2002\/22\/EC on universal service and users' rights relating to electronic communications networks and services Directive 2002\/58\/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector and Regulation","key":"#cr-split#-e_1_2_1_40_1.1"},{"unstructured":"(EC) No 2006\/2004 on cooperation between national authorities responsible for the enforcement of consumer protection laws (Text with EEA relevance). DOI:http:\/\/data.europa.eu\/eli\/dir\/2009\/136\/oj. European Parliament and Council of the European Union. 2009. Directive 2009\/136\/EC of the European Parliament and of the Council of 25 November 2009 amending Directive 2002\/22\/EC on universal service and users' rights relating to electronic communications networks and services Directive 2002\/58\/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector and Regulation","key":"#cr-split#-e_1_2_1_40_1.2"},{"unstructured":"(EC) No 2006\/2004 on cooperation between national authorities responsible for the enforcement of consumer protection laws (Text with EEA relevance). DOI:http:\/\/data.europa.eu\/eli\/dir\/2009\/136\/oj.","key":"#cr-split#-e_1_2_1_40_1.3"},{"unstructured":"European Parliament and Council of the European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation) (Text with EEA relevance). DOI:https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj.  European Parliament and Council of the European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation) (Text with EEA relevance). DOI:https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj.","key":"e_1_2_1_41_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_42_1","DOI":"10.1109\/SURV.2011.101911.00087"},{"doi-asserted-by":"publisher","key":"e_1_2_1_43_1","DOI":"10.1145\/2858036.2858518"},{"doi-asserted-by":"publisher","key":"e_1_2_1_44_1","DOI":"10.1145\/2449396.2449446"},{"volume-title":"Securing the Smart Grid: Next Generation Power Grid Security","author":"Flick Tony","key":"e_1_2_1_45_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_46_1","DOI":"10.1007\/s10676-006-0001-7"},{"doi-asserted-by":"publisher","key":"e_1_2_1_47_1","DOI":"10.1016\/j.chb.2008.08.006"},{"doi-asserted-by":"publisher","key":"e_1_2_1_48_1","DOI":"10.1145\/1753326.1753629"},{"volume-title":"Proceedings of the 2013 IEEE International Symposium on Technology and Society: Social Implications of Wearable Computing and Augmediated Reality in Everyday Life (ISTAS\u201913)","author":"Garg Vaibhav","key":"e_1_2_1_49_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_50_1","DOI":"10.1145\/2683467.2683477"},{"doi-asserted-by":"publisher","key":"e_1_2_1_51_1","DOI":"10.1145\/2207676.2208538"},{"volume-title":"The Smart Grid: Enabling Energy Efficiency and Demand Response","author":"Gellings Clark W.","key":"e_1_2_1_52_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_53_1","DOI":"10.1145\/2738210.2738214"},{"unstructured":"German Federal Constitutional Court. 1983. BundesVerfassungsGericht 61 1 -- Volksz\u00e4hlung. Retrieved from http:\/\/www.servat.unibe.ch\/dfr\/bv065001.html.  German Federal Constitutional Court. 1983. BundesVerfassungsGericht 61 1 -- Volksz\u00e4hlung. Retrieved from http:\/\/www.servat.unibe.ch\/dfr\/bv065001.html.","key":"e_1_2_1_54_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_55_1","DOI":"10.1037\/0033-295X.103.4.650"},{"volume-title":"Doing Grounded Theory: Issues and Discussions","author":"Glaser Barney G.","key":"e_1_2_1_56_1"},{"volume-title":"Smart Grid Security","author":"Goel Sanjay","key":"e_1_2_1_57_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_58_1","DOI":"10.1145\/214748.214758"},{"volume-title":"Die smart-metering-debatte 2010--2016 und ihre ergebnisse zum schutz der Privatsph\u00e4re. Datenbank-Spektrum 16, 2 (01","year":"2016","author":"Greveler Ulrich","key":"e_1_2_1_59_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_60_1","DOI":"10.1145\/1534903.1534905"},{"doi-asserted-by":"publisher","key":"e_1_2_1_61_1","DOI":"10.5555\/1242029.1242053"},{"doi-asserted-by":"publisher","key":"e_1_2_1_62_1","DOI":"10.1145\/1102199.1102214"},{"unstructured":"Richard Harper Dave Randall and Wes Sharrock. 2017. Choice. John Wiley 8 Sons.  Richard Harper Dave Randall and Wes Sharrock. 2017. Choice. John Wiley 8 Sons.","key":"e_1_2_1_64_1"},{"volume-title":"Computing, and Society","author":"Harper Richard H. R.","edition":"1","key":"e_1_2_1_65_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_66_1","DOI":"10.1109\/5.192069"},{"doi-asserted-by":"publisher","key":"e_1_2_1_67_1","DOI":"10.1016\/j.pmcj.2010.04.006"},{"doi-asserted-by":"publisher","key":"e_1_2_1_68_1","DOI":"10.1145\/1993060.1993065"},{"volume-title":"Tavani","year":"2008","author":"Himma Kenneth Einar","key":"e_1_2_1_69_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_70_1","DOI":"10.1016\/j.ijmedinf.2009.11.002"},{"doi-asserted-by":"publisher","key":"e_1_2_1_71_1","DOI":"10.1145\/1013115.1013129"},{"doi-asserted-by":"publisher","key":"e_1_2_1_72_1","DOI":"10.1561\/1100000004"},{"volume-title":"Computer Ethics","author":"Johnson Deborah G.","edition":"4","key":"e_1_2_1_73_1"},{"volume-title":"Facebook: Threats to privacy. Project MAC: MIT Project on Mathematics and Computing 1 (December","year":"2005","author":"Jones Harvey","key":"e_1_2_1_74_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_75_1","DOI":"10.1016\/j.ijmedinf.2015.12.014"},{"doi-asserted-by":"publisher","key":"e_1_2_1_76_1","DOI":"10.1109\/SMARTGRID.2010.5622047"},{"volume-title":"Proceedings of the 11th Symposium on Usable Privacy and Security (SOUPS\u201915)","year":"2015","author":"Kang Ruogu","key":"e_1_2_1_77_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_78_1","DOI":"10.1016\/0360-5442(82)90030-5"},{"key":"e_1_2_1_79_1","first-page":"44","volume-title":"Proceedings of Decisions@RecSys. 40--41","author":"Knijnenburg Bart P.","year":"2013"},{"doi-asserted-by":"publisher","key":"e_1_2_1_80_1","DOI":"10.1093\/idpl\/ipr004"},{"doi-asserted-by":"publisher","key":"e_1_2_1_81_1","DOI":"10.1007\/11423409_21"},{"volume-title":"Proceedings of the Americas Conference on Information Systems (AMCIS\u201910)","year":"2010","author":"Kranz Johann","key":"e_1_2_1_82_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_83_1","DOI":"10.1016\/j.enpol.2011.11.047"},{"doi-asserted-by":"publisher","key":"e_1_2_1_84_1","DOI":"10.1145\/1047671.1047705"},{"volume-title":"Ubicomp 2001: Ubiquitous Computing","author":"Langheinrich Marc","key":"e_1_2_1_85_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_86_1","DOI":"10.1007\/s00779-004-0304-9"},{"volume-title":"Mulligan","year":"2008","author":"Lerner Jack I.","key":"e_1_2_1_87_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_88_1","DOI":"10.1109\/TKDE.2011.124"},{"doi-asserted-by":"publisher","key":"e_1_2_1_89_1","DOI":"10.4108\/icst.mobiquitous.2014.258066"},{"doi-asserted-by":"publisher","key":"e_1_2_1_90_1","DOI":"10.1109\/TSG.2012.2210289"},{"doi-asserted-by":"publisher","key":"e_1_2_1_91_1","DOI":"10.1145\/2370216.2370290"},{"volume-title":"Proceedings of the 12th Symposium on Usable Privacy and Security (SOUPS\u201916)","year":"2016","author":"Liu Bin","key":"e_1_2_1_92_1"},{"volume-title":"Ethnomethodology","year":"2011","author":"Lynch Michael","key":"e_1_2_1_93_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_94_1","DOI":"10.1109\/COMSNETS.2011.5716491"},{"doi-asserted-by":"publisher","key":"e_1_2_1_95_1","DOI":"10.1109\/MSP.2009.76"},{"doi-asserted-by":"publisher","key":"e_1_2_1_96_1","DOI":"10.1016\/j.enpol.2011.11.049"},{"volume-title":"The Internet of Things","author":"Medaglia Carlo Maria","key":"e_1_2_1_97_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_98_1","DOI":"10.1016\/j.adhoc.2012.02.016"},{"doi-asserted-by":"publisher","key":"e_1_2_1_99_1","DOI":"10.1145\/270858.270866"},{"unstructured":"United Nations. 1948. Universal Declaration of Human Rights. Retrieved from http:\/\/www.un.org\/en\/universal-declaration-human-rights.  United Nations. 1948. Universal Declaration of Human Rights. Retrieved from http:\/\/www.un.org\/en\/universal-declaration-human-rights.","key":"e_1_2_1_100_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_101_1","DOI":"10.1016\/S1353-4858(08)70097-7"},{"doi-asserted-by":"publisher","key":"e_1_2_1_102_1","DOI":"10.1016\/j.tej.2008.09.003"},{"key":"e_1_2_1_103_1","first-page":"101","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","journal-title":"Washingto Law Review"},{"doi-asserted-by":"publisher","key":"e_1_2_1_104_1","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"volume-title":"United States Code 552a","year":"1974","author":"The Privacy","key":"e_1_2_1_105_1"},{"unstructured":"Members of the Common Criteria Recognition Arrangement. 2017. Common Criteria for Information Technology Security Evaluation Version 3.1 Revision 5. DOI:https:\/\/www.commoncriteriaportal.org\/cc\/.  Members of the Common Criteria Recognition Arrangement. 2017. Common Criteria for Information Technology Security Evaluation Version 3.1 Revision 5. DOI:https:\/\/www.commoncriteriaportal.org\/cc\/.","key":"e_1_2_1_106_1"},{"unstructured":"Pacific Gas 8 Electric. 2018. Find Out How SmartMeter\u2122 Communicates with PG8E. Retrieved from https:\/\/www.pge.com\/en_US\/residential\/save-energy-money\/analyze-your-usage\/your-usage\/view-and-share-your-data-with-smartmeter\/smartmeter-network.page.  Pacific Gas 8 Electric. 2018. Find Out How SmartMeter\u2122 Communicates with PG8E. Retrieved from https:\/\/www.pge.com\/en_US\/residential\/save-energy-money\/analyze-your-usage\/your-usage\/view-and-share-your-data-with-smartmeter\/smartmeter-network.page.","key":"e_1_2_1_107_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_108_1","DOI":"10.1145\/642611.642635"},{"doi-asserted-by":"publisher","key":"e_1_2_1_109_1","DOI":"10.1109\/ISGT.2012.6175695"},{"volume-title":"Legal Protection of Personal Data in Smart Grid and Smart Metering Systems from the European Perspective","author":"Papakonstantinou Vagelis","doi-asserted-by":"crossref","key":"e_1_2_1_110_1","DOI":"10.1007\/978-1-4471-6663-4_2"},{"doi-asserted-by":"publisher","key":"e_1_2_1_111_1","DOI":"10.1007\/11766155_1"},{"volume-title":"Simone Fischer-H\u00fcbner, Daniel Cvr\u010dek, and Petr \u0160venda (Eds.)","author":"P\u00f6tzsch Stefanie","key":"e_1_2_1_112_1"},{"volume-title":"Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS\u201917)","year":"2017","author":"Rader Emilee","key":"e_1_2_1_113_1"},{"unstructured":"Edith Ramirez Julie Brill Maureen K. Ohlhausen Joshua D. Wright and Terrell McSweeny. 2014. Data Brokers: A Call for Transparency and Accountability. Federal Trade Commission. https:\/\/www.ftc.gov\/system\/files\/documents\/reports\/data-brokers-call-transparency-accountability-report-federal-trade-commission-may-2014\/140527databrokerreport.pdf.  Edith Ramirez Julie Brill Maureen K. Ohlhausen Joshua D. Wright and Terrell McSweeny. 2014. Data Brokers: A Call for Transparency and Accountability. Federal Trade Commission. https:\/\/www.ftc.gov\/system\/files\/documents\/reports\/data-brokers-call-transparency-accountability-report-federal-trade-commission-may-2014\/140527databrokerreport.pdf.","key":"e_1_2_1_114_1"},{"volume-title":"Fieldwork for Design: Theory and Practice","author":"Randall David","edition":"1","key":"e_1_2_1_115_1"},{"volume-title":"Proceedings of the Sixth ASE International Conference on Privacy, Security, Risk and Trust (PASSAT'14)","author":"Rao Ashwini","key":"e_1_2_1_116_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_117_1","DOI":"10.1177\/13684310222225432"},{"key":"e_1_2_1_118_1","first-page":"39","article-title":"Disagreeable privacy policies: Mismatches between meaning and users\u2019 understanding","volume":"30","author":"Reidenberg Joel R.","year":"2015","journal-title":"Berkeley Technology Law Journal"},{"doi-asserted-by":"publisher","key":"e_1_2_1_119_1","DOI":"10.1145\/2470654.2466152"},{"doi-asserted-by":"publisher","key":"e_1_2_1_120_1","DOI":"10.1016\/j.comnet.2012.12.018"},{"doi-asserted-by":"crossref","unstructured":"Benedikt R\u00f6mer Philipp Reichhart Johann Kranz and Arnold Picot. 2012. The role of Smart Metering and decentralized electricity storage for smart grids: The importance of positive externalities. Energy Policy: Special Section: Past and Prospective Energy Transitions -- Insights from History 50 (2012) 486--495.  Benedikt R\u00f6mer Philipp Reichhart Johann Kranz and Arnold Picot. 2012. The role of Smart Metering and decentralized electricity storage for smart grids: The importance of positive externalities. Energy Policy: Special Section: Past and Prospective Energy Transitions -- Insights from History 50 (2012) 486--495.","key":"e_1_2_1_121_1","DOI":"10.1016\/j.enpol.2012.07.047"},{"doi-asserted-by":"publisher","key":"e_1_2_1_122_1","DOI":"10.1016\/j.comnet.2013.02.018"},{"key":"e_1_2_1_123_1","first-page":"3","article-title":"Regulating privacy by design","volume":"26","author":"Rubinstein Ira S.","year":"2011","journal-title":"Berkeley Technology Law Journal"},{"doi-asserted-by":"publisher","key":"e_1_2_1_124_1","DOI":"10.1109\/TSG.2012.2211046"},{"volume-title":"Proccedings of the 11th Symposium on Usable Privacy and Security (SOUPS\u201915)","year":"2015","author":"Schaub Florian","key":"e_1_2_1_125_1"},{"key":"e_1_2_1_126_1","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1515\/zfsoz-2014-0505","article-title":"The written interview in qualitative social research","volume":"43","author":"Schiek Daniela","year":"2014","journal-title":"Zeitschrift f\u00fcr Soziologie"},{"unstructured":"Ari Schwartz. 2009. Looking Back at P3P: Lessons for the Future. Retrieved from https:\/\/www.cdt.org\/files\/pdfs\/P3P_Retro_Final_0.pdf.  Ari Schwartz. 2009. Looking Back at P3P: Lessons for the Future. Retrieved from https:\/\/www.cdt.org\/files\/pdfs\/P3P_Retro_Final_0.pdf.","key":"e_1_2_1_127_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_128_1","DOI":"10.1145\/2463579.2463583"},{"doi-asserted-by":"publisher","key":"e_1_2_1_129_1","DOI":"10.1145\/1592761.1592778"},{"volume-title":"Models of Bounded Rationality: Empirically Grounded Economic Reason","author":"Simon Herbert Alexander","key":"e_1_2_1_130_1"},{"unstructured":"Daniel J. Solove. 2010. Understanding Privacy. Harvard University Press.  Daniel J. Solove. 2010. Understanding Privacy. Harvard University Press.","key":"e_1_2_1_131_1"},{"volume-title":"barrierefreie sicherheit intelligenter messsysteme. Datenschutz und Datensicherheit 38, 8 (01","year":"2014","author":"Stevens Gunnar","key":"e_1_2_1_132_1"},{"volume-title":"Appropriation infrastructure: Supporting the design of usages","author":"Stevens Gunnar","doi-asserted-by":"crossref","key":"e_1_2_1_133_1","DOI":"10.4018\/978-1-4666-0140-6.ch012"},{"doi-asserted-by":"publisher","key":"e_1_2_1_134_1","DOI":"10.1109\/ICCSIT.2009.5234410"},{"volume-title":"The child in America: Behavior Problems and Programs","author":"Thomas William Isaac","key":"e_1_2_1_135_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_136_1","DOI":"10.1145\/2818048.2819992"},{"doi-asserted-by":"publisher","key":"e_1_2_1_137_1","DOI":"10.1109\/TSG.2012.2192487"},{"volume-title":"Computers, and the Rights of Citizens: Report of the Secretary\u2019s Advisory Committee on Automated Personal Data Systems\u2019","author":"Ware Willis H.","key":"e_1_2_1_138_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_139_1","DOI":"10.2307\/1321160"},{"volume-title":"Internet of Things -- New security and privacy challenges. Computer Law 8 Security Review 26, 1","year":"2010","author":"Weber Rolf H.","key":"e_1_2_1_140_1"},{"key":"e_1_2_1_141_1","first-page":"3","article-title":"The computer for the 21st century","volume":"265","author":"Weiser Mark","year":"1991","journal-title":"Scientific American: Special Issue on Communications, Computers, and Networks"},{"unstructured":"Alan F. Westin. 1970. Privacy and Freedom. Bodley Head. 78520991  Alan F. Westin. 1970. Privacy and Freedom. Bodley Head. 78520991","key":"e_1_2_1_142_1"},{"volume":"348","volume-title":"Proceedings of the 8th USENIX Security Symposium","author":"Whitten Alma","key":"e_1_2_1_143_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_144_1","DOI":"10.1007\/s10676-010-9242-6"},{"doi-asserted-by":"publisher","key":"e_1_2_1_145_1","DOI":"10.1145\/1958824.1958902"},{"volume-title":"Proceedings of the Americas Conference on Information Systems (AMCIS\u201912)","year":"2012","author":"Wunderlich Phillipp","key":"e_1_2_1_146_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_147_1","DOI":"10.1016\/j.jclepro.2016.12.031"},{"doi-asserted-by":"publisher","key":"e_1_2_1_148_1","DOI":"10.1109\/CSAC.2005.60"}],"container-title":["ACM Transactions on Computer-Human Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3281444","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3281444","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:19Z","timestamp":1750208239000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3281444"}},"subtitle":["A User Perspective on Privacy in Smart Metering"],"short-title":[],"issued":{"date-parts":[[2019,1,30]]},"references-count":149,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,2,28]]}},"alternative-id":["10.1145\/3281444"],"URL":"https:\/\/doi.org\/10.1145\/3281444","relation":{},"ISSN":["1073-0516","1557-7325"],"issn-type":[{"type":"print","value":"1073-0516"},{"type":"electronic","value":"1557-7325"}],"subject":[],"published":{"date-parts":[[2019,1,30]]},"assertion":[{"value":"2017-08-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-01-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}