{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T09:11:12Z","timestamp":1759741872842,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T00:00:00Z","timestamp":1550793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1565252"],"award-info":[{"award-number":["1565252"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,22]]},"DOI":"10.1145\/3301293.3302371","type":"proceedings-article","created":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T22:12:13Z","timestamp":1550873533000},"page":"117-122","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Consumer Smart Homes"],"prefix":"10.1145","author":[{"given":"Shrirang","family":"Mare","sequence":"first","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Logan","family":"Girvin","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Franziska","family":"Roesner","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Tadayoshi","family":"Kohno","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/344949.344988"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00013"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979249"},{"key":"e_1_3_2_1_4_1","volume-title":"Inkpen","author":"Bernheim Brush A. J.","year":"2007","unstructured":"A. J. Bernheim Brush and Kori M . Inkpen . 2007 . Yours, Mine and Ours? Sharing and Use of Technology in Domestic Environments. In Proceedings of the International Conference on Ubiquitous Computing (UbiComp). Springer-Verlag , 18. http:\/\/dl.acm.org\/citation.cfm?id=1771592.1771599 A. J. Bernheim Brush and Kori M. Inkpen. 2007. Yours, Mine and Ours? Sharing and Use of Technology in Domestic Environments. In Proceedings of the International Conference on Ubiquitous Computing (UbiComp). Springer-Verlag, 18. http:\/\/dl.acm.org\/citation.cfm?id=1771592.1771599"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11853565_2"},{"key":"e_1_3_2_1_6_1","volume-title":"Grinter","author":"Keith Edwards W.","year":"2001","unstructured":"W. Keith Edwards and Rebecca E . Grinter . 2001 . At Home with Ubiquitous Computing : Seven Challenges. In Proceedings of the International Conference on Ubiquitous Computing (UbiComp) . Springer-Verlag , 17. W. Keith Edwards and Rebecca E. Grinter. 2001. At Home with Ubiquitous Computing: Seven Challenges. In Proceedings of the International Conference on Ubiquitous Computing (UbiComp) . Springer-Verlag, 17."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990087"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078845"},{"volume-title":"Trust, Privacy and Security in Digital Business","author":"Johnson Matthew","key":"e_1_3_2_1_10_1","unstructured":"Matthew Johnson and Frank Stajano . 2009. Usability of Security Management: Defining the Permissions of Guests . In Trust, Privacy and Security in Digital Business . Springer Berlin Heidelberg . Matthew Johnson and Frank Stajano. 2009. Usability of Security Management: Defining the Permissions of Guests. In Trust, Privacy and Security in Digital Business. Springer Berlin Heidelberg."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/647987.741336"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753421"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046720"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025861"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31205-2_10"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2636076"},{"volume-title":"Proceedings of the Symposium on Usable Privacy and Security (SOUPS) .","author":"Naeini Pardis Emami","key":"e_1_3_2_1_17_1","unstructured":"Pardis Emami Naeini , Sruti Bhagavatula , Hana Habib , Martin Degeling , Lujo Bauer , Lorrie Faith Cranor , and Norman M. Sadeh . 2017. Privacy Expectations and Preferences in an IoT World . In Proceedings of the Symposium on Usable Privacy and Security (SOUPS) . Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman M. Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS) ."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the Workshop on Home Usable Privacy and Security (HUPS) .","author":"Schechter Stuart","year":"2013","unstructured":"Stuart Schechter . 2013 . The User IS the Enemy, and (S)he Keeps Reaching for that Bright Shiny Power Button! . In Proceedings of the Workshop on Home Usable Privacy and Security (HUPS) . Stuart Schechter. 2013. The User IS the Enemy, and (S)he Keeps Reaching for that Bright Shiny Power Button!. In Proceedings of the Workshop on Home Usable Privacy and Security (HUPS) ."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572552"},{"key":"e_1_3_2_1_20_1","unstructured":"Nick Statt. 2017. How an army of vulnerable gadgets took down the web today. Online at theverge.com. https:\/\/www.theverge.com\/2016\/10\/21\/13362354\/dyn-dns-ddos-attack-cause-outage-status-explained  Nick Statt. 2017. How an army of vulnerable gadgets took down the web today. Online at theverge.com. https:\/\/www.theverge.com\/2016\/10\/21\/13362354\/dyn-dns-ddos-attack-cause-outage-status-explained"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the Workshop on Home Usable Privacy and Security (HUPS) . https:\/\/www.microsoft.com\/en-us\/research\/publication\/the-current-state-of-access-control-for-smart-devices-in-homes\/","author":"Ur Blase","year":"2013","unstructured":"Blase Ur , Jaeyeon Jung , and Stuart Schechter . 2013 . The Current State of Access Control for Smart Devices in Homes . In Proceedings of the Workshop on Home Usable Privacy and Security (HUPS) . https:\/\/www.microsoft.com\/en-us\/research\/publication\/the-current-state-of-access-control-for-smart-devices-in-homes\/ Blase Ur, Jaeyeon Jung, and Stuart Schechter. 2013. The Current State of Access Control for Smart Devices in Homes. In Proceedings of the Workshop on Home Usable Privacy and Security (HUPS) . https:\/\/www.microsoft.com\/en-us\/research\/publication\/the-current-state-of-access-control-for-smart-devices-in-homes\/"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2806063"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493489"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the Symposium on Usable Privacy and Security (SOUPS) . https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/zeng","author":"Zheng Eric","year":"2017","unstructured":"Eric Zheng , Shrirang Mare , and Franziska Roesner . 2017 . End User Security and Privacy Concerns with Smart Homes . In Proceedings of the Symposium on Usable Privacy and Security (SOUPS) . https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/zeng Eric Zheng, Shrirang Mare, and Franziska Roesner. 2017. End User Security and Privacy Concerns with Smart Homes. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS) . https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/zeng"}],"event":{"name":"HotMobile '19: The 20th International Workshop on Mobile Computing Systems and Applications","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Santa Cruz CA USA","acronym":"HotMobile '19"},"container-title":["Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301293.3302371","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3301293.3302371","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3301293.3302371","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:58:02Z","timestamp":1750208282000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301293.3302371"}},"subtitle":["Where We Are and Where We Need to Go"],"short-title":[],"issued":{"date-parts":[[2019,2,22]]},"references-count":24,"alternative-id":["10.1145\/3301293.3302371","10.1145\/3301293"],"URL":"https:\/\/doi.org\/10.1145\/3301293.3302371","relation":{},"subject":[],"published":{"date-parts":[[2019,2,22]]},"assertion":[{"value":"2019-02-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}