{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:45Z","timestamp":1750220925520,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"},{"start":{"date-parts":[[2019,11,9]],"date-time":"2019-11-09T00:00:00Z","timestamp":1573257600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CPS-1739809"],"award-info":[{"award-number":["CPS-1739809"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CPS-1739809"],"award-info":[{"award-number":["CPS-1739809"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,9]]},"DOI":"10.1145\/3311957.3359489","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T19:43:22Z","timestamp":1573155802000},"page":"142-145","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["You, Me, and IoT"],"prefix":"10.1145","author":[{"given":"Noah","family":"Apthorpe","sequence":"first","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Arunesh","family":"Mathur","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Pardis","family":"Emami-Naeini","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Marshini","family":"Chetty","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Nick","family":"Feamster","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214262"},{"key":"e_1_3_2_1_2_1","unstructured":"Nellie Bowles. 2018. Thermostats Locks and Lights: Digital Tools of Domestic Abuse . https:\/\/www.nytimes.com\/2018\/06\/23\/technology\/smart-home-devices-domestic-abuse.html ."},{"key":"e_1_3_2_1_3_1","unstructured":"Caren Chelser. 2018. Alexa? Please Ignore my Husband . https:\/\/www.nytimes.com\/2018\/05\/04\/style\/modern-love-alexa-please-ignore-my-husband.html ."},{"key":"e_1_3_2_1_4_1","volume-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS","author":"Emami-Naeini Pardis","year":"2017","unstructured":"Pardis Emami-Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). 399--412."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274317"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300498"},{"key":"e_1_3_2_1_8_1","volume-title":"Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Zeng Eric","year":"2019","unstructured":"Eric Zeng and Franziska Roesner. 2019. Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study. In 28th USENIX Security Symposium (USENIX Security 19). 159--176."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"}],"event":{"name":"CSCW '19: Computer Supported Cooperative Work and Social Computing","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Austin TX USA","acronym":"CSCW '19"},"container-title":["Companion Publication of the 2019 Conference on Computer Supported Cooperative Work and Social Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3311957.3359489","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3311957.3359489","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3311957.3359489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:12Z","timestamp":1750204392000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3311957.3359489"}},"subtitle":["How Internet-Connected Home Devices Affect Interpersonal Relationships"],"short-title":[],"issued":{"date-parts":[[2019,11,9]]},"references-count":9,"alternative-id":["10.1145\/3311957.3359489","10.1145\/3311957"],"URL":"https:\/\/doi.org\/10.1145\/3311957.3359489","relation":{},"subject":[],"published":{"date-parts":[[2019,11,9]]},"assertion":[{"value":"2019-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}