{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T08:22:38Z","timestamp":1758874958036,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,9]],"date-time":"2019-11-09T00:00:00Z","timestamp":1573257600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,9]]},"DOI":"10.1145\/3311957.3361849","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T19:43:22Z","timestamp":1573155802000},"page":"43-46","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Towards a Smart Home Usable Privacy Framework"],"prefix":"10.1145","author":[{"given":"Chola","family":"Chhetri","sequence":"first","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 26th USENIX Security Symposium, 1093--1110","author":"Antonakakis Manos","year":"2017","unstructured":"Manos Antonakakis, Tim April, Michael Bailey, et al. 2017. Understanding the Mirai Botnet. Proceedings of the 26th USENIX Security Symposium, 1093--1110."},{"key":"e_1_3_2_1_2_1","volume-title":"Data and Algorithmic Transparency Workshop (DAT).","author":"Apthorpe Noah","year":"2016","unstructured":"Noah Apthorpe, Dillon Reisman, and Nick Feamster. 2016. A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic. Data and Algorithmic Transparency Workshop (DAT)."},{"key":"e_1_3_2_1_3_1","unstructured":"Noah Apthorpe Dillon Reisman Srikanth Sundaresan Arvind Narayanan and Nick Feamster. 2017. Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic. arXiv Preprint."},{"volume-title":"Eliciting Privacy Concerns for Smart Home Devices from a User Centered Perspective. Information in Contemporary Society","author":"Chhetri Chola","key":"e_1_3_2_1_4_1","unstructured":"Chola Chhetri and Vivian Genaro Motti. 2019. Eliciting Privacy Concerns for Smart Home Devices from a User Centered Perspective. Information in Contemporary Society, Springer International Publishing, 91--101."},{"key":"e_1_3_2_1_5_1","volume-title":"Security Analysis of Emerging Smart Home Applications. 2016 IEEE Symposium on Security and Privacy (SP), IEEE, 636--654","author":"Fernandes Earlence","year":"2016","unstructured":"Earlence Fernandes, Jaeyeon Jung, and Atul Prakash. 2016. Security Analysis of Emerging Smart Home Applications. 2016 IEEE Symposium on Security and Privacy (SP), IEEE, 636--654."},{"key":"e_1_3_2_1_6_1","volume-title":"Consumer Attitudes Towards Privacy and Security in Home Assistants. Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, ACM.","author":"Fruchter Nathaniel","year":"2018","unstructured":"Nathaniel Fruchter and Ilaria Liccardi. 2018. Consumer Attitudes Towards Privacy and Security in Home Assistants. Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, ACM."},{"volume-title":"Security and Privacy Issues for an IoT based Smart Home. Information and Communication Technology, Electronics and Microelectronics (MIPRO)","author":"Geneiatakis Dimitris","key":"e_1_3_2_1_7_1","unstructured":"Dimitris Geneiatakis, Ioannis Kounelis, Ricardo Neisse, Igor Nai-Fovino, Gary Steri, and Gianmarco Baldini. 2017. Security and Privacy Issues for an IoT based Smart Home. Information and Communication Technology, Electronics and Microelectronics (MIPRO), Croatian Society for Information and Communication Technology, Electronics and Microelectronics - MIPRO, 1292--1297."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2017.03.024"},{"key":"e_1_3_2_1_9_1","volume-title":"HAS","author":"Nurse Jason R C","year":"2016","unstructured":"Jason R C Nurse, Ahmad Atamli, and Andrew Martin. 2016. Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home. Human Aspects of Information Security, Privacy, and Trust. HAS 2016. Lecture Notes in Computer Science, 255--267."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.291"},{"volume-title":"Designing a Better Future: Urban Assisted Living","author":"Singh Deepika","key":"e_1_3_2_1_11_1","unstructured":"Deepika Singh, Ismini Psychoula, Johannes Kropf, Sten Hanke, and Andreas Holzinger. 2018. Users' Perceptions and Attitudes Towards Smart Home Technologies. Smart Homes and Health Telematics, Designing a Better Future: Urban Assisted Living, Springer International Publishing, 203--214."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2016.09.006"},{"volume-title":"Networked Privacy Workshop of the ACM CHI Conference on Human Factors in Computing Systems.","author":"Yao Yaxing","key":"e_1_3_2_1_13_1","unstructured":"Yaxing Yao. Personalized Privacy Assistant to Protect People's Privacy in Smart Home Environment. Networked Privacy Workshop of the ACM CHI Conference on Human Factors in Computing Systems."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Mengmei Ye Nan Jiang Hao Yang and Qiben Yan. 2017. Security Analysis of Internet-of-Things: A Case Study of August Smart Lock. MobiSec 2017: Security Privacy and Digital Forensics of Mobile Systems and Networks 499--504.","DOI":"10.1109\/INFCOMW.2017.8116427"},{"key":"e_1_3_2_1_15_1","volume-title":"End User Security & Privacy Concerns with Smart Homes. Symposium on Usable Privacy and Security (SOUPS ).","author":"Zeng Eric","year":"2017","unstructured":"Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security & Privacy Concerns with Smart Homes. Symposium on Usable Privacy and Security (SOUPS )."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"volume-title":"Nearly half of Americans use digital voice assistants, mostly on their smartphones","year":"2018","key":"e_1_3_2_1_17_1","unstructured":"2017. Nearly half of Americans use digital voice assistants, mostly on their smartphones. Pew Research Center. Retrieved September 24, 2018 from http:\/\/www.pewresearch.org\/fact-tank\/2017\/12\/12\/nearly-half-of-americans-use-digital-voice-assistants-mostly-on-their-smartphones\/."},{"key":"e_1_3_2_1_18_1","unstructured":"2017. IoT Security & Privacy Trust Framework v2.5."}],"event":{"name":"CSCW '19: Computer Supported Cooperative Work and Social Computing","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Austin TX USA","acronym":"CSCW '19"},"container-title":["Companion Publication of the 2019 Conference on Computer Supported Cooperative Work and Social Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3311957.3361849","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3311957.3361849","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:28Z","timestamp":1750204468000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3311957.3361849"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,9]]},"references-count":18,"alternative-id":["10.1145\/3311957.3361849","10.1145\/3311957"],"URL":"https:\/\/doi.org\/10.1145\/3311957.3361849","relation":{},"subject":[],"published":{"date-parts":[[2019,11,9]]},"assertion":[{"value":"2019-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}