{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T08:56:13Z","timestamp":1773392173737,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,21]],"date-time":"2020-04-21T00:00:00Z","timestamp":1587427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA8750-15-2-0277"],"award-info":[{"award-number":["FA8750-15-2-0277"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007515","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1012763, SBE-1513957, and SBE-1514192"],"award-info":[{"award-number":["CNS-1012763, SBE-1513957, and SBE-1514192"]}],"id":[{"id":"10.13039\/100007515","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,21]]},"DOI":"10.1145\/3313831.3376389","type":"proceedings-article","created":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T15:16:49Z","timestamp":1590592609000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":79,"title":["Informing the Design of a Personalized Privacy Assistant for the Internet of Things"],"prefix":"10.1145","author":[{"given":"Jessica","family":"Colnago","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Yuanyuan","family":"Feng","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Tharangini","family":"Palanivel","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Sarah","family":"Pearman","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Megan","family":"Ung","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Alessandro","family":"Acquisti","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Lorrie Faith","family":"Cranor","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Norman","family":"Sadeh","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,4,23]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.5430\/elr.v3n1p39"},{"key":"e_1_3_2_2_2_1","unstructured":"Consumer Technology Association. 2019. Spending on smart cities worldwide in 2015 and 2020 (in billion U.S. dollars). http:\/\/www.statista.com\/statistics\/757638\/spending-on-smart-cities-worldwide\/. (2019). Accessed: Feb 2019."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3172944.3172982"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0158450"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.4251118"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2968219.2968546"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367733"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208589"},{"key":"e_1_3_2_2_9_1","unstructured":"Jillian D'Onfro. 2018. Google's Sundar Pichai was grilled on privacy data collection and China during congressional hearing. http:\/\/www.cnbc.com\/2018\/12\/11\/google-ceo-sundar-pichaitestifies-before-congress-on-bias-privacy.html. (2018). Accessed: Feb 2019."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCNW.2013.6758522"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274317"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_3_2_2_13_1","unstructured":"EU GDPR Portal. 2017. Home Page of The European Union General Data Protection Regulation (GDPR). (2017). http:\/\/www.eugdpr.org\/eugdpr.org.html."},{"key":"e_1_3_2_2_14_1","unstructured":"IoT for All. 2017. The 5 Worst Examples of IoT Hacking and Vulnerabilities in Recorded History. http:\/\/www.iotforall.com\/5-worst-iot-hackingvulnerabilities\/. (2017). Accessed: Feb 2019."},{"key":"e_1_3_2_2_15_1","volume-title":"Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS","author":"Forget Alain","year":"2016","unstructured":"Alain Forget, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Marian Harbach, and Rahul Telang. 2016. Do or do not, there is no try: user engagement may not improve security outcomes. In Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, 97--111."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2012.52"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300498"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2006.26"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990087"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2013.6529526"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2701155"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235866.3235870"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/647988.741491"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235838.3235856"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235895.3235899"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568035"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2018.23007"},{"key":"e_1_3_2_2_29_1","volume-title":"California Enacts a Groundbreaking New Privacy Law. (June","author":"Morgan Michael","year":"2018","unstructured":"Michael Morgan, Daniel Gottlieb, Matthew Cin, Jonathan Ende, Amy Pimentel, and Li Wang. 2018. California Enacts a Groundbreaking New Privacy Law. (June 2018). http:\/\/www.mwe.com\/en\/thought-leadership\/publications\/2018\/06\/california-enacts-groundbreaking-new-privacy-law."},{"key":"e_1_3_2_2_30_1","unstructured":"Mozilla. 2018. 10 Fascinating Things We Learned When We Asked The World \"How Connected Are You?'. http:\/\/blog.mozilla.org\/blog\/2017\/11\/01\/10fascinating-things-we-learned-when-we-asked-theworld-how-connected-are-you\/. (2018). Accessed: Feb 2019."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235924.3235956"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/PAC.2018.00010"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300745"},{"key":"e_1_3_2_2_34_1","unstructured":"Amy Nordrum. 2016. Popular Internet of Things Forecast of 50 Billion Devices by 2020 Is Outdated. http:\/\/spectrum.ieee.org\/tech-talk\/telecom\/internet\/popular-internet-of-things-forecast-of-50-billiondevices-by-2020-is-outdated. (2016). Accessed: Feb 2019."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370224"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/3468.844354"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572587"},{"key":"e_1_3_2_2_38_1","volume-title":"Filed","author":"Sadeh Norman","year":"2019","unstructured":"Norman Sadeh, Bin Liu, Anupam Das, Martin Degeling, and Florian Schaub. 2019. Personalized Privacy Assistant. (April 2019). Patent No. 20190108353, Filed Dec 29, 2017, Publication Apr 11, 2019."},{"key":"e_1_3_2_2_39_1","unstructured":"Johnny Salda\u00f1a. 2009. The coding manual for qualitative researchers. SAGE. 223 pages."},{"key":"e_1_3_2_2_40_1","volume-title":"Research Symposium on Emerging Electronic Markets, U. Lechner (Ed.).","author":"M.","unstructured":"J.G.M. van der Heijden. 2003. Ubiquitous computing, user control, and user performance: conceptual model and preliminary experimental design. In Research Symposium on Emerging Electronic Markets, U. Lechner (Ed.)."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3083187.3083192"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.51"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901890"},{"key":"e_1_3_2_2_44_1","unstructured":"Kaya Yurieff. 2019. Google says Nest Guard's hidden microphone wasn't meant to be a secret. http:\/\/www.cnn.com\/2019\/02\/20\/tech\/google-nestmicrophone-secret\/index.html. (2019). Accessed: Feb 2019."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235924.3235931"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"key":"e_1_3_2_2_47_1","volume-title":"Twenty-fifth Americas Conference on Information Systems. AIS, 1--10","author":"Zibuschka Jan","year":"2019","unstructured":"Jan Zibuschka, Christian Zimmermann, Michael Nofer, and Oliver Hinz. 2019. Users' Preferences Concerning Privacy Properties of Assistant Systems on the Internet of Things. In Twenty-fifth Americas Conference on Information Systems. AIS, 1--10."},{"key":"e_1_3_2_2_48_1","volume-title":"Mensch und Computer 2018 - Workshopband","author":"Zimmermann Verena","unstructured":"Verena Zimmermann, Merve Bennighof, Miriam Edel, Oliver Hofmann, Judith Jung, and Melina von Wick. 2018. \"Home, Smart Home' -- Exploring End Users' Mental Models of Smart Homes. In Mensch und Computer 2018 - Workshopband, Raimund Dachselt and Gerhard Weber (Eds.). Gesellschaft f\u00fcr Informatik e.V., 407--417."}],"event":{"name":"CHI '20: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '20","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313831.3376389","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3313831.3376389","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3313831.3376389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:33Z","timestamp":1750199913000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313831.3376389"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,21]]},"references-count":48,"alternative-id":["10.1145\/3313831.3376389","10.1145\/3313831"],"URL":"https:\/\/doi.org\/10.1145\/3313831.3376389","relation":{},"subject":[],"published":{"date-parts":[[2020,4,21]]},"assertion":[{"value":"2020-04-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}