{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:10:06Z","timestamp":1750201806890,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,25]],"date-time":"2020-04-25T00:00:00Z","timestamp":1587772800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,25]]},"DOI":"10.1145\/3334480.3381436","type":"proceedings-article","created":{"date-parts":[[2020,5,31]],"date-time":"2020-05-31T22:56:35Z","timestamp":1590965795000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["The UX of Things: Exploring UX Principles to Inform Security and Privacy Design in the Smart Home"],"prefix":"10.1145","author":[{"given":"George","family":"Chalhoub","sequence":"first","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2020,4,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Risk and morality: three framing devices. Risk and morality","author":"Adams John","year":"2003","unstructured":"John Adams. 2003. Risk and morality: three framing devices. Risk and morality (2003), 87--106."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.717"},{"key":"e_1_3_2_1_3_1","volume-title":"IoT: the $1 trillion revenue opportunity. (May","author":"Bains Kavi","year":"2018","unstructured":"Kavi Bains, Mark Giles, Robert Wyrzykowski, and Sylwia Kechiche. 2018. IoT: the $1 trillion revenue opportunity. (May 2018)."},{"key":"e_1_3_2_1_4_1","volume-title":"DDoS-capable IoT malwares: Comparative analysis and Mirai investigation. Security and Communication Networks 2018","author":"Donno Michele De","year":"2018","unstructured":"Michele De Donno, Nicola Dragoni, Alberto Giaretta, and Angelo Spognardi. 2018. DDoS-capable IoT malwares: Comparative analysis and Mirai investigation. Security and Communication Networks 2018 (2018)."},{"volume-title":"Designing for emerging technologies: UX for genomics, robotics, and the internet of things. \" O'Reilly Media","author":"Follett Jonathan","key":"e_1_3_2_1_5_1","unstructured":"Jonathan Follett. 2014. Designing for emerging technologies: UX for genomics, robotics, and the internet of things. \" O'Reilly Media, Inc.\"."},{"key":"e_1_3_2_1_6_1","unstructured":"Jesse James Garrett. 2010. The elements of user experience: user-centered design for the web and beyond. Pearson Education."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the European Conference on Cognitive Ergonomics","author":"de Haan Geert","year":"2015","unstructured":"Geert de Haan. 2015. HCI Design Methods: where next? from user-centred to creative design and beyond. In Proceedings of the European Conference on Cognitive Ergonomics 2015. ACM, 6."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2732209.2732216"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/160940690900800406"},{"key":"e_1_3_2_1_10_1","unstructured":"Thorin Klosowski. 2019. How to Protect Your Digital Privacy. (2019)."},{"volume-title":"2018 IEEE Global Engineering Education Conference (EDUCON). IEEE, 1120--1126","author":"Mavroudi Anna","key":"e_1_3_2_1_11_1","unstructured":"Anna Mavroudi, Monica Divitini, Francesco Gianni, Simone Mora, and Dag R. Kvittem. 2018. Designing IoT applications in lower secondary schools. In 2018 IEEE Global Engineering Education Conference (EDUCON). IEEE, 1120--1126."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064663.3064699"},{"key":"e_1_3_2_1_13_1","volume-title":"State of The Art in IoT-Beyond Economic Value","author":"Nicolescu Razvan","year":"2018","unstructured":"Razvan Nicolescu, Michael Huth, Petar Radanliev, and David De Roure. 2018. State of The Art in IoT-Beyond Economic Value. London. (2018)."},{"key":"e_1_3_2_1_14_1","volume-title":"Outrage as Amazon device listens to Brits having sex and swearing. (July","author":"Parker Nick","year":"2019","unstructured":"Nick Parker. 2019. Outrage as Amazon device listens to Brits having sex and swearing. (July 2019)."},{"key":"e_1_3_2_1_15_1","volume-title":"Ann Light, and Alfred Lui","author":"Rowland Claire","year":"2015","unstructured":"Claire Rowland, Elizabeth Goodman, Martin Charlier, Ann Light, and Alfred Lui. 2015. Designing connected products: UX for the consumer Internet of Things. \" O'Reilly Media, Inc.\"."},{"key":"e_1_3_2_1_16_1","volume-title":"Remko Van der Lugt, and Pieter Jan Stappers","author":"Visser Froukje Sleeswijk","year":"2007","unstructured":"Froukje Sleeswijk Visser, Remko Van der Lugt, and Pieter Jan Stappers. 2007. Sharing user experiences in the product innovation process: Participatory design needs participatory communication. Creativity and innovation management 16, 1 (2007), 35--45."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"}],"event":{"name":"CHI '20: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Honolulu HI USA","acronym":"CHI '20"},"container-title":["Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3334480.3381436","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3334480.3381436","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:09Z","timestamp":1750199589000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3334480.3381436"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,25]]},"references-count":17,"alternative-id":["10.1145\/3334480.3381436","10.1145\/3334480"],"URL":"https:\/\/doi.org\/10.1145\/3334480.3381436","relation":{},"subject":[],"published":{"date-parts":[[2020,4,25]]},"assertion":[{"value":"2020-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}