{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T15:17:09Z","timestamp":1772205429221,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,3]],"date-time":"2020-07-03T00:00:00Z","timestamp":1593734400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["N02334X\/1"],"award-info":[{"award-number":["N02334X\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,3]]},"DOI":"10.1145\/3357236.3395501","type":"proceedings-article","created":{"date-parts":[[2020,7,5]],"date-time":"2020-07-05T19:29:16Z","timestamp":1593977356000},"page":"841-854","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Strangers in the Room"],"prefix":"10.1145","author":[{"given":"William","family":"Seymour","sequence":"first","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]},{"given":"Reuben","family":"Binns","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]},{"given":"Petr","family":"Slovak","sequence":"additional","affiliation":[{"name":"King's College London, London, United Kingdom"}]},{"given":"Max","family":"Van Kleek","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford, Oxfordshire, United Kingdom"}]},{"given":"Nigel","family":"Shadbolt","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2020,7,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Metrics for HRI workshop, technical report","volume":"471","author":"Bartneck Christoph","year":"2008","unstructured":"Christoph Bartneck , Elizabeth Croft , and Dana Kulic . 2008 . Measuring the anthropomorphism, animacy, likeability, perceived intelligence and perceived safety of robots . In Metrics for HRI workshop, technical report , Vol. 471 . Citeseer, 37--44. Christoph Bartneck, Elizabeth Croft, and Dana Kulic. 2008. Measuring the anthropomorphism, animacy, likeability, perceived intelligence and perceived safety of robots. In Metrics for HRI workshop, technical report, Vol. 471. Citeseer, 37--44."},{"key":"e_1_3_2_1_2_1","volume-title":"Liberty Reader","author":"Berlin Isaiah","unstructured":"Isaiah Berlin . 2017. Two concepts of liberty . In Liberty Reader . Routledge , 33--57. Isaiah Berlin. 2017. Two concepts of liberty. In Liberty Reader. Routledge, 33--57."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3036698"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979249"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2016.01.003"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030118"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370226"},{"key":"e_1_3_2_1_8_1","volume-title":"Autonomy and liberalism","author":"Colburn Ben","unstructured":"Ben Colburn . 2010. Autonomy and liberalism . Routledge . Ben Colburn. 2010. Autonomy and liberalism. Routledge."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557167"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2468417"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-018-0054-5"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-017-9276-y"},{"key":"e_1_3_2_1_13_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS).","author":"Cranor Lorrie Faith","year":"2014","unstructured":"Lorrie Faith Cranor , Adam L Durity , Abigail Marsh , and Blase Ur . 2014 . Parents' and teens' perspectives on privacy in a technology-filled world . In Symposium on Usable Privacy and Security (SOUPS). Lorrie Faith Cranor, Adam L Durity, Abigail Marsh, and Blase Ur. 2014. Parents' and teens' perspectives on privacy in a technology-filled world. In Symposium on Usable Privacy and Security (SOUPS)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0266462307080154"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300581"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2018.1550177"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-7844-3_4"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173876"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188448"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.erss.2014.04.008"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444817700154"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-7957-5_16"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466134"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1177\/1468794109356737"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173578"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1017\/dsi.2019.213"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1093\/cjres"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702260"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466455"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312796"},{"key":"e_1_3_2_1_31_1","unstructured":"Joseph Galen Lindley Paul Coulton Haider Akmal and Brandin Hanson Knowles. 2017. Anticipating GDPR in Smart Homes Through Fictional Conversational Objects. (2017).  Joseph Galen Lindley Paul Coulton Haider Akmal and Brandin Hanson Knowles. 2017. Anticipating GDPR in Smart Homes Through Fictional Conversational Objects. (2017)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2018.23016"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025875"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753421"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-011-9276-4"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025735"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971757"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322286"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1204056"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.3390\/info8030077"},{"key":"e_1_3_2_1_41_1","first-page":"33","article-title":"The uncanny valley","volume":"7","author":"Mori Masahiro","year":"1970","unstructured":"Masahiro Mori . 1970 . The uncanny valley . Energy 7 , 4 (1970), 33 -- 35 . Masahiro Mori. 1970. The uncanny valley. Energy 7, 4 (1970), 33--35.","journal-title":"Energy"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/259964.260137"},{"key":"e_1_3_2_1_43_1","first-page":"29","article-title":"The case for design: Creating a culture of intention","volume":"40","author":"Nelson Harold G","year":"2000","unstructured":"Harold G Nelson and Erik Stolterman . 2000 . The case for design: Creating a culture of intention . Educational Technology 40 , 6 (2000), 29 -- 35 . Harold G Nelson and Erik Stolterman. 2000. The case for design: Creating a culture of intention. Educational Technology 40, 6 (2000), 29--35.","journal-title":"Educational Technology"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-019-01210-7"},{"key":"e_1_3_2_1_45_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum . 2004 . Privacy as contextual integrity . Wash. L. Rev. 79 (2004), 119 . Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79 (2004), 119.","journal-title":"Wash. L. Rev."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2016.34"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370224"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.2307\/1511941"},{"key":"e_1_3_2_1_49_1","unstructured":"Karen Parkhill Christina Demski Catherine Butler Alexa Spence and Nick Pidgeon. 2013. Transforming the UK energy system: public values attitudes and acceptability: synthesis report. (2013).  Karen Parkhill Christina Demski Catherine Butler Alexa Spence and Nick Pidgeon. 2013. Transforming the UK energy system: public values attitudes and acceptability: synthesis report. (2013)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174214"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174033"},{"key":"e_1_3_2_1_52_1","volume-title":"The market potential for Smart Homes","author":"Pragnell Mark","unstructured":"Mark Pragnell , Roger Moore , and Lorna Spence . 2000. The market potential for Smart Homes . York Publishing Services York . Mark Pragnell, Roger Moore, and Lorna Spence. 2000. The market potential for Smart Homes. York Publishing Services York."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053246"},{"key":"e_1_3_2_1_54_1","volume-title":"The media equation: How people treat computers, television, and new media like real people and places","author":"Reeves Byron","unstructured":"Byron Reeves and Clifford Ivar Nass . 1996. The media equation: How people treat computers, television, and new media like real people and places . Cambridge university press . Byron Reeves and Clifford Ivar Nass. 1996. The media equation: How people treat computers, television, and new media like real people and places. Cambridge university press."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466152"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376264"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557421"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173870"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.5555\/1265387.1265392"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632107"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1108\/JICES-12--2018-0096"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1080\/13600869.2017.1298501"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173967"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025556"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858060"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2018.02.002"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-014-0813-0"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240710"},{"key":"e_1_3_2_1_69_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS).","author":"Zeng Eric","year":"2017","unstructured":"Eric Zeng , Shrirang Mare , and Franziska Roesner . 2017 . End user security & privacy concerns with smart homes . In Symposium on Usable Privacy and Security (SOUPS). Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End user security & privacy concerns with smart homes. In Symposium on Usable Privacy and Security (SOUPS)."}],"event":{"name":"DIS '20: Designing Interactive Systems Conference 2020","location":"Eindhoven Netherlands","acronym":"DIS '20","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2020 ACM Designing Interactive Systems Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357236.3395501","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357236.3395501","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:26Z","timestamp":1750200086000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357236.3395501"}},"subtitle":["Unpacking Perceptions of 'Smartness' and Related Ethical Concerns in the Home"],"short-title":[],"issued":{"date-parts":[[2020,7,3]]},"references-count":69,"alternative-id":["10.1145\/3357236.3395501","10.1145\/3357236"],"URL":"https:\/\/doi.org\/10.1145\/3357236.3395501","relation":{},"subject":[],"published":{"date-parts":[[2020,7,3]]},"assertion":[{"value":"2020-07-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}