{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T08:37:10Z","timestamp":1758875830810,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T00:00:00Z","timestamp":1599696000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,9,10]]},"DOI":"10.1145\/3410530.3414328","type":"proceedings-article","created":{"date-parts":[[2020,9,12]],"date-time":"2020-09-12T19:56:35Z","timestamp":1599940595000},"page":"212-217","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Providing architectural support for building privacy-sensitive smart home applications"],"prefix":"10.1145","author":[{"given":"Haojian","family":"Jin","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Swarun","family":"Kumar","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Jason","family":"Hong","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2020,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0266462307080154"},{"volume-title":"Presented as part of the 9th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 12). 337--352.","author":"Dixon Colin","key":"e_1_3_2_1_2_1","unstructured":"Colin Dixon , Ratul Mahajan , Sharad Agarwal , AJ Brush , Bongshin Lee , Stefan Saroiu , and Paramvir Bahl . 2012. An operating system for the home . In Presented as part of the 9th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 12). 337--352. Colin Dixon, Ratul Mahajan, Sharad Agarwal, AJ Brush, Bongshin Lee, Stefan Saroiu, and Paramvir Bahl. 2012. An operating system for the home. In Presented as part of the 9th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 12). 337--352."},{"key":"e_1_3_2_1_3_1","unstructured":"Electronic Frontier Foundation. 2020. Ring Doorbell App Packed with Third-Party Trackers | Electronic Frontier Foundation. https:\/\/www.eff.org\/deeplinks\/2020\/01\/ring-doorbell-app-packed-third-party-trackers. (Accessed on 07\/06\/2020).  Electronic Frontier Foundation. 2020. Ring Doorbell App Packed with Third-Party Trackers | Electronic Frontier Foundation. https:\/\/www.eff.org\/deeplinks\/2020\/01\/ring-doorbell-app-packed-third-party-trackers. (Accessed on 07\/06\/2020)."},{"key":"e_1_3_2_1_4_1","unstructured":"Stephen Gandel. 2020. Ring to change privacy settings after study showed it shared personal information with Facebook and Google - CBS News. https:\/\/www.cbsnews.com\/news\/ring-facebook-google-personal-information-privacy-settings-change\/. (Accessed on 07\/04\/2020).  Stephen Gandel. 2020. Ring to change privacy settings after study showed it shared personal information with Facebook and Google - CBS News. https:\/\/www.cbsnews.com\/news\/ring-facebook-google-personal-information-privacy-settings-change\/. (Accessed on 07\/04\/2020)."},{"key":"e_1_3_2_1_5_1","unstructured":"Google. 2020. Nest Aware - Video Recording Subscription for Nest Cams - Google Store. https:\/\/store.google.com\/us\/product\/nest_aware. (Accessed on 07\/06\/2020).  Google. 2020. Nest Aware - Video Recording Subscription for Nest Cams - Google Store. https:\/\/store.google.com\/us\/product\/nest_aware. (Accessed on 07\/06\/2020)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"e_1_3_2_1_7_1","unstructured":"Kashmir Hill. 2020. Activate This 'Bracelet of Silence ' and Alexa Can't Eavesdrop - The New York Times. https:\/\/www.nytimes.com\/2020\/02\/14\/technology\/alexa-jamming-bracelet-privacy-armor.html. (Accessed on 04\/16\/2020).  Kashmir Hill. 2020. Activate This 'Bracelet of Silence ' and Alexa Can't Eavesdrop - The New York Times. https:\/\/www.nytimes.com\/2020\/02\/14\/technology\/alexa-jamming-bracelet-privacy-armor.html. (Accessed on 04\/16\/2020)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990087"},{"volume-title":"End-user privacy in human-computer interaction","author":"Iachello Giovanni","key":"e_1_3_2_1_9_1","unstructured":"Giovanni Iachello and Jason Hong . 2007. End-user privacy in human-computer interaction . Vol. 1 . Foundations and Trends in Human-Computer Interaction . Giovanni Iachello and Jason Hong. 2007. End-user privacy in human-computer interaction. Vol. 1. Foundations and Trends in Human-Computer Interaction."},{"key":"e_1_3_2_1_10_1","unstructured":"IFTTT. 2018. Privacy policy - IFTTT. https:\/\/ifttt.com\/terms. (Accessed on 07\/04\/2020).  IFTTT. 2018. Privacy policy - IFTTT. https:\/\/ifttt.com\/terms. (Accessed on 07\/04\/2020)."},{"key":"e_1_3_2_1_11_1","unstructured":"Anick Jesdanun. 2018. How to plan your smart home --- and weigh privacy risks | The Seattle Times. https:\/\/www.seattletimes.com\/business\/how-to-plan-your-smart-home-and-weigh-privacy-risks\/. (Accessed on 05\/03\/2020).  Anick Jesdanun. 2018. How to plan your smart home --- and weigh privacy risks | The Seattle Times. https:\/\/www.seattletimes.com\/business\/how-to-plan-your-smart-home-and-weigh-privacy-risks\/. (Accessed on 05\/03\/2020)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287051"},{"key":"e_1_3_2_1_13_1","volume-title":"The 25th Annual International Conference on Mobile Computing and Networking. 1--16","author":"Jin Haojian","year":"2019","unstructured":"Haojian Jin , Jingxian Wang , Swarun Kumar , and Jason Hong . 2019 . Software-Defined Cooking using a Microwave Oven . In The 25th Annual International Conference on Mobile Computing and Networking. 1--16 . Haojian Jin, Jingxian Wang, Swarun Kumar, and Jason Hong. 2019. Software-Defined Cooking using a Microwave Oven. In The 25th Annual International Conference on Mobile Computing and Networking. 1--16."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210328"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45809-3_19"},{"key":"e_1_3_2_1_16_1","unstructured":"Alison DeNisco Rayome. 2019. Why consumers still don't trust IoT devices - TechRepublic. https:\/\/www.techrepublic.com\/article\/why-consumers-still-dont-trust-iot-devices\/. (Accessed on 05\/03\/2020).  Alison DeNisco Rayome. 2019. Why consumers still don't trust IoT devices - TechRepublic. https:\/\/www.techrepublic.com\/article\/why-consumers-still-dont-trust-iot-devices\/. (Accessed on 05\/03\/2020)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2011.6091176"}],"event":{"name":"UbiComp\/ISWC '20: 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and 2020 ACM International Symposium on Wearable Computers","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Virtual Event Mexico","acronym":"UbiComp\/ISWC '20"},"container-title":["Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410530.3414328","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3410530.3414328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:59Z","timestamp":1750195919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410530.3414328"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,10]]},"references-count":17,"alternative-id":["10.1145\/3410530.3414328","10.1145\/3410530"],"URL":"https:\/\/doi.org\/10.1145\/3410530.3414328","relation":{},"subject":[],"published":{"date-parts":[[2020,9,10]]},"assertion":[{"value":"2020-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}