{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T03:56:58Z","timestamp":1771473418990,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,6]],"date-time":"2020-10-06T00:00:00Z","timestamp":1601942400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Malm\u00f6 University"},{"name":"Knowledge Foundation"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,6]]},"DOI":"10.1145\/3410992.3411012","type":"proceedings-article","created":{"date-parts":[[2021,2,21]],"date-time":"2021-02-21T01:25:42Z","timestamp":1613870742000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Is your home becoming a spy?"],"prefix":"10.1145","author":[{"given":"Joseph","family":"Bugeja","sequence":"first","affiliation":[{"name":"Malm\u00f6 University, Malm\u00f6, Sweden"}]},{"given":"Andreas","family":"Jacobsson","sequence":"additional","affiliation":[{"name":"Malm\u00f6 University, Malm\u00f6, Sweden"}]},{"given":"Paul","family":"Davidsson","sequence":"additional","affiliation":[{"name":"Malm\u00f6 University, Malm\u00f6, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2020,10,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Abhilasha Ravichander et al. 2019. Question Answering for Privacy Policies: Combining Computational and Legal Perspectives. arXiv preprint arXiv:1911.00841 (2019).  Abhilasha Ravichander et al. 2019. Question Answering for Privacy Policies: Combining Computational and Legal Perspectives. arXiv preprint arXiv:1911.00841 (2019).","DOI":"10.18653\/v1\/D19-1500"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18030817"},{"key":"e_1_3_2_1_3_1","unstructured":"Amazon. 2020. Amazon.com: Amazon SmartPlug works with Alexa - A Certified for Humans Device: Amazon Devices. https:\/\/is.gd\/ESh3fS  Amazon. 2020. Amazon.com: Amazon SmartPlug works with Alexa - A Certified for Humans Device: Amazon Devices. https:\/\/is.gd\/ESh3fS"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the Workshop on AI Problems and Approaches for Intelligent Environments","volume":"907","author":"Assaad","unstructured":"Assaad Moawad et al. 2012. Introducing conviviality as a new paradigm for interactions among IT objects . In Proceedings of the Workshop on AI Problems and Approaches for Intelligent Environments , Vol. 907 . CEUR-WS. org, 3--8. Assaad Moawad et al. 2012. Introducing conviviality as a new paradigm for interactions among IT objects. In Proceedings of the Workshop on AI Problems and Approaches for Intelligent Environments, Vol. 907. CEUR-WS. org, 3--8."},{"key":"e_1_3_2_1_5_1","volume-title":"RFC 7228: Terminology for Constrained-Node Networks. IETF Request For Comments","author":"Bormann Carsten","year":"2014","unstructured":"Carsten Bormann , Mehmet Ersue , and Ari Keranen . 2014. RFC 7228: Terminology for Constrained-Node Networks. IETF Request For Comments ( 2014 ). Carsten Bormann, Mehmet Ersue, and Ari Keranen. 2014. RFC 7228: Terminology for Constrained-Node Networks. IETF Request For Comments (2014)."},{"key":"e_1_3_2_1_6_1","volume-title":"Functional Classification and Quantitative Analysis of Smart Connected Home Devices. In 2018 Global Internet of Things Summit (GIoTS)","author":"Bugeja Joseph","unstructured":"Joseph Bugeja , Paul Davidsson , and Andreas Jacobsson . 2018. Functional Classification and Quantitative Analysis of Smart Connected Home Devices. In 2018 Global Internet of Things Summit (GIoTS) . IEEE , 1--6. Joseph Bugeja, Paul Davidsson, and Andreas Jacobsson. 2018. Functional Classification and Quantitative Analysis of Smart Connected Home Devices. In 2018 Global Internet of Things Summit (GIoTS). IEEE, 1--6."},{"key":"e_1_3_2_1_7_1","volume-title":"Privacy and Identity Management. Data for Better Living: AI and Privacy. Privacy and Identity","author":"Bugeja Joseph","year":"2019","unstructured":"Joseph Bugeja and Andreas Jacobsson . 2020. On the Design of a Privacy-Centered Data Lifecycle for Smart Living Spaces . In Privacy and Identity Management. Data for Better Living: AI and Privacy. Privacy and Identity 2019 . IFIP Advances in Information and Communication Technology, vol 576, Michael Friedewald, Melek \u00d6nen, Eva Lievens, Stephan Krenn, and Samuel Fricker (Eds.). Springer . Joseph Bugeja and Andreas Jacobsson. 2020. On the Design of a Privacy-Centered Data Lifecycle for Smart Living Spaces. In Privacy and Identity Management. Data for Better Living: AI and Privacy. Privacy and Identity 2019. IFIP Advances in Information and Communication Technology, vol 576, Michael Friedewald, Melek \u00d6nen, Eva Lievens, Stephan Krenn, and Samuel Fricker (Eds.). Springer."},{"key":"e_1_3_2_1_8_1","volume-title":"Privacy by design in law, policy and practice. A white paper for regulators, decision-makers and policy-makers","author":"Cavoukian Ann","year":"2011","unstructured":"Ann Cavoukian . 2011. Privacy by design in law, policy and practice. A white paper for regulators, decision-makers and policy-makers ( 2011 ). Ann Cavoukian. 2011. Privacy by design in law, policy and practice. A white paper for regulators, decision-makers and policy-makers (2011)."},{"key":"e_1_3_2_1_9_1","unstructured":"C\u00e9dric L\u00e9vy-Bencheton etal 2015. Security and resilience of smart home environments. European union agency for network and information security (2015).  C\u00e9dric L\u00e9vy-Bencheton et al. 2015. Security and resilience of smart home environments. European union agency for network and information security (2015)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2503881"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-30164-8_506"},{"key":"e_1_3_2_1_12_1","unstructured":"Deepak Kumar et al. 2019. All things considered: an analysis of IoT devices on home networks. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 1169--1185.  Deepak Kumar et al. 2019. All things considered: an analysis of IoT devices on home networks. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 1169--1185."},{"key":"e_1_3_2_1_13_1","unstructured":"Google. 2020. Google Home - Smart h\u00f6gtalare och assistent f\u00f6r hemmet - Google Store. https:\/\/store.google.com\/product\/google_home  Google. 2020. Google Home - Smart h\u00f6gtalare och assistent f\u00f6r hemmet - Google Store. https:\/\/store.google.com\/product\/google_home"},{"key":"e_1_3_2_1_14_1","unstructured":"Google. 2020. Nest Cam Indoor. https:\/\/store.google.com\/product\/nest_cam  Google. 2020. Nest Cam Indoor. https:\/\/store.google.com\/product\/nest_cam"},{"key":"e_1_3_2_1_15_1","volume-title":"Data mining: concepts and techniques","author":"Han Jiawei","unstructured":"Jiawei Han , Jian Pei , and Micheline Kamber . 2011. Data mining: concepts and techniques . Elsevier . Jiawei Han, Jian Pei, and Micheline Kamber. 2011. Data mining: concepts and techniques. Elsevier."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2015.7224918"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2017.2940957"},{"key":"e_1_3_2_1_18_1","unstructured":"Amazon Inc. 2020. Fire TV Family - Amazon Devices. https:\/\/is.gd\/gx6pCl  Amazon Inc. 2020. Fire TV Family - Amazon Devices. https:\/\/is.gd\/gx6pCl"},{"key":"e_1_3_2_1_19_1","unstructured":"Apple Inc. 2020. HomePod - Apple. https:\/\/www.apple.com\/homepod  Apple Inc. 2020. HomePod - Apple. https:\/\/www.apple.com\/homepod"},{"key":"e_1_3_2_1_20_1","unstructured":"FitBit Inc. 2020. FitBit Ionic Watch. https:\/\/www.fitbit.com\/se\/ionic  FitBit Inc. 2020. FitBit Ionic Watch. https:\/\/www.fitbit.com\/se\/ionic"},{"key":"e_1_3_2_1_21_1","unstructured":"Facebook Inc. 2020. Smart Video Calling with Alexa Built-in | Portal from Facebook. https:\/\/portal.facebook.com  Facebook Inc. 2020. Smart Video Calling with Alexa Built-in | Portal from Facebook. https:\/\/portal.facebook.com"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the Internet Measurement Conference. 267--279","author":"Jingjing","unstructured":"Jingjing Ren et al. 2019. Information exposure from consumer iot devices: A multidimensional, network-informed measurement approach . In Proceedings of the Internet Measurement Conference. 267--279 . Jingjing Ren et al. 2019. Information exposure from consumer iot devices: A multidimensional, network-informed measurement approach. In Proceedings of the Internet Measurement Conference. 267--279."},{"key":"e_1_3_2_1_23_1","volume-title":"Finding groups in data: an introduction to cluster analysis","author":"Kaufman Leonard","unstructured":"Leonard Kaufman and Peter J Rousseeuw . 2009. Finding groups in data: an introduction to cluster analysis . Vol. 344 . John Wiley & Sons . Leonard Kaufman and Peter J Rousseeuw. 2009. Finding groups in data: an introduction to cluster analysis. Vol. 344. John Wiley & Sons."},{"key":"e_1_3_2_1_24_1","unstructured":"Wyze Labs. 2020. Wyze | Making Great Technology Accessible | Smart Home Devices. https:\/\/wyze.com  Wyze Labs. 2020. Wyze | Making Great Technology Accessible | Smart Home Devices. https:\/\/wyze.com"},{"key":"e_1_3_2_1_25_1","volume-title":"Understanding user privacy in Internet of Things environments. In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","author":"Lee Hosub","unstructured":"Hosub Lee and Alfred Kobsa . 2016. Understanding user privacy in Internet of Things environments. In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT) . IEEE , 407--412. Hosub Lee and Alfred Kobsa. 2016. Understanding user privacy in Internet of Things environments. In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, 407--412."},{"key":"e_1_3_2_1_26_1","volume-title":"A framework for computing the privacy scores of users in online social networks. ACM Transactions on Knowledge Discovery from Data (TKDD) 5, 1","author":"Liu Kun","year":"2010","unstructured":"Kun Liu and Evimaria Terzi . 2010. A framework for computing the privacy scores of users in online social networks. ACM Transactions on Knowledge Discovery from Data (TKDD) 5, 1 ( 2010 ), 1--30. Kun Liu and Evimaria Terzi. 2010. A framework for computing the privacy scores of users in online social networks. ACM Transactions on Knowledge Discovery from Data (TKDD) 5, 1 (2010), 1--30."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41303-017-0066-x"},{"key":"e_1_3_2_1_28_1","volume-title":"Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research 15, 4","author":"Malhotra Naresh K","year":"2004","unstructured":"Naresh K Malhotra , Sung S Kim , and James Agarwal . 2004. Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research 15, 4 ( 2004 ), 336--355. Naresh K Malhotra, Sung S Kim, and James Agarwal. 2004. Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research 15, 4 (2004), 336--355."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Muhammad Raisul Alam etal 2012. A review of smart homes---Past present and future. IEEE transactions on systems man and cybernetics part C (applications and reviews) 42 6 (2012) 1190--1203.  Muhammad Raisul Alam et al. 2012. A review of smart homes---Past present and future. IEEE transactions on systems man and cybernetics part C (applications and reviews) 42 6 (2012) 1190--1203.","DOI":"10.1109\/TSMCC.2012.2189204"},{"key":"e_1_3_2_1_30_1","unstructured":"Ring. 2020. Video Doorbell | Smart Doorbell Camera Wireless or Wired | Ring. https:\/\/shop.ring.com\/products\/video-doorbell  Ring. 2020. Video Doorbell | Smart Doorbell Camera Wireless or Wired | Ring. https:\/\/shop.ring.com\/products\/video-doorbell"},{"key":"e_1_3_2_1_31_1","series-title":"Series Y: Global information infrastructure, internet protocol aspects and next-generation networks-Frameworks and functional architecture models. (2012)","volume-title":"2060: Overview of the Internet of things","author":"Telecommunication Standardization Sector ITU","year":"2060","unstructured":"ITU Telecommunication Standardization Sector . 2012. Recommendation ITU-T Y. 2060: Overview of the Internet of things . Series Y: Global information infrastructure, internet protocol aspects and next-generation networks-Frameworks and functional architecture models. (2012) , 2060 --201206. ITU Telecommunication Standardization Sector. 2012. Recommendation ITU-T Y. 2060: Overview of the Internet of things. Series Y: Global information infrastructure, internet protocol aspects and next-generation networks-Frameworks and functional architecture models. (2012), 2060--201206."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"J. Sturgess J. R. C. Nurse and J. Zhao. 2018. A capability-oriented approach to assessing privacy risk in smart home ecosystems. In Living in the Internet of Things: Cybersecurity of the IoT - 2018. 1--8.  J. Sturgess J. R. C. Nurse and J. Zhao. 2018. A capability-oriented approach to assessing privacy risk in smart home ecosystems. In Living in the Internet of Things: Cybersecurity of the IoT - 2018. 1--8.","DOI":"10.1049\/cp.2018.0037"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"R. Thorburn A. Margheri and F. Paci. 2019. Towards an integrated privacy protection framework for IoT: Contextualising regulatory requirements with industry best practices. In Living in the Internet of Things (IoT 2019). 1--6.  R. Thorburn A. Margheri and F. Paci. 2019. Towards an integrated privacy protection framework for IoT: Contextualising regulatory requirements with industry best practices. In Living in the Internet of Things (IoT 2019). 1--6.","DOI":"10.1049\/cp.2019.0170"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9868.00293"},{"key":"e_1_3_2_1_36_1","volume-title":"How We Evaluated the Products in Mozilla's *privacy not included Buyer's Guide","author":"Tsai Janice","year":"2018","unstructured":"Janice Tsai . 2019. How We Evaluated the Products in Mozilla's *privacy not included Buyer's Guide ( 2018 ). https:\/\/is.gd\/5K93GE Janice Tsai. 2019. How We Evaluated the Products in Mozilla's *privacy not included Buyer's Guide (2018). https:\/\/is.gd\/5K93GE"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-57959-7","volume-title":"The eu general data protection regulation (gdpr). A Practical Guide","author":"Voigt Paul","year":"2017","unstructured":"Paul Voigt and Axel Von dem Bussche . 2017. The eu general data protection regulation (gdpr). A Practical Guide , 1 st Ed., Cham : Springer International Publishing ( 2017 ). Paul Voigt and Axel Von dem Bussche. 2017. The eu general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing (2017).","edition":"1"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2015.07.002"},{"key":"e_1_3_2_1_39_1","volume-title":"User acceptance of smart home services: an extension of the theory of planned behavior. Industrial Management & Data Systems","author":"Yang Heetae","year":"2017","unstructured":"Heetae Yang , Hwansoo Lee , and Hangjung Zo. 2017. User acceptance of smart home services: an extension of the theory of planned behavior. Industrial Management & Data Systems ( 2017 ). Heetae Yang, Hwansoo Lee, and Hangjung Zo. 2017. User acceptance of smart home services: an extension of the theory of planned behavior. Industrial Management & Data Systems (2017)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.795"}],"event":{"name":"IoT '20: 10th International Conference on the Internet of Things","location":"Malm\u00f6 Sweden","acronym":"IoT '20"},"container-title":["Proceedings of the 10th International Conference on the Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410992.3411012","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3410992.3411012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:56Z","timestamp":1750195916000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410992.3411012"}},"subtitle":["a data-centered analysis and classification of smart connected home systems"],"short-title":[],"issued":{"date-parts":[[2020,10,6]]},"references-count":40,"alternative-id":["10.1145\/3410992.3411012","10.1145\/3410992"],"URL":"https:\/\/doi.org\/10.1145\/3410992.3411012","relation":{},"subject":[],"published":{"date-parts":[[2020,10,6]]},"assertion":[{"value":"2020-10-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}