{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T14:36:54Z","timestamp":1776091014482,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,22]],"date-time":"2020-11-22T00:00:00Z","timestamp":1606003200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Federal Ministry of Education and Research","award":["SWC 2.0 PrivacyGate 01"],"award-info":[{"award-number":["SWC 2.0 PrivacyGate 01"]}]},{"name":"Deutsche Forschungsgemeinschaft","award":["251805230\/GRK 2050"],"award-info":[{"award-number":["251805230\/GRK 2050"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,22]]},"DOI":"10.1145\/3428361.3428464","type":"proceedings-article","created":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T00:33:22Z","timestamp":1606091602000},"page":"83-95","source":"Crossref","is-referenced-by-count":39,"title":["\u201cYou just can\u2019t know about everything\u201d: Privacy Perceptions of Smart Home Visitors"],"prefix":"10.1145","author":[{"given":"Karola","family":"Marky","sequence":"first","affiliation":[{"name":"TU Darmstadt"}]},{"given":"Sarah","family":"Prange","sequence":"additional","affiliation":[{"name":"Universit\u00e4t der Bundeswehr"}]},{"given":"Florian","family":"Krell","sequence":"additional","affiliation":[{"name":"TU Darmstadt"}]},{"given":"Max","family":"M\u00fchlh\u00e4user","sequence":"additional","affiliation":[{"name":"TU Darmstadt"}]},{"given":"Florian","family":"Alt","sequence":"additional","affiliation":[{"name":"Universit\u00e4t der Bundeswehr"}]}],"member":"320","published-online":{"date-parts":[[2020,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the Symposium on Usable Privacy and Security(SOUPS \u201919)","author":"Abdi Noura","year":"2019","unstructured":"Noura Abdi , Kopo\u00a0 M. Ramokapane , and Jose\u00a0 M. Such . 2019 . More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants . In Proceedings of the Symposium on Usable Privacy and Security(SOUPS \u201919) . USENIX Association, Berkeley, CA, USA, 1\u201316. Noura Abdi, Kopo\u00a0M. Ramokapane, and Jose\u00a0M. Such. 2019. More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants. In Proceedings of the Symposium on Usable Privacy and Security(SOUPS \u201919). USENIX Association, Berkeley, CA, USA, 1\u201316."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.77"},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3, 3, Article 72 (Sept.","author":"Alharbi Rawan","year":"2019","unstructured":"Rawan Alharbi , Mariam Tolba , Lucia\u00a0 C. Petito , Josiah Hester , and Nabil Alshurafa . 2019 . To Mask or Not to Mask? Balancing Privacy with Visual Confirmation Utility in Activity-Oriented Wearable Cameras . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3, 3, Article 72 (Sept. 2019), 29\u00a0pages. https:\/\/doi.org\/10.1145\/3351230 Rawan Alharbi, Mariam Tolba, Lucia\u00a0C. Petito, Josiah Hester, and Nabil Alshurafa. 2019. To Mask or Not to Mask? Balancing Privacy with Visual Confirmation Utility in Activity-Oriented Wearable Cameras. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3, 3, Article 72 (Sept. 2019), 29\u00a0pages. https:\/\/doi.org\/10.1145\/3351230"},{"key":"e_1_3_2_1_4_1","first-page":"3","article-title":"Special Issue: Emerging Trends in Usable Security and Privacy","volume":"18","author":"Alt Florian","year":"2019","unstructured":"Florian Alt and Emanuel von Zezschwitz ( Eds .). 2019 . Special Issue: Emerging Trends in Usable Security and Privacy . Journal of Interactive Media (icom) 18 , 3 (Dec. 2019). Florian Alt and Emanuel von Zezschwitz (Eds.). 2019. Special Issue: Emerging Trends in Usable Security and Privacy. Journal of Interactive Media (icom) 18, 3 (Dec. 2019).","journal-title":"Journal of Interactive Media (icom)"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214262"},{"key":"e_1_3_2_1_6_1","volume-title":"Qualitative HCI Research: Going Behind the Scenes. Vol.\u00a09","author":"Blandford Ann","unstructured":"Ann Blandford , Dominic Furniss , and Stephann Makri . 2016. Qualitative HCI Research: Going Behind the Scenes. Vol.\u00a09 . Morgan & Claypool Publishers . 1\u2013115 pages. Ann Blandford, Dominic Furniss, and Stephann Makri. 2016. Qualitative HCI Research: Going Behind the Scenes. Vol.\u00a09. Morgan & Claypool Publishers. 1\u2013115 pages."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Denys Brand Florence D.\u00a0DiGennaro Reed Mariah\u00a0D. Morley Tyler\u00a0G. Erath and Matthew\u00a0D. Novak. 2019. A Survey Assessing Privacy Concerns of Smart-Home Services Provided to Individuals with Disabilities. Behavior Analysis in Practice(2019) 1\u201311. https:\/\/doi.org\/10.1007\/s40617-018-00329-y  Denys Brand Florence D.\u00a0DiGennaro Reed Mariah\u00a0D. Morley Tyler\u00a0G. Erath and Matthew\u00a0D. Novak. 2019. A Survey Assessing Privacy Concerns of Smart-Home Services Provided to Individuals with Disabilities. Behavior Analysis in Practice(2019) 1\u201311. https:\/\/doi.org\/10.1007\/s40617-018-00329-y","DOI":"10.1007\/s40617-018-00329-y"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370226"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/HCI2016.62"},{"key":"e_1_3_2_1_10_1","volume-title":"Can I Trust You?Computer 50, 9","author":"Chung Hyunji","year":"2017","unstructured":"Hyunji Chung , Michaela Iorga , Jeffrey Voas , and Sangjin Lee . 2017. Alexa , Can I Trust You?Computer 50, 9 ( 2017 ), 100\u2013104. https:\/\/doi.org\/10.1109\/MC.2017.3571053 Hyunji Chung, Michaela Iorga, Jeffrey Voas, and Sangjin Lee. 2017. Alexa, Can I Trust You?Computer 50, 9 (2017), 100\u2013104. https:\/\/doi.org\/10.1109\/MC.2017.3571053"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376389"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.1.104"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367733"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367733"},{"key":"e_1_3_2_1_15_1","first-page":"05797","article-title":"Security and Privacy Approaches in Mixed Reality: A Literature Survey. Cryptology ePrint Archive","volume":"1802","author":"de Guzman A.","year":"2018","unstructured":"Jaybie\u00a0 A. de Guzman , Kanchana Thilakarathna , and Aruna Seneviratne . 2018 . Security and Privacy Approaches in Mixed Reality: A Literature Survey. Cryptology ePrint Archive , Report 1802 . 05797 . (2018), 1\u201340. https:\/\/doi.org\/10.1145\/3359626 https:\/\/arxiv.org\/pdf\/1802.05797.pdf. Jaybie\u00a0A. de Guzman, Kanchana Thilakarathna, and Aruna Seneviratne. 2018. Security and Privacy Approaches in Mixed Reality: A Literature Survey. Cryptology ePrint Archive, Report 1802.05797. (2018), 1\u201340. https:\/\/doi.org\/10.1145\/3359626 https:\/\/arxiv.org\/pdf\/1802.05797.pdf.","journal-title":"Report"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557352"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3161190"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Pardis Emami-Naeini Yuvraj Agarwal Lorrie\u00a0Faith Cranor and Hanan Hibshi. 2020. Ask the Experts: What Should Be on an IoT Privacy and Security Label?arxiv:cs.CY\/2002.04631  Pardis Emami-Naeini Yuvraj Agarwal Lorrie\u00a0Faith Cranor and Hanan Hibshi. 2020. Ask the Experts: What Should Be on an IoT Privacy and Security Label?arxiv:cs.CY\/2002.04631","DOI":"10.1109\/SP40000.2020.00043"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the Symposium on Usable Privacy and Security(SOUPS \u201917)","author":"Emami-Naeini Pardis","year":"2017","unstructured":"Pardis Emami-Naeini , Sruti Bhagavatula , Hana Habib , Martin Degeling , Lujo Bauer , Lorrie Cranor , and Norman Sadeh . 2017 . Privacy Expectations and Preferences in an IoT World . In Proceedings of the Symposium on Usable Privacy and Security(SOUPS \u201917) . USENIX Association, Berkeley, CA, USA, 399\u2013412. Pardis Emami-Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Cranor, and Norman Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. In Proceedings of the Symposium on Usable Privacy and Security(SOUPS \u201917). USENIX Association, Berkeley, CA, USA, 399\u2013412."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2017.03.003"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2018.1456150"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300498"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01516-8_26"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632079"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025799"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785842"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173225.3173234"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45809-3_19"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"e_1_3_2_1_32_1","volume-title":"CHI \u201903 Extended Abstracts on Human Factors in Computing Systems (Ft.","author":"Lederer Scott","unstructured":"Scott Lederer , Jennifer Mankoff , and Anind\u00a0 K. Dey . 2003. Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing . In CHI \u201903 Extended Abstracts on Human Factors in Computing Systems (Ft. Lauderdale, Florida, USA ) (CHI EA \u201903). Association for Computing Machinery , New York, NY, USA, 724\u2013725. https:\/\/doi.org\/10.1145\/765891.765952 Scott Lederer, Jennifer Mankoff, and Anind\u00a0K. Dey. 2003. Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. In CHI \u201903 Extended Abstracts on Human Factors in Computing Systems (Ft. Lauderdale, Florida, USA) (CHI EA \u201903). Association for Computing Machinery, New York, NY, USA, 724\u2013725. https:\/\/doi.org\/10.1145\/765891.765952"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0035"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420164"},{"key":"e_1_3_2_1_35_1","volume-title":"McCann and Eileen Clark","author":"V.","year":"2003","unstructured":"Terence\u00a0 V. McCann and Eileen Clark . 2003 . Grounded Theory in Nursing Research : Part 1 \u2013 Methodology . (2003). Terence\u00a0V. McCann and Eileen Clark. 2003. Grounded Theory in Nursing Research: Part 1 \u2013 Methodology. (2003)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025735"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.0009"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_17"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409661"},{"key":"e_1_3_2_1_40_1","volume-title":"Researching Information Systems and Computing","author":"Oates J.","unstructured":"Briony\u00a0 J. Oates . 2005. Researching Information Systems and Computing . Sage . Briony\u00a0J. Oates. 2005. Researching Information Systems and Computing. Sage."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics7120379"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the International Workshop Sensing Applications on Mobile Phones(PhoneSense \u201911)","author":"Pidcock Sarah","year":"2011","unstructured":"Sarah Pidcock , Rob Smits , Urs Hengartner , and Ian Goldberg . 2011 . Notisense: An Urban Sensing Notification System to Improve Bystander Privacy . In Proceedings of the International Workshop Sensing Applications on Mobile Phones(PhoneSense \u201911) . 1\u20135. Sarah Pidcock, Rob Smits, Urs Hengartner, and Ian Goldberg. 2011. Notisense: An Urban Sensing Notification System to Improve Bystander Privacy. In Proceedings of the International Workshop Sensing Applications on Mobile Phones(PhoneSense \u201911). 1\u20135."},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 1649\u20131658","author":"Portnoff S","year":"2015","unstructured":"Rebecca\u00a0 S Portnoff , Linda\u00a0 N Lee , Serge Egelman , Pratyush Mishra , Derek Leung , and David Wagner . 2015 . Somebody\u2019s watching me? assessing the effectiveness of webcam indicator lights . In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 1649\u20131658 . Rebecca\u00a0S Portnoff, Linda\u00a0N Lee, Serge Egelman, Pratyush Mishra, Derek Leung, and David Wagner. 2015. Somebody\u2019s watching me? assessing the effectiveness of webcam indicator lights. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 1649\u20131658."},{"key":"e_1_3_2_1_44_1","volume-title":"IFIP Summer School on the Future of Identity in the Information Society","author":"P\u00f6tzsch Stefanie","unstructured":"Stefanie P\u00f6tzsch . 2008. Privacy awareness: A means to solve the privacy paradox? . In IFIP Summer School on the Future of Identity in the Information Society . Springer , 226\u2013236. Stefanie P\u00f6tzsch. 2008. Privacy awareness: A means to solve the privacy paradox?. In IFIP Summer School on the Future of Identity in the Information Society. Springer, 226\u2013236."},{"key":"e_1_3_2_1_45_1","volume-title":"Family-Centered Exploration of the Benefits and Burdens of Digital Home Assistants. In Extended Abstracts of the CHI Conference on Human Factors in Computing Systems(CHI EA \u201919)","author":"Richards K.","year":"2019","unstructured":"Olivia\u00a0 K. Richards . 2019 . Family-Centered Exploration of the Benefits and Burdens of Digital Home Assistants. In Extended Abstracts of the CHI Conference on Human Factors in Computing Systems(CHI EA \u201919) . ACM, SRC11. https:\/\/doi.org\/10.1145\/3290607.3308458 Olivia\u00a0K. Richards. 2019. Family-Centered Exploration of the Benefits and Burdens of Digital Home Assistants. In Extended Abstracts of the CHI Conference on Human Factors in Computing Systems(CHI EA \u201919). ACM, SRC11. https:\/\/doi.org\/10.1145\/3290607.3308458"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466152"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376585"},{"key":"e_1_3_2_1_48_1","volume-title":"Smart Home Worldwirde. https:\/\/www.statista.com\/outlook\/279\/100\/smart-home\/worldwide(Accessed","year":"2020","unstructured":"Statista. 2019. Smart Home Worldwirde. https:\/\/www.statista.com\/outlook\/279\/100\/smart-home\/worldwide(Accessed January 2020 ). Statista. 2019. Smart Home Worldwirde. https:\/\/www.statista.com\/outlook\/279\/100\/smart-home\/worldwide(Accessed January 2020)."},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the Fifteenth Symposium on Usable Privacy and Security(SOUPS \u201919)","author":"Tabassum Madiha","year":"2019","unstructured":"Madiha Tabassum , Tomasz Kosinski , and Heather\u00a0Richter Lipford . 2019 . I Don\u2019t Own the Data\u201d: End User Perceptions of Smart Home Device Data Practices and Risks . In Proceedings of the Fifteenth Symposium on Usable Privacy and Security(SOUPS \u201919) . Madiha Tabassum, Tomasz Kosinski, and Heather\u00a0Richter Lipford. 2019. I Don\u2019t Own the Data\u201d: End User Perceptions of Smart Home Device Data Practices and Risks. In Proceedings of the Fifteenth Symposium on Usable Privacy and Security(SOUPS \u201919)."},{"key":"e_1_3_2_1_50_1","unstructured":"Christian Tiefenau Maximilian H\u00e4ring Eva Gerlitz and Emanuel von Zezschwitz. 2019. Making Privacy Graspable: Can we Nudge Users to use Privacy Enhancing Techniques?arxiv:cs.HC\/1911.07701  Christian Tiefenau Maximilian H\u00e4ring Eva Gerlitz and Emanuel von Zezschwitz. 2019. Making Privacy Graspable: Can we Nudge Users to use Privacy Enhancing Techniques?arxiv:cs.HC\/1911.07701"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632107"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1071\/CH9490149"},{"key":"e_1_3_2_1_53_1","unstructured":"Katrin Wolf Karola Marky and Markus Funk. 2018. We should start thinking about Privacy Implications of Sonic Input in Everyday Augmented Reality!Mensch und Computer 2018-Workshopband(2018). https:\/\/doi.org\/10.18420\/muc2018-ws07-0466  Katrin Wolf Karola Marky and Markus Funk. 2018. We should start thinking about Privacy Implications of Sonic Input in Everyday Augmented Reality!Mensch und Computer 2018-Workshopband(2018). https:\/\/doi.org\/10.18420\/muc2018-ws07-0466"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901890"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300428"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"},{"key":"e_1_3_2_1_57_1","volume-title":"Proceedings of the Symposium on Usable Privacy and Security(SOUPS \u201917)","author":"Zeng Eric","year":"2017","unstructured":"Eric Zeng , Shrirang Mare , and Franziska Roesner . 2017 . End User Security & Privacy Concerns with Smart Homes . In Proceedings of the Symposium on Usable Privacy and Security(SOUPS \u201917) . USENIX Association, Berkeley, CA, USA, 65\u201380. Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security & Privacy Concerns with Smart Homes. In Proceedings of the Symposium on Usable Privacy and Security(SOUPS \u201917). USENIX Association, Berkeley, CA, USA, 65\u201380."},{"key":"e_1_3_2_1_58_1","volume-title":"Proceedings of the USENIX Security Symposium(USENIX Security \u201919)","author":"Zeng Eric","year":"2019","unstructured":"Eric Zeng and Franziska Roesner . 2019 . Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study . In Proceedings of the USENIX Security Symposium(USENIX Security \u201919) . USENIX Association, Berkeley, CA, USA, 159\u2013176. Eric Zeng and Franziska Roesner. 2019. Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study. In Proceedings of the USENIX Security Symposium(USENIX Security \u201919). USENIX Association, Berkeley, CA, USA, 159\u2013176."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.4236\/jss.2014.211017"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"key":"e_1_3_2_1_61_1","volume-title":"Privacy and Security Concerns of Smart Home Technologies. i-com 18, 3","author":"Zimmermann Verena","year":"2019","unstructured":"Verena Zimmermann , Paul Gerber , Karola Marky , Leon B\u00f6ck , and Florian Kirchbuchner . 2019. Assessing Users \u2019 Privacy and Security Concerns of Smart Home Technologies. i-com 18, 3 ( 2019 ), 197\u2013216. https:\/\/doi.org\/10.1515\/icom-2019-0015 Verena Zimmermann, Paul Gerber, Karola Marky, Leon B\u00f6ck, and Florian Kirchbuchner. 2019. Assessing Users\u2019 Privacy and Security Concerns of Smart Home Technologies. i-com 18, 3 (2019), 197\u2013216. https:\/\/doi.org\/10.1515\/icom-2019-0015"}],"event":{"name":"MUM 2020: 19th International Conference on Mobile and Ubiquitous Multimedia","location":"Essen Germany","acronym":"MUM 2020"},"container-title":["19th International Conference on Mobile and Ubiquitous Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428361.3428464","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3428361.3428464","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:59Z","timestamp":1750197779000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428361.3428464"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,22]]},"references-count":61,"alternative-id":["10.1145\/3428361.3428464","10.1145\/3428361"],"URL":"https:\/\/doi.org\/10.1145\/3428361.3428464","relation":{},"subject":[],"published":{"date-parts":[[2020,11,22]]}}}