{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T12:30:09Z","timestamp":1769862609941,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":73,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100010771","name":"Bundesanstalt f\u00fcr Landwirtschaft und Ern\u00e4hrung","doi-asserted-by":"publisher","award":["28V2306A19"],"award-info":[{"award-number":["28V2306A19"]}],"id":[{"id":"10.13039\/501100010771","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1145\/3461778.3462001","type":"proceedings-article","created":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T20:27:20Z","timestamp":1624912040000},"page":"495-507","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Alexa, We Need to Talk: A Data Literacy Approach on Voice Assistants"],"prefix":"10.1145","author":[{"given":"Dominik","family":"Pins","sequence":"first","affiliation":[{"name":"Fraunhofer Institute for Applied Information Technology FIT, Germany"}]},{"given":"Timo","family":"Jakobi","sequence":"additional","affiliation":[{"name":"Department of Information Systems and New Media, University of Siegen, Germany"}]},{"given":"Alexander","family":"Boden","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Applied Information Technology FIT and Institute for Digital Consumption, University of Applied Science Bonn-Rhein-Sieg, Germany"}]},{"given":"Fatemeh","family":"Alizadeh","sequence":"additional","affiliation":[{"name":"Department of Information Systems and New Media, University of Siegen, Germany"}]},{"given":"Volker","family":"Wulf","sequence":"additional","affiliation":[{"name":"Department of Information Systems and New Media, University of Siegen and Fraunhofer Institute for Applied Information Technology FIT, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,6,28]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"N Abdi K M Ramokapane and J M Such. 2019. More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants. 17. N Abdi K M Ramokapane and J M Such. 2019. More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants. 17."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340764.3344913"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501616"},{"key":"#cr-split#-e_1_3_2_2_5_1.1","doi-asserted-by":"crossref","unstructured":"Victoria Bellotti and Keith Edwards. 2001. Intelligibility and Accountability: Human Considerations in Context-Aware Systems. Human-Computer Interaction 16 2-4: 193-212. https:\/\/doi.org\/10.1207\/S15327051HCI16234_05 10.1207\/S15327051HCI16234_05","DOI":"10.1207\/S15327051HCI16234_05"},{"key":"#cr-split#-e_1_3_2_2_5_1.2","doi-asserted-by":"crossref","unstructured":"Victoria Bellotti and Keith Edwards. 2001. Intelligibility and Accountability: Human Considerations in Context-Aware Systems. Human-Computer Interaction 16 2-4: 193-212. https:\/\/doi.org\/10.1207\/S15327051HCI16234_05","DOI":"10.1207\/S15327051HCI16234_05"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264901"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1628\/186723717X15069451170856"},{"key":"e_1_3_2_2_8_1","volume-title":"Proceedings of the 2011 annual conference on Human factors in computing systems - CHI \u201911","author":"Bernheim Brush A.J.","year":"2011","unstructured":"A.J. Bernheim Brush , Bongshin Lee , Ratul Mahajan , Sharad Agarwal , Stefan Saroiu , and Colin Dixon . 2011 . Home automation in the wild: challenges and opportunities . In Proceedings of the 2011 annual conference on Human factors in computing systems - CHI \u201911 , 2115. https:\/\/doi.org\/10.1145\/1978942.1979249 10.1145\/1978942.1979249 A.J. Bernheim Brush, Bongshin Lee, Ratul Mahajan, Sharad Agarwal, Stefan Saroiu, and Colin Dixon. 2011. Home automation in the wild: challenges and opportunities. In Proceedings of the 2011 annual conference on Human factors in computing systems - CHI \u201911, 2115. https:\/\/doi.org\/10.1145\/1978942.1979249"},{"key":"e_1_3_2_2_9_1","first-page":"3","article-title":"An Imbalance Of Power: The Readability Of Internet Privacy Policies","volume":"2","author":"Cadogan Rochelle A.","year":"2004","unstructured":"Rochelle A. Cadogan . 2004 . An Imbalance Of Power: The Readability Of Internet Privacy Policies . Journal of Business & Economics Research (JBER) 2 , 3 . https:\/\/doi.org\/10.19030\/jber.v2i3.2864 10.19030\/jber.v2i3.2864 Rochelle A. Cadogan. 2004. An Imbalance Of Power: The Readability Of Internet Privacy Policies. Journal of Business & Economics Research (JBER) 2, 3. https:\/\/doi.org\/10.19030\/jber.v2i3.2864","journal-title":"Journal of Business & Economics Research (JBER)"},{"key":"e_1_3_2_2_10_1","volume-title":"Retrieved","author":"Carr Austin","year":"2019","unstructured":"Austin Carr , Matt Day , Sarah Frier , and Mark Gurman . 2019 . Silicon Valley Is Listening to Your Most Intimate Moments. Bloomberg.com . Retrieved April 21, 2020 from https:\/\/www.bloomberg.com\/news\/features\/2019-12-11\/silicon-valley-got-millions-to-let-siri-and-alexa-listen-in Austin Carr, Matt Day, Sarah Frier, and Mark Gurman. 2019. Silicon Valley Is Listening to Your Most Intimate Moments. Bloomberg.com. Retrieved April 21, 2020 from https:\/\/www.bloomberg.com\/news\/features\/2019-12-11\/silicon-valley-got-millions-to-let-siri-and-alexa-listen-in"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025485"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376304"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311957.3361849"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3180286"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322332"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.3571053"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1387649.1387650"},{"key":"e_1_3_2_2_18_1","volume-title":"Proceedings of the 28th international conference on Human factors in computing systems - CHI \u201910","author":"Davidoff Scott","unstructured":"Scott Davidoff , John Zimmerman , and Anind K. Dey . 2010. How routine learners can support family coordination . In Proceedings of the 28th international conference on Human factors in computing systems - CHI \u201910 , 2461. https:\/\/doi.org\/10.1145\/1753326.1753699 10.1145\/1753326.1753699 Scott Davidoff, John Zimmerman, and Anind K. Dey. 2010. How routine learners can support family coordination. In Proceedings of the 28th international conference on Human factors in computing systems - CHI \u201910, 2461. https:\/\/doi.org\/10.1145\/1753326.1753699"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666623"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858214"},{"key":"e_1_3_2_2_21_1","unstructured":"European Parliament and the Council. 2018. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation) (Text with EEA relevance). Retrieved from https:\/\/gdpr-info.eu\/ European Parliament and the Council. 2018. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation) (Text with EEA relevance). Retrieved from https:\/\/gdpr-info.eu\/"},{"key":"e_1_3_2_2_22_1","volume-title":"Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 5933\u20135944","author":"Fischer Joel E.","unstructured":"Joel E. Fischer , Andy Crabtree , Tom Rodden , James A. Colley , Enrico Costanza , Michael O. Jewell , and Sarvapali D. Ramchurn . 2016. \u201cJust whack it on until it gets hot\u201d: Working with IoT Data in the Home . In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 5933\u20135944 . https:\/\/doi.org\/10.1145\/2858036.2858518 10.1145\/2858036.2858518 Joel E. Fischer, Andy Crabtree, Tom Rodden, James A. Colley, Enrico Costanza, Michael O. Jewell, and Sarvapali D. Ramchurn. 2016. \u201cJust whack it on until it gets hot\u201d: Working with IoT Data in the Home. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 5933\u20135944. https:\/\/doi.org\/10.1145\/2858036.2858518"},{"key":"e_1_3_2_2_23_1","volume-title":"Inside the Smart Home","author":"Frohlich David","unstructured":"David Frohlich and Robert Kraut . 2003. The Social Context of Home Computing . In Inside the Smart Home , Richard Harper (ed.). Springer-Verlag , London, 127\u2013162. https:\/\/doi.org\/10.1007\/1-85233-854-7_8 10.1007\/1-85233-854-7_8 David Frohlich and Robert Kraut. 2003. The Social Context of Home Computing. In Inside the Smart Home, Richard Harper (ed.). Springer-Verlag, London, 127\u2013162. https:\/\/doi.org\/10.1007\/1-85233-854-7_8"},{"key":"e_1_3_2_2_24_1","volume-title":"Consumer Attitudes Towards Privacy and Security in Home Assistants. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems - CHI \u201918","author":"Fruchter Nathaniel","year":"2018","unstructured":"Nathaniel Fruchter and Ilaria Liccardi . 2018 . Consumer Attitudes Towards Privacy and Security in Home Assistants. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems - CHI \u201918 , 1\u20136. https:\/\/doi.org\/10.1145\/3170427.3188448 10.1145\/3170427.3188448 Nathaniel Fruchter and Ilaria Liccardi. 2018. Consumer Attitudes Towards Privacy and Security in Home Assistants. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems - CHI \u201918, 1\u20136. https:\/\/doi.org\/10.1145\/3170427.3188448"},{"key":"e_1_3_2_2_25_1","volume-title":"Usable security: history, themes, and challenges","author":"Garfinkel Simson","unstructured":"Simson Garfinkel and Heather Richter Lipford . 2014. Usable security: history, themes, and challenges . Morgan & Claypool Publishers , San Rafael . Simson Garfinkel and Heather Richter Lipford. 2014. Usable security: history, themes, and challenges. Morgan & Claypool Publishers, San Rafael."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300498"},{"key":"e_1_3_2_2_27_1","volume-title":"Strukturwandel der \u00d6ffentlichkeit: Untersuchungen zu einer Kategorie der b\u00fcrgerlichen Gesellschaft\u202f","author":"Habermas J\u00fcrgen","year":"1990","unstructured":"J\u00fcrgen Habermas . 2015. Strukturwandel der \u00d6ffentlichkeit: Untersuchungen zu einer Kategorie der b\u00fcrgerlichen Gesellschaft\u202f ; mit einem Vorwort zur Neuauflage 1990 . Suhrkamp, Frankfurt am Main . J\u00fcrgen Habermas. 2015. Strukturwandel der \u00d6ffentlichkeit: Untersuchungen zu einer Kategorie der b\u00fcrgerlichen Gesellschaft\u202f; mit einem Vorwort zur Neuauflage 1990. Suhrkamp, Frankfurt am Main."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376529"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Timo Jakobi and Gunnar Stevens. 2020. User-friendly Formulation of Data Processing Purposes of Voice Assistants \u2013 A User Perspective on the Principle of Pur- pose Limitation. 12. Timo Jakobi and Gunnar Stevens. 2020. User-friendly Formulation of Data Processing Purposes of Voice Assistants \u2013 A User Perspective on the Principle of Pur- pose Limitation. 12.","DOI":"10.1145\/3404983.3405588"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"crossref","unstructured":"Timo Jakobi Gunnar Stevens Nico Castelli Corinna Ogonowski Florian Schaub Nils Vindice Dave Randall Peter Tolmie and Volker Wulf . 2018. Evolving Needs in IoT Control and Accountability: A Longitudinal Study on Smart Home Intelligibility. Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 2 4 : 171 : 1 - 171 :28. https:\/\/doi.org\/10.1145\/3287049 10.1145\/3287049 Timo Jakobi Gunnar Stevens Nico Castelli Corinna Ogonowski Florian Schaub Nils Vindice Dave Randall Peter Tolmie and Volker Wulf. 2018. Evolving Needs in IoT Control and Accountability: A Longitudinal Study on Smart Home Intelligibility. Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 2 4: 171:1-171:28. https:\/\/doi.org\/10.1145\/3287049","DOI":"10.1145\/3287049"},{"key":"e_1_3_2_2_31_1","unstructured":"Ruogu Kang Laura Dabbish Nathaniel Fruchter and Sara Kiesler. 2015. \u201cMy Data Just Goes Everywhere:\u201d User Mental Models of the Internet and Implications for Privacy and Security. 14. Ruogu Kang Laura Dabbish Nathaniel Fruchter and Sara Kiesler. 2015. \u201cMy Data Just Goes Everywhere:\u201d User Mental Models of the Internet and Implications for Privacy and Security. 14."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376273"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300828"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176349.3176868"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858288"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0068"},{"key":"e_1_3_2_2_38_1","volume-title":"Huang","author":"Mennicken Sarah","year":"2014","unstructured":"Sarah Mennicken , Jonas Hofer , Anind Dey , and Elaine M . Huang . 2014 . Casalendar: a temporal interface for automated homes. In CHI \u201914 Extended Abstracts on Human Factors in Computing Systems , 2161\u20132166. https:\/\/doi.org\/10.1145\/2559206.2581321 10.1145\/2559206.2581321 Sarah Mennicken, Jonas Hofer, Anind Dey, and Elaine M. Huang. 2014. Casalendar: a temporal interface for automated homes. In CHI \u201914 Extended Abstracts on Human Factors in Computing Systems, 2161\u20132166. https:\/\/doi.org\/10.1145\/2559206.2581321"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322286"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0026"},{"key":"e_1_3_2_2_41_1","volume-title":"Proceedings of the 2019 on Designing Interactive Systems Conference - DIS \u201919","author":"Daphne","unstructured":"Daphne A. Muller and Pierre L\u00e9vy. 2019. A Design Approach towards Affording the Trend of Privacy . In Proceedings of the 2019 on Designing Interactive Systems Conference - DIS \u201919 , 435\u2013446. https:\/\/doi.org\/10.1145\/3322276.3322324 10.1145\/3322276.3322324 Daphne A. Muller and Pierre L\u00e9vy. 2019. A Design Approach towards Affording the Trend of Privacy. In Proceedings of the 2019 on Designing Interactive Systems Conference - DIS \u201919, 435\u2013446. https:\/\/doi.org\/10.1145\/3322276.3322324"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.12.002"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-014-0358-z"},{"key":"e_1_3_2_2_44_1","unstructured":"Anne Pfeifle. Alexa What Should We Do about Privacy? Protecting Privacy for Users of Voice-Activated Devices. WASHINGTON LAW REVIEW 93: 39. Anne Pfeifle. Alexa What Should We Do about Privacy? Protecting Privacy for Users of Voice-Activated Devices. WASHINGTON LAW REVIEW 93: 39."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3404983.3405511"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174214"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053246"},{"key":"e_1_3_2_2_48_1","volume-title":"Inside the smart home","author":"Randall Dave","unstructured":"Dave Randall . 2006. Living inside a smart home: A case study . In Inside the smart home . Springer Science & Business Media , London , 227\u2013246. Dave Randall. 2006. Living inside a smart home: A case study. In Inside the smart home. Springer Science & Business Media, London, 227\u2013246."},{"key":"e_1_3_2_2_49_1","volume-title":"Retrieved","author":"Rao Ashwini","year":"2015","unstructured":"Ashwini Rao , Florian Schaub , and Norman Sadeh . 2015 . What do they know about me? Contents and Concerns of Online Behavioral Profiles. arXiv:1506.01675 [cs] . Retrieved February 11, 2021 from http:\/\/arxiv.org\/abs\/1506.01675 Ashwini Rao, Florian Schaub, and Norman Sadeh. 2015. What do they know about me? Contents and Concerns of Online Behavioral Profiles. arXiv:1506.01675 [cs]. Retrieved February 11, 2021 from http:\/\/arxiv.org\/abs\/1506.01675"},{"key":"e_1_3_2_2_50_1","volume-title":"Brian French, Amanda Grannis, James Graves, Fei Liu, Aleecia McDonald","author":"Reidenberg Joel R.","year":"2014","unstructured":"Joel R. Reidenberg , Travis Breaux , Lorrie Faith Cranor , Brian French, Amanda Grannis, James Graves, Fei Liu, Aleecia McDonald , Thomas Norton , Rohan Ramanath, N. Cameron Russell, Norman Sadeh, and Florian Schaub. 2014 . Disagreeable Privacy Policies: Mismatches between Meaning and Userss Understanding. SSRN Electronic Journal. https:\/\/doi.org\/10.2139\/ssrn.2418297 10.2139\/ssrn.2418297 Joel R. Reidenberg, Travis Breaux, Lorrie Faith Cranor, Brian French, Amanda Grannis, James Graves, Fei Liu, Aleecia McDonald, Thomas Norton, Rohan Ramanath, N. Cameron Russell, Norman Sadeh, and Florian Schaub. 2014. Disagreeable Privacy Policies: Mismatches between Meaning and Userss Understanding. SSRN Electronic Journal. https:\/\/doi.org\/10.2139\/ssrn.2418297"},{"key":"e_1_3_2_2_51_1","volume-title":"Retrieved","author":"Saal Marco","year":"2019","unstructured":"Marco Saal . 2019 . Smart Speaker: Fast jeder zweite Deutsche geht mit Alexa ins Bett. https:\/\/www.horizont.net . Retrieved February 11, 2021 from https:\/\/www.horizont.net\/tech\/nachrichten\/smartspeaker-fast-jeder-zweite-deutsche-geht-mit-alexa-ins-bett-175909 Marco Saal. 2019. Smart Speaker: Fast jeder zweite Deutsche geht mit Alexa ins Bett. https:\/\/www.horizont.net. Retrieved February 11, 2021 from https:\/\/www.horizont.net\/tech\/nachrichten\/smartspeaker-fast-jeder-zweite-deutsche-geht-mit-alexa-ins-bett-175909"},{"key":"e_1_3_2_2_52_1","volume-title":"Retrieved","author":"Sch\u00f6nherr Lea","year":"2020","unstructured":"Lea Sch\u00f6nherr , Maximilian Golla , Thorsten Eisenhofer , Jan Wiele , Dorothea Kolossa , and Thorsten Holz . 2020 . Unacceptable, where is my privacy? Exploring Accidental Triggers of Smart Speakers. arXiv:2008.00508 [cs] . Retrieved August 18, 2020 from http:\/\/arxiv.org\/abs\/2008.00508 Lea Sch\u00f6nherr, Maximilian Golla, Thorsten Eisenhofer, Jan Wiele, Dorothea Kolossa, and Thorsten Holz. 2020. Unacceptable, where is my privacy? Exploring Accidental Triggers of Smart Speakers. arXiv:2008.00508 [cs]. Retrieved August 18, 2020 from http:\/\/arxiv.org\/abs\/2008.00508"},{"key":"e_1_3_2_2_53_1","volume-title":"Proceedings of the 2018 on Designing Interactive Systems Conference 2018 - DIS \u201918","author":"Sciuto Alex","year":"1967","unstructured":"Alex Sciuto , Arnita Saini , Jodi Forlizzi , and Jason I. Hong . 2018. \u201cHey Alexa, What's Up?\u201d: A Mixed-Methods Studies of In-Home Conversational Agent Usage . In Proceedings of the 2018 on Designing Interactive Systems Conference 2018 - DIS \u201918 , 857\u2013868. https:\/\/doi.org\/10.1145\/3 1967 09.3196772 10.1145\/3196709.3196772 Alex Sciuto, Arnita Saini, Jodi Forlizzi, and Jason I. Hong. 2018. \u201cHey Alexa, What's Up?\u201d: A Mixed-Methods Studies of In-Home Conversational Agent Usage. In Proceedings of the 2018 on Designing Interactive Systems Conference 2018 - DIS \u201918, 857\u2013868. https:\/\/doi.org\/10.1145\/3196709.3196772"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3308449"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2018.06.029"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/832277.834354"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"crossref","unstructured":"Roger Silverstone and Leslie Haddon. 1996. Design and the Domestication of Information and Communication Technologies: Technical Change and Everyday Life. Roger Silverstone and Leslie Haddon. 1996. Design and the Domestication of Information and Communication Technologies: Technical Change and Everyday Life.","DOI":"10.1093\/oso\/9780198774594.003.0013"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196709.3196766"},{"key":"e_1_3_2_2_59_1","volume-title":"Corbin","author":"Strauss Anselm L.","year":"2010","unstructured":"Anselm L. Strauss and Juliet M . Corbin . 2010 . Grounded theory: Grundlagen qualitativer Sozialforschung. Beltz, Weinheim . Anselm L. Strauss and Juliet M. Corbin. 2010. Grounded theory: Grundlagen qualitativer Sozialforschung. Beltz, Weinheim."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3313021"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369807"},{"key":"e_1_3_2_2_62_1","volume-title":"Retrieved","author":"Tabassum Madiha","year":"2019","unstructured":"Madiha Tabassum , Tomasz Kosinski , and Heather Richter Lipford . 2019 . \u201c I don't own the data\u201d: End User Perceptions of Smart Home Device Data Practices and Risks . Retrieved January 24, 2021 from https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/tabassum Madiha Tabassum, Tomasz Kosinski, and Heather Richter Lipford. 2019. \u201cI don't own the data\u201d: End User Perceptions of Smart Home Device Data Practices and Risks. Retrieved January 24, 2021 from https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/tabassum"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819992"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025556"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395457"},{"key":"e_1_3_2_2_66_1","volume-title":"Home. In 19th International Conference on Mobile and Ubiquitous Multimedia, 71\u201382","author":"Voit Alexandra","unstructured":"Alexandra Voit , Jasmin Niess , Caroline Eckerth , Maike Ernst , Henrike Weing\u00e4rtner , and Pawe\u0142 W. Wo\u017aniak . 2020. \u2018It's not a romantic relationship\u2019: Stories of Adoption and Abandonment of Smart Speakers at Home. In 19th International Conference on Mobile and Ubiquitous Multimedia, 71\u201382 . https:\/\/doi.org\/10.1145\/3428361.3428469 10.1145\/3428361.3428469 Alexandra Voit, Jasmin Niess, Caroline Eckerth, Maike Ernst, Henrike Weing\u00e4rtner, and Pawe\u0142 W. Wo\u017aniak. 2020. \u2018It's not a romantic relationship\u2019: Stories of Adoption and Abandonment of Smart Speakers at Home. In 19th International Conference on Mobile and Ubiquitous Multimedia, 71\u201382. https:\/\/doi.org\/10.1145\/3428361.3428469"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.2307\/1321160"},{"key":"e_1_3_2_2_68_1","volume-title":"Proceedings of the 8th USENIX Security Symposium, 169\u2013184","author":"Whitten Alma","year":"1999","unstructured":"Alma Whitten and J D Tygar . 1999 . Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 . In Proceedings of the 8th USENIX Security Symposium, 169\u2013184 . Alma Whitten and J D Tygar. 1999. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. In Proceedings of the 8th USENIX Security Symposium, 169\u2013184."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901890"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300428"},{"key":"e_1_3_2_2_71_1","unstructured":"Eric Zeng Shrirang Mare and Franziska Roesner. 2017. End User Security & Privacy Concerns with Smart Homes. 17. Retrieved from https:\/\/www.usenix.org\/system\/files\/conference\/soups2017\/soups2017-zeng.pdf Eric Zeng Shrirang Mare and Franziska Roesner. 2017. End User Security & Privacy Concerns with Smart Homes. 17. Retrieved from https:\/\/www.usenix.org\/system\/files\/conference\/soups2017\/soups2017-zeng.pdf"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240704"}],"event":{"name":"DIS '21: Designing Interactive Systems Conference 2021","location":"Virtual Event USA","acronym":"DIS '21","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Designing Interactive Systems Conference 2021"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3461778.3462001","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3461778.3462001","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:07Z","timestamp":1750191427000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3461778.3462001"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":73,"alternative-id":["10.1145\/3461778.3462001","10.1145\/3461778"],"URL":"https:\/\/doi.org\/10.1145\/3461778.3462001","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]},"assertion":[{"value":"2021-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}