{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T12:05:06Z","timestamp":1773144306633,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,23]],"date-time":"2021-10-23T00:00:00Z","timestamp":1634947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,23]]},"DOI":"10.1145\/3462204.3481724","type":"proceedings-article","created":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T22:38:59Z","timestamp":1634942339000},"page":"364-367","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Designing for Data Awareness: Addressing Privacy and Security Concerns About \u201cSmart\u201d Technologies"],"prefix":"10.1145","author":[{"given":"Jessica","family":"Vitak","sequence":"first","affiliation":[{"name":"College of Information Studies, University of Maryland, USA"}]},{"given":"Michael","family":"Zimmer","sequence":"additional","affiliation":[{"name":"Computer Science, Marquette University, USA"}]},{"given":"Anna","family":"Lenhart","sequence":"additional","affiliation":[{"name":"College of Information Studies, University of Maryland, USA"}]},{"given":"Sunyup","family":"Park","sequence":"additional","affiliation":[{"name":"College of Information Studies, University of Maryland, USA"}]},{"given":"Richmond","family":"Y. Wong","sequence":"additional","affiliation":[{"name":"Center for Long-Term Cybersecurity, University of California Berkeley, USA"}]},{"given":"Yaxing","family":"Yao","sequence":"additional","affiliation":[{"name":"Department of Information Systems, University of Maryland Baltimore County, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,10,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214262"},{"key":"e_1_3_2_1_2_1","unstructured":"Juanita Brown. 2010. The World Caf\u00e9: Shaping Our Futures Through Conversations That Matter. ReadHowYouWant.com.  Juanita Brown. 2010. The World Caf\u00e9: Shaping Our Futures Through Conversations That Matter. ReadHowYouWant.com."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397333"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"e_1_3_2_1_5_1","volume-title":"Information in Contemporary Society (Lecture Notes in Computer Science)","author":"Liao Yuting","unstructured":"Yuting Liao , Jessica Vitak , Priya Kumar , Michael Zimmer , and Katherine Kritikos . 2019. Understanding the Role of Privacy and Trust in Intelligent Personal Assistant Adoption . In Information in Contemporary Society (Lecture Notes in Computer Science) , Springer International Publishing , Cham , 102\u2013113. DOI: https:\/\/doi.org\/10.1007\/978-3-030-15742-5_9 10.1007\/978-3-030-15742-5_9 Yuting Liao, Jessica Vitak, Priya Kumar, Michael Zimmer, and Katherine Kritikos. 2019. Understanding the Role of Privacy and Trust in Intelligent Personal Assistant Adoption. In Information in Contemporary Society (Lecture Notes in Computer Science), Springer International Publishing, Cham, 102\u2013113. DOI: https:\/\/doi.org\/10.1007\/978-3-030-15742-5_9"},{"key":"e_1_3_2_1_6_1","volume-title":"Smart Home Market worth $135.3 billion by","author":"Markets Markets","year":"2025","unstructured":"Markets and Markets . 2020. Smart Home Market worth $135.3 billion by 2025 . Available: https:\/\/www.marketsandmarkets.com\/PressReleases\/global-smart-homes-market.asp Markets and Markets. 2020. Smart Home Market worth $135.3 billion by 2025. Available: https:\/\/www.marketsandmarkets.com\/PressReleases\/global-smart-homes-market.asp"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI \u201920)","author":"Song Yunpeng","unstructured":"Yunpeng Song , Yun Huang , Zhongmin Cai , and Jason I. Hong . 2020. I'm All Eyes and Ears: Exploring Effective Locators for Privacy Awareness in IoT Scenarios . In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI \u201920) , Association for Computing Machinery, New York, NY, USA, 1\u201313. DOI: https:\/\/doi.org\/10.1145\/3313831.3376585 10.1145\/3313831.3376585 Yunpeng Song, Yun Huang, Zhongmin Cai, and Jason I. Hong. 2020. I'm All Eyes and Ears: Exploring Effective Locators for Privacy Awareness in IoT Scenarios. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI \u201920), Association for Computing Machinery, New York, NY, USA, 1\u201313. DOI: https:\/\/doi.org\/10.1145\/3313831.3376585"},{"key":"e_1_3_2_1_8_1","unstructured":"Statista. 2021. Smart home. Statista. Available: https:\/\/www.statista.com\/topics\/2430\/smart-homes\/  Statista. 2021. Smart home. Statista. Available: https:\/\/www.statista.com\/topics\/2430\/smart-homes\/"},{"key":"e_1_3_2_1_9_1","volume-title":"The Future of IoT: 10 Predictions about the Internet of Things | Norton","author":"Symanovich Steve","unstructured":"Steve Symanovich . 2019. The Future of IoT: 10 Predictions about the Internet of Things | Norton . NortonLifeLock . Available: https:\/\/us.norton.com\/internetsecurity-iot-5-predictions-for-the-future-of-iot.html Steve Symanovich. 2019. The Future of IoT: 10 Predictions about the Internet of Things | Norton. NortonLifeLock. Available: https:\/\/us.norton.com\/internetsecurity-iot-5-predictions-for-the-future-of-iot.html"},{"key":"e_1_3_2_1_10_1","volume-title":"End User Perceptions of Smart Home Device Data Practices and Risks. In Fifteenth Symposium on Usable Privacy and Security (SOUPS","author":"Tabassum Madiha","year":"2019","unstructured":"Madiha Tabassum , Tomasz Kosinski , and Heather Richter Lipford . 2019 . \u201c I don't own the data \u201d: End User Perceptions of Smart Home Device Data Practices and Risks. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), USENIX Association, 435\u2013450. Madiha Tabassum, Tomasz Kosinski, and Heather Richter Lipford. 2019. \u201cI don't own the data\u201d: End User Perceptions of Smart Home Device Data Practices and Risks. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), USENIX Association, 435\u2013450."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376515"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Association for Computing Machinery","author":"Wong Richmond Y.","year":"2021","unstructured":"Richmond Y. Wong and Deirdre K. Mulligan . 2019. Bringing Design to the Privacy Table: Broadening \u201cDesign\u201d in \u201cPrivacy by Design\u201d Through the Lens of HCI . In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Association for Computing Machinery , New York, NY, USA, 1\u201317. Retrieved June 8, 2021 from https:\/\/doi.org\/10.1145\/3290605.3300492 10.1145\/3290605.3300492 Richmond Y. Wong and Deirdre K. Mulligan. 2019. Bringing Design to the Privacy Table: Broadening \u201cDesign\u201d in \u201cPrivacy by Design\u201d Through the Lens of HCI. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Association for Computing Machinery, New York, NY, USA, 1\u201317. Retrieved June 8, 2021 from https:\/\/doi.org\/10.1145\/3290605.3300492"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2417"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"key":"e_1_3_2_1_16_1","unstructured":"Kat Zhou. 2021. Design Ethically Toolkit. Available: https:\/\/www.designethically.com\/toolkit  Kat Zhou. 2021. Design Ethically Toolkit. Available: https:\/\/www.designethically.com\/toolkit"}],"event":{"name":"CSCW '21: Computer Supported Cooperative Work and Social Computing","location":"Virtual Event USA","acronym":"CSCW '21","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Companion Publication of the 2021 Conference on Computer Supported Cooperative Work and Social Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3462204.3481724","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3462204.3481724","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:01Z","timestamp":1750191421000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3462204.3481724"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,23]]},"references-count":16,"alternative-id":["10.1145\/3462204.3481724","10.1145\/3462204"],"URL":"https:\/\/doi.org\/10.1145\/3462204.3481724","relation":{},"subject":[],"published":{"date-parts":[[2021,10,23]]},"assertion":[{"value":"2021-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}