{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:49:26Z","timestamp":1776084566857,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":74,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,12]],"date-time":"2021-05-12T00:00:00Z","timestamp":1620777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Research Foundation","award":["425869382"],"award-info":[{"award-number":["425869382"]}]},{"name":"dtec.bw - Digitalization and Technology Research Center of the Bundeswehr","award":["Voice of Wisdom"],"award-info":[{"award-number":["Voice of Wisdom"]}]},{"name":"German Federal Ministry of Education and Research","award":["SWC 2.0 PrivacyGate 01 S17050"],"award-info":[{"award-number":["SWC 2.0 PrivacyGate 01 S17050"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,12]]},"DOI":"10.1145\/3490632.3490664","type":"proceedings-article","created":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T11:25:58Z","timestamp":1645788358000},"page":"108-122","source":"Crossref","is-referenced-by-count":20,"title":["Roles Matter! Understanding Differences in the Privacy Mental Models of Smart Home Visitors and Residents"],"prefix":"10.1145","author":[{"given":"Karola","family":"Marky","sequence":"first","affiliation":[{"name":"School of Computing, University of Glasgow, United Kingdom and Telecooperation Lab, Technical University of Darmstadt, Germany"}]},{"given":"Sarah","family":"Prange","sequence":"additional","affiliation":[{"name":"Bundeswehr University Munich, Germany and LMU Munich, Germany"}]},{"given":"Max","family":"M\u00fchlh\u00e4user","sequence":"additional","affiliation":[{"name":"Telecooperation Lab, Technical University of Darmstadt, Germany"}]},{"given":"Florian","family":"Alt","sequence":"additional","affiliation":[{"name":"Bundeswehr University Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,2,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the Symposium on Usable Privacy and Security(SOUPS \u201919)","author":"Abdi Noura","year":"2019","unstructured":"Noura Abdi , Kopo\u00a0 M. Ramokapane , and Jose\u00a0 M. Such . 2019 . More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants . In Proceedings of the Symposium on Usable Privacy and Security(SOUPS \u201919) . USENIX Association, Berkeley, CA, USA, 1\u201316. Noura Abdi, Kopo\u00a0M. Ramokapane, and Jose\u00a0M. Such. 2019. More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants. In Proceedings of the Symposium on Usable Privacy and Security(SOUPS \u201919). USENIX Association, Berkeley, CA, USA, 1\u201316."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.77"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) 2, 3, Article 89 (Sept.","author":"Ahmed Tousif","year":"2018","unstructured":"Tousif Ahmed , Apu Kapadia , Venkatesh Potluri , and Manohar Swaminathan . 2018 . Up to a Limit? Privacy Concerns of Bystanders and Their Willingness to Share Additional Information with Visually Impaired Users of Assistive Technologies . Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) 2, 3, Article 89 (Sept. 2018), 27\u00a0pages. https:\/\/doi.org\/10.1145\/3264899 Tousif Ahmed, Apu Kapadia, Venkatesh Potluri, and Manohar Swaminathan. 2018. Up to a Limit? Privacy Concerns of Bystanders and Their Willingness to Share Additional Information with Visually Impaired Users of Assistive Technologies. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) 2, 3, Article 89 (Sept. 2018), 27\u00a0pages. https:\/\/doi.org\/10.1145\/3264899"},{"key":"e_1_3_2_1_4_1","volume-title":"Smart Homes: Past, Present and Future","author":"Aldrich K.","year":"2003","unstructured":"Frances\u00a0 K. Aldrich . 2003 . Smart Homes: Past, Present and Future . Springer London , London , 17\u201339. https:\/\/doi.org\/10.1007\/1-85233-854-7_2 Frances\u00a0K. Aldrich. 2003. Smart Homes: Past, Present and Future. Springer London, London, 17\u201339. https:\/\/doi.org\/10.1007\/1-85233-854-7_2"},{"key":"e_1_3_2_1_5_1","first-page":"3","article-title":"Emerging Trends in Usable Security and Privacy","volume":"18","author":"Alt Florian","year":"2019","unstructured":"Florian Alt and Emanuel von Zezschwitz . 2019 . Emerging Trends in Usable Security and Privacy . Journal of Interactive Media (icom) 18 , 3 (Dec. 2019), 1\u201313. https:\/\/doi.org\/10.1515\/icom-2019-0019 Florian Alt and Emanuel von Zezschwitz. 2019. Emerging Trends in Usable Security and Privacy. Journal of Interactive Media (icom) 18, 3 (Dec. 2019), 1\u201313. https:\/\/doi.org\/10.1515\/icom-2019-0019","journal-title":"Journal of Interactive Media (icom)"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214262"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICIP.2011.6008384"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(86)80039-6"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40617-018-00329-y"},{"key":"e_1_3_2_1_10_1","unstructured":"Virginia Braun and Victoria Clarke. 2012. Thematic analysis.(2012).  Virginia Braun and Victoria Clarke. 2012. Thematic analysis.(2012)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370226"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/HCI2016.62"},{"key":"e_1_3_2_1_13_1","volume-title":"Can I Trust You?Computer 50, 9","author":"Chung Hyunji","year":"2017","unstructured":"Hyunji Chung , Michaela Iorga , Jeffrey Voas , and Sangjin Lee . 2017. Alexa , Can I Trust You?Computer 50, 9 ( 2017 ), 100\u2013104. https:\/\/doi.org\/10.1109\/MC.2017.3571053 Hyunji Chung, Michaela Iorga, Jeffrey Voas, and Sangjin Lee. 2017. Alexa, Can I Trust You?Computer 50, 9 (2017), 100\u2013104. https:\/\/doi.org\/10.1109\/MC.2017.3571053"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0060"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376389"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.1.104"},{"key":"e_1_3_2_1_17_1","first-page":"05797","article-title":"Security and Privacy Approaches in Mixed Reality: A Literature Survey. Cryptology ePrint Archive","volume":"1802","author":"de Guzman A.","year":"2018","unstructured":"Jaybie\u00a0 A. de Guzman , Kanchana Thilakarathna , and Aruna Seneviratne . 2018 . Security and Privacy Approaches in Mixed Reality: A Literature Survey. Cryptology ePrint Archive , Report 1802 . 05797 ., 40\u00a0pages. https:\/\/arxiv.org\/pdf\/1802.05797.pdf. Jaybie\u00a0A. de Guzman, Kanchana Thilakarathna, and Aruna Seneviratne. 2018. Security and Privacy Approaches in Mixed Reality: A Literature Survey. Cryptology ePrint Archive, Report 1802.05797., 40\u00a0pages. https:\/\/arxiv.org\/pdf\/1802.05797.pdf.","journal-title":"Report"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3172944.3172961"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the Symposium on Usable Privacy and Security(SOUPS \u201917)","author":"Emami-Naeini Pardis","year":"2017","unstructured":"Pardis Emami-Naeini , Sruti Bhagavatula , Hana Habib , Martin Degeling , Lujo Bauer , Lorrie Cranor , and Norman Sadeh . 2017 . Privacy Expectations and Preferences in an IoT World . In Proceedings of the Symposium on Usable Privacy and Security(SOUPS \u201917) . USENIX Association, Berkeley, CA, USA, 399\u2013412. Pardis Emami-Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Cranor, and Norman Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. In Proceedings of the Symposium on Usable Privacy and Security(SOUPS \u201917). USENIX Association, Berkeley, CA, USA, 399\u2013412."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2018.1456150"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPEIC.2015.7259486"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328915"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300498"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632079"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376529"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025799"},{"key":"e_1_3_2_1_29_1","volume-title":"Mental Models: Towards a Cognitive Science of Language, Inference, and Consciousness. Number\u00a06","author":"Johnson-Laird N.","year":"1983","unstructured":"Philip\u00a0 N. Johnson-Laird . 1983 . Mental Models: Towards a Cognitive Science of Language, Inference, and Consciousness. Number\u00a06 . Harvard University Press , Cambridge, MA, USA . Philip\u00a0N. Johnson-Laird. 1983. Mental Models: Towards a Cognitive Science of Language, Inference, and Consciousness. Number\u00a06. Harvard University Press, Cambridge, MA, USA."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the Symposium on Usable Privacy and Security(SOUPS \u201915)","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang , Laura Dabbish , Nathaniel Fruchter , and Sara Kiesler . 2015 . \u201c My Data Just Goes Everywhere:\u201d User Mental Models of the Internet and Implications for Privacy and Security . In Proceedings of the Symposium on Usable Privacy and Security(SOUPS \u201915) . USENIX Association, Berkeley, CA, USA, 39\u201352. Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. \u201cMy Data Just Goes Everywhere:\u201d User Mental Models of the Internet and Implications for Privacy and Security. In Proceedings of the Symposium on Usable Privacy and Security(SOUPS \u201915). USENIX Association, Berkeley, CA, USA, 39\u201352."},{"key":"e_1_3_2_1_31_1","volume-title":"Privacy. In Proceedings of the 5th Symposium on Usable Privacy and Security","author":"Kelley Patrick\u00a0Gage","year":"2009","unstructured":"Patrick\u00a0Gage Kelley , Joanna Bresee , Lorrie\u00a0Faith Cranor , and Robert\u00a0 W. Reeder . 2009 . A \u201cNutrition Label\u201d for Privacy. In Proceedings of the 5th Symposium on Usable Privacy and Security ( Mountain View, California, USA) (SOUPS \u201909). Association for Computing Machinery, New York, NY, USA, Article 4, 12\u00a0pages. https:\/\/doi.org\/10.1145\/1572532.1572538 Patrick\u00a0Gage Kelley, Joanna Bresee, Lorrie\u00a0Faith Cranor, and Robert\u00a0W. Reeder. 2009. A \u201cNutrition Label\u201d for Privacy. In Proceedings of the 5th Symposium on Usable Privacy and Security (Mountain View, California, USA) (SOUPS \u201909). Association for Computing Machinery, New York, NY, USA, Article 4, 12\u00a0pages. https:\/\/doi.org\/10.1145\/1572532.1572538"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785842"},{"key":"e_1_3_2_1_33_1","volume-title":"Ti-Chung Cheng, and Karrie Karahalios.","author":"Koshy Vinay","year":"2021","unstructured":"Vinay Koshy , Joon Sung\u00a0Sung Park , Ti-Chung Cheng, and Karrie Karahalios. 2021 . \u201cWe Just Use What They Give Us\u201d: Understanding Passenger User Perspectives in Smart Homes. Association for Computing Machinery , New York, NY, USA. https:\/\/doi.org\/10.1145\/3411764.3445598 Vinay Koshy, Joon Sung\u00a0Sung Park, Ti-Chung Cheng, and Karrie Karahalios. 2021. \u201cWe Just Use What They Give Us\u201d: Understanding Passenger User Perspectives in Smart Homes. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3411764.3445598"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2013.6645235"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287054"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45809-3_19"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00051"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0035"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2018.08.015"},{"key":"e_1_3_2_1_41_1","volume-title":"You Just Can\u2019t Know about Everything\u201d: Privacy Perceptions of Smart Home Visitors","author":"Marky Karola","unstructured":"Karola Marky , Sarah Prange , Florian Krell , Max M\u00fchlh\u00e4user , and Florian Alt . 2020. \u201c You Just Can\u2019t Know about Everything\u201d: Privacy Perceptions of Smart Home Visitors . Association for Computing Machinery , New York, NY, USA , 83\u201395. https:\/\/doi.org\/10.1145\/3428361.3428464 Karola Marky, Sarah Prange, Florian Krell, Max M\u00fchlh\u00e4user, and Florian Alt. 2020. \u201cYou Just Can\u2019t Know about Everything\u201d: Privacy Perceptions of Smart Home Visitors. Association for Computing Machinery, New York, NY, USA, 83\u201395. https:\/\/doi.org\/10.1145\/3428361.3428464"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420164"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025735"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858168"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.0009"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_17"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Pardis\u00a0Emami Naeini Yuvraj Agarwal Lorrie\u00a0Faith Cranor and Hanan Hibshi. 2020. Ask the Experts: What Should Be on an IoT Privacy and Security Label?ArXiv abs\/2002.04631(2020) 1\u201318.  Pardis\u00a0Emami Naeini Yuvraj Agarwal Lorrie\u00a0Faith Cranor and Hanan Hibshi. 2020. Ask the Experts: What Should Be on an IoT Privacy and Security Label?ArXiv abs\/2002.04631(2020) 1\u201318.","DOI":"10.1109\/SP40000.2020.00043"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409661"},{"key":"e_1_3_2_1_49_1","volume-title":"Mental Models","author":"Norman A.","unstructured":"Donald\u00a0 A. Norman . 2014. Some Observations on Mental Models . In Mental Models . Psychology Press , 15\u201322. Donald\u00a0A. Norman. 2014. Some Observations on Mental Models. In Mental Models. Psychology Press, 15\u201322."},{"key":"e_1_3_2_1_50_1","volume-title":"Researching Information Systems and Computing","author":"Oates J.","unstructured":"Briony\u00a0 J. Oates . 2005. Researching Information Systems and Computing . Sage . Briony\u00a0J. Oates. 2005. Researching Information Systems and Computing. Sage."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics7120379"},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of the International Workshop Sensing Applications on Mobile Phones(PhoneSense \u201911)","author":"Pidcock Sarah","year":"2011","unstructured":"Sarah Pidcock , Rob Smits , Urs Hengartner , and Ian Goldberg . 2011 . Notisense: An Urban Sensing Notification System to Improve Bystander Privacy . In Proceedings of the International Workshop Sensing Applications on Mobile Phones(PhoneSense \u201911) . 1\u20135. Sarah Pidcock, Rob Smits, Urs Hengartner, and Ian Goldberg. 2011. Notisense: An Urban Sensing Notification System to Improve Bystander Privacy. In Proceedings of the International Workshop Sensing Applications on Mobile Phones(PhoneSense \u201911). 1\u20135."},{"key":"e_1_3_2_1_53_1","volume-title":"Desires and Needs Towards Home Appliances. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems","author":"Prange Sarah","year":"2020","unstructured":"Sarah Prange and Florian Alt . 2020 . I Wish You Were Smart(Er): Investigating Users\u2019 Desires and Needs Towards Home Appliances. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems ( Honolulu, HI, USA) (CHI EA \u201920). Association for Computing Machinery, New York, NY, USA, 1\u20138. https:\/\/doi.org\/10.1145\/3334480.3382910 Sarah Prange and Florian Alt. 2020. I Wish You Were Smart(Er): Investigating Users\u2019 Desires and Needs Towards Home Appliances. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI EA \u201920). Association for Computing Machinery, New York, NY, USA, 1\u20138. https:\/\/doi.org\/10.1145\/3334480.3382910"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445067"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00024"},{"key":"e_1_3_2_1_56_1","volume-title":"Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems(Glasgow, Scotland Uk) (CHI EA \u201919)","author":"Richards K.","unstructured":"Olivia\u00a0 K. Richards . 2019. Family-Centered Exploration of the Benefits and Burdens of Digital Home Assistants . In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems(Glasgow, Scotland Uk) (CHI EA \u201919) . ACM , New York, NY, USA , 1\u20136. https:\/\/doi.org\/10.1145\/3290607.3308458 Olivia\u00a0K. Richards. 2019. Family-Centered Exploration of the Benefits and Burdens of Digital Home Assistants. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems(Glasgow, Scotland Uk) (CHI EA \u201919). ACM, New York, NY, USA, 1\u20136. https:\/\/doi.org\/10.1145\/3290607.3308458"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDSC.2016.7460395"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376585"},{"key":"e_1_3_2_1_59_1","volume-title":"Smart Home Worldwirde. https:\/\/www.statista.com\/outlook\/279\/100\/smart-home\/worldwideAccessed","year":"2021","unstructured":"Statista. 2019. Smart Home Worldwirde. https:\/\/www.statista.com\/outlook\/279\/100\/smart-home\/worldwideAccessed : January 2021 . Statista. 2019. Smart Home Worldwirde. https:\/\/www.statista.com\/outlook\/279\/100\/smart-home\/worldwideAccessed: January 2021."},{"key":"e_1_3_2_1_60_1","volume-title":"Home Report","year":"2020","unstructured":"Statista. 2020. Smart Home Report 2020 . https:\/\/de.statista.com\/statistik\/studie\/id\/41155\/dokument\/smart-home-report\/ last accessed April 15, 2021. Statista. 2020. Smart Home Report 2020. https:\/\/de.statista.com\/statistik\/studie\/id\/41155\/dokument\/smart-home-report\/ last accessed April 15, 2021."},{"key":"e_1_3_2_1_61_1","volume-title":"Proceedings of the Fifteenth Symposium on Usable Privacy and Security(SOUPS). USENIX Association","author":"Tabassum Madiha","year":"2019","unstructured":"Madiha Tabassum , Tomasz Kosinski , and Heather\u00a0Richter Lipford . 2019 . I Don\u2019t Own the Data\u201d: End User Perceptions of Smart Home Device Data Practices and Risks . In Proceedings of the Fifteenth Symposium on Usable Privacy and Security(SOUPS). USENIX Association , Berkeley, CA, USA, 16. Madiha Tabassum, Tomasz Kosinski, and Heather\u00a0Richter Lipford. 2019. I Don\u2019t Own the Data\u201d: End User Perceptions of Smart Home Device Data Practices and Risks. In Proceedings of the Fifteenth Symposium on Usable Privacy and Security(SOUPS). USENIX Association, Berkeley, CA, USA, 16."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240630"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632107"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2016.12.047"},{"key":"e_1_3_2_1_65_1","volume-title":"Mensch und Computer 2018 - Workshopband","author":"Wolf Katrin","year":"1842","unstructured":"Katrin Wolf , Karola Marky , and Markus Funk . 2018. We should start thinking about Privacy Implications of Sonic Input in Everyday Augmented Reality! . In Mensch und Computer 2018 - Workshopband . Gesellschaft f\u00fcr Informatik e.V., Bonn, Germany , 353\u2013359. https:\/\/doi.org\/10. 1842 0\/muc2018-ws07-0466 Katrin Wolf, Karola Marky, and Markus Funk. 2018. We should start thinking about Privacy Implications of Sonic Input in Everyday Augmented Reality!. In Mensch und Computer 2018 - Workshopband. Gesellschaft f\u00fcr Informatik e.V., Bonn, Germany, 353\u2013359. https:\/\/doi.org\/10.18420\/muc2018-ws07-0466"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901890"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300428"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"},{"key":"e_1_3_2_1_69_1","volume-title":"Proceedings of the Symposium on Usable Privacy and Security(SOUPS \u201917)","author":"Zeng Eric","year":"2017","unstructured":"Eric Zeng , Shrirang Mare , and Franziska Roesner . 2017 . End User Security & Privacy Concerns with Smart Homes . In Proceedings of the Symposium on Usable Privacy and Security(SOUPS \u201917) . USENIX Association, Berkeley, CA, USA, 65\u201380. Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security & Privacy Concerns with Smart Homes. In Proceedings of the Symposium on Usable Privacy and Security(SOUPS \u201917). USENIX Association, Berkeley, CA, USA, 65\u201380."},{"key":"e_1_3_2_1_70_1","volume-title":"Proceedings of the USENIX Security Symposium(USENIX Security \u201919)","author":"Zeng Eric","year":"2019","unstructured":"Eric Zeng and Franziska Roesner . 2019 . Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study . In Proceedings of the USENIX Security Symposium(USENIX Security \u201919) . USENIX Association, Berkeley, CA, USA, 159\u2013176. Eric Zeng and Franziska Roesner. 2019. Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study. In Proceedings of the USENIX Security Symposium(USENIX Security \u201919). USENIX Association, Berkeley, CA, USA, 159\u2013176."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.4236\/jss.2014.211017"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"key":"e_1_3_2_1_73_1","volume-title":"Mental Models of Smart Homes. In Mensch und Computer 2018-Workshopband","author":"Zimmermann Verena","unstructured":"Verena Zimmermann , Merve Bennighof , Miriam Edel , Oliver Hofmann , Judith Jung , and Melina von Wick . 2018. \u2018Home , Smart Home\u2019\u2013Exploring End Users \u2019 Mental Models of Smart Homes. In Mensch und Computer 2018-Workshopband . Gesellschaft f\u00fcr Informatik e.V., Bonn, Germany , 407\u2013417. Verena Zimmermann, Merve Bennighof, Miriam Edel, Oliver Hofmann, Judith Jung, and Melina von Wick. 2018. \u2018Home, Smart Home\u2019\u2013Exploring End Users\u2019 Mental Models of Smart Homes. In Mensch und Computer 2018-Workshopband. Gesellschaft f\u00fcr Informatik e.V., Bonn, Germany, 407\u2013417."},{"key":"e_1_3_2_1_74_1","volume-title":"Privacy and Security Concerns of Smart Home Technologies. i-com 18, 3","author":"Zimmermann Verena","year":"2019","unstructured":"Verena Zimmermann , Paul Gerber , Karola Marky , Leon B\u00f6ck , and Florian Kirchbuchner . 2019. Assessing Users \u2019 Privacy and Security Concerns of Smart Home Technologies. i-com 18, 3 ( 2019 ), 197\u2013216. https:\/\/doi.org\/10.1515\/icom-2019-0015 Verena Zimmermann, Paul Gerber, Karola Marky, Leon B\u00f6ck, and Florian Kirchbuchner. 2019. Assessing Users\u2019 Privacy and Security Concerns of Smart Home Technologies. i-com 18, 3 (2019), 197\u2013216. https:\/\/doi.org\/10.1515\/icom-2019-0015"}],"event":{"name":"MUM 2021: 20th International Conference on Mobile and Ubiquitous Multimedia","location":"Leuven Belgium","acronym":"MUM 2021"},"container-title":["20th International Conference on Mobile and Ubiquitous Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3490632.3490664","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3490632.3490664","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:29Z","timestamp":1750188629000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3490632.3490664"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,12]]},"references-count":74,"alternative-id":["10.1145\/3490632.3490664","10.1145\/3490632"],"URL":"https:\/\/doi.org\/10.1145\/3490632.3490664","relation":{},"subject":[],"published":{"date-parts":[[2021,5,12]]}}}