{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T00:36:45Z","timestamp":1776127005848,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":139,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T00:00:00Z","timestamp":1651190400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1947696, IIS-155367, IIS-2142795"],"award-info":[{"award-number":["IIS-1947696, IIS-155367, IIS-2142795"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Mozilla Research","award":["2018H2"],"award-info":[{"award-number":["2018H2"]}]},{"name":"National Science Foundation Graduate Research Fellowship","award":["DGE-1762114"],"award-info":[{"award-number":["DGE-1762114"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,29]]},"DOI":"10.1145\/3491102.3517617","type":"proceedings-article","created":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T16:34:58Z","timestamp":1651163698000},"page":"1-25","source":"Crossref","is-referenced-by-count":50,"title":["Monitoring Pets, Deterring Intruders, and Casually Spying on Neighbors: Everyday Uses of Smart Home Cameras"],"prefix":"10.1145","author":[{"given":"Neilly","family":"H. Tan","sequence":"first","affiliation":[{"name":"Human Centered Design and Engineering, University of Washington, United States"}]},{"given":"Richmond","family":"Y. Wong","sequence":"additional","affiliation":[{"name":"Center for Long-Term Cybersecurity, University of California Berkeley, United States"}]},{"given":"Audrey","family":"Desjardins","sequence":"additional","affiliation":[{"name":"School of Art + Art History + Design, University of Washington, United States"}]},{"given":"Sean","family":"A. Munson","sequence":"additional","affiliation":[{"name":"Human Centered Design &amp; Engineering, University of Washington, United States"}]},{"given":"James","family":"Pierce","sequence":"additional","affiliation":[{"name":"School of Art + Art History + Design, University of Washington, United States"}]}],"member":"320","published-online":{"date-parts":[[2022,4,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"William Ablondi. 2018. Smart Home Reports. Strategy Analytics. Retrieved from https:\/\/www.strategyanalytics.com\/access-services\/devices\/connected-home\/smart-home\/reports\/report-detail\/global-smart-home-surveillance-camera-market-forecast-2012-to-2023?slid=918459&spg=4  William Ablondi. 2018. Smart Home Reports. Strategy Analytics. Retrieved from https:\/\/www.strategyanalytics.com\/access-services\/devices\/connected-home\/smart-home\/reports\/report-detail\/global-smart-home-surveillance-camera-market-forecast-2012-to-2023?slid=918459&spg=4"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240683"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415187"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409666"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311956"},{"key":"e_1_3_2_1_7_1","volume-title":"Cloud ethics","author":"Amoore Louise","unstructured":"Louise Amoore . 2020. Cloud ethics . Duke University Press . Louise Amoore. 2020. Cloud ethics. Duke University Press."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444816676645"},{"key":"e_1_3_2_1_9_1","first-page":"2","article-title":"Privacy Dependencies","volume":"95","author":"Barocas Solon","year":"2020","unstructured":"Solon Barocas and Karen Levy . 2020 . Privacy Dependencies . Wash. Law Rev. 95 , 2 (June 2020), 555. Solon Barocas and Karen Levy. 2020. Privacy Dependencies. Wash. Law Rev. 95, 2 (June 2020), 555.","journal-title":"Wash. Law Rev."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702234"},{"key":"e_1_3_2_1_11_1","volume-title":"Usees. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, ACM, Seoul Republic of Korea, 3295\u20133298","author":"Baumer Eric P.S.","year":"2015","unstructured":"Eric P.S. Baumer . 2015 . Usees. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, ACM, Seoul Republic of Korea, 3295\u20133298 . Eric P.S. Baumer. 2015. Usees. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, ACM, Seoul Republic of Korea, 3295\u20133298."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466446"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300352"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3380993"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445481"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264901"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3036698"},{"key":"e_1_3_2_1_18_1","first-page":"1","article-title":"Cameras on beds: The ethics of surveillance in nursing home rooms","volume":"10","author":"Berridge Clara","year":"2019","unstructured":"Clara Berridge , Jodi Halpern , and Karen Levy . 2019 . Cameras on beds: The ethics of surveillance in nursing home rooms . AJOB Empir. Bioeth. 10 , 1 (January 2019), 55\u201362. Clara Berridge, Jodi Halpern, and Karen Levy. 2019. Cameras on beds: The ethics of surveillance in nursing home rooms. AJOB Empir. Bioeth. 10, 1 (January 2019), 55\u201362.","journal-title":"AJOB Empir. Bioeth."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1182475.1182476"},{"key":"e_1_3_2_1_20_1","unstructured":"Nellie Bowles. 2018. Thermostats Locks and Lights: Digital Tools of Domestic Abuse. The New York Times. Retrieved from https:\/\/www.nytimes.com\/2018\/06\/23\/technology\/smart-home-devices-domestic-abuse.html  Nellie Bowles. 2018. Thermostats Locks and Lights: Digital Tools of Domestic Abuse. The New York Times. Retrieved from https:\/\/www.nytimes.com\/2018\/06\/23\/technology\/smart-home-devices-domestic-abuse.html"},{"key":"e_1_3_2_1_21_1","unstructured":"Phoebe Braithwaite. 2018. Smart home tech is being turned into a tool for domestic abuse. Wired UK. Retrieved from https:\/\/www.wired.co.uk\/article\/internet-of-things-smart-home-domestic-abuse  Phoebe Braithwaite. 2018. Smart home tech is being turned into a tool for domestic abuse. Wired UK. Retrieved from https:\/\/www.wired.co.uk\/article\/internet-of-things-smart-home-domestic-abuse"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1215\/9780822375302"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the Designing Interactive Systems Conference on - DIS \u201912","author":"Brubaker Jed R.","unstructured":"Jed R. Brubaker , Gina Venolia , and John C. Tang . 2012. Focusing on shared experiences: moving beyond the camera in video communication . In Proceedings of the Designing Interactive Systems Conference on - DIS \u201912 , ACM Press, Newcastle Upon Tyne, United Kingdom, 96. Jed R. Brubaker, Gina Venolia, and John C. Tang. 2012. Focusing on shared experiences: moving beyond the camera in video communication. In Proceedings of the Designing Interactive Systems Conference on - DIS \u201912, ACM Press, Newcastle Upon Tyne, United Kingdom, 96."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441853"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, Vancouver BC Canada, 2115\u20132124","author":"Bernheim Brush A.J.","year":"2011","unstructured":"A.J. Bernheim Brush , Bongshin Lee , Ratul Mahajan , Sharad Agarwal , Stefan Saroiu , and Colin Dixon . 2011 . Home automation in the wild: challenges and opportunities . In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, Vancouver BC Canada, 2115\u20132124 . A.J. Bernheim Brush, Bongshin Lee, Ratul Mahajan, Sharad Agarwal, Stefan Saroiu, and Colin Dixon. 2011. Home automation in the wild: challenges and opportunities. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, Vancouver BC Canada, 2115\u20132124."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444812440159"},{"key":"e_1_3_2_1_27_1","unstructured":"Will Burns. 2018. The \u201cNestie Awards\u201d From Nest Is A Content Idea Firing On All Cylinders. Forbes. Retrieved from https:\/\/www.forbes.com\/sites\/willburns\/2018\/03\/02\/the-nestie-awards-from-nest-is-a-content-idea-firing-on-all-cylinders\/  Will Burns. 2018. The \u201cNestie Awards\u201d From Nest Is A Content Idea Firing On All Cylinders. Forbes. Retrieved from https:\/\/www.forbes.com\/sites\/willburns\/2018\/03\/02\/the-nestie-awards-from-nest-is-a-content-idea-firing-on-all-cylinders\/"},{"key":"e_1_3_2_1_28_1","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS","author":"Chalhoub George","year":"2020","unstructured":"George Chalhoub , Ivan Flechais , Norbert Nthala , and Ruba Abu-Salma . 2020 . Innovation inaction or in action? the role of user experience in the security and privacy design of smart home cameras . In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 185\u2013204. George Chalhoub, Ivan Flechais, Norbert Nthala, and Ruba Abu-Salma. 2020. Innovation inaction or in action? the role of user experience in the security and privacy design of smart home cameras. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 185\u2013204."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445691"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376304"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3323699"},{"key":"e_1_3_2_1_32_1","volume-title":"Grinter","author":"Chetty Marshini","year":"2007","unstructured":"Marshini Chetty , Ja-Young Sung , and Rebecca E . Grinter . 2007 . How Smart Homes Learn: The Evolution of the Networked Home and Household . In UbiComp 2007: Ubiquitous Computing, John Krumm, Gregory D. Abowd, Aruna Seneviratne and Thomas Strang (eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 127\u2013144. Marshini Chetty, Ja-Young Sung, and Rebecca E. Grinter. 2007. How Smart Homes Learn: The Evolution of the Networked Home and Household. In UbiComp 2007: Ubiquitous Computing, John Krumm, Gregory D. Abowd, Aruna Seneviratne and Thomas Strang (eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 127\u2013144."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 13th international conference on Ubiquitous computing - UbiComp \u201911","author":"Choe Eun Kyoung","unstructured":"Eun Kyoung Choe , Sunny Consolvo , Jaeyeon Jung , Beverly Harrison , and Julie A. Kientz . 2011. Living in a glass house: a survey of private moments in the home . In Proceedings of the 13th international conference on Ubiquitous computing - UbiComp \u201911 , ACM Press, Beijing, China, 41. Eun Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly Harrison, and Julie A. Kientz. 2011. Living in a glass house: a survey of private moments in the home. In Proceedings of the 13th international conference on Ubiquitous computing - UbiComp \u201911, ACM Press, Beijing, China, 41."},{"key":"e_1_3_2_1_34_1","volume-title":"Hate crimes in cyberspace","author":"Citron Danielle Keats","unstructured":"Danielle Keats Citron . 2014. Hate crimes in cyberspace . Harvard University Press . Danielle Keats Citron. 2014. Hate crimes in cyberspace. Harvard University Press."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-017-9276-y"},{"key":"e_1_3_2_1_36_1","volume-title":"Atlas of AI: Power, Politics, and the Planetary Costs of Artificial Intelligence","author":"Crawford Kate","unstructured":"Kate Crawford . 2021. Atlas of AI: Power, Politics, and the Planetary Costs of Artificial Intelligence . Yale University Press . Kate Crawford. 2021. Atlas of AI: Power, Politics, and the Planetary Costs of Artificial Intelligence. Yale University Press."},{"key":"e_1_3_2_1_37_1","volume-title":"Surveillance and Military Transformation: Organizational Trends in Twenty First Century Armed Services. New Polit. Surveill. Visibility","author":"Dandeker Christopher","year":"2006","unstructured":"Christopher Dandeker . 2006. Surveillance and Military Transformation: Organizational Trends in Twenty First Century Armed Services. New Polit. Surveill. Visibility ( 2006 ), 225\u2013249. Christopher Dandeker. 2006. Surveillance and Military Transformation: Organizational Trends in Twenty First Century Armed Services. New Polit. Surveill. Visibility (2006), 225\u2013249."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2399016.2399044"},{"key":"e_1_3_2_1_39_1","volume-title":"October 59, (1992), 3\u20137.","author":"Deleuze Gilles","year":"1992","unstructured":"Gilles Deleuze . 1992 . Postscript on the Societies of Control . October 59, (1992), 3\u20137. Gilles Deleuze. 1992. Postscript on the Societies of Control. October 59, (1992), 3\u20137."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0266462307080154"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557352"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300581"},{"key":"e_1_3_2_1_43_1","volume-title":"Divining a digital future: Mess and mythology in ubiquitous computing","author":"Dourish Paul","unstructured":"Paul Dourish and Genevieve Bell . 2011. Divining a digital future: Mess and mythology in ubiquitous computing . Mit Press . Paul Dourish and Genevieve Bell. 2011. Divining a digital future: Mess and mythology in ubiquitous computing. Mit Press."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2841113.2841115"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979099"},{"key":"e_1_3_2_1_46_1","unstructured":"Michel Foucault. 2012. Discipline and punish: The birth of the prison. Vintage.  Michel Foucault. 2012. Discipline and punish: The birth of the prison. Vintage."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174241"},{"key":"e_1_3_2_1_48_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS","author":"Frik Alisa","year":"2019","unstructured":"Alisa Frik , Leysan Nurgalieva , Julia Bernd , Joyce Lee , Florian Schaub , and Serge Egelman . 2019 . Privacy and security threat models and mitigation strategies of older adults . In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), 21\u201340. Alisa Frik, Leysan Nurgalieva, Julia Bernd, Joyce Lee, Florian Schaub, and Serge Egelman. 2019. Privacy and security threat models and mitigation strategies of older adults. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), 21\u201340."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173876"},{"key":"e_1_3_2_1_50_1","volume-title":"How Can Surveillance Be Defined? Remarks on Theoretical Foundations of Surveillance Studies. The Internet","author":"Fuchs Christian","year":"2010","unstructured":"Christian Fuchs . 2010. How Can Surveillance Be Defined? Remarks on Theoretical Foundations of Surveillance Studies. The Internet ( 2010 ), 24. Christian Fuchs. 2010. How Can Surveillance Be Defined? Remarks on Theoretical Foundations of Surveillance Studies. The Internet (2010), 24."},{"key":"e_1_3_2_1_51_1","unstructured":"Kit Galloway and Sherrie Rabinowitz. A Hole-In-Space 1980. Retrieved from http:\/\/www.ecafe.com\/getty\/HIS\/index.html  Kit Galloway and Sherrie Rabinowitz. A Hole-In-Space 1980. Retrieved from http:\/\/www.ecafe.com\/getty\/HIS\/index.html"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-005-0002-2"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466474"},{"key":"e_1_3_2_1_54_1","volume-title":"Hanna Wallach, Hal Daum\u00e9 III, and Kate Crawford.","author":"Gebru Timnit","year":"2018","unstructured":"Timnit Gebru , Jamie Morgenstern , Briana Vecchione , Jennifer Wortman Vaughan , Hanna Wallach, Hal Daum\u00e9 III, and Kate Crawford. 2018 . Datasheets for datasets. ArXiv Prepr. ArXiv 180309010 (2018). Timnit Gebru, Jamie Morgenstern, Briana Vecchione, Jennifer Wortman Vaughan, Hanna Wallach, Hal Daum\u00e9 III, and Kate Crawford. 2018. Datasheets for datasets. ArXiv Prepr. ArXiv180309010 (2018)."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300498"},{"key":"e_1_3_2_1_56_1","unstructured":"Chris Gilliard and David Golumbia. 2021. Luxury Surveillance. Real Life. Retrieved from https:\/\/reallifemag.com\/luxury-surveillance\/  Chris Gilliard and David Golumbia. 2021. Luxury Surveillance. Real Life. Retrieved from https:\/\/reallifemag.com\/luxury-surveillance\/"},{"key":"e_1_3_2_1_57_1","volume-title":"Discovery of grounded theory: Strategies for qualitative research","author":"Glaser Barney G","unstructured":"Barney G Glaser and Anselm L Strauss . 2017. Discovery of grounded theory: Strategies for qualitative research . Routledge . Barney G Glaser and Anselm L Strauss. 2017. Discovery of grounded theory: Strategies for qualitative research. Routledge."},{"key":"e_1_3_2_1_58_1","volume-title":"Berkeley Tech LJ 35","author":"Goldenfein Jake","year":"2020","unstructured":"Jake Goldenfein , Deirdre K Mulligan , Helen Nissenbaum , and Wendy Ju . 2020 . Through the Handoff Lens: Competing Visions of Autonomous Futures . Berkeley Tech LJ 35 , (2020), 835. Jake Goldenfein, Deirdre K Mulligan, Helen Nissenbaum, and Wendy Ju. 2020. Through the Handoff Lens: Competing Visions of Autonomous Futures. Berkeley Tech LJ 35, (2020), 835."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3390610"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1177\/0261018303023002006"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445779"},{"key":"e_1_3_2_1_62_1","unstructured":"Byung-Chul Han. 2017. In the swarm: Digital prospects. MIT Press.  Byung-Chul Han. 2017. In the swarm: Digital prospects. MIT Press."},{"key":"e_1_3_2_1_63_1","unstructured":"Jenny Hansson. Fearless feline chases coyote in Portland neighborhood. KOIN.com. Retrieved from https:\/\/www.koin.com\/news\/animals\/fearless-feline-chases-coyote-in-portland-neighborhood\/  Jenny Hansson. Fearless feline chases coyote in Portland neighborhood. KOIN.com. Retrieved from https:\/\/www.koin.com\/news\/animals\/fearless-feline-chases-coyote-in-portland-neighborhood\/"},{"key":"e_1_3_2_1_64_1","volume-title":"Privacy's blueprint","author":"Hartzog Woodrow","unstructured":"Woodrow Hartzog . 2018. Privacy's blueprint . Harvard University Press . Woodrow Hartzog. 2018. Privacy's blueprint. Harvard University Press."},{"key":"e_1_3_2_1_65_1","unstructured":"Adam Harvey. 2020. CV Dazzle: Computer Vision Dazzle Camouflage. Retrieved from https:\/\/cvdazzle.com\/  Adam Harvey. 2020. CV Dazzle: Computer Vision Dazzle Camouflage. Retrieved from https:\/\/cvdazzle.com\/"},{"key":"e_1_3_2_1_66_1","volume-title":"Symposium On Usable Privacy and Security (SOUPS).","author":"Hochheiser Harry","year":"2008","unstructured":"Harry Hochheiser , Jinjuan Feng , and Jonathan Lazar . 2008 . Challenges in universally usable privacy and security . In Symposium On Usable Privacy and Security (SOUPS). Harry Hochheiser, Jinjuan Feng, and Jonathan Lazar. 2008. Challenges in universally usable privacy and security. In Symposium On Usable Privacy and Security (SOUPS)."},{"key":"e_1_3_2_1_67_1","volume-title":"Technologies of Speculation","unstructured":"Sun-ha Hong. 2020. Technologies of Speculation . New York University Press . Sun-ha Hong. 2020. Technologies of Speculation. New York University Press."},{"key":"e_1_3_2_1_68_1","first-page":"5","article-title":"Looking professional: How women decide what to wear with and through automated technologies","volume":"27","author":"Horst Heather A","year":"2021","unstructured":"Heather A Horst , Cherry Baylosis , and Sheba Mohammid . 2021 . Looking professional: How women decide what to wear with and through automated technologies . Convergence 27 , 5 (October 2021), 1250\u20131263. Heather A Horst, Cherry Baylosis, and Sheba Mohammid. 2021. Looking professional: How women decide what to wear with and through automated technologies. Convergence 27, 5 (October 2021), 1250\u20131263.","journal-title":"Convergence"},{"key":"e_1_3_2_1_69_1","unstructured":"Roberto Hoyle Robert Templeman Steven Armes Denise Anthony David Cr and All Apu Kapadia. Privacy Behaviors of Lifeloggers using Wearable Cameras. UbiComp 571\u2013582.  Roberto Hoyle Robert Templeman Steven Armes Denise Anthony David Cr and All Apu Kapadia. Privacy Behaviors of Lifeloggers using Wearable Cameras. UbiComp 571\u2013582."},{"key":"e_1_3_2_1_70_1","volume-title":"A Prehistory of the Cloud","author":"Tung-Hui Hu.","unstructured":"Tung-Hui Hu. 2015. A Prehistory of the Cloud . MIT press . Tung-Hui Hu. 2015. A Prehistory of the Cloud. MIT press."},{"key":"e_1_3_2_1_71_1","unstructured":"Don Ihde. 1990. Technology and the lifeworld: From garden to earth. (1990).  Don Ihde. 1990. Technology and the lifeworld: From garden to earth. (1990)."},{"key":"e_1_3_2_1_72_1","unstructured":"Alan Jacobs. Attending to Technology: Theses for Disputation. The New Atlantis. Retrieved from https:\/\/www.thenewatlantis.com\/publications\/attending-to-technology-theses-for-disputation  Alan Jacobs. Attending to Technology: Theses for Disputation. The New Atlantis. Retrieved from https:\/\/www.thenewatlantis.com\/publications\/attending-to-technology-theses-for-disputation"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702526"},{"key":"e_1_3_2_1_74_1","unstructured":"Daniel Kahneman. 2011. Thinking Fast and Slow. Macmillan.  Daniel Kahneman. 2011. Thinking Fast and Slow. Macmillan."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13612-016-0042-6"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2020.1737606"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445598"},{"key":"e_1_3_2_1_78_1","volume-title":"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, ACM, Glasgow Scotland Uk, 1\u201313","author":"Kozubaev Sandjar","unstructured":"Sandjar Kozubaev , Fernando Rochaix , Carl DiSalvo , and Christopher A . Le Dantec. 2019. Spaces and Traces: Implications of Smart Technology in Public Housing . In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, ACM, Glasgow Scotland Uk, 1\u201313 . Sandjar Kozubaev, Fernando Rochaix, Carl DiSalvo, and Christopher A. Le Dantec. 2019. Spaces and Traces: Implications of Smart Technology in Public Housing. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, ACM, Glasgow Scotland Uk, 1\u201313."},{"key":"e_1_3_2_1_79_1","unstructured":"Joshua A Kroll Joanna Huey Solon Barocas Edward W Felten Joel R Reidenberg David G Robinson and Harlan Yu. Accountable Algorithms. Univ. Pa. Law Rev. 165 74.  Joshua A Kroll Joanna Huey Solon Barocas Edward W Felten Joel R Reidenberg David G Robinson and Harlan Yu. Accountable Algorithms. Univ. Pa. Law Rev. 165 74."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3180305"},{"key":"e_1_3_2_1_82_1","article-title":"Watch the Viral Video of a Small Boy Filling an Empty Trick-or-Treat Bowl With His Halloween","author":"Lemieux Melissa","year":"2019","unstructured":"Melissa Lemieux . 2019 . Watch the Viral Video of a Small Boy Filling an Empty Trick-or-Treat Bowl With His Halloween Candy. Newsweek. Retrieved from https:\/\/www.newsweek.com\/watch-viral-video-small-boy-filling-empty-trick-treat-bowl-his-halloween-candy-1469331 Melissa Lemieux. 2019. Watch the Viral Video of a Small Boy Filling an Empty Trick-or-Treat Bowl With His Halloween Candy. Newsweek. Retrieved from https:\/\/www.newsweek.com\/watch-viral-video-small-boy-filling-empty-trick-treat-bowl-his-halloween-candy-1469331","journal-title":"Candy. Newsweek. Retrieved from https:\/\/www.newsweek.com\/watch-viral-video-small-boy-filling-empty-trick-treat-bowl-his-halloween-candy-1469331"},{"key":"e_1_3_2_1_83_1","volume-title":"Ida. Law Rev. 51","author":"Levy Karen E C","year":"2014","unstructured":"Karen E C Levy . 2014 . Intimate Surveillance . Ida. Law Rev. 51 , (2014), 679. Karen E C Levy. 2014. Intimate Surveillance. Ida. Law Rev. 51, (2014), 679."},{"key":"e_1_3_2_1_84_1","volume-title":"All data are local: Thinking critically in a data-driven society","author":"Loukissas Yanni Alexander","unstructured":"Yanni Alexander Loukissas . 2019. All data are local: Thinking critically in a data-driven society . MIT Press . Yanni Alexander Loukissas. 2019. All data are local: Thinking critically in a data-driven society. MIT Press."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2016.23014"},{"key":"e_1_3_2_1_86_1","first-page":"4","article-title":"Privacy Attitudes of Smart Speaker Users","volume":"2019","author":"Malkin Nathan","year":"2019","unstructured":"Nathan Malkin , Joe Deatrick , Allen Tong , Primal Wijesekera , Serge Egelman , and David Wagner . 2019 . Privacy Attitudes of Smart Speaker Users . Proc. Priv. Enhancing Technol. 2019 , 4 (October 2019), 250\u2013271. Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera, Serge Egelman, and David Wagner. 2019. Privacy Attitudes of Smart Speaker Users. Proc. Priv. Enhancing Technol. 2019, 4 (October 2019), 250\u2013271.","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"e_1_3_2_1_87_1","first-page":"2","article-title":"Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts","volume":"2020","author":"Mare Shrirang","year":"2020","unstructured":"Shrirang Mare , Franziska Roesner , and Tadayoshi Kohno . 2020 . Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts . Proc. Priv. Enhancing Technol. 2020 , 2 (April 2020), 436\u2013458. Shrirang Mare, Franziska Roesner, and Tadayoshi Kohno. 2020. Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts. Proc. Priv. Enhancing Technol. 2020, 2 (April 2020), 436\u2013458.","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025875"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025735"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31205-2_10"},{"key":"e_1_3_2_1_91_1","volume-title":"Exploring Longitudinal Use of Activity Trackers. In 2016 IEEE International Conference on Healthcare Informatics (ICHI), IEEE, 198\u2013206","author":"Meyer Jochen","year":"2016","unstructured":"Jochen Meyer , Jochen Schnauber , Wilko Heuten , Harm Wienbergen , Rainer Hambrecht , Hans-J\u00fcrgen Appelrath , and Susanne Boll . 2016 . Exploring Longitudinal Use of Activity Trackers. In 2016 IEEE International Conference on Healthcare Informatics (ICHI), IEEE, 198\u2013206 . Jochen Meyer, Jochen Schnauber, Wilko Heuten, Harm Wienbergen, Rainer Hambrecht, Hans-J\u00fcrgen Appelrath, and Susanne Boll. 2016. Exploring Longitudinal Use of Activity Trackers. In 2016 IEEE International Conference on Healthcare Informatics (ICHI), IEEE, 198\u2013206."},{"key":"e_1_3_2_1_92_1","unstructured":"Matthew B Miles and A Michael Huberman. 1994. Qualitative data analysis: An expanded sourcebook. sage.  Matthew B Miles and A Michael Huberman. 1994. Qualitative data analysis: An expanded sourcebook. sage."},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.03.065"},{"key":"e_1_3_2_1_94_1","volume-title":"Wash Rev 79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum . 2004 . Privacy as contextual integrity . Wash Rev 79 , (2004), 119. Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash Rev 79, (2004), 119."},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702221"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370224"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445055"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41551-020-0534-9"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753635"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208540"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300275"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376347"},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675141"},{"key":"e_1_3_2_1_104_1","first-page":"272","article-title":"Wicked Problems","volume":"26","author":"Rittel Horst WJ","year":"1974","unstructured":"Horst WJ Rittel and Melvin M Webber . 1974 . Wicked Problems . Man-Made Futur. 26 , 1 (1974), 272 \u2013 280 . Horst WJ Rittel and Melvin M Webber. 1974. Wicked Problems. Man-Made Futur. 26, 1 (1974), 272\u2013280.","journal-title":"Man-Made Futur."},{"key":"e_1_3_2_1_105_1","volume-title":"Rosner, Gilad and Kenneally, Erin","author":"Rosner Gilad","year":"2018","unstructured":"Gilad Rosner and Erin Kenneally . 2018. Clearly opaque: Privacy risks of the internet of things . In Rosner, Gilad and Kenneally, Erin , Clearly Opaque : Privacy Risks of the Internet of Things ( May 1, 2018 ). IoT Privacy Forum . Gilad Rosner and Erin Kenneally. 2018. Clearly opaque: Privacy risks of the internet of things. In Rosner, Gilad and Kenneally, Erin, Clearly Opaque: Privacy Risks of the Internet of Things (May 1, 2018). IoT Privacy Forum."},{"key":"e_1_3_2_1_106_1","volume-title":"Privacy in peril: How we are sacrificing a fundamental right in exchange for security and convenience","author":"Rule James B","unstructured":"James B Rule . 2007. Privacy in peril: How we are sacrificing a fundamental right in exchange for security and convenience . Oxford University Press . James B Rule. 2007. Privacy in peril: How we are sacrificing a fundamental right in exchange for security and convenience. Oxford University Press."},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376889"},{"key":"e_1_3_2_1_108_1","first-page":"9","article-title":"Beyond the user: use and non-use in HCI. In Proceedings of the 21st annual conference of the Australian computer-human interaction special interest group: Design","volume":"24","author":"Satchell Christine","year":"2009","unstructured":"Christine Satchell and Paul Dourish . 2009 . Beyond the user: use and non-use in HCI. In Proceedings of the 21st annual conference of the Australian computer-human interaction special interest group: Design : Open 24\/7 , 9 \u2013 16 . Christine Satchell and Paul Dourish. 2009. Beyond the user: use and non-use in HCI. In Proceedings of the 21st annual conference of the Australian computer-human interaction special interest group: Design: Open 24\/7, 9\u201316.","journal-title":"Open"},{"key":"e_1_3_2_1_109_1","volume-title":"Proceedings of the 2009 British Computer Society Conference on Human-Computer Interaction, 169\u2013174","author":"Schrammel Johann","year":"2009","unstructured":"Johann Schrammel , Christina K\u00f6ffel , and Manfred Tscheligi . 2009 . Personality traits, usage patterns and information disclosure in online communities. In In BCS HCI \u201909 : Proceedings of the 2009 British Computer Society Conference on Human-Computer Interaction, 169\u2013174 . Johann Schrammel, Christina K\u00f6ffel, and Manfred Tscheligi. 2009. Personality traits, usage patterns and information disclosure in online communities. In In BCS HCI \u201909: Proceedings of the 2009 British Computer Society Conference on Human-Computer Interaction, 169\u2013174."},{"key":"e_1_3_2_1_110_1","volume-title":"Reflective Design. In Proceedings of the 4th decennial conference on Critical computing: between sense and sensibility, 49\u201358","author":"Sengers Phoebe","year":"2005","unstructured":"Phoebe Sengers , Kirsten Boehner , Shay David , and Joseph'Jofish\u2019 Kaye . 2005 . Reflective Design. In Proceedings of the 4th decennial conference on Critical computing: between sense and sensibility, 49\u201358 . Phoebe Sengers, Kirsten Boehner, Shay David, and Joseph'Jofish\u2019 Kaye. 2005. Reflective Design. In Proceedings of the 4th decennial conference on Critical computing: between sense and sensibility, 49\u201358."},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395501"},{"key":"e_1_3_2_1_112_1","volume-title":"Sentient City Survival Kit. Retrieved","author":"Shepard Mark","year":"2022","unstructured":"Mark Shepard . Sentient City Survival Kit. Retrieved March 9, 2022 from http:\/\/survival.sentientcity.net\/umbrella.html Mark Shepard. Sentient City Survival Kit. Retrieved March 9, 2022 from http:\/\/survival.sentientcity.net\/umbrella.html"},{"key":"e_1_3_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892522"},{"key":"e_1_3_2_1_114_1","first-page":"370","article-title":"Beyond notice and choice: Privacy, norms, and consent","author":"Sloan Robert H","year":"2014","unstructured":"Robert H Sloan and Richard Warner . 2014 . Beyond notice and choice: Privacy, norms, and consent . J High Tech L 14, (2014), 370 . Robert H Sloan and Richard Warner. 2014. Beyond notice and choice: Privacy, norms, and consent. J High Tech L 14, (2014), 370.","journal-title":"J High Tech"},{"key":"e_1_3_2_1_115_1","volume-title":"Introduction: Privacy self-management and the consent dilemma. Harv Rev 126","author":"Solove Daniel J","year":"2012","unstructured":"Daniel J Solove . 2012 . Introduction: Privacy self-management and the consent dilemma. Harv Rev 126 , (2012), 1880. Daniel J Solove. 2012. Introduction: Privacy self-management and the consent dilemma. Harv Rev 126, (2012), 1880."},{"key":"e_1_3_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300314"},{"key":"e_1_3_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1177\/0163443718781985"},{"key":"e_1_3_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300875"},{"key":"e_1_3_2_1_119_1","unstructured":"Tactical Tech. The Glass Room \u2013 Looking into your online life. Retrieved from https:\/\/www.theglassroom.org\/en\/home\/  Tactical Tech. The Glass Room \u2013 Looking into your online life. Retrieved from https:\/\/www.theglassroom.org\/en\/home\/"},{"key":"e_1_3_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445491"},{"key":"e_1_3_2_1_121_1","first-page":"171","article-title":"Accountabilities of presence: reframing location-based systems","volume":"61","author":"Troshynski Emily","year":"2011","unstructured":"Emily Troshynski , Charlotte Lee , and Paul Dourish . 2011 . Accountabilities of presence: reframing location-based systems . Droit Cult. Rev. Int. Interdiscip. 61 (2011), 171 \u2013 193 . Emily Troshynski, Charlotte Lee, and Paul Dourish. 2011. Accountabilities of presence: reframing location-based systems. Droit Cult. Rev. Int. Interdiscip. 61 (2011), 171\u2013193.","journal-title":"Droit Cult. Rev. Int. Interdiscip."},{"key":"e_1_3_2_1_122_1","doi-asserted-by":"crossref","unstructured":"Khai Truong Shwetak Patel Jay Summet and Gregory Abowd. 2005. Preventing Camera Recording by Designing a Capture-Resistant Environment.  Khai Truong Shwetak Patel Jay Summet and Gregory Abowd. 2005. Preventing Camera Recording by Designing a Capture-Resistant Environment.","DOI":"10.1007\/11551201_5"},{"key":"e_1_3_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632107"},{"key":"e_1_3_2_1_124_1","volume-title":"What Things Do: Philosophical Reflections on Technology, Agency, and Design","author":"Verbeek Peter-Paul","unstructured":"Peter-Paul Verbeek . 2005. What Things Do: Philosophical Reflections on Technology, Agency, and Design . Penn State University Press . Peter-Paul Verbeek. 2005. What Things Do: Philosophical Reflections on Technology, Agency, and Design. Penn State University Press."},{"key":"e_1_3_2_1_125_1","volume-title":"Things We Could Design: For More Than Human-Centered Worlds","author":"Wakkary Ron","unstructured":"Ron Wakkary . 2021. Things We Could Design: For More Than Human-Centered Worlds . MIT Press , Cambridge, MA, USA . Ron Wakkary. 2021. Things We Could Design: For More Than Human-Centered Worlds. MIT Press, Cambridge, MA, USA."},{"key":"e_1_3_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1145\/1254960.1254984"},{"key":"e_1_3_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173997"},{"key":"e_1_3_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1145\/3171533.3171538"},{"key":"e_1_3_2_1_129_1","unstructured":"Kelly Widdicks Tina Ringenson Daniel Pargman Vishnupriya Kuppusamy and Patricia Lago. 2018. Undesigning the Internet: An Exploratory Study of Reducing Everyday Internet Connectivity. In EPiC Series in Computing EasyChair 384\u2013397.  Kelly Widdicks Tina Ringenson Daniel Pargman Vishnupriya Kuppusamy and Patricia Lago. 2018. Undesigning the Internet: An Exploratory Study of Reducing Everyday Internet Connectivity. In EPiC Series in Computing EasyChair 384\u2013397."},{"key":"e_1_3_2_1_130_1","unstructured":"Oscar Williams. 2017. Nestie Awards 2017: Hilarious Moments Caught On Home Security Cameras. HuffPost UK. Retrieved from https:\/\/www.huffingtonpost.co.uk\/entry\/nestie-awards-2017-hilarious-moments-caught-on-home-security-cameras_uk_58c6a2d6e4b0d1078ca806f4  Oscar Williams. 2017. Nestie Awards 2017: Hilarious Moments Caught On Home Security Cameras. HuffPost UK. Retrieved from https:\/\/www.huffingtonpost.co.uk\/entry\/nestie-awards-2017-hilarious-moments-caught-on-home-security-cameras_uk_58c6a2d6e4b0d1078ca806f4"},{"key":"e_1_3_2_1_131_1","volume-title":"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI \u201919)","author":"Wong Richmond Y.","unstructured":"Richmond Y. Wong and Deirdre K. Mulligan . 2019. Bringing Design to the Privacy Table: Broadening \u201cDesign\u201d in \u201cPrivacy by Design\u201d Through the Lens of HCI . In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI \u201919) , Association for Computing Machinery, New York, NY, USA, 1\u201317. Richmond Y. Wong and Deirdre K. Mulligan. 2019. Bringing Design to the Privacy Table: Broadening \u201cDesign\u201d in \u201cPrivacy by Design\u201d Through the Lens of HCI. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI \u201919), Association for Computing Machinery, New York, NY, USA, 1\u201317."},{"key":"e_1_3_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240710"},{"key":"e_1_3_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"},{"key":"e_1_3_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025907"},{"key":"e_1_3_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445212"},{"key":"e_1_3_2_1_136_1","unstructured":"Eric Zeng Shrirang Mare and Franziska Roesner. End User Security & Privacy Concerns with Smart Homes. 17.  Eric Zeng Shrirang Mare and Franziska Roesner. End User Security & Privacy Concerns with Smart Homes. 17."},{"key":"e_1_3_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"key":"e_1_3_2_1_138_1","volume-title":"The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power","author":"Zuboff Shoshana","unstructured":"Shoshana Zuboff . 2018. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power ( 1 st ed.). Shoshana Zuboff. 2018. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (1st ed.).","edition":"1"},{"key":"e_1_3_2_1_139_1","unstructured":"2016. 61% Of Smart-Home Revenue Came From Security Cameras In The Last Year. TWICE. Retrieved from https:\/\/www.twice.com\/news\/61-smart-home-revenue-came-security-cameras-last-year-62631  2016. 61% Of Smart-Home Revenue Came From Security Cameras In The Last Year. TWICE. Retrieved from https:\/\/www.twice.com\/news\/61-smart-home-revenue-came-security-cameras-last-year-62631"}],"event":{"name":"CHI '22: CHI Conference on Human Factors in Computing Systems","location":"New Orleans LA USA","acronym":"CHI '22","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491102.3517617","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491102.3517617","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491102.3517617","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:16:59Z","timestamp":1750191419000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491102.3517617"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,29]]},"references-count":139,"alternative-id":["10.1145\/3491102.3517617","10.1145\/3491102"],"URL":"https:\/\/doi.org\/10.1145\/3491102.3517617","relation":{},"subject":[],"published":{"date-parts":[[2022,4,29]]}}}