{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T22:17:50Z","timestamp":1776118670049,"version":"3.50.1"},"reference-count":64,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2022,9,6]],"date-time":"2022-09-06T00:00:00Z","timestamp":1662422400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF Award","award":["CNS-1953740"],"award-info":[{"award-number":["CNS-1953740"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Things"],"published-print":{"date-parts":[[2022,11,30]]},"abstract":"<jats:p>Internet-connected consumer devices have rapidly increased in popularity; however, relatively little is known about how these technologies are affecting interpersonal relationships in multi-occupant households. In this study, we conduct 13 semi-structured interviews and survey 508 individuals from a variety of backgrounds to discover and categorize how consumer IoT devices are affecting interpersonal relationships in the United States. We highlight several themes, providing exploratory data about the pervasiveness of interpersonal costs and benefits of consumer IoT devices. These results inform follow-up studies and design priorities for future IoT technologies to amplify positive and reduce negative interpersonal effects.<\/jats:p>","DOI":"10.1145\/3539737","type":"journal-article","created":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T11:37:31Z","timestamp":1654169851000},"page":"1-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["You, Me, and IoT: How Internet-connected Consumer Devices Affect Interpersonal Relationships"],"prefix":"10.1145","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9273-4268","authenticated-orcid":false,"given":"Noah","family":"Apthorpe","sequence":"first","affiliation":[{"name":"Colgate University, Hamilton, NY"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9797-2495","authenticated-orcid":false,"given":"Pardis","family":"Emami-Naeini","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3719-676X","authenticated-orcid":false,"given":"Arunesh","family":"Mathur","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0804-6110","authenticated-orcid":false,"given":"Marshini","family":"Chetty","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9315-5201","authenticated-orcid":false,"given":"Nick","family":"Feamster","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL"}]}],"member":"320","published-online":{"date-parts":[[2022,9,6]]},"reference":[{"key":"e_1_3_3_2_2","first-page":"116","article-title":"Tangible privacy: Towards user-centric sensor designs for bystander privacy","volume":"4","author":"Ahmad Imtiaz","year":"2020","unstructured":"Imtiaz Ahmad, Rosta Farzan, Apu Kapadia, and Adam J. Lee. 2020. Tangible privacy: Towards user-centric sensor designs for bystander privacy. Proc. ACM Hum.-comput. Interact. 4, CSCW (2020), 116.","journal-title":"Proc. ACM Hum.-comput. Interact."},{"key":"e_1_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0040"},{"issue":"2","key":"e_1_3_3_4_2","first-page":"59","article-title":"Discovering smart home internet of things privacy norms using contextual integrity","volume":"2","author":"Apthorpe Noah","year":"2018","unstructured":"Noah Apthorpe, Yan Shvartzshnaider, Arunesh Mathur, Dillon Reisman, and Nick Feamster. 2018. Discovering smart home internet of things privacy norms using contextual integrity. Proc. ACM Interact., Mob., Wear. Ubiq. Technol. 2, 2 (2018), 59.","journal-title":"Proc. ACM Interact., Mob., Wear. Ubiq. Technol."},{"key":"e_1_3_3_5_2","volume-title":"Self-efficacy. Encyclopedia of Human Behavior (Vol. 4)","author":"Bandura Albert","year":"1994","unstructured":"Albert Bandura. 1994. Self-efficacy. Encyclopedia of Human Behavior (Vol. 4). Academic Press, New York, 71\u201381."},{"key":"e_1_3_3_6_2","first-page":"1","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems","author":"Beneteau Erin","year":"2019","unstructured":"Erin Beneteau, Olivia K. Richards, Mingrui Zhang, Julie A. Kientz, Jason Yip, and Alexis Hiniker. 2019. Communication breakdowns between families and Alexa. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1\u201313."},{"key":"e_1_3_3_7_2","article-title":"Thermostats, locks and lights: Digital tools of domestic abuse","author":"Bowles Nellie","year":"2018","unstructured":"Nellie Bowles. 2018. Thermostats, locks and lights: Digital tools of domestic abuse. The New York Times (June 2018). Retrieved from https:\/\/www.nytimes.com\/2018\/06\/23\/technology\/smart-home-devices-domestic-abuse.html.","journal-title":"The New York Times"},{"key":"e_1_3_3_8_2","article-title":"Bots and data quality on crowdsourcing platforms","author":"Bradley Phelim","year":"2018","unstructured":"Phelim Bradley. 2018. Bots and data quality on crowdsourcing platforms. Prolific Blog (August 2018). Retrieved from https:\/\/www.prolific.co\/blog\/bots-and-data-quality-on-crowdsourcing-platforms.","journal-title":"Prolific Blog"},{"key":"e_1_3_3_9_2","volume-title":"Internet of Things (IoT) Security and Privacy Recommendations","author":"Group Broadband Internet Technical Advisory","year":"2016","unstructured":"Broadband Internet Technical Advisory Group. 2016. Internet of Things (IoT) Security and Privacy Recommendations. Technical Report."},{"key":"e_1_3_3_10_2","first-page":"354","volume-title":"Proceedings of the 9th International Conference on Ubiquitous Computing","author":"Brown Barry","year":"2007","unstructured":"Barry Brown, Alex S. Taylor, Shahram Izadi, Abigail Sellen, Joseph \u201cJofish\u201d Kaye, and Rachel Eardley. 2007. Locating family values: A field trial of the whereabouts clock. In Proceedings of the 9th International Conference on Ubiquitous Computing. 354\u2013371."},{"key":"e_1_3_3_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979249"},{"key":"e_1_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.healthplace.2018.01.006"},{"key":"e_1_3_3_13_2","article-title":"Alexa? Please ignore my husband","author":"Chelser Caren","year":"2018","unstructured":"Caren Chelser. 2018. Alexa? Please ignore my husband. The New York Times (May 2018). Retrieved from https:\/\/www.nytimes.com\/2018\/05\/04\/style\/modern-love-alexa-please-ignore-my-husband.html.","journal-title":"The New York Times"},{"key":"e_1_3_3_14_2","first-page":"1","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems","author":"Chen Yuxin","year":"2020","unstructured":"Yuxin Chen, Huiying Li, Shan-Yuan Teng, Steven Nagels, Zhijing Li, Pedro Lopes, Ben Y. Zhao, and Haitao Zheng. 2020. Wearable microphone jamming. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1\u201312."},{"key":"e_1_3_3_15_2","doi-asserted-by":"crossref","first-page":"1889","DOI":"10.1145\/1978942.1979217","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"Chetty Marshini","year":"2011","unstructured":"Marshini Chetty, David Haslem, Andrew Baird, Ugochi Ofoha, Bethany Sumner, and Rebecca Grinter. 2011. Why is my internet slow? Making network speeds visible. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 1889\u20131898."},{"key":"e_1_3_3_16_2","first-page":"245","volume-title":"Proceedings of the IEEE Security and Privacy Workshops","author":"Copos Bogdan","year":"2016","unstructured":"Bogdan Copos, Karl Levitt, Matt Bishop, and Jeff Rowe. 2016. Is anybody home? Inferring activity from smart home network traffic. In Proceedings of the IEEE Security and Privacy Workshops. 245\u2013251."},{"issue":"1","key":"e_1_3_3_17_2","first-page":"7","article-title":"Is smart home a necessity or a fantasy for the mainstream user? A study on users\u2019 expectations of smart household appliances","volume":"12","author":"Coskun Aykut","year":"2018","unstructured":"Aykut Coskun, G\u00fcl Kaner, and \u0130dil Bostan. 2018. Is smart home a necessity or a fantasy for the mainstream user? A study on users\u2019 expectations of smart household appliances. Int. J. Des. 12, 1 (2018), 7\u201320.","journal-title":"Int. J. Des."},{"key":"e_1_3_3_18_2","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1007\/978-3-319-18425-8_9","volume-title":"Proceedings of the International Symposium on End User Development","author":"Demeure Alexandre","year":"2015","unstructured":"Alexandre Demeure, Sybille Caffiau, Elena Elias, and Camille Roux. 2015. Building and using home automation systems: A field study. In Proceedings of the International Symposium on End User Development. 125\u2013140."},{"issue":"1","key":"e_1_3_3_19_2","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/s10111-002-0114-7","article-title":"Exploring and enhancing the home experience","volume":"5","author":"Eggen Berry","year":"2003","unstructured":"Berry Eggen, Gerard Hollemans, and Richard van de Sluis. 2003. Exploring and enhancing the home experience. Cogn., Technol. Work 5, 1 (2003), 44\u201354.","journal-title":"Cogn., Technol. Work"},{"key":"e_1_3_3_20_2","first-page":"399","volume-title":"Proceedings of the 13th Symposium on Usable Privacy and Security","author":"Emami-Naeini Pardis","year":"2017","unstructured":"Pardis Emami-Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman Sadeh. 2017. Privacy expectations and preferences in an IoT world. In Proceedings of the 13th Symposium on Usable Privacy and Security. 399\u2013412."},{"key":"e_1_3_3_21_2","first-page":"48","article-title":"The influence of friends and experts on privacy decision making in IoT scenarios","volume":"2","author":"Emami-Naeini Pardis","year":"2018","unstructured":"Pardis Emami-Naeini, Martin Degeling, Lujo Bauer, Richard Chow, Lorrie Faith Cranor, Mohammad Reza Haghighat, and Heather Patterson. 2018. The influence of friends and experts on privacy decision making in IoT scenarios. Proc. ACM Hum.-comput. Interact. 2, CSCW (2018), 48.","journal-title":"Proc. ACM Hum.-comput. Interact."},{"key":"e_1_3_3_22_2","first-page":"534","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems","author":"Emami-Naeini Pardis","year":"2019","unstructured":"Pardis Emami-Naeini, Henry Dixon, Yuvraj Agarwal, and Lorrie Faith Cranor. 2019. Exploring how privacy and security factor into IoT device purchase behavior. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 534."},{"key":"e_1_3_3_23_2","first-page":"46","article-title":"Digital technologies and intimate partner violence: A qualitative analysis with multiple stakeholders","volume":"1","author":"Freed Diana","year":"2017","unstructured":"Diana Freed, Jackeline Palmer, Diana Elizabeth Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2017. Digital technologies and intimate partner violence: A qualitative analysis with multiple stakeholders. Proc. ACM Hum.-comput. Interact. 1, CSCW (2017), 46.","journal-title":"Proc. ACM Hum.-comput. Interact."},{"key":"e_1_3_3_24_2","volume-title":"IUI Workshops","author":"Garg Radhika","year":"2019","unstructured":"Radhika Garg and Christopher Moreno. 2019. Exploring everyday sharing practices of smart speakers. In IUI Workshops."},{"key":"e_1_3_3_25_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3359165","article-title":"\u201cWhen you can do it, why can\u2019t I?\u201d: Racial and socioeconomic differences in family technology use and non-use","volume":"3","author":"Garg Radhika","year":"2019","unstructured":"Radhika Garg and Subhasree Sengupta. 2019. \u201cWhen you can do it, why can\u2019t I?\u201d: Racial and socioeconomic differences in family technology use and non-use. Proc. ACM Hum.-comput. Interact. 3, CSCW (2019), 1\u201322.","journal-title":"Proc. ACM Hum.-comput. Interact."},{"key":"e_1_3_3_26_2","first-page":"1","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems","author":"Geeng Christine","year":"2019","unstructured":"Christine Geeng and Franziska Roesner. 2019. Who\u2019s in control? Interactions in multi-user smart homes. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1\u201313."},{"key":"e_1_3_3_27_2","first-page":"1","volume-title":"Proceedings of the 23rd International Workshop on Computer-aided Modeling and Design of Communication Links and Networks","author":"Hatzivasilis George","year":"2018","unstructured":"George Hatzivasilis, Ioannis Askoxylakis, George Alexandris, Darko Anicic, Arne Br\u00f6ring, Vivek Kulkarni, Konstantinos Fysarakis, and George Spanoudakis. 2018. The interoperability of things: Interoperable solutions as an enabler for IoT and Web 3.0. In Proceedings of the 23rd International Workshop on Computer-aided Modeling and Design of Communication Links and Networks. 1\u20137."},{"key":"e_1_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.5555\/3361338.3361347"},{"key":"e_1_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277223"},{"key":"e_1_3_3_30_2","article-title":"Turkers in this canvassing: Young, well-educated and frequent users","author":"Hitlin Paul","year":"2016","unstructured":"Paul Hitlin. 2016. Turkers in this canvassing: Young, well-educated and frequent users. Pew Res. Cent. (July 2016).","journal-title":"Pew Res. Cent."},{"issue":"4","key":"e_1_3_3_31_2","doi-asserted-by":"crossref","first-page":"1733","DOI":"10.1007\/s42835-019-00187-w","article-title":"A wrist worn acceleration based human motion analysis and classification for ambient smart home system","volume":"14","author":"Jalal Ahmad","year":"2019","unstructured":"Ahmad Jalal, Majid Ali Khan Quaid, and Kibum Kim. 2019. A wrist worn acceleration based human motion analysis and classification for ambient smart home system. J. Electric. Eng. Technol. 14, 4 (2019), 1733\u20131739.","journal-title":"J. Electric. Eng. Technol."},{"key":"e_1_3_3_32_2","first-page":"1","volume-title":"Proceedings of the Halfway to the Future Symposium 2019","author":"Kraemer Martin","year":"2019","unstructured":"Martin Kraemer, Ivan Flechais, and Helena Webb. 2019. Exploring communal technology use in the home. In Proceedings of the Halfway to the Future Symposium 2019. 1\u20138."},{"key":"e_1_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.2307\/2531695"},{"key":"e_1_3_3_34_2","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1145\/2750858.2804288","volume-title":"Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing","author":"Lazar Amanda","year":"2015","unstructured":"Amanda Lazar, Christian Koehler, Joshua Tanenbaum, and David H. Nguyen. 2015. Why we use and abandon smart devices. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing. 635\u2013646."},{"key":"e_1_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRCCS.2009.70"},{"key":"e_1_3_3_36_2","volume-title":"Smart Home Device Ownership Rates in the United States, as of March 2017, by Age Group","author":"Liu Shanhong","year":"2017","unstructured":"Shanhong Liu. 2017. Smart Home Device Ownership Rates in the United States, as of March 2017, by Age Group. Technical Report. Statista."},{"key":"e_1_3_3_37_2","volume-title":"Proceedings of the European Workshop on Usable Security","author":"Malkin Nathan","year":"2018","unstructured":"Nathan Malkin, Julia Bernd, Maritza Johnson, and Serge Egelman. 2018. \u201cWhat can\u2019t data be used for?\u201d Privacy expectations about smart TVs in the US. In Proceedings of the European Workshop on Usable Security."},{"key":"e_1_3_3_38_2","first-page":"203","volume-title":"Proceedings of the IEEE\/ACM 5th International Conference on Internet-of-Things Design and Implementation","author":"Mazhar M. Hammad","year":"2020","unstructured":"M. Hammad Mazhar and Zubair Shafiq. 2020. Characterizing smart home IoT traffic in the wild. In Proceedings of the IEEE\/ACM 5th International Conference on Internet-of-Things Design and Implementation. 203\u2013215."},{"key":"e_1_3_3_39_2","first-page":"67","volume-title":"Proceedings of the International Conference on HCI in Business, Government, and Organizations","author":"McCreary Faith","year":"2016","unstructured":"Faith McCreary, Alexandra Zafiroglu, and Heather Patterson. 2016. The contextual complexity of privacy in smart homes and smart buildings. In Proceedings of the International Conference on HCI in Business, Government, and Organizations. 67\u201378."},{"key":"e_1_3_3_40_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3359174","article-title":"Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice","volume":"3","author":"McDonald Nora","year":"2019","unstructured":"Nora McDonald, Sarita Schoenebeck, and Andrea Forte. 2019. Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice. Proc. ACM Hum.-comput. Interact. 3, CSCW (2019), 1\u201323.","journal-title":"Proc. ACM Hum.-comput. Interact."},{"key":"e_1_3_3_41_2","first-page":"2161","volume-title":"CHI\u201914 Extended Abstracts on Human Factors in Computing Systems","author":"Mennicken Sarah","year":"2014","unstructured":"Sarah Mennicken, Jonas Hofer, Anind Dey, and Elaine Huang. 2014. Casalendar: A temporal interface for automated homes. In CHI\u201914 Extended Abstracts on Human Factors in Computing Systems. 2161\u20132166."},{"key":"e_1_3_3_42_2","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/978-3-642-31205-2_10","volume-title":"Proceedings of the International Conference on Pervasive Computing","author":"Mennicken Sarah","year":"2012","unstructured":"Sarah Mennicken and Elaine Huang. 2012. Hacking the natural habitat: An in-the-wild study of smart homes, their development, and the people who live in them. In Proceedings of the International Conference on Pervasive Computing. 143\u2013160."},{"key":"e_1_3_3_43_2","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1145\/2632048.2636076","volume-title":"Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing","author":"Mennicken Sarah","year":"2014","unstructured":"Sarah Mennicken, Jo Vermeulen, and Elaine M. Huang. 2014. From today\u2019s augmented houses to tomorrow\u2019s smart homes: New directions for home automation research. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing. 105\u2013115."},{"key":"e_1_3_3_44_2","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/10503.001.0001","volume-title":"Left to Our Own Devices: Outsmarting Smart Technology to Reclaim Our Relationships, Health, and Focus","author":"Morris Margaret E.","year":"2018","unstructured":"Margaret E. Morris. 2018. Left to Our Own Devices: Outsmarting Smart Technology to Reclaim Our Relationships, Health, and Focus. The MIT Press."},{"key":"e_1_3_3_45_2","doi-asserted-by":"publisher","DOI":"10.5555\/1822585"},{"key":"e_1_3_3_46_2","unstructured":"nVivo Transcription. 2019. Retrieved from https:\/\/www.qsrinternational.com\/nvivo\/nvivo-products\/transcription."},{"key":"e_1_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/263552.263617"},{"key":"e_1_3_3_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/3287061"},{"key":"e_1_3_3_49_2","volume-title":"Proceedings of the 41st Research Conference on Communication, Information and Internet Policy","author":"Patterson Heather","year":"2013","unstructured":"Heather Patterson. 2013. Contextual expectations of privacy in self-generated health information flows. In Proceedings of the 41st Research Conference on Communication, Information and Internet Policy."},{"key":"e_1_3_3_50_2","article-title":"Internet\/Broadband Fact Sheet","author":"Center Pew Research","year":"2019","unstructured":"Pew Research Center. 2019. Internet\/Broadband Fact Sheet. Retrieved from https:\/\/www.pewresearch.org\/internet\/fact-sheet\/internet-broadband\/.","journal-title":"Retrieved from https:\/\/www.pewresearch.org\/internet\/fact-sheet\/internet-broadband\/"},{"key":"e_1_3_3_51_2","unstructured":"Prolific. 2019. Retrieved from https:\/\/www.prolific.co\/."},{"key":"e_1_3_3_52_2","volume-title":"Interviewing as Qualitative Research: A Guide for Researchers in Education and the Social Sciences","author":"Seidman Irving","year":"2013","unstructured":"Irving Seidman. 2013. Interviewing as Qualitative Research: A Guide for Researchers in Education and the Social Sciences. Teachers College Press."},{"key":"e_1_3_3_53_2","first-page":"1","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems","author":"Seymour William","year":"2020","unstructured":"William Seymour, Martin J. Kraemer, Reuben Binns, and Max Van Kleek. 2020. Informing the design of privacy-empowering tools for the connected home. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1\u201314."},{"key":"e_1_3_3_54_2","first-page":"1","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems","author":"Shin Jo","year":"2019","unstructured":"Jo Shin, Gabriela Aceves Sep\u00falveda, and William Odom. 2019. \u201cCollective wisdom\u201d inquiring into collective homes as a site for HCI design. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1\u201314."},{"key":"e_1_3_3_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2011.6018863"},{"key":"e_1_3_3_56_2","first-page":"1","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems","author":"Strengers Yolande","year":"2019","unstructured":"Yolande Strengers, Jenny Kennedy, Paula Arcari, Larissa Nicholls, and Melissa Gregg. 2019. Protection, productivity and pleasure in the smart home: Emerging expectations and gendered insights from Australian early adopters. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1\u201313."},{"key":"e_1_3_3_57_2","first-page":"511","volume-title":"Proceedings of the ACM Conference on Ubiquitous Computing","author":"Takayama Leila","year":"2012","unstructured":"Leila Takayama, Caroline Pantofaru, David Robson, Bianca Soto, and Michael Barry. 2012. Making technology homey: Finding sources of satisfaction and meaning in home automation. In Proceedings of the ACM Conference on Ubiquitous Computing. 511\u2013520."},{"key":"e_1_3_3_58_2","first-page":"129","volume-title":"Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing","author":"Ur Blase","year":"2014","unstructured":"Blase Ur, Jaeyeon Jung, and Stuart Schechter. 2014. Intruders versus intrusiveness: Teens\u2019 and parents\u2019 perspectives on home-entryway surveillance. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing. 129\u2013139."},{"key":"e_1_3_3_59_2","unstructured":"UserBob. 2019. Retrieved from https:\/\/userbob.com\/."},{"key":"e_1_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2016.12.047"},{"key":"e_1_3_3_61_2","first-page":"779","volume-title":"Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing","author":"Woo Jong-bum","year":"2015","unstructured":"Jong-bum Woo and Youn-kyung Lim. 2015. User experience in do-it-yourself-style smart homes. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing. 779\u2013790."},{"key":"e_1_3_3_62_2","first-page":"540","volume-title":"Ethnographic Praxis in Industry Conference Proceedings","volume":"2016","author":"Zafiroglu Alexandra","year":"2016","unstructured":"Alexandra Zafiroglu, Heather Patterson, and Faith McCreary. 2016. Living comfortably in glass houses. In Ethnographic Praxis in Industry Conference Proceedings, Vol. 2016. Wiley Online Library, 540\u2013540."},{"key":"e_1_3_3_63_2","first-page":"65","volume-title":"Proceedings of the 13th Symposium on Usable Privacy and Security","author":"Zeng Eric","year":"2017","unstructured":"Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End user security and privacy concerns with smart homes. In Proceedings of the 13th Symposium on Usable Privacy and Security. 65\u201380."},{"key":"e_1_3_3_64_2","first-page":"159","volume-title":"Proceedings of the 28th USENIX Security Symposium","author":"Zeng Eric","year":"2019","unstructured":"Eric Zeng and Franziska Roesner. 2019. Understanding and improving security and privacy in multi-user smart homes: A design exploration and in-home user study. In Proceedings of the 28th USENIX Security Symposium. 159\u2013176."},{"key":"e_1_3_3_65_2","first-page":"200","article-title":"User perceptions of smart home IoT privacy","volume":"2","author":"Zheng Serena","year":"2018","unstructured":"Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. 2018. User perceptions of smart home IoT privacy. Proc. ACM Hum.-comput. Interact. 2, CSCW (2018), 200.","journal-title":"Proc. ACM Hum.-comput. Interact."}],"container-title":["ACM Transactions on Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3539737","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3539737","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:02Z","timestamp":1750183802000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3539737"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,6]]},"references-count":64,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,11,30]]}},"alternative-id":["10.1145\/3539737"],"URL":"https:\/\/doi.org\/10.1145\/3539737","relation":{},"ISSN":["2691-1914","2577-6207"],"issn-type":[{"value":"2691-1914","type":"print"},{"value":"2577-6207","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,6]]},"assertion":[{"value":"2021-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-05-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-09-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}