{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:59:23Z","timestamp":1776110363750,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100019827","name":"Meta","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100019827","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["OIA-1936968"],"award-info":[{"award-number":["OIA-1936968"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544548.3581360","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T04:26:08Z","timestamp":1681964768000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Exploring the Negotiation Behaviors of Owners and Bystanders over Data Practices of Smart Home Devices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1207-5416","authenticated-orcid":false,"given":"Ahmed","family":"Alshehri","sequence":"first","affiliation":[{"name":"Department of Computer Science, Colorado School of Mines, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9021-7593","authenticated-orcid":false,"given":"Eugin","family":"Pahk","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Colorado School of Mines, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9107-0925","authenticated-orcid":false,"given":"Joseph","family":"Spielman","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Colorado School of Mines, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1904-8798","authenticated-orcid":false,"given":"Jacob T","family":"Parker","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Colorado School of Mines, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5729-5047","authenticated-orcid":false,"given":"Benjamin","family":"Gilbert","sequence":"additional","affiliation":[{"name":"Colorado School of Mines, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6095-4768","authenticated-orcid":false,"given":"Chuan","family":"Yue","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Colorado School of Mines, United States"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445122"},{"key":"e_1_3_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415187"},{"key":"e_1_3_3_2_3_1","volume-title":"Exploring Bystanders\u2019 Privacy Concerns with Smart Homes in Jordan. In CHI Conference on Human Factors in Computing Systems. 1\u201324","author":"Albayaydh S","year":"2022","unstructured":"Wael\u00a0S Albayaydh and Ivan Flechais. 2022. Exploring Bystanders\u2019 Privacy Concerns with Smart Homes in Jordan. In CHI Conference on Human Factors in Computing Systems. 1\u201324."},{"key":"e_1_3_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0064"},{"key":"e_1_3_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1257\/jep.11.1.109"},{"key":"e_1_3_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11150-006-0001-8"},{"key":"e_1_3_3_2_7_1","volume-title":"Balancing Power Dynamics in Smart Homes: Nannies\u2019 Perspectives on How Cameras Reflect and Affect Relationships. In Eighteenth Symposium on Usable Privacy and Security (SOUPS","author":"Bernd Julia","year":"2022","unstructured":"Julia Bernd, Ruba Abu-Salma, Junghyun Choy, and Alisa Frik. 2022. Balancing Power Dynamics in Smart Homes: Nannies\u2019 Perspectives on How Cameras Reflect and Affect Relationships. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). 687\u2013706."},{"key":"e_1_3_3_2_8_1","volume-title":"Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet.","author":"Bernd Julia","year":"2020","unstructured":"Julia Bernd, Ruba Abu-Salma, and Alisa Frik. 2020. Bystanders\u2019 Privacy: The Perspectives of Nannies on Smart Home Surveillance. In Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet."},{"key":"e_1_3_3_2_9_1","volume-title":"Interdependent Privacy: Let Me Share Your Data","author":"Bicz\u00f3k Gergely","year":"2013","unstructured":"Gergely Bicz\u00f3k and Pern\u00a0Hui Chia. 2013. Interdependent Privacy: Let Me Share Your Data. In Financial Cryptography and Data Security, Ahmad-Reza Sadeghi (Ed.). 338\u2013353."},{"key":"e_1_3_3_2_10_1","volume-title":"Do people exploit their bargaining power? An experimental study. Games and Economic Behavior 3, 3","author":"Binmore Ken","year":"1991","unstructured":"Ken Binmore, Peter Morgan, Avner Snaked, and John Sutton. 1991. Do people exploit their bargaining power? An experimental study. Games and Economic Behavior 3, 3 (1991)."},{"key":"e_1_3_3_2_11_1","doi-asserted-by":"crossref","unstructured":"K\u00a0G Binmore. 1985. Equilibria in Extensive Games. The Economic Journal 95(1985).","DOI":"10.2307\/2232869"},{"key":"e_1_3_3_2_12_1","volume-title":"Qualitative HCI Research: Going Behind the Scenes","author":"Blandford Ann","unstructured":"Ann Blandford, Dominic Furniss, and Stephann Makri. 2016. Qualitative HCI Research: Going Behind the Scenes. Morgan & Claypool Publishers."},{"key":"e_1_3_3_2_13_1","article-title":"A Comparative Model of Bargaining: Theory and Evidence","volume":"81","author":"Bolton E","year":"1991","unstructured":"Gary\u00a0E Bolton. 1991. A Comparative Model of Bargaining: Theory and Evidence. The American Economic Review 81, 5 (1991).","journal-title":"The American Economic Review"},{"key":"e_1_3_3_2_14_1","unstructured":"United States\u00a0Census Bureau. 2020. U.S. Census Results. https:\/\/www.census.gov\/programs-surveys\/decennial-census\/decade\/2020\/2020-census-main.html."},{"key":"e_1_3_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0060"},{"key":"e_1_3_3_2_16_1","article-title":"Nash-in-Nash","volume":"127","author":"Collard-Wexler Allan","year":"2019","unstructured":"Allan Collard-Wexler, Gautam Gowrisankaran, and Robin\u00a0S. Lee. 2019. \"Nash-in-Nash\" Bargaining: A Microfoundation for Applied Work. Journal of Political Economy 127, 1 (2019).","journal-title":"Journal of Political Economy"},{"key":"e_1_3_3_2_17_1","unstructured":"Rachel T.\u00a0A. Croson. 2002. Why and how to experiment: Methodologies from experimental economics. University of Illinois Law Review 2002 (2002)."},{"key":"e_1_3_3_2_18_1","volume-title":"Exploiting moral wiggle room: experiments demonstrating an illusory preference for fairness. Economic Theory 33, 1","author":"Dana Jason","year":"2007","unstructured":"Jason Dana, Roberto\u00a0A. Weber, and Jason\u00a0Xi Kuang. 2007. Exploiting moral wiggle room: experiments demonstrating an illusory preference for fairness. Economic Theory 33, 1 (2007)."},{"key":"e_1_3_3_2_19_1","volume-title":"Proceedings of IEEE Pervasive Computing: Special Issue - Securing the IoT. 35\u201346","author":"Das Anupam","year":"2018","unstructured":"Anupam Das, Martin Degeling, Daniel Smullen, and Norman Sadeh. 2018. Personalized Privacy Assistants for the Internet of Things. In Proceedings of IEEE Pervasive Computing: Special Issue - Securing the IoT. 35\u201346."},{"key":"e_1_3_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.181"},{"key":"e_1_3_3_2_21_1","volume-title":"Proceedings of the Symposium on Usable Privacy and Security. 399\u2013412","author":"Emami-Naeini Pardis","year":"2017","unstructured":"Pardis Emami-Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie\u00a0Faith Cranor, and Norman Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. In Proceedings of the Symposium on Usable Privacy and Security. 399\u2013412."},{"key":"e_1_3_3_2_22_1","unstructured":"Tala Esmaili and Krystyna\u00a0Blokhina Gilkis. 2017. Alternative Dispute Resolution. https:\/\/www.law.cornell.edu\/wex\/alternative_dispute_resolution."},{"key":"e_1_3_3_2_23_1","volume-title":"Testing theories of fairness\u2014Intentions matter. Games and Economic Behavior 62, 1","author":"Falk Armin","year":"2008","unstructured":"Armin Falk, Ernst Fehr, and Urs Fischbacher. 2008. Testing theories of fairness\u2014Intentions matter. Games and Economic Behavior 62, 1 (2008)."},{"key":"e_1_3_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1162\/003355399556151"},{"key":"e_1_3_3_2_25_1","doi-asserted-by":"publisher","unstructured":"Ernst Fehr and Klaus\u00a0M. Schmidt. 2006. Chapter 8 The Economics of Fairness Reciprocity and Altruism \u2013 Experimental Evidence and New Theories. The quarterly journal of economics 1 (2006). https:\/\/doi.org\/10.1016\/S1574-0714(06)01008-6","DOI":"10.1016\/S1574-0714(06)01008-6"},{"key":"e_1_3_3_2_26_1","volume-title":"Statistical methods for rates and proportions","author":"Fleiss L","unstructured":"Joseph\u00a0L Fleiss, Bruce Levin, and Myunghee\u00a0Cho Paik. 2013. Statistical methods for rates and proportions. John Wiley & Sons."},{"key":"e_1_3_3_2_27_1","volume-title":"C","author":"Gafaro Margarita","year":"2020","unstructured":"Margarita Gafaro and C\u00e9sar Mantilla. 2020. Land division: A lab-in-the-field bargaining experiment. Journal of Development Economics 146, C (2020)."},{"key":"e_1_3_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300498"},{"key":"e_1_3_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376529"},{"key":"e_1_3_3_2_30_1","volume-title":"Proceedings of the Symposium on Usable Privacy and Security. 37\u201349","author":"Kang Ruogu","year":"2014","unstructured":"Ruogu Kang, Stephanie Brown, Laura Dabbish, and Sara\u00a0B Kiesler. 2014. Privacy Attitudes of Mechanical Turk Workers and the US Public. In Proceedings of the Symposium on Usable Privacy and Security. 37\u201349."},{"key":"e_1_3_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1257\/aer.90.4.1072"},{"key":"e_1_3_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445598"},{"key":"e_1_3_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382972"},{"key":"e_1_3_3_2_34_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction. 31\u00a0pages.","author":"Lau Josephine","unstructured":"Josephine Lau, Benjamin\u00a0J Zimmerman, and Florian Schaub.2018. Alexa, are you listening? Privacy perceptions, concerns and privacy-seeking behaviors with smart speakers.. In Proceedings of the ACM on Human-Computer Interaction. 31\u00a0pages."},{"key":"e_1_3_3_2_35_1","volume-title":"Proceedings of IEEE International Conference on Pervasive Computing and Communications. 276\u2013285","author":"Lee H.","unstructured":"H. Lee and A. Kobsa. 2017. Privacy preference modeling and prediction in a simulated campuswide IoT environment. In Proceedings of IEEE International Conference on Pervasive Computing and Communications. 276\u2013285."},{"key":"e_1_3_3_2_36_1","volume-title":"Proceedings of IEEE World Forum on Internet of Things. 407\u2013412","author":"Lee H.","unstructured":"H. Lee and S. Kobsa. 2016. Understanding User Privacy in Internet of Things Environments. In Proceedings of IEEE World Forum on Internet of Things. 407\u2013412."},{"key":"e_1_3_3_2_37_1","article-title":"Noncooperative Bargaining Models of Marriage","volume":"84","author":"Lundberg Shelly","year":"1994","unstructured":"Shelly Lundberg and Robert\u00a0A. Pollak. 1994. Noncooperative Bargaining Models of Marriage. The American Economic Review 84, 2 (1994).","journal-title":"The American Economic Review"},{"key":"e_1_3_3_2_38_1","volume-title":"Propensity to Negotiate, and Moving First in Competitive Interactions. Personality and Social Psychology Bulletin 33","author":"Magee C.","year":"2007","unstructured":"Joe\u00a0C. Magee, Adam\u00a0D. Galinsky, and Deborah\u00a0H Gruenfeld. 2007. Power, Propensity to Negotiate, and Moving First in Competitive Interactions. Personality and Social Psychology Bulletin 33 (2007)."},{"key":"e_1_3_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0068"},{"key":"e_1_3_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0035"},{"key":"e_1_3_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428361.3428464"},{"key":"e_1_3_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420164"},{"key":"e_1_3_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449119"},{"key":"e_1_3_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24804-2_8"},{"key":"e_1_3_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/HCI2016.18"},{"key":"e_1_3_3_2_46_1","article-title":"Microfinance and gender empowerment","volume":"99","author":"Minh-Phuong Ngo Thi","year":"2012","unstructured":"Thi Minh-Phuong Ngo and Zaki Wahhaj. 2012. Microfinance and gender empowerment. Journal of Development Economics 99, 1 (2012).","journal-title":"Journal of Development Economics"},{"key":"e_1_3_3_2_47_1","article-title":"An experimental study of sequential bargaining","volume":"79","author":"Ochs Jack","year":"1989","unstructured":"Jack Ochs and Alvin\u00a0E Roth. 1989. An experimental study of sequential bargaining. The American Economic Review 79, 3 (1989).","journal-title":"The American Economic Review"},{"key":"e_1_3_3_2_48_1","unstructured":"Harvard Business School\u00a0Negotiation Project. 2018. Harvard Negotiation Project. https:\/\/www.pon.harvard.edu\/category\/research_projects\/harvard-negotiation-project\/."},{"key":"e_1_3_3_2_49_1","doi-asserted-by":"crossref","unstructured":"Amnon Rapoport Eythan Weg and Dan\u00a0S Felsenthal. 1990. Effects of fixed costs in two-person sequential bargaining. Theory and Decision 5(1990).","DOI":"10.1007\/978-94-009-1992-1_6"},{"key":"e_1_3_3_2_50_1","volume-title":"Household Bargaining and Spending on Children: Experimental Evidence from Tanzania. Economica 88, 350","author":"Ringdal Charlotte","year":"2021","unstructured":"Charlotte Ringdal and Ingrid\u00a0Hoem Sjursen. 2021. Household Bargaining and Spending on Children: Experimental Evidence from Tanzania. Economica 88, 350 (2021)."},{"key":"e_1_3_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.2307\/1912531"},{"key":"e_1_3_3_2_52_1","volume-title":"Equilibrium in a Market with Sequential Bargaining. Econometrica 53, 5","author":"Rubinstein Ariel","year":"1985","unstructured":"Ariel Rubinstein and Asher Wolinsky. 1985. Equilibrium in a Market with Sequential Bargaining. Econometrica 53, 5 (1985)."},{"key":"e_1_3_3_2_53_1","doi-asserted-by":"publisher","DOI":"10.1086\/209028"},{"key":"e_1_3_3_2_54_1","volume-title":"Bargaining for advantage","author":"Shell Richard","unstructured":"G.\u00a0Richard Shell. 2006. Bargaining for advantage. Penguin Books."},{"key":"e_1_3_3_2_55_1","volume-title":"Proceedings of IEEE Conference on Computer Communications Workshops. 559\u2013564","author":"Sivanathan A.","unstructured":"A. Sivanathan, D. Sherratt, H.\u00a0H. Gharakheili, A. Radford, C. Wijenayake, A. Vishwanath, and V. Sivaraman. 2017. Characterizing and Classifying IoT Traffic in Smart Cities and Campuses. In Proceedings of IEEE Conference on Computer Communications Workshops. 559\u2013564."},{"key":"e_1_3_3_2_56_1","volume-title":"Number of Smart Homes forecast in the World from 2017 to","year":"2025","unstructured":"Statista. 2021. Number of Smart Homes forecast in the World from 2017 to 2025. https:\/\/www.statista.com\/forecasts\/887613\/number-of-smart-homes-in-the-smart-home-market-in-the-world."},{"key":"e_1_3_3_2_57_1","volume-title":"The Ultimate List of Internet of Things Statistics for","author":"Steward Jack","year":"2022","unstructured":"Jack Steward. 2022. The Ultimate List of Internet of Things Statistics for 2022. https:\/\/findstack.com\/internet-of-things-statistics\/##:\u00a0:text=It%20is%20expected%20that%20every,with%20our%20homes%20and%20businesses. ."},{"key":"e_1_3_3_2_58_1","article-title":"Privacy Policy Negotiation in Social Media","volume":"11","author":"Such M.","year":"2016","unstructured":"Jose\u00a0M. Such and Michael Rovatsos. 2016. Privacy Policy Negotiation in Social Media. Proceedings of ACM Transactions on Autonomous and Adaptive System 11, 1(2016).","journal-title":"Proceedings of ACM Transactions on Autonomous and Adaptive System"},{"key":"e_1_3_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.03.015"},{"key":"e_1_3_3_2_60_1","volume-title":"Proceedings The Fifteenth Symposium on Usable Privacy and Security. 435\u2013450","author":"Tabassum Madiha","year":"2019","unstructured":"Madiha Tabassum, Tomasz Kosinski, and Heather\u00a0Richter Lipford. 2019. \"I don\u2019t own the data\": End User Perceptions of Smart Home Device Data Practices and Risks. In Proceedings The Fifteenth Symposium on Usable Privacy and Security. 435\u2013450."},{"key":"e_1_3_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517617"},{"key":"e_1_3_3_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502137"},{"key":"e_1_3_3_2_63_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.4030130307"},{"key":"e_1_3_3_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300428"},{"key":"e_1_3_3_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"},{"key":"e_1_3_3_2_66_1","volume-title":"Proceedings of the Thirteenth Symposium on Usable Privacy and Security. 64\u201380","author":"Zeng Eric","year":"2017","unstructured":"Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End user security and privacy concerns with smart home. In Proceedings of the Thirteenth Symposium on Usable Privacy and Security. 64\u201380."},{"key":"e_1_3_3_2_67_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Zeng Eric","year":"2019","unstructured":"Eric Zeng and Franziska Roesner. 2019. Understanding and Improving Security and Privacy in {Multi-User} Smart Homes: A Design Exploration and In-Home User Study. In 28th USENIX Security Symposium (USENIX Security 19). 159\u2013176."},{"key":"e_1_3_3_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","location":"Hamburg Germany","acronym":"CHI '23","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3581360","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544548.3581360","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544548.3581360","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:30Z","timestamp":1750178850000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3581360"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":68,"alternative-id":["10.1145\/3544548.3581360","10.1145\/3544548"],"URL":"https:\/\/doi.org\/10.1145\/3544548.3581360","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}