{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T22:12:00Z","timestamp":1769724720917,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T00:00:00Z","timestamp":1665187200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Research Foundation (DFG)","award":["425869382"],"award-info":[{"award-number":["425869382"]}]},{"name":"dtec.bw ? Digitalization and Technology Research Center of the Bundeswehr","award":["MuQuaNet"],"award-info":[{"award-number":["MuQuaNet"]}]},{"name":"German Federal Ministry of Education and Research (BMBF)","award":["SWC 2.0 PrivacyGate 01|S17050"],"award-info":[{"award-number":["SWC 2.0 PrivacyGate 01|S17050"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,8]]},"DOI":"10.1145\/3546155.3546640","type":"proceedings-article","created":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T15:50:12Z","timestamp":1664207412000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["PriKey \u2013 Investigating Tangible Privacy Control for Smart Home Inhabitants and Visitors"],"prefix":"10.1145","author":[{"given":"Sarah","family":"Delgado Rodriguez","sequence":"first","affiliation":[{"name":"University of the Bundeswehr Munich, Germany"}]},{"given":"Sarah","family":"Prange","sequence":"additional","affiliation":[{"name":"University of the Bundeswehr Munich, Germany and LMU Munich, Germany"}]},{"given":"Christina","family":"Vergara Ossenberg","sequence":"additional","affiliation":[{"name":"Technical University Darmstadt, Germany"}]},{"given":"Markus","family":"Henkel","sequence":"additional","affiliation":[{"name":"Technical University Darmstadt, Germany"}]},{"given":"Florian","family":"Alt","sequence":"additional","affiliation":[{"name":"University of the Bundeswehr Munich, Germany"}]},{"given":"Karola","family":"Marky","sequence":"additional","affiliation":[{"name":"Leibniz University Hannover, Germany and University of Glasgow, Scotland Uk"}]}],"member":"320","published-online":{"date-parts":[[2022,10,8]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415187"},{"key":"e_1_3_2_2_2_1","volume-title":"Towards More Robust Keyword Spotting for Voice Assistants. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Ahmed Shimaa","year":"2022","unstructured":"Shimaa Ahmed , Ilia Shumailov , Nicolas Papernot , and Kassem Fawaz . 2022 . Towards More Robust Keyword Spotting for Voice Assistants. In 31st USENIX Security Symposium (USENIX Security 22) . USENIX Association, Boston, MA. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/ahmed Shimaa Ahmed, Ilia Shumailov, Nicolas Papernot, and Kassem Fawaz. 2022. Towards More Robust Keyword Spotting for Voice Assistants. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/ahmed"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/HSI49210.2020.9142686"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459745"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2835587.2835589"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_2_2_7_1","volume-title":"SUS \u2013 a quick and dirty usability scale","author":"Brooke John","unstructured":"John Brooke . 1996. SUS \u2013 a quick and dirty usability scale . Taylor & Francis , 189\u2013194. John Brooke. 1996. SUS \u2013 a quick and dirty usability scale. Taylor & Francis, 189\u2013194."},{"key":"e_1_3_2_2_8_1","volume-title":"On Privacy and Security Challenges in Smart Connected Homes. In 2016 European Intelligence and Security Informatics Conference (EISIC). 172\u2013175","author":"Bugeja Joseph","year":"2016","unstructured":"Joseph Bugeja , Andreas Jacobsson , and Paul Davidsson . 2016 . On Privacy and Security Challenges in Smart Connected Homes. In 2016 European Intelligence and Security Informatics Conference (EISIC). 172\u2013175 . https:\/\/doi.org\/10.1109\/EISIC.2016.044 10.1109\/EISIC.2016.044 Joseph Bugeja, Andreas Jacobsson, and Paul Davidsson. 2016. On Privacy and Security Challenges in Smart Connected Homes. In 2016 European Intelligence and Security Informatics Conference (EISIC). 172\u2013175. https:\/\/doi.org\/10.1109\/EISIC.2016.044"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445691"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376304"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370226"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0060"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376389"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367733"},{"key":"e_1_3_2_2_15_1","volume-title":"Mensch und Computer 2021 - Workshopband","author":"Delgado\u00a0Rodriguez Sarah","year":"1842","unstructured":"Sarah Delgado\u00a0Rodriguez , Sarah Prange , and Florian Alt . 2021. Take Your Security and Privacy Into Your Own Hands! Why Security and Privacy Assistants Should be Tangible . In Mensch und Computer 2021 - Workshopband , Carolin Wienrich, Philipp Wintersberger, and Benjamin Weyers (Eds.). Gesellschaft f\u00fcr Informatik e.V., Bonn . https:\/\/doi.org\/10. 1842 0\/muc2021-mci-ws09-393 10.18420\/muc2021-mci-ws09-393 Sarah Delgado\u00a0Rodriguez, Sarah Prange, and Florian Alt. 2021. Take Your Security and Privacy Into Your Own Hands! Why Security and Privacy Assistants Should be Tangible. In Mensch und Computer 2021 - Workshopband, Carolin Wienrich, Philipp Wintersberger, and Benjamin Weyers (Eds.). Gesellschaft f\u00fcr Informatik e.V., Bonn. https:\/\/doi.org\/10.18420\/muc2021-mci-ws09-393"},{"key":"e_1_3_2_2_16_1","volume-title":"Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5, 4, Article 154 (dec","author":"Do Youngwook","year":"2022","unstructured":"Youngwook Do , Jung\u00a0Wook Park , Yuxi Wu , Avinandan Basu , Dingtian Zhang , Gregory\u00a0 D. Abowd , and Sauvik Das . 2022 . Smart Webcam Cover: Exploring the Design of an Intelligent Webcam Cover to Improve Usability and Trust . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5, 4, Article 154 (dec 2022), 21\u00a0pages. https:\/\/doi.org\/10.1145\/3494983 10.1145\/3494983 Youngwook Do, Jung\u00a0Wook Park, Yuxi Wu, Avinandan Basu, Dingtian Zhang, Gregory\u00a0D. Abowd, and Sauvik Das. 2022. Smart Webcam Cover: Exploring the Design of an Intelligent Webcam Cover to Improve Usability and Trust. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5, 4, Article 154 (dec 2022), 21\u00a0pages. https:\/\/doi.org\/10.1145\/3494983"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445148"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"crossref","unstructured":"Thomas Franke Christiane Attig and Daniel Wessel. 2019. A Personal Resource for Technology Interaction: Development and Validation of the Affinity for Technology Interaction (ATI) Scale. International Journal of Human\u2013Computer Interaction 35 6(2019) 456\u2013467.  Thomas Franke Christiane Attig and Daniel Wessel. 2019. A Personal Resource for Technology Interaction: Development and Validation of the Affinity for Technology Interaction (ATI) Scale. International Journal of Human\u2013Computer Interaction 35 6(2019) 456\u2013467.","DOI":"10.1080\/10447318.2018.1456150"},{"key":"e_1_3_2_2_20_1","volume-title":"Conceptions of Web Security: A Comparative Study. In CHI \u201902 Extended Abstracts on Human Factors in Computing Systems (Minneapolis, Minnesota, USA) (CHI EA \u201902)","author":"Friedman Batya","unstructured":"Batya Friedman , David Hurley , Daniel\u00a0 C. Howe , Edward Felten , and Helen Nissenbaum . 2002. Users \u2019 Conceptions of Web Security: A Comparative Study. In CHI \u201902 Extended Abstracts on Human Factors in Computing Systems (Minneapolis, Minnesota, USA) (CHI EA \u201902) . Association for Computing Machinery , New York, NY, USA , 746\u2013747. https:\/\/doi.org\/10.1145\/506443.506577 10.1145\/506443.506577 Batya Friedman, David Hurley, Daniel\u00a0C. Howe, Edward Felten, and Helen Nissenbaum. 2002. Users\u2019 Conceptions of Web Security: A Comparative Study. In CHI \u201902 Extended Abstracts on Human Factors in Computing Systems (Minneapolis, Minnesota, USA) (CHI EA \u201902). Association for Computing Machinery, New York, NY, USA, 746\u2013747. https:\/\/doi.org\/10.1145\/506443.506577"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328915"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300498"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/1541931215591373"},{"key":"e_1_3_2_2_24_1","volume-title":"Design, development and evaluation of a human-computer trust scale, journal = Behaviour & Information Technology. 38, 10","author":"Gulati Siddharth","year":"2019","unstructured":"Siddharth Gulati , Sonia Sousa , and David Lamas . 2019. Design, development and evaluation of a human-computer trust scale, journal = Behaviour & Information Technology. 38, 10 ( 2019 ), 1004\u20131015. https:\/\/doi.org\/10.1080\/0144929X.2019.1656779 10.1080\/0144929X.2019.1656779 Siddharth Gulati, Sonia Sousa, and David Lamas. 2019. Design, development and evaluation of a human-computer trust scale, journal = Behaviour & Information Technology. 38, 10 (2019), 1004\u20131015. https:\/\/doi.org\/10.1080\/0144929X.2019.1656779"},{"key":"e_1_3_2_2_25_1","volume-title":"User Perceptions of Responsibility for Smart Home Privacy and Security. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Haney Julie","year":"2021","unstructured":"Julie Haney , Yasemin Acar , and Susanne Furman . 2021 . \u201d It\u2019s the Company, the Government, You and I \u201d: User Perceptions of Responsibility for Smart Home Privacy and Security. In 30th USENIX Security Symposium (USENIX Security 21) . USENIX Association, 411\u2013428. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/haney Julie Haney, Yasemin Acar, and Susanne Furman. 2021. \u201dIt\u2019s the Company, the Government, You and I\u201d: User Perceptions of Responsibility for Smart Home Privacy and Security. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 411\u2013428. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/haney"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1037\/e577632012-009"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1037\/e577632012-009"},{"key":"#cr-split#-e_1_3_2_2_28_1.1","doi-asserted-by":"crossref","unstructured":"Sandra\u00a0G. Hart and Lowell\u00a0E. Staveland. 1988. Development of NASA-TLX (Task Load Index): Results of Empirical and Theoretical Research. In Human Mental Workload Peter\u00a0A. Hancock and Najmedin Meshkati (Eds.). Advances in Psychology Vol.\u00a052. North-Holland 139-183. https:\/\/doi.org\/10.1016\/S0166-4115(08)62386-9 10.1016\/S0166-4115(08)62386-9","DOI":"10.1016\/S0166-4115(08)62386-9"},{"key":"#cr-split#-e_1_3_2_2_28_1.2","doi-asserted-by":"crossref","unstructured":"Sandra\u00a0G. Hart and Lowell\u00a0E. Staveland. 1988. Development of NASA-TLX (Task Load Index): Results of Empirical and Theoretical Research. In Human Mental Workload Peter\u00a0A. Hancock and Najmedin Meshkati (Eds.). Advances in Psychology Vol.\u00a052. North-Holland 139-183. https:\/\/doi.org\/10.1016\/S0166-4115(08)62386-9","DOI":"10.1016\/S0166-4115(08)62386-9"},{"key":"e_1_3_2_2_29_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"He Weijia","year":"2018","unstructured":"Weijia He , Maximilian Golla , Roshni Padhi , Jordan Ofek , Markus D\u00fcrmuth , Earlence Fernandes , and Blase Ur . 2018 . Rethinking Access Control and Authentication for the Home Internet of Things (IoT) . In 27th USENIX Security Symposium (USENIX Security 18) . USENIX Association, Baltimore, MD, 255\u2013272. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/he Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus D\u00fcrmuth, Earlence Fernandes, and Blase Ur. 2018. Rethinking Access Control and Authentication for the Home Internet of Things (IoT). In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 255\u2013272. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/he"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308557.3308732"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1234772.1234787"},{"key":"e_1_3_2_2_32_1","volume-title":"Privacy. In Proceedings of the 5th Symposium on Usable Privacy and Security","author":"Kelley Patrick\u00a0Gage","year":"2009","unstructured":"Patrick\u00a0Gage Kelley , Joanna Bresee , Lorrie\u00a0Faith Cranor , and Robert\u00a0 W. Reeder . 2009 . A \u201cNutrition Label\u201d for Privacy. In Proceedings of the 5th Symposium on Usable Privacy and Security ( Mountain View, California, USA) (SOUPS \u201909). Association for Computing Machinery, New York, NY, USA, Article 4, 12\u00a0pages. https:\/\/doi.org\/10.1145\/1572532.1572538 10.1145\/1572532.1572538 Patrick\u00a0Gage Kelley, Joanna Bresee, Lorrie\u00a0Faith Cranor, and Robert\u00a0W. Reeder. 2009. A \u201cNutrition Label\u201d for Privacy. In Proceedings of the 5th Symposium on Usable Privacy and Security (Mountain View, California, USA) (SOUPS \u201909). Association for Computing Machinery, New York, NY, USA, Article 4, 12\u00a0pages. https:\/\/doi.org\/10.1145\/1572532.1572538"},{"key":"e_1_3_2_2_33_1","volume-title":"The Trial of Posit in Shared Offices: Controlling Disclosure Levels of Schedule Data for Privacy by Changing the Placement of a Personal Interactive Calendar","author":"Kim Nari","year":"2073","unstructured":"Nari Kim , Juntae Kim , Bomin Kim , and Young-Woo Park . 2021. The Trial of Posit in Shared Offices: Controlling Disclosure Levels of Schedule Data for Privacy by Changing the Placement of a Personal Interactive Calendar . Association for Computing Machinery , New York, NY, USA , 149\u2013159. https:\/\/doi.org\/10.1145\/3461778.346 2073 10.1145\/3461778.3462073 Nari Kim, Juntae Kim, Bomin Kim, and Young-Woo Park. 2021. The Trial of Posit in Shared Offices: Controlling Disclosure Levels of Schedule Data for Privacy by Changing the Placement of a Personal Interactive Calendar. Association for Computing Machinery, New York, NY, USA, 149\u2013159. https:\/\/doi.org\/10.1145\/3461778.3462073"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89350-9_6"},{"key":"e_1_3_2_2_36_1","volume-title":"IoT Privacy and Security Challenges for Smart Home Environments. Information 7, 3","author":"Lin Huichen","year":"2016","unstructured":"Huichen Lin and Neil\u00a0 W. Bergmann . 2016. IoT Privacy and Security Challenges for Smart Home Environments. Information 7, 3 ( 2016 ). https:\/\/doi.org\/10.3390\/info7030044 10.3390\/info7030044 Huichen Lin and Neil\u00a0W. Bergmann. 2016. IoT Privacy and Security Challenges for Smart Home Environments. Information 7, 3 (2016). https:\/\/doi.org\/10.3390\/info7030044"},{"key":"e_1_3_2_2_37_1","volume-title":"Internet users","author":"Malhotra K","year":"2004","unstructured":"Naresh\u00a0 K Malhotra , Sung\u00a0 S Kim , and James Agarwal . 2004. Internet users \u2019 information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research 15, 4 ( 2004 ), 336\u2013355. Naresh\u00a0K Malhotra, Sung\u00a0S Kim, and James Agarwal. 2004. Internet users\u2019 information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research 15, 4 (2004), 336\u2013355."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301293.3302371"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0035"},{"key":"e_1_3_2_2_40_1","volume-title":"Privacy Perceptions of Smart Home Visitors. In 19th International Conference on Mobile and Ubiquitous Multimedia","author":"Marky Karola","year":"2020","unstructured":"Karola Marky , Sarah Prange , Florian Krell , Max M\u00fchlh\u00e4user , and Florian Alt . 2020 . \u201c You Just Can\u2019t Know about Everything \u201d: Privacy Perceptions of Smart Home Visitors. In 19th International Conference on Mobile and Ubiquitous Multimedia ( Essen, Germany) (MUM 2020). Association for Computing Machinery, New York, NY, USA, 83\u201395. https:\/\/doi.org\/10.1145\/3428361.3428464 10.1145\/3428361.3428464 Karola Marky, Sarah Prange, Florian Krell, Max M\u00fchlh\u00e4user, and Florian Alt. 2020. \u201cYou Just Can\u2019t Know about Everything\u201d: Privacy Perceptions of Smart Home Visitors. In 19th International Conference on Mobile and Ubiquitous Multimedia (Essen, Germany) (MUM 2020). Association for Computing Machinery, New York, NY, USA, 83\u201395. https:\/\/doi.org\/10.1145\/3428361.3428464"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420164"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_3_2_2_43_1","volume-title":"Tangible Interactions for Privacy Management(TEI \u201919)","author":"Mehta Vikram","unstructured":"Vikram Mehta . 2019. Tangible Interactions for Privacy Management(TEI \u201919) . Association for Computing Machinery , New York, NY, USA , 723\u2013726. https:\/\/doi.org\/10.1145\/3294109.3302934 10.1145\/3294109.3302934 Vikram Mehta. 2019. Tangible Interactions for Privacy Management(TEI \u201919). Association for Computing Machinery, New York, NY, USA, 723\u2013726. https:\/\/doi.org\/10.1145\/3294109.3302934"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892475"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3430524.3440626"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3430506"},{"key":"e_1_3_2_2_47_1","volume-title":"LeakyPick: IoT Audio Spy Detector. In Annual Computer Security Applications Conference","author":"Mitev Richard","year":"2020","unstructured":"Richard Mitev , Anna Pazii , Markus Miettinen , William Enck , and Ahmad-Reza Sadeghi . 2020 . LeakyPick: IoT Audio Spy Detector. In Annual Computer Security Applications Conference ( Austin, USA) (ACSAC \u201920). Association for Computing Machinery, New York, NY, USA, 694\u2013705. https:\/\/doi.org\/10.1145\/3427228.3427277 10.1145\/3427228.3427277 Richard Mitev, Anna Pazii, Markus Miettinen, William Enck, and Ahmad-Reza Sadeghi. 2020. LeakyPick: IoT Audio Spy Detector. In Annual Computer Security Applications Conference(Austin, USA) (ACSAC \u201920). Association for Computing Machinery, New York, NY, USA, 694\u2013705. https:\/\/doi.org\/10.1145\/3427228.3427277"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2069618.2069665"},{"key":"e_1_3_2_2_49_1","volume-title":"Thirteenth Symposium on Usable Privacy and Security. 399\u2013412","author":"Naeini Pardis\u00a0Emami","year":"2017","unstructured":"Pardis\u00a0Emami Naeini , Sruti Bhagavatula , Hana Habib , Martin Degeling , Lujo Bauer , Lorrie\u00a0Faith Cranor , and Norman Sadeh . 2017 . Privacy expectations and preferences in an IoT world . In Thirteenth Symposium on Usable Privacy and Security. 399\u2013412 . Pardis\u00a0Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie\u00a0Faith Cranor, and Norman Sadeh. 2017. Privacy expectations and preferences in an IoT world. In Thirteenth Symposium on Usable Privacy and Security. 399\u2013412."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376840"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/503376.503397"},{"key":"e_1_3_2_2_52_1","volume-title":"Design, User Experience, and Usability. Theories, Methods, and Tools for Designing the User Experience(Lecture Notes in Computer Science, Vol.\u00a08517)","author":"Schrepp Martin","unstructured":"Martin Schrepp , Andreas Hinderks , and J\u00f6rg Thomaschewski . 2014. Applying the User Experience Questionnaire (UEQ) in Different Evaluation Scenarios . In Design, User Experience, and Usability. Theories, Methods, and Tools for Designing the User Experience(Lecture Notes in Computer Science, Vol.\u00a08517) , Aaron Marcus (Ed.). Springer International Publishing , Cham, USA , 383\u2013392. https:\/\/doi.org\/10.1007\/978-3-319-07668-3_37 10.1007\/978-3-319-07668-3_37 Martin Schrepp, Andreas Hinderks, and J\u00f6rg Thomaschewski. 2014. Applying the User Experience Questionnaire (UEQ) in Different Evaluation Scenarios. In Design, User Experience, and Usability. Theories, Methods, and Tools for Designing the User Experience(Lecture Notes in Computer Science, Vol.\u00a08517), Aaron Marcus (Ed.). Springer International Publishing, Cham, USA, 383\u2013392. https:\/\/doi.org\/10.1007\/978-3-319-07668-3_37"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376264"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00033"},{"key":"e_1_3_2_2_55_1","volume-title":"Localize Clandestine Wireless Sensors. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Singh Akash\u00a0Deep","year":"2021","unstructured":"Akash\u00a0Deep Singh , Luis Garcia , Joseph Noor , and Mani Srivastava . 2021 . I Always Feel Like Somebody\u2019s Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors. In 30th USENIX Security Symposium (USENIX Security 21) . USENIX Association , 1829\u20131846. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/singh Akash\u00a0Deep Singh, Luis Garcia, Joseph Noor, and Mani Srivastava. 2021. I Always Feel Like Somebody\u2019s Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 1829\u20131846. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/singh"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376585"},{"key":"e_1_3_2_2_57_1","volume-title":"Proc. of the Fifteenth Symposium on Usable Privacy and Security(SOUPS). USENIX Association","author":"Tabassum Madiha","year":"2019","unstructured":"Madiha Tabassum , Tomasz Kosinski , and Heather\u00a0Richter Lipford . 2019 . I Don\u2019t Own the Data\u201d: End User Perceptions of Smart Home Device Data Practices and Risks . In Proc. of the Fifteenth Symposium on Usable Privacy and Security(SOUPS). USENIX Association , Berkeley, CA, USA, 16\u00a0pages. Madiha Tabassum, Tomasz Kosinski, and Heather\u00a0Richter Lipford. 2019. I Don\u2019t Own the Data\u201d: End User Perceptions of Smart Home Device Data Practices and Risks. In Proc. of the Fifteenth Symposium on Usable Privacy and Security(SOUPS). USENIX Association, Berkeley, CA, USA, 16\u00a0pages."},{"key":"e_1_3_2_2_58_1","unstructured":"Christian Tiefenau Maximilian H\u00e4ring Eva Gerlitz and Emanuel von Zezschwitz. 2019. Making Privacy Graspable: Can we Nudge Users to use Privacy Enhancing Techniques?arxiv:1911.07701\u00a0[cs.HC] https:\/\/arxiv.org\/abs\/1911.07701  Christian Tiefenau Maximilian H\u00e4ring Eva Gerlitz and Emanuel von Zezschwitz. 2019. Making Privacy Graspable: Can we Nudge Users to use Privacy Enhancing Techniques?arxiv:1911.07701\u00a0[cs.HC] https:\/\/arxiv.org\/abs\/1911.07701"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.360"},{"key":"e_1_3_2_2_60_1","volume-title":"Lab, and In-Situ: Comparison of Research Methods to Evaluate Smart Artifacts","author":"Voit Alexandra","unstructured":"Alexandra Voit , Sven Mayer , Valentin Schwind , and Niels Henze . 2019. Online, VR , AR , Lab, and In-Situ: Comparison of Research Methods to Evaluate Smart Artifacts . Association for Computing Machinery , New York, NY, USA , 1\u201312. https:\/\/doi.org\/10.1145\/3290605.3300737 10.1145\/3290605.3300737 Alexandra Voit, Sven Mayer, Valentin Schwind, and Niels Henze. 2019. Online, VR, AR, Lab, and In-Situ: Comparison of Research Methods to Evaluate Smart Artifacts. Association for Computing Machinery, New York, NY, USA, 1\u201312. https:\/\/doi.org\/10.1145\/3290605.3300737"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300428"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"},{"key":"e_1_3_2_2_63_1","volume-title":"28th {USENIX} Security Symposium ({USENIX} Security 19). 159\u2013176. https:\/\/www.usenix.org\/system\/files\/sec19-zeng.pdf","author":"Zeng Eric","unstructured":"Eric Zeng and Franziska Roesner . 2019. Understanding and improving security and privacy in multi-user smart homes: a design exploration and in-home user study . In 28th {USENIX} Security Symposium ({USENIX} Security 19). 159\u2013176. https:\/\/www.usenix.org\/system\/files\/sec19-zeng.pdf Eric Zeng and Franziska Roesner. 2019. Understanding and improving security and privacy in multi-user smart homes: a design exploration and in-home user study. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 159\u2013176. https:\/\/www.usenix.org\/system\/files\/sec19-zeng.pdf"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"}],"event":{"name":"NordiCHI '22: Nordic Human-Computer Interaction Conference","location":"Aarhus Denmark","acronym":"NordiCHI '22"},"container-title":["Nordic Human-Computer Interaction Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546155.3546640","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3546155.3546640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:28Z","timestamp":1750183828000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546155.3546640"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,8]]},"references-count":65,"alternative-id":["10.1145\/3546155.3546640","10.1145\/3546155"],"URL":"https:\/\/doi.org\/10.1145\/3546155.3546640","relation":{},"subject":[],"published":{"date-parts":[[2022,10,8]]},"assertion":[{"value":"2022-10-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}