{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:34:32Z","timestamp":1776116072954,"version":"3.50.1"},"reference-count":203,"publisher":"Association for Computing Machinery (ACM)","issue":"9","license":[{"start":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T00:00:00Z","timestamp":1673827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2023,9,30]]},"abstract":"<jats:p>The security and privacy of smart home systems, particularly from a home user\u2019s perspective, have been a very active research area in recent years. However, via a meta-review of 52 review papers covering related topics (published between 2000 and 2021), this article shows a lack of a more recent literature review on user perspectives of smart home security and privacy since the 2010s. This identified gap motivated us to conduct a systematic literature review (SLR) covering 126 relevant research papers published from 2010 to 2021. Our SLR led to the discovery of a number of important areas where further research is needed; these include holistic methods that consider a more diverse and heterogeneous range of home devices, interactions between multiple home users, complicated data flow between multiple home devices and home users, some less studied demographic factors, and advanced conceptual frameworks. Based on these findings, we recommended key future research directions, e.g., research for a better understanding of security and privacy aspects in different multi-device and multi-user contexts, and a more comprehensive ontology on the security and privacy of the smart home covering varying types of home devices and behaviors of different types of home users.<\/jats:p>","DOI":"10.1145\/3558095","type":"journal-article","created":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T11:15:05Z","timestamp":1661339705000},"page":"1-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["A Survey of User Perspectives on Security and Privacy in a Home Networking Environment"],"prefix":"10.1145","volume":"55","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1272-077X","authenticated-orcid":false,"given":"Nandita","family":"Pattnaik","sequence":"first","affiliation":[{"name":"University of Kent, Canterbury, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5628-7328","authenticated-orcid":false,"given":"Shujun","family":"Li","sequence":"additional","affiliation":[{"name":"University of Kent, Canterbury, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4118-1680","authenticated-orcid":false,"given":"Jason R. C.","family":"Nurse","sequence":"additional","affiliation":[{"name":"University of Kent, Canterbury, UK"}]}],"member":"320","published-online":{"date-parts":[[2023,1,16]]},"reference":[{"key":"e_1_3_2_2_2","first-page":"451","volume-title":"Proceedings of Fifteenth Symposium on Usable Privacy and Security (SOUPS\u201919)","author":"Abdi Noura","year":"2019","unstructured":"Noura Abdi, Kopo M. Ramokapane, and Jose M. Such. 2019. More than smart speakers: Security and privacy perceptions of smart home personal assistants. In Proceedings of Fifteenth Symposium on Usable Privacy and Security (SOUPS\u201919). USENIX, 451\u2013466. https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/abdi."},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2017.8217429"},{"key":"e_1_3_2_4_2","first-page":"139","volume-title":"Proceedings of Symposium on Usable Privacy and Security (SOUPS\u201921)","author":"Abrokwa Desiree","year":"2021","unstructured":"Desiree Abrokwa, Shruti Das, Omer Akgul, and Michelle L. Mazurek. 2021. Comparing security and privacy attitudes among U.S. users of different smartphone and smart-speaker platforms. In Proceedings of Symposium on Usable Privacy and Security (SOUPS\u201921). USENIX, 139\u2013158. https:\/\/www.usenix.org\/conference\/soups2021\/presentation\/abrokwa."},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3415187"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/CR.2018.8626830"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1080\/08870446.2011.613995"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22906-5_12"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-08-2020-0134"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77392-2_1"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSST.2017.8279002"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3114152"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-1712-5"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2021.0120477"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.23919\/ICITST.2017.8356359"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2018.23019"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00013"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1080\/23311916.2018.1469949"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.2307\/25750694"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCAF.2017.8344666"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3214262"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.3389\/frma.2018.00006"},{"key":"e_1_3_2_23_2","first-page":"417","volume-title":"Proceedings of Sixteenth Symposium on Usable Privacy and Security (SOUPS\u201920)","author":"Barbosa Nat\u00e3 M.","year":"2020","unstructured":"Nat\u00e3 M. Barbosa, Zhuohao Zhang, and Yang Wang. 2020. Do privacy and security matter to everyone? Quantifying and clustering user-centric considerations about smart home device adoption. In Proceedings of Sixteenth Symposium on Usable Privacy and Security (SOUPS\u201920). USENIX, 417\u2013435. https:\/\/www.usenix.org\/conference\/soups2020\/presentation\/barbosa."},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78605-6_7"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2017.04.013"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3122816"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51517-1_40"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475552"},{"key":"e_1_3_2_29_2","first-page":"14","volume-title":"Proceedings of 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI\u201920)","author":"Bernd Julia","year":"2020","unstructured":"Julia Bernd, Ruba Abu-Salma, and Alisa Frik. 2020. Bystanders\u2019 privacy: The perspectives of nannies on smart home surveillance. In Proceedings of 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI\u201920). USENIX, 14 pages. https:\/\/www.usenix.org\/conference\/foci20\/presentation\/bernd."},{"key":"e_1_3_2_30_2","first-page":"6","volume-title":"Proceedings of CI Symposium 2019","author":"Bernd Julia","year":"2019","unstructured":"Julia Bernd, Alisa Frik, Maritza Johnson, and Nathan Malkin. 2019. Smart home bystanders: Further complexifying a complex context. In Proceedings of CI Symposium 2019. PrivaCI, 6 pages. https:\/\/privaci.info\/symposium2\/papers_and_slides\/Sub_Bernd_et_al_Bystanders_CI_2019.pdf."},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1186\/s12877-021-02252-4"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053255"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944937"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.3390\/s21072312"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18092986"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSCS.2013.30"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42504-3_9"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2016.044"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94370-1_10"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3410992.3411012"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0231615"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCAN.2019.8878722"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50309-3_21"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSC53577.2021.00092"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2020.00536"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58703-1_13"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15742-5_8"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.26355\/eurrev_202105_25938"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0060"},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-017-9276-y"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.09.016"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2983983"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.05.010"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3241815.3241869"},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3412383"},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/899\/1\/012011"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-020-00519-2"},{"key":"e_1_3_2_58_2","first-page":"97","volume-title":"Proceedings of Twelfth Symposium on Usable Security & Privacy (SOUPS\u201916)","author":"Forget Alain","year":"2016","unstructured":"Alain Forget, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Marian Harbach, and Rahul Telang. 2016. Do or do not, there is no try: User engagement may not improve security outcomes. In Proceedings of Twelfth Symposium on Usable Security & Privacy (SOUPS\u201916). USENIX, 97\u2013111. https:\/\/www.usenix.org\/conference\/soups2016\/technical-sessions\/presentation\/forget."},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57404-8_18"},{"key":"e_1_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2021.101046"},{"key":"e_1_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188448"},{"key":"e_1_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411170.3411260"},{"key":"e_1_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00043"},{"key":"e_1_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300498"},{"key":"e_1_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0257601"},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.5812\/sdme.67670"},{"issue":"1","key":"e_1_3_2_67_2","first-page":"20","article-title":"Security, comfort, healthcare, and energy saving: A review on biometric factors for smart home environment","volume":"29","author":"Ghazali Taqiyah-Khadijah","year":"2018","unstructured":"Taqiyah-Khadijah Ghazali and Nur-Haryani Zakaria. 2018. Security, comfort, healthcare, and energy saving: A review on biometric factors for smart home environment. Journal of Computers 29, 1 (2018), 20. http:\/\/www.csroc.org.tw\/journal\/JOC29_1\/JOC-2901-17.pdf.","journal-title":"Journal of Computers"},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58460-7_45"},{"key":"e_1_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50309-3_25"},{"key":"e_1_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.3390\/s21093082"},{"key":"e_1_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON.2017.8248978"},{"key":"e_1_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.erss.2020.101534"},{"key":"e_1_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-020-2025-8"},{"key":"e_1_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.23919\/SAIEE.2013.8531867"},{"key":"e_1_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-9942-8_4"},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIIP47207.2019.8985841"},{"key":"e_1_3_2_77_2","first-page":"411","volume-title":"Proceedings of USENIX Security 2021","author":"Haney Julie","year":"2021","unstructured":"Julie Haney, Yasemin Acar, and Susanne Furman. 2021. \u201cIt\u2019s the company, the government, you and I\u201d: User perceptions of responsibility for smart home privacy and security. In Proceedings of USENIX Security 2021. USENIX, 411\u2013428. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/haney."},{"key":"e_1_3_2_78_2","first-page":"255","volume-title":"Proceedings of USENIX Security 2018","author":"He Weijia","year":"2018","unstructured":"Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus D\u00fcrmuth, Earlence Fernandes, and Blase Ur. 2018. Rethinking access control and authentication for the home Internet of Things (IoT). In Proceedings of USENIX Security 2018. USENIX, 255\u2013272. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/he."},{"key":"e_1_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.07.011"},{"key":"e_1_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837126"},{"key":"e_1_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.23"},{"key":"e_1_3_2_82_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23528-4_65"},{"key":"e_1_3_2_83_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376529"},{"key":"e_1_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92046-7_47"},{"key":"e_1_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139941"},{"key":"e_1_3_2_86_2","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3340330"},{"key":"e_1_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1145\/2382416.2382428"},{"key":"e_1_3_2_88_2","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2017.8103482"},{"key":"e_1_3_2_89_2","first-page":"39","volume-title":"Proceedings of Eleventh Symposium On Usable Privacy and Security (SOUPS\u201920)","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. \u201cMy data just goes everywhere\u201d: User mental models of the internet and implications for privacy and security. In Proceedings of Eleventh Symposium On Usable Privacy and Security (SOUPS\u201920). USENIX, 39\u201352. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/kang."},{"key":"e_1_3_2_90_2","doi-asserted-by":"publisher","DOI":"10.1145\/3343440"},{"key":"e_1_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2013.222"},{"key":"e_1_3_2_92_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-021-01655-9"},{"key":"e_1_3_2_93_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.11.022"},{"key":"e_1_3_2_94_2","doi-asserted-by":"publisher","DOI":"10.1017\/dsi.2019.183"},{"key":"e_1_3_2_95_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101571"},{"key":"e_1_3_2_96_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR-Adjunct54149.2021.00093"},{"key":"e_1_3_2_97_2","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.0038"},{"key":"e_1_3_2_98_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.08.001"},{"key":"e_1_3_2_99_2","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420108"},{"key":"e_1_3_2_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/UBMK.2019.8907037"},{"key":"e_1_3_2_101_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451633"},{"key":"e_1_3_2_102_2","unstructured":"Federica Laricchia. 2022. Average number of devices residents have access to in households worldwide in 2020 by country. https:\/\/www.statista.com\/statistics\/1107307\/average-number-connected-devices-households-worldwide\/."},{"key":"e_1_3_2_103_2","unstructured":"Jeremiah Lasquety-Reyes. 2021. Number of Smart Homes forecast for the segment Smart Appliances in the United Kingdom from 2017 to 2025 (in millions). https:\/\/www.statista.com\/forecasts\/887605\/number-of-smart-homes-in-the-smart-home-segment-smart-appliances-in-the-united-kingdom."},{"key":"e_1_3_2_104_2","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"e_1_3_2_105_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2020.101377"},{"key":"e_1_3_2_106_2","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2016.7845392"},{"key":"e_1_3_2_107_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155516"},{"key":"e_1_3_2_108_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.erss.2021.102211"},{"key":"e_1_3_2_109_2","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00232"},{"key":"e_1_3_2_110_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3006358"},{"key":"e_1_3_2_111_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15742-5_9"},{"key":"e_1_3_2_112_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07767-3_18"},{"key":"e_1_3_2_113_2","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2021.1897914"},{"key":"e_1_3_2_114_2","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0068"},{"key":"e_1_3_2_115_2","doi-asserted-by":"publisher","DOI":"10.1145\/3278721.3278773"},{"key":"e_1_3_2_116_2","doi-asserted-by":"publisher","DOI":"10.1109\/CTTE.2017.8260940"},{"key":"e_1_3_2_117_2","doi-asserted-by":"publisher","DOI":"10.1145\/3428361.3428464"},{"key":"e_1_3_2_118_2","doi-asserted-by":"publisher","DOI":"10.1145\/3490632.3490664"},{"key":"e_1_3_2_119_2","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420164"},{"key":"e_1_3_2_120_2","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3383016"},{"key":"e_1_3_2_121_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39399-5_7"},{"key":"e_1_3_2_122_2","doi-asserted-by":"publisher","DOI":"10.3390\/informatics6010008"},{"key":"e_1_3_2_123_2","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2017.1352028"},{"key":"e_1_3_2_124_2","doi-asserted-by":"publisher","DOI":"10.5130\/acis2018.co"},{"key":"e_1_3_2_125_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11301-019-00171-8"},{"key":"e_1_3_2_126_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1712.09405"},{"key":"e_1_3_2_127_2","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.583"},{"key":"e_1_3_2_128_2","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2021.9010001"},{"key":"e_1_3_2_129_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pmed.1000097"},{"key":"e_1_3_2_130_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312932"},{"key":"e_1_3_2_131_2","doi-asserted-by":"publisher","DOI":"10.1177\/13548565211042234"},{"key":"e_1_3_2_132_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106585"},{"key":"e_1_3_2_133_2","doi-asserted-by":"publisher","DOI":"10.1186\/s12874-018-0611-x"},{"issue":"8","key":"e_1_3_2_134_2","first-page":"111","article-title":"Novel and efficient authentication scheme for IoE in smart home environment","volume":"8","author":"Nadargi Ajay","year":"2019","unstructured":"Ajay Nadargi and Mythili Thirugnanam. 2019. Novel and efficient authentication scheme for IoE in smart home environment. International Journal of Innovative Technology and Exploring Engineering 8, 8 (2019), 111\u2013115. https:\/\/www.ijitee.org\/wp-content\/uploads\/papers\/v8i8\/G6059058719.pdf.","journal-title":"International Journal of Innovative Technology and Exploring Engineering"},{"key":"e_1_3_2_135_2","first-page":"399","volume-title":"Proceedings of Thirteenth Symposium on Usable Privacy and Security (SOUPS\u201917)","author":"Naeini Pardis Emami","year":"2017","unstructured":"Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman Sadeh. 2017. Privacy expectations and preferences in an IoT world. In Proceedings of Thirteenth Symposium on Usable Privacy and Security (SOUPS\u201917). USENIX, 399\u2013412. https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/naeini."},{"key":"e_1_3_2_136_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57404-8_17"},{"key":"e_1_3_2_137_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58460-7_9"},{"key":"e_1_3_2_138_2","first-page":"63","volume-title":"Proceedings of Fourteenth Symposium on Usable Privacy and Security (SOUPS\u201918)","author":"Nthala Norbert","year":"2018","unstructured":"Norbert Nthala and Ivan Flechais. 2018. Informal support networks: An investigation into home data security practices. In Proceedings of Fourteenth Symposium on Usable Privacy and Security (SOUPS\u201918). USENIX, 63\u201382. https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/nthala."},{"key":"e_1_3_2_139_2","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2018.23011"},{"key":"e_1_3_2_140_2","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370224"},{"key":"e_1_3_2_141_2","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.n160"},{"key":"e_1_3_2_142_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2906346"},{"key":"e_1_3_2_143_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISM.2017.83"},{"key":"e_1_3_2_144_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2021.101683"},{"key":"e_1_3_2_145_2","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2020.1841422"},{"key":"e_1_3_2_146_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376450"},{"key":"e_1_3_2_147_2","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2021.535"},{"key":"e_1_3_2_148_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3042421"},{"key":"e_1_3_2_149_2","unstructured":"Population Reference Bureau (PRB). [n. d.]. International | PRB. https:\/\/www.prb.org\/international\/indicator\/hh-size-av\/map\/country\/."},{"key":"e_1_3_2_150_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22351-9_12"},{"key":"e_1_3_2_151_2","doi-asserted-by":"publisher","DOI":"10.1109\/SmartWorld.2018.00317"},{"key":"e_1_3_2_152_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102531"},{"key":"e_1_3_2_153_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.05.029"},{"key":"e_1_3_2_154_2","doi-asserted-by":"publisher","DOI":"10.1080\/17538157.2019.1582054"},{"key":"e_1_3_2_155_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2021.101397"},{"key":"e_1_3_2_156_2","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355577"},{"key":"e_1_3_2_157_2","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"e_1_3_2_158_2","doi-asserted-by":"publisher","DOI":"10.1007\/s40593-015-0047-y"},{"key":"e_1_3_2_159_2","doi-asserted-by":"publisher","DOI":"10.1109\/CR.2018.8626826"},{"key":"e_1_3_2_160_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3008610"},{"key":"e_1_3_2_161_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17642-6_18"},{"key":"e_1_3_2_162_2","doi-asserted-by":"publisher","DOI":"10.1109\/IMF.2015.17"},{"key":"e_1_3_2_163_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50309-3_34"},{"key":"e_1_3_2_164_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2021.101689"},{"key":"e_1_3_2_165_2","doi-asserted-by":"publisher","DOI":"10.1080\/24694452.2019.1654843"},{"key":"e_1_3_2_166_2","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395501"},{"key":"e_1_3_2_167_2","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399358"},{"key":"e_1_3_2_168_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94523-1_18"},{"key":"e_1_3_2_169_2","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"e_1_3_2_170_2","unstructured":"Statista. 2021. Smart Home Report 2021 - Smart Appliances. https:\/\/www.statista.com\/study\/50587\/smart-home-report-smart-appliances\/."},{"key":"e_1_3_2_171_2","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.0037"},{"key":"e_1_3_2_172_2","doi-asserted-by":"publisher","DOI":"10.1145\/3479858"},{"key":"e_1_3_2_173_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-021-00787-w"},{"key":"e_1_3_2_174_2","first-page":"435","volume-title":"Proceedings of Fifteenth Symposium on Usable Privacy and Security (SOUPS\u201919)","author":"Tabassum Madiha","year":"2019","unstructured":"Madiha Tabassum, Tomasz Kosinski, and Heather Richter Lipford. 2019. \u201cI don\u2019t own the data\u201d: End user perceptions of smart home device data practices and risks. In Proceedings of Fifteenth Symposium on Usable Privacy and Security (SOUPS\u201919). USENIX, 435\u2013450. https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/tabassum."},{"key":"e_1_3_2_175_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16184-2_41"},{"key":"e_1_3_2_176_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-019-1158-z"},{"key":"e_1_3_2_177_2","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.27"},{"key":"e_1_3_2_178_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2021.3081874"},{"key":"e_1_3_2_179_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.07.003"},{"key":"e_1_3_2_180_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99828-2_17"},{"key":"e_1_3_2_181_2","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2011.6091176"},{"key":"e_1_3_2_182_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.02.009"},{"key":"e_1_3_2_183_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102387"},{"key":"e_1_3_2_184_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58530-7_4"},{"key":"e_1_3_2_185_2","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON.2018.8796765"},{"key":"e_1_3_2_186_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISS1.2019.8908112"},{"key":"e_1_3_2_187_2","first-page":"309","volume-title":"Proceedings of Symposium On Usable Privacy and Security (SOUPS\u201915)","author":"Wash Rick","year":"2015","unstructured":"Rick Wash and Emilee Rader. 2015. Too much knowledge? Security beliefs and protective behaviors among United States internet users. In Proceedings of Symposium On Usable Privacy and Security (SOUPS\u201915). USENIX, 309\u2013325. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/wash."},{"key":"e_1_3_2_188_2","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2016.1232991"},{"key":"e_1_3_2_189_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42504-3_27"},{"key":"e_1_3_2_190_2","doi-asserted-by":"publisher","DOI":"10.1177\/1460458212442933"},{"key":"e_1_3_2_191_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20376-8_53"},{"key":"e_1_3_2_192_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-014-0813-0"},{"key":"e_1_3_2_193_2","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901890"},{"key":"e_1_3_2_194_2","doi-asserted-by":"publisher","DOI":"10.1109\/CASoN.2012.6412405"},{"key":"e_1_3_2_195_2","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4067"},{"key":"e_1_3_2_196_2","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-01-2016-0017"},{"key":"e_1_3_2_197_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300428"},{"key":"e_1_3_2_198_2","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"},{"key":"e_1_3_2_199_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2016.07.004"},{"key":"e_1_3_2_200_2","first-page":"65","volume-title":"Proceedings of Thirteenth Symposium on Usable Privacy and Security (SOUPS\u201917)","author":"Zeng Eric","year":"2017","unstructured":"Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End user security and privacy concerns with smart homes. In Proceedings of Thirteenth Symposium on Usable Privacy and Security (SOUPS\u201917). USENIX, 65\u201380. https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/zeng."},{"key":"e_1_3_2_201_2","first-page":"159","volume-title":"Proceedings of USENIX Security 2019","author":"Zeng Eric","year":"2019","unstructured":"Eric Zeng and Franziska Roesner. 2019. Understanding and improving security and privacy in multi-user smart homes: A design exploration and in-home user study. In Proceedings of USENIX Security 2019. USENIX, 159\u2013176. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/zeng."},{"key":"e_1_3_2_202_2","doi-asserted-by":"publisher","DOI":"10.7916\/stlr.v21i1.5763"},{"key":"e_1_3_2_203_2","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"key":"e_1_3_2_204_2","doi-asserted-by":"publisher","DOI":"10.1515\/icom-2019-0015"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558095","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3558095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:32Z","timestamp":1750182572000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558095"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,16]]},"references-count":203,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2023,9,30]]}},"alternative-id":["10.1145\/3558095"],"URL":"https:\/\/doi.org\/10.1145\/3558095","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,16]]},"assertion":[{"value":"2021-10-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-08-02","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-01-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}