{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:12:14Z","timestamp":1750219934440,"version":"3.41.0"},"reference-count":4,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2023,2,28]],"date-time":"2023-02-28T00:00:00Z","timestamp":1677542400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["interactions"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1145\/3583130","type":"journal-article","created":{"date-parts":[[2023,2,28]],"date-time":"2023-02-28T23:06:45Z","timestamp":1677625605000},"page":"18-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Swamped by the Internet of Things"],"prefix":"10.1145","volume":"30","author":[{"given":"Jonathan","family":"Bean","sequence":"first","affiliation":[{"name":"University of Arizona"}]}],"member":"320","published-online":{"date-parts":[[2023,2,28]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1093\/jcr\/ucx105"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3161572"},{"key":"e_1_2_1_3_1","volume-title":"Thousands of Amazon workers listen to Alexa users' conversation. Time","author":"Day M.","year":"2019","unstructured":"Day, M., Turner, G., and Drozdiak, N. Thousands of Amazon workers listen to Alexa users' conversation. Time. Apr. 11, 2019; https:\/\/time.com\/5568815\/amazon-workers-listen-to-alexa\/."},{"key":"e_1_2_1_4_1","volume-title":"Fears mount that Cop27 app could be used by Egypt to surveil regime's critics. The Guardian","author":"Michaelson R.","year":"2022","unstructured":"Michaelson, R. and Milman, O. Fears mount that Cop27 app could be used by Egypt to surveil regime's critics. The Guardian. Nov. 6, 2022; https:\/\/www.theguardian.com\/environment\/2022\/nov\/06\/egypt-cop27-climate-surveillance-cybersecurity."}],"container-title":["Interactions"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583130","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3583130","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:48Z","timestamp":1750182528000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583130"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,28]]},"references-count":4,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["10.1145\/3583130"],"URL":"https:\/\/doi.org\/10.1145\/3583130","relation":{},"ISSN":["1072-5520","1558-3449"],"issn-type":[{"type":"print","value":"1072-5520"},{"type":"electronic","value":"1558-3449"}],"subject":[],"published":{"date-parts":[[2023,2,28]]},"assertion":[{"value":"2023-02-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}