{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T22:37:13Z","timestamp":1776119833803,"version":"3.50.1"},"reference-count":171,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2023,8,31]],"date-time":"2023-08-31T00:00:00Z","timestamp":1693440000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Things"],"published-print":{"date-parts":[[2023,8,31]]},"abstract":"<jats:p>The balance between protecting user privacy while providing cost-effective devices that are functional and usable is a key challenge in the burgeoning Internet of Things (IoT). In traditional desktop and mobile contexts, the primary user interface is a screen; however, in IoT devices, screens are rare or very small, invalidating many existing approaches to protecting user privacy. Privacy visualizations are a common approach for assisting users in understanding the privacy implications of web and mobile services. To gain a thorough understanding of IoT privacy, we examine existing web, mobile, and IoT visualization approaches. Following that, we define five major privacy factors in the IoT context: type, usage, storage, retention period, and access. We then describe notification methods used in various contexts as reported in the literature. We aim to highlight key approaches that developers and researchers can use for creating effective IoT privacy notices that improve user privacy management (awareness and control). Using a toolkit, a use case scenario, and two examples from the literature, we demonstrate how privacy visualization approaches can be supported in practice.<\/jats:p>","DOI":"10.1145\/3600096","type":"journal-article","created":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T11:13:36Z","timestamp":1686136416000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Interactive Privacy Management: Toward Enhancing Privacy Awareness and Control in the Internet of Things"],"prefix":"10.1145","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4104-2915","authenticated-orcid":false,"given":"Bayan","family":"Al Muhander","sequence":"first","affiliation":[{"name":"Cardiff University, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8766-3557","authenticated-orcid":false,"given":"Jason","family":"Wiese","sequence":"additional","affiliation":[{"name":"University of Utah, US"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3597-2646","authenticated-orcid":false,"given":"Omer","family":"Rana","sequence":"additional","affiliation":[{"name":"Cardiff University, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0190-3346","authenticated-orcid":false,"given":"Charith","family":"Perera","sequence":"additional","affiliation":[{"name":"Cardiff University, UK"}]}],"member":"320","published-online":{"date-parts":[[2023,9,21]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167288"},{"issue":"3","key":"e_1_3_2_4_2","first-page":"80","article-title":"Privacy policy of e-government websites: An itemized checklist proposed and tested","volume":"7","author":"Al-Jamal Maryam","year":"2015","unstructured":"Maryam Al-Jamal and Emad Abu-Shanab. 2015. Privacy policy of e-government websites: An itemized checklist proposed and tested. Management Research and Practice 7, 3 (2015), 80.","journal-title":"Management Research and Practice"},{"key":"e_1_3_2_5_2","first-page":"109","volume-title":"Proceedings of the 2022 IEEE\/ACM 7th International Conference on Internet-of-Things Design and Implementation (IoTDI\u201922)","author":"Muhander Bayan Al","year":"2022","unstructured":"Bayan Al Muhander, Omer Rana, Nalin Arachchilage, and Charith Perera. 2022. Demo abstract: PrivacyCube: A tangible device for improving privacy awareness in IoT. In Proceedings of the 2022 IEEE\/ACM 7th International Conference on Internet-of-Things Design and Implementation (IoTDI\u201922). IEEE, Los Alamitos, CA, 109\u2013110."},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2012.2189204"},{"key":"e_1_3_2_7_2","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1007\/s00779-021-01544-1","article-title":"I\u2019m all ears! Listening to software developers on putting GDPR principles into software development practice","author":"Alhazmi Abdulrahman","year":"2021","unstructured":"Abdulrahman Alhazmi and Nalin Asanka Gamagedara Arachchilage. 2021. I\u2019m all ears! Listening to software developers on putting GDPR principles into software development practice. Personal and Ubiquitous Computing 25 (2021), 879\u2013892.","journal-title":"Personal and Ubiquitous Computing"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3437537"},{"key":"e_1_3_2_9_2","doi-asserted-by":"crossref","DOI":"10.1109\/JIOT.2020.3015432","article-title":"A survey on security and privacy issues in edge computing-assisted Internet of Things","author":"Alwarafy Abdulmalik","year":"2021","unstructured":"Abdulmalik Alwarafy, Khaled A. Al-Thelaya, Mohamed Abdallah, Jens Schneider, and Mounir Hamdi. 2021. A survey on security and privacy issues in edge computing-assisted Internet of Things. IEEE Internet of Things Journal 8, 6 (2021), 4004\u20134022.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_10_2","first-page":"1","volume-title":"Proceedings of the 2022 7th International Conference on Smart and Sustainable Technologies (SpliTech\u201922)","author":"Angelelli Mario","year":"2022","unstructured":"Mario Angelelli, Christian Catalano, Derek Hill, Hristo Koshutanski, Claudio Pascarelli, and Joseph Rafferty. 2022. A reference architecture proposal for secure data management in mobile health. In Proceedings of the 2022 7th International Conference on Smart and Sustainable Technologies (SpliTech\u201922). IEEE, Los Alamitos, CA, 1\u20136."},{"key":"e_1_3_2_11_2","doi-asserted-by":"crossref","first-page":"1803","DOI":"10.1145\/2702613.2732701","volume-title":"Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems","author":"Angulo Julio","year":"2015","unstructured":"Julio Angulo, Simone Fischer-H\u00fcbner, Tobias Pulls, and Erik W\u00e4stlund. 2015. Usable transparency with the data track: A tool for visualizing data disclosures. In Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. 1803\u20131808."},{"key":"e_1_3_2_12_2","doi-asserted-by":"crossref","DOI":"10.1108\/09685221211219155","article-title":"Towards usable privacy policy display and management","author":"Angulo Julio","year":"2012","unstructured":"Julio Angulo, Simone Fischer-H\u00fcbner, Erik W\u00e4stlund, and Tobias Pulls. 2012. Towards usable privacy policy display and management. Information Management & Computer Security 20, 1 (2012), 4\u201317.","journal-title":"Information Management & Computer Security"},{"key":"e_1_3_2_13_2","article-title":"A smart home is no castle: Privacy vulnerabilities of encrypted IoT traffic","author":"Apthorpe Noah","year":"2017","unstructured":"Noah Apthorpe, Dillon Reisman, and Nick Feamster. 2017. A smart home is no castle: Privacy vulnerabilities of encrypted IoT traffic. arXiv preprint arXiv:1705.06805 (2017).","journal-title":"arXiv preprint arXiv:1705.06805"},{"key":"e_1_3_2_14_2","doi-asserted-by":"crossref","DOI":"10.1109\/COMST.2022.3224644","article-title":"A survey on blockchain for healthcare: Challenges, benefits, and future directions","author":"Arbabi Mohammad Salar","year":"2023","unstructured":"Mohammad Salar Arbabi, Chhagan Lal, Narasimha Raghavan Veeraragavan, Dusica Marijan, Jan F. Nyg\u00e5rd, and Roman Vitenberg. 2023. A survey on blockchain for healthcare: Challenges, benefits, and future directions. IEEE Communications Surveys & Tutorials 24, 1 (2023), 386\u2013424.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-020-01457-5"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.5555\/556709"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3369833"},{"key":"e_1_3_2_18_2","first-page":"31","article-title":"Enterprise privacy authorization language (EPAL)","volume":"30","author":"Ashley Paul","year":"2003","unstructured":"Paul Ashley, Satoshi Hada, G\u00fcnter Karjoth, Calvin Powers, and Matthias Schunter. 2003. Enterprise privacy authorization language (EPAL). IBM Research 30 (2003), 31.","journal-title":"IBM Research"},{"key":"e_1_3_2_19_2","unstructured":"N. L. Asquith. 2013. Understanding the Role of Verbal and Textual Hostility in Hate Crime Regulation . Interim Report. Violent Crime Directorate London Metropolitan Police Service London England."},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300519"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1080\/17489725.2018.1511839"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-18732-3_8"},{"key":"e_1_3_2_23_2","unstructured":"Jianmin Bai James Geza Deak Hua Iv and Weifeng Shen. 2018. Magnetoresistive gear tooth sensor (Aug. 2018). Patent No. 10 060 941. Filed June 4 2013. Issued August 28 2018."},{"issue":"3","key":"e_1_3_2_24_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3502288","article-title":"Understanding online privacy\u2014A systematic review of privacy visualizations and privacy by design guidelines","volume":"55","author":"Barth Susanne","year":"2022","unstructured":"Susanne Barth, Dan Ionita, and Pieter Hartel. 2022. Understanding online privacy\u2014A systematic review of privacy visualizations and privacy by design guidelines. ACM Computing Surveys 55, 3 (2022), 1\u201337.","journal-title":"ACM Computing Surveys"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3546724"},{"key":"e_1_3_2_26_2","doi-asserted-by":"crossref","first-page":"3045","DOI":"10.1145\/2556288.2557066","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"B\u00f6hmer Matthias","year":"2014","unstructured":"Matthias B\u00f6hmer, Christian Lander, Sven Gehring, Duncan P. Brumby, and Antonio Kr\u00fcger. 2014. Interrupted by a phone call: Exploring designs for lowering the impact of call notifications for smartphone users. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 3045\u20133054."},{"key":"e_1_3_2_27_2","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/978-1-84628-927-9_7","volume-title":"Cognition, Communication and Interaction","author":"Borchers Jan O.","year":"2008","unstructured":"Jan O. Borchers. 2008. A pattern approach to interaction design. In Cognition, Communication and Interaction. Springer, 114\u2013131."},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-011-9722-1"},{"key":"e_1_3_2_29_2","first-page":"1027","article-title":"Against notice skepticism in privacy (and elsewhere)","volume":"87","author":"Calo Ryan","year":"2011","unstructured":"Ryan Calo. 2011. Against notice skepticism in privacy (and elsewhere). Notre Dame Law Review 87 (2011), 1027.","journal-title":"Notre Dame Law Review"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.3390\/s19163594"},{"key":"e_1_3_2_31_2","unstructured":"CCPA. 2020. California Consumer Privacy Act (CCPA) Website Policy: Definitions Under CCPA. Retrieved June 16 2023 from https:\/\/summitstatebank.com\/userfiles\/files\/CCPA%20Website%20Policy%202020.pdf."},{"key":"e_1_3_2_32_2","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/3139550.3139552","volume-title":"Proceedings of the 2017 16th Workshop on Privacy in the Electronic Society","author":"Chen Xin","year":"2017","unstructured":"Xin Chen, Heqing Huang, Sencun Zhu, Qing Li, and Quanlong Guan. 2017. SweetDroid: Toward a context-sensitive privacy policy enforcement framework for Android OS. In Proceedings of the 2017 16th Workshop on Privacy in the Electronic Society. 75\u201386."},{"key":"e_1_3_2_33_2","first-page":"1","volume-title":"Proceedings of the 6th International Conference on the Internet of Things","author":"Chernyshov George","year":"2016","unstructured":"George Chernyshov, Jiajun Chen, Yenchin Lai, Vontin Noriyasu, and Kai Kunze. 2016. Ambient rhythm: Melodic sonification of status information for IoT-enabled devices. In Proceedings of the 6th International Conference on the Internet of Things. 1\u20136."},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.3390\/math10010068"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/2536853.2536861"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/2406367.2406385"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2866423"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/1013115.1013148"},{"key":"e_1_3_2_39_2","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1145\/3025453.3025797","volume-title":"Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems","author":"Cila Nazli","year":"2017","unstructured":"Nazli Cila, Iskander Smit, Elisa Giaccardi, and Ben Kr\u00f6se. 2017. Products as agents: Metaphors for designing the products of the IoT age. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 448\u2013459."},{"key":"e_1_3_2_40_2","volume-title":"P3P 1.0: A New Standard in Online Privacy","unstructured":"World Wide Web Consortium. n.d. P3P 1.0: A New Standard in Online Privacy. World Wide Web Consortium."},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389130"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/1165734.1165735"},{"key":"e_1_3_2_43_2","article-title":"Are your phone camera and microphone spying on you","author":"Curran Dylan","year":"2018","unstructured":"Dylan Curran. 2018. Are your phone camera and microphone spying on you. The Guardian. Retrieved April 14, 2019 from https:\/\/www.theguardian.com\/commentisfree\/2018\/apr\/06\/phone-camera-microphone-spying.","journal-title":"The Guardian"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107561"},{"key":"e_1_3_2_45_2","first-page":"1","volume-title":"Proceedings of the 37th ACM International Conference on the Design of Communication","author":"Salgado Andr\u00e9 de Lima","year":"2019","unstructured":"Andr\u00e9 de Lima Salgado, Felipe Silva Dias, Jo\u00e3o Pedro Rodrigues Mattos, Renata Pontin de Mattos Fortes, and Patrick C. K. Hung. 2019. Smart toys and children\u2019s privacy: Usable privacy policy insights from a card sorting experiment. In Proceedings of the 37th ACM International Conference on the Design of Communication. 1\u20138."},{"key":"e_1_3_2_46_2","unstructured":"DERMAdoctor. n.d. Dermatologist Formulated Skin Care and Skin Health Advice from Dr. Audrey Kunin. Retrieved June 16 2023 from https:\/\/www.dermadoctor.com."},{"key":"e_1_3_2_47_2","doi-asserted-by":"crossref","unstructured":"Lilian Edwards. 2005. Switching Off the Surveillance Society? Legal Regulation of CCTV in the UK . Asser Press.","DOI":"10.1007\/978-90-6704-589-6_5"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.21552\/EDPL\/2016\/1\/6"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_3_2_50_2","volume-title":"Proceedings of the Conference on Pervasive Computing","author":"Emsenhuber Bernadette","year":"2009","unstructured":"Bernadette Emsenhuber and Alois Ferscha. 2009. Olfactory interaction zones. In Proceedings of the Conference on Pervasive Computing."},{"key":"e_1_3_2_51_2","first-page":"649","volume-title":"Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and Other Affiliated Events (PerCom Workshops\u201922)","author":"Escher Stephan","year":"2022","unstructured":"Stephan Escher, Katrin Etzrodt, Benjamin Weller, Stefan K\u00f6psell, and Thorsten Strufe. 2022. Transparency for bystanders in IoT regarding audiovisual recordings. In Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and Other Affiliated Events (PerCom Workshops\u201922). IEEE, Los Alamitos, CA, 649\u2013654."},{"issue":"1","key":"e_1_3_2_52_2","article-title":"Using visualizations to enhance users\u2019 understanding of app activities on Android devices","volume":"7","author":"Eze Chika","year":"2016","unstructured":"Chika Eze, Jason R. C. Nurse, and Jassim Happa. 2016. Using visualizations to enhance users\u2019 understanding of app activities on Android devices. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 7, 1 (2016), 39\u201357.","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445148"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3295453.3295455"},{"key":"e_1_3_2_55_2","unstructured":"Simone Fischer H\u00fcbner and Harald Zwingelberg (Eds.). 2010. UI Prototypes: Policy Administration and Presentation\u2014Version 2 . PrimeLife."},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188448"},{"key":"e_1_3_2_57_2","first-page":"1","volume-title":"Proceedings of the 2009 IEEE International Conference on Service-Oriented Computing and Applications (SOCA\u201909)","author":"Garcia Diego","year":"2009","unstructured":"Diego Garcia, M. Beatriz F. Toledo, Miriam A. M. Capretz, David S. Allison, Gordon S. Blair, Paul Grace, and Carlos Flores. 2009. Towards a base ontology for privacy protection in service-oriented architecture. In Proceedings of the 2009 IEEE International Conference on Service-Oriented Computing and Applications (SOCA\u201909). IEEE, Los Alamitos, CA, 1\u20138."},{"key":"e_1_3_2_58_2","article-title":"The Internet of Things (IoT)* units installed base by category from 2014 to 2020 (in billions)","year":"2017","unstructured":"Gartner. 2017. The Internet of Things (IoT)* units installed base by category from 2014 to 2020 (in billions). Statista. Retrieved June 16, 2023 from https:\/\/www.statista.com\/statistics\/370350\/internet-of-things-installed-base-by-category\/.","journal-title":"Statista."},{"key":"e_1_3_2_59_2","first-page":"8","volume-title":"Proceedings of the Workshop on Security and Privacy Issues in Mobile Phone Use","author":"Gehring Sven","year":"2008","unstructured":"Sven Gehring and Martin Gisch. 2008. The privacy badge revisited\u2014Enhancement of a privacy-awareness user interface for small devices. In Proceedings of the Workshop on Security and Privacy Issues in Mobile Phone Use. 8."},{"key":"e_1_3_2_60_2","first-page":"0427","volume-title":"Proceedings of the 2021 IEEE 12th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON\u201921)","author":"Georgievski Ilche","year":"2021","unstructured":"Ilche Georgievski, Isaac Henderson Johnson Jeyakumar, and Shrilesh Kale. 2021. Designing a system based on robotic assistance for privacy awareness in smart environments. In Proceedings of the 2021 IEEE 12th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON\u201921). IEEE, Los Alamitos, CA, 0427\u20130432."},{"key":"e_1_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.3390\/fi13080218"},{"key":"e_1_3_2_62_2","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1109\/CSE.2009.356","volume-title":"Proceedings of the 2009 International Conference on Computational Science and Engineering","volume":"3","author":"Ghazinour Kambiz","year":"2009","unstructured":"Kambiz Ghazinour, Maryam Majedi, and Ken Barker. 2009. A lattice-based privacy aware access control model. In Proceedings of the 2009 International Conference on Computational Science and Engineering, Vol. 3. IEEE, Los Alamitos, CA, 154\u2013159."},{"key":"e_1_3_2_63_2","first-page":"335","volume-title":"Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference","volume":"2","author":"Ghazinour Kambiz","year":"2009","unstructured":"Kambiz Ghazinour, Maryam Majedi, and Ken Barker. 2009. A model for privacy policy visualization. In Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference, Vol. 2. IEEE, Los Alamitos, CA, 335\u2013340."},{"key":"e_1_3_2_64_2","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1145\/1378063.1378159","volume-title":"Proceedings of the 4th International Conference on Mobile Technology, Applications, and Systems and the 1st International Symposium on Computer Human Interaction in Mobile Technology","author":"Gisch Martin","year":"2007","unstructured":"Martin Gisch, Alexander De Luca, and Markus Blanchebarbe. 2007. The privacy badge: A privacy-awareness user interface for small devices. In Proceedings of the 4th International Conference on Mobile Technology, Applications, and Systems and the 1st International Symposium on Computer Human Interaction in Mobile Technology. 583\u2013586."},{"key":"e_1_3_2_65_2","first-page":"335","article-title":"A brief defense of mass market software license agreements","volume":"22","author":"Gomulkiewicz Robert W.","year":"1996","unstructured":"Robert W. Gomulkiewicz and Mary L. Williamson. 1996. A brief defense of mass market software license agreements. Rutgers Computer and Technology Law Journal 22 (1996), 335.","journal-title":"Rutgers Computer and Technology Law Journal"},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.002"},{"key":"e_1_3_2_67_2","unstructured":"Google. n.d. Privacy Features of Google Home Mini\u2014Google Store. Retrieved June 16 2023 from https:\/\/store.google.com\/gb\/product\/google_home_mini_security."},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.smhl.2018.01.003"},{"key":"e_1_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.05.067"},{"key":"e_1_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-012-0188-y"},{"key":"e_1_3_2_71_2","first-page":"57","volume-title":"Proceedings of the 19th Workshop on Privacy in the Electronic Society","author":"Guo Wentao","year":"2020","unstructured":"Wentao Guo, Jay Rodolitz, and Eleanor Birrell. 2020. Poli-see: An interactive tool for visualizing privacy policies. In Proceedings of the 19th Workshop on Privacy in the Electronic Society. 57\u201371."},{"key":"e_1_3_2_72_2","article-title":"An IoT-centric data protection method for preserving security and privacy in cloud","author":"Gupta Rishabh","year":"2023","unstructured":"Rishabh Gupta, Ishu Gupta, Ashutosh Kumar Singh, Deepika Saxena, and Chung-Nan Lee. 2023. An IoT-centric data protection method for preserving security and privacy in cloud. IEEE Systems Journal 17, 2 (2023), 2445\u20132454.","journal-title":"IEEE Systems Journal"},{"key":"e_1_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445387"},{"key":"e_1_3_2_74_2","first-page":"1","volume-title":"Proceedings of the 7th International Conference on the Internet of Things","author":"Haslgr\u00fcbler Michael","year":"2017","unstructured":"Michael Haslgr\u00fcbler, Peter Fritz, Benedikt Gollan, and Alois Ferscha. 2017. Getting through: Modality selection in a multi-sensor-actuator industrial IoT environment. In Proceedings of the 7th International Conference on the Internet of Things. 1\u20138."},{"key":"e_1_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2017.2940957"},{"key":"e_1_3_2_76_2","doi-asserted-by":"crossref","first-page":"1608","DOI":"10.1145\/2858036.2858059","volume-title":"Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems","author":"Houben Steven","year":"2016","unstructured":"Steven Houben, Connie Golsteijn, Sarah Gallacher, Rose Johnson, Saskia Bakker, Nicolai Marquardt, Licia Capra, and Yvonne Rogers. 2016. Physikit: Data engagement through physical ambient visualizations in the home. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. 1608\u20131619."},{"key":"e_1_3_2_77_2","unstructured":"HowStuffWorks. n.d. How Amazon Echo Works. Retrieved June 16 2023 from https:\/\/electronics.howstuffworks.com\/gadgets\/high-tech-gadgets\/amazon-echo.htm."},{"key":"e_1_3_2_78_2","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1007\/s00779-020-01482-4","article-title":"Designing for cultural learning and reflection using IoT serious game approach","author":"Huang Hai","year":"2021","unstructured":"Hai Huang and Kher Hui Ng. 2021. Designing for cultural learning and reflection using IoT serious game approach. Personal and Ubiquitous Computing 25 (2021), 509\u2013524.","journal-title":"Personal and Ubiquitous Computing"},{"key":"e_1_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1145\/1375761.1375763"},{"key":"e_1_3_2_80_2","volume-title":"The P3P Implementation Guide","author":"Jamtgaard Laurel","year":"2003","unstructured":"Laurel Jamtgaard. 2003. The P3P Implementation Guide. Internet Education Foundation."},{"key":"e_1_3_2_81_2","doi-asserted-by":"crossref","unstructured":"Jongkil Jay Jeong Gillian Oliver Eunsuk Kang Sadie Creese and Peter Thomas. 2021. The current state of research on people culture and cybersecurity. Personal and Ubiquitous Computing 25 (2021) 809\u2013812.","DOI":"10.1007\/s00779-021-01591-8"},{"key":"e_1_3_2_82_2","first-page":"899","volume-title":"Proceedings of the 31st USENIX Security Symposium (USENIX Security\u201922)","author":"Kacsmar Bailey","year":"2022","unstructured":"Bailey Kacsmar, Kyle Tilbury, Miti Mazmudar, and Florian Kerschbaum. 2022. Caring about sharing: User perceptions of multiparty data sharing. In Proceedings of the 31st USENIX Security Symposium (USENIX Security\u201922). 899\u2013916."},{"key":"e_1_3_2_83_2","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/SYSMART.2018.8746961","volume-title":"Proceedings of the 2018 International Conference on System Modeling and Advancement in Research Trends (SMART\u201918)","author":"Kaushik Keshav","year":"2018","unstructured":"Keshav Kaushik and Susheela Dahiya. 2018. Security and privacy in IoT based e-business and retail. In Proceedings of the 2018 International Conference on System Modeling and Advancement in Research Trends (SMART\u201918). IEEE, Los Alamitos, CA, 78\u201381."},{"key":"e_1_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466466"},{"key":"e_1_3_2_86_2","volume-title":"The C Programming Language","year":"1988","unstructured":"Brian W. Kernighan and Dennis M. Ritchie. 1988. The C Programming Language (2nd ed.). Prentice Hall, Englewood Cliffs, NJ."},{"key":"e_1_3_2_87_2","doi-asserted-by":"crossref","unstructured":"Damla Kilic Andy Crabtree Glenn McGarry and Murray Goulden. 2022. The cardboard box study: Understanding collaborative data management in the connected home. Personal and Ubiquitous Computing 26 3 (2022) 155\u2013176.","DOI":"10.1007\/s00779-021-01655-9"},{"key":"e_1_3_2_88_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-021-01655-9"},{"key":"e_1_3_2_89_2","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1145\/2460625.2460656","volume-title":"Proceedings of the 7th International Conference on Tangible, Embedded, and Embodied Interaction","author":"Kowalski Robert","year":"2013","unstructured":"Robert Kowalski, Sebastian Loehmann, and Doris Hausen. 2013. Cubble: A multi-device hybrid approach supporting communication in long-distance relationships. In Proceedings of the 7th International Conference on Tangible, Embedded, and Embodied Interaction. 201\u2013204."},{"key":"e_1_3_2_90_2","doi-asserted-by":"publisher","DOI":"10.1145\/2968219.2968545"},{"key":"e_1_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.09.014"},{"key":"e_1_3_2_92_2","doi-asserted-by":"publisher","DOI":"10.5555\/647988.741491"},{"key":"e_1_3_2_93_2","first-page":"276","volume-title":"Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom\u201917)","author":"Lee Hosub","year":"2017","unstructured":"Hosub Lee and Alfred Kobsa. 2017. Privacy preference modeling and prediction in a simulated campuswide IoT environment. In Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom\u201917). IEEE, Los Alamitos, CA, 276\u2013285."},{"issue":"1","key":"e_1_3_2_94_2","first-page":"1","article-title":"Confident privacy decision-making in iot environments","volume":"27","author":"Lee Hosub","year":"2019","unstructured":"Hosub Lee and Alfred Kobsa. 2019. Confident privacy decision-making in iot environments. ACM Transactions on Computer-Human Interaction 27, 1 (2019), 1\u201339.","journal-title":"ACM Transactions on Computer-Human Interaction"},{"key":"e_1_3_2_95_2","article-title":"Toward dynamic consent for privacy-aware pervasive health and well-being: A scoping review and research directions","author":"Lee Hyunsoo","year":"2022","unstructured":"Hyunsoo Lee and Uichin Lee. 2022. Toward dynamic consent for privacy-aware pervasive health and well-being: A scoping review and research directions. IEEE Pervasive Computing 21, 4 (2022), 25\u201332.","journal-title":"IEEE Pervasive Computing"},{"key":"e_1_3_2_96_2","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501611"},{"key":"e_1_3_2_97_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519739"},{"key":"e_1_3_2_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2683200"},{"key":"e_1_3_2_99_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-82786-1_11"},{"key":"e_1_3_2_100_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.08.010"},{"issue":"20","key":"e_1_3_2_101_2","doi-asserted-by":"crossref","first-page":"4380","DOI":"10.3390\/s19204380","article-title":"Privacy engineering for domestic IoT: Enabling due diligence","volume":"19","author":"Lodge Tom","year":"2019","unstructured":"Tom Lodge and Andy Crabtree. 2019. Privacy engineering for domestic IoT: Enabling due diligence. Sensors 19, 20 (2019), 4380.","journal-title":"Sensors"},{"key":"e_1_3_2_102_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jjimei.2022.100075"},{"key":"e_1_3_2_103_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025786"},{"key":"e_1_3_2_104_2","unstructured":"Ashok Marannan Manoj Nagarajan and Priyanka Nayek. n.d. Study on Software Agreement (EULA) . University of Wisconsin\u2013Madison."},{"key":"e_1_3_2_105_2","first-page":"1","volume-title":"Proceedings of the International Symposium on Wearable Computers (ISWC\u201910).","author":"Matscheko Michael","year":"2010","unstructured":"Michael Matscheko, Alois Ferscha, Andreas Riener, and Manuel Lehner. 2010. Tactor placement in wrist worn wearables. In Proceedings of the International Symposium on Wearable Computers (ISWC\u201910). IEEE, Los Alamitos, CA, 1\u20138."},{"issue":"2","key":"e_1_3_2_106_2","doi-asserted-by":"crossref","first-page":"102505","DOI":"10.1016\/j.acalib.2022.102505","article-title":"Are library vendors doing enough to protect users? A content analysis of major ILS privacy policies","volume":"48","author":"McKinnon Dawn","year":"2022","unstructured":"Dawn McKinnon and Clara Turp. 2022. Are library vendors doing enough to protect users? A content analysis of major ILS privacy policies. Journal of Academic Librarianship 48, 2 (2022), 102505.","journal-title":"Journal of Academic Librarianship"},{"key":"e_1_3_2_107_2","doi-asserted-by":"crossref","first-page":"2417","DOI":"10.1145\/2851581.2892475","volume-title":"Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems","author":"Mehta Vikram","year":"2016","unstructured":"Vikram Mehta, Arosha K. Bandara, Blaine A. Price, and Bashar Nuseibeh. 2016. Privacy itch and scratch: On body privacy warnings and controls. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. 2417\u20132424."},{"key":"e_1_3_2_108_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101856"},{"key":"e_1_3_2_109_2","first-page":"1","volume-title":"Proceedings of the 24th European Conference on Pattern Languages of Programs","author":"Mohammadi Nazila Gol","year":"2019","unstructured":"Nazila Gol Mohammadi, Julia Pampus, and Maritta Heisel. 2019. Pattern-based incorporation of privacy preferences into privacy policies: Negotiating the conflicting needs of service providers and end-users. In Proceedings of the 24th European Conference on Pattern Languages of Programs. 1\u201312."},{"issue":"2","key":"e_1_3_2_110_2","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1080\/10447318.2017.1331536","article-title":"Monitoring for awareness and reflection in ubiquitous learning environments","volume":"34","author":"Mu\u00f1oz-Crist\u00f3bal Juan A.","year":"2018","unstructured":"Juan A. Mu\u00f1oz-Crist\u00f3bal, Mar\u00eda Jes\u00fas Rodr\u00edguez-Triana, Vanesa Gallego-Lema, Higinio F. Arribas-Cubero, Juan I. Asensio-P\u00e9rez, and Alejandra Mart\u00ednez-Mon\u00e9s. 2018. Monitoring for awareness and reflection in ubiquitous learning environments. International Journal of Human\u2013Computer Interaction 34, 2 (2018), 146\u2013165.","journal-title":"International Journal of Human\u2013Computer Interaction"},{"key":"e_1_3_2_111_2","first-page":"399","volume-title":"Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS\u201917)","author":"Naeini Pardis Emami","year":"2017","unstructured":"Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman Sadeh. 2017. Privacy expectations and preferences in an IoT world. In Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS\u201917). 399\u2013412."},{"key":"e_1_3_2_112_2","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389154"},{"key":"e_1_3_2_113_2","article-title":"Ring security system program with law enforcement raises privacy concerns","author":"NEWS CBS","year":"2019","unstructured":"CBS NEWS. 2019. Ring security system program with law enforcement raises privacy concerns. CBS NEWS. Retrieved June 16, 2023 from https:\/\/www.cbsnews.com\/news\/ring-security-system-program-with-law-enforcement-raises-privacy-concerns\/.","journal-title":"CBS NEWS."},{"key":"e_1_3_2_114_2","doi-asserted-by":"publisher","DOI":"10.1145\/3338845"},{"key":"e_1_3_2_115_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376321"},{"key":"e_1_3_2_116_2","first-page":"8887","article-title":"Privacy in IoT: Expectations, causes of concerns, and reasons for concern mitigation","volume":"975","author":"Nower Naushin","year":"2019","unstructured":"Naushin Nower. 2019. Privacy in IoT: Expectations, causes of concerns, and reasons for concern mitigation. International Journal of Computer Applications 975 (2019), 8887.","journal-title":"International Journal of Computer Applications"},{"key":"e_1_3_2_117_2","first-page":"1","volume-title":"Proceedings of the 2018 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE\u201918)","author":"Olalere Isaac O.","year":"2018","unstructured":"Isaac O. Olalere, Mendon Dewa, and Bakhe Nleya. 2018. Remote condition monitoring of elevator\u2019s vibration and acoustics parameters for optimised maintenance using IoT technology. In Proceedings of the 2018 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE\u201918). IEEE, Los Alamitos, CA, 1\u20134."},{"key":"e_1_3_2_118_2","doi-asserted-by":"publisher","DOI":"10.3233\/SW-170283"},{"key":"e_1_3_2_119_2","first-page":"94","volume-title":"Proceedings of the 2020 IEEE International Conference on Dependable, Autonomic, and Secure Computing, the International Conference on Pervasive Intelligence and Computing, the International Conference on Cloud and Big Data Computing, and the International Conference on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech\u201920)","author":"Onu Emmanuel","year":"2020","unstructured":"Emmanuel Onu, Michael Mireku Kwakye, and Ken Barker. 2020. Contextual privacy policy modeling in IoT. In Proceedings of the 2020 IEEE International Conference on Dependable, Autonomic, and Secure Computing, the International Conference on Pervasive Intelligence and Computing, the International Conference on Cloud and Big Data Computing, and the International Conference on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech\u201920). IEEE, Los Alamitos, CA, 94\u2013102."},{"key":"e_1_3_2_120_2","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395549"},{"key":"e_1_3_2_121_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.088"},{"key":"e_1_3_2_122_2","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.12152"},{"key":"e_1_3_2_123_2","first-page":"177","volume-title":"Proceedings of the IFIP Annual Conference on Data and Applications Security and Privacy","author":"Pardo Ra\u00fal","year":"2019","unstructured":"Ra\u00fal Pardo and Daniel Le M\u00e9tayer. 2019. Analysis of privacy policies to enhance informed consent. In Proceedings of the IFIP Annual Conference on Data and Applications Security and Privacy. 177\u2013198."},{"key":"e_1_3_2_124_2","doi-asserted-by":"crossref","DOI":"10.1108\/ICS-04-2019-0049","article-title":"AppAware: A policy visualization model for mobile applications","author":"Paspatis Ioannis","year":"2020","unstructured":"Ioannis Paspatis, Aggeliki Tsohou, and Spyros Kokolakis. 2020. AppAware: A policy visualization model for mobile applications. Information & Computer Security 28, 1 (2020), 116\u2013132.","journal-title":"Information & Computer Security"},{"key":"e_1_3_2_125_2","doi-asserted-by":"publisher","DOI":"10.1002\/hbe2.133"},{"key":"e_1_3_2_126_2","doi-asserted-by":"crossref","first-page":"1345","DOI":"10.1145\/3196709.3196818","volume-title":"Proceedings of the 2018 Designing Interactive Systems Conference","author":"Pierce James","year":"2018","unstructured":"James Pierce, Sarah Fox, Nick Merrill, Richmond Wong, and Carl DiSalvo. 2018. An interface without a user: An exploratory design study of online privacy policies and digital legalese. In Proceedings of the 2018 Designing Interactive Systems Conference. 1345\u20131358."},{"key":"e_1_3_2_127_2","doi-asserted-by":"publisher","DOI":"10.1145\/1133265.1133277"},{"key":"e_1_3_2_128_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2969326"},{"key":"e_1_3_2_129_2","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293455"},{"key":"e_1_3_2_130_2","first-page":"1","article-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council","volume":"679","author":"Union European","year":"2016","unstructured":"European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council. Official Journal of the European Union 679 (2016), 1\u201388.","journal-title":"Official Journal of the European Union"},{"key":"e_1_3_2_131_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445465"},{"key":"e_1_3_2_132_2","article-title":"The digitization of the world from edge to core","author":"Reinsel David","year":"2018","unstructured":"David Reinsel, John Gantz, and John Rydning. 2018. The digitization of the world from edge to core. Seagate Retrieved June 16, 2023 from https:\/\/www.seagate.com\/files\/www-content\/our-story\/trends\/files\/idc-seagate-dataage-whitepaper.pdf.","journal-title":"Seagate"},{"key":"e_1_3_2_133_2","unstructured":"Ring. n.d. Video Doorbell\u2014Ring. Retrieved June 16 2023 from https:\/\/en-uk.ring.com."},{"key":"e_1_3_2_134_2","doi-asserted-by":"crossref","first-page":"100584","DOI":"10.1016\/j.iot.2022.100584","article-title":"A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city","author":"Rizi Mohammad Hosein Panahi","year":"2022","unstructured":"Mohammad Hosein Panahi Rizi and Seyed Amin Hoseini Seno. 2022. A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city. Internet of Things 20 (2022), 100584.","journal-title":"Internet of Things"},{"key":"e_1_3_2_135_2","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/s00779-021-01556-x","article-title":"Tangible interfaces in early years\u2019 education: A systematic review","author":"Rodi\u0107 Lea Duji\u0107","year":"2022","unstructured":"Lea Duji\u0107 Rodi\u0107 and Andrina Grani\u0107. 2022. Tangible interfaces in early years\u2019 education: A systematic review. Personal and Ubiquitous Computing 26 (2022), 39\u201377.","journal-title":"Personal and Ubiquitous Computing"},{"issue":"4","key":"e_1_3_2_136_2","first-page":"Article 26, 33","article-title":"Objects with Intent: Designing everyday things as collaborative partners","volume":"26","author":"Rozendaal Marco C.","year":"2019","unstructured":"Marco C. Rozendaal, Boudewijn Boon, and Victor Kaptelinin. 2019. Objects with Intent: Designing everyday things as collaborative partners. ACM Transactions on Computer-Human Interaction 26, 4 (2019), Article 26, 33 pages.","journal-title":"ACM Transactions on Computer-Human Interaction"},{"key":"e_1_3_2_137_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0214-3"},{"issue":"11","key":"e_1_3_2_138_2","doi-asserted-by":"crossref","first-page":"e21016","DOI":"10.2196\/21016","article-title":"Enabling remote patient monitoring through the use of smart thermostat data in Canada: Exploratory study","volume":"8","author":"Sahu Kirti Sundar","year":"2020","unstructured":"Kirti Sundar Sahu, Arlene Oetomo, and Plinio Pelegrini Morita. 2020. Enabling remote patient monitoring through the use of smart thermostat data in Canada: Exploratory study. JMIR mHealth and uHealth 8, 11 (2020), e21016.","journal-title":"JMIR mHealth and uHealth"},{"key":"e_1_3_2_139_2","article-title":"Designing effective privacy notices and controls","author":"Schaub Florian","year":"2017","unstructured":"Florian Schaub, Rebecca Balebako, and Lorrie Faith Cranor. 2017. Designing effective privacy notices and controls. IEEE Internet Computing 21, 3 (2017), 70\u201377.","journal-title":"IEEE Internet Computing"},{"key":"e_1_3_2_140_2","first-page":"1","volume-title":"Proceedings of the 11th Symposium on Usable Privacy and Security (SOUPS\u201915)","author":"Schaub Florian","year":"2015","unstructured":"Florian Schaub, Rebecca Balebako, Adam L. Durity, and Lorrie Faith Cranor. 2015. A design space for effective privacy notices. In Proceedings of the 11th Symposium on Usable Privacy and Security (SOUPS\u201915). 1\u201317."},{"issue":"2","key":"e_1_3_2_141_2","doi-asserted-by":"crossref","first-page":"1840","DOI":"10.1109\/TVCG.2020.3028946","article-title":"A visualization interface to improve the transparency of collected personal data on the Internet","volume":"27","author":"Schufrin Marija","year":"2020","unstructured":"Marija Schufrin, Steven Lamarr Reynolds, Arjan Kuijper, and Jorn Kohlhammer. 2020. A visualization interface to improve the transparency of collected personal data on the Internet. IEEE Transactions on Visualization and Computer Graphics 27, 2 (2020), 1840\u20131849.","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"key":"e_1_3_2_142_2","volume-title":"Proceedings of the Workshop on Usable Privacy and Security for Mobile Devices (U-PriSM\u201912)","author":"Scipioni Marcello Paolo","year":"2012","unstructured":"Marcello Paolo Scipioni and Marc Langheinrich. 2012. To share or not to share? An activity-centered approach for designing usable location sharing tools. In Proceedings of the Workshop on Usable Privacy and Security for Mobile Devices (U-PriSM\u201912)."},{"key":"e_1_3_2_143_2","unstructured":"Seedstudio. n.d. Sensors\u2014Seeed Studio Electronics. Retrieved June 16 2023 from https:\/\/www.seeedstudio.com\/category\/Sensor-for-Grove-c-24.html."},{"key":"e_1_3_2_144_2","doi-asserted-by":"crossref","first-page":"2477","DOI":"10.1007\/s41870-022-00965-2","article-title":"A comprehensive privacy and security framework for dynamic protection (CPSF)","author":"Sen Abi","year":"2022","unstructured":"Abi Sen and Adnan Ahmed. 2022. A comprehensive privacy and security framework for dynamic protection (CPSF). International Journal of Information Technology 14 (2022), 2477\u20132485.","journal-title":"International Journal of Information Technology"},{"key":"e_1_3_2_145_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376264"},{"key":"e_1_3_2_146_2","doi-asserted-by":"publisher","DOI":"10.1145\/3434777"},{"key":"e_1_3_2_147_2","first-page":"189","article-title":"Vibrotactile pattern perception: Some findings and applications","author":"Sherrick Carl","year":"1991","unstructured":"Carl Sherrick. 1991. Vibrotactile pattern perception: Some findings and applications. In The Psychology of Touch. Psychology Press, London, England, 189\u2013218.","journal-title":"The Psychology of Touch."},{"key":"e_1_3_2_148_2","unstructured":"Amazon. Somfy 2401507 Indoor Camera Full HD Security Camera for Home Security Systems Smart Device with Integrated App and Simple Installation: Amazon.co.uk: DIY & Tools. Retrieved June 16 2023 from https:\/\/www.amazon.co.uk\/SOMFY-Home-Indoor-Security-Camera\/dp\/B07D7JKSMJ?ref_=ast_sto_dp."},{"key":"e_1_3_2_149_2","unstructured":"Joseph Steinberg. 2014. These devices may be spying on you (even in your own home). Forbes. Retrieved June 16 2023 from https:\/\/www.forbes.com\/sites\/josephsteinberg\/2014\/01\/27\/these-devices-may-be-spying-on-you-even-in-your-own-home\/?sh=462c76fab859."},{"key":"e_1_3_2_150_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2529723"},{"key":"e_1_3_2_151_2","article-title":"Fighting crime or invading privacy? Police deals with Ring video doorbell have advocates and critics","author":"Susnjara Bob","year":"2020","unstructured":"Bob Susnjara. 2020. Fighting crime or invading privacy? Police deals with Ring video doorbell have advocates and critics. Daily Herald Media Group. Retrieved June 16, 2023 from https:\/\/www.dailyherald.com\/news\/20200209\/fighting-crime-or-invading-privacy-police-deals-with-ring-video-doorbell-have-advocates-and-critics.","journal-title":"Daily Herald Media Group."},{"key":"e_1_3_2_152_2","unstructured":"Vamshidhar Thonti. 2018. Different types of sensors and their working. Circuit Digest . Retrieved June 16 2023 from https:\/\/circuitdigest.com\/tutorial\/different-types-of-sensors-and-their-working."},{"key":"e_1_3_2_153_2","first-page":"615","volume-title":"Proceedings of the 2020 IEEE 19th International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom\u201920)","author":"Tian Chen","year":"2020","unstructured":"Chen Tian, Yazhe Wang, Peng Liu, Yu Wang, Ruirui Dai, Anyuan Zhou, and Zhen Xu. 2020. Prihook: Differentiated context-aware hook placement for different owners\u2019 smartphones. In Proceedings of the 2020 IEEE 19th International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom\u201920). IEEE, Los Alamitos, CA, 615\u2013622."},{"issue":"7","key":"e_1_3_2_154_2","article-title":"What happens to my data? A novel approach to informing users of data processing practices","volume":"17","author":"Berg Bibi Van den","year":"2012","unstructured":"Bibi Van den Berg and Simone Van der Hof. 2012. What happens to my data? A novel approach to informing users of data processing practices. First Monday 17, 7 (2012).","journal-title":"First Monday"},{"key":"e_1_3_2_155_2","doi-asserted-by":"crossref","unstructured":"Max Van Kleek William Seymour Reuben Binns Jun Zhao Daniel Karandikar and Nigel Shadbolt. 2019. IoT refine: Making smart home devices accountable for their data harvesting practices. In Proceedings of Living in the Internet of Things (IoT\u201919) .","DOI":"10.1049\/cp.2019.0134"},{"key":"e_1_3_2_156_2","first-page":"36","volume-title":"Proceedings of the USENIX Annual Technical Conference","volume":"41","year":"2007","unstructured":"Guido Van Rossum. 2007. Python programming language. In Proceedings of the USENIX Annual Technical Conference, Vol. 41. 36."},{"issue":"4","key":"e_1_3_2_157_2","doi-asserted-by":"crossref","first-page":"855","DOI":"10.1109\/JIOT.2016.2594205","article-title":"Privacy-preserving mechanisms for crowdsensing: Survey and research challenges","volume":"4","author":"Vergara-Laurens Idalides J.","year":"2016","unstructured":"Idalides J. Vergara-Laurens, Luis G. Jaimes, and Miguel A. Labrador. 2016. Privacy-preserving mechanisms for crowdsensing: Survey and research challenges. IEEE Internet of Things Journal 4, 4 (2016), 855\u2013869.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_158_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.parco.2011.05.005"},{"key":"e_1_3_2_159_2","doi-asserted-by":"publisher","DOI":"10.1038\/nrn3112"},{"key":"e_1_3_2_160_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2708042"},{"key":"e_1_3_2_161_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"e_1_3_2_162_2","doi-asserted-by":"publisher","DOI":"10.1145\/3127519"},{"key":"e_1_3_2_163_2","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/CSP51677.2021.9357592","volume-title":"Proceedings of the 2021 IEEE 5th International Conference on Cryptography, Security, and Privacy (CSP\u201921)","author":"Zainuddin Naqliyah","year":"2021","unstructured":"Naqliyah Zainuddin, Maslina Daud, Sabariah Ahmad, Mayasarah Maslizan, and Syafiqa Anneisa Leng Abdullah. 2021. A study on privacy issues in Internet of Things (IoT). In Proceedings of the 2021 IEEE 5th International Conference on Cryptography, Security, and Privacy (CSP\u201921). IEEE, Los Alamitos, CA, 96\u2013100."},{"key":"e_1_3_2_164_2","article-title":"Sensing as a service and big data","author":"Zaslavsky Arkady","year":"2013","unstructured":"Arkady Zaslavsky, Charith Perera, and Dimitrios Georgakopoulos. 2013. Sensing as a service and big data. arXiv preprint arXiv:1301.0159 (2013).","journal-title":"arXiv preprint arXiv:1301.0159"},{"key":"e_1_3_2_165_2","first-page":"273","volume-title":"Proceedings of the 17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services","author":"Zavalyshyn Igor","year":"2020","unstructured":"Igor Zavalyshyn, Nuno Santos, Ramin Sadre, and Axel Legay. 2020. My house, my rules: A private-by-design smart home platform. In Proceedings of the 17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services(MobiQuitous\u201920). 273\u2013282."},{"key":"e_1_3_2_166_2","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"key":"e_1_3_2_167_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2980802"},{"key":"e_1_3_2_168_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847733"},{"key":"e_1_3_2_169_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.795"},{"key":"e_1_3_2_170_2","first-page":"1","volume-title":"Proceedings of the 23rd USENIX Security Symposium (USENIX Security\u201914)","author":"Zimmeck Sebastian","year":"2014","unstructured":"Sebastian Zimmeck and Steven M. Bellovin. 2014. Privee: An architecture for automatically analyzing web privacy policies. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security\u201914). 1\u201316."},{"key":"e_1_3_2_171_2","volume-title":"Proceedings of the 2021 Network and Distributed System Security Symposium (NDSS\u201921)","author":"Zimmeck Sebastian","year":"2021","unstructured":"Sebastian Zimmeck, Rafael Goldstein, and David Baraka. 2021. PrivacyFlash Pro: Automating privacy policy generation for mobile apps. In Proceedings of the 2021 Network and Distributed System Security Symposium (NDSS\u201921)."},{"key":"e_1_3_2_172_2","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1145\/1518701.1518765","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"Zimmerman John","year":"2009","unstructured":"John Zimmerman. 2009. Designing for the self: Making products that help people become the person they desire to be. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 395\u2013404."}],"container-title":["ACM Transactions on Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600096","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3600096","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:50Z","timestamp":1750178210000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600096"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,31]]},"references-count":171,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,8,31]]}},"alternative-id":["10.1145\/3600096"],"URL":"https:\/\/doi.org\/10.1145\/3600096","relation":{},"ISSN":["2691-1914","2577-6207"],"issn-type":[{"value":"2691-1914","type":"print"},{"value":"2577-6207","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,31]]},"assertion":[{"value":"2022-06-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-05-09","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-09-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}