{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T22:37:15Z","timestamp":1776119835114,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T00:00:00Z","timestamp":1686873600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002341","name":"Academy of Finland","doi-asserted-by":"publisher","award":["327397"],"award-info":[{"award-number":["327397"]}],"id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,16]]},"DOI":"10.1145\/3606305.3606332","type":"proceedings-article","created":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T16:18:41Z","timestamp":1694535521000},"page":"129-133","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["An assessment of privacy policies for smart home devices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-4798-5261","authenticated-orcid":false,"given":"Timi","family":"Heino","sequence":"first","affiliation":[{"name":"University of Turku, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1891-2353","authenticated-orcid":false,"given":"Sampsa","family":"Rauti","sequence":"additional","affiliation":[{"name":"University of Turku, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7255-0239","authenticated-orcid":false,"given":"Robin","family":"Carlsson","sequence":"additional","affiliation":[{"name":"University of Turku, Finland"}]}],"member":"320","published-online":{"date-parts":[[2023,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"USENIX Security Symposium. 585\u2013602","author":"Andow Benjamin","year":"2019","unstructured":"Benjamin Andow , Samin\u00a0Yaseer Mahmud , Wenyu Wang , Justin Whitaker , William Enck , Bradley Reaves , Kapil Singh , and Tao Xie . 2019 . PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play .. In USENIX Security Symposium. 585\u2013602 . Benjamin Andow, Samin\u00a0Yaseer Mahmud, Wenyu Wang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Tao Xie. 2019. PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play.. In USENIX Security Symposium. 585\u2013602."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1515\/pjbr-2021-0013"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3539003"},{"key":"e_1_3_2_1_4_1","volume-title":"Mitigating Security Challenges in Smart Home Management Through Smart Lock. In Data Driven Approach Towards Disruptive Technologies: Proceedings of MIDAS","author":"Khan Ruqaiya","year":"2021","unstructured":"Ruqaiya Khan , Vinod\u00a0Kumar Shukla , Bhopendra Singh , and Sonali Vyas . 2021 . Mitigating Security Challenges in Smart Home Management Through Smart Lock. In Data Driven Approach Towards Disruptive Technologies: Proceedings of MIDAS 2020. Springer, 61\u201371. Ruqaiya Khan, Vinod\u00a0Kumar Shukla, Bhopendra Singh, and Sonali Vyas. 2021. Mitigating Security Challenges in Smart Home Management Through Smart Lock. In Data Driven Approach Towards Disruptive Technologies: Proceedings of MIDAS 2020. Springer, 61\u201371."},{"key":"e_1_3_2_1_5_1","first-page":"181","article-title":"The non-contractual nature of privacy policies and a new critique of the Notice and Choice Privacy Protection Model","volume":"27","author":"Norton B","year":"2016","unstructured":"Thomas\u00a0 B Norton . 2016 . The non-contractual nature of privacy policies and a new critique of the Notice and Choice Privacy Protection Model . Fordham Intell. Prop. Media & Ent. LJ 27 (2016), 181 . Thomas\u00a0B Norton. 2016. The non-contractual nature of privacy policies and a new critique of the Notice and Choice Privacy Protection Model. Fordham Intell. Prop. Media & Ent. LJ 27 (2016), 181.","journal-title":"Fordham Intell. Prop. Media & Ent. LJ"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99828-2_12"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.15"},{"key":"e_1_3_2_1_8_1","volume-title":"Investigating security for ubiquitous sensor networks. Procedia computer science 109","author":"Perez J","year":"2017","unstructured":"Alfredo\u00a0 J Perez , Sherali Zeadally , and Nafaa Jabeur . 2017. Investigating security for ubiquitous sensor networks. Procedia computer science 109 ( 2017 ), 737\u2013744. Alfredo\u00a0J Perez, Sherali Zeadally, and Nafaa Jabeur. 2017. Investigating security for ubiquitous sensor networks. Procedia computer science 109 (2017), 737\u2013744."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-73689-7_69"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.08.051"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100467"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/REW.2017.77"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1609\/hcomp.v7i1.5266"},{"key":"e_1_3_2_1_14_1","volume-title":"Smart home technologies in Europe: A critical review of concepts, benefits, risks and policies. Renewable and sustainable energy reviews 120","author":"Sovacool K","year":"2020","unstructured":"Benjamin\u00a0 K Sovacool and Dylan D\u00a0Furszyfer Del\u00a0Rio . 2020. Smart home technologies in Europe: A critical review of concepts, benefits, risks and policies. Renewable and sustainable energy reviews 120 ( 2020 ), 109663. Benjamin\u00a0K Sovacool and Dylan D\u00a0Furszyfer Del\u00a0Rio. 2020. Smart home technologies in Europe: A critical review of concepts, benefits, risks and policies. Renewable and sustainable energy reviews 120 (2020), 109663."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Nili Steinfeld. 2016. \u201cI agree to the terms and conditions\u201d:(How) do users read privacy policies online? An eye-tracking experiment. Computers in human behavior 55 (2016) 992\u20131000.  Nili Steinfeld. 2016. \u201cI agree to the terms and conditions\u201d:(How) do users read privacy policies online? An eye-tracking experiment. Computers in human behavior 55 (2016) 992\u20131000.","DOI":"10.1016\/j.chb.2015.09.038"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2016.2554419"}],"event":{"name":"CompSysTech '23: International Conference on Computer Systems and Technologies 2023","location":"Ruse Bulgaria","acronym":"CompSysTech '23"},"container-title":["Proceedings of the 24th International Conference on Computer Systems and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3606305.3606332","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3606305.3606332","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:08Z","timestamp":1750178828000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3606305.3606332"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,16]]},"references-count":16,"alternative-id":["10.1145\/3606305.3606332","10.1145\/3606305"],"URL":"https:\/\/doi.org\/10.1145\/3606305.3606332","relation":{},"subject":[],"published":{"date-parts":[[2023,6,16]]},"assertion":[{"value":"2023-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}