{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:56:25Z","timestamp":1773154585787,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":98,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100004351","name":"Cisco Systems","doi-asserted-by":"publisher","award":["2776390,2776391"],"award-info":[{"award-number":["2776390,2776391"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100004351","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,11]]},"DOI":"10.1145\/3613904.3642208","type":"proceedings-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:38:06Z","timestamp":1715416686000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["\u201cWe Have No Security Concerns\u201d: Understanding the Privacy-Security Nexus in Telehealth for Audiologists and Speech-Language Pathologists"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9781-2694","authenticated-orcid":false,"given":"Faiza","family":"Tazi","sequence":"first","affiliation":[{"name":"Ritchie School of Engineering and Computer Science, University of Denver, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3455-2562","authenticated-orcid":false,"given":"Josiah","family":"Dykstra","sequence":"additional","affiliation":[{"name":"Cybersecuity Collaboration Center, National Security Agency, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8596-085X","authenticated-orcid":false,"given":"Prashanth","family":"Rajivan","sequence":"additional","affiliation":[{"name":"University of Washington, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1299-7867","authenticated-orcid":false,"given":"Sanchari","family":"Das","sequence":"additional","affiliation":[{"name":"Ritchie School of Computer Science and Engineering, University of Denver, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"e_1_3_3_3_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpbup.2021.100002"},{"key":"e_1_3_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.2196\/11254"},{"key":"e_1_3_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1089\/tmj.2009.0030"},{"key":"e_1_3_3_3_4_1","first-page":"652","article-title":"HIPAA compliance and training: a perfect storm for professionalism education?The Journal of Law","volume":"44","author":"Agris L","year":"2016","unstructured":"Julie\u00a0L Agris and John\u00a0M Spandorfer. 2016. HIPAA compliance and training: a perfect storm for professionalism education?The Journal of Law, Medicine & Ethics 44, 4 (2016), 652\u2013656.","journal-title":"Medicine & Ethics"},{"key":"e_1_3_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/jcp2040043"},{"key":"e_1_3_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph192416760"},{"key":"e_1_3_3_3_7_1","unstructured":"[7] American Speech-Language-Hearing Association. 2023. https:\/\/www.asha.org\/"},{"key":"e_1_3_3_3_8_1","unstructured":"American Speech-Language-Hearing Association 2021. Audiology and Speech-Language Pathology Interstate Compact (ASLP-IC)."},{"key":"e_1_3_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2012.10845654"},{"key":"e_1_3_3_3_10_1","volume-title":"International Conference on Cyber Security for Sustainable Society","author":"Bada Maria","year":"2015","unstructured":"Maria Bada, Angela Sasse, and Jason Nurse. 2015. Cyber Security Awareness Campaigns: Why do they fail to change behaviour?. In International Conference on Cyber Security for Sustainable Society. Coventry, United Kingdom, 118\u2013131."},{"key":"e_1_3_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2017.2679979"},{"key":"e_1_3_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1093\/jlb\/lsaa075"},{"key":"e_1_3_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1097\/01.NHH.0000267282.54458.54"},{"key":"e_1_3_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11606-014-3049-9"},{"key":"e_1_3_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1093\/pubmed\/fdab284"},{"key":"e_1_3_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1044\/2021_AJSLP-21-00013"},{"key":"e_1_3_3_3_17_1","volume-title":"Does continuing medical education in general practice make a difference?BMJ 318, 7193","author":"Cantillon Peter","year":"1999","unstructured":"Peter Cantillon and Roger Jones. 1999. Does continuing medical education in general practice make a difference?BMJ 318, 7193 (1999), 1276\u20131279."},{"key":"e_1_3_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/20479700.2016.1270875"},{"key":"e_1_3_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2018.5630"},{"key":"e_1_3_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(03)00041-7"},{"key":"e_1_3_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50309-3_8"},{"key":"e_1_3_3_3_23_1","volume-title":"Computer-Assisted and Web-Based Innovations in Psychology, Special Education, and Health","author":"Dart H","unstructured":"Evan\u00a0H Dart, Heather\u00a0M Whipple, Jamie\u00a0L Pasqua, and Christopher\u00a0M Furlow. 2016. Legal, regulatory, and ethical issues in telehealth technology. In Computer-Assisted and Web-Based Innovations in Psychology, Special Education, and Health. Elsevier, 339\u2013363."},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1177\/1071181322661032"},{"key":"e_1_3_3_3_25_1","volume-title":"A blockchain-enabled sharing platform for personal health records. Heliyon 9, 7","author":"Dong Yibin","year":"2023","unstructured":"Yibin Dong, Seong\u00a0K Mun, and Yue Wang. 2023. A blockchain-enabled sharing platform for personal health records. Heliyon 9, 7 (2023)."},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1089\/tmj.2021.0381"},{"key":"e_1_3_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIC50333.2020.00029"},{"key":"e_1_3_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mayocpiqo.2020.04.009"},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"crossref","unstructured":"Ana Ferreira Ricardo Correia David Chadwick Henrique\u00a0MD Santos Rui Gomes Diogo Reis and Luis Antunes. 2013. Password sharing and how to reduce it. In IT Policy and Ethics: Concepts Methodologies Tools and Applications. IGI Global 22\u201342.","DOI":"10.4018\/978-1-4666-2919-6.ch002"},{"key":"e_1_3_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1001\/jamanetworkopen.2020.22302"},{"key":"e_1_3_3_3_31_1","unstructured":"Crystal\u00a0L Fleischhacker. 2020. Patient satisfaction with telehealth services compared to in-office visits: A systematic literature review. (2020)."},{"key":"e_1_3_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.nurpra.2020.09.013"},{"key":"e_1_3_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.3766\/jaaa.14107"},{"key":"e_1_3_3_3_34_1","volume-title":"To trust or not to trust: Situational and dispositional determinants. Social Behavior and Personality: an international journal 24, 2","author":"Goto G","year":"1996","unstructured":"Sharon\u00a0G Goto. 1996. To trust or not to trust: Situational and dispositional determinants. Social Behavior and Personality: an international journal 24, 2 (1996), 119\u2013131."},{"key":"e_1_3_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1177\/1357633X211008786"},{"key":"e_1_3_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1377\/hlthaff.2013.0997"},{"key":"e_1_3_3_3_37_1","volume-title":"Telehealth cybersecurity. A Practical Guide to Emergency Telehealth","author":"Hood Colton","year":"2021","unstructured":"Colton Hood. 2021. Telehealth cybersecurity. A Practical Guide to Emergency Telehealth, Oxford University Press, New York, NY (2021), 81\u201392."},{"key":"e_1_3_3_3_38_1","volume-title":"Privacy and Security Risk Factors Related to Telehealth Services\u2013A Systematic Review. Perspectives in Health Information Management 20, 1","author":"Houser H","year":"2023","unstructured":"Shannon\u00a0H Houser, Cathy\u00a0A Flite, and Susan\u00a0L Foster. 2023. Privacy and Security Risk Factors Related to Telehealth Services\u2013A Systematic Review. Perspectives in Health Information Management 20, 1 (2023)."},{"key":"e_1_3_3_3_39_1","volume-title":"Professional issues in speech-language pathology and audiology","author":"Hudson W","unstructured":"Melanie\u00a0W Hudson and Mark DeRuiter. 2023. Professional issues in speech-language pathology and audiology. Plural Publishing."},{"key":"e_1_3_3_3_40_1","volume-title":"Build an Advocacy Win for More School Resources. Leader Live","author":"Hutchins D","year":"2021","unstructured":"Shelley\u00a0D Hutchins. 2021. Build an Advocacy Win for More School Resources. Leader Live (2021)."},{"key":"e_1_3_3_3_41_1","unstructured":"Asif\u00a0Mohammed Islam and Daniel Lederman. 2020. Data Transparency and Long-Run Growth. (2020)."},{"key":"e_1_3_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.2196\/10059"},{"key":"e_1_3_3_3_43_1","volume-title":"Seminars in Hearing, Vol.\u00a042","author":"Jilla Anna\u00a0Marie","unstructured":"Anna\u00a0Marie Jilla, Michelle\u00a0L Arnold, and Erin\u00a0L Miller. 2021. US Policy considerations for telehealth provision in audiology. In Seminars in Hearing, Vol.\u00a042. Thieme Medical Publishers, Inc., 165\u2013174."},{"key":"e_1_3_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.2147\/IJGM.S301800"},{"key":"e_1_3_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2020.07.003"},{"key":"e_1_3_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.2196\/20359"},{"key":"e_1_3_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/AI-CSP52968.2021.9671083"},{"key":"e_1_3_3_3_48_1","volume-title":"Telemedicine adoption issues in the United States and Brazil: Perception of healthcare professionals. Health informatics journal 26, 4","author":"Luciano Edimara","year":"2020","unstructured":"Edimara Luciano, M\u00a0Adam Mahmood, and Parand Mansouri\u00a0Rad. 2020. Telemedicine adoption issues in the United States and Brazil: Perception of healthcare professionals. Health informatics journal 26, 4 (2020), 2344\u20132361."},{"key":"e_1_3_3_3_49_1","unstructured":"[49] Lumivero. 2023. https:\/\/lumivero.com\/products\/nvivo\/"},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1080\/14639220500337708"},{"key":"e_1_3_3_3_51_1","unstructured":"[51] MAXQDA. 2023. https:\/\/www.maxqda.com\/"},{"key":"e_1_3_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.25122\/jml-2021-0100"},{"key":"e_1_3_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580695"},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1250584"},{"key":"e_1_3_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1177\/014233129902100408"},{"key":"e_1_3_3_3_56_1","first-page":"96","article-title":"Customer data: Designing for transparency and trust","volume":"93","author":"Morey Timothy","year":"2015","unstructured":"Timothy Morey, Theodore Forbath, and Allison Schoop. 2015. Customer data: Designing for transparency and trust. Harvard Business Review 93, 5 (2015), 96\u2013105.","journal-title":"Harvard Business Review"},{"key":"e_1_3_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-023-02348-4"},{"key":"e_1_3_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1080\/00140139608964474"},{"key":"e_1_3_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1080\/21679169.2018.1549272"},{"key":"e_1_3_3_3_60_1","unstructured":"[60] Academy of\u00a0Doctors\u00a0of Audiology. 2023. https:\/\/www.audiologist.org\/"},{"key":"e_1_3_3_3_61_1","unstructured":"U.S.\u00a0Department of Health and Office for Civil\u00a0Rights Human\u00a0Services. 2023. Annual Report to Congress on HIPAA Privacy Security and Breach Notification Rule Compliance. https:\/\/www.hhs.gov\/sites\/default\/files\/compliance-report-to-congress-2021.pdf"},{"key":"e_1_3_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAFRICA.2016.7530664"},{"key":"e_1_3_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1044\/2022_LSHSS-22-00007"},{"key":"e_1_3_3_3_64_1","volume-title":"International Conference on Human-Computer Interaction. Springer, 337\u2013352","author":"Pickering Brian","year":"2021","unstructured":"Brian Pickering, Costas Boletsis, Ragnhild Halvorsrud, Stephen Phillips, and Mike Surridge. 2021. It\u2019s not my problem: how healthcare models relate to SME cybersecurity awareness. In International Conference on Human-Computer Interaction. Springer, 337\u2013352."},{"key":"e_1_3_3_3_65_1","first-page":"579","article-title":"The Inadequacy of HIPAA\u2019s Privacy Rule: The Plain Language Notice of Privacy Practices and Patient Understanding","author":"Pollio C","year":"2004","unstructured":"Marie\u00a0C Pollio. 2004. The Inadequacy of HIPAA\u2019s Privacy Rule: The Plain Language Notice of Privacy Practices and Patient Understanding. NYU Ann. Surv. Am. L. 60 (2004), 579.","journal-title":"NYU Ann. Surv. Am."},{"key":"e_1_3_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1001\/jamanetworkopen.2021.36405"},{"key":"e_1_3_3_3_67_1","article-title":"Predicting individual differences to cyber attacks: Knowledge, arousal, emotional and trust responses. Cyberpsychology","volume":"15","author":"Pyke Aryn","year":"2021","unstructured":"Aryn Pyke, Ericka Rovira, Savannah Murray, Joseph Pritts, Charlotte\u00a0L Carp, and Robert Thomson. 2021. Predicting individual differences to cyber attacks: Knowledge, arousal, emotional and trust responses. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 15, 4 (2021).","journal-title":"Journal of Psychosocial Research on Cyberspace"},{"key":"e_1_3_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.35484\/pssr.2020(4-I)29"},{"key":"e_1_3_3_3_69_1","volume-title":"2021 IEEE International Conference on Health, Instrumentation & Measurement, and Natural Sciences (InHeNce). IEEE, 1\u20136.","author":"Ramli Kalamullah","year":"2021","unstructured":"Kalamullah Ramli and Hidayah. 2021. HIPAA-based Analysis on the Awareness Level of Medical Personnel in Indonesia to Secure Electronic Protected Health Information (ePHI). In 2021 IEEE International Conference on Health, Instrumentation & Measurement, and Natural Sciences (InHeNce). IEEE, 1\u20136."},{"key":"e_1_3_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2017.12.011"},{"key":"e_1_3_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/AIEEE51419.2021.9435776"},{"key":"e_1_3_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445485"},{"key":"e_1_3_3_3_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101605"},{"key":"e_1_3_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2020.7943"},{"key":"e_1_3_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ridd.2021.103876"},{"key":"e_1_3_3_3_76_1","doi-asserted-by":"publisher","DOI":"10.1177\/1357633X20916567"},{"key":"e_1_3_3_3_77_1","first-page":"30","article-title":"HIPAA mighty and flawed: regulation has wide-reaching impact on the healthcare industry","volume":"84","author":"Solove J","year":"2013","unstructured":"Daniel\u00a0J Solove. 2013. HIPAA mighty and flawed: regulation has wide-reaching impact on the healthcare industry. Journal of AHIMA 84, 4 (2013), 30\u201331.","journal-title":"Journal of AHIMA"},{"key":"e_1_3_3_3_78_1","doi-asserted-by":"publisher","DOI":"10.1080\/14461242.2015.1078218"},{"key":"e_1_3_3_3_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376881"},{"key":"e_1_3_3_3_80_1","doi-asserted-by":"publisher","DOI":"10.1044\/persp1.SIG18.41"},{"key":"e_1_3_3_3_81_1","doi-asserted-by":"publisher","DOI":"10.1108\/15285810510681883"},{"key":"e_1_3_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-10183-0_8"},{"key":"e_1_3_3_3_83_1","unstructured":"The Health Insurance Portability and Accountability Act of 1996 (HIPAA). 1996. 42 U.S.C. \u00a7 104-191."},{"key":"e_1_3_3_3_84_1","doi-asserted-by":"publisher","DOI":"10.1166\/jmihi.2014.1278"},{"key":"e_1_3_3_3_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.03.003"},{"key":"e_1_3_3_3_86_1","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMsr1503323"},{"key":"e_1_3_3_3_87_1","first-page":"6","article-title":"Vulnerability assessment and penetration testing","volume":"3","author":"Umrao SACHIN","year":"2012","unstructured":"SACHIN Umrao, MANDEEP Kaur, and GOVIND\u00a0KUMAR Gupta. 2012. Vulnerability assessment and penetration testing. International Journal of Computer & Communication Technology 3, 6-8 (2012), 71\u201374.","journal-title":"International Journal of Computer & Communication Technology"},{"key":"e_1_3_3_3_88_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 7, CSCW2","author":"Van\u00a0Driel Martine","year":"2023","unstructured":"Martine Van\u00a0Driel, John Vines, Bel\u00e9n Barros\u00a0Pena, and Nelya Koteyko. 2023. Understanding Autistic Adults\u2019 Use of Social Media. Proceedings of the ACM on Human-Computer Interaction 7, CSCW2 (2023), 1\u201323."},{"key":"e_1_3_3_3_89_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-016-0250-2"},{"key":"e_1_3_3_3_90_1","doi-asserted-by":"crossref","unstructured":"A\u00a0Vithya Vijayalakshmi and L Arockiam. 2018. Hybrid security techniques to protect sensitive data in E-healthcare systems. (2018) 39\u201343.","DOI":"10.1109\/ICSSIT.2018.8748298"},{"key":"e_1_3_3_3_91_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.2670"},{"key":"e_1_3_3_3_92_1","first-page":"675","article-title":"Design, adoption, implementation, scalability, and sustainability of telehealth programs","volume":"67","author":"Wang C\u00a0Jason","year":"2020","unstructured":"C\u00a0Jason Wang, Tiffany\u00a0T Liu, Josip Car, and Barry Zuckerman. 2020. Design, adoption, implementation, scalability, and sustainability of telehealth programs. Pediatric Clinics 67, 4 (2020), 675\u2013682.","journal-title":"Pediatric Clinics"},{"key":"e_1_3_3_3_93_1","doi-asserted-by":"crossref","unstructured":"Ding Wang Santosh\u00a0D Kale and Jacki O\u2019Neill. 2020. Please call the specialism: Using WeChat to support patient care in China. (2020) 1\u201313.","DOI":"10.1145\/3313831.3376274"},{"key":"e_1_3_3_3_94_1","volume-title":"Jobs, Patients","author":"Warren Sarah","year":"2022","unstructured":"Sarah Warren. 2022. Insurance Payment Cuts Threaten Members\u2019 Jobs, Patients\u2019 Access to Care. Leader Live (2022)."},{"key":"e_1_3_3_3_95_1","doi-asserted-by":"publisher","DOI":"10.5195\/ijt.2015.6186"},{"key":"e_1_3_3_3_96_1","doi-asserted-by":"publisher","DOI":"10.5195\/ijt.2017.6231"},{"key":"e_1_3_3_3_97_1","volume-title":"Privacy and data security in E-health: Requirements from the user\u2019s perspective. Health informatics journal 18, 3","author":"Wilkowska Wiktoria","year":"2012","unstructured":"Wiktoria Wilkowska and Martina Ziefle. 2012. Privacy and data security in E-health: Requirements from the user\u2019s perspective. Health informatics journal 18, 3 (2012), 191\u2013201."},{"key":"e_1_3_3_3_98_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocaa067"},{"key":"e_1_3_3_3_99_1","doi-asserted-by":"publisher","DOI":"10.5195\/ijt.2019.6276"}],"event":{"name":"CHI '24: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Proceedings of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642208","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613904.3642208","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:23Z","timestamp":1750290263000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642208"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,11]]},"references-count":98,"alternative-id":["10.1145\/3613904.3642208","10.1145\/3613904"],"URL":"https:\/\/doi.org\/10.1145\/3613904.3642208","relation":{},"subject":[],"published":{"date-parts":[[2024,5,11]]},"assertion":[{"value":"2024-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}