{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:08:28Z","timestamp":1776110908711,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":91,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1955228"],"award-info":[{"award-number":["1955228"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,11]]},"DOI":"10.1145\/3613904.3642288","type":"proceedings-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:38:06Z","timestamp":1715416686000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["More than just informed: The importance of consent facets in smart homes"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9326-1135","authenticated-orcid":false,"given":"Yi-Shyuan","family":"Chiang","sequence":"first","affiliation":[{"name":"Computer Science, University of Illinois Urbana-Champaign, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3209-3525","authenticated-orcid":false,"given":"Omar","family":"Khan","sequence":"additional","affiliation":[{"name":"Computer Science, University of Illinois Urbana-Champaign, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1511-4951","authenticated-orcid":false,"given":"Adam","family":"Bates","sequence":"additional","affiliation":[{"name":"Computer Science, University of Illinois Urbana-Champaign, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5349-8250","authenticated-orcid":false,"given":"Camille","family":"Cobb","sequence":"additional","affiliation":[{"name":"Computer Science, University of Illinois Urbana-Champaign, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"e_1_3_3_3_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415187"},{"key":"e_1_3_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502097"},{"key":"e_1_3_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2953740"},{"key":"e_1_3_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581360"},{"key":"e_1_3_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0064"},{"key":"e_1_3_3_3_6_1","unstructured":"Amazon. 2011. Delete Alexa Voice Recordings Automatically. https:\/\/www.amazon.com\/gp\/help\/customer\/display.html?nodeId=G68KUKTXN92WY3C3"},{"key":"e_1_3_3_3_7_1","volume-title":"Digital twin technologies and smart cities","author":"Atlam F","unstructured":"Hany\u00a0F Atlam and Gary\u00a0B Wills. 2020. IoT security, privacy, safety and ethics. In Digital twin technologies and smart cities. Springer, Cham, Switzerland, 123\u2013149."},{"key":"e_1_3_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1027\/1614-2241\/a000014"},{"key":"e_1_3_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2668897"},{"key":"e_1_3_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476087"},{"key":"e_1_3_3_3_11_1","volume-title":"Balancing Power Dynamics in Smart Homes: Nannies\u2019 Perspectives on How Cameras Reflect and Affect Relationships. In Eighteenth Symposium on Usable Privacy and Security (SOUPS","author":"Bernd Julia","year":"2022","unstructured":"Julia Bernd, Ruba Abu-Salma, Junghyun Choy, and Alisa Frik. 2022. Balancing Power Dynamics in Smart Homes: Nannies\u2019 Perspectives on How Cameras Reflect and Affect Relationships. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). USENIX Association, Boston, MA, 687\u2013706."},{"key":"e_1_3_3_3_12_1","volume-title":"Bystanders\u2019 Privacy: The Perspectives of Nannies on Smart Home Surveillance. In 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20)","author":"Bernd Julia","year":"2020","unstructured":"Julia Bernd, Ruba Abu-Salma, and Alisa Frik. 2020. Bystanders\u2019 Privacy: The Perspectives of Nannies on Smart Home Surveillance. In 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20). USENIX Association, \"\"."},{"key":"e_1_3_3_3_13_1","volume-title":"Proceedings of the 2nd Symposium on Applications of Contextual Integrity.","author":"Bernd Julia","year":"2019","unstructured":"Julia Bernd, Alisa Frik, Maritza Johnson, and Nathan Malkin. 2019. Smart Home Bystanders: Further Complexifying a Complex Context. In Proceedings of the 2nd Symposium on Applications of Contextual Integrity."},{"key":"e_1_3_3_3_14_1","volume-title":"locks and lights: Digital Tools of domestic abuse. The New York Times (23","author":"Bowles Nellie","year":"2018","unstructured":"Nellie Bowles. 2018. Thermostats, locks and lights: Digital Tools of domestic abuse. The New York Times (23 Jun 2018). Available at: https:\/\/www.nytimes.com\/2018\/06\/23\/technology\/smart-home-devices-domestic-abuse.html (Accessed: July 16th, 2023)."},{"key":"e_1_3_3_3_15_1","volume-title":"GDPR: Is your consent valid?Business Information Review 37, 1","author":"Breen Stephen","year":"2020","unstructured":"Stephen Breen, Karim Ouazzane, and Preeti Patel. 2020. GDPR: Is your consent valid?Business Information Review 37, 1 (2020), 19\u201324."},{"key":"e_1_3_3_3_16_1","volume-title":"Coefficient kappa: Some uses, misuses, and alternatives. Educational and psychological measurement 41, 3","author":"Brennan L","year":"1981","unstructured":"Robert\u00a0L Brennan and Dale\u00a0J Prediger. 1981. Coefficient kappa: Some uses, misuses, and alternatives. Educational and psychological measurement 41, 3 (1981), 687\u2013699."},{"key":"e_1_3_3_3_17_1","volume-title":"These Smart Home Devices Can Enhance Independence for People With Disabilities and Mobility Needs. Wirecutter (29","author":"Cericola Rachel","year":"2022","unstructured":"Rachel Cericola. 2022. These Smart Home Devices Can Enhance Independence for People With Disabilities and Mobility Needs. Wirecutter (29 Apr 2022). Available at: https:\/\/www.nytimes.com\/wirecutter\/reviews\/best-assistive-smart-home-technology-for-disabled(Accessed: July 16th, 2023)."},{"key":"e_1_3_3_3_18_1","volume-title":"The Best Smart Home Devices to Help Seniors Age in Places. Wirecutter (30","author":"Cericola Rachel","year":"2023","unstructured":"Rachel Cericola. 2023. The Best Smart Home Devices to Help Seniors Age in Places. Wirecutter (30 Mar 2023). Available at: https:\/\/www.nytimes.com\/wirecutter\/reviews\/smart-home-for-seniors\/ (Accessed: July 16th, 2023)."},{"key":"e_1_3_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555769"},{"key":"e_1_3_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0060"},{"key":"e_1_3_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546155.3546640"},{"key":"e_1_3_3_3_22_1","first-page":"19","article-title":"Biometric Information Privacy Act: Statutes, Litigation, and Future","volume":"4","author":"Dong Yang","year":"2021","unstructured":"Yang Dong. 2021. Biometric Information Privacy Act: Statutes, Litigation, and Future. Academic Journal of Humanities & Social Sciences 4, 1 (2021), 19\u201323.","journal-title":"Academic Journal of Humanities & Social Sciences"},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2021.3132398"},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_3_3_3_25_1","unstructured":"eSafety Commissioner. 2023. Consent. https:\/\/www.esafety.gov.au\/key-topics\/staying-safe\/consent."},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451230"},{"key":"e_1_3_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/0038038587021001008"},{"key":"e_1_3_3_3_28_1","unstructured":"Tomas Gecevicius Yaliang Chuang and Jingrui An. 2021. Smart ARbnb: Smart home interface for Airbnb with augmented reality and visible light communication. In Proceedings of the 2021 Workshops on Computer Human Interaction in IoT Applications co-located with the International Conference on Embedded Wireless Systems and Networks (EWSN 2021) and the 13th ACM SIGCHI Symposium on Engineering Interactive Computing Systems(EICS 2021)."},{"key":"e_1_3_3_3_29_1","volume-title":"User Perceptions of Responsibility for Smart Home Privacy and Security. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Haney Julie","year":"2021","unstructured":"Julie Haney, Yasemin Acar, and Susanne Furman. 2021. \u201cIt\u2019s the Company, the Government, You and I\u201d: User Perceptions of Responsibility for Smart Home Privacy and Security. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 411\u2013428."},{"key":"e_1_3_3_3_30_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"He Weijia","year":"2018","unstructured":"Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus D\u00fcrmuth, Earlence Fernandes, and Blase Ur. 2018. Rethinking Access Control and Authentication for the Home Internet of Things(IoT). In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 255\u2013272."},{"key":"e_1_3_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0385-5"},{"key":"e_1_3_3_3_32_1","first-page":"223","article-title":"A Haunted (Smart) House: Smart Home Devices as Tools of Harassment and Abuse","volume":"223","author":"Holmstrand Dana","year":"2022","unstructured":"Dana Holmstrand. 2022. A Haunted (Smart) House: Smart Home Devices as Tools of Harassment and Abuse. Georgiatown Law Technology Review 223, 6 (2022), 223\u2013247.","journal-title":"Georgiatown Law Technology Review"},{"key":"e_1_3_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376529"},{"key":"e_1_3_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445778"},{"key":"e_1_3_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139941"},{"key":"e_1_3_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858465"},{"key":"e_1_3_3_3_37_1","unstructured":"Jason Kelley and Matthew Guariglia. 2022. Ring Reveals They Give Videos to Police Without User Consent or a Warrant. https:\/\/www.eff.org\/deeplinks\/2022\/07\/ring-reveals-they-give-videos-police-without-user-consent-or-warrant."},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445598"},{"key":"e_1_3_3_3_39_1","volume-title":"Analyzing qualitative data with MAXQDA","author":"Kuckartz Udo","unstructured":"Udo Kuckartz and Stefan R\u00e4diker. 2019. Analyzing qualitative data with MAXQDA. Springer, Cham, Switzerland."},{"key":"e_1_3_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"e_1_3_3_3_41_1","unstructured":"Una Lee and Dann Toliver. 2017. Building Consentful Tech. http:\/\/www.consentfultech.io\/wp-content\/uploads\/2019\/10\/Building-Consentful-Tech.pdf."},{"key":"e_1_3_3_3_42_1","volume-title":"California Consumer Privacy Act of","author":"Legislature California\u00a0State","year":"2018","unstructured":"California\u00a0State Legislature. 2018. California Consumer Privacy Act of 2018. In California Civil Code. California State Legislature, Part 4 of Division 3 of the Civil Code."},{"key":"e_1_3_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2017.51010"},{"key":"e_1_3_3_3_44_1","volume-title":"Smart Home Forecast","author":"Lis Jessica","year":"2021","unstructured":"Jessica Lis. 2021. Smart Home Forecast 2021. https:\/\/www.insiderintelligence.com\/content\/smart-home-forecast-2021."},{"key":"e_1_3_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493446"},{"key":"e_1_3_3_3_46_1","volume-title":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. Association for Computing Machinery","author":"Luger Ewa","year":"2014","unstructured":"Ewa Luger and Tom Rodden. 2014. Sustaining consent through agency: a framework for future development. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. Association for Computing Machinery, New York, NY, USA, 659\u2013664."},{"key":"e_1_3_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0037"},{"key":"e_1_3_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.21105\/joss.01541"},{"key":"e_1_3_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0035"},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420164"},{"key":"e_1_3_3_3_51_1","volume-title":"A Bystander\u2019s Dilemma: Participatory Design Study of Privacy Expectations for Smart Home Devices. https:\/\/surface.syr.edu\/honors_capstone\/1085\/","author":"McDonough Oriana","year":"2019","unstructured":"Oriana McDonough. 2019. A Bystander\u2019s Dilemma: Participatory Design Study of Privacy Expectations for Smart Home Devices. https:\/\/surface.syr.edu\/honors_capstone\/1085\/. Syracuse University Honors Program Capstone Projects (May 2019 (2019)."},{"key":"e_1_3_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445114"},{"key":"e_1_3_3_3_53_1","first-page":"897","article-title":"Illinois Biometric Information Privacy Act Litigation in Federal Courts: Evaluating the Standing Doctrine in Privacy Contexts","volume":"65","author":"McMahon Michael","year":"2020","unstructured":"Michael McMahon. 2020. Illinois Biometric Information Privacy Act Litigation in Federal Courts: Evaluating the Standing Doctrine in Privacy Contexts. St. Louis ULJ 65 (2020), 897.","journal-title":"St. Louis ULJ"},{"key":"e_1_3_3_3_54_1","unstructured":"Sayeed Mehrjerdian. 2019. Smart Devices for People With Disabilities. https:\/\/www.iaccess.life\/useful-smart-home-devices-for-people-with-disabilities\/."},{"key":"e_1_3_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449119"},{"key":"e_1_3_3_3_56_1","volume-title":"The Best Smart Home Devices for","author":"Moscaritolo Angela","year":"2022","unstructured":"Angela Moscaritolo. 2022. The Best Smart Home Devices for 2022. https:\/\/www.pcmag.com\/picks\/the-best-smart-home-devices."},{"key":"e_1_3_3_3_57_1","volume-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS","author":"Naeini Pardis\u00a0Emami","year":"2017","unstructured":"Pardis\u00a0Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie\u00a0Faith Cranor, and Norman Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, Santa Clara, CA, 399\u2013412."},{"key":"e_1_3_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376827"},{"key":"e_1_3_3_3_59_1","unstructured":"State of\u00a0California Department\u00a0of Justice. 2023. California Consumer Privacy Act (CCPA). https:\/\/oag.ca.gov\/privacy\/ccpa."},{"key":"e_1_3_3_3_60_1","unstructured":"ACLU of Illinois. 2008. Biometric Information Privacy Act (BIPA). https:\/\/www.aclu-il.org\/en\/campaigns\/biometric-information-privacy-act-bipae."},{"key":"e_1_3_3_3_61_1","unstructured":"Council of\u00a0the European\u00a0Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council. https:\/\/data.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"e_1_3_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipac001"},{"key":"e_1_3_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyy001"},{"key":"e_1_3_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3473856.3473878"},{"key":"e_1_3_3_3_65_1","volume-title":"Best Smart Home Devices of","author":"Priest David","year":"2022","unstructured":"David Priest, Rich Brown, Ry Crist, and Molly Price. 2022. Best Smart Home Devices of 2022. https:\/\/www.cnet.com\/home\/smart-home\/best-smart-home-devices\/."},{"key":"e_1_3_3_3_66_1","volume-title":"R: A language and environment for statistical computing.","author":"Team R Core","year":"2013","unstructured":"R Core Team. 2013. R: A language and environment for statistical computing. (2013)."},{"key":"e_1_3_3_3_67_1","unstructured":"Mark Raymond. 2023. Usage and Buying Trends in Smart Home Devices: GoodFirms Research. https:\/\/www.goodfirms.co\/resources\/buying-smart-home-devices-statistics."},{"key":"e_1_3_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3472307.3484664"},{"key":"e_1_3_3_3_69_1","unstructured":"Ring. 2021. Motion Warning Information. https:\/\/support.ring.com\/hc\/en-us\/articles\/360048674751-Motion-Warning-Information."},{"key":"e_1_3_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1080\/13600869.2016.1189737"},{"key":"e_1_3_3_3_71_1","unstructured":"Rstan. 2023. RStan: the R interface to Stan. https:\/\/mc-stan.org\/users\/interfaces\/rstan."},{"key":"e_1_3_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.75"},{"key":"e_1_3_3_3_73_1","volume-title":"Eleventh Symposium on Usable Privacy and Security (SOUPS","author":"Schaub Florian","year":"2015","unstructured":"Florian Schaub, Rebecca Balebako, Adam\u00a0L Durity, and Lorrie\u00a0Faith Cranor. 2015. A design space for effective privacy notices. In Eleventh Symposium on Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, 1\u201317."},{"key":"e_1_3_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-014-9343-8"},{"key":"e_1_3_3_3_75_1","volume-title":"ICOST 2018, Singapore, Singapore, July 10-12, 2018, Proceedings 16","author":"Singh Deepika","year":"2018","unstructured":"Deepika Singh, Ismini Psychoula, Johannes Kropf, Sten Hanke, and Andreas Holzinger. 2018. Users\u2019 perceptions and attitudes towards smart home technologies. In Smart Homes and Health Telematics, Designing a Better Future: Urban Assisted Living: 16th International Conference, ICOST 2018, Singapore, Singapore, July 10-12, 2018, Proceedings 16. Springer, Springer International Publishing, Cham, 203\u2013214."},{"key":"e_1_3_3_3_76_1","first-page":"370","article-title":"Beyond notice and choice: Privacy, norms, and consent","author":"Sloan H","year":"2014","unstructured":"Robert\u00a0H Sloan and Richard Warner. 2014. Beyond notice and choice: Privacy, norms, and consent. J. High Tech. L. 14 (2014), 370.","journal-title":"J. High Tech."},{"key":"e_1_3_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376585"},{"key":"e_1_3_3_3_78_1","first-page":"52","article-title":"Designing valid and reliable vignette experiments for survey research: A case study on the fair gender income gap","volume":"7","author":"Steiner M","year":"2016","unstructured":"Peter\u00a0M Steiner, Christiane Atzm\u00fcller, and Dan Su. 2016. Designing valid and reliable vignette experiments for survey research: A case study on the fair gender income gap. Journal of Methods and Measurement in the Social Sciences 7, 2 (2016), 52\u201394.","journal-title":"Journal of Methods and Measurement in the Social Sciences"},{"key":"e_1_3_3_3_79_1","volume-title":"Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner Abuse. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Stephenson Sophie","year":"2023","unstructured":"Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, and Rahul Chatterjee. 2023. \u201cIt\u2019s the Equivalent of Feeling Like You\u2019re in Jail\u201d: Lessons from Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner Abuse. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 105\u2013122."},{"key":"e_1_3_3_3_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445107"},{"key":"e_1_3_3_3_81_1","volume-title":"Smart Home Consumer Trends and Shopping Insights","year":"2021","unstructured":"Security.org Team. 2021. Smart Home Consumer Trends and Shopping Insights: 2021. https:\/\/www.security.org\/smart-home\/consumer-shopping-insights\/."},{"key":"e_1_3_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502137"},{"key":"e_1_3_3_3_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354212"},{"key":"e_1_3_3_3_84_1","unstructured":"Kaveh Waddell. 2022. How \u2019Authorized Agents\u2019 Plan to Make It Easier to Delete Your Online Data. https:\/\/www.consumerreports.org\/electronics\/privacy\/authorized-agents-plan-to-make-it-easier-to-delete-your-data-a8655835448\/."},{"key":"e_1_3_3_3_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546719"},{"key":"e_1_3_3_3_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581167"},{"key":"e_1_3_3_3_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300428"},{"key":"e_1_3_3_3_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"},{"key":"e_1_3_3_3_89_1","volume-title":"To What Extent are Consumers Harmed in the Digital Market from the Perspective of the GDPR?International Journal of Multidisciplinary Research and Analysis 4, 8","author":"Younas Ammar","year":"2021","unstructured":"Ammar Younas and Bakhodir\u00a0Tohir ogli Mirzaraimov. 2021. To What Extent are Consumers Harmed in the Digital Market from the Perspective of the GDPR?International Journal of Multidisciplinary Research and Analysis 4, 8 (2021), 1187\u20131192."},{"key":"e_1_3_3_3_90_1","volume-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017","author":"Zeng Eric","year":"2017","unstructured":"Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End user security and privacy concerns with smart homes. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, Santa Clara, CA, 65\u201380. https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/zeng"},{"key":"e_1_3_3_3_91_1","volume-title":"Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Zeng Eric","year":"2019","unstructured":"Eric Zeng and Franziska Roesner. 2019. Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 159\u2013176. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/zeng"}],"event":{"name":"CHI '24: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Proceedings of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642288","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613904.3642288","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:24Z","timestamp":1750290264000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642288"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,11]]},"references-count":91,"alternative-id":["10.1145\/3613904.3642288","10.1145\/3613904"],"URL":"https:\/\/doi.org\/10.1145\/3613904.3642288","relation":{},"subject":[],"published":{"date-parts":[[2024,5,11]]},"assertion":[{"value":"2024-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}