{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:05:11Z","timestamp":1776092711399,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/"}],"funder":[{"name":"German Research Foundation","award":["390781972"],"award-info":[{"award-number":["390781972"]}]},{"name":"Horst G\u00f6rtz Foundation"},{"name":"German Federal Ministry of Education and Research","award":["SWC 2.0 PrivacyGate 01|S17050"],"award-info":[{"award-number":["SWC 2.0 PrivacyGate 01|S17050"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,11]]},"DOI":"10.1145\/3613904.3642591","type":"proceedings-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:37:41Z","timestamp":1715416661000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Decide Yourself or Delegate - User Preferences Regarding the Autonomy of Personal Privacy Assistants in Private IoT-Equipped Environments"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7129-9642","authenticated-orcid":false,"given":"Karola","family":"Marky","sequence":"first","affiliation":[{"name":"Ruhr University Bochum, Germany and Telecooperation Lab, Technical University of Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0941-595X","authenticated-orcid":false,"given":"Alina","family":"St\u00f6ver","sequence":"additional","affiliation":[{"name":"FAI, Technical University of Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8303-1600","authenticated-orcid":false,"given":"Sarah","family":"Prange","sequence":"additional","affiliation":[{"name":"University of the Bundeswehr Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0631-2462","authenticated-orcid":false,"given":"Kira","family":"Bleck","sequence":"additional","affiliation":[{"name":"Telecooperation Lab, Technical University of Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5085-1837","authenticated-orcid":false,"given":"Paul","family":"Gerber","sequence":"additional","affiliation":[{"name":"FAI, Technical University of Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6873-8146","authenticated-orcid":false,"given":"Verena","family":"Zimmermann","sequence":"additional","affiliation":[{"name":"Department of Humanities, Social and Political Sciences, ETH Z\u00fcrich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9621-6214","authenticated-orcid":false,"given":"Florian","family":"M\u00fcller","sequence":"additional","affiliation":[{"name":"LMU Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8354-2195","authenticated-orcid":false,"given":"Florian","family":"Alt","sequence":"additional","affiliation":[{"name":"University of the Bundeswehr Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4713-5327","authenticated-orcid":false,"given":"Max","family":"M\u00fchlh\u00e4user","sequence":"additional","affiliation":[{"name":"Telecooperation Lab, Technical University of Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"e_1_3_3_3_1_1","volume-title":"Proc. of the Symposium on Usable Privacy and Security(SOUPS \u201919)","author":"Abdi Noura","year":"2019","unstructured":"Noura Abdi, Kopo\u00a0M. Ramokapane, and Jose\u00a0M. Such. 2019. More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants. In Proc. of the Symposium on Usable Privacy and Security(SOUPS \u201919). USENIX Association, Berkeley, CA, USA, 1\u201316."},{"key":"e_1_3_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.77"},{"key":"e_1_3_3_3_3_1","volume-title":"The 22nd International Conference on Autonomous Agents and Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS).","author":"Amoros Marc\u00a0Serramia","year":"2023","unstructured":"Marc\u00a0Serramia Amoros, William Seymour, Natalia Criado, and Michael Luck. 2023. Predicting Privacy Preferences for Smart Devices as Norms. In The 22nd International Conference on Autonomous Agents and Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS)."},{"key":"e_1_3_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214262"},{"key":"e_1_3_3_3_5_1","volume-title":"The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision support systems 49, 2","author":"Bansal Gaurav","year":"2010","unstructured":"Gaurav Bansal, David Gefen, 2010. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision support systems 49, 2 (2010), 138\u2013150."},{"key":"e_1_3_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37157-8_4"},{"key":"e_1_3_3_3_7_1","volume-title":"Privacy in the digital age: a review of information privacy research in information systems. MIS quarterly","author":"B\u00e9langer France","year":"2011","unstructured":"France B\u00e9langer and Robert\u00a0E Crossler. 2011. Privacy in the digital age: a review of information privacy research in information systems. MIS quarterly (2011), 1017\u20131041."},{"key":"e_1_3_3_3_9_1","volume-title":"Statistik: F\u00fcr Sozialwissenschaftler","author":"Bortz J\u00fcrgen","year":"2013","unstructured":"J\u00fcrgen Bortz. 2013. Statistik: F\u00fcr Sozialwissenschaftler. Springer-Verlag."},{"key":"e_1_3_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40617-018-00329-y"},{"key":"e_1_3_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370226"},{"key":"e_1_3_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.3571053"},{"key":"e_1_3_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376389"},{"key":"e_1_3_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165734.1165735"},{"key":"e_1_3_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.1.104"},{"key":"e_1_3_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.181"},{"key":"e_1_3_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858214"},{"key":"e_1_3_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702249"},{"key":"e_1_3_3_3_19_1","volume-title":"Proc. of the Symposium on Usable Privacy and Security(SOUPS \u201917)","author":"Emami-Naeini Pardis","year":"2017","unstructured":"Pardis Emami-Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Cranor, and Norman Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. In Proc. of the Symposium on Usable Privacy and Security(SOUPS \u201917). USENIX Association, 399\u2013412."},{"key":"e_1_3_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_3_3_3_21_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security ({ SOUPS}","author":"Faklaris Cori","year":"2019","unstructured":"Cori Faklaris, Laura\u00a0A Dabbish, and Jason\u00a0I Hong. 2019. A self-report measure of end-user security attitudes (SA-6). In Fifteenth Symposium on Usable Privacy and Security ({ SOUPS} 2019). Usenix, Berkeley, CA, USA."},{"key":"e_1_3_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772727"},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0483(00)00021-9"},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.04.002"},{"key":"e_1_3_3_3_25_1","volume-title":"Proc. of the Workshop on the Human aspects of Smarthome Security and Privacy(WSSP \u201918)","author":"Gerber Nina","year":"2018","unstructured":"Nina Gerber, Benjamin Reinheimer, and Melanie Volkamer. 2018. Home Sweet Home? Investigating Users\u2019 Awareness of Smart Home Privacy Threats. In Proc. of the Workshop on the Human aspects of Smarthome Security and Privacy(WSSP \u201918). USENIX Association, Berkeley, CA, USA."},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308557.3308732"},{"key":"e_1_3_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718918.1718926"},{"key":"e_1_3_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2011.67"},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025799"},{"key":"e_1_3_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_3_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/99"},{"key":"e_1_3_3_3_32_1","first-page":"2017","article-title":"Qualitative Inhaltsanalyse. Methoden, Praxis","volume":"9","author":"Kuckartz Udo","year":"2016","unstructured":"Udo Kuckartz. 2016. Qualitative Inhaltsanalyse. Methoden, Praxis, Computerunterst\u00fctzung (Grundlagentexte Methoden, 3., \u00fcberarbeitete Auflage). Weinheim: Beltz Juventa. Zugriff am 9 (2016), 2017.","journal-title":"Computerunterst\u00fctzung (Grundlagentexte Methoden, 3., \u00fcberarbeitete Auflage). Weinheim: Beltz Juventa. Zugriff am"},{"key":"e_1_3_3_3_33_1","article-title":"A Survey on Internet of Things: Security and Privacy Issues","volume":"90","author":"Kumar Sathish","year":"2014","unstructured":"J.\u00a0Sathish Kumar and Dhiren\u00a0R. Patel. 2014. A Survey on Internet of Things: Security and Privacy Issues. International Journal of Computer Applications 90, 11 (2014).","journal-title":"International Journal of Computer Applications"},{"key":"e_1_3_3_3_34_1","volume-title":"Privacy indexes: a survey of Westin\u2019s studies","author":"Kumaraguru Ponnurangam","unstructured":"Ponnurangam Kumaraguru and Lorrie\u00a0Faith Cranor. 2005. Privacy indexes: a survey of Westin\u2019s studies. Carnegie Mellon University, School of Computer Science."},{"key":"e_1_3_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287054"},{"key":"e_1_3_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45809-3_19"},{"key":"e_1_3_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0304-9"},{"key":"e_1_3_3_3_39_1","volume-title":"10th Symposium On Usable Privacy and Security ({ SOUPS}","author":"Lin Jialiu","year":"2014","unstructured":"Jialiu Lin, Bin Liu, Norman Sadeh, and Jason\u00a0I Hong. 2014. Modeling users\u2019 mobile app privacy preferences: Restoring usability in a sea of permission settings. In 10th Symposium On Usable Privacy and Security ({ SOUPS} 2014). Usenix, Berkeley, CA, USA, 199\u2013212."},{"key":"e_1_3_3_3_40_1","volume-title":"Proc. of the Twelfth Symposium on Usable Privacy and Security(SOUPS). USENIX Association","author":"Liu Bin","year":"2016","unstructured":"Bin Liu, Mads\u00a0Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun\u00a0Aerin Zhang, Norman Sadeh, Yuvraj Agarwal, and Alessandro Acquisti. 2016. Follow my recommendations: A personalized privacy assistant for mobile app permissions. In Proc. of the Twelfth Symposium on Usable Privacy and Security(SOUPS). USENIX Association, Berkeley, CA, USA."},{"key":"e_1_3_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568035"},{"key":"e_1_3_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_3_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0035"},{"key":"e_1_3_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0115)"},{"key":"e_1_3_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428361.3428464"},{"key":"e_1_3_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490632.3490664"},{"key":"e_1_3_3_3_47_1","volume-title":"Proc. of the NordiCHI Nordic conference on Human-computer Interaction(NordiCHI \u201920)","author":"Marky Karola","year":"2020","unstructured":"Karola Marky, Alexandra Voit, Alina St\u00f6ver, Kai Kunze, Svenja Schr\u00f6der, and Max M\u00fchl\u00e4user. 2020. \u201cI don\u2019t know how to protect myself\u201d: Understanding Privacy Perceptions Resulting from the Presence of Bystanders in Smart Environments. In Proc. of the NordiCHI Nordic conference on Human-computer Interaction(NordiCHI \u201920). ACM, New York, USA."},{"key":"e_1_3_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3383016"},{"key":"e_1_3_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025735"},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858168"},{"key":"e_1_3_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.0009"},{"key":"e_1_3_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2014.6890929"},{"key":"e_1_3_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2017.52"},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2628363.2628364"},{"key":"e_1_3_3_3_55_1","volume-title":"Proc. of the 3rd European Workshop on Usable Security(EuroUSEC \u201818)","author":"Raber Frederic","unstructured":"Frederic Raber, David Ziemann, Antonio Krueger, C. Weir, and M. Mazurek. 2018. The \u201cRetailio\u201d Privacy Wizard: Assisting Users with Privacy Settings for Intelligent Retail Stores. In Proc. of the 3rd European Workshop on Usable Security(EuroUSEC \u201818). Internet Society, Reston, VA, USA."},{"key":"e_1_3_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3308458"},{"key":"e_1_3_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466152"},{"key":"e_1_3_3_3_58_1","volume-title":"Society and the adolescent self-image","author":"Rosenberg Morris","unstructured":"Morris Rosenberg. 2015. Society and the adolescent self-image. Princeton University Press, Princeton, NJ, USA."},{"key":"e_1_3_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15538-4_3"},{"key":"e_1_3_3_3_60_1","volume-title":"Usable Specification of Security and Privacy Demands: Matching User Types to Specification Paradigms. Mensch und Computer 2019-Workshopband","author":"Rudolph Manuel\u00a0Polst","year":"2019","unstructured":"Manuel\u00a0Polst Rudolph, Denis Feth, 2019. Usable Specification of Security and Privacy Demands: Matching User Types to Specification Paradigms. Mensch und Computer 2019-Workshopband (2019)."},{"key":"e_1_3_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.11.002"},{"key":"e_1_3_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1177\/0013164495055005017"},{"key":"e_1_3_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376264"},{"key":"e_1_3_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.2307\/249477"},{"key":"e_1_3_3_3_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376585"},{"key":"e_1_3_3_3_66_1","volume-title":"Smart Home Worldwirde. https:\/\/www.statista.com\/outlook\/279\/100\/smart-home\/worldwide (Accessed","year":"2020","unstructured":"Statista. 2019. Smart Home Worldwirde. https:\/\/www.statista.com\/outlook\/279\/100\/smart-home\/worldwide (Accessed January 2020)."},{"key":"e_1_3_3_3_67_1","volume-title":"Proc. of the Fifteenth Symposium on Usable Privacy and Security(SOUPS \u201919)","author":"Tabassum Madiha","year":"2019","unstructured":"Madiha Tabassum, Tomasz Kosinski, and Heather\u00a0Richter Lipford. 2019. I Don\u2019t Own the Data\u201d: End User Perceptions of Smart Home Device Data Practices and Risks. In Proc. of the Fifteenth Symposium on Usable Privacy and Security(SOUPS \u201919). Usenix, Berkeley, CA, USA."},{"key":"e_1_3_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422188"},{"key":"e_1_3_3_3_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502137"},{"key":"e_1_3_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632107"},{"key":"e_1_3_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.5555\/3620237.3620268"},{"key":"e_1_3_3_3_72_1","volume-title":"Privacy and Freedom","author":"Westin Alan","unstructured":"Alan Westin. 1967. Privacy and Freedom. New York: Atheneum."},{"key":"e_1_3_3_3_73_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1978.tb00604.x"},{"key":"e_1_3_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581167"},{"key":"e_1_3_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580909"},{"key":"e_1_3_3_3_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901890"},{"key":"e_1_3_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300428"},{"key":"e_1_3_3_3_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"},{"key":"e_1_3_3_3_79_1","volume-title":"Proc. of the Symposium on Usable Privacy and Security(SOUPS \u201917)","author":"Zeng Eric","year":"2017","unstructured":"Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security & Privacy Concerns with Smart Homes. In Proc. of the Symposium on Usable Privacy and Security(SOUPS \u201917). USENIX Association, Berkeley, CA, USA, 65\u201380."},{"key":"e_1_3_3_3_80_1","doi-asserted-by":"publisher","DOI":"10.4236\/jss.2014.211017"},{"key":"e_1_3_3_3_81_1","volume-title":"European Conference on Artificial Intelligence. IOS Press.","author":"Zhan Nicole","year":"2023","unstructured":"Nicole Zhan, Stefan Sarkadi, and Jose Such. 2023. Privacy-enhanced Personal Assistants based on Dialogues and Case Similarity. In European Conference on Artificial Intelligence. IOS Press."},{"key":"e_1_3_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"key":"e_1_3_3_3_83_1","volume-title":"Mental Models of Smart Homes. In Mensch und Computer 2018-Workshopband","author":"Zimmermann Verena","unstructured":"Verena Zimmermann, Merve Bennighof, Miriam Edel, Oliver Hofmann, Judith Jung, and Melina von Wick. 2018. \u2018Home, Smart Home\u2019\u2013Exploring End Users\u2019 Mental Models of Smart Homes. In Mensch und Computer 2018-Workshopband. Gesellschaft f\u00fcr Informatik e.V., Bonn, Germany, 407\u2013417."},{"key":"e_1_3_3_3_84_1","doi-asserted-by":"publisher","DOI":"10.1515\/icom-2019-0015"}],"event":{"name":"CHI '24: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Proceedings of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642591","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613904.3642591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:10Z","timestamp":1750290250000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642591"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,11]]},"references-count":83,"alternative-id":["10.1145\/3613904.3642591","10.1145\/3613904"],"URL":"https:\/\/doi.org\/10.1145\/3613904.3642591","relation":{},"subject":[],"published":{"date-parts":[[2024,5,11]]},"assertion":[{"value":"2024-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}