{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T15:10:10Z","timestamp":1755789010441,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T00:00:00Z","timestamp":1717372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,3]]},"DOI":"10.1145\/3656650.3656721","type":"proceedings-article","created":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T18:27:17Z","timestamp":1717180037000},"page":"1-3","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Securing the smart home environment: an experiment on the impact of explainable warnings"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-5446-3228","authenticated-orcid":false,"given":"Angela","family":"Martone","sequence":"first","affiliation":[{"name":"University of Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3481-3360","authenticated-orcid":false,"given":"Federica","family":"Cena","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0049-6213","authenticated-orcid":false,"given":"Cristina","family":"Gena","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8093-5943","authenticated-orcid":false,"given":"Fabiana","family":"Vernero","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Turin, Italy"}]}],"member":"320","published-online":{"date-parts":[[2024,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-34433-6_7"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3222615"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-79840-6_3"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.879813"},{"key":"e_1_3_2_1_5_1","volume-title":"Joint Proceedings of the Workshops, Work in Progress Demos and Doctoral Consortium at the IS-EUD 2023 co-located with the 9th International Symposium on End-User Development (IS-EUD","author":"Cena Federica","year":"2023","unstructured":"Federica Cena, Cristina Gena, Claudio Mattutino, Michele Mioli, and Fabiana Vernero. 2023. From Psychological Traits to Safety Warnings: Three Studies on Recommendations in a Smart Home Environment. In Joint Proceedings of the Workshops, Work in Progress Demos and Doctoral Consortium at the IS-EUD 2023 co-located with the 9th International Symposium on End-User Development (IS-EUD 2023), Cagliari, Italy, June 6-8, 2023(CEUR Workshop Proceedings, Vol.\u00a03408), Andrea Bellucci, Luigi\u00a0De Russis, Paloma D\u00edaz, Anders\u00a0I. M\u00f8rch, Daniela Fogli, and Fabio Patern\u00f2 (Eds.). CEUR-WS.org. https:\/\/ceur-ws.org\/Vol-3408\/short-s4-05.pdf"},{"key":"e_1_3_2_1_6_1","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS","author":"Cobb Camille","year":"2020","unstructured":"Camille Cobb, Milijana Surbatovich, Anna Kawakami, Mahmood Sharif, Lujo Bauer, Anupam Das, and Limin Jia. 2020. How Risky Are Real Users\u2019{ IFTTT} Applets?. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). 505\u2013529."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.12.008"},{"key":"e_1_3_2_1_8_1","volume-title":"Nguyen Van\u00a0Dung, Nguyen\u00a0Hoang Nam, Dong Si\u00a0Thien Chau, and Dang Ngoc\u00a0Minh Duc.","author":"Khoa Tran\u00a0Anh","year":"2020","unstructured":"Tran\u00a0Anh Khoa, Le\u00a0Mai\u00a0Bao Nhu, Hoang\u00a0Hai Son, Nguyen\u00a0Minh Trong, Cao\u00a0Hoang Phuc, Nguyen Thi\u00a0Hoang Phuong, Nguyen Van\u00a0Dung, Nguyen\u00a0Hoang Nam, Dong Si\u00a0Thien Chau, and Dang Ngoc\u00a0Minh Duc. 2020. Designing efficient smart home management with IoT smart lighting: a case study. Wireless communications and mobile computing 2020 (2020), 1\u201318."},{"volume-title":"Active rules in database systems","author":"Paton W","key":"e_1_3_2_1_9_1","unstructured":"Norman\u00a0W Paton. 2012. Active rules in database systems. Springer Science & Business Media."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","unstructured":"Milijana Surbatovich Jassim Aljuraidan Lujo Bauer Anupam Das and Limin Jia. 2017. Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes. In Proceedings of the 26th International Conference on World Wide Web (Perth Australia) (WWW \u201917). International World Wide Web Conferences Steering Committee Republic and Canton of Geneva CHE 1501\u20131510. https:\/\/doi.org\/10.1145\/3038912.3052709","DOI":"10.1145\/3038912.3052709"},{"key":"e_1_3_2_1_11_1","volume-title":"Automation systems in smart buildings: a review. Journal of Ambient Intelligence and Humanized Computing","author":"Vijayan DS","year":"2020","unstructured":"DS Vijayan, A\u00a0Leema Rose, S Arvindan, J Revathy, and C Amuthadevi. 2020. Automation systems in smart buildings: a review. Journal of Ambient Intelligence and Humanized Computing (2020), 1\u201313."}],"event":{"name":"AVI 2024: International Conference on Advanced Visual Interfaces 2024","acronym":"AVI 2024","location":"Arenzano, Genoa Italy"},"container-title":["Proceedings of the 2024 International Conference on Advanced Visual Interfaces"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3656650.3656721","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3656650.3656721","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T14:55:50Z","timestamp":1755788150000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3656650.3656721"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,3]]},"references-count":11,"alternative-id":["10.1145\/3656650.3656721","10.1145\/3656650"],"URL":"https:\/\/doi.org\/10.1145\/3656650.3656721","relation":{},"subject":[],"published":{"date-parts":[[2024,6,3]]},"assertion":[{"value":"2024-06-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}