{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T00:05:34Z","timestamp":1773792334057,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2138654, 2138078"],"award-info":[{"award-number":["2138654, 2138078"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3691638","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"2681-2695","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["\"Modern problems require modern solutions\": Community-Developed Techniques for Online Exam Proctoring Evasion"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2191-1332","authenticated-orcid":false,"given":"Lucy","family":"Simko","sequence":"first","affiliation":[{"name":"Barnard College, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0824-8969","authenticated-orcid":false,"given":"Adryana","family":"Hutchinson","sequence":"additional","affiliation":[{"name":"The George Washington University, Washington, DC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8399-4801","authenticated-orcid":false,"given":"Alvin","family":"Isaac","sequence":"additional","affiliation":[{"name":"The George Washington University, Washington, DC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3873-0610","authenticated-orcid":false,"given":"Evan","family":"Fries","sequence":"additional","affiliation":[{"name":"The George Washington University, Washington, DC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7413-7673","authenticated-orcid":false,"given":"Micah","family":"Sherr","sequence":"additional","affiliation":[{"name":"Georgetown University, Washington, DC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3792-2485","authenticated-orcid":false,"given":"Adam J.","family":"Aviv","sequence":"additional","affiliation":[{"name":"The George Washington University, Washington, DC, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. The switch to online exams. https:\/\/sector7.computest.nl\/post\/2021--12- proctorio\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.11648\/j.ijsedu.20160401.11"},{"key":"e_1_3_2_1_3_1","volume-title":"ProctorU confirms data breach after database leaked online. Retrieved","author":"Abrams Lawrence","year":"2023","unstructured":"Lawrence Abrams. 2020. ProctorU confirms data breach after database leaked online. Retrieved December 2, 2023 from https:\/\/www.bleepingcomputer.com\/ news\/security\/proctoru-confirms-data-breach-after-database-leaked-online\/"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833633"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-021-10554-8"},{"key":"e_1_3_2_1_6_1","volume-title":"Social Media Use in 2021: Pew Research Center. Retrieved","author":"Auxier Brooke","year":"2023","unstructured":"Brooke Auxier and Monica Anderson. 2021. Social Media Use in 2021: Pew Research Center. Retrieved July 6, 2023 from https:\/\/www.pewresearch.org\/internet\/2021\/ 04\/07\/social-media-use-in-2021\/"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 32nd USENIX Security Symposium (Sec'23)","author":"Balash David G.","unstructured":"David G. Balash, Rahel A. Fainchtein, Elena Korkes, Miles Grant, Micah Sherr, and Adam J. Aviv. 2023. Educators? Perspectives of Using (or Not Using) Online Exam Proctoring. In Proceedings of the 32nd USENIX Security Symposium (Sec'23)."},{"key":"e_1_3_2_1_8_1","volume-title":"Privacy and Security Perceptions of Online Proctoring Services. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021","author":"Balash David G.","year":"2021","unstructured":"David G. Balash, Dongkun Kim, Darika Shaibekova, Rahel A. Fainchtein, Micah Sherr, and Adam J. Aviv. 2021. Examining the Examiners: Students? Privacy and Security Perceptions of Online Proctoring Services. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). USENIX Association, 633--652. https:\/\/www.usenix.org\/conference\/soups2021\/presentation\/balash"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555154"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445061"},{"key":"e_1_3_2_1_11_1","volume-title":"Conference on fairness, accountability and transparency. PMLR, 77--91","author":"Buolamwini Joy","year":"2018","unstructured":"Joy Buolamwini and Timnit Gebru. 2018. Gender shades: Intersectional accuracy disparities in commercial gender classification. In Conference on fairness, accountability and transparency. PMLR, 77--91."},{"key":"e_1_3_2_1_12_1","volume-title":"Watching the Watchers: Bias and Vulnerability in Remote Proctoring Software. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Burgess Ben","year":"2022","unstructured":"Ben Burgess, Avi Ginsberg, Edward W. Felten, and Shaanan Cohney. 2022. Watching the Watchers: Bias and Vulnerability in Remote Proctoring Software. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 571--588. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/ presentation\/burgess"},{"key":"e_1_3_2_1_13_1","volume-title":"Retrieved","author":"Burke Lilah","year":"2020","unstructured":"Lilah Burke. 2020. Cutting the In-Person Semester Short. Retrieved July 13, 2023 from https:\/\/www.insidehighered.com\/news\/2020\/11\/17\/colleges-end-personinstruction-early-due-covid-19-spread"},{"key":"e_1_3_2_1_14_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS","author":"Busse Karoline","year":"2019","unstructured":"Karoline Busse, Julia Sch\u00e4fer, and Matthew Smith. 2019. Replication: No One Can Hack My Mind Revisiting a Study on Expert and {Non-Expert} Security Practices and Advice. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). 117--136."},{"key":"e_1_3_2_1_15_1","volume-title":"USENIX Symposium on Usable Privacy and Security (SOUPS).","volume":"30","author":"Chaudhry Kazma","year":"2022","unstructured":"Kazma Chaudhry, Ashi Mann, Hala Assal, and Sonia Chiasson. 2022. I didn't even want to turn my head because I was so scared of the prof.?: Student Perceptions of e-Proctoring Software. In USENIX Symposium on Usable Privacy and Security (SOUPS)., Vol. 30."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3617072.3617103"},{"key":"e_1_3_2_1_17_1","unstructured":"Monica Chin. 2021. University will stop using controversial remote-testing software following student outcry. https:\/\/www.theverge.com\/2021\/1\/ 28\/22254631\/university-of-illinois-urbana-champaign-proctorio-online-testproctoring-privacy"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0060"},{"key":"e_1_3_2_1_19_1","volume-title":"Good proctor or 'Big Brother?\" AI Ethics and Online Exam Supervision Technologies. arXiv preprint arXiv:2011.07647","author":"Coghlan Simon","year":"2020","unstructured":"Simon Coghlan, Tim Miller, and Jeannie Paterson. 2020. Good proctor or 'Big Brother?\" AI Ethics and Online Exam Supervision Technologies. arXiv preprint arXiv:2011.07647 (2020)."},{"key":"e_1_3_2_1_20_1","volume-title":"Universities. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021","author":"Cohney Shaanan","year":"2021","unstructured":"Shaanan Cohney, Ross Teixeira, Anne Kohlbrenner, Arvind Narayanan, Mihir Kshirsagar, Yan Shvartzshnaider, and Madelyn Sanfilippo. 2021. Virtual Classrooms and Real Harms: Remote Learning at U.S. Universities. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). USENIX Association. https:\/\/www.usenix.org\/conference\/soups2021\/presentation\/cohney"},{"key":"e_1_3_2_1_21_1","unstructured":"ConductExam. 2024. Create share & analyze exams with the best online exam software. https:\/\/www.conductexam.com."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcal.12651"},{"key":"e_1_3_2_1_23_1","volume-title":"Design justice: Community-led practices to build the worlds we need","author":"Costanza-Chock Sasha","unstructured":"Sasha Costanza-Chock. 2020. Design justice: Community-led practices to build the worlds we need. The MIT Press."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00055"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chbr.2020.100033"},{"key":"e_1_3_2_1_26_1","volume-title":"Jeremy Diaz, Kylen Solvik, Maxwell B Joseph, and Jennifer K Balch.","author":"St Denis Lise Ann","year":"2020","unstructured":"Lise Ann St Denis, Amanda Lee Hughes, Jeremy Diaz, Kylen Solvik, Maxwell B Joseph, and Jennifer K Balch. 2020. ?What I Need to Know is What I Don?t Know!?: Filtering Disaster Twitter Data for Information from Local Individuals.. In ISCRAM. 730--743."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2538862.2538933"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151588.1151608"},{"key":"e_1_3_2_1_29_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS","author":"Dunphy Paul","year":"2015","unstructured":"Paul Dunphy, Vasilis Vlachokyriakos, Anja Thieme, James Nicholson, John McCarthy, and Patrick Olivier. 2015. Social media as a resource for understanding security experiences: a qualitative analysis of # Password tweets. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). 141--150."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1080\/07294360.2019.1680956"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3633070"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359304"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502076"},{"key":"e_1_3_2_1_34_1","volume-title":"Challenges of Online Exam Systems in the COVID-19 Pandemic Era. Measurement Methodologies to Assess the Effectiveness of Global Online Learning","author":"Genis-Gruber Ahu","year":"2022","unstructured":"Ahu Genis-Gruber and Gerold Weisz. 2022. Challenges of Online Exam Systems in the COVID-19 Pandemic Era. Measurement Methodologies to Assess the Effectiveness of Global Online Learning (2022)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/01587919.2021.1910495"},{"key":"e_1_3_2_1_36_1","unstructured":"Drew Harwell. 2020. Mass School Closures in the Wake of the Coronavirus are Driving a New Wave of Student Surveillance. The Washington Post. https:\/\/www.washingtonpost.com\/technology\/2020\/04\/01\/onlineproctoring-college-exams-coronavirus\/."},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the Journal of Privacy Enhancing Technology 4","author":"Hassan Rakibul","year":"2023","unstructured":"Rakibul Hassan. 2023. Understanding the Perception and Awareness of Education Technologies? Privacy and Security Issues. Proceedings of the Journal of Privacy Enhancing Technology 4 (2023)."},{"key":"e_1_3_2_1_38_1","volume-title":"Online Remote Proctoring Software in the Neoliberal Institution: Measurement, Accountability, and Testing Culture. in education","author":"H\u00e9bert Cristyne","year":"2021","unstructured":"Cristyne H\u00e9bert. 2021. Online Remote Proctoring Software in the Neoliberal Institution: Measurement, Accountability, and Testing Culture. in education (2021)."},{"key":"e_1_3_2_1_39_1","unstructured":"Honorlock. 2024. Online Exam Proctoring with a Human Touch. https: \/\/honorlock.com."},{"key":"e_1_3_2_1_40_1","unstructured":"Shawn Hubler. 2020. Keeping Online Testing Honest? Or an Orwellian Overreach? The New York Times. https:\/\/www.nytimes.com\/2020\/05\/10\/us\/online-testingcheating-universities-coronavirus.html."},{"key":"e_1_3_2_1_41_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS","author":"Ion Iulia","year":"2015","unstructured":"Iulia Ion, Rob Reeder, and Sunny Consolvo. 2015. ''No one Can Hack My Mind': Comparing Expert and Non-Expert Security Practices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). 327--346."},{"key":"e_1_3_2_1_42_1","unstructured":"IRIS Invigilation. 2024. Assess with integrity. https:\/\/www.irisinvigilation.com."},{"key":"e_1_3_2_1_43_1","volume-title":"Retrieved","author":"Johnson Khari","year":"2020","unstructured":"Khari Johnson. 2020. ExamSoft's remote bar exam sparks privacy and facial recognition concerns. Retrieved July 10, 2023 from https:\/\/venturebeat.com\/business\/ examsofts-remote-bar-exam-sparks-privacy-and-facial-recognition-concerns\/"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10869-014-9343-z"},{"key":"e_1_3_2_1_45_1","volume-title":"The Menlo report: Ethical principles guiding information and communication technology research. US Department of Homeland Security: Science and Technology","author":"Kenneally Erin","year":"2012","unstructured":"Erin Kenneally and David Dittrich. 2012. The Menlo report: Ethical principles guiding information and communication technology research. US Department of Homeland Security: Science and Technology (2012)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173754"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_3_2_1_48_1","volume-title":"Medical Science Educator","author":"Meulmeester Fleur L.","year":"2021","unstructured":"Fleur L. Meulmeester, Eline A. Dubois, C. (Tineke) Krommenhoek van Es, Peter G. M. de Jong, and Alexandra M J Langers. 2021. Medical Students? Perspectives on Online Proctoring During Remote Digital Progress Test. Medical Science Educator (2021), 1 -- 5."},{"key":"e_1_3_2_1_49_1","volume-title":"Algorithms of oppression","author":"Noble Safiya Umoja","unstructured":"Safiya Umoja Noble. 2018. Algorithms of oppression. In Algorithms of oppression. New York university press."},{"key":"e_1_3_2_1_50_1","volume-title":"Ohio","author":"Ogletree","year":"2022","unstructured":"Ogletree v. Cleveland State Univ. 2022. 1:21-cv-00500 (N.D. Ohio Dec. 20, 2022). https:\/\/casetext.com\/case\/ogletree-v-cleveland-state-univ-2."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcal.12746"},{"key":"e_1_3_2_1_52_1","unstructured":"Anushka Patil and Jonah Engel Bromwich. 2020. How It Feels When Software Watches You Take Tests. The New York Times. https:\/\/www.nytimes.com\/2020\/ 09\/29\/style\/testing-schools-proctorio.html."},{"key":"e_1_3_2_1_53_1","unstructured":"ProctorExam. 2024. Leading online proctoring services. https:\/\/proctorexam.com."},{"key":"e_1_3_2_1_54_1","unstructured":"Proctorio. 2024. A Comprehensive Learning Integrity Platform. https:\/\/proctorio. com."},{"key":"e_1_3_2_1_55_1","unstructured":"ProctorU. 2024. Online Proctoring to Advance your Learning and Testing Program. https:\/\/www.proctoru.com."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581311"},{"key":"e_1_3_2_1_57_1","volume-title":"Where People Meet Potential. https:\/\/www.psionline.com.","author":"Online PSI","year":"2024","unstructured":"PSI Online. 2024. Where People Meet Potential. https:\/\/www.psionline.com."},{"key":"e_1_3_2_1_58_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Redmiles Elissa M","year":"2020","unstructured":"Elissa M Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, and Michelle L Mazurek. 2020. A comprehensive quality evaluation of security and privacy advice on the web. In 29th USENIX Security Symposium (USENIX Security 20). 89--108."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502083"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581559"},{"key":"e_1_3_2_1_61_1","unstructured":"Bruce Schneier. 2008. The Security Mindset. https:\/\/www.schneier.com\/blog\/ archives\/2008\/03\/the_security_mi_1.html"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41570-022-00385-7"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.38"},{"key":"e_1_3_2_1_64_1","volume-title":"Jessica L. Riviere, Alfonso Sintjago, and Carla Vecchiola.","author":"Silverman Sarah Kozel","year":"2021","unstructured":"Sarah Kozel Silverman, Autumm Caines, Christopher Casey, Belen Garcia de Hurtado, Jessica L. Riviere, Alfonso Sintjago, and Carla Vecchiola. 2021. What Happens When You Close the Door on Remote Proctoring? Moving Toward Authentic Assessments with a People-Centered Approach. To Improve the Academy (2021)."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642447"},{"key":"e_1_3_2_1_66_1","volume-title":"Basics of qualitative research","author":"Strauss Anselm","unstructured":"Anselm Strauss and Juliet Corbin. 1990. Basics of qualitative research. Sage publications."},{"key":"e_1_3_2_1_67_1","volume-title":"Experts Say. Retrieved","author":"Swaak Taylor","year":"2023","unstructured":"Taylor Swaak. 2022. A Vulnerability in Proctoring Software Should Worry Colleges, Experts Say. Retrieved December 2, 2023 from https:\/\/www.chronicle.com\/article\/a-vulnerability-in-proctoring-softwareshould-worry-colleges-experts-say"},{"key":"e_1_3_2_1_68_1","volume-title":"Software that Monitors Students During Tests Perpetuates Inequality and Violates their Privacy. MIT Technology Review (August","author":"Swauger Shea","year":"2020","unstructured":"Shea Swauger. 2020. Software that Monitors Students During Tests Perpetuates Inequality and Violates their Privacy. MIT Technology Review (August 2020)."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581181"},{"key":"e_1_3_2_1_70_1","unstructured":"TikTok. September 20 2024. https:\/\/support.tiktok.com\/en\/account-andprivacy\/account-privacy-settings\/stitch."},{"key":"e_1_3_2_1_71_1","unstructured":"Proctor Track. 2024. https:\/\/proctortrack.com\/."},{"key":"e_1_3_2_1_72_1","unstructured":"Proctor Track. July 13 2023. Completing a Proctortrack Room Scan. https:\/\/support.edx.org\/hc\/en-us\/articles\/360044199154-Completing-a-Proctortrack-RoomScan."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_3_2_1_74_1","volume-title":"Society for Information Technology & Teacher Education International Conference. Association for the Advancement of Computing in Education (AACE).","author":"Watson George R","year":"2008","unstructured":"George R Watson and James Sottile. 2008. Cheating in the Digital Age: Do Students Cheat More in Online Courses?. In Society for Information Technology & Teacher Education International Conference. Association for the Advancement of Computing in Education (AACE)."},{"key":"e_1_3_2_1_75_1","volume-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS","author":"Wei Miranda","year":"2022","unstructured":"Miranda Wei, Eric Zeng, Tadayoshi Kohno, and Franziska Roesner. 2022. AntiPrivacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). USENIX Association, Boston, MA, 447--462. https:\/\/www.usenix.org\/conference\/soups2022\/ presentation\/wei"},{"key":"e_1_3_2_1_76_1","article-title":"21st Century Assessment: Online Proctoring, Test Anxiety, and Student Performance","volume":"34","author":"Woldeab Daniel","year":"2019","unstructured":"Daniel Woldeab and Thomas Brothen. 2019. 21st Century Assessment: Online Proctoring, Test Anxiety, and Student Performance. International Journal of E-Learning & Distance Education 34, 1 (2019).","journal-title":"International Journal of E-Learning & Distance Education"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3691638","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3691638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:12:54Z","timestamp":1755843174000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3691638"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":76,"alternative-id":["10.1145\/3658644.3691638","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3691638","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}