{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:06:55Z","timestamp":1776114415718,"version":"3.50.1"},"reference-count":128,"publisher":"Association for Computing Machinery (ACM)","issue":"MHCI","license":[{"start":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T00:00:00Z","timestamp":1727136000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2024,9,24]]},"abstract":"<jats:p>Integrating Artificial Intelligence (AI) into mobile and wearables offers numerous benefits at individual, societal, and environmental levels. Yet, it also spotlights concerns over emerging risks. Traditional assessments of risks and benefits have been sporadic, and often require costly expert analysis. We developed a semi-automatic method that leverages Large Language Models (LLMs) to identify AI uses in mobile and wearables, classify their risks based on the EU AI Act, and determine their benefits that align with globally recognized long-term sustainable development goals; a manual validation of our method by two experts in mobile and wearable technologies, a legal and compliance expert, and a cohort of nine individuals with legal backgrounds who were recruited from Prolific, confirmed its accuracy to be over 85%. We uncovered that specific applications of mobile computing hold significant potential in improving well-being, safety, and social equality. However, these promising uses are linked to risks involving sensitive data, vulnerable groups, and automated decision-making. To avoid rejecting these risky yet impactful mobile and wearable uses, we propose a risk assessment checklist for the Mobile HCI community.<\/jats:p>","DOI":"10.1145\/3676507","type":"journal-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T13:17:48Z","timestamp":1727183868000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Good Intentions, Risky Inventions: A Method for Assessing the Risks and Benefits of AI in Mobile and Wearable Uses"],"prefix":"10.1145","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1454-0641","authenticated-orcid":false,"given":"Marios","family":"Constantinides","sequence":"first","affiliation":[{"name":"Nokia Bell Labs, Cambridge, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8774-2386","authenticated-orcid":false,"given":"Edyta Paulina","family":"Bogucka","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs, Cambridge, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1534-8128","authenticated-orcid":false,"given":"Sanja","family":"Scepanovic","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs, Cambridge, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9461-5804","authenticated-orcid":false,"given":"Daniele","family":"Quercia","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs, Cambridge, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,9,24]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Algorithmic Impact Assessment: AIA Template. https:\/\/www.adalovelaceinstitute.org\/resource\/aia-template\/ Retrieved","author":"Ada Lovelace Institute","year":"2024","unstructured":"Ada Lovelace Institute. 2022. Algorithmic Impact Assessment: AIA Template. https:\/\/www.adalovelaceinstitute.org\/resource\/aia-template\/ Retrieved January 22, 2024 from"},{"key":"e_1_2_1_2_1","volume-title":"Battery-free wireless imaging of underwater environments. Nature communications","author":"Afzal Sayed Saad","year":"2022","unstructured":"Sayed Saad Afzal, Waleed Akbar, Osvy Rodriguez, Mario Doumet, Unsoo Ha, Reza Ghaffarivardavagh, and Fadel Adib. 2022. Battery-free wireless imaging of underwater environments. Nature communications, Vol. 13, 1 (2022), 5546."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1071\/WR13069"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.biocon.2019.07.026"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIS47514.2020.00054"},{"key":"e_1_2_1_6_1","volume-title":"A guide to writing the NeurIPS impact statement","author":"Ashurst Carolyn","year":"2020","unstructured":"Carolyn Ashurst, Markus Anderljung, Carina Prunkl, Jan Leike, Yarin Gal, Toby Shevlane, and Allan Dafoe. 2020. A guide to writing the NeurIPS impact statement. Centre for the Governance of AI. URL: https:\/\/perma. cc\/B5R8--2B9V (2020)."},{"key":"e_1_2_1_7_1","volume-title":"Introduction to prompt engineering. https:\/\/learn.microsoft.com\/en-us\/azure\/ai-services\/openai\/concepts\/prompt-engineering#best-practices Retrieved","author":"Azure Microsoft","year":"2023","unstructured":"Microsoft Azure. 2023. Introduction to prompt engineering. https:\/\/learn.microsoft.com\/en-us\/azure\/ai-services\/openai\/concepts\/prompt-engineering#best-practices Retrieved September 8, 2023 from"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2019.2925338"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2875068"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-020-00002-7"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the 34th International Conference on Neural Information Processing Systems","author":"Tom","unstructured":"Tom B. Brown et al. 2020. Language Models Are Few-Shot Learners. In Proceedings of the 34th International Conference on Neural Information Processing Systems (Vancouver, BC, Canada) (NIPS'20). Curran Associates Inc., Red Hook, NY, USA, Article 159, 25 pages."},{"key":"e_1_2_1_12_1","volume-title":"Hold and sign: A novel behavioral biometrics for smartphone user authentication. In 2016 IEEE security and privacy workshops (SPW)","author":"Buriro Attaullah","unstructured":"Attaullah Buriro, Bruno Crispo, Filippo Delfrari, and Konrad Wrona. 2016. Hold and sign: A novel behavioral biometrics for smartphone user authentication. In 2016 IEEE security and privacy workshops (SPW). IEEE, 276--285."},{"key":"e_1_2_1_13_1","volume-title":"Maurice Jakesch, Marco Tulio Ribeiro, Alexandra Olteanu, and Saleema Amershi.","author":"Bu\u00e7inca Zana","year":"2023","unstructured":"Zana Bu\u00e7inca, Chau Minh Pham, Maurice Jakesch, Marco Tulio Ribeiro, Alexandra Olteanu, and Saleema Amershi. 2023. AHA!: Facilitating AI Impact Assessment by Generating Examples of Harms. arxiv: 2306.03280 [cs.HC]"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3582749"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2732837"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCUBEA.2018.8697481"},{"key":"e_1_2_1_17_1","volume-title":"LLM-empowered Chatbots for Psychiatrist and Patient Simulation: Application and Evaluation. arXiv preprint arXiv:2305.13614","author":"Chen Siyuan","year":"2023","unstructured":"Siyuan Chen, Mengyue Wu, Kenny Q Zhu, Kunyao Lan, Zhiling Zhang, and Lyuchun Cui. 2023. LLM-empowered Chatbots for Psychiatrist and Patient Simulation: Application and Evaluation. arXiv preprint arXiv:2305.13614 (2023). https:\/\/arxiv.org\/abs\/2305.13614"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22186920"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3446382.3448361"},{"key":"e_1_2_1_20_1","volume-title":"Electronics & Mobile Communication Conference (UEMCON). IEEE, 0968--0972","author":"Chowdhury Ushashi","year":"2019","unstructured":"Ushashi Chowdhury, Pranjal Chowdhury, Sourav Paul, Anwesha Sen, Partho Protim Sarkar, Shubhankur Basak, and Abari Bhattacharya. 2019. Multi-sensor wearable for child safety. In 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 0968--0972."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501819"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIITME47687.2019.8990825"},{"key":"e_1_2_1_23_1","unstructured":"European Comission. 2021. Proposal for a Regulation of the European Parliament and of the Council laying down harmonised rules on Artificial Intelligence (Artificial Intelligence Act) and amending certain Union legislative acts. European Comission. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A52021PC0206 Retrieved July 13 2023 from"},{"key":"e_1_2_1_24_1","volume-title":"Amendments adopted by the European Parliament on","author":"Comission European","year":"2023","unstructured":"European Comission. 2023. Amendments adopted by the European Parliament on 14 June 2023 on the proposal for a regulation of the European Parliament and of the Council on laying down harmonised rules on artificial intelligence (Artificial Intelligence Act) and amending certain Union legislative acts. European Comission. https:\/\/www.europarl.europa.eu\/doceo\/document\/TA-9--2023-0236_EN.html Retrieved July 13, 2023 from"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267305.3267536"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2022.3217408"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432234"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2016.2628346"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888437"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2017.23013"},{"key":"e_1_2_1_31_1","unstructured":"Brian Cusack Bryce Antony Gerard Ward and Shaunak Mody. 2017. Assessment of security vulnerabilities in wearable devices. (2017)."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581376"},{"key":"e_1_2_1_33_1","volume-title":"Jos\u00e9 Mar\u00eda Sierra C\u00e1mara, and Sherali Zeadally.","author":"Diez Fidel Paniagua","year":"2019","unstructured":"Fidel Paniagua Diez, Diego Su\u00e1rez Touceda, Jos\u00e9 Mar\u00eda Sierra C\u00e1mara, and Sherali Zeadally. 2019. Lightweight access control system for wearable devices. IT professional, Vol. 21, 1 (2019), 50--58."},{"key":"e_1_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Gokila Dorai Shiva Houshmand and Sudhir Aggarwal. 2020. Data Extraction and Forensic Analysis for Smartphone Paired Wearables and IoT Devices.. In HICSS. 1--10.","DOI":"10.24251\/HICSS.2020.172"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.frl.2023.103662"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--540--79228--4_1"},{"key":"e_1_2_1_37_1","volume-title":"On the origin of hallucinations in conversational models: Is it the datasets or the models? arXiv preprint arXiv:2204.07931","author":"Dziri Nouha","year":"2022","unstructured":"Nouha Dziri, Sivan Milton, Mo Yu, Osmar Zaiane, and Siva Reddy. 2022. On the origin of hallucinations in conversational models: Is it the datasets or the models? arXiv preprint arXiv:2204.07931 (2022). https:\/\/arxiv.org\/abs\/2204.07931"},{"key":"e_1_2_1_38_1","volume-title":"TinyStories: How Small Can Language Models Be and Still Speak Coherent English? arXiv preprint arXiv:2305.07759","author":"Eldan Ronen","year":"2023","unstructured":"Ronen Eldan and Yuanzhi Li. 2023. TinyStories: How Small Can Language Models Be and Still Speak Coherent English? arXiv preprint arXiv:2305.07759 (2023). https:\/\/arxiv.org\/abs\/2305.07759"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3126550"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2010.5626734"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--81907--1_3"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555190"},{"key":"e_1_2_1_43_1","volume-title":"Analysis of security and privacy issues in wearables for minors. Wireless Networks","author":"Fuster Jaime","year":"2023","unstructured":"Jaime Fuster, Sonia Solera-Cotanilla, Jaime P\u00e9rez, Mario Vega-Barbas, Rafael Palacios, Manuel Alvarez-Campana, and Gregorio Lopez. 2023. Analysis of security and privacy issues in wearables for minors. Wireless Networks (2023), 1--17."},{"key":"e_1_2_1_44_1","unstructured":"Craig Gentry. 2009. A fully homomorphic encryption scheme. Stanford university."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2305016120"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10439-023-03272--4"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3594050"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CITS.2017.8035325"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11023-020-09517--8"},{"key":"e_1_2_1_50_1","unstructured":"Noah Yuval Harari. 2021. The world after coronavirus."},{"key":"e_1_2_1_51_1","volume-title":"Privacy leakage in mobile computing: Tools, methods, and characteristics. arXiv preprint arXiv:1410.4978","author":"Haris Muhammad","year":"2014","unstructured":"Muhammad Haris, Hamed Haddadi, and Pan Hui. 2014. Privacy leakage in mobile computing: Tools, methods, and characteristics. arXiv preprint arXiv:1410.4978 (2014)."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1177\/10242589221147228"},{"key":"e_1_2_1_53_1","doi-asserted-by":"crossref","unstructured":"Alexandra Heidel Christian Hagist et al. 2020. Potential benefits and risks resulting from the introduction of health apps and wearables into the German statutory health care system: scoping review. JMIR mHealth and uHealth Vol. 8 9 (2020) e16444.","DOI":"10.2196\/16444"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.21307\/ijssis-2019-057"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11858-016-0758-z"},{"key":"e_1_2_1_56_1","volume-title":"Smart farming: An enhanced pursuit of sustainable remote livestock tracking and geofencing using IoT and GPRS. Wireless communications and mobile computing","author":"Ilyas Qazi Mudassar","year":"2020","unstructured":"Qazi Mudassar Ilyas and Muneer Ahmad. 2020. Smart farming: An enhanced pursuit of sustainable remote livestock tracking and geofencing using IoT and GPRS. Wireless communications and mobile computing, Vol. 2020 (2020), 1--12."},{"key":"e_1_2_1_57_1","volume-title":"Regulatory divergence: costs, risks, impacts. IFAC. https:\/\/www.ifac.org\/_flysystem\/azure-private\/publications\/files\/IFAC-OECD-Regulatory-Divergence.pdf Retrieved","author":"International Federation of Accountants. 2018.","year":"2024","unstructured":"International Federation of Accountants. 2018. Regulatory divergence: costs, risks, impacts. IFAC. https:\/\/www.ifac.org\/_flysystem\/azure-private\/publications\/files\/IFAC-OECD-Regulatory-Divergence.pdf Retrieved April 25, 2024 from"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0088--2"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCSN.2008.4772694"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445866"},{"key":"e_1_2_1_61_1","unstructured":"Heather Kelly. 2014. Fitbit recalls activity tracker due to skin rashes. CNN. https:\/\/edition.cnn.com\/2014\/02\/21\/tech\/gaming-gadgets\/fitbit-force-recall\/"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.3934\/environsci.2022044"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502030"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2015.12.010"},{"key":"e_1_2_1_65_1","volume-title":"An IoT-based smart healthcare system using location-based mesh network and big data analytics. Journal of Ambient Intelligence and Smart Environments Preprint","author":"Lin Hsin-Chang","year":"2022","unstructured":"Hsin-Chang Lin, Ming-Jen Chen, and Jung-Tang Huang. 2022. An IoT-based smart healthcare system using location-based mesh network and big data analytics. Journal of Ambient Intelligence and Smart Environments Preprint (2022), 1--27."},{"key":"e_1_2_1_66_1","volume-title":"Lost in the middle: How language models use long contexts. arXiv preprint arXiv:2307.03172","author":"Liu Nelson F.","year":"2023","unstructured":"Nelson F. Liu, Kevin Lin, John Hewitt, Ashwin Paranjape, Michele Bevilacqua, Fabio Petroni, and Percy Liang. 2023. Lost in the middle: How language models use long contexts. arXiv preprint arXiv:2307.03172 (2023). https:\/\/arxiv.org\/abs\/2307.03172"},{"key":"e_1_2_1_67_1","volume-title":"Sousveillance: Inventing and using wearable computing devices for data collection in surveillance environments. Surveillance & society","author":"Mann Steve","year":"2003","unstructured":"Steve Mann, Jason Nolan, and Barry Wellman. 2003. Sousveillance: Inventing and using wearable computing devices for data collection in surveillance environments. Surveillance & society, Vol. 1, 3 (2003), 331--355."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_2_1_69_1","unstructured":"Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial intelligence and statistics. PMLR 1273--1282. https:\/\/proceedings.mlr.press\/v54\/mcmahan17a\/mcmahan17a.pdf"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2018.00023"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581088"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445935"},{"key":"e_1_2_1_73_1","volume-title":"Microsoft's framework for building AI systems responsibly. https:\/\/blogs.microsoft.com\/on-the-issues\/2022\/06\/21\/microsofts-framework-for-building-ai-systems-responsibly\/ Retrieved","year":"2024","unstructured":"Microsoft. 2022. Microsoft's framework for building AI systems responsibly. https:\/\/blogs.microsoft.com\/on-the-issues\/2022\/06\/21\/microsofts-framework-for-building-ai-systems-responsibly\/ Retrieved January 22, 2024 from"},{"key":"e_1_2_1_74_1","volume-title":"Qualitative Data Analysis: A Methods Sourcebook","author":"Miles Matthew","unstructured":"Matthew Miles and Michael Huberman. 1994. Qualitative Data Analysis: A Methods Sourcebook. Sage."},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2016.08.003"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328908"},{"key":"e_1_2_1_77_1","volume-title":"https:\/\/miro.com\/ Retrieved","author":"Online Miro","year":"2022","unstructured":"Miro. 2022. Miro | Online Whiteboard for Visual Collaboration. https:\/\/miro.com\/ Retrieved August 2022 from"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287596"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951716679679"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejrs.2021.08.007"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-020-00014--3"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsif.2015.0676"},{"key":"e_1_2_1_83_1","volume-title":"https:\/\/www.nist.gov\/itl\/ai-risk-management-framework Retrieved","author":"National Institute of Standards and Technology. 2023..","year":"2023","unstructured":"National Institute of Standards and Technology. 2023.. https:\/\/www.nist.gov\/itl\/ai-risk-management-framework Retrieved May 2023 from"},{"key":"e_1_2_1_84_1","volume-title":"The EqualAI Algorithmic Impact Assessment Tool. https:\/\/www.equalai.org\/aia\/ Retrieved","author":"National Institute of Standards and Technology. 2023.","year":"2024","unstructured":"National Institute of Standards and Technology. 2023. The EqualAI Algorithmic Impact Assessment Tool. https:\/\/www.equalai.org\/aia\/ Retrieved January 2024 from"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbsr.2016.11.004"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2018.06.002"},{"key":"e_1_2_1_87_1","volume-title":"Maryam Nooman AlMallahi, Yong Chai Tan, Montaser Mahmoud, Hadi Jaber, and Mohamad Ramadan.","author":"Obaideen Khaled","year":"2022","unstructured":"Khaled Obaideen, Bashria AA Yousef, Maryam Nooman AlMallahi, Yong Chai Tan, Montaser Mahmoud, Hadi Jaber, and Mohamad Ramadan. 2022. An overview of smart irrigation systems using IoT. Energy Nexus (2022), 100124."},{"key":"e_1_2_1_88_1","volume-title":"Responsible AI Research Needs Impact Statements Too. arXiv preprint arXiv:2311.11776","author":"Olteanu Alexandra","year":"2023","unstructured":"Alexandra Olteanu, Michael Ekstrand, Carlos Castillo, and Jina Suh. 2023. Responsible AI Research Needs Impact Statements Too. arXiv preprint arXiv:2311.11776 (2023)."},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4308687"},{"key":"e_1_2_1_90_1","volume-title":"Research on GPT-4 - latest updates. https:\/\/openai.com\/research\/gpt-4 Retrieved","author":"AI.","year":"2023","unstructured":"OpenAI. 2023. Research on GPT-4 - latest updates. https:\/\/openai.com\/research\/gpt-4 Retrieved August 7, 2023 from"},{"key":"e_1_2_1_91_1","first-page":"1","article-title":"Social dimensions impact individual sleep quantity and quality","volume":"13","author":"Park Sungkyu","year":"2023","unstructured":"Sungkyu Park, Assem Zhunis, Marios Constantinides, Luca Maria Aiello, Daniele Quercia, and Meeyoung Cha. 2023. Social dimensions impact individual sleep quantity and quality. Scientific Reports, Vol. 13, 1 (2023), 1--11.","journal-title":"Scientific Reports"},{"key":"e_1_2_1_92_1","volume-title":"Emma AD Clifton, and Cecilia Mascolo","author":"Perez-Pozuelo Ignacio","year":"2021","unstructured":"Ignacio Perez-Pozuelo, Dimitris Spathis, Emma AD Clifton, and Cecilia Mascolo. 2021. Wearables, smartphones, and artificial intelligence for digital phenotyping and health. In Digital Health. Elsevier, 33--54."},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1177\/0022242920953847"},{"key":"e_1_2_1_94_1","volume-title":"Majority rule versus consensus: the political thought of John C. Calhoun","author":"Read James H","unstructured":"James H Read. 2009. Majority rule versus consensus: the political thought of John C. Calhoun. University Press of Kansas."},{"key":"e_1_2_1_95_1","volume-title":"Ricardo Tapiador-Morales, Manuel Dominguez-Morales, Angel Jimenez-Fernandez, and Alejandro Linares-Barranco.","author":"Rios-Navarro Antonio","year":"2016","unstructured":"Antonio Rios-Navarro, Juan Pedro Dominguez-Morales, Ricardo Tapiador-Morales, Manuel Dominguez-Morales, Angel Jimenez-Fernandez, and Alejandro Linares-Barranco. 2016. A sensor fusion horse gait classification by a spiking neural network on SpiNNaker. In Artificial Neural Networks and Machine Learning--ICANN 2016: 25th International Conference on Artificial Neural Networks, Barcelona, Spain, September 6--9, 2016, Proceedings, Part I 25. Springer, 36--44."},{"key":"e_1_2_1_96_1","volume-title":"Emerging technologies for monitoring plant health in vivo. ACS omega","author":"Roper Jenna M","year":"2021","unstructured":"Jenna M Roper, Jose F Garcia, and Hideaki Tsutsui. 2021. Emerging technologies for monitoring plant health in vivo. ACS omega, Vol. 6, 8 (2021), 5101--5107."},{"key":"e_1_2_1_97_1","volume-title":"The Coding Manual for Qualitative Researchers","author":"Johnny Salda","unstructured":"Johnny Salda na. 2015. The Coding Manual for Qualitative Researchers. Sage."},{"key":"e_1_2_1_98_1","volume-title":"Proceedings ELMAR-2012","author":"Saraceni Simone","year":"2012","unstructured":"Simone Saraceni, Andrea Claudi, and Aldo Franco Dragoni. 2012. An active monitoring system for real-time face-tracking based on mobile sensors. In Proceedings ELMAR-2012. IEEE, 53--56."},{"key":"e_1_2_1_99_1","volume-title":"Sudeep Tanwar, Gulshan Sharma, Pitshou N Bokoro, and Ravi Sharma.","author":"Saraswat Deepti","year":"2022","unstructured":"Deepti Saraswat, Pronaya Bhattacharya, Ashwin Verma, Vivek Kumar Prasad, Sudeep Tanwar, Gulshan Sharma, Pitshou N Bokoro, and Ravi Sharma. 2022. Explainable AI for healthcare 5.0: opportunities and challenges. IEEE Access (2022)."},{"key":"e_1_2_1_100_1","volume-title":"Prompt Engineering Guide. DAIR.AI. https:\/\/github.com\/dair-ai\/Prompt-Engineering-Guide Retrieved","author":"Saravia Elvis","year":"2023","unstructured":"Elvis Saravia. 2022. Prompt Engineering Guide. DAIR.AI. https:\/\/github.com\/dair-ai\/Prompt-Engineering-Guide Retrieved August 7, 2023 from"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359178"},{"key":"e_1_2_1_102_1","doi-asserted-by":"crossref","unstructured":"Karl Schriewer and Grzegorz Bulaj. 2016. Music streaming services as adjunct therapies for depression anxiety and bipolar symptoms: convergence of digital technologies mobile apps emotions and global mental health. Frontiers in public health Vol. 4 (2016) 217.","DOI":"10.3389\/fpubh.2016.00217"},{"key":"e_1_2_1_103_1","volume-title":"Wearable sensors for COVID-19: a call to action to harness our digital infrastructure for remote patient monitoring and virtual assessments. Frontiers in Digital Health","author":"Seshadri Dhruv R","year":"2020","unstructured":"Dhruv R Seshadri, Evan V Davies, Ethan R Harlow, Jeffrey J Hsu, Shanina C Knighton, Timothy A Walker, James E Voos, and Colin K Drummond. 2020. Wearable sensors for COVID-19: a call to action to harness our digital infrastructure for remote patient monitoring and virtual assessments. Frontiers in Digital Health (2020), 8."},{"key":"e_1_2_1_104_1","volume-title":"David Wadden, Khendra G. Lucas, Adam S Miner, Theresa Nguyen, and Tim Althoff.","author":"Sharma Ashish","year":"2023","unstructured":"Ashish Sharma, Kevin Rushton, Inna Wanyin Lin, David Wadden, Khendra G. Lucas, Adam S Miner, Theresa Nguyen, and Tim Althoff. 2023. Cognitive Reframing of Negative Thoughts through Human-Language Model Interaction. arXiv preprint arXiv:2305.02466 (2023). https:\/\/arxiv.org\/abs\/2305.02466"},{"key":"e_1_2_1_105_1","volume-title":"Eisenberg","author":"Sherman Eli","year":"2023","unstructured":"Eli Sherman and Ian W. Eisenberg. 2023. AI Risk Profiles: A Standards Proposal for Pre-Deployment AI Risk Disclosures. arxiv: 2309.13176 [cs.AI]"},{"key":"e_1_2_1_106_1","volume-title":"Best practices for prompt engineering with OpenAI API. OpenAI. https:\/\/help.openai.com\/en\/articles\/6654000-best-practices-for-prompt-engineering-with-openai-api Retrieved","author":"Shieh Jessica","year":"2023","unstructured":"Jessica Shieh. 2023. Best practices for prompt engineering with OpenAI API. OpenAI. https:\/\/help.openai.com\/en\/articles\/6654000-best-practices-for-prompt-engineering-with-openai-api Retrieved August 7, 2023 from"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMc2029240"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1666\/0094-8373(2001)027<0254:GLRRAM>2.0.CO;2"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1109\/INOCON50539.2020.9298449"},{"key":"e_1_2_1_110_1","volume-title":"Human-Centered Responsible Artificial Intelligence: Current & Future Trends. In Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems. 1--4.","author":"Tahaei Mohammad","year":"2023","unstructured":"Mohammad Tahaei, Marios Constantinides, Daniele Quercia, Sean Kennedy, Michael Muller, Simone Stumpf, Q Vera Liao, Ricardo Baeza-Yates, Lora Aroyo, Jess Holbrook, et al. 2023. Human-Centered Responsible Artificial Intelligence: Current & Future Trends. In Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems. 1--4."},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517732"},{"key":"e_1_2_1_112_1","volume-title":"New dimensions and new tools to realize the potential of RDoC: digital phenotyping via smartphones and connected devices. Translational psychiatry","author":"Torous John","year":"2017","unstructured":"John Torous, JP Onnela, and Matcheri Keshavan. 2017. New dimensions and new tools to realize the potential of RDoC: digital phenotyping via smartphones and connected devices. Translational psychiatry, Vol. 7, 3 (2017), e1053--e1053."},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/INCET49848.2020.9154110"},{"key":"e_1_2_1_114_1","volume-title":"Department of Economic and Social Affairs Sustainable Development","author":"United Nations","year":"2023","unstructured":"United Nations: Department of Economic and Social Affairs Sustainable Development. 2023. The 17 Goals. https:\/\/sdgs.un.org\/goals Retrieved November 8, 2023 from"},{"key":"e_1_2_1_115_1","volume-title":"Ngiam Li Lian, ET Lim, Zijian Zhu, and Mingjiang Yang.","author":"Venkateswarlu Ronda","year":"2006","unstructured":"Ronda Venkateswarlu, Choo Hui Wei, Ngiam Li Lian, ET Lim, Zijian Zhu, and Mingjiang Yang. 2006. Wearable high-tech gear for homeland security personnel. In Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense V, Vol. 6201. SPIE, 382--391."},{"key":"e_1_2_1_116_1","volume-title":"Sandro Cornali, Roberto Reggiani, Edoardo Marchetti, Nicola Copped\u00e8, Stefano Caselli, et al.","author":"Vurro Filippo","year":"2023","unstructured":"Filippo Vurro, Riccardo Manfredi, Manuele Bettelli, Gionata Bocci, Alberto Luigi Cologni, Sandro Cornali, Roberto Reggiani, Edoardo Marchetti, Nicola Copped\u00e8, Stefano Caselli, et al. 2023. In vivo sensing to monitor tomato plants in field conditions and optimize crop water management. Precision Agriculture (2023), 1--21."},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1890\/13-1971.1"},{"key":"e_1_2_1_118_1","volume-title":"Bin Wang, and C.-C. Jay Kuo.","author":"Wei Chen","year":"2023","unstructured":"Chen Wei, Yun Cheng Wang, Bin Wang, and C.-C. Jay Kuo. 2023. An Overview on Language Models: Recent Developments and Outlook. ArXiv, Vol. abs\/2303.05759 (2023). https:\/\/api.semanticscholar.org\/CorpusID:257482688"},{"key":"e_1_2_1_119_1","volume-title":"The International Conference on Learning Representations (ICLR)","author":"Wei Jason","year":"2022","unstructured":"Jason Wei, Maarten Bosma, Vincent Y. Zhao, Kelvin Guu, Adams Wei Yu, Brian Lester, Nan Du, Andrew M. Dai, and Quoc V. Le. 2022. Finetuned language models are zero-shot learners. The International Conference on Learning Representations (ICLR) (2022)."},{"key":"e_1_2_1_120_1","volume-title":"Oh (Eds.)","volume":"35","author":"Wei Jason","year":"2022","unstructured":"Jason Wei, Xuezhi Wang, Dale Schuurmans, Maarten Bosma, Brian Ichter, Fei Xia, Ed Chi, Quoc V. Le, and Denny Zhou. 2022. Chain-of-Thought Prompting Elicits Reasoning in Large Language Models. In Advances in Neural Information Processing Systems, S. Koyejo, S. Mohamed, A. Agarwal, D. Belgrave, K. Cho, and A. Oh (Eds.), Vol. 35. Curran Associates, Inc., 24824--24837. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2022\/file\/9d5609613524ecf4f15af0f7b31abca4-Paper-Conference.pdf"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1654"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517582"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.54517\/wt.v2i1.1656"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2855719"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229316.3229327"},{"key":"e_1_2_1_126_1","volume-title":"LLM-FuncMapper: Function Identification for Interpreting Complex Clauses in Building Codes via LLM. arXiv preprint arXiv:2308.08728","author":"Zheng Zhe","year":"2023","unstructured":"Zhe Zheng, Ke-Yin Chen, Xin-Yu Cao, Xin-Zheng Lu, and Jia-Rui Lin. 2023. LLM-FuncMapper: Function Identification for Interpreting Complex Clauses in Building Codes via LLM. arXiv preprint arXiv:2308.08728 (2023)."},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v17i1.22202"},{"key":"e_1_2_1_128_1","volume-title":"Social Theory Re-Wired","author":"Zuboff Shoshana","unstructured":"Shoshana Zuboff. 2023. The age of surveillance capitalism. In Social Theory Re-Wired. Routledge, 203--213."}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676507","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3676507","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:13:48Z","timestamp":1755882828000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676507"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,24]]},"references-count":128,"journal-issue":{"issue":"MHCI","published-print":{"date-parts":[[2024,9,24]]}},"alternative-id":["10.1145\/3676507"],"URL":"https:\/\/doi.org\/10.1145\/3676507","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,24]]},"assertion":[{"value":"2024-09-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}