{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:22:57Z","timestamp":1769923377447,"version":"3.49.0"},"reference-count":112,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T00:00:00Z","timestamp":1724284800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2024,8,22]]},"abstract":"<jats:p>Internet of Things applications (IoT) have the potential to derive sensitive user data, necessitating adherence to privacy and data protection laws. However, developers often struggle with privacy issues, resulting in personal data misuse. Despite the proposed Privacy by Design (PbD) approach, criticism arises due to its ambiguity and lack of practical tools for educating software engineers. We introduce Canella, an integrated IoT development ecosystem with privacy-preserving components leveraging End-User Development (EUD) tools Blockly@rduino and Node-RED, to help developers build end-to-end IoT applications that prioritize privacy and comply with regulations. It helps developers integrate privacy during the development process and rapid prototyping phases, offering real-time feedback on privacy concerns. We start by conducting a focus group study to explore the applicability of designing and implementing PbD schemes within different development environments. Based on this, we implemented a proof-of-concept prototype of Canella and evaluated it in controlled lab studies with 18 software developers. The findings reveal that developers using Canella created more privacy-preserving applications, gained a deeper understanding of personal data management, and achieved better privacy compliance. Our results also highlight Canella's role in educating and promoting privacy awareness, enhancing productivity, streamlining privacy implementation, and significantly reducing cognitive load. Overall, developers found Canella and its privacy-preserving components useful, easy to use, and easy to learn, which could potentially improve IoT application privacy. Watch the demo video.<\/jats:p>","DOI":"10.1145\/3678588","type":"journal-article","created":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:36:21Z","timestamp":1725892581000},"page":"1-47","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Empowering IoT Developers with Privacy-Preserving End-User Development Tools"],"prefix":"10.1145","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2313-0356","authenticated-orcid":false,"given":"Atheer","family":"Aljeraisy","sequence":"first","affiliation":[{"name":"Cardiff University, Cardiff, UK and Majmaah University, Majmaah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3597-2646","authenticated-orcid":false,"given":"Omer","family":"Rana","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0190-3346","authenticated-orcid":false,"given":"Charith","family":"Perera","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, UK"}]}],"member":"320","published-online":{"date-parts":[[2024,9,9]]},"reference":[{"key":"e_1_2_2_1_1","volume-title":"Safe.","year":"2013","unstructured":"2013. Opinion of the European Data Protection Supervisor on the Joint Communication of the Commission and of the High Representative of the European Union for Foreign Affairs and Security Policy on a 'Cyber Security Strategy of the European Union: an Open, Safe. (2013). www.edps.europa.eu"},{"key":"e_1_2_2_2_1","unstructured":"2017. Why is IoT talent so hard to find? | CIO Dive. https:\/\/www.ciodive.com\/news\/why-is-iot-talent-so-hard-to-find\/449576\/"},{"key":"e_1_2_2_3_1","unstructured":"2023. Blockly. https:\/\/developers.google.com\/blockly"},{"key":"e_1_2_2_4_1","unstructured":"2023. Blockly@rduino: Create Code with Blocks. https:\/\/create.arduino.cc\/projecthub\/libreduc\/blockly-rduino-create-code-with-blocks-b6d3e4"},{"key":"e_1_2_2_5_1","unstructured":"2023. Calculators | Heart Online. https:\/\/www.heartonline.org.au\/resources\/calculators\/target-heart-rate-calculator"},{"key":"e_1_2_2_6_1","unstructured":"2023. Node-RED. https:\/\/nodered.org\/"},{"key":"e_1_2_2_7_1","unstructured":"2023. Shapiro-Wilks Normality Test. https:\/\/variation.com\/wp-content\/distribution_analyzer_help\/hs141.htm"},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2016.013"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/3ICT51146.2020.9311949"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580880"},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3450965"},{"key":"e_1_2_2_12_1","unstructured":"Atheer Aljeraisy Masoud Barati Omer Reana and Charith Perera. 2020. Exploring the Relationships Between Privacy by Design Schemes And Privacy Laws: A Comparative Analysis. Technical Report June. Cardiff University. 40 pages."},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","unstructured":"Atheer Aljeraisy Omer Rana and Charith Perera. 2023. Canella: Privacy-Aware End-to-End Integrated IoT Development Ecosystem. In 2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops). 279--281. https:\/\/doi.org\/10.1109\/PerComWorkshops56833.2023.10150254","DOI":"10.1109\/PerComWorkshops56833.2023.10150254"},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3441000.3441049"},{"key":"e_1_2_2_15_1","unstructured":"Australian Government. 1988. Australian Privacy Principles --- OAIC. https:\/\/www.oaic.gov.au\/privacy\/australian-privacy-principleshttps:\/\/www.oaic.gov.au\/privacy\/australian-privacy-principles\/"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3022198.3026326"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.70"},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23006"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.11.041"},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111516"},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753402"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102124"},{"key":"e_1_2_2_24_1","volume-title":"The Failure of Fair Information Practice Principles. Consumer Protection in the Age of the 'Information Economy","author":"Cate Fred H","year":"2006","unstructured":"Fred H Cate. 2006. The Failure of Fair Information Practice Principles. Consumer Protection in the Age of the 'Information Economy' (2006), 341--377."},{"key":"e_1_2_2_25_1","first-page":"1","article-title":"Privacy by design: The 7 foundational principles. Information and privacy commissioner of Ontario","volume":"5","author":"Cavoukian Ann","year":"2009","unstructured":"Ann Cavoukian. 2009. Privacy by design: The 7 foundational principles. Information and privacy commissioner of Ontario, Canada 5 (2009), 1--12. https:\/\/iapp.org\/media\/pdf\/resource_center\/pbd_implement_7found_principles.pdf","journal-title":"Canada"},{"key":"e_1_2_2_26_1","volume-title":"Operationalizing Privacy by Design: A Guide to Implementing Strong Privacy Practices. December","author":"Cavoukian Ann","year":"2012","unstructured":"Ann Cavoukian. 2012. Operationalizing Privacy by Design: A Guide to Implementing Strong Privacy Practices. December (2012), 1--72. https:\/\/gpsbydesigncentre.com\/wp-content\/uploads\/2021\/08\/Doc-5-Operationalizing-pbd-guide.pdf"},{"key":"e_1_2_2_27_1","unstructured":"CMS. 2022. GDPR Enforcement Tracker - list of GDPR fines. https:\/\/www.enforcementtracker.com\/"},{"key":"e_1_2_2_28_1","unstructured":"Collaboration. 2015. Privacy patterns org. https:\/\/privacypatterns.org"},{"key":"e_1_2_2_29_1","unstructured":"Collaboration. 2016. privacypatterns.eu - collecting patterns for better privacy. https:\/\/privacypatterns.eu\/#\/?limit=6&offset=0https:\/\/privacypatterns.eu\/"},{"key":"e_1_2_2_30_1","volume-title":"Resolution on Privacy by Design. Icdppc","author":"Data Protection Commission","year":"2010","unstructured":"Data Protection Commissioners, Privacy, and Data Protection and Privacy Commissioners. 2010. Resolution on Privacy by Design. Icdppc (2010), 1--2."},{"key":"e_1_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10506-008-9067-3"},{"key":"e_1_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.2824\/38623"},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","unstructured":"George Danezis Josep Domingo-Ferrer Marit Hansen Jaap-Henk Hoepman Daniel M\u00e9tayer Rodica Tirtea and Stefan Schiffner. 2014. Privacy and Data Protection by Design - from Policy to Engineering. https:\/\/doi.org\/10.2824\/38623","DOI":"10.2824\/38623"},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/64.395352"},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2008.4639087"},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/948496.948514"},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/2159676X.2017.1331501"},{"key":"e_1_2_2_39_1","unstructured":"EDPB. 2021. Binding decision 1\/2021 on the dispute arisen on the draft decision of the Irish Supervisory Authority regarding WhatsApp Ireland under Article 65(1)(a) GDPR. 89 pages. https:\/\/edpb.europa.eu\/our-work-tools\/our-documents\/binding-decision-board-art-65\/binding-decision-12021-dispute-arisen_en"},{"key":"e_1_2_2_40_1","volume-title":"Using Node-RED platform in an industrial environment. Jubileumi Kand\u00f3 Konferencia February","author":"Ferencz Katalin","year":"2020","unstructured":"Katalin Ferencz and Jozsef Domokos. 2020. Using Node-RED platform in an industrial environment. Jubileumi Kand\u00f3 Konferencia February (2020), 13."},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.23"},{"key":"e_1_2_2_42_1","unstructured":"FL. 2009. ARTICLE 29 Data Protection Working Party Working Party on Police and Justice The Future of Privacy Joint contribution to the Consultation of the European Commission on the legal framework for the fundamental right to protection of personal data. Technical Report."},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/IV-2.2019.00018"},{"key":"e_1_2_2_44_1","volume-title":"T O The","author":"From Communication","year":"2014","unstructured":"Communication From, THE Commission, T O The, THE Council, THE European Economic, THE Committee, and O F The. 2014. Towards a thriving data-driven economy. European Commission COM(2014), 442 (2014)."},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.3390\/s150510350"},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"e_1_2_2_47_1","first-page":"3","volume-title":"Conference on Privacy & Data Protection","volume":"14","author":"G\u00fcrses Seda F.","year":"2011","unstructured":"Seda F. G\u00fcrses, Carmela Troncoso, and Claudia D\u00edaz. 2011. Engineering Privacy by Design. In Conference on Privacy & Data Protection, Vol. 14. 25 pages. Issue 3."},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9517-1"},{"key":"e_1_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-4115(08)62386-9"},{"key":"e_1_2_2_50_1","doi-asserted-by":"crossref","unstructured":"Jaap-henk Hoepman. 2014. IFIP AICT 428 - Privacy Design Strategies. (2014) 446--459. https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55415-5{_}38.pdf","DOI":"10.1007\/978-3-642-55415-5_38"},{"key":"e_1_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026586415054"},{"key":"e_1_2_2_52_1","unstructured":"International Organization for Standardization. 2012. ISO\/IEC 27032:2012 Information technology --- Security techniques --- Guidelines for cybersecurity. https:\/\/www.iso.org\/standard\/44375.html"},{"key":"e_1_2_2_53_1","doi-asserted-by":"publisher","unstructured":"Shubham Jain and Janne Lindqvist. 2014. Should I Protect You? Understanding Developers' Behavior to Privacy-Preserving APIs. https:\/\/doi.org\/10.14722\/usec.2014.23045","DOI":"10.14722\/usec.2014.23045"},{"key":"e_1_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837129"},{"key":"e_1_2_2_55_1","volume-title":"In Proceedings of the 32nd International Conference of Data Protection and Privacy Commissioners.","author":"Jerusalem Israel","year":"2010","unstructured":"Israel Jerusalem. 2010. Resolution on Privacy by Design. In In Proceedings of the 32nd International Conference of Data Protection and Privacy Commissioners."},{"key":"e_1_2_2_56_1","volume-title":"Sample size determination and power analysis using the G* Power software. Journal of educational evaluation for health professions 18","author":"Kang Hyun","year":"2021","unstructured":"Hyun Kang. 2021. Sample size determination and power analysis using the G* Power software. Journal of educational evaluation for health professions 18 (2021)."},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","unstructured":"Himmet Karadal and A. Abubakar. 2021. Internet of things skills and needs satisfaction: do generational cohorts' variations matter? Online Information Review ahead-of-print (02 2021). https:\/\/doi.org\/10.1108\/OIR-04-2020-0144","DOI":"10.1108\/OIR-04-2020-0144"},{"key":"e_1_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/InCIT50588.2020.9310934"},{"key":"e_1_2_2_59_1","doi-asserted-by":"publisher","unstructured":"Barbara Kitchenham Tore Dyb\u00e5 and M. Jorgensen. 2004. Evidence-based software engineering. 273- 281. https:\/\/doi.org\/10.1109\/ICSE.2004.1317449","DOI":"10.1109\/ICSE.2004.1317449"},{"key":"e_1_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985712"},{"key":"e_1_2_2_61_1","unstructured":"California State Legislature. 2018. Bill Text - AB-375 Privacy: personal information: businesses. https:\/\/leginfo.legislature.ca.gov\/faces\/billTextClient.xhtml?bill_id=201720180AB375"},{"key":"e_1_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287056"},{"key":"e_1_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432919"},{"key":"e_1_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3478097"},{"key":"e_1_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.3390\/info7030044"},{"key":"e_1_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19204380"},{"key":"e_1_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44208-1_21"},{"key":"e_1_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/TLT.2014.2365027"},{"key":"e_1_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2013.89"},{"key":"e_1_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1057\/jphp.2016.21"},{"key":"e_1_2_2_71_1","volume-title":"The Corsini encyclopedia of psychology","author":"McKnight Patrick E","year":"2010","unstructured":"Patrick E McKnight and Julius Najab. 2010. Mann-Whitney U Test. The Corsini encyclopedia of psychology (2010), 1--1."},{"key":"e_1_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/LARS\/SBR\/WRE51543.2020.9307023"},{"key":"e_1_2_2_73_1","unstructured":"OAIC. 2018. Australian entities and the EU General Data Protection Regulation (GDPR) --- OAIC. https:\/\/www.oaic.gov.au\/privacy\/privacy-guidance-for-organisations-and-government-agencies\/more-guidance\/australian-entities-and-the-european-union-general-data-protection-regulationhttps:\/\/www.oaic.gov.au\/privacy\/guidance-and-advice\/australian-entities-and-the-eu-general-data-protection-regulation\/"},{"key":"e_1_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2013.18"},{"key":"e_1_2_2_75_1","unstructured":"Office of the Privacy Commissioner. 2020. Privacy Act 2020. https:\/\/www.privacy.org.nz\/privacy-act-2020\/privacy-principles\/https:\/\/www.privacy.org.nz\/privacy-act-2020\/privacy-act-2020\/"},{"key":"e_1_2_2_76_1","unstructured":"Office of the Privacy Commissioner Canada. 2019. PIPEDA legislation and related regulations - Office of the Privacy Commissioner of Canada. https:\/\/www.priv.gc.ca\/en\/privacy-topics\/privacy-laws-in-canada\/the-personal-information-protection-and-electronic-documents-act-pipeda\/r_o_p\/"},{"key":"e_1_2_2_77_1","unstructured":"OPC. 2023. Office of the Privacy Commissioner of Canada - Office of the Privacy Commissioner of Canada. https:\/\/priv.gc.ca\/en\/privacy-topics\/privacy-laws-in-canada\/the-personal-information-protection-and-electronic-documents-act-pipeda\/pipeda-compliance-help\/pipeda-interpretation-bulletins\/interpretations_10_sensible\/https:\/\/www.priv.gc.ca\/en\/"},{"key":"e_1_2_2_78_1","doi-asserted-by":"publisher","unstructured":"Paul Otto and Annie Ant\u00f3n. 2007. Addressing Legal Requirements in Requirements Engineering. 5--14. https:\/\/doi.org\/10.1109\/RE.2007.65","DOI":"10.1109\/RE.2007.65"},{"key":"e_1_2_2_79_1","unstructured":"European Parliament and Council of the European Union. 2016. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with regard to the Processing of Personal Data and on the Free Movement of such Data and Repealing Directive 95\/46\/EC (General Data Protection Regulation). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"e_1_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/BLOCKS.2017.8120404"},{"key":"e_1_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2019.06.002"},{"key":"e_1_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.09.061"},{"key":"e_1_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2390034"},{"key":"e_1_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991561.2991566"},{"key":"e_1_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.042313.00197"},{"key":"e_1_2_2_86_1","doi-asserted-by":"publisher","unstructured":"Ravendra Pratap Rana Vishal Sharma and Varsha Agarwal. 2023. An Efficient Technique for Energy Consumption and Network Lifetime by Distributed Data Gathering Method from IoT Nodes. 01--07 pages. https:\/\/doi.org\/10.1109\/indiscon58499.2023.10270115","DOI":"10.1109\/indiscon58499.2023.10270115"},{"key":"e_1_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"e_1_2_2_88_1","volume-title":"January","author":"Rost Martin","year":"2009","unstructured":"Martin Rost and Kirsten Bock. 2011. Privacy by Design and the New Protection Goals. DuD, January November 2009 (2011), 1--9. https:\/\/www.european-privacy-seal.eu\/AppFile\/GetFile\/ca6cdc46-d4dd-477d-9172-48ed5f54a99c"},{"key":"e_1_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.82"},{"key":"e_1_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2015.7247576"},{"key":"e_1_2_2_91_1","volume-title":"Ambient Intelligence - Software and Applications - 12th International Symposium on Ambient Intelligence","author":"Savidis Anthony","unstructured":"Anthony Savidis, Yannis Valsamakis, and Dimitris Linaritis. 2022. Blockly Toolbox for Visual Programming of Smart IoT Automations. In Ambient Intelligence - Software and Applications - 12th International Symposium on Ambient Intelligence, Paulo Novais, Joao Carneiro, and Pablo Chamoso (Eds.). Springer International Publishing, Cham, 93--103."},{"key":"e_1_2_2_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210459.3210484"},{"key":"e_1_2_2_93_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101605"},{"key":"e_1_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3364224"},{"key":"e_1_2_2_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/1743546.1743559"},{"key":"e_1_2_2_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568244"},{"key":"e_1_2_2_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00017"},{"key":"e_1_2_2_98_1","unstructured":"Spanish Data Protection Agency. 2019. A Guide to Privacy by Design. Number october. https:\/\/www.aepd.es\/sites\/default\/files\/2019-12\/guia-privacidad-desde-diseno_en.pdf"},{"key":"e_1_2_2_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.88"},{"key":"e_1_2_2_100_1","volume-title":"Saksham Chitkara, Kevin Ku, Matt Fredrikson, Jason Hong, and Yuvraj Agarwal.","author":"Srivastava Gaurav","year":"2017","unstructured":"Gaurav Srivastava, Kunal Bhuwalka, Swarup Kumar Sahoo, Saksham Chitkara, Kevin Ku, Matt Fredrikson, Jason Hong, and Yuvraj Agarwal. 2017. PrivacyProxy: Leveraging Crowdsourcing and In Situ Traffic Analysis to Detect and Mitigate Information Leakage. (2017). arXiv:1708.06384 http:\/\/arxiv.org\/abs\/1708.06384"},{"key":"e_1_2_2_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2856503"},{"key":"e_1_2_2_102_1","unstructured":"State of California Department of Justice. 2018. California Consumer Privacy Act (CCPA) | State of California - Department of Justice - Office of the Attorney General. https:\/\/oag.ca.gov\/privacy\/ccpa"},{"key":"e_1_2_2_103_1","first-page":"5","article-title":"IOT HELP WANTED: A lack of Internet of Things knowledge-and skills-leaves businesses struggling to recruit talent","volume":"74","author":"Steffee Susan","year":"2017","unstructured":"Susan Steffee. 2017. IOT HELP WANTED: A lack of Internet of Things knowledge-and skills-leaves businesses struggling to recruit talent. Internal Auditor 74, 5 (Oct. 2017), 11+. link.gale.com\/apps\/doc\/A512185039\/AONE?u=googlescholar&sid=bookmark-AONE&xid=464fa250","journal-title":"Internal Auditor"},{"key":"e_1_2_2_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445768"},{"key":"e_1_2_2_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON.2017.7942956"},{"key":"e_1_2_2_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458038"},{"key":"e_1_2_2_107_1","doi-asserted-by":"publisher","DOI":"10.1109\/DS-RT50469.2020.9213544"},{"key":"e_1_2_2_108_1","doi-asserted-by":"publisher","DOI":"10.19153\/cleiej.22.L4"},{"key":"e_1_2_2_109_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40520-020-01545-9"},{"key":"e_1_2_2_110_1","volume-title":"Designing Privacy-by-Design","author":"van Rest Jeroen","unstructured":"Jeroen van Rest, Daniel Boonstra, Maarten Everts, Martin van Rijn, and Ron van Paassen. 2014. Designing Privacy-by-Design. In Privacy Technologies and Policy, Bart Preneel and Demosthenes Ikonomou (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 55--72."},{"key":"e_1_2_2_111_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2019.1705393"},{"key":"e_1_2_2_112_1","doi-asserted-by":"publisher","DOI":"10.1080\/13600869.2014.913874"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678588","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T14:40:39Z","timestamp":1755787239000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678588"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,22]]},"references-count":112,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,8,22]]}},"alternative-id":["10.1145\/3678588"],"URL":"https:\/\/doi.org\/10.1145\/3678588","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,22]]},"assertion":[{"value":"2007-02-20","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2009-06-05","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}