{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T19:39:55Z","timestamp":1768073995910,"version":"3.49.0"},"reference-count":77,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM J. Comput. Sustain. Soc."],"published-print":{"date-parts":[[2024,12,31]]},"abstract":"<jats:p>\n            The Internet of Things (IoT) has revolutionized the global market with lifestyle products such as fitness trackers (FT), smart home speakers (SHS), and surveillance and security camera systems (SSCS). While offering convenience, these products also introduce potential security and privacy (S&amp;P) risks to buyers, often going unnoticed. Consumers\u2019 incomplete mental models of the risks involved and the information asymmetry between buyers and sellers only add to the problem. Understanding consumer concerns in online product reviews can play a crucial role in bridging the gap of such information asymmetry. By establishing a balanced flow of information between buyers and sellers, manufacturers can leverage genuine concerns expressed in reviews to enhance product features while educating users about misinformation in reviews. In this study, we collected FT, SHS, and SSCS product reviews from three Amazon domains: the US, the UK, and India. Using a keyword-based search method focused on S&amp;P concerns, we discovered a considerable number of reviews expressing notable concerns regarding security and privacy. Our qualitative analysis revealed that\n            <jats:italic>data security<\/jats:italic>\n            is a common concern across all product types. Further, our quantitative analysis exposed significant geographic variations, with the concern ratio being higher in the US than in the UK for all device types and higher than in the Indian domain for security cameras. These findings highlight the need for tailored security measures and user awareness campaigns in different parts of the world to address the identified concerns effectively.\n          <\/jats:p>","DOI":"10.1145\/3685929","type":"journal-article","created":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T10:13:01Z","timestamp":1724753581000},"page":"1-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Unveiling Users\u2019 Security and Privacy Concerns Regarding Smart Home IoT Products from Online Reviews"],"prefix":"10.1145","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-6255-2010","authenticated-orcid":false,"given":"Taufiq Islam","family":"Protick","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2856-8362","authenticated-orcid":false,"given":"Aafaq","family":"Sabir","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6632-5790","authenticated-orcid":false,"given":"Sb","family":"Abhinaya","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0024-127X","authenticated-orcid":false,"given":"Aiden","family":"Bartlett","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8961-9963","authenticated-orcid":false,"given":"Anupam","family":"Das","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,11,28]]},"reference":[{"key":"e_1_3_4_2_2","unstructured":"Eric W. Weisstein. 1954. Fisher\u2019s Exact Test. Retrieved fromhttps:\/\/mathworld.wolfram.com\/FishersExactTest.html"},{"key":"e_1_3_4_3_2","unstructured":"NIST. 1960. Levene Test for Equality of Variances. Retrieved fromhttps:\/\/www.itl.nist.gov\/div898\/handbook\/eda\/section3\/eda35a.htm"},{"key":"e_1_3_4_4_2","unstructured":"Eric W. Weisstein. 1961. Bonferroni Correction. Retrieved fromhttps:\/\/mathworld.wolfram.com\/BonferroniCorrection.html"},{"key":"e_1_3_4_5_2","unstructured":"Business Wire. 2017. Worldwide Wearables Market Grows 7.3% in Q3 2017 as Smart Wearables Rise and Basic Wearables Decline Says IDC. Retrieved fromhttps:\/\/www.businesswire.com\/news\/home\/20171130005146\/en\/Worldwide-Wearables-Market-Grows-7.3-in-Q3-2017-as-Smart-Wearables-Rise-and-Basic-Wearables-Decline-Says-IDC"},{"key":"e_1_3_4_6_2","unstructured":"CCPA. 2018. The California Consumer Privacy Act. Retrieved from https:\/\/theccpa.org\/"},{"key":"e_1_3_4_7_2","volume-title":"Consumer Internet of Things Security Labelling Survey Research Findings","author":"GOV.UK","year":"2019","unstructured":"GOV.UK. 2019. Consumer Internet of Things Security Labelling Survey Research Findings. Retrieved fromhttps:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/950429\/Harris_Interactive_Consumer_IoT_Security_Labelling_Survey_Report_V2.pdf"},{"key":"e_1_3_4_8_2","unstructured":"Betsy Reed. 2021. UK to Overhaul Privacy Rules in Post-Brexit Departure from GDPR.https:\/\/www.theguardian.com\/technology\/2021\/aug\/26\/uk-to-overhaul-privacy-rules-in-post-brexit-departure-from-gdpr"},{"key":"e_1_3_4_9_2","unstructured":"Information Commissioner\u2019s Office. 2022. Guide to the UK General Data Protection Regulation (UK GDPR). Retrieved fromhttps:\/\/ico.org.uk\/for-organisations\/guide-to-data-protection\/guide-to-the-general-data-protection-regulation-gdpr\/"},{"key":"e_1_3_4_10_2","unstructured":"Amazon. 2022. How Does Drop In Work? Retrieved fromhttps:\/\/www.amazon.com\/gp\/help\/customer\/display.html?nodeId=GS3WRTSRKD2U6MCK"},{"key":"e_1_3_4_11_2","unstructured":"IoT Analytics. 2022. State of IoT 2022: Number of Connected IoT Devices Growing 18% to 14.4 Billion Globally. Retrieved from https:\/\/iot-analytics.com\/number-connected-iot-devices\/"},{"key":"e_1_3_4_12_2","unstructured":"Kaspersky. 2023. Do Fitness Trackers Put Your Privacy at Risk? Retrieved fromhttps:\/\/usa.kaspersky.com\/resource-center\/preemptive-safety\/fitness-tracker-privacy"},{"key":"e_1_3_4_13_2","unstructured":"eComEngine. 2023. Global Ratings on Amazon Reviews. Retrieved fromhttps:\/\/www.ecomengine.com\/get-amazon-reviews"},{"key":"e_1_3_4_14_2","unstructured":"R documentation. 2023. prop.test: Test of Equal or Given Proportions. Retrieved fromhttps:\/\/www.rdocumentation.org\/packages\/stats\/versions\/3.6.2\/topics\/prop.test"},{"key":"e_1_3_4_15_2","unstructured":"Wikipedia. 2023. Simple Random Sample. Retrieved fromhttps:\/\/en.wikipedia.org\/wiki\/Simple_random_sample"},{"key":"e_1_3_4_16_2","unstructured":"Alice Anghelea. 2024. Amazon Product Ratings and Average Ranks | What They Hide and How to Improve Them. Retrieved from https:\/\/feedcheck.co\/blog\/amazon-product-ratings-and-average-ranks-what-they-hide-and-how-to-improve-them\/"},{"key":"e_1_3_4_17_2","first-page":"451","volume-title":"15th Symposium on Usable Privacy and Security (SOUPS\u201919)","author":"Abdi Noura","year":"2019","unstructured":"Noura Abdi, Kopo M. Ramokapane, and Jose M. Such. 2019. More than smart speakers: Security and privacy perceptions of smart home personal assistants. In 15th Symposium on Usable Privacy and Security (SOUPS\u201919). 451\u2013466."},{"key":"e_1_3_4_18_2","doi-asserted-by":"publisher","DOI":"10.1111\/jpim.12120"},{"key":"e_1_3_4_19_2","first-page":"1","volume-title":"Conference on Multimedia Privacy and Security","author":"Aktypi Angeliki","year":"2017","unstructured":"Angeliki Aktypi, Jason R. C. Nurse, and Michael Goldsmith. 2017. Unwinding Ariadne\u2019s identity thread: Privacy risks with fitness trackers and online social networks. In Conference on Multimedia Privacy and Security. 1\u201311."},{"issue":"08","key":"e_1_3_4_20_2","article-title":"Comments before the federal communications commission in the matter of sponsorship identification rules and embedded advertising","author":"Alert Commercial","year":"2008","unstructured":"Commercial Alert. 2008. Comments before the federal communications commission in the matter of sponsorship identification rules and embedded advertising. MB Docket 08-90 (2008).https:\/\/docs.fcc.gov\/public\/attachments\/FCC-08-155A1.pdf","journal-title":"MB Docket"},{"key":"e_1_3_4_21_2","volume-title":"All-new Echo Show 8 (3rd Gen, 2023 Release) | With Spatial Audio, Smart Home Hub, and Alexa | Charcoal Brand: Amazon","year":"2024","unstructured":"Amazon. 2024. All-new Echo Show 8 (3rd Gen, 2023 Release) | With Spatial Audio, Smart Home Hub, and Alexa | Charcoal Brand: Amazon. Retrieved fromhttps:\/\/www.amazon.com\/All-New-Echo-Show-8\/dp\/B0BLS3Y632\/"},{"key":"e_1_3_4_22_2","article-title":"Understanding the continuous use of fitness trackers: A thematic analysis","author":"Becker Moritz","year":"2017","unstructured":"Moritz Becker, Andreas Kolbeck, Christian Matt, and Thomas Hess. 2017. Understanding the continuous use of fitness trackers: A thematic analysis. In 21st Pacific-Asia Conference on Information Systems (PACIS\u201917).","journal-title":"21st Pacific-Asia Conference on Information Systems (PACIS\u201917)"},{"key":"e_1_3_4_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3555154"},{"key":"e_1_3_4_24_2","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_4_25_2","doi-asserted-by":"publisher","DOI":"10.1002\/capr.12360"},{"key":"e_1_3_4_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2018.8480184"},{"key":"e_1_3_4_27_2","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.30.2.226"},{"key":"e_1_3_4_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2018.8639448"},{"key":"e_1_3_4_29_2","unstructured":"Kevin Childs Daniel Nolting and Anupam Das. 2023. Heat marks the spot: De-anonymizing users\u2019 geographical data on the Strava heatmap. (2023). https:\/\/anupamdas.org\/paper\/CONPRO2023.pdf"},{"key":"e_1_3_4_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00043"},{"key":"e_1_3_4_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00043"},{"key":"e_1_3_4_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00112"},{"key":"e_1_3_4_33_2","first-page":"1","volume-title":"CHI Conference on Human Factors in Computing Systems","author":"Emami-Naeini Pardis","year":"2019","unstructured":"Pardis Emami-Naeini, Henry Dixon, Yuvraj Agarwal, and Lorrie Faith Cranor. 2019. Exploring how privacy and security factor into IoT device purchase behavior. In CHI Conference on Human Factors in Computing Systems. 1\u201312."},{"key":"e_1_3_4_34_2","doi-asserted-by":"publisher","unstructured":"Pardis Emami-Naeini Henry Dixon Yuvraj Agarwal and Lorrie Faith Cranor. 2019. Exploring how privacy and security factor into IoT device purchase behavior. InCHI Conference on Human Factors in Computing Systems (CHI\u201919). Association for Computing Machinery New York NY USA 1\u201312. DOI:10.1145\/3290605.3300764","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_3_4_35_2","doi-asserted-by":"publisher","DOI":"10.1002\/agr.21653"},{"key":"e_1_3_4_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2017.54"},{"key":"e_1_3_4_37_2","first-page":"1","volume-title":"CHI Conference on Human Factors in Computing Systems","author":"Fruchter Nathaniel","year":"2018","unstructured":"Nathaniel Fruchter and Ilaria Liccardi. 2018. Consumer attitudes towards privacy and security in home assistants. In CHI Conference on Human Factors in Computing Systems. 1\u20136."},{"key":"e_1_3_4_38_2","first-page":"1","volume-title":"CHI Conference on Human Factors in Computing Systems","author":"Gabriele Sandra","year":"2020","unstructured":"Sandra Gabriele and Sonia Chiasson. 2020. Understanding fitness tracker users\u2019 security and privacy knowledge, attitudes and behaviours. In CHI Conference on Human Factors in Computing Systems. 1\u201312."},{"key":"e_1_3_4_39_2","doi-asserted-by":"publisher","DOI":"10.5220\/0010295205580565"},{"key":"e_1_3_4_40_2","first-page":"1","volume-title":"CHI Conference on Human Factors in Computing Systems","author":"Geeng Christine","year":"2019","unstructured":"Christine Geeng and Franziska Roesner. 2019. Who\u2019s in control? Interactions in multi-user smart homes. In CHI Conference on Human Factors in Computing Systems. 1\u201313."},{"key":"e_1_3_4_41_2","first-page":"411","volume-title":"USENIX Security Symposium","author":"Haney Julie M.","year":"2021","unstructured":"Julie M. Haney, Yasemin Acar, and Susanne Furman. 2021. \u201cIt\u2019s the company, the government, you and I\u201d: User perceptions of responsibility for smart home privacy and security. In USENIX Security Symposium. 411\u2013428."},{"key":"e_1_3_4_42_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50309-3_26"},{"key":"e_1_3_4_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833729"},{"key":"e_1_3_4_44_2","volume-title":"Woman Says Her Amazon Device Recorded Private Conversation, Sent It Out to Random Contact","author":"Horcher Gary","year":"2018","unstructured":"Gary Horcher. 2018. Woman Says Her Amazon Device Recorded Private Conversation, Sent It Out to Random Contact. Retrieved fromhttps:\/\/www.kiro7.com\/news\/local\/woman-says-her-amazon-device-recorded-private-conversation-sent-it-out-to-random-contact\/755507974\/"},{"key":"e_1_3_4_45_2","unstructured":"Huafeng Jin and Shuo Wang. 2018. Voice-based Determination of Physical and Emotional Characteristics of Users. US Patent 10 096 319."},{"key":"e_1_3_4_46_2","volume-title":"I Heard a Strange Man Talk to My Daughter in Her Room \u2013 Our Baby Monitor Was Hacked","author":"Klausner Alexandra","year":"2023","unstructured":"Alexandra Klausner. 2023. I Heard a Strange Man Talk to My Daughter in Her Room \u2013 Our Baby Monitor Was Hacked. Retrieved from https:\/\/nypost.com\/2023\/10\/23\/lifestyle\/parents-say-baby-monitor-was-hacked-someone-talked-to-child\/"},{"key":"e_1_3_4_47_2","doi-asserted-by":"publisher","DOI":"10.1080\/10496490903572983"},{"key":"e_1_3_4_48_2","doi-asserted-by":"publisher","DOI":"10.2307\/2529310"},{"key":"e_1_3_4_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"e_1_3_4_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179344"},{"key":"e_1_3_4_51_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60639-2_5"},{"key":"e_1_3_4_52_2","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2018.0801"},{"issue":"4","key":"e_1_3_4_53_2","article-title":"Privacy attitudes of smart speaker users","volume":"2019","author":"Malkin Nathan","year":"2019","unstructured":"Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera, Serge Egelman, and David Wagner. 2019. Privacy attitudes of smart speaker users. Proc. Privac. Enhanc. Technol. 2019, 4 (2019).","journal-title":"Proc. Privac. Enhanc. Technol."},{"key":"e_1_3_4_54_2","first-page":"229","volume-title":"AAAI\/ACM Conference on AI, Ethics, and Society","author":"Manikonda Lydia","year":"2018","unstructured":"Lydia Manikonda, Aditya Deotale, and Subbarao Kambhampati. 2018. What\u2019s up with privacy? User preferences and privacy concerns in intelligent personal assistants. In AAAI\/ACM Conference on AI, Ethics, and Society. 229\u2013235."},{"key":"e_1_3_4_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00021"},{"key":"e_1_3_4_56_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_17"},{"key":"e_1_3_4_57_2","volume-title":"1984","author":"Orwell George","year":"1949","unstructured":"George Orwell. 1949. 1984. Secker & Warburg."},{"key":"e_1_3_4_58_2","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.27.16941"},{"key":"e_1_3_4_59_2","first-page":"240","volume-title":"International Conference on Asian Digital Libraries","author":"Pingo Zablon","year":"2018","unstructured":"Zablon Pingo and Bhuva Narayan. 2018. Users\u2019 responses to privacy issues with the connected information ecologies created by fitness trackers. In International Conference on Asian Digital Libraries. Springer, 240\u2013255."},{"key":"e_1_3_4_60_2","first-page":"920","volume-title":"IEEE Symposium on Security and Privacy (SP\u201919)","author":"Redmiles Elissa M.","year":"2019","unstructured":"Elissa M. Redmiles. 2019. \u201cShould I Worry?\u201d A cross-cultural examination of account security incident response. In IEEE Symposium on Security and Privacy (SP\u201919). 920\u2013934."},{"key":"e_1_3_4_61_2","volume-title":"Who Gets What\u2013and Why: The New Economics of Matchmaking and Market Design","author":"Roth Alvin E.","year":"2016","unstructured":"Alvin E. Roth. 2016. Who Gets What\u2013and Why: The New Economics of Matchmaking and Market Design. Mariner Books\/Houghton Mifflin Harcourt."},{"key":"e_1_3_4_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2019.8923448"},{"key":"e_1_3_4_63_2","volume-title":"15 Top Ecommerce Websites That Are Massively Popular Among Shoppers in 2022","author":"Shahid Sajjad","year":"2022","unstructured":"Sajjad Shahid. 2022. 15 Top Ecommerce Websites That Are Massively Popular Among Shoppers in 2022. Retrieved fromhttps:\/\/www.cloudways.com\/blog\/top-ecommerce-websites\/"},{"key":"e_1_3_4_64_2","article-title":"Watching the watchers: Hacking wireless IP security cameras","author":"Shekyan Sergey","year":"2013","unstructured":"Sergey Shekyan and Artem Hartutyunyan. 2013. Watching the watchers: Hacking wireless IP security cameras. Shape Secur. Qualys Inc (2013).https:\/\/archives.sector.ca\/presentations13\/ARTEM%20-Watching_the_watchers_%20hacking_wireless_IP_security_cameras.pdf","journal-title":"Shape Secur. Qualys Inc"},{"key":"e_1_3_4_65_2","doi-asserted-by":"publisher","DOI":"10.2307\/1882010"},{"key":"e_1_3_4_66_2","volume-title":"Woman Says Her Amazon Device Recorded Private Conversation, Sent It Out to Random Contact","author":"Taylor Adam","year":"2013","unstructured":"Adam Taylor. 2013. Woman Says Her Amazon Device Recorded Private Conversation, Sent It Out to Random Contact. Retrieved fromhttps:\/\/www.businessinsider.com\/foscam-baby-monitor-hack-2013-8"},{"key":"e_1_3_4_67_2","unstructured":"Christian Thorun Max Vetter Lucia A. Reisch and Anne K. Zimmer. 2017. Indicators of consumer protection and empowerment in the digital world: Results and recommendations of a feasibility study. (2017). https:\/\/unctad.org\/system\/files\/non-official-document\/cicplp2017c5_ccChristianThorun_en.pdf"},{"key":"e_1_3_4_68_2","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0009"},{"key":"e_1_3_4_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/3494960"},{"key":"e_1_3_4_70_2","unstructured":"Swaathi Vetrivel Veerle van Harten Carlos H. Ga\u00f1\u00e1n Michel van Eeten and Simon Parkin. 2023. Examining consumer reviews to understand security and privacy issues in the market of smart home devices. (2023).https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/vetrivel"},{"key":"e_1_3_4_71_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78105-1_27"},{"key":"e_1_3_4_72_2","volume-title":"Symposium on Usable Privacy and Security (SOUPS\u201917)","author":"Zeng Eric","year":"2017","unstructured":"Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End user security and privacy concerns with smart homes. In Symposium on Usable Privacy and Security (SOUPS\u201917)."},{"key":"e_1_3_4_73_2","first-page":"65","volume-title":"13th Symposium on Usable Privacy and Security (SOUPS\u201917)","author":"Zeng Eric","year":"2017","unstructured":"Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End user security and privacy concerns with smart homes. In 13th Symposium on Usable Privacy and Security (SOUPS\u201917). USENIX Association, 65\u201380. Retrieved fromhttps:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/zeng"},{"key":"e_1_3_4_74_2","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0028"},{"key":"e_1_3_4_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/3558482.3590175"},{"key":"e_1_3_4_76_2","volume-title":"Network and Distributed System Security Symposium","author":"Zhang Shikun","year":"2023","unstructured":"Shikun Zhang and Norman Sadeh. 2023. Do privacy labels answer users\u2019 privacy questions. In Network and Distributed System Security Symposium."},{"key":"e_1_3_4_77_2","doi-asserted-by":"publisher","DOI":"10.1509\/jm.74.2.133"},{"key":"e_1_3_4_78_2","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1543442"}],"container-title":["ACM Journal on Computing and Sustainable Societies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3685929","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3685929","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:26Z","timestamp":1750295846000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3685929"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,28]]},"references-count":77,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,12,31]]}},"alternative-id":["10.1145\/3685929"],"URL":"https:\/\/doi.org\/10.1145\/3685929","relation":{},"ISSN":["2834-5533"],"issn-type":[{"value":"2834-5533","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,28]]},"assertion":[{"value":"2024-05-23","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-07-13","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}