{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:12:07Z","timestamp":1776111127464,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":123,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ethical Web and Data Architecture In the Age of AI","award":["EWADA"],"award-info":[{"award-number":["EWADA"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3713494","type":"proceedings-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T05:30:26Z","timestamp":1745472626000},"page":"1-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["FamiData Hub: A Speculative Design Exploration with Families on Smart Home Datafication"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4656-2175","authenticated-orcid":false,"given":"Ge","family":"Wang","sequence":"first","affiliation":[{"name":"Institute for Human-Centered Artificial Intelligence (HAI), Stanford University, Stanford, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6935-9028","authenticated-orcid":false,"given":"Jun","family":"Zhao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Oxford, Oxford, Oxfordshire, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3873-6366","authenticated-orcid":false,"given":"Max","family":"Van Kleek","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Oxford, Oxford, Oxfordshire, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6301-3536","authenticated-orcid":false,"given":"Roy","family":"Pea","sequence":"additional","affiliation":[{"name":"Graduate School of Education, Stanford University, Stanford, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5085-9724","authenticated-orcid":false,"given":"Nigel","family":"Shadbolt","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Oxford, Oxford, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"2017. German parents told to destroy Cayla dolls over hacking fears. https:\/\/www.bbc.co.uk\/news\/world-europe-39002142"},{"key":"e_1_3_3_2_3_2","unstructured":"2023. Amazon to pay 25m over child privacy violations. https:\/\/www.bbc.co.uk\/news\/technology-65772154"},{"key":"e_1_3_3_2_4_2","unstructured":"2023. Children\u2019s Online Privacy Protection Rule. https:\/\/www.ftc.gov\/legal-library\/browse\/rules\/childrens-online-privacy-protection-rule-coppa"},{"key":"e_1_3_3_2_5_2","unstructured":"2023. Complete guide to GDPR compliance. https:\/\/gdpr.eu\/"},{"key":"e_1_3_3_2_6_2","unstructured":"2023. Playful by Design Toolkit. https:\/\/digitalfuturescommission.org.uk\/playful-by-design-toolkit\/"},{"key":"e_1_3_3_2_7_2","unstructured":"2024. 23 Eye-Opening Smart Home Statistics to Know in 2024. https:\/\/techjury.net\/blog\/smart-home-statistics\/"},{"key":"e_1_3_3_2_8_2","unstructured":"2024. The Friends Apartments 10292 (retired product). https:\/\/www.lego.com\/en-us\/product\/the-friends-apartments-10292"},{"key":"e_1_3_3_2_9_2","unstructured":"2024. Let your child use Google Assistant on your devices. https:\/\/support.google.com\/families\/answer\/9071584"},{"key":"e_1_3_3_2_10_2","unstructured":"2024. Smart home technology is changing life for British families. https:\/\/www.telegraph.co.uk\/technology\/smart-life\/smart-home-technology-changes-family-life\/"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580984"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"crossref","unstructured":"James Auger. 2013. Speculative design: crafting the speculation. Digital Creativity 24 1 (2013) 11\u201335.","DOI":"10.1080\/14626268.2013.767276"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3311927.3323133"},{"key":"e_1_3_3_2_14_2","unstructured":"Zhen Bai Frances Judd Naomi Polinsky and Elmira Yadollahi. 2023. Participatory Design of AI with Children: Reflections on IDC Design Challenge. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2304.09091 (2023)."},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466451"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/2317956.2318001"},{"key":"e_1_3_3_2_17_2","unstructured":"Graham Barton and Alison James. 2017. Threshold Concepts LEGO\u00ae SERIOUS PLAY\u00ae and whole systems thinking: towards a combined methodology. Practice and Evidence of the Scholarship of Teaching and Learning in Higher Education 12 2 (2017) 249\u2013271."},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"Patrick Bateson and Daniel Nettle. 2014. Playfulness ideas and creativity: A survey. Creativity Research Journal 26 2 (2014) 219\u2013222.","DOI":"10.1080\/10400419.2014.901091"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"crossref","unstructured":"Tilde Bekker Saskia Bakker Iris Douma Janneke Van Der\u00a0Poel and Koen Scheltenaar. 2015. Teaching children digital literacy through design-based learning with digital toolkits in schools. International Journal of Child-Computer Interaction 5 (2015) 29\u201338.","DOI":"10.1016\/j.ijcci.2015.12.001"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376495"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376495"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3 2 (2006) 77\u2013101.","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/143457.143476"},{"key":"e_1_3_3_2_24_2","unstructured":"Ingrid Burkett. 2012. An introduction to co-design. Sydney: Knode 12 (2012)."},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3636290"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3628516.3655803"},{"key":"e_1_3_3_2_27_2","first-page":"1","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems","author":"Chen John","year":"2024","unstructured":"John Chen, Lexie Zhao, Yinmiao Li, Zhennian Xie, Uri Wilensky, and Mike Horn. 2024. \u201cOh My God! It\u2019s Recreating Our Room!\u201d Understanding Children\u2019s Experiences with A Room-Scale Augmented Reality Authoring Toolkit. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1\u201317."},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"crossref","unstructured":"Sudhir Chitnis Neha Deshpande and Arvind Shaligram. 2016. An investigative study for smart home security: Issues challenges and countermeasures. Wireless Sensor Network 8 4 (2016) 61\u201368.","DOI":"10.4236\/wsn.2016.84006"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3643834.3661526"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"crossref","unstructured":"Stephen Dann. 2018. Facilitating co-creation experience in the classroom with Lego Serious Play. Australasian Marketing Journal 26 2 (2018) 121\u2013131.","DOI":"10.1016\/j.ausmj.2018.05.013"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"crossref","unstructured":"Karl de Fine\u00a0Licht and Jenny de Fine\u00a0Licht. 2020. Artificial intelligence transparency and public decision-making: Why explanations are key when trying to produce perceived legitimacy. AI & society 35 (2020) 917\u2013926.","DOI":"10.1007\/s00146-020-00960-w"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3628516.3655788"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3643834.3661573"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"crossref","unstructured":"Allison Druin. 2002. The role of children in the design of new technology. Behaviour and information technology 21 1 (2002) 1\u201325.","DOI":"10.1080\/01449290110108659"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"crossref","unstructured":"Kenneth\u00a0D Eason. 1995. User-centred design: for users or by users? Ergonomics 38 8 (1995) 1667\u20131673.","DOI":"10.1080\/00140139508925217"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3026048"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"crossref","unstructured":"Farshad Firouzi Bahar Farahani Mojtaba Barzegari and Mahmoud Daneshmand. 2020. AI-driven data monetization: The other face of data in IoT-based smart and connected health. IEEE Internet of Things Journal 9 8 (2020) 5581\u20135599.","DOI":"10.1109\/JIOT.2020.3027971"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3636317"},{"key":"e_1_3_3_2_39_2","first-page":"7","volume-title":"Urban Informatics","author":"Forlano Laura","year":"2017","unstructured":"Laura Forlano and Anijo Mathew. 2017. From design fiction to design friction: Speculative and participatory design of values-embedded urban technology. In Urban Informatics. Routledge, 7\u201324."},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"crossref","unstructured":"Andrea Gaggioli et\u00a0al. 2016. Transformative experience design. Human computer confluence. Transforming human experience through symbiotic technologies (2016) 96\u2013121.","DOI":"10.1515\/9783110471137"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.4324\/9781315526379-8"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376631"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/3605390.3605393"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/1226969.1227007"},{"key":"e_1_3_3_2_45_2","volume-title":"Unity 2018 augmented reality projects: build four immersive and fun AR applications using ARKit, ARCore, and Vuforia","author":"Glover Jesse","year":"2018","unstructured":"Jesse Glover. 2018. Unity 2018 augmented reality projects: build four immersive and fun AR applications using ARKit, ARCore, and Vuforia. Packt Publishing Ltd."},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"crossref","unstructured":"Mona\u00a0Leigh Guha Allison Druin and Jerry\u00a0Alan Fails. 2013. Cooperative Inquiry revisited: Reflections of the past and guidelines for the future of intergenerational co-design. International Journal of Child-Computer Interaction 1 1 (2013) 14\u201323.","DOI":"10.1016\/j.ijcci.2012.08.003"},{"key":"e_1_3_3_2_47_2","first-page":"1","volume-title":"Proceedings of the 2018 CHI conference on human factors in computing systems","author":"Hiniker Alexis","year":"2018","unstructured":"Alexis Hiniker, Sharon\u00a0S Heung, Sungsoo Hong, and Julie\u00a0A Kientz. 2018. Coco\u2019s videos: an empirical investigation of video-player design features and children\u2019s media use. In Proceedings of the 2018 CHI conference on human factors in computing systems. 1\u201313."},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"crossref","unstructured":"Siti\u00a0Salwa Isa and Andre Liem. 2021. Exploring the role of physical prototypes during co-creation activities at LEGO company using case study validation. CoDesign 17 3 (2021) 330\u2013354.","DOI":"10.1080\/15710882.2020.1715443"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"crossref","unstructured":"Andreas Jacobsson Martin Boldt and Bengt Carlsson. 2016. A risk analysis of a smart home automation system. Future Generation Computer Systems 56 (2016) 719\u2013733.","DOI":"10.1016\/j.future.2015.09.003"},{"key":"e_1_3_3_2_50_2","volume-title":"Engaging imagination: Helping students become creative and reflective thinkers","author":"James Al","year":"2014","unstructured":"Al James and Stephen\u00a0D Brookfield. 2014. Engaging imagination: Helping students become creative and reflective thinkers. John Wiley & Sons."},{"key":"e_1_3_3_2_51_2","unstructured":"Alison\u00a0Rosemary James. 2013. Lego Serious Play: a three-dimensional approach to learning development. Journal of Learning Development in Higher Education6 (2013)."},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/3628516.3655804"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"crossref","unstructured":"Tom\u00e1\u0161 Kincl and P \u0160trach. 2021. Born digital: Is there going to be a new culture of digital natives? Journal of Global Scholars of Marketing Science 31 1 (2021) 30\u201348.","DOI":"10.1080\/21639159.2020.1808811"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"crossref","unstructured":"Maaike Kleinsmann and Rianne Valkenburg. 2008. Barriers and enablers for creating shared understanding in co-design projects. Design studies 29 4 (2008) 369\u2013386.","DOI":"10.1016\/j.destud.2008.03.003"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"crossref","unstructured":"Nikos Komninos Eleni Philippou and Andreas Pitsillides. 2014. Survey in smart grid and smart home security: Issues challenges and countermeasures. IEEE Communications Surveys & Tutorials 16 4 (2014) 1933\u20131954.","DOI":"10.1109\/COMST.2014.2320093"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"crossref","unstructured":"Priya Kumar Shalmali\u00a0Milind Naik Utkarsha\u00a0Ramesh Devkar Marshini Chetty Tamara\u00a0L Clegg and Jessica Vitak. 2017. \u2019No Telling Passcodes Out Because They\u2019re Private\u2019 Understanding Children\u2019s Mental Models of Privacy and Security Online. Proceedings of the ACM on Human-Computer Interaction 1 CSCW (2017) 1\u201321.","DOI":"10.1145\/3134699"},{"key":"e_1_3_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3313023"},{"key":"e_1_3_3_2_58_2","unstructured":"Sonia Livingstone Alicia Blum-Ross and Dongmiao Zhang. 2018. What do parents think and do about their children\u2019s online privacy? (2018)."},{"key":"e_1_3_3_2_59_2","unstructured":"Sonia Livingstone Mariya Stoilova and Rishita Nandagiri. 2019. Children\u2019s data and privacy online: growing up in a digital age: an evidence review. (2019)."},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/2317956.2318021"},{"key":"e_1_3_3_2_61_2","doi-asserted-by":"crossref","unstructured":"Michelle Lui Rhonda McEwen and Martha Mullally. 2020. Immersive virtual reality for supporting complex scientific knowledge: Augmenting our understanding with physiological monitoring. British Journal of Educational Technology 51 6 (2020) 2181\u20132199.","DOI":"10.1111\/bjet.13022"},{"key":"e_1_3_3_2_62_2","doi-asserted-by":"crossref","unstructured":"Deborah Lupton and Ben Williamson. 2017. The datafied child: The dataveillance of children and implications for their rights. New media & society 19 5 (2017) 780\u2013794.","DOI":"10.1177\/1461444816686328"},{"key":"e_1_3_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581033"},{"key":"e_1_3_3_2_64_2","doi-asserted-by":"crossref","unstructured":"Matt Malpass. 2013. Between wit and reason: Defining associative speculative and critical design in practice. Design and Culture 5 3 (2013) 333\u2013356.","DOI":"10.2752\/175470813X13705953612200"},{"key":"e_1_3_3_2_65_2","doi-asserted-by":"crossref","unstructured":"Paweena Manotipya and Kambiz Ghazinour. 2020. Children\u2019s Online Privacy from Parents\u2019 Perspective. Procedia Computer Science 177 (2020) 178\u2013185.","DOI":"10.1016\/j.procs.2020.10.026"},{"key":"e_1_3_3_2_66_2","doi-asserted-by":"crossref","unstructured":"Giovanna Mascheroni. 2020. Datafied childhoods: Contextualising datafication in everyday life. Current Sociology 68 6 (2020) 798\u2013813.","DOI":"10.1177\/0011392118807534"},{"key":"e_1_3_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998218"},{"key":"e_1_3_3_2_68_2","doi-asserted-by":"crossref","unstructured":"Melissa Mazmanian Wanda\u00a0J Orlikowski and JoAnne Yates. 2013. The autonomy paradox: The implications of mobile email devices for knowledge professionals. Organization science 24 5 (2013) 1337\u20131357.","DOI":"10.1287\/orsc.1120.0806"},{"key":"e_1_3_3_2_69_2","unstructured":"Sean McCusker. 2014. Lego\u00ae Serious Play TM: Thinking about teaching and learning. International journal of knowledge innovation and entrepreneurship 2 1 (2014) 27\u201337."},{"key":"e_1_3_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025622"},{"key":"e_1_3_3_2_71_2","doi-asserted-by":"crossref","unstructured":"Ulises\u00a0A Mejias and Nick Couldry. 2019. Datafication. Internet Policy Review 8 4 (2019).","DOI":"10.14763\/2019.4.1428"},{"key":"e_1_3_3_2_72_2","doi-asserted-by":"crossref","unstructured":"Gabriele Morandin Marcello Russo and Ariane Ollier-Malaterre. 2018. Put down that phone! Smart use of smartphones for work and beyond. Journal of Management Inquiry 27 3 (2018) 352\u2013356.","DOI":"10.1177\/1056492618762964"},{"key":"e_1_3_3_2_73_2","doi-asserted-by":"crossref","unstructured":"Richard Mortier Hamed Haddadi Tristan Henderson Derek McAuley and Jon Crowcroft. 2014. Human-data interaction: The human face of the data-driven society. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1412.6159 (2014).","DOI":"10.2139\/ssrn.2508051"},{"key":"e_1_3_3_2_74_2","unstructured":"Richard Mortier Hamed Haddadi Tristan Henderson Derek McAuley Jon Crowcroft and Andy Crabtree. 2020. 41. Human-Data Interaction. The Encyclopedia of Human-Computer Interaction 2nd Ed. Available at: https:\/\/www. interaction-design. org\/literature\/book\/the-encycl opedia-of-human-computer-interaction-2nd-ed\/human-data-int effraction (2020)."},{"key":"e_1_3_3_2_75_2","doi-asserted-by":"crossref","unstructured":"Michael\u00a0J Muller and Sarah Kuhn. 1993. Participatory design. Commun. ACM 36 6 (1993) 24\u201328.","DOI":"10.1145\/153571.255960"},{"key":"e_1_3_3_2_76_2","doi-asserted-by":"crossref","unstructured":"P\u00a0Karen Murphy Meredith\u00a0L Rowe Geetha Ramani and Rebecca Silverman. 2014. Promoting critical-analytic thinking in children and adolescents at home and in school. Educational Psychology Review 26 (2014) 561\u2013578.","DOI":"10.1007\/s10648-014-9281-3"},{"key":"e_1_3_3_2_77_2","unstructured":"Mbilike\u00a0M Mwafulirwa. 2024. The Automation Paradox. Tulsa Law Review 59 (2024)."},{"key":"e_1_3_3_2_78_2","first-page":"399","volume-title":"Thirteenth symposium on usable privacy and security (SOUPS 2017)","author":"Naeini Pardis\u00a0Emami","year":"2017","unstructured":"Pardis\u00a0Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie\u00a0Faith Cranor, and Norman Sadeh. 2017. Privacy expectations and preferences in an { IoT} world. In Thirteenth symposium on usable privacy and security (SOUPS 2017). 399\u2013412."},{"key":"e_1_3_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-39664-0_10"},{"key":"e_1_3_3_2_80_2","doi-asserted-by":"crossref","unstructured":"Sara Nelissen and Jan Van\u00a0den Bulck. 2018. When digital natives instruct digital immigrants: active guidance of parental media use by children and conflict in the family. Information Communication & Society 21 3 (2018) 375\u2013387.","DOI":"10.1080\/1369118X.2017.1281993"},{"key":"e_1_3_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISEC49744.2020.9397810"},{"key":"e_1_3_3_2_82_2","unstructured":"J Nielsen. 1997. Usability Testing In Handbook of Human Factors and Ergonomics Edited by Salvendy G."},{"key":"e_1_3_3_2_83_2","unstructured":"Ofcom. 2023. Children and parents: media use and attitudes report 2023. https:\/\/www.ofcom.org.uk\/__data\/assets\/pdf_file\/0027\/255852\/childrens-media-use-and-attitudes-report-2023.pdf"},{"key":"e_1_3_3_2_84_2","doi-asserted-by":"crossref","unstructured":"Ariane Ollier-Malaterre Jerry\u00a0A Jacobs and Nancy\u00a0P Rothbard. 2019. Technology work and family: Digital cultural capital and boundary management. Annual Review of Sociology 45 1 (2019) 425\u2013447.","DOI":"10.1146\/annurev-soc-073018-022433"},{"key":"e_1_3_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.1145\/3097286.3097338"},{"key":"e_1_3_3_2_86_2","unstructured":"Anthony\u00a0T Pinter Arup\u00a0Kumar Ghosh and Pamela\u00a0J Wisniewski. 2022. Going beyond cyberbullying: Adolescent online safety and digital risks. Cyberbullying and Digital Safety: Applying Global Research to Youth in India (2022)."},{"key":"e_1_3_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445541"},{"key":"e_1_3_3_2_88_2","doi-asserted-by":"crossref","unstructured":"Sebastian Raisch and Sebastian Krakowski. 2021. Artificial intelligence and management: The automation\u2013augmentation paradox. Academy of management review 46 1 (2021) 192\u2013210.","DOI":"10.5465\/amr.2018.0072"},{"key":"e_1_3_3_2_89_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3308458"},{"key":"e_1_3_3_2_90_2","doi-asserted-by":"crossref","unstructured":"Yvonne Rogers Mike Scaife Silvia Gabrielli Hilary Smith and Eric Harris. 2002. A conceptual framework for mixed reality environments: Designing novel learning activities for young children. Presence 11 6 (2002) 677\u2013686.","DOI":"10.1162\/105474602321050776"},{"key":"e_1_3_3_2_91_2","doi-asserted-by":"crossref","unstructured":"Elizabeth B-N Sanders and Pieter\u00a0Jan Stappers. 2008. Co-creation and the new landscapes of design. Co-design 4 1 (2008) 5\u201318.","DOI":"10.1080\/15710880701875068"},{"key":"e_1_3_3_2_92_2","first-page":"179","volume-title":"Learning and Collective Creativity","author":"Schulz Klaus-Peter","year":"2013","unstructured":"Klaus-Peter Schulz and Silke Geithner. 2013. Creative tools for collective creativity: The serious play method using Lego bricks. In Learning and Collective Creativity. Routledge, 179\u2013197."},{"key":"e_1_3_3_2_93_2","doi-asserted-by":"crossref","unstructured":"Jungwoo Shin Yuri Park and Daeho Lee. 2018. Who will be smart home users? An analysis of adoption and diffusion of smart homes. Technological Forecasting and Social Change 134 (2018) 246\u2013253.","DOI":"10.1016\/j.techfore.2018.06.029"},{"key":"e_1_3_3_2_94_2","doi-asserted-by":"crossref","unstructured":"Zaied Shouran Ahmad Ashari and Tri Priyambodo. 2019. Internet of things (IoT) of smart home: privacy and security. International Journal of Computer Applications 182 39 (2019) 3\u20138.","DOI":"10.5120\/ijca2019918450"},{"key":"e_1_3_3_2_95_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642745"},{"key":"e_1_3_3_2_96_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445095"},{"key":"e_1_3_3_2_97_2","unstructured":"Clay Spinuzzi. 2005. The methodology of participatory design. Technical communication 52 2 (2005) 163\u2013174."},{"key":"e_1_3_3_2_98_2","first-page":"69","volume-title":"DS 43: Proceedings of E&PDE 2007, the 9th International Conference on Engineering and Product Design Education, University of Northumbria, Newcastle, UK, 13.-14.09. 2007","author":"Stappers Pieter\u00a0Jan","year":"2007","unstructured":"Pieter\u00a0Jan Stappers, Paul Hekkert, David Keyson, et\u00a0al. 2007. Design for interaction: consolidating the user-centred focus in industrial design engineering. In DS 43: Proceedings of E&PDE 2007, the 9th International Conference on Engineering and Product Design Education, University of Northumbria, Newcastle, UK, 13.-14.09. 2007. 69\u201374."},{"key":"e_1_3_3_2_99_2","doi-asserted-by":"crossref","unstructured":"Marc Steen. 2013. Co-design as a process of joint inquiry and imagination. Design issues 29 2 (2013) 16\u201328.","DOI":"10.1162\/DESI_a_00207"},{"key":"e_1_3_3_2_100_2","doi-asserted-by":"publisher","DOI":"10.1145\/3585088.3589390"},{"key":"e_1_3_3_2_101_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581216"},{"key":"e_1_3_3_2_102_2","doi-asserted-by":"crossref","unstructured":"Biljana L\u00a0Risteska Stojkoska and Kire\u00a0V Trivodaliev. 2017. A review of Internet of Things for smart home: Challenges and solutions. Journal of cleaner production 140 (2017) 1454\u20131464.","DOI":"10.1016\/j.jclepro.2016.10.006"},{"key":"e_1_3_3_2_103_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300875"},{"key":"e_1_3_3_2_104_2","doi-asserted-by":"crossref","unstructured":"Maurice\u00a0E Stucke and Ariel Ezrachi. 2018. Alexa et al. what are you doing with my data? Critical Analysis L. 5 (2018) 148.","DOI":"10.33137\/cal.v5i1.29509"},{"key":"e_1_3_3_2_105_2","doi-asserted-by":"publisher","DOI":"10.1145\/3585088.3593927"},{"key":"e_1_3_3_2_106_2","doi-asserted-by":"publisher","unstructured":"Kaiwen Sun Jingjie Li Yixin Zou Jenny Radesky Christopher Brooks and Florian Schaub. 2024. Unfulfilled Promises of Child Safety and Privacy: Portrayals and Use of Children in Smart Home Marketing. Proc. ACM Hum.-Comput. Interact. 8 CSCW1 Article 145 (apr 2024) 29\u00a0pages. 10.1145\/3637422","DOI":"10.1145\/3637422"},{"key":"e_1_3_3_2_107_2","doi-asserted-by":"publisher","unstructured":"Kaiwen Sun Yixin Zou Jenny Radesky Christopher Brooks and Florian Schaub. 2021. Child Safety in the Smart Home: Parents\u2019 Perceptions Needs and Mitigation Strategies. Proc. ACM Hum.-Comput. Interact. 5 CSCW2 Article 471 (oct 2021) 41\u00a0pages. 10.1145\/3479858","DOI":"10.1145\/3479858"},{"key":"e_1_3_3_2_108_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376255"},{"key":"e_1_3_3_2_109_2","doi-asserted-by":"crossref","unstructured":"Nikki Theofanopoulou Alissa\u00a0N Antle and Petr Slovak. 2024. \" They Don\u2019t Come With a Handbook\": Exploring Design Opportunities for Supporting Parent-Child Interaction around Emotions in the Family Context. Proceedings of the ACM on Human-Computer Interaction 8 CSCW1 (2024) 1\u201333.","DOI":"10.1145\/3637409"},{"key":"e_1_3_3_2_110_2","doi-asserted-by":"publisher","unstructured":"Sarah Turner Nandita Pattnaik Jason\u00a0R.C. Nurse and Shujun Li. 2022. \"You Just Assume It Is In There I Guess\": Understanding UK Families\u2019 Application and Knowledge of Smart Home Cyber Security. Proc. ACM Hum.-Comput. Interact. 6 CSCW2 Article 269 (nov 2022) 34\u00a0pages. 10.1145\/3555159","DOI":"10.1145\/3555159"},{"key":"e_1_3_3_2_111_2","doi-asserted-by":"crossref","unstructured":"Leena Vent\u00e4-Olkkonen Netta Iivari Heidi Hartikainen Sumita Sharma Essi Lehto Jenni Holappa and Tonja Molin-Juustila. 2024. \u201cI could become a white hat hacker\u201d or \u201cAt least I am creative\u201d: Children\u2019s technology protagonist identities and their evolution during a critical design and making project. International Journal of Child-Computer Interaction 41 (2024) 100667.","DOI":"10.1016\/j.ijcci.2024.100667"},{"key":"e_1_3_3_2_112_2","doi-asserted-by":"crossref","unstructured":"Olga Viberg Rene\u00a0F Kizilcec Ioana Jivet Alejandra\u00a0Mart\u00ednez Mon\u00e9s Alice Oh Chantal Mutimukwe Stefan Hrastinski and Maren Scheffel. 2024. Cultural differences in students\u2019 privacy concerns in learning analytics across Germany South Korea Spain Sweden and the United States. Computers in human behavior reports 14 (2024) 100416.","DOI":"10.1016\/j.chbr.2024.100416"},{"key":"e_1_3_3_2_113_2","doi-asserted-by":"publisher","DOI":"10.1145\/3589335.3651251"},{"key":"e_1_3_3_2_114_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3585886"},{"key":"e_1_3_3_2_115_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642294"},{"key":"e_1_3_3_2_116_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642283"},{"key":"e_1_3_3_2_117_2","doi-asserted-by":"crossref","unstructured":"Ge Wang Jun Zhao Max Van\u00a0Kleek and Nigel Shadbolt. 2022. \u2019Don\u2019t make assumptions about me!\u2019: Understanding Children\u2019s Perception of Datafication Online. Proceedings of the ACM on Human-Computer Interaction 6 CSCW2 (2022) 1\u201324.","DOI":"10.1145\/3555144"},{"key":"e_1_3_3_2_118_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580933"},{"key":"e_1_3_3_2_119_2","unstructured":"Marx Wartofsky. 1983. The child\u2019s construction of the world and the world\u2019s construction of the child: From historical epistemology to historical psychology. The child and other cultural inventions (1983) 188\u2013215."},{"key":"e_1_3_3_2_120_2","doi-asserted-by":"publisher","DOI":"10.1145\/3585088.3593876"},{"key":"e_1_3_3_2_121_2","first-page":"159","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Zeng Eric","year":"2019","unstructured":"Eric Zeng and Franziska Roesner. 2019. Understanding and improving security and privacy in { multi-user} smart homes: A design exploration and { in-home} user study. In 28th USENIX Security Symposium (USENIX Security 19). 159\u2013176."},{"key":"e_1_3_3_2_122_2","doi-asserted-by":"publisher","DOI":"10.1145\/2930674.2930716"},{"key":"e_1_3_3_2_123_2","first-page":"1","volume-title":"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems","author":"Zhao Jun","year":"2019","unstructured":"Jun Zhao, Ge Wang, Carys Dally, Petr Slovak, Julian Edbrooke-Childs, Max Van\u00a0Kleek, and Nigel Shadbolt. 2019. I make up a silly name\u2019 Understanding Children\u2019s Perception of Privacy Risks Online. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1\u201313."},{"key":"e_1_3_3_2_124_2","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645631"}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713494","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3713494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:43:28Z","timestamp":1751607808000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713494"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":123,"alternative-id":["10.1145\/3706598.3713494","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3713494","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}