{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:09:35Z","timestamp":1776100175179,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":102,"publisher":"ACM","funder":[{"name":"The Science and Technology Development Fund","award":["0078\/2023\/AMJ, 0129\/2022\/A"],"award-info":[{"award-number":["0078\/2023\/AMJ, 0129\/2022\/A"]}]},{"name":"University of Macau","award":["MYRG-GRG2024-00052-FST-UMDF, APAEM\/SG\/0003\/2025 and APAEM\/SG\/00017\/2025"],"award-info":[{"award-number":["MYRG-GRG2024-00052-FST-UMDF, APAEM\/SG\/0003\/2025 and APAEM\/SG\/00017\/2025"]}]},{"name":"Faculty of Science and Technology, University of Macau","award":["travel grant"],"award-info":[{"award-number":["travel grant"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765101","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:32:38Z","timestamp":1763854358000},"page":"4274-4288","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Digital Safety for Children with Intellectual Disabilities When Using Mobile Devices from Parents' and Teachers' Perspectives"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-5680-5630","authenticated-orcid":false,"given":"Janice Jianing","family":"Si","sequence":"first","affiliation":[{"name":"University of Macau, Macao, Macao SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8077-5134","authenticated-orcid":false,"given":"Xin","family":"Lin","sequence":"additional","affiliation":[{"name":"University of Macau, Macao, Macao SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9332-1023","authenticated-orcid":false,"given":"Haorui","family":"Cui","sequence":"additional","affiliation":[{"name":"University of Macau, Macao, Macao SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9500-3390","authenticated-orcid":false,"given":"Xiaobo","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of Macau, Macao, Macao SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7908-5286","authenticated-orcid":false,"given":"Kanye Ye","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Macau, Macao, Macao SAR, China"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2025. The Belmont Report - Ethical Principles and Guidelines for the Protection of Human Subjects of Research. https:\/\/www.hhs.gov\/ohrp\/regulations-andpolicy\/belmont-report\/index.html"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/Cyber-RCI59474.2023.10671480"},{"key":"e_1_3_2_1_3_1","unstructured":"Monica Anderson. 2018. A majority of teens have experienced some form of cyberbullying. (2018)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603399"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300497"},{"key":"e_1_3_2_1_6_1","volume-title":"Risk management: procedures, methods and experiences. Reliability: Theory & Applications 5, 2 (17)","author":"Berg Heinz-Peter","year":"2010","unstructured":"Heinz-Peter Berg. 2010. Risk management: procedures, methods and experiences. Reliability: Theory & Applications 5, 2 (17) (2010), 79--95."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1353\/wsq.2018.0003"},{"key":"e_1_3_2_1_8_1","volume-title":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 546--553","author":"Bhalerao Rasika","year":"2022","unstructured":"Rasika Bhalerao, Vaughn Hamilton, Allison McDonald, Elissa M Redmiles, and Angelika Strohmayer. 2022. Ethical practices for security research with atrisk populations. In 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 546--553."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.05.026"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/00220671.2021.1902254"},{"key":"e_1_3_2_1_11_1","volume-title":"Positionality: Reflecting on the research process. The qualitative report 19, 33","author":"Bourke Brian","year":"2014","unstructured":"Brian Bourke. 2014. Positionality: Reflecting on the research process. The qualitative report 19, 33 (2014), 1--9."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/1944-2866.POI332"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/0968759032000155640"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.2196\/22612"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1111\/jir.12205"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00222"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/10720160127560"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/bld.12372"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1108\/TLDR-03-2019-0008"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311927.3323144"},{"key":"e_1_3_2_1_21_1","volume-title":"Online fraud. Oxford research encyclopedia of criminology","author":"Cross Cassandra","year":"2019","unstructured":"Cassandra Cross. 2019. Online fraud. Oxford research encyclopedia of criminology (2019), 1--32."},{"key":"e_1_3_2_1_22_1","volume-title":"Marisa Viljoen, Kirsty Rice, and Dan J Stein.","author":"Dawson-Squibb John-Joe","year":"2023","unstructured":"John-Joe Dawson-Squibb, Eugene Lee Davids, Marisa Viljoen, Kirsty Rice, and Dan J Stein. 2023. The WHO international classification of diseases 11th revision (ICD-11). In Handbook of clinical child psychology: Integrating theory and research into practice. Springer, 53--78."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/074193258300300410"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300533"},{"key":"e_1_3_2_1_25_1","volume-title":"Emel Ozturk, Figen Sahin-Dagli, et al.","author":"Dinleyici Meltem","year":"2016","unstructured":"Meltem Dinleyici, Kursat Bora Carman, Emel Ozturk, Figen Sahin-Dagli, et al. 2016. Media use by children, and parents' views on children's media usage. Interactive journal of medical research 5, 2 (2016), e5668."},{"key":"e_1_3_2_1_26_1","unstructured":"June E Downing. 1996. Including students with severe and multiple disabilities in typical classrooms: Practical strategies for teachers. (1996)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/07370024.2018.1437544"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581128"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1111\/bld.12358"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173582"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/10508406.2013.802652"},{"key":"e_1_3_2_1_32_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Havron Sam","year":"2019","unstructured":"Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2019. Clinical computer security for victims of intimate partner violence. In 28th USENIX Security Symposium (USENIX Security 19). 105--122."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1111\/bjep.12452"},{"key":"e_1_3_2_1_34_1","volume-title":"Neural plasticity following auditory training in children with learning problems. Clinical neurophysiology 114, 4","author":"Hayes Erin A","year":"2003","unstructured":"Erin A Hayes, Catherine M Warrier, Trent G Nicol, Steven G Zecker, and Nina Kraus. 2003. Neural plasticity following auditory training in children with learning problems. Clinical neurophysiology 114, 4 (2003), 673--684."},{"key":"e_1_3_2_1_35_1","volume-title":"Excessive internet use by young Europeans: psychological vulnerability and digital literacy? Information, communication & society 23, 9","author":"Helsper Ellen Johanna","year":"2020","unstructured":"Ellen Johanna Helsper and David Smahel. 2020. Excessive internet use by young Europeans: psychological vulnerability and digital literacy? Information, communication & society 23, 9 (2020), 1255--1273."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcal.12220"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1542\/peds.2016-1758G"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781848607941.n13"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10882-009-9182-4"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1111\/bjc.12133"},{"key":"e_1_3_2_1_41_1","volume-title":"Exploring the impact of gamification on skill development in special education: A systematic review. Contemporary Educational Technology 15, 3","author":"Hussein Elham","year":"2023","unstructured":"Elham Hussein, Ashraf Kan'An, Abeer Rasheed, Yousef Alrashed, Malek Jdaitawi, Ahmed Abas, Sherin Mabrouk, and Mona Abdelmoneim. 2023. Exploring the impact of gamification on skill development in special education: A systematic review. Contemporary Educational Technology 15, 3 (2023), ep443."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.3390\/educsci11050234"},{"key":"e_1_3_2_1_43_1","volume-title":"Hanging out, messing around, and geeking out: Kids living and learning with new media","author":"Ito Mizuko","unstructured":"Mizuko Ito. 2013. Hanging out, messing around, and geeking out: Kids living and learning with new media. The MIT press."},{"key":"e_1_3_2_1_44_1","volume-title":"Motor learning relies on integrated sensory inputs in ADHD, but over-selectively on proprioception in autism spectrum conditions. Autism research 5, 2","author":"Izawa Jun","year":"2012","unstructured":"Jun Izawa, Sarah E Pekny, Mollie K Marko, Courtney C Haswell, Reza Shadmehr, and Stewart H Mostofsky. 2012. Motor learning relies on integrated sensory inputs in ADHD, but over-selectively on proprioception in autism spectrum conditions. Autism research 5, 2 (2012), 124--136."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675287"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1542\/peds.2015-2151"},{"key":"e_1_3_2_1_47_1","unstructured":"Daniel Kardefelt-Winther Emma Day Gabrielle Berman Sabine K Witting Anjan Bose et al. 2020. Encryption Privacy and Children's Right to Protection from Harm. UNICEF Office of Research-Innocenti."},{"key":"e_1_3_2_1_48_1","volume-title":"Special education: What it is and why we need it","author":"Kauffman James M","unstructured":"James M Kauffman, Daniel P Hallahan, Paige C Pullen, and Jeanmarie Badar. 2018. Special education: What it is and why we need it. Routledge."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1080\/08974454.2021.1988034"},{"key":"e_1_3_2_1_50_1","volume-title":"Emine Polat, Esma Altinel Acoglu, and Saliha Senel.","author":"Ahmet Osman","year":"2019","unstructured":"Ahmet Osman K\u0131l\u0131231;, Eyup Sari, Husniye Yucel, Melahat Melek Oguz, Emine Polat, Esma Altinel Acoglu, and Saliha Senel. 2019. Exposure to and use of mobile devices in children aged 1--60 months. European journal of pediatrics 178 (2019), 221--227."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5014\/ajot.2015.015081"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1080\/20473869.2018.1434855"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10792-016-0296-2"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.3390\/educsci10070184"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.12965\/jer.1632854.427"},{"key":"e_1_3_2_1_56_1","volume-title":"The role of cognitive distortion in online game addiction among Chinese adolescents. Children and youth services review 35, 9","author":"Li Huanhuan","year":"2013","unstructured":"Huanhuan Li and Su Wang. 2013. The role of cognitive distortion in online game addiction among Chinese adolescents. Children and youth services review 35, 9 (2013), 1468--1475."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2214.2011.01334.x"},{"key":"e_1_3_2_1_58_1","unstructured":"Sonia Livingstone Leslie Haddon Anke G\u00f6rzig and Kjartan \u00d3lafsson. 2011. Risks and safety on the internet: the perspective of European children: full findings and policy implications from the EU Kids Online survey of 9--16 year olds and their parents in 25 countries. (2011)."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcpp.12197"},{"key":"e_1_3_2_1_60_1","unstructured":"Sonia Livingstone and Mariya Stoilova. 2021. The 4Cs: Classifying online risk to children. (2021)."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11195-015-9415-7"},{"key":"e_1_3_2_1_62_1","volume-title":"Mahdi Nasrullah Al-Ameen, and Matthew K Wright","author":"Marne Sonali Tukaram","year":"2017","unstructured":"Sonali Tukaram Marne, Mahdi Nasrullah Al-Ameen, and Matthew K Wright. 2017. Learning System-assigned Passwords: A Preliminary Study on the People with Learning Disabilities.. In SOUPS."},{"key":"e_1_3_2_1_63_1","volume-title":"Intellectual disability and language disorder. Child and adolescent psychiatric clinics of North America 26, 3","author":"Marrus Natasha","year":"2017","unstructured":"Natasha Marrus and Lacey Hall. 2017. Intellectual disability and language disorder. Child and adolescent psychiatric clinics of North America 26, 3 (2017), 539."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11528-022-00803-z"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814567986"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1136\/adc.2010.197947"},{"key":"e_1_3_2_1_67_1","volume-title":"Interrater reliability: the kappa statistic. Biochemia medica 22, 3","author":"McHugh Mary L","year":"2012","unstructured":"Mary L McHugh. 2012. Interrater reliability: the kappa statistic. Biochemia medica 22, 3 (2012), 276--282."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1177\/0145445515621489"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1002\/bin.1484"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300573"},{"key":"e_1_3_2_1_71_1","volume-title":"Mobile practices in everyday life: Popular digital technologies and schooling revisited. British journal of educational technology 43, 5","author":"Merchant Guy","year":"2012","unstructured":"Guy Merchant. 2012. Mobile practices in everyday life: Popular digital technologies and schooling revisited. British journal of educational technology 43, 5 (2012), 770--782."},{"key":"e_1_3_2_1_72_1","volume-title":"Stigma experienced by families of individuals with intellectual disabilities and autism: A systematic review. Research in developmental disabilities 89","author":"Mitter Natasha","year":"2019","unstructured":"Natasha Mitter, Afia Ali, and Katrina Scior. 2019. Stigma experienced by families of individuals with intellectual disabilities and autism: A systematic review. Research in developmental disabilities 89 (2019), 10--21."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1177\/1744629514563558"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449212"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10826-015-0144-4"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1080\/13645570701401305"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1093\/deafed\/5.1.51"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJMLO.2017.085338"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"crossref","first-page":"e0244276","DOI":"10.1371\/journal.pone.0244276","article-title":"Smartphone use patterns and problematic smartphone use among preschool children","volume":"16","author":"Park Jeong Hye","year":"2021","unstructured":"Jeong Hye Park and Minjung Park. 2021. Smartphone use patterns and problematic smartphone use among preschool children. PloS one 16, 3 (2021), e0244276.","journal-title":"PloS one"},{"key":"e_1_3_2_1_80_1","volume-title":"Snowball sampling. SAGE research methods foundations","author":"Parker Charlie","year":"2019","unstructured":"Charlie Parker, Sam Scott, and Alistair Geddes. 2019. Snowball sampling. SAGE research methods foundations (2019)."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2007.32"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.3390\/educsci8010010"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1080\/03055698.2014.930340"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611036"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.5958\/2231-458X.2016.00002.6"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1177\/20539517241252129"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10803-013-1878-8"},{"key":"e_1_3_2_1_88_1","volume-title":"AAIDD proposed recommendations for ICD--11 and the condition previously known as mental retardation. Intellectual and developmental disabilities 51, 2","author":"Tass\u00e9 Marc J","year":"2013","unstructured":"Marc J Tass\u00e9, Ruth Luckasson, and Margaret Nygren. 2013. AAIDD proposed recommendations for ICD--11 and the condition previously known as mental retardation. Intellectual and developmental disabilities 51, 2 (2013), 127--131."},{"key":"e_1_3_2_1_89_1","first-page":"202","article-title":"Multi-Sensory Intervention Observational Research","volume":"26","author":"Thompson Carla J","year":"2011","unstructured":"Carla J Thompson. 2011. Multi-Sensory Intervention Observational Research. International Journal of Special Education 26, 1 (2011), 202--214.","journal-title":"International Journal of Special Education"},{"key":"e_1_3_2_1_90_1","volume-title":"Sarper Taskiran, Ali Evren Tufan, and Bengi Semerci.","author":"Topal Zehra","year":"2018","unstructured":"Zehra Topal, Nuran Demir Samurcu, Sarper Taskiran, Ali Evren Tufan, and Bengi Semerci. 2018. Social communication disorder: A narrative review on current insights. Neuropsychiatric disease and treatment (2018), 2039--2046."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1177\/0040059918775020"},{"key":"e_1_3_2_1_92_1","volume-title":"Handbook of sandplay therapy","author":"Turner Barbara A","unstructured":"Barbara A Turner. 2023. Handbook of sandplay therapy. Temenos Press."},{"key":"e_1_3_2_1_93_1","article-title":"Singing in music education as a tool for the development of children's communication skills","volume":"8","author":"van der Sandt Johann","year":"2024","unstructured":"Johann van der Sandt. 2024. Singing in music education as a tool for the development of children's communication skills. The Literacy, Preliteracy and Education Journal 8, 3 (2024).","journal-title":"The Literacy, Preliteracy and Education Journal"},{"key":"e_1_3_2_1_94_1","volume-title":"Research in developmental disabilities 33, 2","author":"Van Nieuwenhuijzen M","year":"2012","unstructured":"M Van Nieuwenhuijzen and A Vriens. 2012. (Social) Cognitive skills and social information processing in children with mild to borderline intellectual disabilities. Research in developmental disabilities 33, 2 (2012), 426--434."},{"key":"e_1_3_2_1_95_1","volume-title":"Self-regulation during pretend play in children with intellectual disability and in normally developing children. Research in developmental disabilities 29, 3","author":"Vieillevoye Sandrine","year":"2008","unstructured":"Sandrine Vieillevoye and Nathalie Nader-Grosbois. 2008. Self-regulation during pretend play in children with intellectual disability and in normally developing children. Research in developmental disabilities 29, 3 (2008), 256--272."},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.5014\/ajot.58.1.113"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1352\/1944-7558-118.5.353"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998352"},{"key":"e_1_3_2_1_99_1","unstructured":"Frank H Wood and K Charlie Lakin. 1982. Punishment and aversive stimulation in special education: Legal theoretical and practical issues in their use with emotionally disturbed children and youth. (1982)."},{"key":"e_1_3_2_1_100_1","unstructured":"World Health Organization. 2025. ICD-11 for Mortality and Morbidity Statistics. https:\/\/icd.who.int\/browse\/2025-01\/mms\/en#605267007 Accessed: 2025-03--20."},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.11113\/ijic.v12n2.311"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1108\/INTR-05-2023-0339"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765101","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:14:23Z","timestamp":1766441663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765101"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":102,"alternative-id":["10.1145\/3719027.3765101","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765101","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}