{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T02:34:09Z","timestamp":1772937249309,"version":"3.50.1"},"reference-count":107,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T00:00:00Z","timestamp":1744588800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Things"],"published-print":{"date-parts":[[2025,5,31]]},"abstract":"<jats:p>\n            People are increasingly bringing Internet of Things (IoT) devices into their homes without understanding how their data is gathered, processed, and used. We describe PrivacyCube, a novel data physicalization designed to increase privacy awareness within smart home environments. PrivacyCube visualizes IoT data consumption by displaying privacy-related notices. PrivacyCube aims at assisting smart home occupants to (i) understand their data privacy better and (ii) have conversations around data management practices of IoT devices used within their homes. Using PrivacyCube, households can learn and make informed privacy decisions collectively. To evaluate PrivacyCube, we used multiple research methods throughout the different stages of design. We first conducted a focus group study in two stages with six participants to compare PrivacyCube to text and state-of-the-art privacy policies. We then deployed PrivacyCube in a 14-day-long in-home field study with eight households. Lastly, we conducted an event-based field study comparing PrivacyCube with a mobile application, engaging 26 participants with diverse demographics. Our results show that PrivacyCube helps home occupants comprehend IoT privacy better with significantly increased privacy awareness at p &lt; .05 (p = 0.00041, t = -5.57). Participants preferred PrivacyCube over text privacy policies because it was comprehensive and easier to use. PrivacyCube, Privacy Label, and the mobile application, all received positive reviews from participants, with PrivacyCube being preferred for its interactivity and ability to encourage conversations. PrivacyCube was also considered by home occupants as a\n            <jats:italic>piece of home furniture<\/jats:italic>\n            , encouraging them to socialize and discuss IoT privacy implications using this device. Watch the demo (\n            <jats:ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"url\" xlink:href=\"https:\/\/vimeo.com\/929897208?share=copy\">Demo Video<\/jats:ext-link>\n            ) (\n            <jats:ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"url\" xlink:href=\"https:\/\/gitlab.com\/IOTGarage\/privacycube\">Source Code<\/jats:ext-link>\n            ).\n          <\/jats:p>","DOI":"10.1145\/3722232","type":"journal-article","created":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T11:11:36Z","timestamp":1741345896000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["PrivacyCube: Data Physicalization for Enhancing Privacy Awareness in IoT"],"prefix":"10.1145","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4104-2915","authenticated-orcid":false,"given":"Bayan","family":"Al Muhander","sequence":"first","affiliation":[{"name":"Cardiff University, Cardiff, United Kingdom of Great Britain and Northern Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0059-0376","authenticated-orcid":false,"given":"Nalin","family":"Arachchilage","sequence":"additional","affiliation":[{"name":"RMIT University, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1030-4556","authenticated-orcid":false,"given":"Yasar","family":"Majib","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, United Kingdom of Great Britain and Northern Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7299-1014","authenticated-orcid":false,"given":"Mohammed","family":"Alosaimi","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, United Kingdom of Great Britain and Northern Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3597-2646","authenticated-orcid":false,"given":"Omar","family":"Rana","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, United Kingdom of Great Britain and Northern Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0190-3346","authenticated-orcid":false,"given":"Charith","family":"Perera","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, United Kingdom of Great Britain and Northern Ireland"}]}],"member":"320","published-online":{"date-parts":[[2025,4,14]]},"reference":[{"issue":"2","key":"e_1_3_3_2_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3328906","article-title":"Scaling crowdsourcing with mobile workforce: A case study with belgian postal service","volume":"3","author":"Acer Utku G\u00fcnay","year":"2019","unstructured":"Utku G\u00fcnay Acer, Marc van den Broeck, Claudio Forlivesi, Florian Heller, and Fahim Kawsar. 2019. Scaling crowdsourcing with mobile workforce: A case study with belgian postal service. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 2 (2019), 1\u201332.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"issue":"3","key":"e_1_3_3_3_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3054926","article-title":"Nudges for privacy and security: Understanding and assisting users\u2019 choices online","volume":"50","author":"Acquisti Alessandro","year":"2017","unstructured":"Alessandro Acquisti, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, Florian Schaub, Manya Sleeper, et\u00a0al. 2017. Nudges for privacy and security: Understanding and assisting users\u2019 choices online. ACM Computing Surveys 50, 3 (2017), 1\u201341.","journal-title":"ACM Computing Surveys"},{"key":"e_1_3_3_4_2","doi-asserted-by":"crossref","unstructured":"Bayan Al Muhander Nalin Arachchilage Yasar Majib Mohammed Alosaimi Omer Rana and Charith Perera. 2024. PrivacyCube: Data physicalization for enhancing privacy awareness in IoT (Supplemental File). (2024). Retrieved from https:\/\/iotgarage.net\/publications\/pdfs\/BayanPrivacyCybeTechReport.pdf. Accessed: 2024-12-02.","DOI":"10.1145\/3722232"},{"key":"e_1_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3600096"},{"issue":"2","key":"e_1_3_3_6_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3648480","article-title":"Designing privacy-aware IoT applications for unregulated domains","volume":"5","author":"Alhirabi Nada","year":"2024","unstructured":"Nada Alhirabi, Stephanie Beaumont, Omer Rana, and Charith Perera. 2024. Designing privacy-aware IoT applications for unregulated domains. ACM Transactions on Internet of Things 5, 2 (2024), 1\u201332.","journal-title":"ACM Transactions on Internet of Things"},{"key":"e_1_3_3_7_2","doi-asserted-by":"crossref","first-page":"787","DOI":"10.1145\/2702123.2702210","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems","author":"Almuhimedi Hazim","year":"2015","unstructured":"Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Faith Cranor, and Yuvraj Agarwal. 2015. Your location has been shared 5,398 times! A field study on mobile app privacy nudging. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 787\u2013796."},{"key":"e_1_3_3_8_2","first-page":"7","volume-title":"Proceedings of the Informatics","author":"Angelini Leonardo","year":"2018","unstructured":"Leonardo Angelini, Elena Mugellini, Omar Abou Khaled, and Nadine Couture. 2018. Internet of Tangible Things (IoTT): Challenges and opportunities for tangible interaction with IoT. In Proceedings of the Informatics. Multidisciplinary Digital Publishing Institute, 7."},{"key":"e_1_3_3_9_2","first-page":"299","volume-title":"Proceedings of the 12th International Conference on Tangible, Embedded, and Embodied Interaction","author":"Angelini Leonardo","year":"2018","unstructured":"Leonardo Angelini, Elena Mugellini, Nadine Couture, and Omar Abou Khaled. 2018. Designing the interaction with the internet of tangible things: A card set. In Proceedings of the 12th International Conference on Tangible, Embedded, and Embodied Interaction. 299\u2013306."},{"key":"e_1_3_3_10_2","doi-asserted-by":"crossref","first-page":"1803","DOI":"10.1145\/2702613.2732701","volume-title":"Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems","author":"Angulo Julio","year":"2015","unstructured":"Julio Angulo, Simone Fischer-H\u00fcbner, Tobias Pulls, and Erik W\u00e4stlund. 2015. Usable transparency with the data track: A tool for visualizing data disclosures. In Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. 1803\u20131808."},{"issue":"4","key":"e_1_3_3_11_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3539737","article-title":"You, me, and IoT: How internet-connected consumer devices affect interpersonal relationships","volume":"3","author":"Apthorpe Noah","year":"2022","unstructured":"Noah Apthorpe, Pardis Emami-Naeini, Arunesh Mathur, Marshini Chetty, and Nick Feamster. 2022. You, me, and IoT: How internet-connected consumer devices affect interpersonal relationships. ACM Transactions on Internet of Things 3, 4 (2022), 1\u201329.","journal-title":"ACM Transactions on Internet of Things"},{"issue":"2","key":"e_1_3_3_12_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3214262","article-title":"Discovering smart home internet of things privacy norms using contextual integrity","volume":"2","author":"Apthorpe Noah","year":"2018","unstructured":"Noah Apthorpe, Yan Shvartzshnaider, Arunesh Mathur, Dillon Reisman, and Nick Feamster. 2018. Discovering smart home internet of things privacy norms using contextual integrity. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 2 (2018), 1\u201323.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_3_3_13_2","unstructured":"Arduino. 2024. Arduino - Open-source electronic prototyping platform.https:\/\/www.arduino.cc Accessed: 2024-12-02."},{"issue":"1","key":"e_1_3_3_14_2","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/s00779-014-0775-2","article-title":"Peripheral interaction: Characteristics and considerations","volume":"19","author":"Bakker Saskia","year":"2015","unstructured":"Saskia Bakker, Elise van den Hoven, and Berry Eggen. 2015. Peripheral interaction: Characteristics and considerations. Personal and Ubiquitous Computing 19, 1 (2015), 239\u2013254.","journal-title":"Personal and Ubiquitous Computing"},{"issue":"3","key":"e_1_3_3_15_2","first-page":"114","article-title":"Determining what individual SUS scores mean: Adding an adjective rating scale","volume":"4","author":"Bangor Aaron","year":"2009","unstructured":"Aaron Bangor, Philip Kortum, and James Miller. 2009. Determining what individual SUS scores mean: Adding an adjective rating scale. Journal of Usability Studies 4, 3 (2009), 114\u2013123.","journal-title":"Journal of Usability Studies"},{"key":"e_1_3_3_16_2","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1109\/ARES.2007.115","volume-title":"Proceedings of the 2nd International Conference on Availability, Reliability and Security.","author":"Bhaskar Pankaj","year":"2007","unstructured":"Pankaj Bhaskar and Sheikh I. Ahamed. 2007. Privacy in pervasive computing and open issues. In Proceedings of the 2nd International Conference on Availability, Reliability and Security.IEEE, 147\u2013154."},{"issue":"2","key":"e_1_3_3_17_2","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1191\/1478088706qp063oa","article-title":"Using thematic analysis in psychology","volume":"3","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology 3, 2 (2006), 77\u2013101.","journal-title":"Qualitative Research in Psychology"},{"issue":"194","key":"e_1_3_3_18_2","first-page":"4","article-title":"SUS-A quick and dirty usability scale","volume":"189","author":"Brooke John","year":"1996","unstructured":"John Brooke et\u00a0al. 1996. SUS-A quick and dirty usability scale. Usability Evaluation in Industry 189, 194 (1996), 4\u20137.","journal-title":"Usability Evaluation in Industry"},{"key":"e_1_3_3_19_2","article-title":"California consumer privacy act.","author":"Temple Erin Illman and Paul","year":"2019","unstructured":"Erin Illman and Paul Temple. 2019. California consumer privacy act. The Business Lawyer 75, 1 (2019), 1637\u20131646.","journal-title":"The Business Lawyer"},{"key":"e_1_3_3_20_2","doi-asserted-by":"crossref","first-page":"20779","DOI":"10.1109\/ACCESS.2018.2820716","article-title":"A user-friendly privacy framework for users to achieve consents with nearby BLE devices","volume":"6","author":"Cha Shi-Cho","year":"2018","unstructured":"Shi-Cho Cha, Ming-Shiung Chuang, Kuo-Hui Yeh, Zi-Jia Huang, and Chunhua Su. 2018. A user-friendly privacy framework for users to achieve consents with nearby BLE devices. IEEE Access 6 (2018), 20779\u201320787.","journal-title":"IEEE Access"},{"key":"e_1_3_3_21_2","first-page":"1","volume-title":"Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia","author":"Christin Delphine","year":"2012","unstructured":"Delphine Christin, Andreas Reinhardt, Matthias Hollick, and Kai Trumpold. 2012. Exploring user preferences for privacy interfaces in mobile sensing applications. In Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia. 1\u201310."},{"key":"e_1_3_3_22_2","unstructured":"Massimo Marchiori Lorrie Cranor Marc Langheinrich Martin Presler-Marshall and Joseph Reagle.2002. The platform for privacy preferences 1.0 (P3P1. 0) specification. World Wide Web Consortium Recommendation REC-P3P-20020416 28 (2002)."},{"issue":"2","key":"e_1_3_3_23_2","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1145\/1165734.1165735","article-title":"User interfaces for privacy agents","volume":"13","author":"Cranor Lorrie Faith","year":"2006","unstructured":"Lorrie Faith Cranor, Praveen Guduru, and Manjula Arjula. 2006. User interfaces for privacy agents. ACM Transactions on Computer-Human Interaction 13, 2 (2006), 135\u2013178.","journal-title":"ACM Transactions on Computer-Human Interaction"},{"issue":"3","key":"e_1_3_3_24_2","first-page":"613","article-title":"Tests for departure from normality. Empirical results for the distributions of b2 and b","volume":"60","author":"D\u2019agostino RALPH","year":"1973","unstructured":"RALPH D\u2019agostino and Egon S. Pearson. 1973. Tests for departure from normality. Empirical results for the distributions of b2 and b. Biometrika 60, 3 (1973), 613\u2013622.","journal-title":"Biometrika"},{"issue":"3","key":"e_1_3_3_25_2","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/MPRV.2018.03367733","article-title":"Personalized privacy assistants for the internet of things: Providing users with notice and choice","volume":"17","author":"Das Anupam","year":"2018","unstructured":"Anupam Das, Martin Degeling, Daniel Smullen, and Norman Sadeh. 2018. Personalized privacy assistants for the internet of things: Providing users with notice and choice. IEEE Pervasive Computing 17, 3 (2018), 35\u201346.","journal-title":"IEEE Pervasive Computing"},{"key":"e_1_3_3_26_2","first-page":"1","volume-title":"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems","author":"Dema Tshering","year":"2019","unstructured":"Tshering Dema, Margot Brereton, and Paul Roe. 2019. Designing participatory sensing with remote communities to conserve endangered species. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1\u201316."},{"key":"e_1_3_3_27_2","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1145\/3322276.3322309","volume-title":"Proceedings of the 2019 on Designing Interactive Systems Conference","author":"Denefleh Teresa","year":"2019","unstructured":"Teresa Denefleh, Arne Berger, Albrecht Kurze, Andreas Bischof, and Christopher Frauenberger. 2019. Sensorstation: Exploring simple sensor data in the context of a shared apartment. In Proceedings of the 2019 on Designing Interactive Systems Conference. 683\u2013695."},{"key":"e_1_3_3_28_2","unstructured":"Ring Video Doorbell. Featured Labels - IoT Security & Privacy Label. (n.d.). Retrieved from https:\/\/iotsecurityprivacy.org\/labels\/ Accessed on: 2024-02-12."},{"issue":"2","key":"e_1_3_3_29_2","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MSEC.2021.3132398","article-title":"An informative security and privacy \u201cnutrition\u201d label for internet of things devices","volume":"20","author":"Emami-Naeini Pardis","year":"2021","unstructured":"Pardis Emami-Naeini, Janarth Dheenadhayalan, Yuvraj Agarwal, and Lorrie Faith Cranor. 2021. An informative security and privacy \u201cnutrition\u201d label for internet of things devices. IEEE Security & Privacy 20, 2 (2021), 31\u201339.","journal-title":"IEEE Security & Privacy"},{"key":"e_1_3_3_30_2","first-page":"1","volume-title":"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems","author":"Emami-Naeini Pardis","year":"2019","unstructured":"Pardis Emami-Naeini, Henry Dixon, Yuvraj Agarwal, and Lorrie Faith Cranor. 2019. Exploring how privacy and security factor into iot device purchase behavior. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1\u201312."},{"key":"e_1_3_3_31_2","doi-asserted-by":"crossref","first-page":"100565","DOI":"10.1016\/j.ijcci.2023.100565","article-title":"Tangible data visualization of physical activity for children and adolescents: A qualitative study of temporal transition of experiences","volume":"35","author":"Eslambolchilar Parisa","year":"2023","unstructured":"Parisa Eslambolchilar, Katarzyna Stawarz, Nervo Verdezoto Dias, Melitta A. McNarry, Sam G. M. Crossley, Zoe Knowles, and Kelly A. Mackintosh. 2023. Tangible data visualization of physical activity for children and adolescents: A qualitative study of temporal transition of experiences. International Journal of Child-Computer Interaction 35 (2023), 100565.","journal-title":"International Journal of Child-Computer Interaction"},{"key":"e_1_3_3_32_2","volume-title":"Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems","author":"Feng Yuanyuan","year":"2021","unstructured":"Yuanyuan Feng, Yaxing Yao, and Norman Sadeh. 2021. A design space for privacy choices: Towards meaningful privacy control in the internet of things. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems."},{"key":"e_1_3_3_33_2","unstructured":"Simone Fischer H\u00fcbner and Harald Zwingelberg. 2010. UI prototypes: Policy Administration and Presentation-version2."},{"key":"e_1_3_3_34_2","unstructured":"Raspberry Pi Foundation. 2024. Raspberry Pi - Teach Learn and Make with Raspberry Pi. https:\/\/www.raspberrypi.org Accessed: 2024-12-02."},{"key":"e_1_3_3_35_2","first-page":"321","volume-title":"Proceedings of the 12th Symposium on Usable Privacy and Security","author":"Gluck Joshua","year":"2016","unstructured":"Joshua Gluck, Florian Schaub, Amy Friedman, Hana Habib, Norman Sadeh, Lorrie Faith Cranor, and Yuvraj Agarwal. 2016. How short is too short? Implications of length and framing on the effectiveness of privacy notices. In Proceedings of the 12th Symposium on Usable Privacy and Security. 321\u2013340."},{"key":"e_1_3_3_36_2","first-page":"335","article-title":"A brief defense of mass market software license agreements","volume":"22","author":"Gomulkiewicz Robert W.","year":"1996","unstructured":"Robert W. Gomulkiewicz and Mary L. Williamson. 1996. A brief defense of mass market software license agreements. Rutgers Computer & Tech. LJ 22 (1996), 335.","journal-title":"Rutgers Computer & Tech. LJ"},{"issue":"7","key":"e_1_3_3_37_2","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","article-title":"Internet of Things (IoT): A vision, architectural elements, and future directions","volume":"29","author":"Gubbi Jayavardhana","year":"2013","unstructured":"Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami. 2013. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems 29, 7 (2013), 1645\u20131660.","journal-title":"Future Generation Computer Systems"},{"key":"e_1_3_3_38_2","first-page":"57","volume-title":"Proceedings of the 19th Workshop on Privacy in the Electronic Society","author":"Guo Wentao","year":"2020","unstructured":"Wentao Guo, Jay Rodolitz, and Eleanor Birrell. 2020. Poli-see: An interactive tool for visualizing privacy policies. In Proceedings of the 19th Workshop on Privacy in the Electronic Society. 57\u201371."},{"key":"e_1_3_3_39_2","volume-title":"Evaluating the Usability of Privacy Choice Mechanisms","author":"Habib Hana","year":"2021","unstructured":"Hana Habib. 2021. Evaluating the Usability of Privacy Choice Mechanisms. Ph.D. Dissertation. Carnegie Mellon University."},{"key":"e_1_3_3_40_2","first-page":"273","volume-title":"Proceedings of the 18th Symposium on Usable Privacy and Security","author":"Habib Hana","year":"2022","unstructured":"Hana Habib and Lorrie Faith Cranor. 2022. Evaluating the usability of privacy choice mechanisms. In Proceedings of the 18th Symposium on Usable Privacy and Security. 273\u2013289."},{"key":"e_1_3_3_41_2","first-page":"1","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems","author":"Habib Hana","year":"2022","unstructured":"Hana Habib, Megan Li, Ellie Young, and Lorrie Cranor. 2022. \u201cOkay, whatever\u201d: An evaluation of cookie consent interfaces. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1\u201327."},{"issue":"1","key":"e_1_3_3_42_2","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1080\/14725860220137345","article-title":"Talking about pictures: A case for photo elicitation","volume":"17","author":"Harper Douglas","year":"2002","unstructured":"Douglas Harper. 2002. Talking about pictures: A case for photo elicitation. Visual Studies 17, 1 (2002), 13\u201326.","journal-title":"Visual Studies"},{"issue":"3","key":"e_1_3_3_43_2","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MPRV.2017.2940957","article-title":"The privacy landscape of pervasive computing","volume":"16","author":"Hong Jason","year":"2017","unstructured":"Jason Hong. 2017. The privacy landscape of pervasive computing. IEEE Pervasive Computing 16, 3 (2017), 40\u201348.","journal-title":"IEEE Pervasive Computing"},{"key":"e_1_3_3_44_2","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1145\/1124772.1124838","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"Hornecker Eva","year":"2006","unstructured":"Eva Hornecker and Jacob Buur. 2006. Getting a grip on tangible interaction: A framework on physical space and social interaction. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 437\u2013446."},{"key":"e_1_3_3_45_2","doi-asserted-by":"crossref","first-page":"1608","DOI":"10.1145\/2858036.2858059","volume-title":"Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems","author":"Houben Steven","year":"2016","unstructured":"Steven Houben, Connie Golsteijn, Sarah Gallacher, Rose Johnson, Saskia Bakker, Nicolai Marquardt, Licia Capra, and Yvonne Rogers. 2016. Physikit: Data engagement through physical ambient visualizations in the home. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. 1608\u20131619."},{"key":"e_1_3_3_46_2","first-page":"1539","volume-title":"Proceedings of the Extended Abstracts on Human Factors in Computing Systems","author":"Houben Steven","year":"2013","unstructured":"Steven Houben and Christian Weichel. 2013. Overcoming interaction blindness through curiosity objects. In Proceedings of the Extended Abstracts on Human Factors in Computing Systems. 1539\u20131544."},{"issue":"2","key":"e_1_3_3_47_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3397333","article-title":"Iot inspector: Crowdsourcing labeled network traffic from smart home devices at scale","volume":"4","author":"Huang Danny Yuxing","year":"2020","unstructured":"Danny Yuxing Huang, Noah Apthorpe, Frank Li, Gunes Acar, and Nick Feamster. 2020. Iot inspector: Crowdsourcing labeled network traffic from smart home devices at scale. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4, 2 (2020), 1\u201321.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_3_3_48_2","first-page":"464","volume-title":"Proceedings of the 2017 19th International Conference on Advanced Communication Technology","author":"Huh Seyoung","year":"2017","unstructured":"Seyoung Huh, Sangrae Cho, and Soohyung Kim. 2017. Managing IoT devices using blockchain platform. In Proceedings of the 2017 19th International Conference on Advanced Communication Technology. IEEE, 464\u2013467."},{"key":"e_1_3_3_49_2","first-page":"17","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"Hutchinson Hilary","year":"2003","unstructured":"Hilary Hutchinson, Wendy Mackay, Bo Westerlund, Benjamin B. Bederson, Allison Druin, Catherine Plaisant, Michel Beaudouin-Lafon, St\u00e9phane Conversy, Helen Evans, Heiko Hansen, et\u00a0al. 2003. Technology probes: Inspiring design for and with families. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 17\u201324."},{"key":"e_1_3_3_50_2","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1145\/258549.258715","volume-title":"Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems","author":"Ishii Hiroshi","year":"1997","unstructured":"Hiroshi Ishii and Brygg Ullmer. 1997. Tangible bits: Towards seamless interfaces between people, bits and atoms. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems. 234\u2013241."},{"key":"e_1_3_3_51_2","unstructured":"Jablotron. 2018. Privacy policy. (2018). Retrieved from https:\/\/gdpr.jablotron.cz\/files\/jcs\/20220315_Zasady_GDPR_EN.pdf Accessed: 2024-12-02."},{"key":"e_1_3_3_52_2","doi-asserted-by":"crossref","first-page":"1347","DOI":"10.1145\/3576915.3623089","volume-title":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security","author":"Jakkamsetti Sashidhar","year":"2023","unstructured":"Sashidhar Jakkamsetti, Youngil Kim, and Gene Tsudik. 2023. Caveat (IoT) emptor: Towards transparency of IoT device presence. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. 1347\u20131361."},{"issue":"4","key":"e_1_3_3_53_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3287049","article-title":"Evolving needs in iot control and accountability: A longitudinal study on smart home intelligibility","volume":"2","author":"Jakobi Timo","year":"2018","unstructured":"Timo Jakobi, Gunnar Stevens, Nico Castelli, Corinna Ogonowski, Florian Schaub, Nils Vindice, Dave Randall, Peter Tolmie, and Volker Wulf. 2018. Evolving needs in iot control and accountability: A longitudinal study on smart home intelligibility. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 4 (2018), 1\u201328.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_3_3_54_2","doi-asserted-by":"crossref","first-page":"3227","DOI":"10.1145\/2702123.2702180","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems","author":"Jansen Yvonne","year":"2015","unstructured":"Yvonne Jansen, Pierre Dragicevic, Petra Isenberg, Jason Alexander, Abhijit Karnik, Johan Kildal, Sriram Subramanian, and Kasper Hornb\u00e6k. 2015. Opportunities and challenges for data physicalization. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 3227\u20133236."},{"key":"e_1_3_3_55_2","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1109\/ICMLC.2004.1382266","volume-title":"Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No. 04EX826)","volume":"2","author":"Jiang Li","year":"2004","unstructured":"Li Jiang, Da-You Liu, and Bo Yang. 2004. Smart home research. In Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No. 04EX826), Vol. 2. IEEE, 659\u2013663."},{"key":"e_1_3_3_56_2","first-page":"78","volume-title":"Proceedings of the 2018 International Conference on System Modeling & Advancement in Research Trends","author":"Kaushik Keshav","year":"2018","unstructured":"Keshav Kaushik and Susheela Dahiya. 2018. Security and privacy in IoT based E-business and retail. In Proceedings of the 2018 International Conference on System Modeling & Advancement in Research Trends. IEEE, 78\u201381."},{"key":"e_1_3_3_57_2","first-page":"1","volume-title":"Proceedings of the 5th Symposium on Usable Privacy and Security","author":"Kelley Patrick Gage","year":"2009","unstructured":"Patrick Gage Kelley, Joanna Bresee, Lorrie Faith Cranor, and Robert W. Reeder. 2009. A \u201cnutrition label\u201d for privacy. In Proceedings of the 5th Symposium on Usable Privacy and Security. 1\u201312."},{"issue":"1","key":"e_1_3_3_58_2","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/s00779-021-01655-9","article-title":"The cardboard box study: Understanding collaborative data management in the connected home","volume":"26","author":"Kilic Damla","year":"2022","unstructured":"Damla Kilic, Andy Crabtree, Glenn McGarry, and Murray Goulden. 2022. The cardboard box study: Understanding collaborative data management in the connected home. Personal and Ubiquitous Computing 26, 1 (2022), 155\u2013176.","journal-title":"Personal and Ubiquitous Computing"},{"issue":"1","key":"e_1_3_3_59_2","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1111\/1467-9566.ep11347023","article-title":"The methodology of focus groups: The importance of interaction between research participants","volume":"16","author":"Kitzinger Jenny","year":"1994","unstructured":"Jenny Kitzinger. 1994. The methodology of focus groups: The importance of interaction between research participants. Sociology of Health & Illness 16, 1 (1994), 103\u2013121.","journal-title":"Sociology of Health & Illness"},{"key":"e_1_3_3_60_2","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1109\/ISESE.2004.1334914","volume-title":"Proceedings of the 2004 International Symposium on Empirical Software Engineering.","author":"Kontio Jyrki","year":"2004","unstructured":"Jyrki Kontio, Laura Lehtola, and Johanna Bragge. 2004. Using the focus group method in software engineering: Obtaining practitioner and user experiences. In Proceedings of the 2004 International Symposium on Empirical Software Engineering. IEEE, 271\u2013280."},{"key":"e_1_3_3_61_2","volume-title":"Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems","author":"Korayem Mohammed","year":"2016","unstructured":"Mohammed Korayem, Robert Templeman, Dennis Chen, David Crandall, and Apu Kapadia. 2016. Enhancing lifelogging privacy by detecting screens. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems."},{"key":"e_1_3_3_62_2","volume-title":"Focus Groups: A Practical Guide for Applied Research","author":"Krueger Richard A.","year":"2014","unstructured":"Richard A. Krueger. 2014. Focus Groups: A Practical Guide for Applied Research. Sage publications."},{"key":"e_1_3_3_63_2","first-page":"1169","volume-title":"Proceedings of the 28th  \\(\\lbrace\\) USENIX \\(\\rbrace\\)  Security Symposium ( \\(\\lbrace\\) USENIX \\(\\rbrace\\)  Security\u201919)","author":"Kumar Deepak","year":"2019","unstructured":"Deepak Kumar, Kelly Shen, Benton Case, Deepali Garg, Galina Alperovich, Dmitry Kuznetsov, Rajarshi Gupta, and Zakir Durumeric. 2019. All things considered: An analysis of IoT devices on home networks. In Proceedings of the 28th \\(\\lbrace\\) USENIX \\(\\rbrace\\) Security Symposium ( \\(\\lbrace\\) USENIX \\(\\rbrace\\) Security\u201919). 1169\u20131185."},{"key":"e_1_3_3_64_2","first-page":"237","volume-title":"Proceedings of the International Conference on Ubiquitous Computing","author":"Langheinrich Marc","year":"2002","unstructured":"Marc Langheinrich. 2002. A privacy awareness system for ubiquitous computing environments. In Proceedings of the International Conference on Ubiquitous Computing. Springer, 237\u2013245."},{"key":"e_1_3_3_65_2","volume-title":"Proceedings of the Interaction Design and Children Conference","author":"Lechelt Susan","year":"2020","unstructured":"Susan Lechelt, Yvonne Rogers, and Nicolai Marquardt. 2020. Coming to your senses: Promoting critical thinking about sensors through playful interaction in classrooms. In Proceedings of the Interaction Design and Children Conference."},{"issue":"6","key":"e_1_3_3_66_2","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1007\/s00779-004-0304-9","article-title":"Personal privacy through understanding and action: Five pitfalls for designers","volume":"8","author":"Lederer Scott","year":"2004","unstructured":"Scott Lederer, Jason I. Hong, Anind K. Dey, and James A. Landay. 2004. Personal privacy through understanding and action: Five pitfalls for designers. Personal and Ubiquitous Computing 8, 6 (2004), 440\u2013454.","journal-title":"Personal and Ubiquitous Computing"},{"issue":"1","key":"e_1_3_3_67_2","first-page":"1","article-title":"Confident privacy decision-making in IoT environments","volume":"27","author":"Lee Hosub","year":"2019","unstructured":"Hosub Lee and Alfred Kobsa. 2019. Confident privacy decision-making in IoT environments. ACM Transactions on Computer-Human Interaction 27, 1 (2019), 1\u201339.","journal-title":"ACM Transactions on Computer-Human Interaction"},{"key":"e_1_3_3_68_2","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1145\/3196709.3196768","volume-title":"Proceedings of the 2018 Designing Interactive Systems Conference","author":"Lefeuvre Kevin","year":"2018","unstructured":"Kevin Lefeuvre, Soeren Totzauer, Michael Storz, Albrecht Kurze, Andreas Bischof, and Arne Berger. 2018. Bricks, blocks, boxes, cubes, and dice: On the role of cubic shapes for the design of tangible interactive devices. In Proceedings of the 2018 Designing Interactive Systems Conference. 485\u2013496."},{"key":"e_1_3_3_69_2","first-page":"543","article-title":"The cost of reading privacy policies","volume":"4","author":"McDonald Aleecia M.","year":"2008","unstructured":"Aleecia M. McDonald and Lorrie Faith Cranor. 2008. The cost of reading privacy policies. Isjlp 4 (2008), 543.","journal-title":"Isjlp"},{"key":"e_1_3_3_70_2","doi-asserted-by":"crossref","first-page":"2417","DOI":"10.1145\/2851581.2892475","volume-title":"Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems","author":"Mehta Vikram","year":"2016","unstructured":"Vikram Mehta, Arosha K. Bandara, Blaine A. Price, and Bashar Nuseibeh. 2016. Privacy itch and scratch: On body privacy warnings and controls. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. 2417\u20132424."},{"key":"e_1_3_3_71_2","doi-asserted-by":"crossref","unstructured":"Mateusz Mikusz Steven Houben Nigel Davies Klaus Moessner and Marc Langheinrich. 2018. Raising awareness of IoT sensor deployments. (2018) 9 .","DOI":"10.1049\/cp.2018.0009"},{"key":"e_1_3_3_72_2","first-page":"1","volume-title":"Proceedings of the 24th European Conference on Pattern Languages of Programs","author":"Mohammadi Nazila Gol","year":"2019","unstructured":"Nazila Gol Mohammadi, Julia Pampus, and Maritta Heisel. 2019. Pattern-based incorporation of privacy preferences into privacy policies: Negotiating the conflicting needs of service providers and end-users. In Proceedings of the 24th European Conference on Pattern Languages of Programs. 1\u201312."},{"key":"e_1_3_3_73_2","first-page":"399","volume-title":"Proceedings of the 13th Symposium on Usable Privacy and Security","author":"Naeini Pardis Emami","year":"2017","unstructured":"Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman Sadeh. 2017. Privacy expectations and preferences in an IoT world. In Proceedings of the 13th Symposium on Usable Privacy and Security. 399\u2013412. Intelligent Series Introduction."},{"key":"e_1_3_3_74_2","unstructured":"Nextion. 2024. Intelligent Series Introduction. https:\/\/nextion.tech\/intelligent-series-introduction\/ Accessed: 2024-12-02."},{"key":"e_1_3_3_75_2","first-page":"383","volume-title":"Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction","author":"Oh Hyunjoo","year":"2015","unstructured":"Hyunjoo Oh and Mark D. Gross. 2015. Cube-in: A learning kit for physical computing basics. In Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction. 383\u2013386."},{"issue":"4","key":"e_1_3_3_76_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3287061","article-title":"The Internet of What? Understanding differences in perceptions and adoption for the Internet of Things","volume":"2","author":"Page Xinru","year":"2018","unstructured":"Xinru Page, Paritosh Bahirat, Muhammad I. Safi, Bart P. Knijnenburg, and Pamela Wisniewski. 2018. The Internet of What? Understanding differences in perceptions and adoption for the Internet of Things. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 4 (2018), 1\u201322.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"issue":"1","key":"e_1_3_3_77_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3478290","article-title":"IoT notary: Attestable sensor data capture in IoT environments","volume":"3","author":"Panwar Nisha","year":"2021","unstructured":"Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, and Ardalan Amiri Sani. 2021. IoT notary: Attestable sensor data capture in IoT environments. ACM Transactions on Internet of Things 3, 1 (2021), 1\u201330.","journal-title":"ACM Transactions on Internet of Things"},{"issue":"2","key":"e_1_3_3_78_2","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1145\/293411.293455","article-title":"The platform for privacy preferences","volume":"42","author":"Reagle Joseph","year":"1999","unstructured":"Joseph Reagle and Lorrie Faith Cranor. 1999. The platform for privacy preferences. Communications of the ACM 42, 2 (1999), 48\u201355.","journal-title":"Communications of the ACM"},{"key":"e_1_3_3_79_2","first-page":"1","volume-title":"Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems","author":"Reinhardt Daniel","year":"2021","unstructured":"Daniel Reinhardt, Johannes Borchard, and J\u00f6rn Hurtienne. 2021. Visual interactive privacy policy: The better choice?. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1\u201312."},{"key":"e_1_3_3_80_2","doi-asserted-by":"crossref","DOI":"10.17487\/RFC8446","volume-title":"The Transport Layer Security Protocol Version 1.3","author":"Rescorla Eric","year":"2018","unstructured":"Eric Rescorla. 2018. The Transport Layer Security Protocol Version 1.3. Technical Report."},{"key":"e_1_3_3_81_2","unstructured":"Ring. 2021. Privacy notice. (2021). Retrieved from https:\/\/en-uk.ring.com\/pages\/privacy-notice Accessed: 2024-12-02."},{"issue":"6","key":"e_1_3_3_82_2","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/s00779-008-0214-3","article-title":"Understanding and capturing people\u2019s privacy policies in a mobile social networking application","volume":"13","author":"Sadeh Norman","year":"2009","unstructured":"Norman Sadeh, Jason Hong, Lorrie Cranor, Ian Fette, Patrick Kelley, Madhu Prabaker, and Jinghai Rao. 2009. Understanding and capturing people\u2019s privacy policies in a mobile social networking application. Personal and Ubiquitous Computing 13, 6 (2009), 401\u2013412.","journal-title":"Personal and Ubiquitous Computing"},{"key":"e_1_3_3_83_2","unstructured":"Sapics. 2024. IP Location Database. https:\/\/github.com\/sapics\/ip-location-db Accessed: 2024-12-02."},{"key":"e_1_3_3_84_2","article-title":"Designing effective privacy notices and controls","author":"Schaub Florian","year":"2017","unstructured":"Florian Schaub, Rebecca Balebako, and Lorrie Faith Cranor. 2017. Designing effective privacy notices and controls. IEEE Internet Computing 21, 3 (2017), 70\u201377.","journal-title":"IEEE Internet Computing"},{"key":"e_1_3_3_85_2","first-page":"1","volume-title":"Proceedings of the 11th Symposium On Usable Privacy and Security","author":"Schaub Florian","year":"2015","unstructured":"Florian Schaub, Rebecca Balebako, Adam L. Durity, and Lorrie Faith Cranor. 2015. A design space for effective privacy notices. In Proceedings of the 11th Symposium On Usable Privacy and Security. 1\u201317."},{"issue":"3","key":"e_1_3_3_86_2","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1093\/biomet\/52.3-4.591","article-title":"An analysis of variance test for normality (complete samples)","volume":"52","author":"Shapiro Samuel Sanford","year":"1965","unstructured":"Samuel Sanford Shapiro and Martin B. Wilk. 1965. An analysis of variance test for normality (complete samples). Biometrika 52, 3\/4 (1965), 591\u2013611.","journal-title":"Biometrika"},{"key":"e_1_3_3_87_2","first-page":"1095","volume-title":"Proceedings of the 31st USENIX Security Symposium","author":"Sharma Rahul Anand","year":"2022","unstructured":"Rahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, and Vyas Sekar. 2022. Lumos: Identifying and localizing diverse hidden \\(\\lbrace\\) IoT \\(\\rbrace\\) devices in an unfamiliar environment. In Proceedings of the 31st USENIX Security Symposium. 1095\u20131112."},{"key":"e_1_3_3_88_2","volume-title":"Proceedings of the Annual Privacy Forum","author":"Shen Yun","year":"2019","unstructured":"Yun Shen and Pierre-Antoine Vervier. 2019. IoT security and privacy labels. In Proceedings of the Annual Privacy Forum. Springer."},{"issue":"4","key":"e_1_3_3_89_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3543513","article-title":"Who\u2019s controlling my device? Multi-user multi-device-aware access control system for shared smart home environment","volume":"3","author":"Sikder Amit Kumar","year":"2022","unstructured":"Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Hidayet Aksu, Patrick McDaniel, Engin Kirda, and A. Selcuk Uluagac. 2022. Who\u2019s controlling my device? Multi-user multi-device-aware access control system for shared smart home environment. ACM Transactions on Internet of Things 3, 4 (2022), 1\u201339.","journal-title":"ACM Transactions on Internet of Things"},{"key":"e_1_3_3_90_2","first-page":"1880","article-title":"Introduction: Privacy self-management and the consent dilemma","volume":"126","author":"Solove Daniel J.","year":"2012","unstructured":"Daniel J. Solove. 2012. Introduction: Privacy self-management and the consent dilemma. Harvard Law Review 126 (2012), 1880.","journal-title":"Harvard Law Review"},{"key":"e_1_3_3_91_2","first-page":"1","volume-title":"Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems","author":"Song Yunpeng","year":"2020","unstructured":"Yunpeng Song, Yun Huang, Zhongmin Cai, and Jason I. Hong. 2020. I\u2019m all eyes and ears: Exploring effective locators for privacy awareness in IoT scenarios. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1\u201313."},{"key":"e_1_3_3_92_2","first-page":"1","volume-title":"Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems","author":"Soro Alessandro","year":"2018","unstructured":"Alessandro Soro, Margot Brereton, Tshering Dema, Jessica L. Oliver, Min Zhen Chai, and Aloha May Hufana Ambe. 2018. The ambient birdhouse: An IoT device to discover birds and engage with nature. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1\u201313."},{"issue":"1","key":"e_1_3_3_93_2","article-title":"Privacy policy inference of user-uploaded images on content sharing sites","volume":"27","author":"Squicciarini Anna Cinzia","year":"2014","unstructured":"Anna Cinzia Squicciarini, Dan Lin, Smitha Sundareswaran, and Joshua Wede. 2014. Privacy policy inference of user-uploaded images on content sharing sites. IEEE Transactions on Knowledge and Data Engineering 27, 1 (2014), 193\u2013206.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_3_94_2","unstructured":"Seeed Studio. 2024. Grove System - Modular Ready-to-Use Tools for IoT and Electronics. https:\/\/wiki.seeedstudio.com\/Grove_System\/ Accessed: 2024-12-02."},{"key":"e_1_3_3_95_2","volume-title":"Proceedings of the 15th Symposium on Usable Privacy and Security","author":"Tabassum Madiha","year":"2019","unstructured":"Madiha Tabassum, Tomasz Kosinski, and Heather Richter Lipford. 2019. \u201cI don\u2019t own the data\u201d: End user perceptions of smart home device data practices and risks. In Proceedings of the 15th Symposium on Usable Privacy and Security."},{"key":"e_1_3_3_96_2","doi-asserted-by":"crossref","first-page":"1074","DOI":"10.1007\/978-1-4419-9863-7_166","article-title":"Knowledge inference","author":"Tari Luis","year":"2013","unstructured":"Luis Tari. 2013. Knowledge inference. Encyclopedia of Systems Biology (2013), 1074\u20131078.","journal-title":"Encyclopedia of Systems Biology"},{"key":"e_1_3_3_97_2","first-page":"1","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems","author":"Thakkar Parth Kirankumar","year":"2022","unstructured":"Parth Kirankumar Thakkar, Shijing He, Shiyu Xu, Danny Yuxing Huang, and Yaxing Yao. 2022. \u201cIt would probably turn into a social faux-pas\u201d: Users\u2019 and Bystanders\u2019 preferences of privacy awareness mechanisms in smart homes. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1\u201313."},{"key":"e_1_3_3_98_2","volume-title":"Proceedings of the Network and Distributed Systems Security Symposium","volume":"2020","author":"Trimananda Rahmadi","year":"2020","unstructured":"Rahmadi Trimananda, Janus Varmarken, Athina Markopoulou, and Brian Demsky. 2020. Packet-level signatures for smart home devices. In Proceedings of the Network and Distributed Systems Security Symposium, Vol. 2020."},{"key":"e_1_3_3_99_2","unstructured":"Protection Regulation. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council. Regulation (eu) 679 (2016) 1\u2013209."},{"key":"e_1_3_3_100_2","unstructured":"Carnegie Mellon University. Label Generator (beta). (n.d.). Retrieved from https:\/\/iotsecurityprivacy.org\/generate\/ Accessed: 2024-12-02."},{"key":"e_1_3_3_101_2","first-page":"1","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems Extended Abstracts","author":"Bussel Tjeu Van","year":"2022","unstructured":"Tjeu Van Bussel, Roy Van Den Heuvel, and Carine Lallemand. 2022. Habilyzer: Empowering office workers to investigate their working habits using an open-ended sensor kit. In Proceedings of the CHI Conference on Human Factors in Computing Systems Extended Abstracts. 1\u20138."},{"issue":"7","key":"e_1_3_3_102_2","article-title":"What happens to my data? A novel approach to informing users of data processing practices","volume":"17","author":"Berg Bibi Van den","year":"2012","unstructured":"Bibi Van den Berg and Simone Van der Hof. 2012. What happens to my data? A novel approach to informing users of data processing practices. First Monday 17, 7 (2012), 1\u201315.","journal-title":"First Monday"},{"key":"e_1_3_3_103_2","first-page":"1","volume-title":"Proceedings of the 2nd Annual Meeting of the Symposium on Human-Computer Interaction for Work","author":"Heuvel Roy Van Den","year":"2023","unstructured":"Roy Van Den Heuvel and Carine Lallemand. 2023. Personal informatics at the office: User-driven, situated sensor kits in the workplace. In Proceedings of the 2nd Annual Meeting of the Symposium on Human-Computer Interaction for Work. 1\u201313."},{"issue":"08","key":"e_1_3_3_104_2","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MC.2012.360","article-title":"Moving tangible interaction systems to the next level","volume":"46","author":"Hoven Elise Van Den","year":"2013","unstructured":"Elise Van Den Hoven, Evelien Van De Garde-Perik, Serge Offermans, Koen Van Boerdonk, and K. H. Lenssen. 2013. Moving tangible interaction systems to the next level. IEEE Annals of the History of Computing 46, 08 (2013), 70\u201376.","journal-title":"IEEE Annals of the History of Computing"},{"issue":"3","key":"e_1_3_3_105_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3603257","article-title":"FL4IoT: IoT device fingerprinting and identification using federated learning","volume":"4","author":"Wang Han","year":"2023","unstructured":"Han Wang, David Eklund, Alina Oprea, and Shahid Raza. 2023. FL4IoT: IoT device fingerprinting and identification using federated learning. ACM Transactions on Internet of Things 4, 3 (2023), 1\u201324.","journal-title":"ACM Transactions on Internet of Things"},{"issue":"1","key":"e_1_3_3_106_2","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1080\/15295036.2022.2143838","article-title":"Imagining the thoughtful home: Google Nest and logics of domestic recording","volume":"40","author":"White Carla","year":"2023","unstructured":"Carla White and James N. Gilmore. 2023. Imagining the thoughtful home: Google Nest and logics of domestic recording. Critical Studies in Media Communication 40, 1 (2023), 6\u201319.","journal-title":"Critical Studies in Media Communication"},{"issue":"2","key":"e_1_3_3_107_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3648479","article-title":"Getting it just right: Towards balanced utility, privacy, and equity in shared space sensing","volume":"5","author":"Xu Andrew","year":"2024","unstructured":"Andrew Xu, Jacob Biehl, and Adam Lee. 2024. Getting it just right: Towards balanced utility, privacy, and equity in shared space sensing. ACM Transactions on Internet of Things 5, 2 (2024), 1\u201326.","journal-title":"ACM Transactions on Internet of Things"},{"key":"e_1_3_3_108_2","volume-title":"Proceedings of the 3rd International Conference on Digital Interactive Media in Entertainment and Arts","author":"Zhao Jack","year":"2008","unstructured":"Jack Zhao and Andrew Vande Moere. 2008. Embodiment in data sculpture: A model of the physical visualization of information. In Proceedings of the 3rd International Conference on Digital Interactive Media in Entertainment and Arts."}],"container-title":["ACM Transactions on Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3722232","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3722232","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:04Z","timestamp":1750298224000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3722232"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,14]]},"references-count":107,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,5,31]]}},"alternative-id":["10.1145\/3722232"],"URL":"https:\/\/doi.org\/10.1145\/3722232","relation":{},"ISSN":["2691-1914","2577-6207"],"issn-type":[{"value":"2691-1914","type":"print"},{"value":"2577-6207","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,14]]},"assertion":[{"value":"2024-04-11","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-20","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-04-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}