{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T22:41:25Z","timestamp":1764715285756,"version":"3.44.0"},"reference-count":74,"publisher":"Association for Computing Machinery (ACM)","issue":"2","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2025,6,9]]},"abstract":"<jats:p>Smart-home devices, such as smart speakers and cameras, provide convenient home automation and media control, but the sensors that continuously collect data in users' homes create privacy concerns. To attempt to increase trust, device manufacturers and researchers have developed privacy features, such as indicator lights, hardware controls, and microphone jammers. To inform the design of more trustworthy products, we conducted a 489-participant online survey to understand how device type, brand, and privacy features impact trust. Our survey also examined whether providing more information about privacy features' limitations changed participants' perceptions. Contrary to our expectations, device brand did not significantly impact trust. Hardware mute controls were most effective at increasing trust. Participants expressed high intent to use familiar software-backed features, while expressing reservations about novel features proposed by researchers (e.g., jamming devices). Participants' reactions after seeing information about privacy features' limitations varied by feature, suggesting that the features' strengths and weaknesses are not equally well-understood. Based on our findings, we make several recommendations, including that device manufacturers and researchers explore making software-backed features more secure, as our results suggest that users may use those features even if they do not consider them reliable or trustworthy.<\/jats:p>","DOI":"10.1145\/3729480","type":"journal-article","created":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:21:56Z","timestamp":1750281716000},"page":"1-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["\"I would still use it but I wouldn't trust it\": Evaluating Mechanisms for Transparency and Control for Smart-Home Sensors"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0396-1969","authenticated-orcid":false,"given":"Ben","family":"Weinshel","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9304-6080","authenticated-orcid":false,"given":"Yuvraj","family":"Agarwal","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8209-6792","authenticated-orcid":false,"given":"Lujo","family":"Bauer","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,18]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445122"},{"volume-title":"Users of Different Smartphone and Smart-Speaker Platforms. In Seventeenth Symposium on Usable Privacy and Security (SOUPS).","author":"Abrokwa Desiree","key":"e_1_2_1_2_1","unstructured":"Desiree Abrokwa, Shruti Das, Omer Akgul, and Michelle L. Mazurek. 2021. Comparing Security and Privacy Attitudes Among U.S. Users of Different Smartphone and Smart-Speaker Platforms. In Seventeenth Symposium on Usable Privacy and Security (SOUPS)."},{"key":"e_1_2_1_3_1","volume-title":"A Replication of Beyond the Turk: Alternative Platforms for Crowdsourcing Behavioral Research - Sometimes Preferable to Student Groups. AIS Transactions on Replication Research","author":"Adams Troy","year":"2020","unstructured":"Troy Adams, Yuanxia Li, and Hao Liu. 2020. A Replication of Beyond the Turk: Alternative Platforms for Crowdsourcing Behavioral Research - Sometimes Preferable to Student Groups. AIS Transactions on Replication Research (2020)."},{"key":"e_1_2_1_4_1","volume-title":"Analysis of Ordinal Categorical Data","author":"Agresti Alan","unstructured":"Alan Agresti. 2012. Analysis of Ordinal Categorical Data (2nd ed. ed.). Wiley.","edition":"2"},{"key":"e_1_2_1_5_1","volume":"202","author":"Ahmad Imtiaz","unstructured":"Imtiaz Ahmad, Taslima Akter, Zachary Buher, Rosta Farzan, Apu Kapadia, and Adam J. Lee. 2022. Tangible Privacy for Smart Voice Assistants: Bystanders' Perceptions of Physical Device Controls. Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022).","journal-title":"Adam J. Lee."},{"key":"e_1_2_1_6_1","volume":"202","author":"Ahmad Imtiaz","unstructured":"Imtiaz Ahmad, Rosta Farzan, Apu Kapadia, and Adam J. Lee. 2020. Tangible Privacy: Towards User-Centric Sensor Designs for Bystander Privacy. Proceedings of the ACM on Human-Computer Interaction 4, CSCW2 (2020).","journal-title":"Adam J. Lee."},{"key":"e_1_2_1_7_1","volume-title":"Preech: A System for Privacy-Preserving Speech Transcription. In 29th USENIX Security Symposium.","author":"Ahmed Shimaa","year":"2020","unstructured":"Shimaa Ahmed, Amrita Roy Chowdhury, Kassem Fawaz, and Parmesh Ramanathan. 2020. Preech: A System for Privacy-Preserving Speech Transcription. In 29th USENIX Security Symposium."},{"key":"e_1_2_1_8_1","unstructured":"Amazon. [n.d.]. Alexa Privacy. https:\/\/www.amazon.com\/Alexa-Privacy-Hub\/b?node=19149155011"},{"key":"e_1_2_1_9_1","unstructured":"Amazon. [n.d.]. How Alexa works: Microphone on off button. https:\/\/www.amazon.com\/b\/?node=23608613011"},{"key":"e_1_2_1_10_1","volume-title":"Search, and IoT: How People (Really) Use Voice Assistants. ACM Transactions on Computer-Human Interaction","author":"Ammari Tawfiq","year":"2019","unstructured":"Tawfiq Ammari, Jofish Kaye, Janice Y. Tsai, and Frank Bentley. 2019. Music, Search, and IoT: How People (Really) Use Voice Assistants. ACM Transactions on Computer-Human Interaction (2019)."},{"key":"e_1_2_1_11_1","unstructured":"Apple. 2019. Improving Siri's privacy protections. https:\/\/www.apple.com\/newsroom\/2019\/08\/improving-siris-privacy-protections\/"},{"key":"e_1_2_1_12_1","unstructured":"Apple. 2024. HomePod Privacy and Security. https:\/\/support.apple.com\/guide\/homepod\/privacy-and-security-apd99ee29027\/homepod"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546155.3546657"},{"key":"e_1_2_1_14_1","volume-title":"23rd USENIX Security Symposium.","author":"Brocker Matthew","year":"2014","unstructured":"Matthew Brocker and Stephen Checkoway. 2014. iSeeYou: Disabling the MacBook Webcam Indicator LED. In 23rd USENIX Security Symposium."},{"key":"e_1_2_1_15_1","volume-title":"Trust in the smart home: Findings from a nationally representative survey in the UK. PLOS ONE","author":"Cannizzaro Sara","year":"2020","unstructured":"Sara Cannizzaro, Rob Procter, Sinong Ma, and Carsten Maple. 2020. Trust in the smart home: Findings from a nationally representative survey in the UK. PLOS ONE (2020)."},{"key":"e_1_2_1_16_1","first-page":"3","volume-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4","author":"Cha Narae","year":"2020","unstructured":"Narae Cha, Auk Kim, Cheul Young Park, Soowon Kang, Mingyu Park, Jae-Gil Lee, Sangsu Lee, and Uichin Lee. 2020. Hello There! Is Now a Good Time to Talk? Opportune Moments for Proactive Interactions with Smart Speakers. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4, 3 (2020)."},{"key":"e_1_2_1_17_1","volume-title":"PowerCut and Obfuscator: An Exploration of the Design Space for Privacy-Preserving Interventions for Smart Speakers. In Seventeenth Symposium on Usable Privacy and Security (SOUPS).","author":"Chandrasekaran Varun","year":"2021","unstructured":"Varun Chandrasekaran, Suman Banerjee, Bilge Mutlu, and Kassem Fawaz. 2021. PowerCut and Obfuscator: An Exploration of the Design Space for Privacy-Preserving Interventions for Smart Speakers. In Seventeenth Symposium on Usable Privacy and Security (SOUPS)."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642011"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376304"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0060"},{"key":"e_1_2_1_21_1","volume-title":"Amazon Workers Are Listening to What You Tell Alexa. Bloomberg","author":"Day Matt","year":"2019","unstructured":"Matt Day, Giles Turner, and Natalia Drozdiak. 2019. Amazon Workers Are Listening to What You Tell Alexa. Bloomberg (2019). https:\/\/www.bloomberg.com\/news\/articles\/2019-04-10\/is-anyone-listening-to-you-on-alexa-a-global-team-reviews-audio"},{"key":"e_1_2_1_22_1","volume-title":"Powering for Privacy: Improving User Trust in Smart Speaker Microphones with Intentional Powering and Perceptible Assurance. In 32nd USENIX Security Symposium.","author":"Do Youngwook","year":"2023","unstructured":"Youngwook Do, Nivedita Arora, Ali Mirzazadeh, Injoo Moon, Eryue Xu, Zhihan Zhang, Gregory D. Abowd, and Sauvik Das. 2023. Powering for Privacy: Improving User Trust in Smart Speaker Microphones with Intentional Powering and Perceptible Assurance. In 32nd USENIX Security Symposium."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3494983"},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI).","author":"Egelman Serge","year":"2015","unstructured":"Serge Egelman, Raghudeep Kannavara, and Richard Chow. 2015. Is This Thing On? Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI)."},{"key":"e_1_2_1_25_1","unstructured":"electronupdate. 2021. Amazon Echo Flex: Microphone Mute Real or Fake? https:\/\/electronupdate.blogspot.com\/2021\/01\/amazon-echo-flex-microphone-mute-real.html"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00043"},{"key":"e_1_2_1_27_1","volume-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS).","author":"Emami-Naeini Pardis","year":"2017","unstructured":"Pardis Emami-Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. In Thirteenth Symposium on Usable Privacy and Security (SOUPS)."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00112"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/3620237.3620322"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-020-00519-2"},{"key":"e_1_2_1_32_1","volume-title":"Can I Trust You? Exploring Consumer Paths to Trust in Smart Voice-Interaction Technologies. Journal of the Association for Consumer Research","author":"Foehr Jonas","year":"2020","unstructured":"Jonas Foehr and Claas Christian Germelmann. 2020. Alexa, Can I Trust You? Exploring Consumer Paths to Trust in Smart Voice-Interaction Technologies. Journal of the Association for Consumer Research (2020)."},{"key":"e_1_2_1_33_1","unstructured":"Google. [n. d.]. Google Nest Security & Privacy Commitments. https:\/\/safety.google\/nest\/"},{"volume-title":"The Role of Professional Product Reviewers in Evaluating Security and Privacy. In 32nd USENIX Security Symposium.","author":"Guo Wentao","key":"e_1_2_1_34_1","unstructured":"Wentao Guo, Jason Walter, and Michelle L. Mazurek. 2023. The Role of Professional Product Reviewers in Evaluating Security and Privacy. In 32nd USENIX Security Symposium."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2020.12.012"},{"key":"e_1_2_1_36_1","volume-title":"Apple contractors 'regularly hear confidential details' on Siri recordings. The Guardian","author":"Hern Alex","year":"2019","unstructured":"Alex Hern. 2019. Apple contractors 'regularly hear confidential details' on Siri recordings. The Guardian (2019). https:\/\/www.theguardian.com\/technology\/2019\/jul\/26\/apple-contractors-regularly-hear-confidential-details-on-siri-recordings"},{"key":"e_1_2_1_37_1","volume-title":"Activate This 'Bracelet of Silence' and Alexa Can't Eavesdrop. The New York Times","author":"Hill Kashmir","year":"2020","unstructured":"Kashmir Hill. 2020. Activate This 'Bracelet of Silence' and Alexa Can't Eavesdrop. The New York Times (2020). https:\/\/www.nytimes.com\/2020\/02\/14\/technology\/alexa-jamming-bracelet-privacy-armor.html"},{"volume-title":"Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems.","author":"Jin Haojian","key":"e_1_2_1_38_1","unstructured":"Haojian Jin, Boyuan Guo, Rituparna Roychoudhury, Yaxing Yao, Swarun Kumar, Yuvraj Agarwal, and Jason I. Hong. 2022. Exploring the Needs of Users for Supporting Privacy-Protective Behaviors in Smart Homes. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems."},{"volume-title":"2022 IEEE Symposium on Security and Privacy (SP).","author":"Jin Haojian","key":"e_1_2_1_39_1","unstructured":"Haojian Jin, Gram Liu, David Hwang, Swarun Kumar, Yuvraj Agarwal, and Jason I. Hong. 2022. Peekaboo: A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes. In 2022 IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_2_1_40_1","unstructured":"Bj\u00f8rn Karmann. 2018. Project Alias. https:\/\/bjoernkarmann.dk\/project\/project_alias"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"e_1_2_1_42_1","first-page":"3","volume-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4","author":"Lee Sunok","year":"2020","unstructured":"Sunok Lee, Minji Cho, and Sangsu Lee. 2020. What If Conversational Agents Became Invisible? Comparing Users' Mental Models According to Physical Entity of AI Speaker. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4, 3 (2020)."},{"key":"e_1_2_1_43_1","volume-title":"What Influences the Perceived Trust of a Voice-Enabled Smart Home System: An Empirical Study. Sensors","author":"Liu Yuqi","year":"2021","unstructured":"Yuqi Liu, Yan Gan, Yao Song, and Jing Liu. 2021. What Influences the Perceived Trust of a Voice-Enabled Smart Home System: An Empirical Study. Sensors (2021)."},{"key":"e_1_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Nathan Malkin. 2019. Privacy controls for always-listening devices. Ph.D. Dissertation. University of California Berkeley.","DOI":"10.1145\/3368860.3368867"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0068"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555613"},{"key":"e_1_2_1_47_1","volume-title":"examine the variables influencing the use of artificial intelligent in-home voice assistants. Computers in Human Behavior","author":"McLean Graeme","year":"2019","unstructured":"Graeme McLean and Kofi Osei-Frimpong. 2019. Hey Alexa ... examine the variables influencing the use of artificial intelligent in-home voice assistants. Computers in Human Behavior (2019)."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025735"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0026"},{"key":"e_1_2_1_50_1","volume-title":"To trust or not to trust smart consumer products: a literature review of trust-building factors. Management Review Quarterly","author":"Michler Oliver","year":"2020","unstructured":"Oliver Michler, Reinhold Decker, and Christian Stummer. 2020. To trust or not to trust smart consumer products: a literature review of trust-building factors. Management Review Quarterly (2020)."},{"key":"e_1_2_1_51_1","unstructured":"MSCHF. [n. d.]. Alexagate. https:\/\/alexagate.com"},{"key":"e_1_2_1_52_1","volume-title":"Proceedings on Privacy Enhancing Technologies 2024","author":"Garrido Gonzalo Munilla","year":"2024","unstructured":"Gonzalo Munilla Garrido, Vivek Nair, and Dawn Song. 2024. SoK: Data Privacy in Virtual Reality. Proceedings on Privacy Enhancing Technologies 2024, 1 (2024)."},{"key":"e_1_2_1_53_1","unstructured":"NCC Group ioXt Validation Lab. 2021. Nest Mini ioXt Device Assessment. https:\/\/storage.googleapis.com\/support-kms-prod\/aUdYcY7JigJgD1vsMuMZujo4QqahlGthh6xi"},{"key":"e_1_2_1_54_1","volume-title":"You can now buy an Amazon Echo add-on that stops Alexa from listening","author":"Newman Jared","year":"2020","unstructured":"Jared Newman. 2020. You can now buy an Amazon Echo add-on that stops Alexa from listening. Fast Company (2020). https:\/\/www.fastcompany.com\/90532150\/you-can-now-buy-an-amazon-echo-add-on-that-stops-alexa-from-listening\/"},{"key":"e_1_2_1_55_1","unstructured":"Paranoid. [n. d.]. Paranoid Home Device. https:\/\/paranoid.com\/products"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610907"},{"key":"e_1_2_1_57_1","volume-title":"Beyond the Turk: Alternative platforms for crowdsourcing behavioral research. Journal of Experimental Social Psychology","author":"Peer Eyal","year":"2017","unstructured":"Eyal Peer, Laura Brandimarte, Sonam Samat, and Alessandro Acquisti. 2017. Beyond the Turk: Alternative platforms for crowdsourcing behavioral research. Journal of Experimental Social Psychology (2017)."},{"key":"e_1_2_1_58_1","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI).","author":"Portnoff Rebecca S.","year":"2015","unstructured":"Rebecca S. Portnoff, Linda N. Lee, Serge Egelman, Pratyush Mishra, Derek Leung, and David Wagner. 2015. Somebody's Watching Me? Assessing the Effectiveness of Webcam Indicator Lights. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI)."},{"volume-title":"2019 IEEE Symposium on Security and Privacy (SP).","author":"Redmiles Elissa M.","key":"e_1_2_1_59_1","unstructured":"Elissa M. Redmiles, Sean Kross, and Michelle L. Mazurek. 2019. How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples. In 2019 IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081366"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0007"},{"key":"e_1_2_1_62_1","volume-title":"31st USENIX Security Symposium.","author":"Sharma Rahul Anand","year":"2022","unstructured":"Rahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, and Vyas Sekar. 2022. Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment. In 31st USENIX Security Symposium."},{"key":"e_1_2_1_63_1","unstructured":"Akash Deep Singh Brian Wang Luis Garcia Xiang Chen and Mani Srivastava. 2024. Understanding factors behind IoT privacy - A user's perspective on RF sensors. http:\/\/arxiv.org\/abs\/2401.08037"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430727"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369807"},{"key":"e_1_2_1_66_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS).","author":"Tabassum Madiha","year":"2019","unstructured":"Madiha Tabassum, Tomasz Kosinski, and Heather Richter Lipford. 2019. \"I don't own the data\": End User Perceptions of Smart Home Device Data Practices and Risks. In Fifteenth Symposium on Usable Privacy and Security (SOUPS)."},{"key":"e_1_2_1_67_1","volume-title":"The External Validity of Online Privacy and Security Surveys. In Eighteenth Symposium on Usable Privacy and Security (SOUPS).","author":"Tang Jenny","year":"2022","unstructured":"Jenny Tang, Eleanor Birrell, and Ada Lerner. 2022. Replication: How Well Do My Results Generalize Now? The External Validity of Online Privacy and Security Surveys. In Eighteenth Symposium on Usable Privacy and Security (SOUPS)."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502137"},{"key":"e_1_2_1_69_1","volume-title":"Taking Control of Sensor Privacy Through Isolation and Amnesia. In 32nd USENIX Security Symposium.","author":"Vaere Piet De","year":"2023","unstructured":"Piet De Vaere and Adrian Perrig. 2023. Hey Kimya, Is My Smart Speaker Spying on Me? Taking Control of Sensor Privacy Through Isolation and Amnesia. In 32nd USENIX Security Symposium."},{"key":"e_1_2_1_70_1","volume-title":"Lente Van Hee, and Ruben Van Den Heuvel","author":"Verheyden Tim","year":"2019","unstructured":"Tim Verheyden, Denny Baert, Lente Van Hee, and Ruben Van Den Heuvel. 2019. Google employees are eavesdropping, even in your living room, VRT NWS has discovered. VRT NWS (2019). https:\/\/www.vrt.be\/vrtnws\/en\/2019\/07\/10\/google-employees-are-eavesdropping-even-in-flemish-living-rooms\/"},{"key":"e_1_2_1_71_1","unstructured":"Pete Warden Matthew Stewart Brian Plancher Colby Banbury Shvetank Prakash Emma Chen Zain Asgar Sachin Katti and Vijay Janapa Reddi. 2022. Machine Learning Sensors. http:\/\/arxiv.org\/abs\/2206.03266"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616616"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179480"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3729480","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T12:22:23Z","timestamp":1755865343000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3729480"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,9]]},"references-count":74,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,6,9]]}},"alternative-id":["10.1145\/3729480"],"URL":"https:\/\/doi.org\/10.1145\/3729480","relation":{},"ISSN":["2474-9567"],"issn-type":[{"type":"electronic","value":"2474-9567"}],"subject":[],"published":{"date-parts":[[2025,6,9]]},"assertion":[{"value":"2025-06-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}