{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T22:32:50Z","timestamp":1757629970063,"version":"3.44.0"},"reference-count":73,"publisher":"Association for Computing Machinery (ACM)","issue":"5","funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2219354"],"award-info":[{"award-number":["2219354"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,9,30]]},"abstract":"<jats:p>\n            Smartphones allow users to control the sharing of their data with apps according to their privacy preferences. Yet, users struggle to enact their privacy preferences via the available permission settings. To understand whether these difficulties result from inaccurate understanding and\/or suboptimal interface design of the permissions manager, we designed and administered an online questionnaire to smartphone users from the United States (\n            <jats:italic toggle=\"yes\">n<\/jats:italic>\n            = 151). We asked the participants to rate and rank the importance of the permissions commonly available on smartphones and to describe their understanding of what each setting controls. We found that a majority of users deem some permissions as important or unimportant, with the importance of other permissions varying across users based on use and privacy concerns. Our findings indicate that users misunderstand several permissions and express unfamiliarity with how some of them operate. We apply the insight from our study to derive suggestions to enhance smartphone permission managers by promoting personalized and efficient user interaction and more accurate user comprehension of functional operation.\n          <\/jats:p>","DOI":"10.1145\/3743739","type":"journal-article","created":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T14:28:48Z","timestamp":1757428128000},"page":"1-46","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Understanding User Prioritization and Comprehension of Smartphone Permissions MHCI035"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-2211-6145","authenticated-orcid":false,"given":"Manila","family":"Devaraja","sequence":"first","affiliation":[{"name":"Kahlert School of Computing","place":["Salt Lake City, USA"]},{"name":"University of Utah","place":["Salt Lake City, USA"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8214-0765","authenticated-orcid":false,"given":"Sameer","family":"Patil","sequence":"additional","affiliation":[{"name":"Kahlert School of Computing","place":["Salt Lake City, USA"]},{"name":"University of Utah","place":["Salt Lake City, USA"]}]}],"member":"320","published-online":{"date-parts":[[2025,9,9]]},"reference":[{"key":"e_1_3_5_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/2646584.2646585"},{"key":"e_1_3_5_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35822-736"},{"key":"e_1_3_5_4_2","doi-asserted-by":"publisher","unstructured":"Haya Altuwaijri and Sanaa Ghouzali. 2020. Android data storage security: A review. Journal of King Saud University - Computer and Information Sciences 32 5 (2020) 543\u2013552. 10.1016\/j.jksuci.2018.07.004","DOI":"10.1016\/j.jksuci.2018.07.004"},{"key":"e_1_3_5_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823922"},{"key":"e_1_3_5_6_2","unstructured":"Android. 2020. App privacy labels now live on the App Store. https:\/\/developer.apple.com\/news\/?id=3wann9gh Accessed: 2025-06-23."},{"key":"e_1_3_5_7_2","unstructured":"Android. 2025. Android privacy settings and permissions. https:\/\/www.android.com\/intl\/en_us\/safety\/privacy\/ Accessed: 2025-06-23."},{"key":"e_1_3_5_8_2","unstructured":"Android Developer Documentation. 2025. Auto-reset permissions from unused apps. https:\/\/developer.android.com\/about\/versions\/11\/privacy\/permissions#auto-reset Accessed: 2025-06-23."},{"key":"e_1_3_5_9_2","unstructured":"Android Help. 2025. Change app permissions on your Android phone. https:\/\/support.google.com\/android\/answer\/9431959 Accessed: 2025-06-23."},{"key":"e_1_3_5_10_2","doi-asserted-by":"publisher","unstructured":"Sarah Anrijs Koen Ponnet and Lieven De\u00a0Marez. 2020. Development and psychometric properties of the Digital Difficulties Scale (DDS): An instrument to measure who is disadvantaged to fulfill basic needs by experiencing difficulties in using a smartphone or computer. PLOS ONE 15 5 Article MHCI035 (May 2020) 15\u00a0pages. 10.1371\/journal.pone.0233891","DOI":"10.1371\/journal.pone.0233891"},{"key":"e_1_3_5_11_2","unstructured":"Apple Developer Documentation. 2025. Requesting access to protected resources. https:\/\/developer.apple.com\/documentation\/uikit\/requesting-access-to-protected-resources Accessed: 2025-06-23."},{"key":"e_1_3_5_12_2","unstructured":"Apple Support. 2025. About App Privacy Report. https:\/\/support.apple.com\/en-us\/102188 Accessed: 2025-06-23."},{"key":"e_1_3_5_13_2","unstructured":"Apple Support. 2025. About privacy and Location Services in iOS iPadOS and watchOS. https:\/\/support.apple.com\/en-us\/102515 Accessed 2025-06-23."},{"key":"e_1_3_5_14_2","doi-asserted-by":"publisher","unstructured":"Mehrnaz Ataei Auriol Degbelo and Christian Kray. 2018. Privacy theory in practice: Designing a user interface for managing location privacy on mobile devices. Journal of Location Based Services 12 3\u20134 (2018) 141\u2013178. 10.1080\/17489725.2018.1511839","DOI":"10.1080\/17489725.2018.1511839"},{"key":"e_1_3_5_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3172944.3172982"},{"key":"e_1_3_5_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501616"},{"key":"e_1_3_5_17_2","doi-asserted-by":"publisher","unstructured":"Florian Bemmann and Sven Mayer. 2024. The Impact of Data Privacy on Users\u2019 Smartphone App Adoption Decisions. Proc. ACM Hum.-Comput. Interact. 8 MHCI Article MHCI035 (Sept. 2024) 23\u00a0pages. 10.1145\/3676525","DOI":"10.1145\/3676525"},{"key":"e_1_3_5_18_2","doi-asserted-by":"publisher","unstructured":"Florian Bemmann Helena Stoll and Sven Mayer. 2024. Privacy Slider: Fine-Grain Privacy Control for Smartphones. Proc. ACM Hum.-Comput. Interact. 8 MHCI Article MHCI035 (Sept. 2024) 31\u00a0pages. 10.1145\/3676519","DOI":"10.1145\/3676519"},{"key":"e_1_3_5_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-129"},{"key":"e_1_3_5_20_2","doi-asserted-by":"publisher","unstructured":"Patrick Bombik Tom Wenzel Jens Grossklags and Sameer Patil. 2022. A multi-region investigation of the perceptions and use of smart home devices. Proceedings on Privacy Enhancing Technologies 2022 3 (2022) 6\u201332. 10.56553\/popets-2022-0060","DOI":"10.56553\/popets-2022-0060"},{"key":"e_1_3_5_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW55150.2022.00023"},{"key":"e_1_3_5_22_2","unstructured":"Jan\u00a0Lauren Boyles Aaron Smith and Mary Madden. 2012. Privacy and Data Management on Mobile Devices. (Sep 2012). https:\/\/www.pewresearch.org\/internet\/2012\/09\/05\/privacy-and-data-management-on-mobile-devices\/"},{"key":"e_1_3_5_23_2","doi-asserted-by":"publisher","unstructured":"Virginia Braun and Victoria\u00a0Clarke and. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology 3 2 (2006) 77\u2013101. 10.1191\/1478088706qp063oa","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_5_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5251-4103"},{"key":"e_1_3_5_25_2","series-title":"(AMCIS 2017)","volume-title":"2017 Americas Conference on Information Systems","author":"Buck Christoph","year":"2017","unstructured":"Christoph Buck and Simone Burster. 2017. App Information Privacy Concerns. In 2017 Americas Conference on Information Systems (Boston, MA, USA) (AMCIS 2017). Association for Information Systems, Atlanta, GA, USA. https:\/\/aisel.aisnet.org\/amcis2017\/InformationSystems\/Presentations\/17"},{"key":"e_1_3_5_26_2","series-title":"(USENIX Security \u201921)","first-page":"803","volume-title":"30th USENIX Security Symposium","author":"Cao Weicheng","year":"2021","unstructured":"Weicheng Cao, Chunqiu Xia, Sai\u00a0Teja Peddinti, David Lie, Nina Taft, and Lisa\u00a0M. Austin. 2021. A Large Scale Study of User Behavior, Expectations and Engagement with Android Permissions. In 30th USENIX Security Symposium(USENIX Security \u201921). USENIX Association, 803\u2013820. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/cao-weicheng"},{"key":"e_1_3_5_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335358"},{"key":"e_1_3_5_28_2","doi-asserted-by":"publisher","unstructured":"Robert\u00a0E. Crossler and France B\u00e9langer. 2019. Why Would I Use Location-Protective Settings on My Smartphone? Motivating Protective Behaviors and the Existence of the Privacy Knowledge\u2013Belief Gap. Information Systems Research 30 3 (2019) 995\u20131006. 10.1287\/isre.2019.0846","DOI":"10.1287\/isre.2019.0846"},{"key":"e_1_3_5_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300027"},{"key":"e_1_3_5_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39498-010"},{"key":"e_1_3_5_31_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2025.230544"},{"key":"e_1_3_5_32_2","series-title":"(USENIX Security \u201921)","first-page":"785","volume-title":"30th USENIX Security Symposium","author":"Elbitar Yusra","year":"2021","unstructured":"Yusra Elbitar, Michael Schilling, Trung\u00a0Tin Nguyen, Michael Backes, and Sven Bugiel. 2021. Explanation Beats Context: The Effect of Timing & Rationales on Users\u2019 Runtime Permission Decisions. In 30th USENIX Security Symposium(USENIX Security \u201921). USENIX Association, 785\u2013802. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/elbitar"},{"key":"e_1_3_5_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660270"},{"key":"e_1_3_5_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_5_35_2","unstructured":"Suzanne Frey. 2022. Get more information about your apps in Google Play. https:\/\/blog.google\/products\/google-play\/data-safety\/ Accessed: 2025-06-23."},{"key":"e_1_3_5_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517504"},{"key":"e_1_3_5_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3342428.3342690"},{"key":"e_1_3_5_38_2","doi-asserted-by":"publisher","unstructured":"Marco Furini Silvia Mirri Manuela Montangero and Catia Prandi. 2020. Privacy Perception when Using Smartphone Applications. Mobile Networks and Applications 25 3 (2020) 1055\u20131061. 10.1007\/s11036-020-01529-z","DOI":"10.1007\/s11036-020-01529-z"},{"key":"e_1_3_5_39_2","doi-asserted-by":"publisher","unstructured":"Jason\u00a0I. Hong Yuvraj Agarwal Matt Fredrikson Mike Czapik Shawn Hanna Swarup Sahoo Judy Chun Won-Woo Chung Aniruddh Iyer Ally Liu Shen Lu Rituparna Roychoudhury Qian Wang Shan Wang Siqi Wang Vida Zhang Jessica Zhao Yuan Jiang Haojian Jin Sam Kim Evelyn Kuo Tianshi Li Jinping Liu Yile Liu and Robert Zhang. 2021. The Design of the User Interfaces for Privacy Enhancements for Android. arxiv:https:\/\/arXiv.org\/abs\/2104.12032\u00a0[cs.CR] 10.48550\/arXiv.2104.12032","DOI":"10.48550\/arXiv.2104.12032"},{"key":"e_1_3_5_40_2","unstructured":"iPhone User Guide. 2025. Control access to your contacts on iPhone. https:\/\/support.apple.com\/en-gb\/guide\/iphone\/iph9536aa9a5\/ios#:\u00a0:text=On%20iPhone%2C%20you%20control%20which individual%20contacts%2C%20then%20tap%20Done.Accessed: 2025-06-23."},{"key":"e_1_3_5_41_2","doi-asserted-by":"publisher","unstructured":"Qatrunnada Ismail Tousif Ahmed Kelly Caine Apu Kapadia and Michael Reiter. 2017. To permit or Not to Permit That is the Usability Question: Crowdsourcing Mobile Apps\u2019 Privacy Permission Settings. Proceedings on Privacy Enhancing Technologies 2017 (2017) 119\u2013137. Issue 4. 10.1515\/popets-2017-0041","DOI":"10.1515\/popets-2017-0041"},{"key":"e_1_3_5_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660398.2660419"},{"key":"e_1_3_5_43_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34638-56"},{"key":"e_1_3_5_44_2","unstructured":"Rehana\u00a0Masrur Khan and Masrur\u00a0Alam Khan. 2007. Academic Sojourners Culture Shock and Intercultural Adaptation: A Trend Analysis. Studies About Languages (2007) 38\u201346. Issue 10."},{"key":"e_1_3_5_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3603216.3624967"},{"key":"e_1_3_5_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-Berlin.2017.8210616"},{"key":"e_1_3_5_47_2","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2493412"},{"key":"e_1_3_5_48_2","doi-asserted-by":"publisher","unstructured":"Bart\u00a0P. Knijnenburg. 2017. Privacy? I Can\u2019t Even! Making a Case for User-Tailored Privacy. IEEE Security & Privacy 15 4 (2017) 62\u201367. 10.1109\/MSP.2017.3151331","DOI":"10.1109\/MSP.2017.3151331"},{"key":"e_1_3_5_49_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-82786-116"},{"key":"e_1_3_5_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481369"},{"key":"e_1_3_5_51_2","doi-asserted-by":"publisher","unstructured":"Sylvia Kowalewski Martina Ziefle Henrik Ziegeldorf and Klaus Wehrle. 2015. Like us on Facebook! \u2013 Analyzing User Preferences Regarding Privacy Settings in Germany. Procedia Manufacturing 3 (2015) 815\u2013822. 10.1016\/j.promfg.2015.07.336 6th International Conference on Applied Human Factors and Ergonomics (AHFE 2015) and the Affiliated Conferences AHFE 2015.","DOI":"10.1016\/j.promfg.2015.07.336"},{"key":"e_1_3_5_52_2","doi-asserted-by":"publisher","unstructured":"Rena Lavranou Stylianos Karagiannis Aggeliki Tsohou and Emmanouil Magkos. 2023. Unraveling the Complexity of Mobile Application Permissions: Strategies to Enhance Users\u2019 Privacy Education. European Journal of Engineering and Technology Research 1 CIE (Dec 2023) 87\u201395. 10.24018\/ejeng.2023.1.CIE.3141","DOI":"10.24018\/ejeng.2023.1.CIE.3141"},{"key":"e_1_3_5_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971693"},{"key":"e_1_3_5_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_3_5_55_2","series-title":"(SOUPS 2014)","first-page":"199","volume-title":"10th Symposium On Usable Privacy and Security","author":"Lin Jialiu","year":"2014","unstructured":"Jialiu Lin, Bin Liu, Norman Sadeh, and Jason\u00a0I. Hong. 2014. Modeling Users\u2019 Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings. In 10th Symposium On Usable Privacy and Security (Menlo Park, CA, USA) (SOUPS 2014). USENIX Association, 199\u2013212. https:\/\/www.usenix.org\/conference\/soups2014\/proceedings\/presentation\/lin"},{"key":"e_1_3_5_56_2","doi-asserted-by":"publisher","unstructured":"Yanzi Lin Jaideep Juneja Eleanor Birrell and Lorrie\u00a0Faith Cranor. 2024. Data Safety vs. App Privacy: Comparing the Usability of Android and iOS Privacy Labels. Proceedings on Privacy Enhancing Technologies 2024 (2024) 182\u2013210. Issue 2. 10.56553\/popets-2024-0047","DOI":"10.56553\/popets-2024-0047"},{"key":"e_1_3_5_57_2","doi-asserted-by":"publisher","DOI":"10.1002\/9781118874905"},{"key":"e_1_3_5_58_2","doi-asserted-by":"publisher","unstructured":"Maximilian Marsch Jens Grossklags and Sameer Patil. 2021. Won\u2019t You Think of Others?: Interdependent Privacy in Smartphone App Permissions. Proc. ACM Hum.-Comput. Interact. 5 CSCW2 Article MHCI035 (oct 2021) 35\u00a0pages. 10.1145\/3479581","DOI":"10.1145\/3479581"},{"key":"e_1_3_5_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3381991.3395603"},{"key":"e_1_3_5_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.25"},{"key":"e_1_3_5_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3636309"},{"key":"e_1_3_5_62_2","series-title":"(SOUPS 2024)","first-page":"453","volume-title":"Twentieth Symposium on Usable Privacy and Security","author":"Prange Sarah","year":"2024","unstructured":"Sarah Prange, Pascal Knierim, Gabriel Knoll, Felix Dietz, Alexander\u00a0De Luca, and Florian Alt. 2024. \u201cI do (not) need that Feature!\u201d \u2013 Understanding Users\u2019 Awareness and Control of Privacy Permissions on Android Smartphones. In Twentieth Symposium on Usable Privacy and Security (Philadelphia, PA, USA) (SOUPS 2024). USENIX Association, 453\u2013472. https:\/\/www.usenix.org\/conference\/soups2024\/presentation\/prange"},{"key":"e_1_3_5_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP61157.2025.00045"},{"key":"e_1_3_5_64_2","series-title":"(USENIX Security \u201921)","first-page":"751","volume-title":"30th USENIX Security Symposium","author":"Shen Bingyu","year":"2021","unstructured":"Bingyu Shen, Lili Wei, Chengcheng Xiang, Yudong Wu, Mingyao Shen, Yuanyuan Zhou, and Xinxin Jin. 2021. Can Systems Explain Permissions Better? Understanding Users\u2019 Misperceptions under Smartphone Runtime Permission Model. In 30th USENIX Security Symposium(USENIX Security \u201921). USENIX Association, 751\u2013768. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/shen-bingyu"},{"key":"e_1_3_5_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702404"},{"key":"e_1_3_5_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3450741.3465252"},{"key":"e_1_3_5_67_2","series-title":"(SOUPS 2017)","first-page":"145","volume-title":"Thirteenth Symposium on Usable Privacy and Security","author":"Tsai Lynn","year":"2017","unstructured":"Lynn Tsai, Primal Wijesekera, Joel Reardon, Irwin Reyes, Serge Egelman, David Wagner, Nathan Good, and Jung-Wei Chen. 2017. Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences. In Thirteenth Symposium on Usable Privacy and Security (Santa Clara, CA, USA) (SOUPS 2017). USENIX Association, 145\u2013162. https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/tsai"},{"key":"e_1_3_5_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025556"},{"key":"e_1_3_5_69_2","doi-asserted-by":"publisher","unstructured":"Anthony Vance Jeffrey\u00a0L. Jenkins Bonnie\u00a0Brinton Anderson Daniel\u00a0K. Bjornn and C.\u00a0Brock Kirwan. 2018. Tuning out security warnings: a longitudinal examination of habituation through fMRI eye tracking and field experiments. MIS Q. 42 2 (June 2018) 355\u2013380. 10.25300\/MISQ\/2018\/14124","DOI":"10.25300\/MISQ\/2018\/14124"},{"key":"e_1_3_5_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.51"},{"key":"e_1_3_5_71_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69471-931"},{"key":"e_1_3_5_72_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21599-57"},{"key":"e_1_3_5_73_2","doi-asserted-by":"publisher","unstructured":"No\u00e9 Zufferey Kavous\u00a0Salehzadeh Niksirat Mathias Humbert and K\u00e9vin Huguenin. 2023. \u201cRevoked just now!\u201d Users\u2019 Behaviors Toward Fitness-Data Sharing with Third-Party Applications. Proceedings on Privacy Enhancing Technologies 2023 (2023) 47\u201367. Issue 1. 10.56553\/popets-2023-0004","DOI":"10.56553\/popets-2023-0004"},{"key":"e_1_3_5_74_2","doi-asserted-by":"publisher","unstructured":"No\u00e9 Zufferey Kavous\u00a0Salehzadeh Niksirat Mathias Humbert and K\u00e9vin Huguenin. 2024. Our Data Our Solutions: A Participatory Approach for Enhancing Privacy in Wearable Activity Tracker Third-Party Apps. Proceedings on Privacy Enhancing Technologies 2024 4 (2024) 734\u2013754. 10.56553\/popets-2024-0139","DOI":"10.56553\/popets-2024-0139"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3743739","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T16:07:03Z","timestamp":1757520423000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3743739"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,9]]},"references-count":73,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9,30]]}},"alternative-id":["10.1145\/3743739"],"URL":"https:\/\/doi.org\/10.1145\/3743739","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,9]]},"assertion":[{"value":"2025-09-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}