{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T09:24:32Z","timestamp":1768469072242,"version":"3.49.0"},"reference-count":96,"publisher":"Association for Computing Machinery (ACM)","issue":"3","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2025,9,3]]},"abstract":"<jats:p>Smart-home technologies are becoming increasingly pervasive, automating lighting, heating, security, and other vital household functions to enhance the comfort, efficiency, and convenience of residents. However, the growing complexity and interconnectivity of these systems expose them to advanced cyber threats, putting residents' privacy and safety at risk. In this study, we investigated the design of future smart home environments to support collaborative anomaly exploration, enabling occupants and devices to jointly identify and address emerging threats. Using a mixed-methods approach---an initial questionnaire (N=40) followed by interactive focus groups (N=36)---we gathered in-depth perspectives on smart home device configurations, user workflows, and potential security vulnerabilities. Our findings include: (i) a taxonomy of realistic security threats, (ii) illustrative layouts and scenarios that highlight how anomalies emerge in everyday household routines, and (iii) concrete examples of how these anomalies can be detected collaboratively. Building on these insights, we propose a comprehensive set of design criteria to guide the development of user-centered, resilient anomaly exploration capabilities in smart homes. Our results offer recommendations for researchers, system designers, and technology practitioners seeking to balance the benefits of automation with robust user-driven security in next-generation ubiquitous home environments.<\/jats:p>","DOI":"10.1145\/3749490","type":"journal-article","created":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T17:15:45Z","timestamp":1756919745000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Enabling Collaborative Anomaly Exploration in Smart Homes: Eliciting User Requirements and Security Scenarios"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-7082-8769","authenticated-orcid":false,"given":"Azhar A.","family":"Alsufyani","sequence":"first","affiliation":[{"name":"Cardiff University, Cardiff, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3597-2646","authenticated-orcid":false,"given":"Omer","family":"Rana","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0190-3346","authenticated-orcid":false,"given":"Charith","family":"Perera","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, UK"}]}],"member":"320","published-online":{"date-parts":[[2025,9,3]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"2465","article-title":"Internet of things and smart home security","volume":"62","author":"Abdulla Abdulrahman Ihsan","year":"2020","unstructured":"Abdulrahman Ihsan Abdulla, Ahmad Sinali Abdulraheem, Azar Abid Salih, MA Sadeeq, Abdulraheem Jamel Ahmed, Barwar M Ferzor, Omar Salih Sardar, and Sarkaft Ibrahim Mohammed. 2020. Internet of things and smart home security. Technol. Rep. Kansai Univ 62, 5 (2020), 2465--2476.","journal-title":"Technol. Rep. Kansai Univ"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130899"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/09518390902736512"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264899"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/WorldS450073.2020.9210375"},{"key":"e_1_2_1_6_1","volume-title":"Cyber and physical security vulnerability assessment for IoT-based smart homes. sensors 18, 3","author":"Ali Bako","year":"2018","unstructured":"Bako Ali and Ali Ismail Awad. 2018. Cyber and physical security vulnerability assessment for IoT-based smart homes. sensors 18, 3 (2018), 817."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.23919\/IConAC.2017.8082057"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2021.101219"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103687"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3698768"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341105.3373925"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04711-0"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/09593330.2022.2039783"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3506859"},{"key":"e_1_2_1_15_1","unstructured":"Richard E Boyatzis. 1998. Transforming qualitative information: Thematic analysis and code development. sage."},{"key":"e_1_2_1_16_1","unstructured":"Ian Brace. 2018. Questionnaire design: How to plan structure and write survey material for effective market research. Kogan Page Publishers."},{"key":"e_1_2_1_17_1","volume-title":"Using thematic analysis in psychology. Qualitative research in psychology 3, 2","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77--101."},{"key":"e_1_2_1_18_1","volume-title":"IoT device security: locking out risks and threats to smart homes. Trend Micro Research 30","author":"Chang Ziv","year":"2019","unstructured":"Ziv Chang. 2019. IoT device security: locking out risks and threats to smart homes. Trend Micro Research 30 (2019)."},{"key":"e_1_2_1_19_1","volume-title":"AutoIoT: Automated IoT Platform Using Large Language Models","author":"Cheng Ye","year":"2024","unstructured":"Ye Cheng, Minghui Xu, Yue Zhang, Kun Li, Ruoxi Wang, and Lian Yang. 2024. AutoIoT: Automated IoT Platform Using Large Language Models. IEEE Internet of Things Journal (2024)."},{"key":"e_1_2_1_20_1","volume-title":"Towards successful user interaction with systems: Focusing on user-derived gestures for smart home systems. Applied ergonomics 45, 4","author":"Choi Eunjung","year":"2014","unstructured":"Eunjung Choi, Sunghyuk Kwon, Donghun Lee, Hogin Lee, and Min K Chung. 2014. Towards successful user interaction with systems: Focusing on user-derived gestures for smart home systems. Applied ergonomics 45, 4 (2014), 1196--1207."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3524844.3528054"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3618001"},{"key":"e_1_2_1_23_1","volume-title":"Strategies for qualitative data analysis. Journal of Qualitative Research","author":"Corbin Juliet","year":"2007","unstructured":"Juliet Corbin. 2007. Strategies for qualitative data analysis. Journal of Qualitative Research (2007), 67--85."},{"key":"e_1_2_1_24_1","volume-title":"Basics of qualitative research: Techniques and procedures for developing grounded theory","author":"Corbin Juliet","unstructured":"Juliet Corbin and Anselm Strauss. 2014. Basics of qualitative research: Techniques and procedures for developing grounded theory. Sage publications."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-017-0035-0"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/8022033"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22082895"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2024.10412036"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098251"},{"key":"e_1_2_1_30_1","unstructured":"Norman K Denzin and Yvonna S Lincoln. 2011. The Sage handbook of qualitative research. sage."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243865"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3478091"},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 2, CSCW","author":"Naeini Pardis Emami","year":"2018","unstructured":"Pardis Emami Naeini, Martin Degeling, Lujo Bauer, Richard Chow, Lorrie Faith Cranor, Mohammad Reza Haghighat, and Heather Patterson. 2018. The influence of friends and experts on privacy decision making in IoT scenarios. Proceedings of the ACM on Human-Computer Interaction 2, CSCW (2018), 1--26."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"e_1_2_1_35_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Fu Chenglong","year":"2021","unstructured":"Chenglong Fu, Qiang Zeng, and Xiaojiang Du. 2021. {HAWatcher):{Semantics-Aware} anomaly detection for appified smart homes. In 30th USENIX Security Symposium (USENIX Security 21). 4223--4240."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0117"},{"key":"e_1_2_1_37_1","volume-title":"Discovery of grounded theory: Strategies for qualitative research","author":"Glaser Barney","unstructured":"Barney Glaser and Anselm Strauss. 2017. Discovery of grounded theory: Strategies for qualitative research. Routledge."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476088"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102677"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322385.3322388"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-08-2020-0131"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3042049"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.07.011"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897886"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2931436"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi16060200"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3649595"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-023-08340-4"},{"key":"e_1_2_1_49_1","volume-title":"Dereje Engida Woldemichael, and Hailu Shimels Gebremedhen","author":"Kibrete Fasikaw","year":"2024","unstructured":"Fasikaw Kibrete, Dereje Engida Woldemichael, and Hailu Shimels Gebremedhen. 2024. Multi-Sensor data fusion in intelligent fault diagnosis of rotating machines: A comprehensive review. Measurement (2024), 114658."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643505"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC3I.2016.7918794"},{"key":"e_1_2_1_52_1","volume-title":"A prototype for assessing information security awareness. Computers & security 25, 4","author":"Kruger Hennie A","year":"2006","unstructured":"Hennie A Kruger and Wayne D Kearney. 2006. A prototype for assessing information security awareness. Computers & security 25, 4 (2006), 289--296."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1108\/MRR-04-2013-0085"},{"key":"e_1_2_1_54_1","volume-title":"Yi-Chen Ethan Yang, and Faegheh Moazeni","author":"Lin Chung-Yi","year":"2024","unstructured":"Chung-Yi Lin, Yi-Chen Ethan Yang, and Faegheh Moazeni. 2024. Flood Risks of Cyber-Physical Attacks in a Smart Storm Water System. Water Resources Research 60, 1 (2024), e2023WR034827."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563211"},{"key":"e_1_2_1_56_1","doi-asserted-by":"crossref","unstructured":"George Loukas. 2015. Cyber-physical attacks: A growing invisible threat. Butterworth-Heinemann.","DOI":"10.1016\/B978-0-12-801290-1.00007-2"},{"key":"e_1_2_1_57_1","first-page":"1073","article-title":"Piloting for interviews in qualitative research: Operationalization and lessons learnt","volume":"7","author":"Abdul Majid Mohd Aliff","year":"2017","unstructured":"Mohd Aliff Abdul Majid, Mohhidin Othman, Siti Fatimah Mohamad, Sarina Abdul Halim Lim, Aziz Yusof, et al. 2017. Piloting for interviews in qualitative research: Operationalization and lessons learnt. International Journal of Academic Research in Business and Social Sciences 7, 4 (2017), 1073--1080.","journal-title":"International Journal of Academic Research in Business and Social Sciences"},{"key":"e_1_2_1_58_1","volume-title":"Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research 15, 4","author":"Malhotra Naresh K","year":"2004","unstructured":"Naresh K Malhotra, Sung S Kim, and James Agarwal. 2004. Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research 15, 4 (2004), 336--355."},{"key":"e_1_2_1_59_1","unstructured":"Matthew B Miles and A Michael Huberman. 1994. Qualitative data analysis: An expanded sourcebook. sage."},{"key":"e_1_2_1_60_1","volume-title":"HVACKer: Bridging the air-gap by attacking the air conditioning system. arXiv preprint arXiv:1703.10454","author":"Mirsky Yisroel","year":"2017","unstructured":"Yisroel Mirsky, Mordechai Guri, and Yuval Elovici. 2017. HVACKer: Bridging the air-gap by attacking the air conditioning system. arXiv preprint arXiv:1703.10454 (2017)."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427277"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2017.2720660"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2016.0118"},{"key":"e_1_2_1_64_1","volume-title":"Thirteenth symposium on usable privacy and security (SOUPS","author":"Naeini Pardis Emami","year":"2017","unstructured":"Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman Sadeh. 2017. Privacy expectations and preferences in an {IoT} world. In Thirteenth symposium on usable privacy and security (SOUPS 2017). 399--412."},{"key":"e_1_2_1_65_1","volume-title":"Smart Home Security Enhancements with Cisco Packet Tracer. In 2024 International Conference on Computing and Data Science (ICCDS). IEEE, 1--6.","author":"N","unstructured":"N Nanthini et al. 2024. Smart Home Security Enhancements with Cisco Packet Tracer. In 2024 International Conference on Computing and Data Science (ICCDS). IEEE, 1--6."},{"key":"e_1_2_1_66_1","volume-title":"Doing survey research: A guide to quantitative methods","author":"Nardi Peter M","unstructured":"Peter M Nardi. 2018. Doing survey research: A guide to quantitative methods. Routledge."},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3567722"},{"key":"e_1_2_1_68_1","volume-title":"Can we teach digital natives digital literacy? Computers & education 59, 3","author":"Wan Ng.","year":"2012","unstructured":"Wan Ng. 2012. Can we teach digital natives digital literacy? Computers & education 59, 3 (2012), 1065--1078."},{"key":"e_1_2_1_69_1","volume-title":"Meeting Learners Where They Are: Using Microsoft Forms to Drive Improvement in Learning Outcomes. Technical Report. Digital Promise.","author":"Peters Vanessa","year":"2018","unstructured":"Vanessa Peters. 2018. Meeting Learners Where They Are: Using Microsoft Forms to Drive Improvement in Learning Outcomes. Technical Report. Digital Promise."},{"key":"e_1_2_1_70_1","first-page":"79","article-title":"Introduction to social research: Quantitative and qualitative approaches","volume":"18","author":"Promwong C","year":"1978","unstructured":"C Promwong. 1978. Introduction to social research: Quantitative and qualitative approaches. Psychology 18 (1978), 79--92.","journal-title":"Psychology"},{"key":"e_1_2_1_71_1","unstructured":"Keith F Punch. 2013. Introduction to social research: Quantitative and qualitative approaches. (2013)."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.3390\/info12080328"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581089"},{"key":"e_1_2_1_74_1","volume-title":"Self-efficacy in information security: Its influence on end users' information security practice behavior. Computers & security 28, 8","author":"Rhee Hyeun-Suk","year":"2009","unstructured":"Hyeun-Suk Rhee, Cheongtag Kim, and Young U Ryu. 2009. Self-efficacy in information security: Its influence on end users' information security practice behavior. Computers & security 28, 8 (2009), 816--826."},{"key":"e_1_2_1_75_1","unstructured":"Lyn Richards. 2020. Handling qualitative data: A practical guide. (2020)."},{"key":"e_1_2_1_76_1","volume-title":"Proceedings of the International Conference on Embedded Systems, Cyber-physical Systems, and Applications (ESCS). The Steering Committee of The World Congress in Computer Science, Computer..., 83--87","author":"Said Abdiladif","year":"2018","unstructured":"Abdiladif Said, Abdisalan Jama, Faysal Mahamud, Jayabalaji Mohan, and Prakash Ranganathan. 2018. Smart home vulnerabilities-a survey. In Proceedings of the International Conference on Embedded Systems, Cyber-physical Systems, and Applications (ESCS). The Steering Committee of The World Congress in Computer Science, Computer..., 83--87."},{"key":"e_1_2_1_77_1","volume-title":"Agustin Zuniga, Pan Hui, Sasu Tarkoma, Huber Flores, and Petteri Nurmi.","author":"Sarhaddi Fatemeh","year":"2025","unstructured":"Fatemeh Sarhaddi, Ngoc Thi Nguyen, Agustin Zuniga, Pan Hui, Sasu Tarkoma, Huber Flores, and Petteri Nurmi. 2025. LLMs and IoT: A Comprehensive Survey on Large Language Models and the Internet of Things. Authorea Preprints (2025)."},{"key":"e_1_2_1_78_1","doi-asserted-by":"crossref","unstructured":"Eva-Maria Schomakers Chantal Lidynia Luisa Vervier and Martina Ziefle. 2018. Of Guardians Cynics and Pragmatists-A Typology of Privacy Concerns and Behavior.. In IoTBDS. 153--163.","DOI":"10.5220\/0006774301530163"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1051\/matecconf\/202439201066"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2019918450"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428026"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3064507"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643833.3656132"},{"key":"e_1_2_1_84_1","volume-title":"Cisco Packet Tracer. URL: http:\/\/www.cisco.com\/web\/learning\/netacad\/coursecatalog\/PacketTracer.html","author":"Tracer Cisco Packet","year":"2013","unstructured":"Cisco Packet Tracer. 2013. Cisco Packet Tracer. URL: http:\/\/www.cisco.com\/web\/learning\/netacad\/coursecatalog\/PacketTracer.html (2013)."},{"key":"e_1_2_1_85_1","volume-title":"Review of Security and Privacy-Based IoT Smart Home Access Control Devices. Wireless Personal Communications","author":"Uppuluri Sirisha","year":"2024","unstructured":"Sirisha Uppuluri and G Lakshmeeswari. 2024. Review of Security and Privacy-Based IoT Smart Home Access Control Devices. Wireless Personal Communications (2024), 1--40."},{"key":"e_1_2_1_86_1","volume-title":"The importance of pilot studies. Social research update 35","author":"Teijlingen Edwin Van","year":"2001","unstructured":"Edwin Van Teijlingen and Vanora Hundley. 2001. The importance of pilot studies. Social research update 35 (2001), 1--4."},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3582009"},{"key":"e_1_2_1_88_1","volume-title":"Tanya Jane McGill, and Jane E Klobas","author":"Wang Xuequn","year":"2020","unstructured":"Xuequn Wang, Tanya Jane McGill, and Jane E Klobas. 2020. I want it anyway: Consumer perceptions of smart home devices. Journal of Computer Information Systems (2020)."},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDC.2018.8440552"},{"key":"e_1_2_1_90_1","first-page":"3","article-title":"Navigating the solarwinds supply chain attack","volume":"56","author":"Wolff Evan D","year":"2021","unstructured":"Evan D Wolff, KatE M GroWlEy, Maida O Lerner, Matthew B Welling, Michael G Gruden, and Jacob Canter. 2021. Navigating the solarwinds supply chain attack. Procurement Law. 56 (2021), 3.","journal-title":"Procurement Law."},{"key":"e_1_2_1_91_1","volume-title":"Data analysis in qualitative research: A brief guide to using NVivo. Malaysian family physician: the official journal of the Academy of Family Physicians of Malaysia 3, 1","author":"Wong Li Ping","year":"2008","unstructured":"Li Ping Wong. 2008. Data analysis in qualitative research: A brief guide to using NVivo. Malaysian family physician: the official journal of the Academy of Family Physicians of Malaysia 3, 1 (2008), 14."},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134746"},{"key":"e_1_2_1_93_1","article-title":"Researching Internet-based populations: Advantages and disadvantages of online survey research, online questionnaire authoring software packages, and web survey services","volume":"10","author":"Wright Kevin B","year":"2005","unstructured":"Kevin B Wright. 2005. Researching Internet-based populations: Advantages and disadvantages of online survey research, online questionnaire authoring software packages, and web survey services. Journal of computer-mediated communication 10, 3 (2005), JCMC1034.","journal-title":"Journal of computer-mediated communication"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3003621"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2019.8661976"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/3636534.3649345"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3749490","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T16:30:03Z","timestamp":1758817803000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3749490"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,3]]},"references-count":96,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,9,3]]}},"alternative-id":["10.1145\/3749490"],"URL":"https:\/\/doi.org\/10.1145\/3749490","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,3]]},"assertion":[{"value":"2025-09-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}