{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T00:06:04Z","timestamp":1760745964967,"version":"build-2065373602"},"reference-count":91,"publisher":"Association for Computing Machinery (ACM)","issue":"7","license":[{"start":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T00:00:00Z","timestamp":1760572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2232656, 2232654"],"award-info":[{"award-number":["2232656, 2232654"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,10,18]]},"abstract":"<jats:p>\n            Smart devices--including speakers, cameras, TVs, and sensors--are increasingly used to enhance comfort, efficiency, security, and entertainment in and outside the home. These devices collect significant audio, video, and environmental data, and that data may be shared with device owners, manufacturers, and\/or third-parties. Social computing researchers have devoted significant attention to the privacy risks posed by these devices, although the focus has largely been on primary users who have access and control of devices and data. More recently, researchers have begun examining the privacy risks to\n            <jats:italic toggle=\"yes\">incidental users<\/jats:italic>\n            --those who do not own or manage devices but still have their data collected due to their presence in a smart environment. In this paper, we present findings from 25 interviews with US-based adults who have encountered and\/or used smart devices as incidental users in rental properties, as part of their work, at friends' and family's houses, and in shared living environments. We explore their reactions to these devices across different contexts, as well as their expectations for how devices should be disclosed and managed by primary users. We found a prevailing sense of resignation across our participants, as well behavioral and environmental modifications in response to smart devices. At the same time, participants were disinterested in gaining access and control to other people's devices, and they were hesitant or uncomfortable with the idea of initiating communication with device owners regarding their concern. Many wanted clearer and more prominent disclosures about device and data management that shifted responsibility from the incidental user to the device owner. Based on our findings, we argue for researchers to focus more closely on\n            <jats:italic toggle=\"yes\">sociotechnical approaches<\/jats:italic>\n            to help incidental users navigate privacy risks in smart environments. Such approaches must account for interpersonal factors like trust, power dynamics, and social norms in addition to the many technical solutions that have been introduced in recent years.\n          <\/jats:p>","DOI":"10.1145\/3757614","type":"journal-article","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T16:59:10Z","timestamp":1760633950000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["In Search of \"a Way to Level the Playing Field\": Helping Incidental Users Navigate Privacy Risks in Smart Environments"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-5108-0181","authenticated-orcid":false,"given":"Sunyup","family":"Park","sequence":"first","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5834-7638","authenticated-orcid":false,"given":"Nidhi","family":"Nellore","sequence":"additional","affiliation":[{"name":"Marquette University, Milwaukee, Wisconsin, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4229-4847","authenticated-orcid":false,"given":"Michael","family":"Zimmer","sequence":"additional","affiliation":[{"name":"Marquette University, Milwaukee, Wisconsin, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9362-9032","authenticated-orcid":false,"given":"Jessica","family":"Vitak","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,10,16]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415187"},{"key":"e_1_2_1_2_1","first-page":"4643","volume-title":"Examining Power Dynamics and User Privacy in Smart Technology Use Among Jordanian Households. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Albayaydh Wael","year":"2023","unstructured":"Wael Albayaydh and Ivan Flechais. 2023. Examining Power Dynamics and User Privacy in Smart Technology Use Among Jordanian Households. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 4643-4659. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/albayaydh"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3637353"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502097"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-85233-854-7_2"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3500868.3559709"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581360"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0064"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3539737"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214262"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240490507956"},{"key":"e_1_2_1_12_1","first-page":"687","volume-title":"Balancing Power Dynamics in Smart Homes: Nanniestextquoteright Perspectives on How Cameras Reflect and Affect Relationships. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022","author":"Bernd Julia","year":"2022","unstructured":"Julia Bernd, Ruba Abu-Salma, Junghyun Choy, and Alisa Frik. 2022. Balancing Power Dynamics in Smart Homes: Nanniestextquoteright Perspectives on How Cameras Reflect and Affect Relationships. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). USENIX Association, Boston, MA, 687-706. https:\/\/www.usenix.org\/conference\/soups2022\/presentation\/bernd"},{"key":"e_1_2_1_13_1","unstructured":"Julia Bernd Alisa Frik Maritza Johnson and Nathan Malkin. 2019. Smart Home Bystanders: Further Complexifying a Complex Context. (2019)."},{"key":"e_1_2_1_14_1","volume-title":"My New Apartment's Most Aggravating Feature. Curbed (Jan","author":"Brown Lane","year":"2024","unstructured":"Lane Brown. 2024. My New Apartment's Most Aggravating Feature. Curbed (Jan. 2024). https:\/\/www.curbed.com\/2024\/01\/latch-smart-lock-nyc-apartments-aggravating-feature.html"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445691"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030118"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0060"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376389"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3637630"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2853985"},{"key":"e_1_2_1_21_1","volume-title":"Smart home control & connectivity segment penetration rate","author":"Statista Research Department","year":"2022","unstructured":"Statista Research Department. [n.d.]. Smart home control & connectivity segment penetration rate in 2022, by country. https:\/\/www.statista.com\/forecasts\/483772\/smart-home-penetration-rate-for-selected-countries-in-the-segment-control-and-connectivity."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0124"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382900"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1177\/20539517241270663"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00043"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229565.3229573"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328915"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300498"},{"volume-title":"Human Aspects of Information Security","author":"Ghiglieri Marco","key":"e_1_2_1_29_1","unstructured":"Marco Ghiglieri, Melanie Volkamer, and Karen Renaud. 2017. Exploring Consumers' Attitudes of Smart TV Related Privacy Risks. In Human Aspects of Information Security, Privacy and Trust, Theo Tryfonas (Ed.). Springer International Publishing, Cham, 656-674."},{"key":"e_1_2_1_30_1","unstructured":"Eileen Guo. [n.d.]. A Roomba recorded a woman on the toilet. How did screenshots end up on Facebook? MIT Technology Review ([n.d.]). https:\/\/www.technologyreview.com\/2022\/12\/19\/1065306\/roomba-irobot-robot-vacuums-artificial-intelligence-training-data-privacy\/"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517617"},{"key":"e_1_2_1_32_1","volume-title":"International Journal of Communication","volume":"10","author":"Hargittai Eszter","year":"2016","unstructured":"Eszter Hargittai and Alice Marwick. 2016. ''What Can I Really Do?'' Explaining the Privacy Paradox with Online Apathy. International Journal of Communication, Vol. 10 (July 2016), 21. https:\/\/ijoc.org\/index.php\/ijoc\/article\/view\/4655"},{"key":"e_1_2_1_33_1","first-page":"255","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"He Weijia","year":"2018","unstructured":"Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus D\u00fcrmuth, Earlence Fernandes, and Blase Ur. 2018. Rethinking Access Control and Authentication for the Home Internet of Things (IoT, ). In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 255-272. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/he"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3564632"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5817\/CP2016-4-7"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397333"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376529"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1551986.1551998"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389144"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139941"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517602"},{"key":"e_1_2_1_42_1","volume-title":"Ring Reveals They Give Videos to Police Without User Consent or a Warrant","author":"Kelley Jason","year":"2022","unstructured":"Jason Kelley and Matthew Guariglia. 2022. Ring Reveals They Give Videos to Police Without User Consent or a Warrant. Washington, DC. https:\/\/www.eff.org\/deeplinks\/2022\/07\/ring-reveals-they-give-videos-police-without-user-consent-or-warrant"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445598"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376273"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45809-3_19"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2016.7845392"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610038"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519739"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15742-5_9"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444820912544"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2018.23016"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v16i2.8346"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0035"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0115"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490632.3490664"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420164"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39399-5_7"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449119"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1177\/02683962231202535"},{"key":"e_1_2_1_61_1","volume-title":"Qualitative Data Analysis: A Methods Sourcebook","author":"Miles Matthew B.","unstructured":"Matthew B. Miles, A. Michael Huberman, and Johnny Salda na. 2019. Qualitative Data Analysis: A Methods Sourcebook (4th edition ed.). SAGE Publications, Inc, Los Angeles.","edition":"4"},{"key":"e_1_2_1_62_1","unstructured":"Sara Morrison. [n.d.]. Google Assistant's new Guest Mode is more private but there's a trade-off. https:\/\/www.vox.com\/recode\/22229008\/google-assistant-guest-mode [Accessed 30-10-2024]."},{"key":"e_1_2_1_63_1","volume-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017","author":"Naeini Pardis Emami","year":"2017","unstructured":"Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman Sadeh. 2017. Privacy expectations and preferences in an {IoT} world. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). 399-412. https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/naeini"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370224"},{"key":"e_1_2_1_65_1","first-page":"543","volume-title":"Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023","author":"Park Sunyup","year":"2023","unstructured":"Sunyup Park, Anna Lenhart, Michael Zimmer, and Jessica Vitak. 2023. ''Nobodytextquoterights Happy'': Design Insights from Privacy-Conscious Smart Home Power Users on Enhancing Data Transparency, Visibility, and Control. In Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023). USENIX Association, Anaheim, CA, 543-558. https:\/\/www.usenix.org\/conference\/soups2023\/presentation\/park"},{"volume-title":"Qualitative Research & Evaluation Methods: Integrating Theory and Practice","author":"Patton Michael Quinn","key":"e_1_2_1_66_1","unstructured":"Michael Quinn Patton. 2014. Qualitative Research & Evaluation Methods: Integrating Theory and Practice. SAGE Publications. Google-Books-ID: ovAkBQAAQBAJ."},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300275"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3532106.3535195"},{"key":"e_1_2_1_69_1","unstructured":"Community policy. [n.d.]. Use and disclosure of security cameras recording devices noise decibel monitors and smart home devices. https:\/\/www.airbnb.com\/help\/article\/3061."},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445067"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/REW.2016.050"},{"volume-title":"The Coding Manual for Qualitative Researchers (4 ed.)","author":"Salda\u00f1a Johnny","key":"e_1_2_1_72_1","unstructured":"Johnny Salda\u00f1a. 2021. The Coding Manual for Qualitative Researchers (4 ed.). Sage Publications."},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11135-017-0574-8"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3524613.3527813"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376264"},{"key":"e_1_2_1_76_1","volume-title":"Foundations of interpersonal trust: Handbook of basic principles","author":"Simpson Jeffry A.","unstructured":"Jeffry A. Simpson. 2007. Foundations of interpersonal trust: Handbook of basic principles (2nd edition ed.). Guilford, 587-607.","edition":"2"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376585"},{"key":"e_1_2_1_78_1","first-page":"435","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019","author":"Tabassum Madiha","year":"2019","unstructured":"Madiha Tabassum, Tomasz Kosinski, and Heather Richter Lipford. 2019. ''I dontextquoterightt own the data'': End User Perceptions of Smart Home Device Data Practices and Risks. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA, 435-450. https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/tabassum"},{"key":"e_1_2_1_79_1","first-page":"1","volume-title":"Proceedings of the European Marketing Academy","author":"Uysal Ertugrul","year":"2020","unstructured":"Ertugrul Uysal, Val\u00e9ry Bezen\u00e7on, and Sascha Alavi. 2020. Facing Alexa, the powerful lower their guard: anthropomorphization of smart personal assistants decreases privacy concerns for people with high sense of power. In Proceedings of the European Marketing Academy. Budapest, 1-10."},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.30658\/hmc.6.10"},{"key":"e_1_2_1_81_1","first-page":"535","volume-title":"Exploring Tenantstextquoteright Preferences of Privacy Negotiation in Airbnb. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Wang Zixin","year":"2023","unstructured":"Zixin Wang, Danny Yuxing Huang, and Yaxing Yao. 2023. Exploring Tenantstextquoteright Preferences of Privacy Negotiation in Airbnb. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 535-551. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/wang-zixin"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00029"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3567739"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546719"},{"key":"e_1_2_1_85_1","unstructured":"Sam Wolfson. [n.d.]. Amazon's Alexa recorded private conversation and sent it to random contact. The Guardian ([n.d.]). https:\/\/www.theguardian.com\/technology\/2018\/may\/24\/amazon-alexa-recorded-conversation"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300428"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"},{"key":"e_1_2_1_88_1","first-page":"65","volume-title":"End User Security and Privacy Concerns with Smart Homes. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017","author":"Zeng Eric","year":"2017","unstructured":"Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security and Privacy Concerns with Smart Homes. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, Santa Clara, CA, 65-80. https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/zeng"},{"key":"e_1_2_1_89_1","first-page":"159","volume-title":"Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Zeng Eric","year":"2019","unstructured":"Eric Zeng and Franziska Roesner. 2019. Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 159-176. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/zeng"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642897"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3757614","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3757614","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T01:52:55Z","timestamp":1760665975000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3757614"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,16]]},"references-count":91,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,10,18]]}},"alternative-id":["10.1145\/3757614"],"URL":"https:\/\/doi.org\/10.1145\/3757614","relation":{},"ISSN":["2573-0142"],"issn-type":[{"type":"electronic","value":"2573-0142"}],"subject":[],"published":{"date-parts":[[2025,10,16]]},"assertion":[{"value":"2025-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}