{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:32:15Z","timestamp":1760661135295,"version":"build-2065373602"},"reference-count":75,"publisher":"Association for Computing Machinery (ACM)","issue":"7","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,10,18]]},"abstract":"<jats:p>As smart TVs gain popularity, they introduce significant privacy and security concerns due to their extensive data collection and multi-user contexts. This paper investigates user perceptions of privacy concerns regarding both service providers and the multi-user use case in the context of smart TVs. Through in-depth interviews with 22 smart TV users, we found that participants expressed uncertainty about the data collection practices of smart TVs and a desire for clearer communication of such practices. Participants reported discomfort with how their personal information is handled through their smart TVs but felt forced to accept it due to the lack of ability to opt out. Our study also highlights varied privacy concerns when smart TVs are shared in public versus private settings. While participants expressed significantly less concern when sharing smart TVs with acquaintances in private settings, concerns were more prevalent in public settings like hotels and Airbnbs. Based on the findings, we provide recommendations for designers, policymakers, and researchers to improve privacy protection and user experience around smart TVs.<\/jats:p>","DOI":"10.1145\/3757696","type":"journal-article","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T17:32:00Z","timestamp":1760635920000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Understanding User Privacy Concerns of Shared Smart TVs"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-7420-7052","authenticated-orcid":false,"given":"Synthia Qia","family":"Wang","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Chicago, Chicago, Illinois, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3429-5172","authenticated-orcid":false,"given":"Lan","family":"Gao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Chicago, Chicago, Illinois, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0804-6110","authenticated-orcid":false,"given":"Marshini","family":"Chetty","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Chicago, Chicago, Illinois, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9315-5201","authenticated-orcid":false,"given":"Nick","family":"Feamster","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Chicago, Chicago, Illinois, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,10,16]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445122"},{"key":"e_1_2_1_2_1","unstructured":"Abdulaziz Abdugani. 2020. Privacy Analysis of Smart TV Communication: A Case Study of Privacy Threats in Smart TVs. Master's thesis. UNIVERSITY OF OSLO."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376440"},{"key":"e_1_2_1_4_1","volume-title":"eMarketer","author":"Activate","year":"2023","unstructured":"Activate, eMarketer, Leichtman Research Group, and US Census Bureau. 2023. Number of connected TV households in the United States from 2019 to 2027. https:\/\/www.statista.com\/statistics\/306967\/number-of-connected-tv-households-usa\/. Accessed: 2024-05."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415187"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0064"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3646547.3689013"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3539737"},{"key":"e_1_2_1_9_1","first-page":"1","volume-title":"Proceedings of the ACM on interactive, mobile, wearable and ubiquitous technologies","volume":"2","author":"Apthorpe Noah","year":"2018","unstructured":"Noah Apthorpe, Yan Shvartzshnaider, Arunesh Mathur, Dillon Reisman, and Nick Feamster. 2018. Discovering smart home internet of things privacy norms using contextual integrity. Proceedings of the ACM on interactive, mobile, wearable and ubiquitous technologies, Vol. 2, 2 (2018), 1-23."},{"key":"e_1_2_1_10_1","first-page":"687","volume-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS","author":"Bernd Julia","year":"2022","unstructured":"Julia Bernd, Ruba Abu-Salma, Junghyun Choy, and Alisa Frik. 2022. Balancing power dynamics in smart homes: nannies' perspectives on how cameras reflect and affect relationships. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). 687-706."},{"key":"e_1_2_1_11_1","volume-title":"10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20)","author":"Bernd Julia","year":"2020","unstructured":"Julia Bernd, Ruba Abu-Salma, and Alisa Frik. 2020. {Bystanders'} Privacy: The Perspectives of Nannies on Smart Home Surveillance. In 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20)."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445691"},{"key":"e_1_2_1_14_1","volume-title":"Proceedings on Privacy Enhancing Technologies","author":"Cobb Camille","year":"2021","unstructured":"Camille Cobb, Sruti Bhagavatula, Kalil Anderson Garrett, Alison Hoffman, Varun Rao, and Lujo Bauer. 2021. ''I would have to evaluate their objections'': Privacy tensions between smart home device owners and incidental users. Proceedings on Privacy Enhancing Technologies (2021)."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382900"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025636"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_2_1_18_1","first-page":"338","article-title":"The interplay between personal relationships & shoulder surfing mitigation","volume":"2021","author":"Farzand Habiba","year":"2021","unstructured":"Habiba Farzand, Kinshuk Bhardwaj, Karola Marky, and Mohamed Khamis. 2021. The interplay between personal relationships & shoulder surfing mitigation. In Proceedings of Mensch und Computer 2021. 338-343.","journal-title":"Proceedings of Mensch und Computer"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3549015.3554211"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445148"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300498"},{"key":"e_1_2_1_22_1","volume-title":"Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings 5. Springer, 656-674","author":"Ghiglieri Marco","year":"2017","unstructured":"Marco Ghiglieri, Melanie Volkamer, and Karen Renaud. 2017. Exploring consumers' attitudes of smart TV related privacy risks. In Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings 5. Springer, 656-674."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517617"},{"key":"e_1_2_1_24_1","first-page":"393","volume-title":"Privacy and Trust: Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19-24, 2020, Proceedings 22","author":"Haney Julie M","year":"2020","unstructured":"Julie M Haney, Susanne M Furman, and Yasemin Acar. 2020. Smart home security and privacy mitigations: Consumer perceptions, practices, and challenges. In HCI for Cybersecurity, Privacy and Trust: Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19-24, 2020, Proceedings 22. Springer, 393-411."},{"key":"e_1_2_1_25_1","first-page":"559","volume-title":"Nineteenth Symposium on Usable Privacy and Security (SOUPS","author":"Hazazi Hussein","year":"2023","unstructured":"Hussein Hazazi and Mohamed Shehab. 2023. Exploring the usability, security, and privacy of smart locks from the perspective of the end user. In Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023). 559-577."},{"key":"e_1_2_1_26_1","first-page":"2024","article-title":"Your Airbnb's TV Could Be a Major Security Risk. https:\/\/www.howtogeek.com\/airbnb-tv-security-risk\/","author":"Hoffman Chris","year":"2023","unstructured":"Chris Hoffman. 2023. Your Airbnb's TV Could Be a Major Security Risk. https:\/\/www.howtogeek.com\/airbnb-tv-security-risk\/. Accessed: 2024-08.","journal-title":"Accessed"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2021.12.043"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517602"},{"key":"e_1_2_1_29_1","volume-title":"Network and Distributed System Security Symposium. Internet Society.","author":"Kannan Tejas","year":"2024","unstructured":"Tejas Kannan, Synthia Wang, Max Sunog, Abe Bueno de Mesquita, Nick Feamster, and Henry Hoffmann. 2024. Acoustic keystroke leakage on smart televisions. In Network and Distributed System Security Symposium. Internet Society."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2023.2250054"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2016.7613198"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576050.3576142"},{"key":"e_1_2_1_33_1","first-page":"1","volume-title":"Proceedings of the ACM on human-computer interaction","volume":"2","author":"Lau Josephine","year":"2018","unstructured":"Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, are you listening? Privacy perceptions, concerns and privacy-seeking behaviors with smart speakers. Proceedings of the ACM on human-computer interaction, Vol. 2, CSCW (2018), 1-31."},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of the 2024 ACM Designing Interactive Systems Conference. 3407-3418","author":"Lee Yoomi","year":"2024","unstructured":"Yoomi Lee and Youn-kyung Lim. 2024. How We Use Together: Coordinating Individual Preferences for Using Shared Devices at Home. In Proceedings of the 2024 ACM Designing Interactive Systems Conference. 3407-3418."},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the 2019 on designing interactive systems conference. 527-539","author":"Roxanne Leit","year":"2019","unstructured":"Roxanne Leit ao. 2019. Anticipating smart home security and privacy threats with survivors of intimate partner abuse. In Proceedings of the 2019 on designing interactive systems conference. 527-539."},{"key":"e_1_2_1_36_1","first-page":"1","volume-title":"Proceedings of the ACM on Human-Computer Interaction","volume":"7","author":"Lenhart Anna","year":"2023","unstructured":"Anna Lenhart, Sunyup Park, Michael Zimmer, and Jessica Vitak. 2023. '' You Shouldn't Need to Share Your Data'': Perceived Privacy Risks and Mitigation Strategies Among Privacy-Conscious Smart Home Power Users. Proceedings of the ACM on Human-Computer Interaction, Vol. 7, CSCW2 (2023), 1-34."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197507"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.3390\/app112412031"},{"key":"e_1_2_1_39_1","volume-title":"Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC)","author":"Malkin Nathan","year":"2018","unstructured":"Nathan Malkin, Julia Bernd, Maritza Johnson, and Serge Egelman. 2018. what can't data be used for?'' privacy expectations about smart tvs in the us. In Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC), London, UK."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0035"},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society. 1-11","author":"Marky Karola","year":"2020","unstructured":"Karola Marky, Alexandra Voit, Alina St\u00f6ver, Kai Kunze, Svenja Schr\u00f6der, and Max M\u00fchlh\u00e4user. 2020. '' I don't know how to protect myself'': Understanding Privacy Perceptions Resulting from the Presence of Bystanders in Smart Environments. In Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society. 1-11."},{"key":"e_1_2_1_42_1","first-page":"2024","article-title":"Internet TV - Marriott Travel Deals. https:\/\/www.marriott.com\/travel-deals\/internet-tv.mi","year":"2024","unstructured":"Marriott. 2024. Internet TV - Marriott Travel Deals. https:\/\/www.marriott.com\/travel-deals\/internet-tv.mi. Accessed: 2024-08.","journal-title":"Accessed"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_2_1_44_1","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1007\/s00779-015-0860-1","article-title":"A review of collocated multi-user TV: Examining the changing role of the TV in the multi-viewer, multi-screen home","volume":"19","author":"McGill Mark","year":"2015","unstructured":"Mark McGill, John H Williamson, and Stephen A Brewster. 2015. A review of collocated multi-user TV: Examining the changing role of the TV in the multi-viewer, multi-screen home. Personal and Ubiquitous Computing, Vol. 19 (2015), 743-759.","journal-title":"Personal and Ubiquitous Computing"},{"key":"e_1_2_1_45_1","first-page":"1","volume-title":"Proceedings of the ACM on Human-Computer Interaction","volume":"5","author":"Meng Nicole","year":"2021","unstructured":"Nicole Meng, Dilara Kek\u00fcll\u00fco\u011flu, and Kami Vaniea. 2021. Owning and sharing: Privacy perceptions of smart speaker users. Proceedings of the ACM on Human-Computer Interaction, Vol. 5, CSCW1 (2021), 1-29."},{"key":"e_1_2_1_46_1","first-page":"351","article-title":"Watch and be watched: Compromising all smart tv generations. In 2014 IEEE 11th consumer communications and networking conference (CCNC)","author":"Mich\u00e9le Benjamin","year":"2014","unstructured":"Benjamin Mich\u00e9le and Andrew Karpow. 2014. Watch and be watched: Compromising all smart tv generations. In 2014 IEEE 11th consumer communications and networking conference (CCNC). IEEE, 351-356.","journal-title":"IEEE"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2014.6994414"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354198"},{"key":"e_1_2_1_49_1","first-page":"399","volume-title":"Thirteenth symposium on usable privacy and security (SOUPS","author":"Naeini Pardis Emami","year":"2017","unstructured":"Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman Sadeh. 2017. Privacy expectations and preferences in an {IoT} world. In Thirteenth symposium on usable privacy and security (SOUPS 2017). 399-412."},{"key":"e_1_2_1_50_1","doi-asserted-by":"crossref","first-page":"65","DOI":"10.3390\/jcp2010005","article-title":"Security perception of IoT devices in smart homes","volume":"2","author":"Zlatolas Lili Nemec","year":"2022","unstructured":"Lili Nemec Zlatolas, Nata\u0161a Feher, and Marko H\u00f6lbl. 2022. Security perception of IoT devices in smart homes. Journal of Cybersecurity and Privacy, Vol. 2, 1 (2022), 65-73.","journal-title":"Journal of Cybersecurity and Privacy"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIOT.2015.13"},{"key":"e_1_2_1_52_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev., Vol. 79 (2004), 119.","journal-title":"Wash. L. Rev."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-025-02182-4"},{"key":"e_1_2_1_54_1","volume-title":"Nineteenth Symposium on Usable Privacy and Security (SOUPS","author":"Park Sunyup","year":"2023","unstructured":"Sunyup Park, Anna Lenhart, Michael Zimmer, and Jessica Vitak. 2023. '' Nobody's Happy'': Design Insights from {Privacy-Conscious} Smart Home Power Users on Enhancing Data Transparency, Visibility, and Control. In Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023)."},{"key":"e_1_2_1_55_1","volume-title":"IACSS 2018-IACLPM 2018 JOINT CONFERENCE PROCEEDINGS. https:\/\/ssrn.com\/abstract=3294943","author":"Popescul Daniela","year":"2018","unstructured":"Daniela Popescul. 2018. Smart TVs: What Do They Know (and Tell) about Us?. In IACSS 2018-IACLPM 2018 JOINT CONFERENCE PROCEEDINGS. https:\/\/ssrn.com\/abstract=3294943"},{"key":"e_1_2_1_56_1","first-page":"311","article-title":"Design considerations for usable authentication in smart homes","volume":"2021","author":"Prange Sarah","year":"2021","unstructured":"Sarah Prange, Ceenu George, and Florian Alt. 2021. Design considerations for usable authentication in smart homes. In Proceedings of Mensch und Computer 2021. 311-324.","journal-title":"Proceedings of Mensch und Computer"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","unstructured":"Donald Privitera and Hossain Shahriar. 2018. Design and Development of Smart TV Protector. In 2018 National Cyber Summit (NCS). 45-52. https:\/\/doi.org\/10.1109\/NCS.2018.00012","DOI":"10.1109\/NCS.2018.00012"},{"key":"e_1_2_1_58_1","volume-title":"2021 6th International Conference on Communication and Electronics Systems (ICCES). IEEE","author":"Santani Anika","year":"2021","unstructured":"Anika Santani, Madhuri Gangaramani, Bhavika Chopra, Palak Choudhary, and Krishna Samdani. 2021. An Overview of Architecture and Security Issues of a smart TV. In 2021 6th International Conference on Communication and Electronics Systems (ICCES). IEEE, 1835-1843."},{"key":"e_1_2_1_59_1","first-page":"1","volume-title":"Proceedings of the ACM on human-computer interaction","volume":"7","author":"Schaffner Brennan","year":"2023","unstructured":"Brennan Schaffner, Antonia Stefanescu, Olivia Campili, and Marshini Chetty. 2023. Don't Let Netflix Drive the Bus: User's Sense of Agency Over Time and Content Choice on Netflix. Proceedings of the ACM on human-computer interaction, Vol. 7, CSCW1 (2023), 1-32."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546742"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448738"},{"key":"e_1_2_1_62_1","first-page":"105","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Stephenson Sophie","year":"2023","unstructured":"Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, and Rahul Chatterjee. 2023a. '' It's the Equivalent of Feeling Like You're in {Jail''}: Lessons from Firsthand and Secondhand Accounts of {IoT-Enabled} Intimate Partner Abuse. In 32nd USENIX Security Symposium (USENIX Security 23). 105-122."},{"key":"e_1_2_1_63_1","first-page":"69","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Stephenson Sophie","year":"2023","unstructured":"Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, and Rahul Chatterjee. 2023b. Abuse Vectors: A Framework for Conceptualizing {IoT-Enabled} Interpersonal Abuse. In 32nd USENIX Security Symposium (USENIX Security 23). 69-86."},{"key":"e_1_2_1_64_1","first-page":"435","volume-title":"Fifteenth symposium on usable privacy and security (SOUPS","author":"Tabassum Madiha","year":"2019","unstructured":"Madiha Tabassum, Tomasz Kosinski, and Heather Richter Lipford. 2019. '' I don't own the data'': End User Perceptions of Smart Home Device Data Practices and Risks. In Fifteenth symposium on usable privacy and security (SOUPS 2019). 435-450."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.11.046"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0092"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-024-11405-8"},{"key":"e_1_2_1_68_1","first-page":"535","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Wang Zixin","year":"2023","unstructured":"Zixin Wang, Danny Yuxing Huang, and Yaxing Yao. 2023. Exploring tenants' preferences of privacy negotiation in airbnb. In 32nd USENIX Security Symposium (USENIX Security 23). 535-551."},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546719"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901890"},{"key":"e_1_2_1_71_1","first-page":"1","volume-title":"Proceedings of the ACM on Human-Computer Interaction","volume":"3","author":"Yao Yaxing","year":"2019","unstructured":"Yaxing Yao, Justin Reed Basdeo, Oriana Rosata Mcdonough, and Yang Wang. 2019. Privacy perceptions and designs of bystanders in smart homes. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (2019), 1-24."},{"key":"e_1_2_1_72_1","volume-title":"End user security and privacy concerns with smart homes. In thirteenth symposium on usable privacy and security (SOUPS","author":"Zeng Eric","year":"2017","unstructured":"Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End user security and privacy concerns with smart homes. In thirteenth symposium on usable privacy and security (SOUPS 2017). 65-80. https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/zeng"},{"key":"e_1_2_1_73_1","first-page":"159","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Zeng Eric","year":"2019","unstructured":"Eric Zeng and Franziska Roesner. 2019. Understanding and improving security and privacy in {multi-user} smart homes: A design exploration and {in-home} user study. In 28th USENIX Security Symposium (USENIX Security 19). 159-176."},{"key":"e_1_2_1_74_1","volume-title":"EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry","author":"Zhang Yiwei","year":"2023","unstructured":"Yiwei Zhang, Siqi Ma, Tiancheng Chen, Juanru Li, Robert H Deng, and Elisa Bertino. 2023. EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry. IEEE Transactions on Dependable and Secure Computing (2023)."},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3757696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T17:37:33Z","timestamp":1760636253000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3757696"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,16]]},"references-count":75,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,10,18]]}},"alternative-id":["10.1145\/3757696"],"URL":"https:\/\/doi.org\/10.1145\/3757696","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,16]]},"assertion":[{"value":"2025-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}