{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T16:33:32Z","timestamp":1726763612160},"reference-count":130,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100014013","name":"U.K. Research and Innovation","doi-asserted-by":"publisher","award":["EP\/P024394\/1","EP\/R033501\/1"],"id":[{"id":"10.13039\/100014013","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012338","name":"The Alan Turing Institute, and Microsoft, through the Microsoft Cloud Computing Research Centre","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100012338","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,3,1]]},"DOI":"10.1109\/jiot.2023.3318369","type":"journal-article","created":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T18:01:43Z","timestamp":1695405703000},"page":"7583-7603","source":"Crossref","is-referenced-by-count":3,"title":["A Room With an Overview: Toward Meaningful Transparency for the Consumer Internet of Things"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4331-7863","authenticated-orcid":false,"given":"Chris","family":"Norval","sequence":"first","affiliation":[{"name":"Compliant and Accountable Systems Group, University of Cambridge, Cambridge, U.K."}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5102-6564","authenticated-orcid":false,"given":"Jatinder","family":"Singh","sequence":"additional","affiliation":[{"name":"Compliant and Accountable Systems Group, University of Cambridge, Cambridge, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445691"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/11853565_2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025799"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"key":"ref5","volume-title":"Build it and they will embrace it: Consumers are preparing for 5G connectivity in the home and on the go","author":"Westcott","year":"2021"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2887201"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3287049"},{"key":"ref8","first-page":"435","article-title":"I don\u2019t own the data: End user perceptions of smart home device data practices and risks","volume-title":"Proc. 15th Symp. Usable Privacy Security (SOUPS)","author":"Tabassum"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1049\/PBSE014E_ch5"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-018-0054-5"},{"key":"ref11","volume-title":"Smart ovens have been turning on overnight and preheating to 400 degrees","author":"Carman","year":"2019"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409682"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.86"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0386.2007.00378.x"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1177\/2053951720935615"},{"issue":"1","key":"ref16","first-page":"123","article-title":"Managing opacity: Information visibility and the paradox of transparency in the digital age","volume":"10","author":"Stohl","year":"2016","journal-title":"Int. J. Commun."},{"key":"ref17","first-page":"18","article-title":"What do we mean when we talk about transparency? Toward meaningful transparency in commercial content moderation","volume":"13","author":"Suzor","year":"2019","journal-title":"Int. J. Commun."},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445921"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1177\/2053951719891748"},{"key":"ref20","first-page":"136","article-title":"Researching with data rights","volume":"2020","author":"Ausloos","year":"2021","journal-title":"Technol. Regulat."},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674736061"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/203356.203361"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.02.016"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3341162.3343802"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2460333"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979249"},{"key":"ref27","first-page":"2993","article-title":"Locked or not? Mental models of IoT feature interaction","volume-title":"Proc. CHI Conf. Human Factors Comput. Syst.","author":"Yarosh"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2016.102"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00036"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00034"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3018687"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2750765"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2021.101689"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2018.08.015"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2018.08.009"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2638728.2641553"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173848"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581263"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3287678"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376342"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445241"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025485"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3236112.3236126"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-70852-8_14"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.11.005"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382940"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445567"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00023"},{"key":"ref49","first-page":"445","article-title":"User-centered design","volume-title":"Encyclopedia of Human Computer Interaction","volume":"37","author":"Abras","year":"2004"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580842"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50309-3_26"},{"key":"ref53","first-page":"411","article-title":"It\u2019s the company, the government, you and I: User perceptions of responsibility for smart home privacy and security","volume-title":"Proc. 30th USENIX Security Symp. (USENIX Security)","author":"Haney"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420108"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3428361.3428464"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00029"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580909"},{"key":"ref58","first-page":"451","article-title":"More than smart speakers: Security and privacy perceptions of smart home personal assistants","volume-title":"Proc. 15th Symp. Usable Privacy Security (SOUPS)","author":"Abdi"},{"key":"ref59","first-page":"65","article-title":"End user security and privacy concerns with smart homes","volume-title":"Proc. 13th Symp. Usable Privacy Security (SOUPS)","author":"Zeng"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0075"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355577"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3214262"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15742-5_9"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451633"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2878658"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2864168"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445122"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300428"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3311957.3361863"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382850"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15742-5_8"},{"key":"ref72","first-page":"159","article-title":"Understanding and improving security and privacy in multi-user smart homes: A design exploration and in-home user study","volume-title":"Proc. 28th USENIX Security Symp. (USENIX Security)","author":"Zeng"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517602"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-12172-2_19"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376264"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3383016"},{"key":"ref77","article-title":"Transparency in the consumer Internet of Things: Data flows and data rights.","author":"Hudig","year":"2023"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1049\/pbse014e_ch2"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1080\/17579961.2018.1527479"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320093"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2935189"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3008906"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517510"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.145"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3381436"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/2732209.2732216"},{"key":"ref87","first-page":"1","article-title":"Who\u2019s in control? Interactions in multiuser smart homes","volume-title":"Proc. CHI Conf. Human Factors Comput. Syst.","author":"Geeng"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00138"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24046"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3010023"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.3011052"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00043"},{"key":"ref93","volume-title":"Research in the Crowdsourcing Age, a Case Study","year":"2022"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376662"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1111\/mono.12296"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50309-3_21"},{"key":"ref97","volume-title":"How to stop your smart home spying on you","author":"Winder","year":"2020"},{"key":"ref98","volume-title":"Smart devices spy on you\u20142 computer scientists explain how the Internet of Things can violate your privacy","author":"Yus","year":"2022"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/3309714"},{"key":"ref100","first-page":"1","article-title":"GDPR privacy implications for the Internet of Things","volume-title":"Proc. 4th Annu. IoT Security Found. Conf.","volume":"4","author":"Bastos"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp0630a"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.dr.2013.08.003"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.f6304"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1017\/S1049023X21000649"},{"key":"ref105","volume-title":"Mural","year":"2022"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1136\/eb-2014-101946"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/INFOS.2014.7036697"},{"key":"ref108","volume-title":"Hackers can hijack your house through your light bulb, researchers discover","author":"Cuthbertson","year":"2020"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.13"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.14"},{"key":"ref111","volume-title":"Here\u2019s what your ring doorbell knows about you","author":"McGowan","year":"2021"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1145\/1142405.1142410"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1086\/268251"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.120\/19781498710411-35"},{"issue":"3","key":"ref115","first-page":"114","article-title":"Determining what individual SUS scores mean: Adding an adjective rating scale","volume":"4","author":"Bangor","year":"2009","journal-title":"J. Usability Stud."},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533133"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69462-7_35"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174108"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581432"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1002\/poi3.255"},{"key":"ref121","first-page":"1","article-title":"Regulation (EU) 2016\/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/EC (general data protection regulation)","volume":"L119","year":"2016","journal-title":"Official J. Eur. Union"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.3389\/frobt.2021.665729"},{"key":"ref123","volume-title":"Electronic frontier foundation","year":"2022"},{"key":"ref124","volume-title":"Open rights group","year":"2022"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1080\/13600834.2021.1957193"},{"key":"ref126","volume-title":"Europe\u2019s Internet of Things Policy","year":"2022"},{"key":"ref127","volume-title":"Cyber resilience act","year":"2022"},{"key":"ref128","volume-title":"New cyber security laws to protect smart devices amid pandemic sales surge","year":"2021"},{"key":"ref129","volume-title":"Code of practice for consumer IoT security","year":"2018"},{"key":"ref130","volume-title":"Article 29 Working Party: Guidelines on Transparency Under Regulation 2016\/679 (WP260rev.01)","year":"2018"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10443092\/10261196.pdf?arnumber=10261196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T06:17:23Z","timestamp":1709360243000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10261196\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,1]]},"references-count":130,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2023.3318369","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,1]]}}}