{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T17:55:49Z","timestamp":1723485349116},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T00:00:00Z","timestamp":1567987200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004318","name":"Microsoft","doi-asserted-by":"publisher","award":["Microsoft Cloud Computing Research Centre"],"id":[{"id":"10.13039\/100004318","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,9]]},"DOI":"10.1145\/3341162.3343802","type":"proceedings-article","created":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T16:16:21Z","timestamp":1568218581000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Explaining automated environments"],"prefix":"10.1145","author":[{"given":"Chris","family":"Norval","sequence":"first","affiliation":[{"name":"University of Cambridge, UK"}]},{"given":"Jatinder","family":"Singh","sequence":"additional","affiliation":[{"name":"University of Cambridge, UK"}]}],"member":"320","published-online":{"date-parts":[[2019,9,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055245.3055255"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702455"},{"key":"e_1_3_2_1_3_1","unstructured":"Khalid Belhajjame Helena Deus Daniel Garijo Graham Klyne Paolo Missier Stian Soiland-Reyes and Stephen Zednik. 2013. PROV Model Primer. https:\/\/www.w3.org\/TR\/2013\/NOTE-prov-primer-20130430\/. Accessed: 2019-01-30. Khalid Belhajjame Helena Deus Daniel Garijo Graham Klyne Paolo Missier Stian Soiland-Reyes and Stephen Zednik. 2013. PROV Model Primer. https:\/\/www.w3.org\/TR\/2013\/NOTE-prov-primer-20130430\/. Accessed: 2019-01-30."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16462-5_15"},{"key":"e_1_3_2_1_5_1","unstructured":"Dieter Bohn. 2019. Amazon Says 100 Million Alexa Devices Have Been Sold: --- What's Next? https:\/\/www.theverge.com\/2019\/1\/4\/18168565\/amazon-alexa-devices-how-many-sold-number-100-million-dave-limp. Accessed: 2019-07-12. Dieter Bohn. 2019. Amazon Says 100 Million Alexa Devices Have Been Sold: --- What's Next? https:\/\/www.theverge.com\/2019\/1\/4\/18168565\/amazon-alexa-devices-how-many-sold-number-100-million-dave-limp. Accessed: 2019-07-12."},{"key":"e_1_3_2_1_6_1","unstructured":"BT. 2018. BT Modern Families Report. https:\/\/img01.products.bt.co.uk\/content\/dam\/bt\/storefront\/pdfs\/BT-Modern-Families-Report_20nov.pdf. Accessed: 2019-07-12. BT. 2018. BT Modern Families Report. https:\/\/img01.products.bt.co.uk\/content\/dam\/bt\/storefront\/pdfs\/BT-Modern-Families-Report_20nov.pdf. Accessed: 2019-07-12."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098279.3098539"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-018-0054-5"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16462-5_2"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-017-0486-1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/02763869.2018.1404391"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858288"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1330311.1330323"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"E. Nwafor A. Campbell D. Hill and G. Bloom. 2017. Towards a provenance collection framework for Internet of Things devices. In 2017 IEEE SmartWorld Ubiquitous Intelligence Computing Advanced Trusted Computed Scalable Computing Communications Cloud Big Data Computing Internet of People and Smart City Innovation. 1--6. E. Nwafor A. Campbell D. Hill and G. Bloom. 2017. Towards a provenance collection framework for Internet of Things devices. In 2017 IEEE SmartWorld Ubiquitous Intelligence Computing Advanced Trusted Computed Scalable Computing Communications Cloud Big Data Computing Internet of People and Smart City Innovation . 1--6.","DOI":"10.1109\/UIC-ATC.2017.8397531"},{"key":"e_1_3_2_1_15_1","volume-title":"9th USENIX Workshop on the Theory and Practice of Provenance (TaPP","author":"Schreiber Andreas","year":"2017","unstructured":"Andreas Schreiber and Regina Struminski . 2017 . Visualizing Provenance using Comics . In 9th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2017). USENIX Association. Andreas Schreiber and Regina Struminski. 2017. Visualizing Provenance using Comics. In 9th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2017). USENIX Association."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2887201"},{"key":"e_1_3_2_1_17_1","volume-title":"Fear and Logging in the Internet of Things. In Network and Distributed Systems Symposium.","author":"Wang Qi","year":"2018","unstructured":"Qi Wang , Wajih Ul Hassan , Adam Bates , and Carl Gunter . 2018 . Fear and Logging in the Internet of Things. In Network and Distributed Systems Symposium. Qi Wang, Wajih Ul Hassan, Adam Bates, and Carl Gunter. 2018. Fear and Logging in the Internet of Things. In Network and Distributed Systems Symposium."}],"event":{"name":"UbiComp '19: The 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing","location":"London United Kingdom","acronym":"UbiComp '19","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Adjunct Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341162.3343802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T13:59:49Z","timestamp":1700056789000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341162.3343802"}},"subtitle":["interrogating scripts, logs, and provenance using voice-assistants"],"short-title":[],"issued":{"date-parts":[[2019,9,9]]},"references-count":17,"alternative-id":["10.1145\/3341162.3343802","10.1145\/3341162"],"URL":"https:\/\/doi.org\/10.1145\/3341162.3343802","relation":{},"subject":[],"published":{"date-parts":[[2019,9,9]]},"assertion":[{"value":"2019-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}