{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T21:27:34Z","timestamp":1746480454091},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,27]]},"DOI":"10.1145\/3491101.3503577","type":"proceedings-article","created":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T16:49:48Z","timestamp":1651250988000},"source":"Crossref","is-referenced-by-count":7,"title":["\u201cIt was hard to find the words\u201d: Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices"],"prefix":"10.1145","author":[{"given":"Sarah","family":"Turner","sequence":"first","affiliation":[{"name":"School of Computing, University of Kent, United Kingdom"}]},{"given":"Jason R.C.","family":"Nurse","sequence":"additional","affiliation":[{"name":"School of Computing, University of Kent, United Kingdom"}]},{"given":"Shujun","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computing, University of Kent, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2022,4,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Parenting: A Two-Month Examination of the Bi-directional Influences Between Parental Mediation and Adolescent Online Risk Exposure. In HCI for Cybersecurity","author":"Agha Zainab","unstructured":"Zainab Agha , Reza Ghaiumy\u00a0Anaraky , Karla Badillo-Urquiola , Bridget McHugh , and Pamela Wisniewski . 2021. \u2018Just-in-Time \u2019 Parenting: A Two-Month Examination of the Bi-directional Influences Between Parental Mediation and Adolescent Online Risk Exposure. In HCI for Cybersecurity , Privacy and Trust, Abbas Moallem (Ed.). Springer International Publishing , Cham , 261\u2013280. Zainab Agha, Reza Ghaiumy\u00a0Anaraky, Karla Badillo-Urquiola, Bridget McHugh, and Pamela Wisniewski. 2021. \u2018Just-in-Time\u2019 Parenting: A Two-Month Examination of the Bi-directional Influences Between Parental Mediation and Adolescent Online Risk Exposure. In HCI for Cybersecurity, Privacy and Trust, Abbas Moallem (Ed.). Springer International Publishing, Cham, 261\u2013280."},{"key":"e_1_3_2_1_2_1","volume-title":"Flexible and Mindful Self-Tracking: Design Implications from Paper Bullet Journals","author":"Ayobi Amid","unstructured":"Amid Ayobi , Tobias Sonne , Paul Marshall , and Anna\u00a0 L. Cox . 2018. Flexible and Mindful Self-Tracking: Design Implications from Paper Bullet Journals . Association for Computing Machinery , New York, NY, USA , 1\u201314. https:\/\/doi.org\/10.1145\/3173574.3173602 Amid Ayobi, Tobias Sonne, Paul Marshall, and Anna\u00a0L. Cox. 2018. Flexible and Mindful Self-Tracking: Design Implications from Paper Bullet Journals. Association for Computing Machinery, New York, NY, USA, 1\u201314. https:\/\/doi.org\/10.1145\/3173574.3173602"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055098"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382850"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445691"},{"key":"e_1_3_2_1_7_1","volume-title":"Autoethnography as Method(1 ed.)","author":"Chang Heewon","unstructured":"Heewon Chang . 2016. Autoethnography as Method(1 ed.) . Routledge, New York, NY , USA. https:\/\/doi.org\/10.4324\/9781315433370 Heewon Chang. 2016. Autoethnography as Method(1 ed.). Routledge, New York, NY, USA. https:\/\/doi.org\/10.4324\/9781315433370"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073943.1073944"},{"key":"e_1_3_2_1_9_1","volume-title":"UK Government.","author":"Department for Digital, Culture","year":"2018","unstructured":"Department for Digital, Culture , Media and Sport , UK Government. 2018 . Code of Practice for Consumer IoT Security. Technical Report. Department for Digital , Culture, Media and Sport (DCMS), UK Government. 24 pages. https:\/\/www.gov.uk\/government\/publications\/code-of-practice-for-consumer-iot-security Department for Digital, Culture, Media and Sport, UK Government. 2018. Code of Practice for Consumer IoT Security. Technical Report. Department for Digital, Culture, Media and Sport (DCMS), UK Government. 24 pages. https:\/\/www.gov.uk\/government\/publications\/code-of-practice-for-consumer-iot-security"},{"key":"e_1_3_2_1_10_1","unstructured":"Department for Education UK Government. 2013. National curriculum in England: computing programmes of study. Governmental report. https:\/\/www.gov.uk\/government\/publications\/national-curriculum-in-england-computing-programmes-of-study\/national-curriculum-in-england-computing-programmes-of-study Department for Education UK Government. 2013. National curriculum in England: computing programmes of study. Governmental report. https:\/\/www.gov.uk\/government\/publications\/national-curriculum-in-england-computing-programmes-of-study\/national-curriculum-in-england-computing-programmes-of-study"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.238"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359292"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359165"},{"key":"e_1_3_2_1_14_1","volume-title":"Using Diaries to Probe the Illness Experiences of Adolescent Patients and Parental Caregivers","author":"Hong K.","unstructured":"Matthew\u00a0 K. Hong , Udaya Lakshmi , Kimberly Do , Sampath Prahalad , Thomas Olson , Rosa\u00a0 I. Arriaga , and Lauren Wilcox . 2020. Using Diaries to Probe the Illness Experiences of Adolescent Patients and Parental Caregivers . Association for Computing Machinery , New York, NY, USA , 1\u201316. https:\/\/doi.org\/10.1145\/3313831.3376426 Matthew\u00a0K. Hong, Udaya Lakshmi, Kimberly Do, Sampath Prahalad, Thomas Olson, Rosa\u00a0I. Arriaga, and Lauren Wilcox. 2020. Using Diaries to Probe the Illness Experiences of Adolescent Patients and Parental Caregivers. Association for Computing Machinery, New York, NY, USA, 1\u201316. https:\/\/doi.org\/10.1145\/3313831.3376426"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312786"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445598"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196709.3196731"},{"key":"e_1_3_2_1_18_1","volume-title":"An Autoethnographic Approach to Guide Situated Ethical Decisions in Participatory Design with Teenagers. Interacting with Computers 29, 3 (10","author":"Malinverni Laura","year":"2016","unstructured":"Laura Malinverni and Narcis Pares . 2016. An Autoethnographic Approach to Guide Situated Ethical Decisions in Participatory Design with Teenagers. Interacting with Computers 29, 3 (10 2016 ), 403\u2013415. https:\/\/doi.org\/10.1093\/iwc\/iww031 arXiv:https:\/\/academic.oup.com\/iwc\/article-pdf\/29\/3\/403\/11149061\/iww031.pdf Laura Malinverni and Narcis Pares. 2016. An Autoethnographic Approach to Guide Situated Ethical Decisions in Participatory Design with Teenagers. Interacting with Computers 29, 3 (10 2016), 403\u2013415. https:\/\/doi.org\/10.1093\/iwc\/iww031 arXiv:https:\/\/academic.oup.com\/iwc\/article-pdf\/29\/3\/403\/11149061\/iww031.pdf"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134711"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1037\/1089-2680.12.1.9"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557179"},{"key":"e_1_3_2_1_23_1","volume-title":"THE INTERNET OF THINGS SECURITY: A SURVEY ENCOMPASSING UNEXPLORED AREAS AND NEW INSIGHTS. Computers & Security 112, 102494","author":"Omolara Abiodun\u00a0Esther","year":"2021","unstructured":"Abiodun\u00a0Esther Omolara , Abdullah Alabdulatif , Oludare\u00a0Isaac Abiodun , Moatsum Alawida , Abdulatif Alabdulatif , Wafa\u2019\u00a0Hamdan Alshoura , and Humaira Arshad . 2021 . THE INTERNET OF THINGS SECURITY: A SURVEY ENCOMPASSING UNEXPLORED AREAS AND NEW INSIGHTS. Computers & Security 112, 102494 (2021), 31\u00a0pages. https:\/\/doi.org\/10.1016\/j.cose.2021.102494 Abiodun\u00a0Esther Omolara, Abdullah Alabdulatif, Oludare\u00a0Isaac Abiodun, Moatsum Alawida, Abdulatif Alabdulatif, Wafa\u2019\u00a0Hamdan Alshoura, and Humaira Arshad. 2021. THE INTERNET OF THINGS SECURITY: A SURVEY ENCOMPASSING UNEXPLORED AREAS AND NEW INSIGHTS. Computers & Security 112, 102494 (2021), 31\u00a0pages. https:\/\/doi.org\/10.1016\/j.cose.2021.102494"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2021.535"},{"key":"e_1_3_2_1_25_1","unstructured":"Kari Paul. 2020. Dozens sue Amazon\u2019s Ring after camera hack leads to threats and racial slurs. The Guardian. https:\/\/www.theguardian.com\/technology\/2020\/dec\/23\/amazon-ring-camera-hack-lawsuit-threats Kari Paul. 2020. Dozens sue Amazon\u2019s Ring after camera hack leads to threats and racial slurs. The Guardian. https:\/\/www.theguardian.com\/technology\/2020\/dec\/23\/amazon-ring-camera-hack-lawsuit-threats"},{"key":"e_1_3_2_1_26_1","volume-title":"Children with Autism and Technology Use: A Case Study of the Diary Method. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems","author":"Putnam Cynthia","year":"2020","unstructured":"Cynthia Putnam and Bamshad Mobasher . 2020 . Children with Autism and Technology Use: A Case Study of the Diary Method. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems ( Honolulu, HI, USA) (CHI EA \u201920). Association for Computing Machinery, New York, NY, USA, 1\u20138. https:\/\/doi.org\/10.1145\/3334480.3375218 Cynthia Putnam and Bamshad Mobasher. 2020. Children with Autism and Technology Use: A Case Study of the Diary Method. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI EA \u201920). Association for Computing Machinery, New York, NY, USA, 1\u20138. https:\/\/doi.org\/10.1145\/3334480.3375218"},{"key":"e_1_3_2_1_27_1","volume-title":"New Directions in Third Wave Human-Computer Interaction","author":"Rapp Amon","unstructured":"Amon Rapp . 2018. Autoethnography in Human-Computer Interaction: Theory and Practice . In New Directions in Third Wave Human-Computer Interaction . Springer International Publishing , Switzerland . https:\/\/doi.org\/10.1007\/978-3-319-73374-6_3 Amon Rapp. 2018. Autoethnography in Human-Computer Interaction: Theory and Practice. In New Directions in Third Wave Human-Computer Interaction. Springer International Publishing, Switzerland. https:\/\/doi.org\/10.1007\/978-3-319-73374-6_3"},{"key":"e_1_3_2_1_28_1","unstructured":"Rudra Srinivas. 2020. 10 IoT Security Incidents That Make You Feel Less Secure. CISO Mag. https:\/\/cisomag.eccouncil.org\/10-iot-security-incidents-that-make-you-feel-less-secure\/ Rudra Srinivas. 2020. 10 IoT Security Incidents That Make You Feel Less Secure. CISO Mag. https:\/\/cisomag.eccouncil.org\/10-iot-security-incidents-that-make-you-feel-less-secure\/"},{"key":"e_1_3_2_1_29_1","volume-title":"End User Perceptions of Smart Home Device Data Practices and Risks. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019","author":"Tabassum Madiha","year":"2019","unstructured":"Madiha Tabassum , Tomasz Kosinski , and Heather\u00a0Richter Lipford . 2019 . \u201d I don\u2019t own the data \u201d: End User Perceptions of Smart Home Device Data Practices and Risks. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019 ). USENIX Association, Santa Clara, CA, 435\u2013450. https:\/\/www.usenix.org\/conference\/soups 2019\/presentation\/tabassum Madiha Tabassum, Tomasz Kosinski, and Heather\u00a0Richter Lipford. 2019. \u201dI don\u2019t own the data\u201d: End User Perceptions of Smart Home Device Data Practices and Risks. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA, 435\u2013450. https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/tabassum"},{"key":"e_1_3_2_1_30_1","volume-title":"The State of the Connected Home","author":"UK","year":"2021","unstructured":"tech UK and GfK. 2021. The State of the Connected Home 2021 . Industry Report . techUK. https:\/\/www.techuk.org\/resource\/the-state-of-the-connected-home-2021-new-report-launch.html techUK and GfK. 2021. The State of the Connected Home 2021. Industry Report. techUK. https:\/\/www.techuk.org\/resource\/the-state-of-the-connected-home-2021-new-report-launch.html"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134743"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376605"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.04.026"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858317"}],"event":{"name":"CHI '22: CHI Conference on Human Factors in Computing Systems","location":"New Orleans LA USA","acronym":"CHI '22","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["CHI Conference on Human Factors in Computing Systems Extended Abstracts"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491101.3503577","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T00:02:56Z","timestamp":1651708976000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491101.3503577"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,27]]},"references-count":34,"alternative-id":["10.1145\/3491101.3503577","10.1145\/3491101"],"URL":"https:\/\/doi.org\/10.1145\/3491101.3503577","relation":{},"subject":[],"published":{"date-parts":[[2022,4,27]]}}}