{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T02:27:29Z","timestamp":1743733649793,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":132,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172252"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFC1523001"],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544548.3580842","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T04:28:44Z","timestamp":1681964924000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Reviewing and Reflecting on Smart Home Research from the Human-Centered Perspective"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6282-342X","authenticated-orcid":false,"given":"Yuan","family":"Yao","sequence":"first","affiliation":[{"name":"School of Architecture and Design, Beijing Jiaotong University, China and Academy of Arts & Design, Tsinghua University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9437-4366","authenticated-orcid":false,"given":"Li","family":"Huang","sequence":"additional","affiliation":[{"name":"Academy of Arts & Design, Tsinghua University, China and The Future Laboratory, Tsinghua University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5268-3347","authenticated-orcid":false,"given":"Yi","family":"He","sequence":"additional","affiliation":[{"name":"School of Digital Media & Design Arts, Beijing University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8091-3760","authenticated-orcid":false,"given":"Zhijun","family":"Ma","sequence":"additional","affiliation":[{"name":"Southeast University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5930-3899","authenticated-orcid":false,"given":"Xuhai","family":"Xu","sequence":"additional","affiliation":[{"name":"Information School, University of Washington, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0560-4228","authenticated-orcid":false,"given":"Haipeng","family":"Mi","sequence":"additional","affiliation":[{"name":"Academy of Arts & Design, Tsinghua University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_3_1_1","unstructured":"2022. Aware home. https:\/\/awarehome.gatech.edu\/"},{"key":"e_1_3_3_3_2_1","unstructured":"2022. Google Assistant. https:\/\/assistant.google.com\/"},{"key":"e_1_3_3_3_3_1","unstructured":"2022. PlaceLab. http:\/\/alumni.media.mit.edu\/\u00a0emunguia\/pdf\/PlaceLab.pdf"},{"key":"e_1_3_3_3_4_1","unstructured":"2022. R House HRI Lab. https:\/\/r-house.luddy.indiana.edu\/"},{"key":"e_1_3_3_3_5_1","unstructured":"2022. SSLab. https:\/\/www.ht.sfc.keio.ac.jp\/SSLab\/research\/"},{"key":"e_1_3_3_3_6_1","unstructured":"2022. UK Dri Care Research Technology Centre. https:\/\/www.imperial.ac.uk\/uk-dri-care-research-technology"},{"key":"e_1_3_3_3_7_1","volume-title":"Principal component analysis","author":"Abdi Herv\u00e9","year":"2010","unstructured":"Herv\u00e9 Abdi and Lynne\u00a0J Williams. 2010. Principal component analysis. Wiley interdisciplinary reviews: computational statistics 2, 4(2010), 433\u2013459."},{"key":"e_1_3_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445122"},{"key":"e_1_3_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3323994.3369883"},{"key":"e_1_3_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CPE.2018.8372548"},{"key":"e_1_3_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SITA.2015.7358409"},{"key":"e_1_3_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3380958"},{"key":"e_1_3_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502097"},{"volume-title":"Smart homes: past, present and future","author":"Aldrich K","key":"e_1_3_3_3_14_1","unstructured":"Frances\u00a0K Aldrich. 2003. Smart homes: past, present and future. Springer, 17\u201339."},{"key":"e_1_3_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEECT.2017.7916544"},{"key":"e_1_3_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445672"},{"key":"e_1_3_3_3_17_1","doi-asserted-by":"crossref","unstructured":"Maurice\u00a0S Bartlett. 1950. Tests of significance in factor analysis. British journal of psychology(1950).","DOI":"10.1111\/j.2044-8317.1950.tb00285.x"},{"key":"e_1_3_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300528"},{"key":"e_1_3_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322308"},{"volume-title":"Natural language processing with Python: analyzing text with the natural language toolkit. \" O\u2019Reilly Media","author":"Bird Steven","key":"e_1_3_3_3_20_1","unstructured":"Steven Bird, Ewan Klein, and Edward Loper. 2009. Natural language processing with Python: analyzing text with the natural language toolkit. \" O\u2019Reilly Media, Inc.\"."},{"key":"e_1_3_3_3_21_1","first-page":"993","article-title":"Latent dirichlet allocation","author":"Blei M","year":"2003","unstructured":"David\u00a0M Blei, Andrew\u00a0Y Ng, and Michael\u00a0I Jordan. 2003. Latent dirichlet allocation. Journal of machine Learning research 3, Jan (2003), 993\u20131022.","journal-title":"Journal of machine Learning research 3"},{"key":"e_1_3_3_3_22_1","unstructured":"Barry Brumitt Brian Meyers John Krumm Amanda Kern and Steven Shafer. 2022. EasyLiving: Technologies for Intelligent Environments. https:\/\/www.microsoft.com\/en-us\/research\/publication\/easyliving-technologies-intelligent-environments\/"},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491500.2491504"},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445691"},{"key":"e_1_3_3_3_25_1","first-page":"20694","article-title":"Intelligent smart home automation and security system using Arduino and Wi-fi","volume":"6","author":"Chandramohan J","year":"2017","unstructured":"J Chandramohan, R Nagarajan, K Satheeshkumar, N Ajithkumar, PA Gopinath, and S Ranjithkumar. 2017. Intelligent smart home automation and security system using Arduino and Wi-fi. International Journal of Engineering And Computer Science (IJECS) 6, 3(2017), 20694\u201320698.","journal-title":"International Journal of Engineering And Computer Science (IJECS)"},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301019.3323914"},{"key":"e_1_3_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338286.3344408"},{"key":"e_1_3_3_3_28_1","volume-title":"MicroRNAs and complex diseases: from experimental results to computational models. Briefings in bioinformatics 20, 2","author":"Chen Xing","year":"2019","unstructured":"Xing Chen, Di Xie, Qi Zhao, and Zhu-Hong You. 2019. MicroRNAs and complex diseases: from experimental results to computational models. Briefings in bioinformatics 20, 2 (2019), 515\u2013539."},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311957.3361849"},{"key":"e_1_3_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376501"},{"key":"e_1_3_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300488"},{"key":"e_1_3_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1177\/1420326X14521229"},{"key":"e_1_3_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/13467581.2019.1617718"},{"key":"e_1_3_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-017-0035-0"},{"key":"e_1_3_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753625"},{"volume-title":"Where the action is: the foundations of embodied interaction","author":"Dourish Paul","key":"e_1_3_3_3_36_1","unstructured":"Paul Dourish. 2001. Where the action is: the foundations of embodied interaction. MIT press."},{"key":"e_1_3_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445058"},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397617.3397825"},{"key":"e_1_3_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.egypro.2017.03.732"},{"key":"e_1_3_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376774"},{"key":"e_1_3_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"e_1_3_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3202185.3202744"},{"key":"e_1_3_3_3_43_1","volume-title":"Categories and functionality of smart home technology for energy management. Building and environment 123","author":"Ford Rebecca","year":"2017","unstructured":"Rebecca Ford, Marco Pritoni, Angela Sanguinetti, and Beth Karlin. 2017. Categories and functionality of smart home technology for energy management. Building and environment 123 (2017), 543\u2013554."},{"key":"e_1_3_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196709.3196815"},{"key":"e_1_3_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485058"},{"key":"e_1_3_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300498"},{"key":"e_1_3_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460418.3479331"},{"key":"e_1_3_3_3_48_1","volume-title":"Critical-Playful Speculations with Cameras in the Home. In CHI Conference on Human Factors in Computing Systems. 1\u201322","author":"Tan Neilly","year":"2022","unstructured":"Neilly H.\u00a0Tan, Brian Kinnee, Dana Langseth, Sean A.\u00a0Munson, and Audrey Desjardins. 2022. Critical-Playful Speculations with Cameras in the Home. In CHI Conference on Human Factors in Computing Systems. 1\u201322."},{"key":"e_1_3_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517617"},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379336.3381492"},{"key":"e_1_3_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2010.5606276"},{"volume-title":"Inside the smart home: Ideas, possibilities and methods","author":"Harper Richard","key":"e_1_3_3_3_52_1","unstructured":"Richard Harper. 2003. Inside the smart home: Ideas, possibilities and methods. Springer, 1\u201313."},{"key":"e_1_3_3_3_53_1","unstructured":"David Harris and Sarah\u00a0L Harris. 2010. Digital design and computer architecture. Morgan Kaufmann."},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"crossref","unstructured":"Sarah\u00a0L Harris and David Harris. 2015. Digital design and computer architecture. Morgan Kaufmann.","DOI":"10.1016\/B978-0-12-800056-4.00006-6"},{"key":"e_1_3_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3170627"},{"key":"e_1_3_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490099.3511129"},{"key":"e_1_3_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/INCET49848.2020.9154007"},{"key":"e_1_3_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173578"},{"key":"e_1_3_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196709.3196804"},{"key":"e_1_3_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517602"},{"key":"e_1_3_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3410530.3414328"},{"key":"e_1_3_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2696454.2696460"},{"key":"e_1_3_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559636.2559839"},{"key":"e_1_3_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.7763\/IJET.2015.V7.816"},{"key":"e_1_3_3_3_65_1","doi-asserted-by":"publisher","unstructured":"Bethany Kon Alex Lam and Jonathan Chan. 2017. Evolution of Smart Homes for the Elderly. In Proceedings of the 26th International Conference on World Wide Web Companion (Perth Australia) (WWW \u201917 Companion). International World Wide Web Conferences Steering Committee Republic and Canton of Geneva CHE 1095\u20131101. https:\/\/doi.org\/10.1145\/3041021.3054928","DOI":"10.1145\/3041021.3054928"},{"key":"e_1_3_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445598"},{"key":"e_1_3_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300669"},{"key":"e_1_3_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376273"},{"key":"e_1_3_3_3_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322366"},{"key":"e_1_3_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.erss.2021.102211"},{"key":"e_1_3_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2022.121676"},{"key":"e_1_3_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3393914.3395841"},{"key":"e_1_3_3_3_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2016.04.007"},{"key":"e_1_3_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3279963.3281658"},{"key":"e_1_3_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.3390\/en13051097"},{"key":"e_1_3_3_3_76_1","unstructured":"T\u00a0Soni Madhulatha. 2012. An overview on clustering methods. arXiv preprint arXiv:1205.1117(2012)."},{"key":"e_1_3_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2018.08.015"},{"key":"e_1_3_3_3_78_1","volume-title":"Heribert Valiant, and Herwig Zeiner.","author":"Marksteiner Stefan","year":"2017","unstructured":"Stefan Marksteiner, V\u00edctor Juan\u00a0Exp\u00f3sito Jim\u00e9nez, Heribert Valiant, and Herwig Zeiner. 2017. An overview of wireless IoT protocol security in the smart home domain. 2017 Internet of Things Business Models, Users, and Networks (2017), 1\u20138."},{"key":"e_1_3_3_3_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501984"},{"key":"e_1_3_3_3_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2011.6007636"},{"key":"e_1_3_3_3_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322324"},{"key":"e_1_3_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892311"},{"key":"e_1_3_3_3_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/975817.975841"},{"volume-title":"Hierarchical clustering","author":"Nielsen Frank","key":"e_1_3_3_3_84_1","unstructured":"Frank Nielsen. 2016. Hierarchical clustering. Springer, 195\u2013211."},{"key":"e_1_3_3_3_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557318"},{"key":"e_1_3_3_3_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517473"},{"key":"e_1_3_3_3_87_1","doi-asserted-by":"publisher","DOI":"10.3390\/asi1040042"},{"key":"e_1_3_3_3_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376450"},{"key":"e_1_3_3_3_89_1","volume-title":"The relationship between online activities, netiquette and cyberbullying. Children and youth services review 42","author":"Park Sora","year":"2014","unstructured":"Sora Park, Eun-Yeong Na, and Eun-mee Kim. 2014. The relationship between online activities, netiquette and cyberbullying. Children and youth services review 42 (2014), 74\u201381."},{"key":"e_1_3_3_3_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395570"},{"key":"e_1_3_3_3_91_1","doi-asserted-by":"publisher","DOI":"10.3390\/jintelligence6040046"},{"key":"e_1_3_3_3_92_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.10.040"},{"key":"e_1_3_3_3_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300275"},{"key":"e_1_3_3_3_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531073.3531089"},{"key":"e_1_3_3_3_95_1","first-page":"236605","article-title":"The media equation: How people treat computers, television, and new media like real people","volume":"10","author":"Reeves Byron","year":"1996","unstructured":"Byron Reeves and Clifford Nass. 1996. The media equation: How people treat computers, television, and new media like real people. Cambridge, UK 10(1996), 236605.","journal-title":"Cambridge, UK"},{"key":"e_1_3_3_3_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/1109540.1109556"},{"key":"e_1_3_3_3_97_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cities.2018.02.014"},{"key":"e_1_3_3_3_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517510"},{"key":"e_1_3_3_3_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445770"},{"key":"e_1_3_3_3_100_1","doi-asserted-by":"publisher","DOI":"10.2196\/15429"},{"key":"e_1_3_3_3_101_1","volume-title":"Internet Research","author":"Scheuermann Larry","year":"1997","unstructured":"Larry Scheuermann and Gary Taylor. 1997. Netiquette. Internet Research (1997)."},{"volume-title":"Smart home definition and security threats. In 2015 ninth international conference on IT security incident management & IT forensics","author":"Schiefer Michael","key":"e_1_3_3_3_102_1","unstructured":"Michael Schiefer. 2015. Smart home definition and security threats. In 2015 ninth international conference on IT security incident management & IT forensics. IEEE, 114\u2013118."},{"key":"e_1_3_3_3_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311927.3323157"},{"key":"e_1_3_3_3_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395501"},{"key":"e_1_3_3_3_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/3171221.3171248"},{"key":"e_1_3_3_3_106_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-3110"},{"key":"e_1_3_3_3_107_1","doi-asserted-by":"publisher","DOI":"10.5555\/2390948.2391052"},{"key":"e_1_3_3_3_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341162.3343772"},{"key":"e_1_3_3_3_109_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2016.10.006"},{"key":"e_1_3_3_3_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300875"},{"key":"e_1_3_3_3_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174110"},{"key":"e_1_3_3_3_112_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS","author":"Tabassum Madiha","year":"2019","unstructured":"Madiha Tabassum, Tomasz Kosinski, and Heather\u00a0Richter Lipford. 2019. \" I don\u2019t own the data\": End User Perceptions of Smart Home Device Data Practices and Risks. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). 435\u2013450."},{"key":"e_1_3_3_3_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376255"},{"key":"e_1_3_3_3_114_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20133674"},{"key":"e_1_3_3_3_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502137"},{"key":"e_1_3_3_3_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/3462204.3481724"},{"key":"e_1_3_3_3_117_1","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553515"},{"key":"e_1_3_3_3_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/1228716.1228759"},{"key":"e_1_3_3_3_119_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2764083"},{"key":"e_1_3_3_3_120_1","volume-title":"Analyzing the past to prepare for the future: Writing a literature review. MIS quarterly","author":"Webster Jane","year":"2002","unstructured":"Jane Webster and Richard\u00a0T Watson. 2002. Analyzing the past to prepare for the future: Writing a literature review. MIS quarterly (2002), xiii\u2013xxiii."},{"key":"e_1_3_3_3_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376314"},{"key":"e_1_3_3_3_122_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395467"},{"key":"e_1_3_3_3_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395467"},{"key":"e_1_3_3_3_124_1","volume-title":"Designing for Better Privacy Awareness in Smart Homes. In Conference Companion Publication of the 2019 on Computer Supported Cooperative Work and Social Computing. 98\u2013101","author":"Yao Yaxing","year":"2019","unstructured":"Yaxing Yao. 2019. Designing for Better Privacy Awareness in Smart Homes. In Conference Companion Publication of the 2019 on Computer Supported Cooperative Work and Social Computing. 98\u2013101."},{"key":"e_1_3_3_3_125_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300428"},{"key":"e_1_3_3_3_126_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517637"},{"key":"e_1_3_3_3_127_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341162.3343804"},{"key":"e_1_3_3_3_128_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341162.3349307"},{"key":"e_1_3_3_3_129_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267305.3274184"},{"key":"e_1_3_3_3_130_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"key":"e_1_3_3_3_131_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2016.03.047"},{"key":"e_1_3_3_3_132_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240704"}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Hamburg Germany","acronym":"CHI '23"},"container-title":["Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544548.3580842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T17:19:01Z","timestamp":1723483141000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3580842"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":132,"alternative-id":["10.1145\/3544548.3580842","10.1145\/3544548"],"URL":"https:\/\/doi.org\/10.1145\/3544548.3580842","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}