{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:46:45Z","timestamp":1730328405987,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3643834.3661527","type":"proceedings-article","created":{"date-parts":[[2024,6,29]],"date-time":"2024-06-29T22:48:34Z","timestamp":1719701314000},"page":"3372-3388","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Designing Interactive Privacy Labels for Advanced Smart Home Device Configuration Options"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-9743-3819","authenticated-orcid":false,"given":"Maximiliane","family":"Windl","sequence":"first","affiliation":[{"name":"LMU Munich, Germany and Munich Center for Machine Learning (MCML), Germany"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0287-0945","authenticated-orcid":false,"given":"Sebastian S.","family":"Feger","sequence":"additional","affiliation":[{"name":"LMU Munich, Germany and TH Rosenheim, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. ACM Hum.-Comput. Interact. 4, CSCW2, Article 116 (oct","author":"Ahmad Imtiaz","year":"2020","unstructured":"Imtiaz Ahmad, Rosta Farzan, Apu Kapadia, and Adam\u00a0J. Lee. 2020. Tangible Privacy: Towards User-Centric Sensor Designs for Bystander Privacy. Proc. ACM Hum.-Comput. Interact. 4, CSCW2, Article 116 (oct 2020), 28\u00a0pages. https:\/\/doi.org\/10.1145\/3415187"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600096"},{"key":"e_1_3_2_1_3_1","volume-title":"Workshop on Data and Algorithmic Transparency","author":"Apthorpe Noah","year":"2016","unstructured":"Noah Apthorpe, Dillon Reisman, and Nick Feamster. 2016. A smart home is no castle: Privacy vulnerabilities of encrypted iot traffic. Workshop on Data and Algorithmic Transparency (2016)."},{"key":"e_1_3_2_1_4_1","first-page":"2019","volume-title":"Proceedings on Privacy Enhancing Technologies 2019","author":"Barbosa M","year":"2019","unstructured":"Nat\u00e3\u00a0M Barbosa, Joon\u00a0S Park, Yaxing Yao, and Yang Wang. 2019. \u201cWhat if?\u201d Predicting Individual Users\u2019 Smart Home Privacy Preferences and Their Changes. Proceedings on Privacy Enhancing Technologies 2019, 4 (2019), 211\u2013231. https:\/\/doi.org\/10.2478\/popets-2019-0066"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3502288"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753846.1754161"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00706ED1V01Y201602HCI034"},{"key":"e_1_3_2_1_8_1","volume-title":"2016 European Intelligence and Security Informatics Conference(EISIC, 16)","author":"Bugeja Joseph","year":"2016","unstructured":"Joseph Bugeja, Andreas Jacobsson, and Paul Davidsson. 2016. On privacy and security challenges in smart connected homes. In 2016 European Intelligence and Security Informatics Conference(EISIC, 16). IEEE, 172\u2013175. https:\/\/doi.org\/10.1109\/EISIC.2016.044"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445691"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems","author":"Chen Yuxin","year":"2020","unstructured":"Yuxin Chen, Huiying Li, Shan-Yuan Teng, Steven Nagels, Zhijing Li, Pedro Lopes, Ben\u00a0Y. Zhao, and Haitao Zheng. 2020. Wearable Microphone Jamming. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI \u201920). Association for Computing Machinery, New York, NY, USA, 1\u201312. https:\/\/doi.org\/10.1145\/3313831.3376304"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 2012 ACM Conference on Ubiquitous Computing","author":"Choe Eun\u00a0Kyoung","year":"2012","unstructured":"Eun\u00a0Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly Harrison, Shwetak\u00a0N. Patel, and Julie\u00a0A. Kientz. 2012. Investigating Receptiveness to Sensing and Inference in the Home Using Sensor Proxies. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (Pittsburgh, Pennsylvania) (UbiComp \u201912). Association for Computing Machinery, New York, NY, USA, 61\u201370. https:\/\/doi.org\/10.1145\/2370216.2370226"},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5, 4, Article 154 (dec","author":"Do Youngwook","year":"2022","unstructured":"Youngwook Do, Jung\u00a0Wook Park, Yuxi Wu, Avinandan Basu, Dingtian Zhang, Gregory\u00a0D. Abowd, and Sauvik Das. 2022. Smart Webcam Cover: Exploring the Design of an Intelligent Webcam Cover to Improve Usability and Trust. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5, 4, Article 154 (dec 2022), 21\u00a0pages. https:\/\/doi.org\/10.1145\/3494983"},{"key":"e_1_3_2_1_13_1","volume-title":"2020 IEEE Symposium on Security and Privacy (SP). IEEE, 447\u2013464","author":"Emami-Naeini Pardis","year":"2020","unstructured":"Pardis Emami-Naeini, Yuvraj Agarwal, Lorrie\u00a0Faith Cranor, and Hanan Hibshi. 2020. Ask the experts: What should be on an IoT privacy and security label?. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 447\u2013464. https:\/\/doi.org\/10.1109\/SP40000.2020.00043"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI \u201919)","author":"Emami-Naeini Pardis","year":"2019","unstructured":"Pardis Emami-Naeini, Henry Dixon, Yuvraj Agarwal, and Lorrie\u00a0Faith Cranor. 2019. Exploring How Privacy and Security Factor into IoT Device Purchase Behavior. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI \u201919). Association for Computing Machinery, New York, NY, USA, 1\u201312. https:\/\/doi.org\/10.1145\/3290605.3300764"},{"key":"e_1_3_2_1_15_1","volume-title":"ConnectivityControl: Providing Smart Home Users with Real Privacy Configuration Options. In End-User Development: 9th International Symposium, IS-EUD 2023, Cagliari, Italy, June 6\u20138, 2023, Proceedings","author":"Feger S.","year":"2023","unstructured":"Sebastian\u00a0S. Feger, Maximiliane Windl, Jesse Grootjen, and Albrecht Schmidt. 2023. ConnectivityControl: Providing Smart Home Users with Real Privacy Configuration Options. In End-User Development: 9th International Symposium, IS-EUD 2023, Cagliari, Italy, June 6\u20138, 2023, Proceedings (Cagliari, Italy). Springer-Verlag, Berlin, Heidelberg, 180\u2013188. https:\/\/doi.org\/10.1007\/978-3-031-34433-6_11"},{"key":"e_1_3_2_1_16_1","volume-title":"https:\/\/medium.com\/sensor-lab\/the-privacy-illusion994ed98ec3ab Retrieved","author":"Franke Gert","year":"2019","unstructured":"Gert Franke, Thomas Clever, Wouter van Dijk, Jeremy Raider, and Roel de Jonge. 2019. Privacy Label. https:\/\/medium.com\/sensor-lab\/the-privacy-illusion994ed98ec3ab Retrieved December 10, 2019."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1177\/1525822X12444061"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of An Interactive Workshop on the Human aspects of Smarthome Security and Privacy (WSSP). USENIX","author":"Gerber Nina","year":"2018","unstructured":"Nina Gerber, Benjamin Reinheimer, and Melanie Volkamer. 2018. Home Sweet Home? Investigating Users\u2019 Awareness of Smart Home Privacy Threats. In Proceedings of An Interactive Workshop on the Human aspects of Smarthome Security and Privacy (WSSP). USENIX, Baltimore, MD, USA. https:\/\/doi.org\/10.5445\/IR\/1000083578"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","first-page":"104468","DOI":"10.1016\/j.eneco.2019.08.001","article-title":"Cold Case: The forensic economics of energy efficiency labels for domestic refrigeration appliances","volume":"84","author":"Goeschl Timo","year":"2019","unstructured":"Timo Goeschl. 2019. Cold Case: The forensic economics of energy efficiency labels for domestic refrigeration appliances. Energy Economics 84 (2019), 104468.","journal-title":"Energy Economics"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3380960"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems","author":"Jin Haojian","year":"2022","unstructured":"Haojian Jin, Boyuan Guo, Rituparna Roychoudhury, Yaxing Yao, Swarun Kumar, Yuvraj Agarwal, and Jason\u00a0I. Hong. 2022. Exploring the Needs of Users for Supporting Privacy-Protective Behaviors in Smart Homes. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems (New Orleans, LA, USA) (CHI \u201922). Association for Computing Machinery, New York, NY, USA, Article 449, 19\u00a0pages. https:\/\/doi.org\/10.1145\/3491102.3517602"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 2021 ACM Designing Interactive Systems Conference","author":"Kim Nari","year":"2021","unstructured":"Nari Kim, Juntae Kim, Bomin Kim, and Young-Woo Park. 2021. The Trial of Posit in Shared Offices: Controlling Disclosure Levels of Schedule Data for Privacy by Changing the Placement of a Personal Interactive Calendar. In Proceedings of the 2021 ACM Designing Interactive Systems Conference (Virtual Event, USA) (DIS \u201921). Association for Computing Machinery, New York, NY, USA, 149\u2013159. https:\/\/doi.org\/10.1145\/3461778.3462073"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.07.002"},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 4, Article 176 (dec","author":"Kwon Hyosun","year":"2018","unstructured":"Hyosun Kwon, Joel\u00a0E. Fischer, Martin Flintham, and James Colley. 2018. The Connected Shower: Studying Intimate Data in Everyday Life. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 4, Article 176 (dec 2018), 22\u00a0pages. https:\/\/doi.org\/10.1145\/3287054"},{"key":"e_1_3_2_1_25_1","volume-title":"Adopting IoT Devices. In Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems(CHI\u201921)","author":"Lafontaine Evan","year":"2021","unstructured":"Evan Lafontaine, Aafaq Sabir, and Anupam Das. 2021. Understanding People\u2019s Attitude and Concerns towards Adopting IoT Devices. In Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems(CHI\u201921). Association for Computing Machinery, New York, NY, USA, Article 307, 10\u00a0pages. https:\/\/doi.org\/10.1145\/3411763.3451633"},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. ACM Hum.-Comput. Interact. 2, CSCW, Article 102 (nov","author":"Lau Josephine","year":"2018","unstructured":"Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, Are You Listening? Privacy Perceptions, Concerns and Privacy-Seeking Behaviors with Smart Speakers. Proc. ACM Hum.-Comput. Interact. 2, CSCW, Article 102 (nov 2018), 31\u00a0pages. https:\/\/doi.org\/10.1145\/3274371"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 2019 on Designing Interactive Systems Conference","author":"Leit\u00e3o Roxanne","year":"2019","unstructured":"Roxanne Leit\u00e3o. 2019. Anticipating Smart Home Security and Privacy Threats with Survivors of Intimate Partner Abuse. In Proceedings of the 2019 on Designing Interactive Systems Conference (San Diego, CA, USA) (DIS \u201919). Association for Computing Machinery, New York, NY, USA, 527\u2013539. https:\/\/doi.org\/10.1145\/3322276.3322366"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1870096.1870102"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","article-title":"Internet Users\u2019 Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model","volume":"15","author":"Malhotra K.","year":"2004","unstructured":"Naresh\u00a0K. Malhotra, Sung\u00a0S. Kim, and James Agarwal. 2004. Internet Users\u2019 Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research 15, 4 (2004), 336\u2013355. http:\/\/www.jstor.org\/stable\/23015787","journal-title":"Information Systems Research"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC)","author":"Malkin Nathan","year":"2018","unstructured":"Nathan Malkin, Julia Bernd, Maritza Johnson, and Serge Egelman. 2018. \u201cWhat Can\u2019t Data Be Used For?\u201d Privacy Expectations about Smart TVs in the US. In Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC), London, UK. https:\/\/doi.org\/10.14722\/eurousec.2018.23016"},{"key":"e_1_3_2_1_31_1","first-page":"2019","volume-title":"Proceedings on Privacy Enhancing Technologies 2019","author":"Malkin Nathan","year":"2019","unstructured":"Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera, Serge Egelman, and David Wagner. 2019. Privacy attitudes of smart speaker users. Proceedings on Privacy Enhancing Technologies 2019, 4 (2019). https:\/\/doi.org\/10.2478\/popets-2019-0068"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems","author":"Matejka Justin","year":"2016","unstructured":"Justin Matejka, Michael Glueck, Tovi Grossman, and George Fitzmaurice. 2016. The Effect of Visual Appearance on the Performance of Continuous Sliders and Visual Analogue Scales. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (San Jose, California, USA) (CHI \u201916). Association for Computing Machinery, New York, NY, USA, 5421\u20135432. https:\/\/doi.org\/10.1145\/2858036.2858063"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building","author":"Molina-Markham Andr\u00e9s","year":"2010","unstructured":"Andr\u00e9s Molina-Markham, Prashant Shenoy, Kevin Fu, Emmanuel Cecchet, and David Irwin. 2010. Private Memoirs of a Smart Meter. In Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building (Zurich, Switzerland) (BuildSys \u201910). Association for Computing Machinery, New York, NY, USA, 61\u201366. https:\/\/doi.org\/10.1145\/1878431.1878446"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 10th International Conference on Ubiquitous Computing","author":"Nguyen H.","year":"2008","unstructured":"David\u00a0H. Nguyen, Alfred Kobsa, and Gillian\u00a0R. Hayes. 2008. An Empirical Investigation of Concerns of Everyday Tracking and Recording Technologies. In Proceedings of the 10th International Conference on Ubiquitous Computing (Seoul, Korea) (UbiComp \u201908). Association for Computing Machinery, New York, NY, USA, 182\u2013191. https:\/\/doi.org\/10.1145\/1409635.1409661"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security","author":"Obermaier Johannes","year":"2016","unstructured":"Johannes Obermaier and Martin Hutle. 2016. Analyzing the Security and Privacy of Cloud-Based Video Surveillance Systems. In Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security (Xi\u2019an, China) (IoTPTS \u201916). Association for Computing Machinery, New York, NY, USA, 22\u201328. https:\/\/doi.org\/10.1145\/2899007.2899008"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510360"},{"key":"e_1_3_2_1_37_1","volume-title":"Snowball sampling. SAGE research methods foundations","author":"Parker Charlie","year":"2019","unstructured":"Charlie Parker, Sam Scott, and Alistair Geddes. 2019. Snowball sampling. SAGE research methods foundations (2019)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.3758\/BRM.40.3.699"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.amepre.2006.07.025"},{"key":"e_1_3_2_1_40_1","volume-title":"Consumer privacy and the Internet in Europe: a view from Germany. Journal of consumer marketing","author":"Singh Tanuja","year":"2003","unstructured":"Tanuja Singh and Mark\u00a0E Hill. 2003. Consumer privacy and the Internet in Europe: a view from Germany. Journal of consumer marketing (2003)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","unstructured":"Christian Tiefenau Maximilian H\u00e4ring Eva Gerlitz and Emanuel von Zezschwitz. 2019. Making Privacy Graspable: Can we Nudge Users to use Privacy Enhancing Techniques?https:\/\/doi.org\/10.48550\/ARXIV.1911.07701","DOI":"10.48550\/ARXIV.1911.07701"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1362\/147539213X13875568505868","article-title":"Eco-labels in Germany","volume":"12","author":"Topolansky\u00a0Barbe G","year":"2013","unstructured":"Federico\u00a0G Topolansky\u00a0Barbe, Magdalena\u00a0M Gonzalez-Triay, and Anna Hensel. 2013. Eco-labels in Germany. Journal of customer behaviour 12, 4 (2013), 341\u2013359.","journal-title":"Journal of customer behaviour"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2015.01.011"},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems","author":"Windl Maximiliane","year":"2022","unstructured":"Maximiliane Windl, Niels Henze, Albrecht Schmidt, and Sebastian\u00a0S. Feger. 2022. Automating Contextual Privacy Policies: Design and Evaluation of a Production Tool for Digital Consumer Privacy Awareness. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems (New Orleans, LA, USA) (CHI \u201922). Association for Computing Machinery, New York, NY, USA, Article 34, 18\u00a0pages. https:\/\/doi.org\/10.1145\/3491102.3517688"},{"key":"e_1_3_2_1_45_1","volume-title":"Proc. ACM Hum.-Comput. Interact. 6, MHCI, Article 184 (sep","author":"Windl Maximiliane","year":"2022","unstructured":"Maximiliane Windl and Sven Mayer. 2022. The Skewed Privacy Concerns of Bystanders in Smart Environments. Proc. ACM Hum.-Comput. Interact. 6, MHCI, Article 184 (sep 2022), 21\u00a0pages. https:\/\/doi.org\/10.1145\/3546719"},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems","author":"Windl Maximiliane","year":"2023","unstructured":"Maximiliane Windl, Albrecht Schmidt, and Sebastian\u00a0S. Feger. 2023. Investigating Tangible Privacy-Preserving Mechanisms for Future Smart Homes. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (Hamburg, Germany) (CHI \u201923). Association for Computing Machinery, New York, NY, USA, Article 70, 16\u00a0pages. https:\/\/doi.org\/10.1145\/3544548.3581167"},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the 2016 ACM Conference on Designing Interactive Systems (Brisbane, QLD, Australia) (DIS \u201916)","author":"Worthy Peter","year":"2016","unstructured":"Peter Worthy, Ben Matthews, and Stephen Viller. 2016. Trust Me: Doubts and Concerns Living with the Internet of Things. In Proceedings of the 2016 ACM Conference on Designing Interactive Systems (Brisbane, QLD, Australia) (DIS \u201916). Association for Computing Machinery, New York, NY, USA, 427\u2013434. https:\/\/doi.org\/10.1145\/2901790.2901890"},{"key":"e_1_3_2_1_48_1","volume-title":"Proc. ACM Hum.-Comput. Interact. 2, CSCW, Article 200 (nov","author":"Zheng Serena","year":"2018","unstructured":"Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. 2018. User Perceptions of Smart Home IoT Privacy. Proc. ACM Hum.-Comput. Interact. 2, CSCW, Article 200 (nov 2018), 20\u00a0pages. https:\/\/doi.org\/10.1145\/3274469"}],"event":{"name":"DIS '24: Designing Interactive Systems Conference","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"IT University of Copenhagen Denmark","acronym":"DIS '24"},"container-title":["Designing Interactive Systems Conference"],"original-title":[],"deposited":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:10:08Z","timestamp":1719706208000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643834.3661527"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":48,"alternative-id":["10.1145\/3643834.3661527","10.1145\/3643834"],"URL":"https:\/\/doi.org\/10.1145\/3643834.3661527","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}