{"id":"https://openalex.org/W4313563102","doi":"https://doi.org/10.1145/3567445.3571102","title":"Security and Privacy Concerns of Pet Tech Users","display_name":"Security and Privacy Concerns of Pet Tech Users","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4313563102","doi":"https://doi.org/10.1145/3567445.3571102"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/3567445.3571102","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3567445.3571102","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3567445.3571102","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028685391","display_name":"Scott Harper","orcid":"https://orcid.org/0000-0001-9324-671X"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Scott Harper","raw_affiliation_strings":["Newcastle University, UK"],"affiliations":[{"raw_affiliation_string":"Newcastle University, UK","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023973244","display_name":"Maryam Mehrnezhad","orcid":"https://orcid.org/0000-0002-4223-6885"},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Maryam Mehrnezhad","raw_affiliation_strings":["Royal Holloway University of London, UK"],"affiliations":[{"raw_affiliation_string":"Royal Holloway University of London, UK","institution_ids":["https://openalex.org/I184558857"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000865051","display_name":"Matthew C. Leach","orcid":"https://orcid.org/0000-0002-7148-0158"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Matthew Leach","raw_affiliation_strings":["Newcastle University, UK"],"affiliations":[{"raw_affiliation_string":"Newcastle University, UK","institution_ids":["https://openalex.org/I84884186"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.491,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":1,"citation_normalized_percentile":{"value":0.652974,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":60,"max":71},"biblio":{"volume":null,"issue":null,"first_page":"155","last_page":"162"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9715,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10803","display_name":"Innovative Human-Technology Interaction","score":0.9715,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6054915},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5691037},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5327689},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5253522}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/3567445.3571102","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3567445.3571102","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/3567445.3571102","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3567445.3571102","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.52}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":11,"referenced_works":["https://openalex.org/W1984487609","https://openalex.org/W2767021209","https://openalex.org/W2896396724","https://openalex.org/W2912786586","https://openalex.org/W2922315613","https://openalex.org/W2960091418","https://openalex.org/W2983737513","https://openalex.org/W3002395756","https://openalex.org/W3161258441","https://openalex.org/W3173111569","https://openalex.org/W4297659087"],"related_works":["https://openalex.org/W4225340788","https://openalex.org/W3195097297","https://openalex.org/W3049084372","https://openalex.org/W3038106605","https://openalex.org/W2940702331","https://openalex.org/W2905822832","https://openalex.org/W2584827882","https://openalex.org/W2538581760","https://openalex.org/W2528109871","https://openalex.org/W2513267613"],"abstract_inverted_index":{"Abstract:":[0],"An":[1],"expanding":[2],"variety":[3],"of":[4,14,44,66,80,127,153],"technologies":[5,18,82],"are":[6,21,83],"being":[7],"offered":[8],"to":[9,33,76,101,113,141],"aid":[10],"with":[11],"the":[12,39,96,148],"care":[13],"pets.":[15],"These":[16],"pet":[17,115,133],"(pet":[19],"tech)":[20],"a":[22,63,125],"rapidly":[23],"growing":[24],"industry,":[25],"introducing":[26],"new":[27],"security,":[28],"privacy,":[29],"and":[30,41,47,95,106,108,144,151],"safety":[31],"risks":[32,150],"their":[34,48,103,114,132,145],"users.":[35],"Despite":[36,135],"these":[37,45,52,112,154],"risks,":[38],"security":[40,105],"privacy":[42,107],"evaluation":[43],"devices,":[46],"users'":[49],"concerns":[50],"regarding":[51],"issues,":[53],"remain":[54],"an":[55,78],"under-researched":[56],"field.":[57],"In":[58],"this":[59],"work,":[60],"we":[61],"perform":[62],"user":[64],"study":[65],"593":[67],"participants":[68,91,100,121],"across":[69],"3":[70],"different":[71],"countries":[72],"(UK,":[73],"USA,":[74],"Germany)":[75],"gain":[77],"understanding":[79],"what":[81],"in":[84],"use,":[85],"incidents":[86],"that":[87,120,124],"have":[88],"occurred":[89],"or":[90],"believe":[92,123],"may":[93,129],"occur,":[94],"methods":[97],"used":[98],"by":[99],"protect":[102,142],"online":[104],"whether":[109],"they":[110,137],"apply":[111],"tech.":[116,134],"Our":[117],"findings":[118],"highlight":[119],"do":[122],"range":[126],"attacks":[128],"occur":[130],"targeting":[131],"this,":[136],"take":[138],"few":[139],"precautions":[140],"themselves":[143],"pets":[146],"from":[147],"possible":[149],"harms":[152],"technologies.":[155]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4313563102","counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2024-12-07T04:01:06.239475","created_date":"2023-01-06"}