Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Review of the theory, principles, and design requirements of human-centric Internet of Things (IoT)
The rapid evolution of Internet of Things (IoT) technologies, with ever more profound
implications for humans and societies, has triggered visions and initiatives to re-align the …
implications for humans and societies, has triggered visions and initiatives to re-align the …
A room with an overview: Towards meaningful transparency for the consumer Internet of Things
As our physical environments become ever-more connected, instrumented, and automated,
it can be increasingly difficult for users to understand what is happening within them and …
it can be increasingly difficult for users to understand what is happening within them and …
Stakeholder-Centered AI Design: Co-Designing Worker Tools with Gig Workers through Data Probes
AI technologies continue to advance from digital assistants to assisted decision-making.
However, designing AI remains a challenge given its unknown outcomes and uses. One …
However, designing AI remains a challenge given its unknown outcomes and uses. One …
Tangible privacy: Towards user-centric sensor designs for bystander privacy
Sensor-enabled computers in the form of'IoT'devices such as home security cameras and
voice assistants are increasingly becoming pervasive in our environment. With the …
voice assistants are increasingly becoming pervasive in our environment. With the …
Exploring the needs of users for supporting privacy-protective behaviors in smart homes
In this paper, we studied people's smart home privacy-protective behaviors (SH-PPBs), to
gain a better understanding of their privacy management do's and don'ts in this context. We …
gain a better understanding of their privacy management do's and don'ts in this context. We …
Amazon vs. my brother: How users of shared smart speakers perceive and cope with privacy risks
With the rapid adoption of smart speakers in people's homes, there is a corresponding
increase in users' privacy and security concerns. In contrast to previous studies of users' …
increase in users' privacy and security concerns. In contrast to previous studies of users' …
” I don't know how to protect myself”: Understanding Privacy Perceptions Resulting from the Presence of Bystanders in Smart Environments
IoT devices no longer affect single users only because others like visitors or family members-
denoted as bystanders-might be in the device's vicinity. Thus, data about bystanders can be …
denoted as bystanders-might be in the device's vicinity. Thus, data about bystanders can be …
“It would probably turn into a social faux-pas”: Users' and Bystanders' Preferences of Privacy Awareness Mechanisms in Smart Homes
The opaque data practices in smart home devices have raised significant privacy concerns
for smart home users and bystanders. One way to learn about the data practices is through …
for smart home users and bystanders. One way to learn about the data practices is through …
Social contexts, agency, and conflicts: Exploring critical aspects of design for future smart home technologies
R Garg, H Cui - ACM Transactions on Computer-Human Interaction, 2022 - dl.acm.org
Smart devices are increasingly being designed for, and adopted in, the home environment.
Prior scholarship has investigated the challenges that users face as they take up these …
Prior scholarship has investigated the challenges that users face as they take up these …
Eliciting security & privacy-informed sharing techniques for multi-user augmented reality
The HCI community has explored new interaction designs for collaborative AR interfaces in
terms of usability and feasibility; however, security & privacy (S&P) are often not considered …
terms of usability and feasibility; however, security & privacy (S&P) are often not considered …