[3] A. Acquisti, I. Adjerid, R. Balebako, L. Brandimarte, L. F. Cranor,
S. Komanduri, P. G. Leon, N. Sadeh, F. Schaub, M. Sleeper, et al.
Nudges for privacy and security: Understanding and assisting users’
choices online. ACM CSUR, 50(3):1–41, 2017.
[4] A. Acquisti, L. Brandimarte, and G. Loewenstein. Privacy and human
behavior in the age of information. Science, 347(6221):509–514,
2015.
[5] A. Acquisti, L. Brandimarte, and G. Loewenstein. Secrets and likes:
The drive for privacy and the difficulty of achieving it in the digital
age. Journal of Consumer Psychology, 30(4):736–758, 2020.
[6] A. Acquisti and R. Gross. Imagined communities: Awareness, infor-
mation sharing, and privacy on the Facebook. In PETS, 2006.
[7] T. Ammari, J. Kaye, J. Y. Tsai, and F. Bentley. Music, search, and IoT:
How people (really) use voice assistants. ACM TOCHI, 26(3):17–1,
2019.
[8] J. Angulo, E. W
¨
astlund, and J. H
¨
ogberg. What would it take for you
to tell your secrets to a cloud? In NordSec, 2014.
[9] M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein,
J. Cochran, Z. Durumeric, J. A. Halderman, L. Invernizzi, M. Kallit-
sis, et al. Understanding the Mirai botnet. In USENIX Security, 2017.
[10] S. Barth and M. D. T. De Jong. The privacy paradox–investigating
discrepancies between expressed privacy concerns and actual online
behavior–a systematic literature review. Telematics and Informatics,
34(7):1038–1058, 2017.
[11] J. Baumgartner. Pushshift’s update on removal requests. https:
//twitter.com/jasonbaumgartne/status/1431845831984943104?s=21,
2021.
[12] J. Baumgartner, S. Zannettou, B. Keegan, M. Squire, and J. Black-
burn. The Pushshift Reddit dataset. In ICWSM, 2020.
[13] R. Bellini, E. Tseng, N. McDonald, R. Greenstadt, D. McCoy,
T. Ristenpart, and N. Dell. “So-called privacy breeds evil” narrative
justifications for intimate partner surveillance in online forums. PACM
HCI, 4(CSCW3):1–27, 2021.
[14] G. Chalhoub, M. J. Kraemer, N. Nthala, and I. Flechais. “It did not
give me an option to decline”: A longitudinal analysis of the user
experience of security and privacy in smart home products. In ACM
CHI, 2021.
[15] V. Chandrasekaran, S. Banerjee, B. Mutlu, and K. Fawaz. PowerCut
and obfuscator: An exploration of the design space for privacy-
preserving interventions for smart speakers. In SOUPS, 2021.
[16] E. K. Choe, S. Consolvo, J. Jung, B. Harrison, and J. A. Kientz.
Living in a glass house: A survey of private moments in the home.
In ACM UbiComp, 2011.
[17] E. K. Choe, S. Consolvo, J. Jung, B. Harrison, S. N. Patel, and J. A.
Kientz. Investigating receptiveness to sensing and inference in the
home using sensor proxies. In ACM UbiComp, 2012.
[18] D. Choi, J. Han, T. Chung, Y. Y. Ahn, B. G. Chun, and T. T. Kwon.
Characterizing conversation patterns in Reddit: From the perspectives
of content properties and user participation behaviors. In ACM COSN,
2015.
[19] J. Clawson, J. A. Pater, A. D. Miller, E. D. Mynatt, and L. Mamykina.
No longer wearing: Investigating the abandonment of personal health-
tracking technologies on Craigslist. In ACM UbiComp, 2015.
[20] C. Cobb, S. Bhagavatula, K. A. Garrett, A. Hoffman, V. Rao, and
L. Bauer. “I would have to evaluate their objections”: Privacy tensions
between smart home device owners and incidental users. In PETS,
2021.
[21] Nora A. D. and Joseph T. The corporate cultivation of digital
resignation. New Media & Society, 21(8):1824–1839, 2019.
[22] A. Daffalla, L. Simko, T. Kohno, and A. G. Bardas. Defensive
technology use by political activists during the Sudanese revolution.
In IEEE S&P, 2021.
[23] S. Das, L. A. Dabbish, and J. I. Hong. A typology of perceived
triggers for end-user security and privacy behaviors. In SOUPS, 2019.
[24] P. Dourish and K. Anderson. Collective information practice: Explor-
ing privacy and security as social and cultural phenomena. Human-
Computer Interaction, 21(3):319–342, 2006.
[25] J. L. Dupree, R. Devries, D. M. Berry, and E. Lank. Privacy personas:
Clustering users via attitudes and behaviors toward security practices.
In ACM CHI, 2016.
[26] P. Emami-Naeini, Y. Agarwal, L. F. Cranor, and H. Hibshi. Ask the
experts: What should be on an IoT privacy and security label? In
IEEE S&P, 2020.
[27] P. Emami-Naeini, M. Degeling, L. Bauer, R. Chow, L. F. Cranor,
M. R. Haghighat, and H. Patterson. The influence of friends and
experts on privacy decision making in IoT scenarios. PACM HCI,
2(CSCW):1–26, 2018.
[28] P. Emami-Naeini, J. Dheenadhayalan, Y. Agarwal, and L. Faith.
Cranor. Which privacy and security attributes most impact consumers’
risk perception and willingness to purchase IoT devices? In IEEE
S&P, 2021.
[29] P. Emami-Naeini, H. Dixon, Y. Agarwal, and L. F. Cranor. Exploring
how privacy and security factor into IoT device purchase behavior.
In ACM CHI, 2019.
[30] C. Flender and G. M
¨
uller. Type indeterminacy in privacy decisions:
The privacy paradox revisited. In QI, 2012.
[31] R. Garg and S. Sengupta. He is just like me: A study of the long-
term use of smart speakers by parents and children. ACM IMWUT,
4(1):1–24, 2020.
[32] C. Geeng and F. Roesner. Who’s in control? Interactions in multi-user
smart homes. In ACM CHI, 2019.
[33] J. M. Haney, Y. Acar, and S. M. Furman. “It’s the company, the
government, you and I”: User perceptions of responsibility for smart
home privacy and security. In USENIX Security, 2021.
[34] J. M. Haney, S. M. Furman, and Y. Acar. User perceptions of smart
home privacy and security. NIST Interagency/Internal Report, 2020.
[35] H. Harkous, K. Fawaz, R. Lebret, F. Schaub, K. G. Shin, and
K. Aberer. Polisis: Automated analysis and presentation of privacy
policies using deep learning. In USENIX Security, 2018.
[36] P. He, X. Liu, J. Gao, and W. Chen. DeBERTa: Decoding-enhanced
BERT with disentangled attention. In ICLR, 2020.
[37] W. He, M. Golla, R. Padhi, J. Ofek, M. D
¨
urmuth, E. Fernandes, and
B. Ur. Rethinking access control and authentication for the home
Internet of Things (IoT). In USENIX Security, 2018.
[38] J. Holvast. History of privacy. The History of Information Security,
pages 737–769, 2007.
[39] Y. Huang, B. Obada-Obieh, and K. Beznosov. Amazon vs. my
brother: How users of shared smart speakers perceive and cope with
privacy risks. In ACM CHI, 2020.
[40] A. N. Joinson, U. D. Reips, T. Buchanan, and C. B. P. Schofield. Pri-
vacy, trust, and self-disclosure online. Human-Computer Interaction,
25(1):1–24, 2010.
[41] E. Karapanos, J. Zimmerman, J. Forlizzi, and J. B. Martens. User
experience over time: An initial framework. In ACM CHI, 2009.
[42] V. Koshy, J. S. Park, T. C. Cheng, and K. Karahalios. “We just
use what they give us”: Understanding passenger user perspectives in
smart homes. In ACM CHI, 2021.
[43] J. Kropczynski, R. Ghaiumy Anaraky, M. Akter, A. J. Godfrey,
H. Lipford, and P. J. Wisniewski. Examining collaborative support
for privacy and security in the broader context of tech caregiving.
PACM HCI, 5(CSCW2):1–23, 2021.
[44] P. Kumaraguru and L. F. Cranor. Privacy indexes: A survey of Westin’s
studies. 2005.