. Int. J. Man. Mach. Stud ., 35(3):363–377, Sept. 1991.
 F. Bowden, D. Lockton, R. Gheerawo, and C. Brass. Drawing energy: Exploring perceptionsof the invisible. 2015.
 C. Bravo-Lillo, L. F. Cranor, J. Downs, and S. Komanduri. Bridging the gap in computer security warnings: A mental model approach. IEEE Secur. Privacy , 9(2):18–26, Mar. 2011.
 J. K. Burgoon, R. Parrott, B. A. Le Poire, D. L. Kelley, J. B. Walther, and D. Perry. Maintaining and restoring privacy through communication in different types of relationships. J. Soc. Pers. Relat
Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera, Serge Egelman and David Wagner
Conference (EISIC) , pages 172–175. IEEE, 2016.
 Varun Chandrasekaran, Kassem Fawaz, Bilge Mutlu, and Suman Banerjee. Characterizing privacy perceptionsof voice assistants: A technology probe study. arXiv preprint arXiv:1812.00263 , 2018.
 Eugene Cho. Hey Google, Can I Ask You Something in Private? In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems , CHI ’19, pages 258:1–258:9. ACM, 2019.
 Paul Cutsinger. How to Improve Alexa Skill Discovery with Name-Free Interaction and More, September 2018.
 John Travis Butler and Arvin Agah. 2001. Psychological effects of behavior patterns of a mobile personal robot. Autonomous Robots 10, 2 (2001), 185-202.
 Ryan Calo. 2011. The drone as privacy catalyst. Stanford Law Review Online 64 (2011), 29-33.
 Ann Cavoukian. 2012. Privacy and drones: Unmanned aerial vehicles. Information and Privacy Commissioner of Ontario, Canada.
 Reece A Clothier, Dominique A Greer, Duncan G Greer, and Amisha M Mehta. 2015. Risk perception and the public acceptance of drones
Kopo M. Ramokapane, Anthony C. Mazeli and Awais Rashid
. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In Proceedings of the 18th ACM conference on Computer and communications security , pages 627–638. ACM, 2011.
 A. P. Felt, S. Egelman, and D. Wagner. I’ve got 99 problems, but vibration ain’t one: a survey of smartphone users’ concerns. In Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices , pages 33–44. ACM, 2012.
 A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner. Android permissions: User attention
Chad Spensky, Jeffrey Stewart, Arkady Yerukhimovich, Richard Shay, Ari Trachtenberg, Rick Housley and Robert K. Cunningham
 I. Leontiadis, C. Efstratiou, M. Picone, and C. Mascolo, “Don’t kill my ads!: balancing privacy in an ad-supported mobile application market,” in MobiSys 2012.
 B. Ur, P. G. Leon, L. F. Cranor, R. Shay, and Y. Wang, “Smart, useful, scary, creepy: perceptionsof online behavioral advertising,” in SOUPS 2012.
 Z. Xu, K. Bai, and S. Zhu, “Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors,” in WiSec 2012.
 L. Cai and H. Chen