[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Tangible Privacy: Towards User-Centric Sensor Designs for Bystander Privacy

Published: 15 October 2020 Publication History

Abstract

Sensor-enabled computers in the form of 'IoT' devices such as home security cameras and voice assistants are increasingly becoming pervasive in our environment. With the embedded cameras and microphones in these devices, this 'invasion' of our everyday spaces can pose significant threats to the privacy of bystanders. Because of their complex functionality, even when people attempt privacy measures (such as asking the owner to "turn the camera off"), these devices may still record information because of the lack of a 'real' off button. With the ambiguities of current designs, a bystander's perceived privacy can diverge from their actual privacy. Indeed, being able to assess one's actual privacy is a key aspect in managing one's privacy according to Altman's theory of boundary regulation, and current designs fall short in assuring people of their privacy. To understand how people as bystanders manage their privacy with IoT devices, we conducted an interview study about people's perceptions of and behaviors around current IoT devices. We find that although participants' behaviors line up with Altman's theory of boundary regulation, in the face of uncertainty about their privacy, they desire or engage in various 'tangible' workarounds. Based on our findings, we identify and introduce the concept of 'tangible privacy' as being essential to boundary regulation with IoT devices. We argue that IoT devices should be designed in a way that clearly and unambiguously conveys sensor states to people around them and make actionable design recommendations to provide strong privacy assurances to bystanders.

References

[1]
Irwin Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole Pub. Co.
[2]
Leonardo Angelini, Elena Mugellini, Omar Abou Khaled, and Nadine Couture. 2018. Internet of Tangible Things (IoTT): Challenges and Opportunities for Tangible Interaction with IoT. Informatics, Vol. 5, 7 (2018).
[3]
Orlando Arias, Jacob Wurm, Khoa Hoang, and Yier Jin. 2015. Privacy and Security in Internet of Things and Wearable Devices. IEEE Transactions on Multi-Scale Computing Systems, Vol. 1, 2 (2015), 99--109.
[4]
David Armstrong, Ann Gosling, John Weinman, and Theresa Marteau. 1997. The Place of Inter-Rater Reliability in Qualitative Research: An Empirical Study. Sociology, Vol. 31, 3 (1997), 597--606.
[5]
Victoria Bellotti and Abigail Sellen. 1993. Design for Privacy in Ubiquitous Computing Environments. In Proceedings of the Third European Conference on Computer-Supported Cooperative Work 13--17 September 1993, Milan, Italy ECSCW'93. Springer, 77--92.
[6]
Lucia Benaquisto and L Given. 2008. The SAGE encyclopedia of qualitative research methods. New York: Sage (2008).
[7]
Matthew Brocker and Stephen Checkoway. 2014. iSeeYou: Disabling the MacBook Webcam Indicator LED. In 23rd USENIX Security Symposium (USENIX Security 14). San Diego, CA, 337--352.
[8]
Joseph Bugeja, Andreas Jacobsson, and Paul Davidsson. 2016. On privacy and security challenges in smart connected homes. In 2016 European Intelligence and Security Informatics Conference (EISIC). IEEE, 172--175.
[9]
Gary Burnett and Laurie Bonnici. 2003. Beyond the FAQ: Explicit and implicit norms in Usenet newsgroups. Library & Information Science Research, Vol. 25, 3 (2003), 333--351.
[10]
Kelly E. Caine, Celine Y. Zimmerman, Zachary Schall-Zimmerman, William R. Hazlewood, Alexander C. Sulgrove, L. Jean Camp, Katherine H. Connelly, Lesa L. Huber, and Kalpana Shankar. 2010. DigiSwitch: Design and Evaluation of a Device for Older Adults to Preserve Privacy While Monitoring Health at Home. In Proceedings of the 1st ACM International Health Informatics Symposium (Arlington, Virginia, USA) (IHI '10). ACM, New York, NY, USA, 153--162.
[11]
Nico Castelli, Corinna Ogonowski, Timo Jakobi, Martin Stein, Gunnar Stevens, and Volker Wulf. 2017. What Happened in My Home?: An End-User Development Approach for Smart Home Data Visualization. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (Denver, Colorado, USA) (CHI '17). ACM, New York, NY, USA, 853--866.
[12]
Varun Chandrasekaran, Kassem Fawaz, Bilge Mutlu, and Suman Banerjee. 2018. Characterizing Privacy Perceptions of Voice Assistants: A Technology Probe Study. ArXiv, Vol. abs/1812.00263 (2018).
[13]
Soumyadeb Chowdhury, Md Sadek Ferdous, and Joemon M Jose. 2016. Bystander privacy in lifelogging. In Proceedings of the 30th International BCS Human Computer Interaction Conference: Companion Volume. BCS Learning & Development Ltd., 15.
[14]
Yaliang Chuang, Lin-Lin Chen, and Yoga Liu. 2018. Design Vocabulary for Human-IoT Systems Communication. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI '18). ACM, New York, NY, USA, Article 274, bibinfonumpages11 pages.
[15]
Nigel Davies, Nina Taft, Mahadev Satyanarayanan, Sarah Clinch, and Brandon Amos. 2016. Privacy mediators: Helping IoT cross the chasm. In Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications. ACM, 39--44.
[16]
Eva Deckers, Stephan Wensveen, Pierre Levy, and Rene Ahn. 2013. Designing for perceptual crossing: Designing and comparing three behaviors. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1901--1910.
[17]
Tamara Denning, Zakariya Dehlawi, and Tadayoshi Kohno. 2014. In Situ with Bystanders of Augmented Reality Glasses: Perspectives on Recording and Privacy-mediating Technologies. In Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems (Toronto, Ontario, Canada) (CHI '14). ACM, New York, NY, USA, 2377--2386.
[18]
Tamara Denning, Tadayoshi Kohno, and Henry M Levy. 2013. Computer security and the modern home. Commun. ACM, Vol. 56, 1 (2013), 94--103.
[19]
Tamara Denning, Cynthia Matuszek, Karl Koscher, Joshua R Smith, and Tadayoshi Kohno. 2009. A spotlight on security and privacy risks with future household robots: attacks and lessons. In Proceedings of the 11th international conference on Ubiquitous computing. ACM, 105--114.
[20]
Emily Dixon. 2019. Family finds hidden camera livestreaming from their Airbnb in Ireland. https://www.cnn.com/2019/04/05/europe/ireland-airbnb-hidden-camera-scli-intl/index.html.
[21]
Pardis Emami-Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. In Proceedings of the Thirteenth USENIX Conference on Usable Privacy and Security (Santa Clara, CA, USA) (SOUPS'17). USENIX Association, Berkeley, CA, USA, 399--412.
[22]
Batya Friedman, Peter H. Kahn, Jr., Jennifer Hagman, Rachel L. Severson, and Brian Gill. 2008. The Watcher and the Watched: Social Judgments About Privacy in a Public Place. Hum.-Comput. Interact., Vol. 21, 2 (May 2008), 235--272.
[23]
Nina Gerber, Benjamin Reinheimer, and Melanie Volkamer. 2018. Home Sweet Home? Investigating Users? Awareness of Smart Home Privacy Threats. In Proceedings of An Interactive Workshop on the Human aspects of Smarthome Security and Privacy (WSSP), Baltimore, MD, August 12, 2018. USENIX, Berkeley, CA.
[24]
Stacy Gray. 2016. Always on: privacy implications of microphone-enabled devices. In Future of privacy forum.
[25]
Chris Harrison, John Horstman, Gary Hsieh, and Scott Hudson. 2012. Unlocking the expressivity of point lights. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1683--1692.
[26]
Eva Hornecker and Jacob Buur. 2006. Getting a grip on tangible interaction: a framework on physical space and social interaction. In Proceedings of the SIGCHI conference on Human Factors in computing systems. ACM, 437--446.
[27]
Roberto Hoyle, Robert Templeman, Steven Armes, Denise Anthony, David Crandall, and Apu Kapadia. 2014. Privacy behaviors of lifeloggers using wearable cameras. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. 571--582.
[28]
Intel. 2014. Intel IoT Gateway. https://www.intel.com/content/dam/www/public/us/en/documents/product-briefs/gateway-solutions-iot-brief.pdf.
[29]
Judy Kendall. 1999. Axial coding and the grounded theory controversy. Western journal of nursing research, Vol. 21, 6 (1999), 743--757.
[30]
Marion Koelle, Katrin Wolf, and Susanne Boll. 2018. Beyond LED Status Lights-Design Requirements of Privacy Notices for Body-worn Cameras. In Proceedings of the Twelfth International Conference on Tangible, Embedded, and Embodied Interaction. ACM, 177--187.
[31]
Karen L Courtney, George Demiris, Marilyn Rantz, and Marjorie Skubic. 2008. Needing smart home technologies: The perspectives of older adults in continuing care retirement communities. Intformatics in primary care, Vol. 16 (02 2008), 195--201.
[32]
Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, Are You Listening? Privacy Perceptions, Concerns and Privacy-seeking Behaviors with Smart Speakers. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, CSCW (2018), 102.
[33]
Adam J. Lee, Rosta Farzan, Apu Kapadia, and Imtiaz Ahmad. 2020. Making sense of risk in an increasingly cyber-physical world. Critical Quarterly, Vol. 62, 1 (2020), 40--48.
[34]
Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera, Serge Egelman, and David Wagner. 2019. Privacy Attitudes of Smart Speaker Users. Proceedings on Privacy Enhancing Technologies, Vol. 2019, 4 (2019), 250 -- 271.
[35]
Shrirang Mare, Franziska Roesner, and Tadayoshi Kohno. 2020. Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts. Proceedings on Privacy Enhancing Technologies, Vol. 2020, 2 (2020), 436--458.
[36]
Nora McDonald, Sarita Schoenebeck, and Andrea Forte. 2019. Reliability and Inter-rater Reliability in Qualitative Research: Norms and Guidelines for CSCW and HCI Practice. Proc. ACM Hum.-Comput. Interact., Vol. 3, CSCW, Article 72 (Nov. 2019), bibinfonumpages23 pages.
[37]
Emily McReynolds, Sarah Hubbard, Timothy Lau, Aditya Saraf, Maya Cakmak, and Franziska Roesner. 2017. Toys that listen: A study of parents, children, and internet-connected toys. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 5197--5207.
[38]
B. Momenzadeh, H. Dougherty, M. Remmel, S. Myers, and L. J. Camp. 2020. Best Practices Would Make Things Better in the IoT. IEEE Security & Privacy, Vol. 18, 4 (2020), 38--47.
[39]
David M Newman. 2020. Sociology: Exploring the architecture of everyday life .SAGE Publications, Incorporated.
[40]
Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev., Vol. 79 (2004), 119.
[41]
Don Norman. 2014. Turn signals are the facial expressions of automobiles .Diversion Books.
[42]
Antti Oulasvirta, Aurora Pihlajamaa, Jukka Perkiö, Debarshi Ray, Taneli V"ah"akangas, Tero Hasu, Niklas Vainio, and Petri Myllym"aki. 2012. Long-term Effects of Ubiquitous Surveillance in the Home. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (Pittsburgh, Pennsylvania) (UbiComp '12). ACM, New York, NY, USA, 41--50.
[43]
Joann Peck and Terry L Childers. 2003. To have and to hold: The influence of haptic information on product judgments. Journal of Marketing, Vol. 67, 2 (2003), 35--48.
[44]
Joann Peck and Jennifer Wiggins Johnson. 2011. Autotelic need for touch, haptics, and persuasion: The role of involvement. Psychology & Marketing, Vol. 28, 3 (2011), 222--239.
[45]
James Pierce. 2019. Smart Home Security Cameras and Shifting Lines of Creepiness: A Design-Led Inquiry. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI '19). ACM, New York, NY, USA, Article 45, bibinfonumpages14 pages.
[46]
Rebecca S. Portnoff, Linda N. Lee, Serge Egelman, Pratyush Mishra, Derek Leung, and David Wagner. 2015. Somebody's Watching Me? Assessing the Effectiveness of Webcam Indicator Lights. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (Seoul, Republic of Korea) (CHI '15). ACM, New York, NY, USA, 1649--1658.
[47]
Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, and Norman Makoto Su. 2018. “You don't want to be the next meme”: College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography. In Proceedings of the USENIX Symposium on Usable Privacy and Security (SOUPS '18). 143--157.
[48]
Joel R Reidenberg. 2014. Privacy in public. U. Miami L. Rev., Vol. 69 (2014), 141.
[49]
Tom A Rodden, Joel E Fischer, Nadia Pantidi, Khaled Bachour, and Stuart Moran. 2013. At home with agents: exploring attitudes towards future smart energy infrastructures. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1173--1182.
[50]
Rodrigo Roman, Jianying Zhou, and Javier Lopez. 2013. On the features and challenges of security and privacy in distributed internet of things. Computer Networks, Vol. 57, 10 (2013), 2266--2279.
[51]
Gilad Rosner and Erin Kenneally. 2018. Clearly Opaque: Privacy Risks of the Internet of Things. In Rosner, Gilad and Kenneally, Erin, Clearly Opaque: Privacy Risks of the Internet of Things (May 1, 2018). IoT Privacy Forum.
[52]
Mike Scaife and Yvonne Rogers. 1996. External cognition: how do graphical representations work? International journal of human-computer studies, Vol. 45, 2 (1996), 185--213.
[53]
Roman Schlegel, Kehuan Zhang, Xiaoyong Zhou, Mehool Intwala, Apu Kapadia, and XiaoFeng Wang. 2011. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. In Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS). 17--33.
[54]
Bertrand Schneider, Patrick Jermann, Guillaume Zufferey, and Pierre Dillenbourg. 2010. Benefits of a tangible interface for collaborative learning and interaction. IEEE Transactions on Learning Technologies, Vol. 4, 3 (2010), 222--232.
[55]
Irving Seidman. 2006. Interviewing as qualitative research: A guide for researchers in education and the social sciences .Teachers college press.
[56]
Teddy Seyed, Xing-Dong Yang, and Daniel Vogel. 2017. A Modular Smartphone for Lending. In Proceedings of the 30th Annual ACM Symposium on User Interface Software and Technology (UIST '17). ACM, New York, NY, USA, 205--215.
[57]
Sabrina Sicari, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini. 2015. Security, privacy and trust in Internet of Things: The road ahead. Computer networks, Vol. 76 (2015), 146--164.
[58]
Deepika Singh, Ismini Psychoula, Johannes Kropf, Sten Hanke, and Andreas Holzinger. 2018. Users? Perceptions and Attitudes Towards Smart Home Technologies. In International Conference on Smart Homes and Health Telematics. Springer, 203--214.
[59]
Yunpeng Song, Yun Huang, Zhongmin Cai, and Jason I Hong. 2020. I'm All Eyes and Ears: Exploring Effective Locators for Privacy Awareness in IoT Scenarios. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--13.
[60]
Luke Stark. 2016. The emotional context of information privacy. The Information Society, Vol. 32, 1 (2016), 14--27.
[61]
Joshua Streiff, Olivia Kenny, Sanchari Das, Andrew Leeth, and L Jean Camp. 2018. Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears. In 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, 285--286.
[62]
Harald Sundmaeker, Patrick Guillemin, Peter Friess, and Sylvie Woelfflé. 2010. Vision and challenges for realising the Internet of Things. Cluster of European Research Projects on the Internet of Things, European Commision, Vol. 3, 3 (2010), 34--36.
[63]
Robert Templeman, Zahid Rahman, David Crandall, and Apu Kapadia. 2013. PlaceRaider: Virtual Theft in Physical Spaces with Smartphones. In Proceedings of The 20th Annual Network and Distributed System Security Symposium (NDSS).
[64]
Brygg Ullmer and Hiroshi Ishii. 2000. Emerging frameworks for tangible user interfaces. IBM systems journal, Vol. 39, 3.4 (2000), 915--931.
[65]
Elise Van Den Hoven, Evelien Van De Garde-Perik, Serge Offermans, Koen Van Boerdonk, and Kars-Michiel H Lenssen. 2013. Moving Tangible Interaction Systems to the Next Level. IEEE Computer, Vol. 46, 8 (2013), 70--76.
[66]
Yang Wang, Huichuan Xia, Yaxing Yao, and Yun Huang. 2016. Flying eyes and hidden controllers: A qualitative study of people?s privacy perceptions of civilian drones in the US. Proceedings on Privacy Enhancing Technologies, Vol. 2016, 3 (2016), 172--190.
[67]
Meredydd Williams, Jason RC Nurse, and Sadie Creese. 2016. The perfect storm: The privacy paradox and the Internet-of-Things. In 2016 11th International Conference on Availability, Reliability and Security (ARES). IEEE, 644--652.
[68]
Yaxing Yao, Justin Reed Basdeo, Smirity Kaushik, and Yang Wang. 2019 a. Defending My Castle: A Co-Design Study of Privacy Mechanisms for Smart Homes. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, 198.
[69]
Yaxing Yao, Justin Reed Basdeo, Oriana Rosata Mcdonough, and Yang Wang. 2019 b. Privacy Perceptions and Designs of Bystanders in Smart Homes. Proc. ACM Hum.-Comput. Interact., Vol. 3, CSCW, Article 59 (Nov. 2019), bibinfonumpages24 pages.
[70]
Yaxing Yao, Huichuan Xia, Yun Huang, and Yang Wang. 2017. Privacy Mechanisms for Drones: Perceptions of Drone Controllers and Bystanders. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (Denver, Colorado, USA) (CHI '17). ACM, New York, NY, USA, 6777--6788.
[71]
Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security and Privacy Concerns with Smart Homes. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, Santa Clara, CA, 65--80.
[72]
Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. 2018. User Perceptions of Smart Home IoT Privacy. Proc. ACM Hum.-Comput. Interact., Vol. 2, CSCW, Article 200 (Nov. 2018), bibinfonumpages20 pages.
[73]
Oren Zuckerman. 2015. Objects for change: A case study of a tangible user interface for behavior change. In Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction. 649--654.

Cited By

View all
  • (2024)Privacy Barriers in Health Monitoring: Scoping ReviewJMIR Nursing10.2196/535927(e53592)Online publication date: 9-May-2024
  • (2024)Security and Privacy Perspectives of People Living in Shared Home EnvironmentsProceedings of the ACM on Human-Computer Interaction10.1145/36869078:CSCW2(1-39)Online publication date: 8-Nov-2024
  • (2024)Dr. Convenience Love or: How I Learned to Stop Worrying and Love my Voice Assistant✱Proceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685364(1-14)Online publication date: 13-Oct-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Human-Computer Interaction
Proceedings of the ACM on Human-Computer Interaction  Volume 4, Issue CSCW2
CSCW
October 2020
2310 pages
EISSN:2573-0142
DOI:10.1145/3430143
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 October 2020
Published in PACMHCI Volume 4, Issue CSCW2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. iot
  2. privacy
  3. tangible design

Qualifiers

  • Research-article

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)367
  • Downloads (Last 6 weeks)37
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Privacy Barriers in Health Monitoring: Scoping ReviewJMIR Nursing10.2196/535927(e53592)Online publication date: 9-May-2024
  • (2024)Security and Privacy Perspectives of People Living in Shared Home EnvironmentsProceedings of the ACM on Human-Computer Interaction10.1145/36869078:CSCW2(1-39)Online publication date: 8-Nov-2024
  • (2024)Dr. Convenience Love or: How I Learned to Stop Worrying and Love my Voice Assistant✱Proceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685364(1-14)Online publication date: 13-Oct-2024
  • (2024)How to Respect Bystanders' Privacy in Smart Homes - A Co-Creation StudyProceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685340(1-19)Online publication date: 13-Oct-2024
  • (2024)Exploring Users' Mental Models and Privacy Concerns During Interconnected InteractionsProceedings of the ACM on Human-Computer Interaction10.1145/36765048:MHCI(1-23)Online publication date: 24-Sep-2024
  • (2024)Can Large Language Models Be Good Companions?Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36596008:2(1-41)Online publication date: 15-May-2024
  • (2024)A Roadmap for Applying the Contextual Integrity Framework in Qualitative Privacy ResearchProceedings of the ACM on Human-Computer Interaction10.1145/36537108:CSCW1(1-29)Online publication date: 26-Apr-2024
  • (2024)Getting it Just Right: Towards Balanced Utility, Privacy, and Equity in Shared Space SensingACM Transactions on Internet of Things10.1145/36484795:2(1-26)Online publication date: 29-Feb-2024
  • (2024)Manual, Hybrid, and Automatic Privacy Covers for Smart Home CamerasProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661569(3453-3470)Online publication date: 1-Jul-2024
  • (2024)Designing Interactive Privacy Labels for Advanced Smart Home Device Configuration OptionsProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661527(3372-3388)Online publication date: 1-Jul-2024
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media