[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2901790.2901890acmconferencesArticle/Chapter ViewAbstractPublication PagesdisConference Proceedingsconference-collections
research-article

Trust Me: Doubts and Concerns Living with the Internet of Things

Published: 04 June 2016 Publication History

Abstract

An increasing number of everyday objects are now connected to the internet, collecting and sharing information about us: the "Internet of Things" (IoT). However, as the number of "social" objects increases, human concerns arising from this connected world are starting to become apparent. This paper presents the results of a preliminary qualitative study in which five participants lived with an ambiguous IoT device that collected and shared data about their activities at home for a week. In analyzing this data, we identify the nature of human and socio-technical concerns that arise when living with IoT technologies. Trust is identified as a critical factor - as trust in the entity/ies that are able to use their collected information decreases, users are likely to demand greater control over information collection. Addressing these concerns may support greater engagement of users with IoT technology. The paper concludes with a discussion of how IoT systems might be designed to better foster trust with their owners.

References

[1]
Gregory D. Abowd and Elizabeth D. Mynatt. 2000. Charting Past, Present, and Future Research in Ubiquitous Computing. ACM Trans. Comput.-Hum. Interact. 7, 1: 29--58. http://doi.org/10.1145/344949.344988.
[2]
Luigi Atzori, Antonio Iera, and Giacomo Morabito. 2010. The Internet of Things: A survey. Computer Networks 54, 15: 2787--2805. http://doi.org/10.1016/j.comnet.2010.05.010.
[3]
Luigi Atzori, Antonio Iera, and Giacomo Morabito. 2014. From "smart objects" to "social objects": The next evolutionary step of the internet of things. IEEE Communications Magazine 52, 1: 97--105. http://doi.org/10.1109/MCOM.2014.6710070.
[4]
Barry Brown, Alex S. Taylor, Shahram Izadi, Abigail Sellen, Joseph 'Jofish' Kaye, and Rachel Eardley. 2007. Locating Family Values: A Field Trial of the Whereabouts Clock. In UbiComp 2007: Ubiquitous Computing, John Krumm, Gregory D. Abowd, Aruna Seneviratne and Thomas Strang (eds.). Springer Berlin Heidelberg, 354--37 Retrieved April 21, 2015 from http://link.springer.com/chapter/10.1007/978-3-540-74853-3_21.
[5]
Andy Crabtree and Richard Mortier. 2015. Human data interaction: Historical lessons from social studies and CSCW. ECSCW 2015: Proceedings of the 14th European Conference on Computer Supported Cooperative Work, 19--23 September 2015, Oslo, Norway, Springer, 3--21. Retrieved March 28, 2016 from http://link.springer.com/chapter/10.1007/978-3-319-20499-4_1.
[6]
John Curtin, Robert J. Kauffman, and Frederick J. Riggins. 2007. Making the "MOST" out of RFID technology: a research agenda for the study of the adoption, usage and impact of RFID. Information Technology and Management 8, 2: 87--110. http://doi.org/10.1007/s10799-007-0010-1.
[7]
Paul Dourish. 2006. Implications for design. Proceedings of the SIGCHI conference on Human Factors in computing systems, ACM, 541--550. Retrieved July 12, 2015 from http://dl.acm.org/citation.cfm?id=1124855.
[8]
Paul Dourish and Genevieve Bell. 2011. Divining a Digital Future: Mess and Mythology in Ubiquitous Computing. MIT Press, Cambridge, MA, USA. Retrieved May 2, 2015 from http://site.ebrary.com/lib/alltitles/docDetail.action?docID=10476094.
[9]
Batya Friedman, Peter H. Kahn Jr, Alan Borning, and Alina Huldtgren. 2013. Value Sensitive Design and Information Systems. In Early engagement and new technologies: Opening up the laboratory, Neelke Doorn, Daan Schuurbiers, Ibo van de Poel and Michael E. Gorman (eds.). Springer Netherlands, 55--95. Retrieved February 9, 2016 from http://link.springer.com/chapter/10.1007/978-94-007-7844-3_4.
[10]
Batya Friedman and Helen Nissenbaum. 1996. Bias in computer systems. ACM Transactions on Information Systems (TOIS) 14, 3: 330--347.
[11]
Hamed Haddadi, Richard Mortier, Derek McAuley, and Jon Crowcroft. 2013. Human-data interaction. Technical report, University of Cambridge, Computer Laboratory. Retrieved March 28, 2016 from http://www-ipv4.cl.cam.ac.uk/techreports/UCAM-CL-TR-837.pdf.
[12]
Richard HR Harper. 2008. Being human: Human-computer interaction in the year 2020. Microsoft Research Limited.
[13]
Richard Harper, Tom Rodden, Yvonne Rogers, and Abigail Sellen (eds.). 2008. Being human: human-computer interaction in the year 2020. Microsoft Research, Cambridge, England.
[14]
H. Hutchinson, W. Mackay, B. Westerlund, et al. 2003. Technology probes: inspiring design for and with families. Proceedings of the SIGCHI conference on Human factors in computing systems, 17--24. Retrieved January 31, 2013 from http://dl.acm.org/citation.cfm?id=642616.
[15]
Cory Knobel and Geoffrey C. Bowker. 2011. Values in Design. Commun. ACM 54, 7: 26--28. http://doi.org/10.1145/1965724.1965735.
[16]
Treffyn Lynch Koreshoff, Tuck Wah Leong, and Toni Robertson. 2013. Approaching a Human-centred Internet of Things. Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration, ACM, 363--366. http://doi.org/10.1145/2541016.2541093.
[17]
Christopher A. Le Dantec, Erika Shehan Poole, and Susan P. Wyche. 2009. Values as lived experience: evolving value sensitive design in support of value discovery. Proceedings of the SIGCHI conference on human factors in computing systems, ACM, 1141--1150. Retrieved March 24, 2016 from http://dl.acm.org/citation.cfm?id=1518875.
[18]
Ewa Luger and Tom Rodden. 2013. Terms of agreement: Rethinking consent for pervasive computing. Interacting with Computers 25, 3: 199--203.
[19]
Jessica K. Miller, Batya Friedman, Gavin Jancke, and Brian Gill. 2007. Value tensions in design: the value sensitive design, development, and appropriation of a corporation's groupware system. Proceedings of the 2007 international ACM conference on Supporting group work, ACM, 281--290. Retrieved March 24, 2016 from http://dl.acm.org/citation.cfm?id=1316668.
[20]
Roberto Pereira, M. Cecília C. Baranauskas, and L. D. Almeida. 2011. The value of value identification in web applications. IADIS International Conference on WWW/Internet (ICWI), 37--44. Retrieved March 24, 2016 from https://www.researchgate.net/profile/Roberto_Pereira2/publication/216125524_The_Value_of_Value_Identification_in_Web_Applications/links/09e41504b7983e989b000000.pdf.
[21]
F.J. Riggins and S.F. Wamba. 2015. Research Directions on the Adoption, Usage, and Impact of the Internet of Things through the Use of Big Data Analytics. 2015 48th Hawaii International Conference on System Sciences (HICSS), 1531--1540. http://doi.org/10.1109/HICSS.2015.186.
[22]
Abigail Sellen, Yvonne Rogers, Richard Harper, and Tom Rodden. 2009. Reflecting Human Values in the Digital Age. Commun. ACM 52, 3: 58--66. http://doi.org/10.1145/1467247.1467265.
[23]
Katie Shilton, Jes A. Koepfler, and Kenneth R. Fleischmann. 2013. Charting sociotechnical dimensions of values for design research. The Information Society 29, 5: 259--271.
[24]
Katie Shilton, Jes A. Koepfler, and Kenneth R. Fleischmann. 2014. How to See Values in Social Computing: Methods for Studying Values Dimensions. Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing, ACM, 426--435. http://doi.org/10.1145/2531602.2531625.
[25]
H. Jeff Smith, Sandra J. Milberg, and Sandra J. Burke. 1996. Information Privacy: Measuring Individuals' Concerns about Organizational Practices. MIS Quarterly 20, 2: 167--196. http://doi.org/10.2307/249477.
[26]
Ovidiu Vermesan, Peter Friess, Patrick Guillemin, et al. 2011. Internet of things strategic research roadmap. O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker, A. Bassi, et al., Internet of Things: Global Technological and Societal Trends 1: 9--52.
[27]
Amy Voida, Lynn Dombrowski, Gillian R. Hayes, and Melissa Mazmanian. 2014. Shared Values/Conflicting Logics: Working Around e-Government Systems. Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems, ACM, 3583--3592. http://doi.org/10.1145/2556288.2556971

Cited By

View all
  • (2024)Un/Making Data Imaginaries: The Data EpicsACM Transactions on Computer-Human Interaction10.1145/368526931:6(1-38)Online publication date: 14-Aug-2024
  • (2024)Designing Interactive Privacy Labels for Advanced Smart Home Device Configuration OptionsProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661527(3372-3388)Online publication date: 1-Jul-2024
  • (2024)Understanding Perceived Utility and Comfort of In-Home General-Purpose Sensing through Progressive ExposureProceedings of the ACM on Human-Computer Interaction10.1145/36374328:CSCW1(1-32)Online publication date: 26-Apr-2024
  • Show More Cited By

Index Terms

  1. Trust Me: Doubts and Concerns Living with the Internet of Things

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    DIS '16: Proceedings of the 2016 ACM Conference on Designing Interactive Systems
    June 2016
    1374 pages
    ISBN:9781450340311
    DOI:10.1145/2901790
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 June 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. data
    2. human centered design
    3. internet of things
    4. privacy
    5. trust

    Qualifiers

    • Research-article

    Conference

    DIS '16
    Sponsor:
    DIS '16: Designing Interactive Systems Conference 2016
    June 4 - 8, 2016
    QLD, Brisbane, Australia

    Acceptance Rates

    DIS '16 Paper Acceptance Rate 107 of 418 submissions, 26%;
    Overall Acceptance Rate 1,158 of 4,684 submissions, 25%

    Upcoming Conference

    DIS '25
    Designing Interactive Systems Conference
    July 5 - 9, 2025
    Funchal , Portugal

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)74
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Un/Making Data Imaginaries: The Data EpicsACM Transactions on Computer-Human Interaction10.1145/368526931:6(1-38)Online publication date: 14-Aug-2024
    • (2024)Designing Interactive Privacy Labels for Advanced Smart Home Device Configuration OptionsProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661527(3372-3388)Online publication date: 1-Jul-2024
    • (2024)Understanding Perceived Utility and Comfort of In-Home General-Purpose Sensing through Progressive ExposureProceedings of the ACM on Human-Computer Interaction10.1145/36374328:CSCW1(1-32)Online publication date: 26-Apr-2024
    • (2024)Decide Yourself or Delegate - User Preferences Regarding the Autonomy of Personal Privacy Assistants in Private IoT-Equipped EnvironmentsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642591(1-20)Online publication date: 11-May-2024
    • (2024)Understanding perspectives on personal data privacy in Internet of Things (IoT): A Systematic Literature Review (SLR)Heliyon10.1016/j.heliyon.2024.e30357(e30357)Online publication date: Apr-2024
    • (2024)Towards a Harmonised Approach for Security and Privacy Management in Smart Home ContextsHCI for Cybersecurity, Privacy and Trust10.1007/978-3-031-61379-1_12(170-187)Online publication date: 1-Jun-2024
    • (2023)Exploring tenants' preferences of privacy negotiation in airbnbProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620268(535-552)Online publication date: 9-Aug-2023
    • (2023)"You Shouldn't Need to Share Your Data": Perceived Privacy Risks and Mitigation Strategies Among Privacy-Conscious Smart Home Power UsersProceedings of the ACM on Human-Computer Interaction10.1145/36100387:CSCW2(1-34)Online publication date: 4-Oct-2023
    • (2023)A Survey of User Perspectives on Security and Privacy in a Home Networking EnvironmentACM Computing Surveys10.1145/355809555:9(1-38)Online publication date: 16-Jan-2023
    • (2023)On the Making of Alternative Data Encounters: The Odd InterpretersProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581323(1-20)Online publication date: 19-Apr-2023
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media