[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3322276.3322366acmconferencesArticle/Chapter ViewAbstractPublication PagesdisConference Proceedingsconference-collections
research-article

Anticipating Smart Home Security and Privacy Threats with Survivors of Intimate Partner Abuse

Published: 18 June 2019 Publication History

Abstract

This paper presents a design-led qualitative study investigating the (mis)use of digital technologies as tools for stalking, threats, and harassment within the context of intimate partner abuse (IPA). Results from interviews and domestic abuse forum data are reported on and set the foundation for a series of codesign workshops. The workshops invite participants to creatively anticipate smart home attack vectors, based on their lived experiences of IPA. Three workshops with seven IPA survivors and eleven professional support workers are detailed in this paper. Findings are organised into three phases through which survivors' privacy and security needs can be understood: 1) initial purchasing and configuring of smart home devices; 2) daily usage and; 3) (re-)securing devices after abuse has been identified. The speculative attack-vectors and design ideas generated by participants expose, for the first time, survivors' understanding of smart home security and privacy, as well as their needs, concerns, and requirements.

References

[1]
Mohamed Abomhara and Geir M. Køien. 2014. Security and privacy in the Internet of Things: Current status and open issues. In Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on, 1--8.
[2]
Elias Aboujaoude, Matthew W. Savage, Vladan Starcevic, and Wael O. Salame. 2015. Cyberbullying: Review of an Old Problem Gone Viral. Journal of Adolescent Health 57, 1 (July 2015), 10--18.
[3]
Kate Abramson. 2014. Turning up the Lights on Gaslighting. Philosophical Perspectives 28, 1 (December 2014), 1--30.
[4]
Parveen Azam Ali and Paul B. Naylor. 2013. Intimate partner violence: A narrative review of the feminist, social and ecological explanations for its causation. Aggression and Violent Behavior 18, 6 (November 2013), 611--619.
[5]
Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Faith Cranor, and Yuvraj Agarwal. 2015. Your Location Has Been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15), 787--796.
[6]
Amazon. 2018. Help: Household Profiles on Alexa Devices. Amazon: Help & Customer Service. Retrieved September 21, 2018 from https://www.amazon.co.uk/gp/help/customer/display.html?nodeId=201628040
[7]
Andrew Darby, Anna Whicher, Emmanuel Tsekleves, and Naomi Turner. 2015. ProtoPolicy: Using Design Fiction to Negotiate Political Questions. Lancaster University. Retrieved from http://eprints.lancs.ac.uk/78341/1/ProtoPolicy_Design_Report_Print.pdf
[8]
Noah Apthorpe, Dillon Reisman, Srikanth Sundaresan, Arvind Narayanan, and Nick Feamster. 2017. Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic. arXiv:1708.05044 {cs} (August 2017). Retrieved April 5, 2019 from http://arxiv.org/abs/1708.05044
[9]
Erling Björgvinsson, Pelle Ehn, and Per-Anders Hillgren. 2012. Agonistic participatory design: working with marginalised social movements. CoDesign 8, 2--3 (June 2012), 127--144.
[10]
Nellie Bowles. 2018. Thermostats, Locks and Lights: Digital Tools of Domestic Abuse. The New York Times. Retrieved January 5, 2019 from https://www.nytimes.com/2018/06/23/technology/smart-home-devices-domestic-abuse.html
[11]
Michael W. Boyce, Katherine Muse Duma, Lawrence J. Hettinger, Thomas B. Malone, Darren P. Wilson, and Janae Lockett-Reynolds. 2011. Human Performance in Cybersecurity: A Research Agenda. Proceedings of the Human Factors and Ergonomics Society Annual Meeting 55, 1 (September 2011), 1115--1119.
[12]
Deana Brown, Victoria Ayo, and Rebecca E. Grinter. 2014. Reflection Through Design: Immigrant Women's Self-reflection on Managing Health and Wellness. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14), 1605--1614.
[13]
Jed R. Brubaker and Janet Vertesi. 2010. Death and the social network. In Proc. CHI Workshop on Death and the Digital.
[14]
J. Bugeja, A. Jacobsson, and P. Davidsson. 2016. On Privacy and Security Challenges in Smart Connected Homes. In 2016 European Intelligence and Security Informatics Conference (EISIC), 172--175.
[15]
Charlotte Bunch. 2018. Transforming Human Rights from a Feminist Perspective. Women's Rights, Human Rights.
[16]
Sloane Burke Winkelman, Jody Oomen-Early, Ashley Walker, Lawrence Chu, and Alice Yick-Flanagan. 2015. Exploring Cyber Harassment among Women Who Use Social Media. Universal Journal of Public Health (September 2015), 194--201.
[17]
Stuart Candy and Jake Dunagan. 2017. Designing an experiential scenario: The People Who Vanished. Futures 86, (February 2017), 136--153.
[18]
R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, and T. Ristenpart. 2018. The Spyware Used in Intimate Partner Violence. In 2018 IEEE Symposium on Security and Privacy (SP), 441--458.
[19]
Audrey Desjardins, Jeremy E. Viny, Cayla Key, and Nouela Johnston. 2019. Alternative Avenues for IoT: Designing with Non-Stereotypical Homes. In CHI Conference on Human Factors in Computing Systems Proceedings.
[20]
Jill P. Dimond, Casey Fiesler, and Amy S. Bruckman. 2011. Domestic violence and information communication technologies. Interact. Comput. 23, 5 (September 2011), 413--421.
[21]
Marketa Dolejsova. 2018. Edible Speculations in the Parlour of Food Futures. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (CHI EA '18), alt13:1--alt13:10.
[22]
EIGE. 2017. Cyber violence against women and girls. European Institute for Gender Equality. Retrieved from http://eige.europa.eu/rdc/eige-publications/cyber-violence-against-women-and-girls
[23]
Earlence Fernandes, Jaeyeon Jung, and Atul Prakash. 2016. Security analysis of emerging smart home applications. In Security and Privacy (SP), 2016 IEEE Symposium on, 636--654.
[24]
Laura Forlano and Anijo Mathew. 2014. From Design Fiction to Design Friction: Speculative and Participatory Design of Values-Embedded Urban Technology. Journal of Urban Technology 21, (December 2014), 7--24.
[25]
Diana Freed, Jackeline Palmer, Diana Elizabeth Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2017. Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders. Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems 1, CSCW (December 2017), 46:1--46:22.
[26]
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2018. ?A Stalker's Paradise": How Intimate Partner Abusers Exploit Technology. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18), 667:1--667:13.
[27]
Diana Freed, Jackeline Palmer, DMKLRistenpart, and Nicola Dell. 2018. "A Stalker's Paradise": How Intimate Partner Abusers Exploit Technology. (2018).
[28]
Google. 2018. Set up multiple users for your speaker. Google Home Help. Retrieved September 21, 2018 from https://support.google.com/googlehome/answer/7323910?hl=en
[29]
Dorothy Wunmi Grigg. 2010. Cyber-Aggression: Definition and Concept of Cyberbullying. Journal of Psychologists and Counsellors in Schools 20, 2 (December 2010), 143--156.
[30]
Maarten A. Hajer and Peter Pelzer. 2018. 2050-An Energetic Odyssey: Understanding "Techniques of Futuring' in the transition towards renewable energy. Energy Research & Social Science 44, (October 2018), 222--231.
[31]
Bridget A. Harris and Delanie Woodlock. 2018. Digital Coercive Control: Insights from Two Landmark Domestic Violence Studies. Br J Criminol (2018).
[32]
Home Office. 2015. Controlling or Coercive Behaviour in an Intimate or Family Relationship: Statutory Guidance Framework. Retrieved from https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/482528/Controlling_or_coercive_behaviour_-_statutory_guidance.pdf
[33]
William Jang, Adil Chhabra, and Aarathi Prasad. 2017. Enabling Multi-user Controls in Smart Home Devices. In Proceedings of the 2017 Workshop on Internet of Things Security and Privacy (IoTS&P '17), 49--54.
[34]
Jordana N. Navarro. 2016. Cyberabuse and Cyberstalking. In The Intersection Between Intimate Partner Abuse, Technology, and Cybercrime. Carolina Academic Press, Durham, North Carolina, 125--140.
[35]
Joan B. Kelly and Michael P. Johnson. 2008. Differentiation among types of intimate partner violence: Research update and implications for interventions. Family court review 46, 3 (2008), 476--499.
[36]
Robin M. Kowalski, Gary W. Giumetti, Amber N. Schroeder, and Micah R. Lattanner. 2014. Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological bulletin 140, 4 (2014), 1073.
[37]
Huichen Lin, Neil Bergmann, Huichen Lin, and Neil W. Bergmann. 2016. IoT Privacy and Security Challenges for Smart Home Environments. Information 7, 3 (July 2016), 44.
[38]
Yabing Liu, Krishna P. Gummadi, Balachander Krishnamurthy, and Alan Mislove. 2011. Analyzing Facebook Privacy Settings: User Expectations vs. Reality. In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference (IMC '11), 61--70.
[39]
M. Madejski, M. Johnson, and S. M. Bellovin. 2012. A study of privacy settings errors in an online social network. In 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, 340--345.
[40]
Tara Matthews, Kathleen O'Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, and Sunny Consolvo. 2017. Stories from Survivors: Privacy & Security Practices when Coping with Intimate Partner Abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17), 2189--2201.
[41]
J. McIntyre-Mills. 2010. Participatory Design for Democracy and Wellbeing: Narrowing the Gap Between Service Outcomes and Perceived Needs. Syst Pract Action Res 23, 1 (February 2010), 21--45.
[42]
J. R. C. Nurse, S. Creese, M. Goldsmith, and K. Lamberts. 2011. Guidelines for usable cybersecurity: Past and present. In 2011 Third International Workshop on Cyberspace Safety and Security (CSS), 21--26.
[43]
J. R. C. Nurse, A. Erola, I. Agrafiotis, M. Goldsmith, and S. Creese. 2015. Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things. In 2015 International Workshop on Secure Internet of Things (SIoT), 5--14.
[44]
ONS. 2016. Intimate personal violence and partner abuse. Office for National Statistics. Retrieved February 15, 2017 from https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/compendium/focusonviolentcrimeandsexualoffences/yearendingmarch2015/chapter4intimatepersonalviolenceandpartnerabuse
[45]
Laura Pereira, Tanja Hichert, Maike Hamann, Rika Preiser, and Reinette Biggs. 2018. Using futures methods to create transformative spaces: visions of a good Anthropocene in southern Africa. Ecology and Society 23, 1 (2018), 19.
[46]
Shari Lawrence Pfleeger, M. Angela Sasse, and Adrian Furnham. 2014. From Weakest Link to Security Hero: Transforming Staff Security Behavior. Journal of Homeland Security and Emergency Management 11, 4 (2014), 489--510.
[47]
Miloslava Plachkinova, Au Vo, and Ala Alluhaidan. 2016. Emerging Trends in Smart Home Security, Privacy, and Digital Forensics. AMCIS 2016 Proceedings (August 2016). Retrieved from https://aisel.aisnet.org/amcis2016/ITProj/Presentations/23
[48]
Graham Pullin and Alan Newell. 2007. Focussing on Extra-Ordinary Users. In Universal Acess in Human Computer Interaction. Coping with Diversity (Lecture Notes in Computer Science), 253--262.
[49]
Nithya Sambasivan, Julie Weber, and Edward Cutrell. 2011. Designing a phone broadcasting system for urban sex workers in India. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 267--276.
[50]
Elizabeth B.-N. Sanders and Pieter Jan Stappers. 2008. Co-creation and the new landscapes of design. Co-design 4, 1 (2008), 5--18.
[51]
Snook, Chayn, and SafeLives. 2017. Tech vs Abuse: Research Findings. Comic Relief. Retrieved from http://media.wix.com/ugd/f86f13_366b6514c8fc4e9488fc15edf2148d52.pdf
[52]
Sonia Elks. 2018. Domestic abusers using internet, smart devices to spy on and control partners, women's group says. The Globe and Mail. Retrieved September 14, 2018 from https://www.theglobeandmail.com/world/article-domestic-abusers-using-internet-smart-devices-to-spy-on-and-control/
[53]
Sonia Elks. 2018. Smart devices - a new tool for domestic abuse. Reuters. Retrieved January 5, 2019 from https://uk.reuters.com/article/britain-tech-women-idUKL8N1VK53G
[54]
Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, and Sarah Tucker. 2007. Intimate Partner Violence, Technology, and Stalking. Violence Against Women 13, 8 (August 2007), 842--856.
[55]
Statista. 2018. Smart Home - United Kingdom. Statista Market Forecast. Retrieved September 14, 2018 from https://www.statista.com/outlook/279/156/smart-home/united-kingdom
[56]
Statista. 2018. Smart Home - United States. Statista Market Forecast. Retrieved September 14, 2018 from https://www.statista.com/outlook/279/109/smart-home/united-states
[57]
Toni Robertson and Jesper Simonsen. 2012. Participatory Design: An Introduction. In Routledge International Handbook of Participatory Design. Routledge, London, 1--18.
[58]
Ryan West. 2008. The Psychology of Security. Commun. ACM 51, 4 (April 2008), 34--40.
[59]
Janis Wolak, Kimberly J. Mitchell, and David Finkelhor. 2007. Does Online Harassment Constitute Bullying? An Exploration of Online Harassment by Known Peers and Online-Only Contacts. Journal of Adolescent Health 41, 6, Supplement (December 2007), S51--S58.
[60]
Delanie Woodlock. 2016. The Abuse of Technology in Domestic Violence and Stalking. Violence Against Women 23, 5 (May 2016), 584--602.
[61]
Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao. 2017. A Survey on Security and Privacy Issues in Internet-of-Things. IEEE Internet of Things Journal 4, 5 (October 2017), 1250--1258.

Cited By

View all
  • (2024)Video Surveillance System Usage in Preventing Crime: Preliminary findings from MalaysiaEnvironment-Behaviour Proceedings Journal10.21834/e-bpj.v9iSI18.54829:SI18(215-221)Online publication date: 17-Jan-2024
  • (2024)Trust and Safety work: internal governance of technology risks and harmsJournal of Integrated Global STEM10.1515/jigs-2024-00031:2(95-105)Online publication date: 24-Oct-2024
  • (2024)Security and Privacy Perspectives of People Living in Shared Home EnvironmentsProceedings of the ACM on Human-Computer Interaction10.1145/36869078:CSCW2(1-39)Online publication date: 8-Nov-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
DIS '19: Proceedings of the 2019 on Designing Interactive Systems Conference
June 2019
1628 pages
ISBN:9781450358507
DOI:10.1145/3322276
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 June 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. codesign
  2. interpersonal privacy
  3. intimate partner abuse
  4. smart homes

Qualifiers

  • Research-article

Conference

DIS '19
Sponsor:
DIS '19: Designing Interactive Systems Conference 2019
June 23 - 28, 2019
CA, San Diego, USA

Acceptance Rates

DIS '19 Paper Acceptance Rate 105 of 415 submissions, 25%;
Overall Acceptance Rate 1,158 of 4,684 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)148
  • Downloads (Last 6 weeks)20
Reflects downloads up to 31 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Video Surveillance System Usage in Preventing Crime: Preliminary findings from MalaysiaEnvironment-Behaviour Proceedings Journal10.21834/e-bpj.v9iSI18.54829:SI18(215-221)Online publication date: 17-Jan-2024
  • (2024)Trust and Safety work: internal governance of technology risks and harmsJournal of Integrated Global STEM10.1515/jigs-2024-00031:2(95-105)Online publication date: 24-Oct-2024
  • (2024)Security and Privacy Perspectives of People Living in Shared Home EnvironmentsProceedings of the ACM on Human-Computer Interaction10.1145/36869078:CSCW2(1-39)Online publication date: 8-Nov-2024
  • (2024)'Women just have to accept it when the man wants it': An Investigation of the Practice of Forced Marriage and the Potential for Design InterventionsProceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685371(1-14)Online publication date: 13-Oct-2024
  • (2024)Wearable Activity Trackers: A Survey on Utility, Privacy, and SecurityACM Computing Surveys10.1145/364509156:7(1-40)Online publication date: 8-Feb-2024
  • (2024)How We Use Together: Coordinating Individual Preferences for Using Shared Devices at HomeProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661634(3407-3418)Online publication date: 1-Jul-2024
  • (2024)Designing Interactive Privacy Labels for Advanced Smart Home Device Configuration OptionsProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661527(3372-3388)Online publication date: 1-Jul-2024
  • (2024)Abusive Partner Perspectives on Technology Abuse: Implications for Community-based Violence PreventionProceedings of the ACM on Human-Computer Interaction10.1145/36372928:CSCW1(1-25)Online publication date: 26-Apr-2024
  • (2024)Expert Insights on Robots for Safeguarding Children: How (not) and Why (not)?Proceedings of the 23rd Annual ACM Interaction Design and Children Conference10.1145/3628516.3655798(600-611)Online publication date: 17-Jun-2024
  • (2024)Stochastic Machine Witnesses at Work: Today's Critiques of Taylorism are Inadequate for Workplace Surveillance Epistemologies of the FutureProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642206(1-12)Online publication date: 11-May-2024
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media