[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3419249.3420108acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnordichiConference Proceedingsconference-collections
research-article

Does My Smart Device Provider Care About My Privacy? Investigating Trust Factors and User Attitudes in IoT Systems

Published: 26 October 2020 Publication History

Abstract

With the wide spread of IoT devices, smart systems gain more and more control over personal data and daily lives of their users. This control, however, can easily be misused, either by system providers themselves acting in bad faith, or by external attackers. Implementing proper measures towards security and privacy protection of smart systems, therefore, becomes of critical importance. In this paper we present a study to investigate beliefs among end users, whether the smart system providers are both capable and motivated to implement such measures. For this purpose, we conduct an online survey of 98 participants from the UK, which we analyse using quantitative and qualitative methods. Our results show that users’ trust in proper security and privacy protection in smart systems is influenced by a multitude of factors such as information about concrete technologies and privacy policies of the systems, but also information about the company such as its reputation or geographical location. We conclude that transparency by companies, regarding both the technologies behind the concrete system and the general practices of the company itself, is a crucial factor in ensuring end user confidence.

References

[1]
Ruba Abu-Salma, M Angela Sasse, Joseph Bonneau, Anastasia Danilova, Alena Naiakshina, and Matthew Smith. 2017. Obstacles to the adoption of secure communication tools. In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 137–153.
[2]
Alessandro Acquisti. 2009. Nudging privacy: The behavioral economics of personal information. IEEE security & privacy 7, 6 (2009), 82–85.
[3]
Louise Barkhuus. 2012. The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 367–376.
[4]
Christy Cheung and Matthew KO Lee. 2000. Trust in Internet shopping: A proposed model and measurement instrument. AMCIS 2000 Proceedings(2000), 406.
[5]
Pardis Emami-Naeini, Henry Dixon, Yuvraj Agarwal, and Lorrie Faith Cranor. 2019. Exploring how privacy and security factor into iot device purchase behavior. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1–12.
[6]
Andy Field. 2018. Discovering Statistics Using IBM SPSS Statistics (5th ed.). SAGE Publications Inc. 1071 pages.
[7]
Giorgos Flouris, Theodore Patkos, Ioannis Chrysakis, Ioulia Konstantinou, Nikolay Nikolov, Panagiotis Papadakos, Jeremy Pitt, Dumitru Roman, Alexandru Stan, and Chrysostomos Zeginis. 2018. Towards a Collective Awareness Platform for Privacy Concerns and Expectations. Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics) 11229 LNCS (2018), 135–152. https://doi.org/10.1007/978-3-030-02610-3_8
[8]
Radhika Garg. 2019. An Analysis of (Non-)Use Practices and Decisions of Internet of Things. In Human-Computer Interaction – INTERACT 2019, David Lamas, Fernando Loizides, Lennart Nacke, Helen Petrie, Marco Winckler, and Panayiotis Zaphiris (Eds.). Springer International Publishing, Cham, 3–24.
[9]
David Gefen, Elena Karahanna, and Detmar W Straub. 2003. Trust and TAM in online shopping: An integrated model. MIS quarterly 27, 1 (2003), 51–90.
[10]
Nadine Guhr, Oliver Werth, Philip Peter Hermann Blacha, and Michael H. Breitner. 2020. Privacy concerns in the smart home context. SN Applied Sciences 2, 2 (2020), 247.
[11]
Sabrina Karwatzki, Manuel Trenz, Virpi Kristiina Tuunainen, and Daniel Veit. 2017. Adverse consequences of access to individuals’ information: an analysis of perceptions and the scope of organisational influence. European Journal of Information Systems(2017), 688–715.
[12]
Oksana Kulyk, Paul Gerber, Michael El Hanafi, Benjamin Reinheimer, Karen Renaud, and Melanie Volkamer. 2016. Encouraging privacy-aware smartphone app installation: Finding out what the technically-adept do. (2016).
[13]
Oksana Kulyk, Annika Hilt, Nina Gerber, and Melanie Volkamer. 2018. this website uses cookies”: Users’ perceptions and reactions to the cookie disclaimer. In European Workshop on Usable Security (EuroUSEC).
[14]
Oksana Kulyk, Benjamin Reinheimer, Lukas Aldag, Peter Mayer, Nina Gerber, and Melanie Volkamer. 2020. Security and Privacy Awareness in Smart Environments – A Cross-Country Investigation. In Financial Cryptography and Data Security Workshop on Usable Security (AsiaUSEC), February 14, 2020 Sabah, Malaysia.Springer.
[15]
Alexander Kunst. 2020. Smart home device ownership in the UK 2020. https://www.statista.com/forecasts/997845/smart-home-device-ownership-in-the-uk#statisticContainer
[16]
Edith Law, Krzysztof Z Gajos, Andrea Wiggins, Mary L Gray, and Alex Williams. 2017. Crowdsourcing as a tool for research: Implications of uncertainty. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. 1544–1561.
[17]
Helen Nissenbaum. 2004. Will Security Enhance Trust online, or supplant it?Trust and Distrust Within Organizations: Emerging Perspectives, Enduring Questions, Eds. R. Kramer and K. Cook, Russell Sage Publications (2004) (2004), 155–188.
[18]
Jeremy Pitt. 2012. Design Contractualism for Pervasive / Affective Computing. Technol. Soc. Mag. IEEE 31, 4 (2012), 22–29. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6387955
[19]
Jens Riegelsberger, M Angela Sasse, and John D McCarthy. 2005. The mechanics of trust: A framework for research and design. International Journal of Human-Computer Studies 62, 3 (2005), 381–422.
[20]
Michael Warren Skirpan, Tom Yeh, and Casey Fiesler. 2018. What’s at Stake: Characterizing Risk Perceptions of Emerging Technologies. In Conference on Human Factors in Computing Systems (CHI). ACM, Article 70, 12 pages.
[21]
Constantine Stephanidis, Gavriel Salvendy, Margherita Antona, Jessie Y.C. Chen, Jianming Dong, Vincent G. Duffy, Xiaowen Fang, Cali Fidopiastis, Gino Fragomeni, Limin Paul Fu, Yinni Guo, Don Harris, Andri Ioannou, Kyeong ah (Kate) Jeong, Shin’ichi Konomi, Heidi Krömker, Masaaki Kurosu, James R. Lewis, Aaron Marcus, Gabriele Meiselwitz, Abbas Moallem, Hirohiko Mori, Fiona Fui-Hoon Nah, Stavroula Ntoa, Pei Luen Patrick Rau, Dylan Schmorrow, Keng Siau, Norbert Streitz, Wentao Wang, Sakae Yamamoto, Panayiotis Zaphiris, and Jia Zhou. 2019. Seven HCI Grand Challenges. Int. J. Hum. Comput. Interact. 35, 14 (2019), 1229–1269. https://doi.org/10.1080/10447318.2019.1619259
[22]
Melanie Volkamer, Karen Renaud, Oksana Kulyk, and Sinem Emeröz. 2015. A socio-technical investigation into smartphone security. In International Workshop on Security and Trust Management. Springer, 265–273.
[23]
Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security and Privacy Concerns with Smart Homes. In Symposium on Usable Privacy and Security (SOUPS). USENIX, 65–80.

Cited By

View all
  • (2024)Do You Need to Touch? Exploring Correlations between Personal Attributes and Preferences for Tangible Privacy MechanismsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642863(1-23)Online publication date: 11-May-2024
  • (2024)A Room With an Overview: Toward Meaningful Transparency for the Consumer Internet of ThingsIEEE Internet of Things Journal10.1109/JIOT.2023.331836911:5(7583-7603)Online publication date: 1-Mar-2024
  • (2024)User-Driven Privacy Factors in Trigger-Action Apps: A Comparative Analysis with General IoTPrivacy and Identity Management. Sharing in a Digital World10.1007/978-3-031-57978-3_16(244-264)Online publication date: 23-Apr-2024
  • Show More Cited By

Index Terms

  1. Does My Smart Device Provider Care About My Privacy? Investigating Trust Factors and User Attitudes in IoT Systems
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        NordiCHI '20: Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society
        October 2020
        1177 pages
        ISBN:9781450375795
        DOI:10.1145/3419249
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 26 October 2020

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. IoT
        2. Privacy
        3. Security
        4. Smart Health
        5. Smart Home
        6. Trust
        7. User Study

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Funding Sources

        Conference

        NordiCHI '20
        NordiCHI '20: Shaping Experiences, Shaping Society
        October 25 - 29, 2020
        Tallinn, Estonia

        Acceptance Rates

        NordiCHI '20 Paper Acceptance Rate 89 of 399 submissions, 22%;
        Overall Acceptance Rate 379 of 1,572 submissions, 24%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)29
        • Downloads (Last 6 weeks)5
        Reflects downloads up to 15 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Do You Need to Touch? Exploring Correlations between Personal Attributes and Preferences for Tangible Privacy MechanismsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642863(1-23)Online publication date: 11-May-2024
        • (2024)A Room With an Overview: Toward Meaningful Transparency for the Consumer Internet of ThingsIEEE Internet of Things Journal10.1109/JIOT.2023.331836911:5(7583-7603)Online publication date: 1-Mar-2024
        • (2024)User-Driven Privacy Factors in Trigger-Action Apps: A Comparative Analysis with General IoTPrivacy and Identity Management. Sharing in a Digital World10.1007/978-3-031-57978-3_16(244-264)Online publication date: 23-Apr-2024
        • (2023)Extending the Privacy Calculus to the mHealth Domain: Survey Study on the Intention to Use mHealth Apps in GermanyJMIR Human Factors10.2196/4550310(e45503)Online publication date: 16-Aug-2023
        • (2023)A Survey of User Perspectives on Security and Privacy in a Home Networking EnvironmentACM Computing Surveys10.1145/355809555:9(1-38)Online publication date: 16-Jan-2023
        • (2023)Tapping into Privacy: A Study of User Preferences and Concerns on Trigger-Action Platforms2023 20th Annual International Conference on Privacy, Security and Trust (PST)10.1109/PST58708.2023.10320180(1-12)Online publication date: 21-Aug-2023
        • (2022)Decaying Photos for Enhanced Privacy: User Perceptions Towards Temporal Redactions and 'Trusted' PlatformsProceedings of the ACM on Human-Computer Interaction10.1145/35555386:CSCW2(1-30)Online publication date: 11-Nov-2022
        • (2021)COVID-19 and Cybersecurity: Finally, an Opportunity to Disrupt?JMIRx Med10.2196/210692:2(e21069)Online publication date: 6-May-2021
        • (2021)Misattribution of Error Origination: The Impact of Preconceived Expectations in Co-Operative Online GamesProceedings of the 2021 ACM Designing Interactive Systems Conference10.1145/3461778.3462043(707-717)Online publication date: 28-Jun-2021
        • (2021)“I need to know I'm safe and protected and will check”: Users Want Cues to Signal Data Custodians' Trustworthiness2021 36th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW)10.1109/ASEW52652.2021.00043(171-178)Online publication date: Nov-2021
        • Show More Cited By

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media