[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/978-3-030-54455-3_8guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Understanding Perceptions of Smart Devices

Published: 14 February 2020 Publication History

Abstract

We explored perceptions regarding the value and sensitivity of the data collected by a variety of everyday smart devices. Via semi-structured interviews, we found that people’s conceptualizations of operational details and privacy and security threats of “smart” functions are greatly limited. Our findings point to the need for designs that readily enable users to separate the physical and digital aspects of device operation and call for further exploration of the design space of privacy and security controls and indicators for smart devices.

References

[1]
Abdi, N., Ramokapane, K.M., Such, J.M.: More than smart speakers: security and privacy perceptions of smart home personal assistants. In: Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, August 2019. https://www.usenix.org/conference/soups2019/presentation/abdi
[2]
Acquisti A, John LK, and Loewenstein G What is privacy worth? J. Legal Stud. 2013 42 2 249-274
[3]
Barbosa, N.M., Park, J.S., Yao, Y., Wang, Y.: “What if?" Predicting individual users’ smart home privacy preferences and their changes. In: Proceedings on Privacy Enhancing Technologies, vol. 2019, no. 4, pp. 211–231 (2019). 10.2478/popets-2019-0066
[4]
California State Legislature: California consumer privacy act of 2018 (2018). https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=201720180AB375
[5]
Chandrasekaran, V., Fawaz, K., Mutlu, B., Banerjee, S.: Characterizing privacy perceptions of voice assistants: a technology probe study. CoRR abs/1812.00263 (2018). http://arxiv.org/abs/1812.00263
[6]
Emami-Naeini, P., Dixon, H., Agarwal, Y., Cranor, L.F.: Exploring how privacy and security factor into IoT device purchase behavior. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. CHI 2019. Association for Computing Machinery, New York (2019). 10.1145/3290605.3300764
[7]
European Parliament and Council of the European Union: Regulation (EU) 2016/679 of the European parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (2016). http://data.europa.eu/eli/reg/2016/679/oj
[8]
Ghiglieri M and Waidner M HbbTV security and privacy: issues and challenges IEEE Secur. Priv. 2016 14 3 61-67
[9]
Ghiglieri M, Volkamer M, and Renaud K Tryfonas T Exploring consumers’ attitudes of smart TV related privacy risks Human Aspects of Information Security, Privacy and Trust 2017 Cham Springer 656-674
[10]
Glaser BG and Strauss AL Discovery of Grounded Theory: Strategies for Qualitative Research 2017 Abingdon Routledge
[11]
Grossklags, J., Acquisti, A.: When 25 cents is too much: an experiment on willingness-to-sell and willingness-to-protect personal information. In: Proceedings of the Sixth Workshop on Economics of Information Security, WEIS 2007 (2007)
[12]
Hann IH, Hui KL, Lee SYT, and Png IP Overcoming online information privacy concerns: an information-processing theory approach J. Manag. Inf. Syst. 2007 24 2 13-42
[13]
Hernandez, G., Arias, O., Buentello, D., Jin, Y.: Smart Nest thermostat: a smart spy in your home. In: Blackhat USA (2014). https://blackhat.com/docs/us-14/materials/us-14-Jin-Smart-Nest-Thermostat-A-Smart-Spy-In-Your-Home-WP.pdf
[14]
Kang, R., Dabbish, L., Fruchter, N., Kiesler, S.: “My data just goes everywhere:” user mental models of the Internet and implications for privacy and security. In: Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), pp. 39–52. USENIX Association, Ottawa, July 2015. https://www.usenix.org/conference/soups2015/proceedings/presentation/kang
[15]
Lau J, Zimmerman B, and Schaub F Alexa, are you listening? Privacy perceptions, concerns and privacy-seeking behaviors with smart speakers Proc. ACM Hum.-Comput. Interact. 2018 2 CSCW 1-31
[16]
Malkin, N., Bernd, J., Johnson, M., Egelman, S.: “What can’t data be used for?” Privacy expectations about smart TVs in the US. In: European Workshop on Usable Security (Euro USEC) (2018)
[17]
Malkin N, Deatrick J, Tong A, Wijesekera P, Egelman S, and Wagner D Privacy attitudes of smart speaker users Proc. Priv. Enhanc. Technol. 2019 2019 4 250-271
[18]
Matsakis, L.: We’re all just starting to realize the power of personal data, December 2018. https://www.wired.com/story/2018-power-of-personal-data/
[19]
Oulasvirta, A., et al.: Long-term effects of ubiquitous surveillance in the home. In: Proceedings of the 2012 ACM Conference on Ubiquitous Computing, UbiComp 2012, pp. 41–50. Association for Computing Machinery, New York (2012). 10.1145/2370216.2370224
[20]
Pierce, J.: Smart home security cameras and shifting lines of creepiness: a design-led inquiry. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. CHI 2019. Association for Computing Machinery, New York (2019). 10.1145/3290605.3300275
[21]
United States Congress: Children’s online privacy protection act of 1998. 15 U. S. C. 6501–6505. https://uscode.house.gov/view.xhtml?req=granuleid%3AUSC-prelim-title15-section6501&edition=prelim
[22]
Worthy, P., Matthews, B., Viller, S.: Trust me: doubts and concerns living with the Internet of Things. In: Proceedings of the 2016 ACM Conference on Designing Interactive Systems, DIS 2016, pp. 427–434. Association for Computing Machinery, New York (2016). 10.1145/2901790.2901890
[23]
Yao, Y., Basdeo, J.R., Kaushik, S., Wang, Y.: Defending my castle: a co-design study of privacy mechanisms for smart homes. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, CHI 2019. Association for Computing Machinery, New York (2019). 10.1145/3290605.3300428
[24]
Zeng, E., Mare, S., Roesner, F.: End user security and privacy concerns with smart homes. In: Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pp. 65–80. USENIX Association, Santa Clara, July 2017. https://www.usenix.org/conference/soups2017/technical-sessions/presentation/zeng
[25]
Zheng S, Apthorpe N, Chetty M, and Feamster N User perceptions of smart home IoT privacy Proc. ACM Hum.-Comput. Interact. 2018 2 CSCW 1-20
[26]
Zimmermann, V., Bennighof, M., Edel, M., Hofmann, O., Jung, J., von Wick, M.: ‘Home, smart home’ - Exploring end users’ mental models of smart homes. In: Dachselt, R., Weber, G. (eds.) Mensch und Computer 2018 - Workshopband. Gesellschaft für Informatik e.V., Bonn (2018). 10.18420/muc2018-ws08-0539

Cited By

View all
  • (2024)Privacy in Immersive Extended Reality: Exploring User Perceptions, Concerns, and Coping StrategiesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642104(1-24)Online publication date: 11-May-2024

Index Terms

  1. Understanding Perceptions of Smart Devices
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    Financial Cryptography and Data Security: FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers
    Feb 2020
    634 pages
    ISBN:978-3-030-54454-6
    DOI:10.1007/978-3-030-54455-3
    • Editors:
    • Matthew Bernhard,
    • Andrea Bracciali,
    • L. Jean Camp,
    • Shin'ichiro Matsuo,
    • Alana Maurushat,
    • Peter B. Rønne,
    • Massimiliano Sala

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 14 February 2020

    Author Tags

    1. Smart devices
    2. Smart objects
    3. Privacy preferences
    4. Privacy practices
    5. Data value
    6. Data sensitivity
    7. Usable privacy

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Privacy in Immersive Extended Reality: Exploring User Perceptions, Concerns, and Coping StrategiesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642104(1-24)Online publication date: 11-May-2024

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media