Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
survey

Interactive Privacy Management: Toward Enhancing Privacy Awareness and Control in the Internet of Things

Published: 21 September 2023 Publication History

Abstract

The balance between protecting user privacy while providing cost-effective devices that are functional and usable is a key challenge in the burgeoning Internet of Things (IoT). In traditional desktop and mobile contexts, the primary user interface is a screen; however, in IoT devices, screens are rare or very small, invalidating many existing approaches to protecting user privacy. Privacy visualizations are a common approach for assisting users in understanding the privacy implications of web and mobile services. To gain a thorough understanding of IoT privacy, we examine existing web, mobile, and IoT visualization approaches. Following that, we define five major privacy factors in the IoT context: type, usage, storage, retention period, and access. We then describe notification methods used in various contexts as reported in the literature. We aim to highlight key approaches that developers and researchers can use for creating effective IoT privacy notices that improve user privacy management (awareness and control). Using a toolkit, a use case scenario, and two examples from the literature, we demonstrate how privacy visualization approaches can be supported in practice.

References

[1]
Alessandro Acquisti, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, et al. 2017. Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Computing Surveys 50, 3 (2017), 1–41.
[2]
Amir Shayan Ahmadian, Daniel Strüber, Volker Riediger, and Jan Jürjens. 2018. Supporting privacy impact assessment by model-based privacy analysis. In Proceedings of the 33rd Annual ACM Symposium on Applied Computing. 1467–1474.
[3]
Maryam Al-Jamal and Emad Abu-Shanab. 2015. Privacy policy of e-government websites: An itemized checklist proposed and tested. Management Research and Practice 7, 3 (2015), 80.
[4]
Bayan Al Muhander, Omer Rana, Nalin Arachchilage, and Charith Perera. 2022. Demo abstract: PrivacyCube: A tangible device for improving privacy awareness in IoT. In Proceedings of the 2022 IEEE/ACM 7th International Conference on Internet-of-Things Design and Implementation (IoTDI’22). IEEE, Los Alamitos, CA, 109–110.
[5]
Muhammad Raisul Alam, Mamun Bin Ibne Reaz, and Mohd Alauddin Mohd Ali. 2012. A review of smart homes—Past, present, and future. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 42, 6 (2012), 1190–1203.
[6]
Abdulrahman Alhazmi and Nalin Asanka Gamagedara Arachchilage. 2021. I’m all ears! Listening to software developers on putting GDPR principles into software development practice. Personal and Ubiquitous Computing 25 (2021), 879–892.
[7]
Nada Alhirabi, Omer Rana, and Charith Perera. 2021. Security and privacy requirements for the Internet of Things: A survey. ACM Transactions on Internet of Things 2, 1 (2021), 1–37.
[8]
Abdulmalik Alwarafy, Khaled A. Al-Thelaya, Mohamed Abdallah, Jens Schneider, and Mounir Hamdi. 2021. A survey on security and privacy issues in edge computing-assisted Internet of Things. IEEE Internet of Things Journal 8, 6 (2021), 4004–4022.
[9]
Mario Angelelli, Christian Catalano, Derek Hill, Hristo Koshutanski, Claudio Pascarelli, and Joseph Rafferty. 2022. A reference architecture proposal for secure data management in mobile health. In Proceedings of the 2022 7th International Conference on Smart and Sustainable Technologies (SpliTech’22). IEEE, Los Alamitos, CA, 1–6.
[10]
Julio Angulo, Simone Fischer-Hübner, Tobias Pulls, and Erik Wästlund. 2015. Usable transparency with the data track: A tool for visualizing data disclosures. In Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. 1803–1808.
[11]
Julio Angulo, Simone Fischer-Hübner, Erik Wästlund, and Tobias Pulls. 2012. Towards usable privacy policy display and management. Information Management & Computer Security 20, 1 (2012), 4–17.
[12]
Noah Apthorpe, Dillon Reisman, and Nick Feamster. 2017. A smart home is no castle: Privacy vulnerabilities of encrypted IoT traffic. arXiv preprint arXiv:1705.06805 (2017).
[13]
Mohammad Salar Arbabi, Chhagan Lal, Narasimha Raghavan Veeraragavan, Dusica Marijan, Jan F. Nygård, and Roman Vitenberg. 2023. A survey on blockchain for healthcare: Challenges, benefits, and future directions. IEEE Communications Surveys & Tutorials 24, 1 (2023), 386–424.
[14]
Carmelo Ardito, Giuseppe Desolda, Rosa Lanzilotti, Alessio Malizia, Maristella Matera, Paolo Buono, and Antonio Piccinno. 2020. User-defined semantics for the design of IoT systems enabling smart interactive experiences. Personal and Ubiquitous Computing 24, 6 (2020), 781–796.
[15]
Ken Arnold, James Gosling, David Holmes, and David Holmes. 2000. The Java Programming Language. Vol. 2. Addison-Wesley, Reading, MA.
[16]
Jatin Arora, Kartik Mathur, Manvi Goel, Piyush Kumar, Abhijeet Mishra, and Aman Parnami. 2019. Design and evaluation of DIO construction toolkit for co-making shared constructions. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 4 (2019), 1–25.
[17]
Paul Ashley, Satoshi Hada, Günter Karjoth, Calvin Powers, and Matthias Schunter. 2003. Enterprise privacy authorization language (EPAL). IBM Research 30 (2003), 31.
[18]
N. L. Asquith. 2013. Understanding the Role of Verbal and Textual Hostility in Hate Crime Regulation. Interim Report. Violent Crime Directorate, London Metropolitan Police Service, London, England.
[19]
Hala Assal and Sonia Chiasson. 2019. “Think secure from the beginning”: A survey with software developers. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1–13.
[20]
Mehrnaz Ataei, Auriol Degbelo, and Christian Kray. 2018. Privacy theory in practice: Designing a user interface for managing location privacy on mobile devices. Journal of Location Based Services 12, 3-4 (2018), 141–178.
[21]
Hany F. Atlam and Gary B. Wills. 2020. IoT security, privacy, safety and ethics. In Digital Twin Technologies and Smart Cities. Springer, 123–149.
[22]
Jianmin Bai, James Geza Deak, Hua Iv, and Weifeng Shen. 2018. Magnetoresistive gear tooth sensor (Aug. 2018). Patent No. 10,060,941. Filed June 4, 2013. Issued August 28, 2018.
[23]
Susanne Barth, Dan Ionita, and Pieter Hartel. 2022. Understanding online privacy—A systematic review of privacy visualizations and privacy by design guidelines. ACM Computing Surveys 55, 3 (2022), 1–37.
[24]
Florian Bemmann, Maximiliane Windl, Jonas Erbe, Sven Mayer, and Heinrich Hussmann. 2022. The influence of transparency and control on the willingness of data sharing in adaptive mobile apps. Proceedings of the ACM on Human-Computer Interaction 6, MHCI (2022), 1–26.
[25]
Matthias Böhmer, Christian Lander, Sven Gehring, Duncan P. Brumby, and Antonio Krüger. 2014. Interrupted by a phone call: Exploring designs for lowering the impact of call notifications for smartphone users. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 3045–3054.
[26]
Jan O. Borchers. 2008. A pattern approach to interaction design. In Cognition, Communication and Interaction. Springer, 114–131.
[27]
Kelly E. Caine, Celine Y. Zimmerman, Zachary Schall-Zimmerman, William R. Hazlewood, L. Jean Camp, Katherine H. Connelly, Lesa L. Huber, and Kalpana Shankar. 2011. DigiSwitch: A device to allow older adults to monitor and direct the collection and transmission of health information collected at home. Journal of Medical Systems 35, 5 (2011), 1181–1195.
[28]
Ryan Calo. 2011. Against notice skepticism in privacy (and elsewhere). Notre Dame Law Review 87 (2011), 1027.
[29]
Hung Cao and Monica Wachowicz. 2019. An edge-fog-cloud architecture of streaming analytics for Internet of Things applications. Sensors 19, 16 (2019), 3594.
[30]
CCPA. 2020. California Consumer Privacy Act (CCPA) Website Policy: Definitions Under CCPA. Retrieved June 16, 2023 from https://summitstatebank.com/userfiles/files/CCPA%20Website%20Policy%202020.pdf.
[31]
Xin Chen, Heqing Huang, Sencun Zhu, Qing Li, and Quanlong Guan. 2017. SweetDroid: Toward a context-sensitive privacy policy enforcement framework for Android OS. In Proceedings of the 2017 16th Workshop on Privacy in the Electronic Society. 75–86.
[32]
George Chernyshov, Jiajun Chen, Yenchin Lai, Vontin Noriyasu, and Kai Kunze. 2016. Ambient rhythm: Melodic sonification of status information for IoT-enabled devices. In Proceedings of the 6th International Conference on the Internet of Things. 1–6.
[33]
P. Chinnasamy, P. Deepalakshmi, Ashit Kumar Dutta, Jinsang You, and Gyanendra Prasad Joshi. 2021. Ciphertext-policy attribute-based encryption for cloud storage: Toward data privacy and authentication in AI-enabled IoT system. Mathematics 10, 1 (2021), 68.
[34]
Delphine Christin, Martin Michalak, and Matthias Hollick. 2013. Raising user awareness about privacy threats in participatory sensing applications through graphical warnings. In Proceedings of the International Conference on Advances in Mobile Computing and Multimedia. 445–454.
[35]
Delphine Christin, Andreas Reinhardt, Matthias Hollick, and Kai Trumpold. 2012. Exploring user preferences for privacy interfaces in mobile sensing applications. In Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia. 1–10.
[36]
Gordon Chu, Noah Apthorpe, and Nick Feamster. 2018. Security and privacy analyses of Internet of Things children’s toys. IEEE Internet of Things Journal 6, 1 (2018), 978–985.
[37]
Eric S. Chung, Jason I. Hong, James Lin, Madhu K. Prabaker, James A. Landay, and Alan L. Liu. 2004. Development and evaluation of emerging design patterns for ubiquitous computing. In Proceedings of the 5th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques. 233–242.
[38]
Nazli Cila, Iskander Smit, Elisa Giaccardi, and Ben Kröse. 2017. Products as agents: Metaphors for designing the products of the IoT age. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 448–459.
[39]
World Wide Web Consortium. n.d. P3P 1.0: A New Standard in Online Privacy. World Wide Web Consortium.
[40]
Fulvio Corno, Luigi De Russis, and Teodoro Montanaro. 2015. A context and user aware smart notification system. In Proceedings of the 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT’05). IEEE, Los Alamitos, CA, 645–651.
[41]
Lorrie Faith Cranor, Praveen Guduru, and Manjula Arjula. 2006. User interfaces for privacy agents. ACM Transactions on Computer-Human Interaction 13, 2 (2006), 135–178.
[42]
Dylan Curran. 2018. Are your phone camera and microphone spying on you. The Guardian. Retrieved April 14, 2019 from https://www.theguardian.com/commentisfree/2018/apr/06/phone-camera-microphone-spying.
[43]
L. Minh Dang, Kyungbok Min, Hanxiang Wang, Md. Jalil Piran, Cheol Hee Lee, and Hyeonjoon Moon. 2020. Sensor-based and vision-based human activity recognition: A comprehensive survey. Pattern Recognition 108 (2020), 107561.
[44]
André de Lima Salgado, Felipe Silva Dias, João Pedro Rodrigues Mattos, Renata Pontin de Mattos Fortes, and Patrick C. K. Hung. 2019. Smart toys and children’s privacy: Usable privacy policy insights from a card sorting experiment. In Proceedings of the 37th ACM International Conference on the Design of Communication. 1–8.
[45]
DERMAdoctor. n.d. Dermatologist Formulated Skin Care and Skin Health Advice from Dr. Audrey Kunin. Retrieved June 16, 2023 from https://www.dermadoctor.com.
[46]
Lilian Edwards. 2005. Switching Off the Surveillance Society? Legal Regulation of CCTV in the UK. Asser Press.
[47]
Lilian Edwards. 2016. Privacy, security and data protection in smart cities: A critical EU law perspective. European Data Protection Law Review 2 (2016), 28.
[48]
Pardis Emami-Naeini, Henry Dixon, Yuvraj Agarwal, and Lorrie Faith Cranor. 2019. Exploring how privacy and security factor into IoT device purchase behavior. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1–12.
[49]
Bernadette Emsenhuber and Alois Ferscha. 2009. Olfactory interaction zones. In Proceedings of the Conference on Pervasive Computing.
[50]
Stephan Escher, Katrin Etzrodt, Benjamin Weller, Stefan Köpsell, and Thorsten Strufe. 2022. Transparency for bystanders in IoT regarding audiovisual recordings. In Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and Other Affiliated Events (PerCom Workshops’22). IEEE, Los Alamitos, CA, 649–654.
[51]
Chika Eze, Jason R. C. Nurse, and Jassim Happa. 2016. Using visualizations to enhance users’ understanding of app activities on Android devices. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 7, 1 (2016), 39–57.
[52]
Yuanyuan Feng, Yaxing Yao, and Norman Sadeh. 2021. A design space for privacy choices: Towards meaningful privacy control in the Internet of Things. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1–16.
[53]
Maribel Fernández, Jenjira Jaimunk, and Bhavani Thuraisingham. 2018. Graph-based data-collection policies for the Internet of Things. In Proceedings of the 4th Annual Industrial Control System Security Workshop. 9–16.
[54]
Simone Fischer Hübner and Harald Zwingelberg (Eds.). 2010. UI Prototypes: Policy Administration and Presentation—Version 2. PrimeLife.
[55]
Nathaniel Fruchter and Ilaria Liccardi. 2018. Consumer attitudes towards privacy and security in home assistants. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems. 1–6.
[56]
Diego Garcia, M. Beatriz F. Toledo, Miriam A. M. Capretz, David S. Allison, Gordon S. Blair, Paul Grace, and Carlos Flores. 2009. Towards a base ontology for privacy protection in service-oriented architecture. In Proceedings of the 2009 IEEE International Conference on Service-Oriented Computing and Applications (SOCA’09). IEEE, Los Alamitos, CA, 1–8.
[57]
Gartner. 2017. The Internet of Things (IoT)* units installed base by category from 2014 to 2020 (in billions). Statista. Retrieved June 16, 2023 from https://www.statista.com/statistics/370350/internet-of-things-installed-base-by-category/.
[58]
Sven Gehring and Martin Gisch. 2008. The privacy badge revisited—Enhancement of a privacy-awareness user interface for small devices. In Proceedings of the Workshop on Security and Privacy Issues in Mobile Phone Use. 8.
[59]
Ilche Georgievski, Isaac Henderson Johnson Jeyakumar, and Shrilesh Kale. 2021. Designing a system based on robotic assistance for privacy awareness in smart environments. In Proceedings of the 2021 IEEE 12th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON’21). IEEE, Los Alamitos, CA, 0427–0432.
[60]
Taher M. Ghazal, Mohammad Kamrul Hasan, Muhammad Turki Alshurideh, Haitham M. Alzoubi, Munir Ahmad, Syed Shehryar Akbar, Barween Al Kurdi, and Iman A. Akour. 2021. IoT for smart cities: Machine learning approaches in smart healthcare—A review. Future Internet 13, 8 (2021), 218.
[61]
Kambiz Ghazinour, Maryam Majedi, and Ken Barker. 2009. A lattice-based privacy aware access control model. In Proceedings of the 2009 International Conference on Computational Science and Engineering, Vol. 3. IEEE, Los Alamitos, CA, 154–159.
[62]
Kambiz Ghazinour, Maryam Majedi, and Ken Barker. 2009. A model for privacy policy visualization. In Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference, Vol. 2. IEEE, Los Alamitos, CA, 335–340.
[63]
Martin Gisch, Alexander De Luca, and Markus Blanchebarbe. 2007. The privacy badge: A privacy-awareness user interface for small devices. In Proceedings of the 4th International Conference on Mobile Technology, Applications, and Systems and the 1st International Symposium on Computer Human Interaction in Mobile Technology. 583–586.
[64]
Robert W. Gomulkiewicz and Mary L. Williamson. 1996. A brief defense of mass market software license agreements. Rutgers Computer and Technology Law Journal 22 (1996), 335.
[65]
J. L. Gonzalez-Compean, Oscar Telles, Ivan Lopez-Arevalo, Miguel Morales-Sandoval, Victor J. Sosa-Sosa, and Jesus Carretero. 2019. A policy-based containerized filter for secure information sharing in organizational environments. Future Generation Computer Systems 95 (2019), 430–444.
[66]
Google. n.d. Privacy Features of Google Home Mini—Google Store. Retrieved June 16, 2023 from https://store.google.com/gb/product/google_home_mini_security.
[67]
Emily Greene, Patrick Proctor, and David Kotz. 2019. Secure sharing of mHealth data streams through cryptographically-enforced access control. Smart Health 12 (2019), 49–65.
[68]
Kamal Gulati, Raja Sarath Kumar Boddu, Dhiraj Kapila, Sunil L. Bangare, Neeraj Chandnani, and G. Saravanan. 2022. A review paper on wireless sensor network techniques in Internet of Things (IoT). Materials Today: Proceedings 51 (2022), 161–165.
[69]
Bin Guo, Daqing Zhang, Zhiwen Yu, Yunji Liang, Zhu Wang, and Xingshe Zhou. 2013. From the Internet of Things to embedded intelligence. World Wide Web 16, 4 (2013), 399–420.
[70]
Wentao Guo, Jay Rodolitz, and Eleanor Birrell. 2020. Poli-see: An interactive tool for visualizing privacy policies. In Proceedings of the 19th Workshop on Privacy in the Electronic Society. 57–71.
[71]
Rishabh Gupta, Ishu Gupta, Ashutosh Kumar Singh, Deepika Saxena, and Chung-Nan Lee. 2023. An IoT-centric data protection method for preserving security and privacy in cloud. IEEE Systems Journal 17, 2 (2023), 2445–2454.
[72]
Hana Habib, Yixin Zou, Yaxing Yao, Alessandro Acquisti, Lorrie Cranor, Joel Reidenberg, Norman Sadeh, and Florian Schaub. 2021. Toggles, dollar signs, and triangles: How to (in) effectively convey privacy choices with icons and link texts. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1–25.
[73]
Michael Haslgrübler, Peter Fritz, Benedikt Gollan, and Alois Ferscha. 2017. Getting through: Modality selection in a multi-sensor-actuator industrial IoT environment. In Proceedings of the 7th International Conference on the Internet of Things. 1–8.
[74]
Jason Hong. 2017. The privacy landscape of pervasive computing. IEEE Pervasive Computing 16, 3 (2017), 40–48.
[75]
Steven Houben, Connie Golsteijn, Sarah Gallacher, Rose Johnson, Saskia Bakker, Nicolai Marquardt, Licia Capra, and Yvonne Rogers. 2016. Physikit: Data engagement through physical ambient visualizations in the home. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. 1608–1619.
[76]
HowStuffWorks. n.d. How Amazon Echo Works. Retrieved June 16, 2023 from https://electronics.howstuffworks.com/gadgets/high-tech-gadgets/amazon-echo.htm.
[77]
Hai Huang and Kher Hui Ng. 2021. Designing for cultural learning and reflection using IoT serious game approach. Personal and Ubiquitous Computing 25 (2021), 509–524.
[78]
Giovanni Iachello and Gregory D. Abowd. 2008. From privacy methods to a privacy toolbox: Evaluation shows that heuristics are complementary. ACM Transactions on Computer-Human Interaction 15, 2 (2008), 1–30.
[79]
Laurel Jamtgaard. 2003. The P3P Implementation Guide. Internet Education Foundation.
[80]
Jongkil Jay Jeong, Gillian Oliver, Eunsuk Kang, Sadie Creese, and Peter Thomas. 2021. The current state of research on people, culture and cybersecurity. Personal and Ubiquitous Computing 25 (2021), 809–812.
[81]
Bailey Kacsmar, Kyle Tilbury, Miti Mazmudar, and Florian Kerschbaum. 2022. Caring about sharing: User perceptions of multiparty data sharing. In Proceedings of the 31st USENIX Security Symposium (USENIX Security’22). 899–916.
[82]
Keshav Kaushik and Susheela Dahiya. 2018. Security and privacy in IoT based e-business and retail. In Proceedings of the 2018 International Conference on System Modeling and Advancement in Research Trends (SMART’18). IEEE, Los Alamitos, CA, 78–81.
[83]
Patrick Gage Kelley, Joanna Bresee, Lorrie Faith Cranor, and Robert W. Reeder. 2009. A “nutrition label” for privacy. In Proceedings of the 5th Symposium on Usable Privacy and Security. 1–12.
[84]
Patrick Gage Kelley, Lorrie Faith Cranor, and Norman Sadeh. 2013. Privacy as part of the app decision-making process. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 3393–3402.
[85]
Brian W. Kernighan and Dennis M. Ritchie. 1988. The C Programming Language (2nd ed.). Prentice Hall, Englewood Cliffs, NJ.
[86]
Damla Kilic, Andy Crabtree, Glenn McGarry, and Murray Goulden. 2022. The cardboard box study: Understanding collaborative data management in the connected home. Personal and Ubiquitous Computing 26, 3 (2022), 155–176.
[87]
Damla Kilic, Andy Crabtree, Glenn McGarry, and Murray Goulden. 2022. The cardboard box study: Understanding collaborative data management in the connected home. Personal and Ubiquitous Computing 26, 1 (2022), 155–176.
[88]
Robert Kowalski, Sebastian Loehmann, and Doris Hausen. 2013. Cubble: A multi-device hybrid approach supporting communication in long-distance relationships. In Proceedings of the 7th International Conference on Tangible, Embedded, and Embodied Interaction. 201–204.
[89]
Thomas Kubitza, Alexandra Voit, Dominik Weber, and Albrecht Schmidt. 2016. An IoT infrastructure for ubiquitous notifications in intelligent living environments. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct. 1536–1541.
[90]
Aparna Kumari, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar, Michele Maasberg, and Kim-Kwang Raymond Choo. 2018. Multimedia big data computing and Internet of Things applications: A taxonomy and process model. Journal of Network and Computer Applications 124 (2018), 169–195.
[91]
Marc Langheinrich. 2002. A privacy awareness system for ubiquitous computing environments. In Proceedings of the International Conference on Ubiquitous Computing. 237–245.
[92]
Hosub Lee and Alfred Kobsa. 2017. Privacy preference modeling and prediction in a simulated campuswide IoT environment. In Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom’17). IEEE, Los Alamitos, CA, 276–285.
[93]
Hosub Lee and Alfred Kobsa. 2019. Confident privacy decision-making in iot environments. ACM Transactions on Computer-Human Interaction 27, 1 (2019), 1–39.
[94]
Hyunsoo Lee and Uichin Lee. 2022. Toward dynamic consent for privacy-aware pervasive health and well-being: A scoping review and research directions. IEEE Pervasive Computing 21, 4 (2022), 25–32.
[95]
Pedro Giovanni Leon, Blase Ur, Yang Wang, Manya Sleeper, Rebecca Balebako, Richard Shay, Lujo Bauer, Mihai Christodorescu, and Lorrie Faith Cranor. 2013. What matters to users? Factors that affect users’ willingness to share information with online advertisers. In Proceedings of the 9th Symposium on Usable Privacy and Security. 1–12.
[96]
Yucheng Li, Deyuan Chen, Tianshi Li, Yuvraj Agarwal, Lorrie Faith Cranor, and Jason I. Hong. 2022. Understanding iOS privacy nutrition labels: An exploratory large-scale analysis of app store data. In Proceedings of the CHI Conference on Human Factors in Computing Systems Extended Abstracts. 1–7.
[97]
Jie Lin, Wei Yu, Nan Zhang, Xinyu Yang, Hanlin Zhang, and Wei Zhao. 2017. A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal 4, 5 (2017), 1125–1142.
[98]
Heather Richter Lipford, Madiha Tabassum, Paritosh Bahirat, Yaxing Yao, and Bart P. Knijnenburg. 2022. Privacy and the Internet of Things. In Modern Socio-Technical Perspectives on Privacy. Springer, Cham, Switzerland, 233–264.
[99]
Linyuan Liu, Haibin Zhu, Shenglei Chen, and Zhiqiu Huang. 2022. Privacy regulation aware service selection for multi-provision cloud service composition. Future Generation Computer Systems 126 (2022), 263–278.
[100]
Tom Lodge and Andy Crabtree. 2019. Privacy engineering for domestic IoT: Enabling due diligence. Sensors 19, 20 (2019), 4380.
[101]
Richard K. Lomotey, Sandra Kumi, and Ralph Deters. 2022. Data trusts as a service: Providing a platform for multi-party data sharing. International Journal of Information Management Data Insights 2, 1 (2022), 100075.
[102]
Michal Luria, Guy Hoffman, and Oren Zuckerman. 2017. Comparing social robot, screen and voice interfaces for smart-home control. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 580–628.
[103]
Ashok Marannan, Manoj Nagarajan, and Priyanka Nayek. n.d. Study on Software Agreement (EULA). University of Wisconsin–Madison.
[104]
Michael Matscheko, Alois Ferscha, Andreas Riener, and Manuel Lehner. 2010. Tactor placement in wrist worn wearables. In Proceedings of the International Symposium on Wearable Computers (ISWC’10). IEEE, Los Alamitos, CA, 1–8.
[105]
Dawn McKinnon and Clara Turp. 2022. Are library vendors doing enough to protect users? A content analysis of major ILS privacy policies. Journal of Academic Librarianship 48, 2 (2022), 102505.
[106]
Vikram Mehta, Arosha K. Bandara, Blaine A. Price, and Bashar Nuseibeh. 2016. Privacy itch and scratch: On body privacy warnings and controls. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. 2417–2424.
[107]
Philip Menard and Gregory J. Bott. 2020. Analyzing IOT users’ mobile device privacy concerns: Extracting privacy permissions using a disclosure experiment. Computers & Security 95 (2020), 101856.
[108]
Nazila Gol Mohammadi, Julia Pampus, and Maritta Heisel. 2019. Pattern-based incorporation of privacy preferences into privacy policies: Negotiating the conflicting needs of service providers and end-users. In Proceedings of the 24th European Conference on Pattern Languages of Programs. 1–12.
[109]
Juan A. Muñoz-Cristóbal, María Jesús Rodríguez-Triana, Vanesa Gallego-Lema, Higinio F. Arribas-Cubero, Juan I. Asensio-Pérez, and Alejandra Martínez-Monés. 2018. Monitoring for awareness and reflection in ubiquitous learning environments. International Journal of Human–Computer Interaction 34, 2 (2018), 146–165.
[110]
Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman Sadeh. 2017. Privacy expectations and preferences in an IoT world. In Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS’17). 399–412.
[111]
Ricardo Neisse, Gianmarco Baldini, Gary Steri, Yutaka Miyake, Shinsaku Kiyomoto, and Abdur Rahim Biswas. 2015. An agent-based framework for informed consent in the Internet of Things. In Proceedings of the 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT’15). IEEE, Los Alamitos, CA, 789–794.
[112]
CBS NEWS. 2019. Ring security system program with law enforcement raises privacy concerns. CBS NEWS. Retrieved June 16, 2023 from https://www.cbsnews.com/news/ring-security-system-program-with-law-enforcement-raises-privacy-concerns/.
[113]
Karin Niemantsverdriet, Harm Van Essen, Minna Pakanen, and Berry Eggen. 2019. Designing for awareness in interactions with shared systems: The DASS framework. ACM Transactions on Computer-Human Interaction 26, 6 (2019), 1–41.
[114]
Midas Nouwens, Ilaria Liccardi, Michael Veale, David Karger, and Lalana Kagal. 2020. Dark patterns after the GDPR: Scraping consent pop-ups and demonstrating their influence. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–13.
[115]
Naushin Nower. 2019. Privacy in IoT: Expectations, causes of concerns, and reasons for concern mitigation. International Journal of Computer Applications 975 (2019), 8887.
[116]
Isaac O. Olalere, Mendon Dewa, and Bakhe Nleya. 2018. Remote condition monitoring of elevator’s vibration and acoustics parameters for optimised maintenance using IoT technology. In Proceedings of the 2018 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE’18). IEEE, Los Alamitos, CA, 1–4.
[117]
Alessandro Oltramari, Dhivya Piraviperumal, Florian Schaub, Shomir Wilson, Sushain Cherivirala, Thomas B. Norton, N. Cameron Russell, Peter Story, Joel Reidenberg, and Norman Sadeh. 2018. PrivOnto: A semantic framework for the analysis of privacy policies. Semantic Web 9, 2 (2018), 185–203.
[118]
Emmanuel Onu, Michael Mireku Kwakye, and Ken Barker. 2020. Contextual privacy policy modeling in IoT. In Proceedings of the 2020 IEEE International Conference on Dependable, Autonomic, and Secure Computing, the International Conference on Pervasive Intelligence and Computing, the International Conference on Cloud and Big Data Computing, and the International Conference on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech’20). IEEE, Los Alamitos, CA, 94–102.
[119]
Anna-Marie Ortloff, Maximiliane Windl, Valentin Schwind, and Niels Henze. 2020. Implementation and in situ assessment of contextual privacy policies. In Proceedings of the 2020 ACM Designing Interactive Systems Conference. 1765–1778.
[120]
Kamalendu Pal and Ansar-Ul-Haque Yasar. 2020. Internet of things and blockchain technology in apparel manufacturing supply chain data management. Procedia Computer Science 170 (2020), 450–457.
[121]
Abelardo Pardo and George Siemens. 2014. Ethical and privacy principles for learning analytics. British Journal of Educational Technology 45, 3 (2014), 438–450.
[122]
Raúl Pardo and Daniel Le Métayer. 2019. Analysis of privacy policies to enhance informed consent. In Proceedings of the IFIP Annual Conference on Data and Applications Security and Privacy. 177–198.
[123]
Ioannis Paspatis, Aggeliki Tsohou, and Spyros Kokolakis. 2020. AppAware: A policy visualization model for mobile applications. Information & Computer Security 28, 1 (2020), 116–132.
[124]
Anand Paul and Rathinaraja Jeyaraj. 2019. Internet of Things: A primer. Human Behavior and Emerging Technologies 1, 1 (2019), 37–47.
[125]
James Pierce, Sarah Fox, Nick Merrill, Richmond Wong, and Carl DiSalvo. 2018. An interface without a user: An exploratory design study of online privacy policies and digital legalese. In Proceedings of the 2018 Designing Interactive Systems Conference. 1345–1358.
[126]
Zachary Pousman and John Stasko. 2006. A taxonomy of ambient information systems: four patterns of design. In Proceedings of the Working Conference on Advanced Visual Interfaces. 67–74.
[127]
Jing Qiu, Zhihong Tian, Chunlai Du, Qi Zuo, Shen Su, and Binxing Fang. 2020. A survey on access control in the age of Internet of Things. IEEE Internet of Things Journal 7, 6 (2020), 4682–4696.
[128]
Joseph Reagle and Lorrie Faith Cranor. 1999. The platform for privacy preferences. Communications of the ACM 42, 2 (1999), 48–55.
[129]
European Union. 2016. Regulation (EU) 2016/679 of the European Parliament and of the Council. Official Journal of the European Union 679 (2016), 1–88.
[130]
Daniel Reinhardt, Johannes Borchard, and Jörn Hurtienne. 2021. Visual interactive privacy policy: The better choice? In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1–12.
[131]
David Reinsel, John Gantz, and John Rydning. 2018. The digitization of the world from edge to core. Seagate Retrieved June 16, 2023 from https://www.seagate.com/files/www-content/our-story/trends/files/idc-seagate-dataage-whitepaper.pdf.
[132]
Ring. n.d. Video Doorbell—Ring. Retrieved June 16, 2023 from https://en-uk.ring.com.
[133]
Mohammad Hosein Panahi Rizi and Seyed Amin Hoseini Seno. 2022. A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city. Internet of Things 20 (2022), 100584.
[134]
Lea Dujić Rodić and Andrina Granić. 2022. Tangible interfaces in early years’ education: A systematic review. Personal and Ubiquitous Computing 26 (2022), 39–77.
[135]
Marco C. Rozendaal, Boudewijn Boon, and Victor Kaptelinin. 2019. Objects with Intent: Designing everyday things as collaborative partners. ACM Transactions on Computer-Human Interaction 26, 4 (2019), Article 26, 33 pages.
[136]
Norman Sadeh, Jason Hong, Lorrie Cranor, Ian Fette, Patrick Kelley, Madhu Prabaker, and Jinghai Rao. 2009. Understanding and capturing people’s privacy policies in a mobile social networking application. Personal and Ubiquitous Computing 13, 6 (2009), 401–412.
[137]
Kirti Sundar Sahu, Arlene Oetomo, and Plinio Pelegrini Morita. 2020. Enabling remote patient monitoring through the use of smart thermostat data in Canada: Exploratory study. JMIR mHealth and uHealth 8, 11 (2020), e21016.
[138]
Florian Schaub, Rebecca Balebako, and Lorrie Faith Cranor. 2017. Designing effective privacy notices and controls. IEEE Internet Computing 21, 3 (2017), 70–77.
[139]
Florian Schaub, Rebecca Balebako, Adam L. Durity, and Lorrie Faith Cranor. 2015. A design space for effective privacy notices. In Proceedings of the 11th Symposium on Usable Privacy and Security (SOUPS’15). 1–17.
[140]
Marija Schufrin, Steven Lamarr Reynolds, Arjan Kuijper, and Jorn Kohlhammer. 2020. A visualization interface to improve the transparency of collected personal data on the Internet. IEEE Transactions on Visualization and Computer Graphics 27, 2 (2020), 1840–1849.
[141]
Marcello Paolo Scipioni and Marc Langheinrich. 2012. To share or not to share? An activity-centered approach for designing usable location sharing tools. In Proceedings of the Workshop on Usable Privacy and Security for Mobile Devices (U-PriSM’12).
[142]
Seedstudio. n.d. Sensors—Seeed Studio Electronics. Retrieved June 16, 2023 from https://www.seeedstudio.com/category/Sensor-for-Grove-c-24.html.
[143]
Abi Sen and Adnan Ahmed. 2022. A comprehensive privacy and security framework for dynamic protection (CPSF). International Journal of Information Technology 14 (2022), 2477–2485.
[144]
William Seymour, Martin J. Kraemer, Reuben Binns, and Max Van Kleek. 2020. Informing the design of privacy-empowering tools for the connected home. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–14.
[145]
Tanusree Sharma, Hunter A. Dyer, and Masooda Bashir. 2021. Enabling user-centered privacy controls for mobile applications: Covid-19 perspective. ACM Transactions on Internet Technology 21, 1 (2021), 1–24.
[146]
Carl Sherrick. 1991. Vibrotactile pattern perception: Some findings and applications. In The Psychology of Touch. Psychology Press, London, England, 189–218.
[147]
Amazon. Somfy 2401507 Indoor Camera, Full HD Security Camera for Home Security Systems, Smart Device with Integrated App and Simple Installation: Amazon.co.uk: DIY & Tools. Retrieved June 16, 2023 from https://www.amazon.co.uk/SOMFY-Home-Indoor-Security-Camera/dp/B07D7JKSMJ?ref_=ast_sto_dp.
[148]
Joseph Steinberg. 2014. These devices may be spying on you (even in your own home). Forbes. Retrieved June 16, 2023 from https://www.forbes.com/sites/josephsteinberg/2014/01/27/these-devices-may-be-spying-on-you-even-in-your-own-home/?sh=462c76fab859.
[149]
Yunchuan Sun, Houbing Song, Antonio J. Jara, and Rongfang Bie. 2016. Internet of Things and big data analytics for smart and connected communities. IEEE Access 4 (2016), 766–773.
[150]
Bob Susnjara. 2020. Fighting crime or invading privacy? Police deals with Ring video doorbell have advocates and critics. Daily Herald Media Group. Retrieved June 16, 2023 from https://www.dailyherald.com/news/20200209/fighting-crime-or-invading-privacy-police-deals-with-ring-video-doorbell-have-advocates-and-critics.
[151]
Vamshidhar Thonti. 2018. Different types of sensors and their working.Circuit Digest. Retrieved June 16, 2023 from https://circuitdigest.com/tutorial/different-types-of-sensors-and-their-working.
[152]
Chen Tian, Yazhe Wang, Peng Liu, Yu Wang, Ruirui Dai, Anyuan Zhou, and Zhen Xu. 2020. Prihook: Differentiated context-aware hook placement for different owners’ smartphones. In Proceedings of the 2020 IEEE 19th International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom’20). IEEE, Los Alamitos, CA, 615–622.
[153]
Bibi Van den Berg and Simone Van der Hof. 2012. What happens to my data? A novel approach to informing users of data processing practices. First Monday 17, 7 (2012).
[154]
Max Van Kleek, William Seymour, Reuben Binns, Jun Zhao, Daniel Karandikar, and Nigel Shadbolt. 2019. IoT refine: Making smart home devices accountable for their data harvesting practices. In Proceedings of Living in the Internet of Things (IoT’19).
[155]
Guido Van Rossum. 2007. Python programming language. In Proceedings of the USENIX Annual Technical Conference, Vol. 41. 36.
[156]
Idalides J. Vergara-Laurens, Luis G. Jaimes, and Miguel A. Labrador. 2016. Privacy-preserving mechanisms for crowdsensing: Survey and research challenges. IEEE Internet of Things Journal 4, 4 (2016), 855–869.
[157]
Michael Wilde, Mihael Hategan, Justin M. Wozniak, Ben Clifford, Daniel S. Katz, and Ian Foster. 2011. Swift: A language for distributed parallel scripting. Parallel Computing 37, 9 (2011), 633–652.
[158]
Daniel M. Wolpert, Jörn Diedrichsen, and J. Randall Flanagan. 2011. Principles of sensorimotor learning. Nature Reviews Neuroscience 12, 12 (2011), 739–751.
[159]
Longfei Wu, Xiaojiang Du, Mohsen Guizani, and Amr Mohamed. 2017. Access control schemes for implantable medical devices: A survey. IEEE Internet of Things Journal 4, 5 (2017), 1272–1283.
[160]
Yuchen Yang, Longfei Wu, Guisheng Yin, Lijie Li, and Hongbin Zhao. 2017. A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal 4, 5 (2017), 1250–1258.
[161]
Razieh Nokhbeh Zaeem, Rachel L. German, and K. Suzanne Barber. 2018. PrivacyCheck: Automatic summarization of privacy policies using data mining. ACM Transactions on Internet Technology 18, 4 (2018), 1–18.
[162]
Naqliyah Zainuddin, Maslina Daud, Sabariah Ahmad, Mayasarah Maslizan, and Syafiqa Anneisa Leng Abdullah. 2021. A study on privacy issues in Internet of Things (IoT). In Proceedings of the 2021 IEEE 5th International Conference on Cryptography, Security, and Privacy (CSP’21). IEEE, Los Alamitos, CA, 96–100.
[163]
Arkady Zaslavsky, Charith Perera, and Dimitrios Georgakopoulos. 2013. Sensing as a service and big data. arXiv preprint arXiv:1301.0159 (2013).
[164]
Igor Zavalyshyn, Nuno Santos, Ramin Sadre, and Axel Legay. 2020. My house, my rules: A private-by-design smart home platform. In Proceedings of the 17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services(MobiQuitous’20). 273–282.
[165]
Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. 2018. User perceptions of smart home IoT privacy. Proceedings of the ACM on Human-Computer Interaction 2, CSCW (2018), 1–20.
[166]
Xu Zheng and Zhipeng Cai. 2020. Privacy-preserved data sharing towards multiple parties in industrial IoTs. IEEE Journal on Selected Areas in Communications 38, 5 (2020), 968–979.
[167]
Wei Zhou, Yan Jia, Anni Peng, Yuqing Zhang, and Peng Liu. 2018. The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved. IEEE Internet of Things Journal 6, 2 (2018), 1606–1616.
[168]
Jan Henrik Ziegeldorf, Oscar Garcia Morchon, and Klaus Wehrle. 2014. Privacy in the Internet of Things: Threats and challenges. Security and Communication Networks 7, 12 (2014), 2728–2742.
[169]
Sebastian Zimmeck and Steven M. Bellovin. 2014. Privee: An architecture for automatically analyzing web privacy policies. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security’14). 1–16.
[170]
Sebastian Zimmeck, Rafael Goldstein, and David Baraka. 2021. PrivacyFlash Pro: Automating privacy policy generation for mobile apps. In Proceedings of the 2021 Network and Distributed System Security Symposium (NDSS’21).
[171]
John Zimmerman. 2009. Designing for the self: Making products that help people become the person they desire to be. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 395–404.

Cited By

View all
  • (2024)Motivating Users to Attend to Privacy: A Theory-Driven Design StudyProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661544(258-275)Online publication date: 1-Jul-2024
  • (2024)Designing Interactive Privacy Labels for Advanced Smart Home Device Configuration OptionsProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661527(3372-3388)Online publication date: 1-Jul-2024
  • (2024)An Empathy-Based Sandbox Approach to Bridge the Privacy Gap among Attitudes, Goals, Knowledge, and BehaviorsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642363(1-28)Online publication date: 11-May-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet of Things
ACM Transactions on Internet of Things  Volume 4, Issue 3
August 2023
127 pages
EISSN:2577-6207
DOI:10.1145/3604627
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 21 September 2023
Online AM: 07 June 2023
Accepted: 09 May 2023
Revised: 18 January 2023
Received: 10 June 2022
Published in TIOT Volume 4, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Internet of Things
  2. sensors
  3. privacy awareness
  4. notification methods
  5. privacy management
  6. privacy control
  7. choice
  8. interaction
  9. visualization

Qualifiers

  • Survey

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)405
  • Downloads (Last 6 weeks)32
Reflects downloads up to 28 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Motivating Users to Attend to Privacy: A Theory-Driven Design StudyProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661544(258-275)Online publication date: 1-Jul-2024
  • (2024)Designing Interactive Privacy Labels for Advanced Smart Home Device Configuration OptionsProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661527(3372-3388)Online publication date: 1-Jul-2024
  • (2024)An Empathy-Based Sandbox Approach to Bridge the Privacy Gap among Attitudes, Goals, Knowledge, and BehaviorsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642363(1-28)Online publication date: 11-May-2024

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media