Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Public Access

User Perceptions of Smart Home IoT Privacy

Published: 01 November 2018 Publication History
  • Get Citation Alerts
  • Abstract

    Smart home Internet of Things (IoT) devices are rapidly increasing in popularity, with more households including Internet-connected devices that continuously monitor user activities. In this study, we conduct eleven semi-structured interviews with smart home owners, investigating their reasons for purchasing IoT devices, perceptions of smart home privacy risks, and actions taken to protect their privacy from those external to the home who create, manage, track, or regulate IoT devices and/or their data. We note several recurring themes. First, users' desires for convenience and connectedness dictate their privacy-related behaviors for dealing with external entities, such as device manufacturers, Internet Service Providers, governments, and advertisers. Second, user opinions about external entities collecting smart home data depend on perceived benefit from these entities. Third, users trust IoT device manufacturers to protect their privacy but do not verify that these protections are in place. Fourth, users are unaware of privacy risks from inference algorithms operating on data from non-audio/visual devices. These findings motivate several recommendations for device designers, researchers, and industry standards to better match device privacy features to the expectations and preferences of smart home owners.

    References

    [1]
    Alessandro Acquisti and Jens Grossklags. 2005. Privacy and rationality in individual decision making. IEEE security & privacy, Vol. 3, 1 (2005), 26--33.
    [2]
    Noah Apthorpe, Dillon Reisman, and Nick Feamster. 2016. A smart home is no castle: privacy vulnerabilities of encrypted IoT traffic. Workshop on Data and Algorithmic Transparency (2016).
    [3]
    Noah Apthorpe, Yan Shvartzshnaider, Arunesh Mathur, Dillon Reisman, and Nick Feamster. 2018. Discovering Smart Home Internet of Things Privacy Norms Using Contextual Integrity. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (2018).
    [4]
    Abdullahi Arabo, Ian Brown, and Fadi El-Moussa. 2012. Privacy in the age of mobility and smart devices in smart homes. In Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom). IEEE, 819--826.
    [5]
    Jef Ausloos, Els Kindt, Eva Lievens, Peggy Valcke, and Jos Dumortier. 2013. Guidelines for privacy-friendly default settings. ICRI Research Paper No. 12|2013 (2013).
    [6]
    Nellie Bowles. 2018. Thermostats, Locks and Lights: Digital Tools of Domestic Abuse. https://www.nytimes.com/2018/06/23/technology/smart-home-devices-domestic-abuse.html. The New York Times (23 June 2018).
    [7]
    AJ Brush, Bongshin Lee, Ratul Mahajan, Sharad Agarwal, Stefan Saroiu, and Colin Dixon. 2011. Home automation in the wild: challenges and opportunities. In proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2115--2124.
    [8]
    Joseph Bugeja, Andreas Jacobsson, and Paul Davidsson. 2016. On Privacy and Security Challenges in Smart Connected Homes. In Intelligence and Security Informatics Conference (EISIC), 2016 European. IEEE, 172--175.
    [9]
    Barbara Carminati, Pietro Colombo, Elena Ferrari, and Gokhan Sagirlar. 2016. Enhancing user control on personal data usage in internet of things ecosystems. In Services Computing (SCC), 2016 IEEE International Conference on. IEEE, 291--298.
    [10]
    Deborah Chambers. 2012. A sociology of family life .Polity.
    [11]
    Marshini Chetty, Ja-Young Sung, and Rebecca E Grinter. 2007. How smart homes learn: The evolution of the networked home and household. In International Conference on Ubiquitous Computing. Springer, 127--144.
    [12]
    Eun Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly Harrison, and Julie A Kientz. 2011. Living in a glass house: a survey of private moments in the home. In Proceedings of the 13th international conference on Ubiquitous computing. ACM, 41--44.
    [13]
    Mauro Conti, Michele Nati, Enrico Rotundo, and Riccardo Spolaor. 2016. Mind The Plug! Laptop-User Recognition Through Power Consumption. In Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security. ACM, 37--44.
    [14]
    George Demiris, Brian K Hensel, Marjorie Skubic, and Marilyn Rantz. 2008. Senior residents' perceived need of and preferences for “smart home” sensor technologies. International journal of technology assessment in health care, Vol. 24, 1 (2008), 120--124.
    [15]
    Lina Dencik and Jonathan Cable. 2017. The advent of surveillance realism: Public opinion and activist responses to the Snowden leaks. International Journal of Communication, Vol. 11 (2017), 763--781.
    [16]
    Serge Egelman. 2009. Trust me: Design patterns for constructing trustworthy trust indicators. Technical Report. Carnegie-Mellon University School of Computer Science.
    [17]
    Serge Egelman, Lorrie Faith Cranor, and Jason Hong. 2008. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1065--1074.
    [18]
    Murray Goulden, Peter Tolmie, Richard Mortier, Tom Lodge, Anna-Kaisa Pietilainen, and Renata Teixeira. 2018. Living with interpersonal data: observability and accountability in the age of pervasive ICT. New Media & Society, Vol. 20, 4 (2018), 1580--1599.
    [19]
    Glenn Greenwald. 2013. NSA collecting phone records of millions of Verizon customers daily. The Guardian, Vol. 6, 06 (2013), 2013.
    [20]
    Glenn Greenwald and Ewen MacAskill. 2013. NSA Prism program taps into user data of Apple, Google and others. The Guardian, Vol. 7, 6 (2013), 1--43.
    [21]
    Broadband Internet Technical Advisory Group. 2016. Internet of Things (IoT) Security and Privacy Recommendations. Technical Report.
    [22]
    Consumers International. 2017. Testing our trust: consumers and the Internet of Things 2017 review. https://www.consumersinternational.org/media/154746/iot2017review-2nded.pdf .
    [23]
    Andreas Jacobsson and Paul Davidsson. 2015. Towards a model of privacy and security for smart homes. In Internet of Things (WF-IoT), 2015 IEEE 2nd World Forum on. IEEE, 727--732.
    [24]
    A-Reum Jung. 2017. The influence of perceived ad relevance on social media advertising: An empirical examination of a mediating role of privacy concern. Computers in Human Behavior, Vol. 70 (2017), 303--309.
    [25]
    Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. “My data just goes everywhere:” user mental models of the internet and implications for privacy and security. In Symposium on Usable Privacy and Security (SOUPS). USENIX Association Berkeley, CA, 39--52.
    [26]
    Johannes Knoll. 2016. Advertising in social media: a review of empirical evidence. International Journal of Advertising, Vol. 35, 2 (2016), 266--300.
    [27]
    Hosub Lee and Alfred Kobsa. 2016. Understanding user privacy in Internet of Things environments. In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, 407--412.
    [28]
    Jialiu Lin, Bin Liu, Norman Sadeh, and Jason I Hong. 2014. Modeling users' mobile app privacy preferences: Restoring usability in a sea of permission settings. In Symposium on Usable Privacy and Security (SOUPS) .
    [29]
    Dominique Machuletz, Henrik Sendt, Stefan Laube, and Rainer Böhme. 2016. Users protect their privacy if they can: Determinants of webcam covering behavior. In Proceedings of the European Workshop on Usable Security (EuroUSEC'16). Internet Society, Reston, VA, USA .
    [30]
    Michelle Madejski, Maritza Johnson, and Steven M Bellovin. 2012. A study of privacy settings errors in an online social network. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on. IEEE, 340--345.
    [31]
    Kirsten Martin and Helen Nissenbaum. 2016. Measuring privacy: an empirical test using context to expose confounding variables. Colum. Sci. & Tech. L. Rev., Vol. 18 (2016), 176.
    [32]
    Kelly D Martin and Patrick E Murphy. 2017. The role of data privacy in marketing. Journal of the Academy of Marketing Science, Vol. 45, 2 (2017), 135--155.
    [33]
    Simon Mayer, Yassin N Hassan, and Gábor Sörös. 2014. A magic lens for revealing device interactions in smart environments. In SIGGRAPH Asia 2014 Mobile Graphics and Interactive Applications. ACM, 9.
    [34]
    Michelle L Mazurek, JP Arsenault, Joanna Bresee, Nitin Gupta, Iulia Ion, Christina Johns, Daniel Lee, Yuan Liang, Jenny Olsen, Brandon Salmon, et almbox. 2010. Access control for home data sharing: Attitudes, needs and practices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 645--654.
    [35]
    Faith McCreary, Alexandra Zafiroglu, and Heather Patterson. 2016. The contextual complexity of privacy in smart homes and smart buildings. In International Conference on HCI in Business, Government and Organizations. Springer, 67--78.
    [36]
    Emily McReynolds, Sarah Hubbard, Timothy Lau, Aditya Saraf, Maya Cakmak, and Franziska Roesner. 2017. Toys that listen: A study of parents, children, and internet-connected toys. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 5197--5207.
    [37]
    Andrés Molina-Markham, Prashant Shenoy, Kevin Fu, Emmanuel Cecchet, and David Irwin. 2010. Private memoirs of a smart meter. In Proceedings of the 2nd ACM workshop on embedded sensing systems for energy-efficiency in building. ACM, 61--66.
    [38]
    Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Cranor, and Norman Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. In Symposium on Usable Privacy and Security (SOUPS) .
    [39]
    Johannes Obermaier and Martin Hutle. 2016. Analyzing the security and privacy of cloud-based video surveillance systems. In Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security. ACM, 22--28.
    [40]
    Aafaf Ouaddah, Hajar Mousannif, Anas Abou Elkalam, and Abdellah Ait Ouahman. 2017. Access control in the Internet of things: big challenges and new opportunities. Computer Networks, Vol. 112 (2017), 237--262.
    [41]
    Charith Perera, Ciaran McCormick, Arosha K Bandara, Blaine A Price, and Bashar Nuseibeh. 2016. Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms. In Proceedings of the 6th International Conference on the Internet of Things. ACM, 83--92.
    [42]
    Rebecca S Portnoff, Linda N Lee, Serge Egelman, Pratyush Mishra, Derek Leung, and David Wagner. 2015. Somebody's watching me?: Assessing the effectiveness of webcam indicator lights. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 1649--1658.
    [43]
    Georg Regal, Elke Mattheiss, Marc Busch, and Manfred Tscheligi. 2016. Insights into Internet Privacy for Visually Impaired and Blind People. In International Conference on Computers Helping People with Special Needs. Springer, 231--238.
    [44]
    Everett M Rogers. 2010. Diffusion of innovations .Simon and Schuster.
    [45]
    Jan H Schumann, Florian von Wangenheim, and Nicole Groene. 2014. Targeted online advertising: Using reciprocity appeals to increase acceptance among users of free web services. Journal of Marketing, Vol. 78, 1 (2014), 59--75.
    [46]
    Irving Seidman. 2013. Interviewing as qualitative research: A guide for researchers in education and the social sciences .Teachers college press.
    [47]
    Pan Shi, Heng Xu, and Xiaolong Luke Zhang. 2011. Informing security indicator design in web browsers. In Proceedings of the 2011 iConference. ACM, 569--575.
    [48]
    Anna Kornfeld Simpson, Franziska Roesner, and Tadayoshi Kohno. 2017. Securing vulnerable home IoT devices with an in-hub security manager. In Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on. IEEE, 551--556.
    [49]
    Vijay Sivaraman, Hassan Habibi Gharakheili, Arun Vishwanath, Roksana Boreli, and Olivier Mehani. 2015. Network-level security and privacy control for smart-home IoT devices. In Wireless and Mobile Computing, Networking and Communications (WiMob), 2015 IEEE 11th International Conference on. IEEE, 163--167.
    [50]
    Vijay Srinivasan, John Stankovic, and Kamin Whitehouse. 2008. Protecting your daily in-home activity information from a wireless snooping attack. In Proceedings of the 10th international conference on Ubiquitous computing. ACM, 202--211.
    [51]
    Murray A Straus, Richard J Gelles, and Suzanne K Steinmetz. 2017. Behind closed doors: Violence in the American family .Routledge.
    [52]
    Peter Tolmie, Andy Crabtree, Tom Rodden, James Colley, and Ewa Luger. 2016. “This has to be the cats”: Personal Data Legibility in Networked Sensing Systems. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM, 491--502.
    [53]
    Daphne Townsend, Frank Knoefel, and Rafik Goubran. 2011. Privacy versus autonomy: a tradeoff model for smart home monitoring technologies. In Engineering in Medicine and Biology Society, EMBC, 2011 Annual International Conference of the IEEE. IEEE, 4749--4752.
    [54]
    Catherine E Tucker. 2014. Social networks, personalized advertising, and privacy controls. Journal of Marketing Research, Vol. 51, 5 (2014), 546--562.
    [55]
    Joseph Turow, Michael Hennessy, Nora Draper, Ope Akanbi, and Diami Virgilio. 2018. Divided We Feel: Partisan Politics Drive American's Emotions Regarding Surveillance of Low-Income Populations. (2018).
    [56]
    Emmanuel Sebastian Udoh and Abdulwahab Alkharashi. 2016. Privacy risk awareness and the behavior of smartwatch users: A case study of Indiana University students. In Future Technologies Conference (FTC). IEEE, 926--931.
    [57]
    Daisuke Wakabayashi. 2018. California Passes Sweeping Law to Protect Online Privacy. https://www.nytimes.com/2018/06/28/technology/california-online-privacy-law.html. The New York Times (28 June 2018).
    [58]
    R Wang. 2013. June 10. Beware trading privacy for convenience. http://blogs.hbr.org/2013/06/beware-tradingprivacy-for-con. Harvard Business Review (2013).
    [59]
    Meredydd Williams, Jason RC Nurse, and Sadie Creese. 2016. The perfect storm: The privacy paradox and the Internet-of-Things. In Availability, Reliability and Security (ARES), 2016 11th International Conference on. IEEE, 644--652.
    [60]
    Jong-bum Woo and Youn-kyung Lim. 2015. User experience in do-it-yourself-style smart homes. In Proceedings of the 2015 ACM international joint conference on pervasive and ubiquitous computing. ACM, 779--790.
    [61]
    Allison Woodruff, Sally Augustin, and Brooke Foucault. 2007. Sabbath day home automation: it's like mixing technology and religion. In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, 527--536.
    [62]
    Peter Worthy, Ben Matthews, and Stephen Viller. 2016. Trust me: doubts and concerns living with the internet of things. In Proceedings of the 2016 ACM Conference on Designing Interactive Systems. ACM, 427--434.
    [63]
    Jie Wu, Jinglan Liu, Xiaobo Sharon Hu, and Yiyu Shi. 2016. Privacy protection via appliance scheduling in smart homes. In Computer-Aided Design (ICCAD), 2016 IEEE/ACM International Conference on. IEEE, 1--6.
    [64]
    Rayoung Yang and Mark W Newman. 2013. Learning from a learning thermostat: lessons for intelligent systems for the home. In Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing. ACM, 93--102.
    [65]
    Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End user security & privacy concerns with smart homes. In Symposium on Usable Privacy and Security (SOUPS) .
    [66]
    Yu-Qian Zhu and Jung-Hua Chang. 2016. The key role of relevance in personalized advertisement: Examining its impact on perceptions of privacy invasion, self-awareness, and continuous use intentions. Computers in Human Behavior, Vol. 65 (2016), 442--447.

    Cited By

    View all
    • (2024)Smart Homes as Catalysts for Sustainable Consumption: A Digital Economy PerspectiveSustainability10.3390/su1611467616:11(4676)Online publication date: 30-May-2024
    • (2024)A Systematic Review on Privacy-Aware IoT Personal Data StoresSensors10.3390/s2407219724:7(2197)Online publication date: 29-Mar-2024
    • (2024)Evaluating the integration of traditional gong methods in smart home environment for the recovery of health functions of stroke patientsJournal of Intelligent & Fuzzy Systems10.3233/JIFS-238267(1-12)Online publication date: 7-May-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Human-Computer Interaction
    Proceedings of the ACM on Human-Computer Interaction  Volume 2, Issue CSCW
    November 2018
    4104 pages
    EISSN:2573-0142
    DOI:10.1145/3290265
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 November 2018
    Published in PACMHCI Volume 2, Issue CSCW

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. internet of things
    2. privacy
    3. smart home
    4. user interviews

    Qualifiers

    • Research-article

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2,482
    • Downloads (Last 6 weeks)209
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Smart Homes as Catalysts for Sustainable Consumption: A Digital Economy PerspectiveSustainability10.3390/su1611467616:11(4676)Online publication date: 30-May-2024
    • (2024)A Systematic Review on Privacy-Aware IoT Personal Data StoresSensors10.3390/s2407219724:7(2197)Online publication date: 29-Mar-2024
    • (2024)Evaluating the integration of traditional gong methods in smart home environment for the recovery of health functions of stroke patientsJournal of Intelligent & Fuzzy Systems10.3233/JIFS-238267(1-12)Online publication date: 7-May-2024
    • (2024)Privacy Barriers in Health Monitoring: Scoping ReviewJMIR Nursing10.2196/535927(e53592)Online publication date: 9-May-2024
    • (2024)Technology, Risk, Artificial Intelligence Acceptance, and the Adoption of Smart DevicesSSRN Electronic Journal10.2139/ssrn.4756845Online publication date: 2024
    • (2024)The impact of Technology on Crime Detection and PreventionSSRN Electronic Journal10.2139/ssrn.4734637Online publication date: 2024
    • (2024)Manual, Hybrid, and Automatic Privacy Covers for Smart Home CamerasProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661569(3453-3470)Online publication date: 1-Jul-2024
    • (2024)Designing Interactive Privacy Labels for Advanced Smart Home Device Configuration OptionsProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661527(3372-3388)Online publication date: 1-Jul-2024
    • (2024)Understanding Perceived Utility and Comfort of In-Home General-Purpose Sensing through Progressive ExposureProceedings of the ACM on Human-Computer Interaction10.1145/36374328:CSCW1(1-32)Online publication date: 26-Apr-2024
    • (2024)Users' Perceptions of Online Child Abuse Detection MechanismsProceedings of the ACM on Human-Computer Interaction10.1145/36374248:CSCW1(1-26)Online publication date: 26-Apr-2024
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media