Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Open access

"You Shouldn't Need to Share Your Data": Perceived Privacy Risks and Mitigation Strategies Among Privacy-Conscious Smart Home Power Users

Published: 04 October 2023 Publication History

Abstract

Fueled by Internet-of-Things technologies and spanning a wide range of sensors, speakers, and cameras, smart homes promise to make our lives easier and automate routine tasks. From speakers to security cameras, smart home devices (SHDs) answer our questions, monitor our home environment, and conserve energy. They also collect significant data, ranging from on/off commands to audio and video data, and they do this in some of our most private spaces. In this paper, we explore the privacy risks associated with SHDs by focusing on privacy-conscious smart home power users--those who spend significant time and money to research, install, and integrate devices throughout their homes and engage in advanced device and network management strategies to mitigate privacy concerns. Drawing on data from 10 focus groups with 32 privacy-conscious power users, we identify the key privacy risks they perceive from this technology, as well as how they mitigate those risks through increasingly complex strategies. Our findings reveal that navigating the technical landscape that makes up the smart home environment--including what data is collected, what options are available for managing or restricting data flows, and who has access to data collected by SHDs--is complex and often confusing, even for people who spend significant time researching devices and integration options. We use these findings to argue for further development of tools that are transparent, easy to use, and aligned with the privacy needs of a diverse userbase.

Supplemental Material

ZIP File
Supplemental Materials for Lenhart et al. (2023):

References

[1]
Jacob Abbott, Jayati Dev, Donginn Kim, Shakthidhar Gopavaram, Meera Iyer, Shivani Sadam, Shrirang Mare, Tatiana Ringenberg, Vafa Andalibi, and L. Jean Camp. 2022. Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home. In Proceedings of the 2022 European Symposium on Usable Security (EuroUSEC '22), Association for Computing Machinery, New York, NY, USA, 98--110.
[2]
Noura Abdi, Xiao Zhan, Kopo M. Ramokapane, and Jose Such. 2021. Privacy Norms for Smart Home Personal Assistants. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, ACM, Yokohama Japan, 1--14.
[3]
Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and Selcuk Uluagac. 2020. Peek-a-boo: i see your smart home activities, even encrypted! In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20), Association for Computing Machinery, New York, NY, USA, 207--218.
[4]
Alessandro Acquisti and Jens Grossklags. 2005. Privacy and rationality in individual decision making. IEEE Security & Privacy 3, 1 (January 2005), 26--33.
[5]
Imtiaz Ahmad, Rosta Farzan, Apu Kapadia, and Adam J. Lee. 2020. Tangible Privacy: Towards User-Centric Sensor Designs for Bystander Privacy. Proc. ACM Hum.-Comput. Interact. 4, CSCW2 (October 2020), 1--28.
[6]
Iftikhar Alam, Shah Khusro, and Mumtaz Khan. 2019. Usability Barriers in Smart TV User Interfaces: A Review and Recommendations. In 2019 International Conference on Frontiers of Information Technology (FIT), 334--3344.
[7]
Arun Ananthanarayanan, T. Sivasai, Dinesh D Gowda, Ganya H T, and K S Shreyas. 2021. Smart Mirror Using Rasberry Pi for Human Monitoring and Intrusion Detection. In 2021 International Conference on Design Innovations for 3Cs Compute Communicate Control (ICDI3C), 207--210.
[8]
Noah Apthorpe, Yan Shvartzshnaider, Arunesh Mathur, Dillon Reisman, and Nick Feamster. 2018. Discovering Smart Home Internet of Things Privacy Norms Using Contextual Integrity. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 2 (July 2018), 1--23.
[9]
Abdullahi Arabo, Ian Brown, and Fadi El-Moussa. 2012. Privacy in the Age of Mobility and Smart Devices in Smart Homes. In 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing, 819--826.
[10]
Frank Bajak and Barbara Ortutay. 2021. Apple to scan U.S. iPhones for images of child sexual abuse. AP NEWS. Retrieved July 4, 2022 from https://apnews.com/article/technology-business-child-abuse-apple-inc-7fe2a09427d663cda8addfeeffc40196
[11]
Nata Barbosa, Zhouhao Zhang, and Yang Wang. 2020. Do Privacy and Security Matter to Everyone? Quantifying and Clustering User-Centric Considerations About Smart Home Device Adoption. Usenix The Advanced Computing Systems Association August 10--11, 2020 (August 2020). Retrieved January 11, 2023 from https://www.usenix.org/conference/soups2020/presentation/barbosa
[12]
Carlos Bermejo Fernandez, Petteri Nurmi, and Pan Hui. 2021. Seeing is Believing?: Effects of Visualization on Smart Device Privacy Perceptions. In Proceedings of the 29th ACM International Conference on Multimedia, ACM, Virtual Event China, 4183--4192.
[13]
Melanie Birks, Ysanne Chapman, and Karen Francis. 2008. Memoing in qualitative research: Probing data and processes. Journal of Research in Nursing 13, 1 (January 2008), 68--75.
[14]
A.J. Bernheim Brush, Bongshin Lee, Ratul Mahajan, Sharad Agarwal, Stefan Saroiu, and Colin Dixon. 2011. Home automation in the wild: challenges and opportunities. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, Vancouver BC Canada, 2115--2124.
[15]
Joseph Bugeja, Andreas Jacobsson, and Paul Davidsson. 2018. Smart Connected Homes. In Internet of Things A to Z, Qusay Hassan (ed.). John Wiley & Sons, Inc., Hoboken, NJ, USA, 359--384.
[16]
Albert Fox Cahn and Justin Sherman. 2021. Your smart home" is watching -- and possibly sharing your data with the police. The Guardian. Retrieved July 4, 2022 from https://www.theguardian.com/commentisfree/2021/apr/05/tech-police-surveillance-smart-home-devices
[17]
George Chalhoub, Ivan Flechais, Norbert Nthala, Ruba Abu-Salma, and Elie Tom. 2020. Factoring User Experience into the Security and Privacy Design of Smart Home Devices: A Case Study. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, ACM, Honolulu HI USA, 1--9.
[18]
George Chalhoub, Martin J Kraemer, Norbert Nthala, and Ivan Flechais. 2021. ?It did not give me an option to decline": A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, ACM, Yokohama Japan, 1--16.
[19]
Chola Chhetri and Vivian Genaro Motti. 2022. User-Centric Privacy Controls for Smart Homes. Proc. ACM Hum.-Comput. Interact. 6, CSCW2 (November 2022), 349:1--349:36.
[20]
Eugene Cho, S. Shyam Sundar, Saeed Abdullah, and Nasim Motalebi. 2020. Will Deleting History Make Alexa More Trustworthy? Effects of Privacy and Content Customization on User Experience of Smart Speakers. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 1--13. Retrieved July 6, 2022 from http://doi.org/10.1145/3313831.3376551
[21]
Eun Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly Harrison, and Julie A. Kientz. 2011. Living in a glass house: a survey of private moments in the home. In Proceedings of the 13th international conference on Ubiquitous computing - UbiComp '11, ACM Press, Beijing, China, 41.
[22]
Connectivity Standards Alliance. 2022. Matter Arrives Bringing A More Interoperable, Simple And Secure Internet Of Things to Life. CSA-IOT. Retrieved January 14, 2023 from https://csa-iot.org/newsroom/matter-arrives/
[23]
Salim Jibrin Danbatta and Asaf Varol. 2019. Comparison of Zigbee, Z-Wave, Wi-Fi, and Bluetooth Wireless Technologies Used in Home Automation. In 2019 7th International Symposium on Digital Forensics and Security (ISDFS), 1--5.
[24]
Roy Dong, Lillian J. Ratliff, Alvaro A. Cárdenas, Henrik Ohlsson, and S. Shankar Sastry. 2018. Quantifying the Utility--Privacy Tradeoff in the Internet of Things. ACM Trans. Cyber-Phys. Syst. 2, 2 (June 2018), 1--28.
[25]
Julia C. Dunbar, Emily Bascom, Ashley Boone, and Alexis Hiniker. 2021. Is Someone Listening?: Audio-Related Privacy Perceptions and Design Recommendations from Guardians, Pragmatists, and Cynics. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5, 3 (September 2021), 1--23.
[26]
Pardis Emami-Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017) (2017), 399--412.
[27]
Pardis Emami-Naeini, Janarth Dheenadhayalan, Yuvraj Agarwal, and Lorrie Faith Cranor. 2022. An Informative Security and Privacy ?Nutrition" Label for Internet of Things Devices. IEEE Security & Privacy 20, 2 (March 2022), 31--39.
[28]
Dimitris Geneiatakis, Ioannis Kounelis, Ricardo Neisse, Igor Nai-Fovino, Gary Steri, and Gianmarco Baldini. 2017. Security and privacy issues for an IoT based smart home. In 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 1292--1297.
[29]
Marco Ghiglieri, Melanie Volkamer, and Karen Renaud. 2017. Exploring Consumers' Attitudes of Smart TV Related Privacy Risks. In Human Aspects of Information Security, Privacy and Trust, Theo Tryfonas (ed.). Springer International Publishing, Cham, 656--674.
[30]
Dan Goodin. 2021. Amazon devices will soon automatically share your Internet with neighbors. Ars Technica. Retrieved July 4, 2022 from https://arstechnica.com/gadgets/2021/05/amazon-devices-will-soon-automatically-share-your-internet-with-neighbors/
[31]
Kirsten Gram-Hanssen and Sarah J. Darby. 2018. "Home is where the smart is"? Evaluating smart home research and approaches against the concept of home. Energy Research & Social Science 37, (March 2018), 94--101.
[32]
Andy Greenberg. 2015. Apple's Latest Selling Point: How Little It Knows About You. Wired. Retrieved July 4, 2022 from https://www.wired.com/2015/06/apples-latest-selling-point-little-knows/
[33]
Aznor Hanah, Rohani Farook, Shamsul Jamel Elias, M R A Rejab, M Fairuz M Fadzil, and Zulkifli Husin. 2019. IoT Room Control And Monitoring System Using Rasberry Pi. In 2019 4th International Conference and Workshops on Recent Advances and Innovations in Engineering (ICRAIE), 1--4.
[34]
Julie M. Haney, Susanne M. Furman, and Yasemin Acar. 2020. Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges. NIST (July 2020). Retrieved January 11, 2023 from https://www.nist.gov/publications/smart-home-security-and-privacy-mitigations-consumer-perceptions-practices-and
[35]
Eszter Hargittai, Elissa M. Redmiles, Jessica Vitak, and Michael Zimmer. 2020. Americans' willingness to adopt a covid-19 tracking app. First Monday 25, 11 (October 2020), online.
[36]
Shane Harris. 2015. Your Samsung SmartTV Is Spying on You, Basically. The Daily Beast. Retrieved July 4, 2022 from https://www.thedailybeast.com/articles/2015/02/05/your-samsung-smarttv-is-spying-on-you-basically
[37]
Alan Henry and Emily Long. 2019. How to Tap Your Network and See Everything That Happens On It. Lifehacker. Retrieved July 6, 2022 from https://lifehacker.com/how-to-tap-your-network-and-see-everything-that-happens-1649292940
[38]
Aaron Holmes. 2019. Google exec says Nest owners should probably warn their guests that their conversations are being recorded. Business Insider. Retrieved July 4, 2022 from https://www.businessinsider.com/google-exec-nest-owners-should-tell-guests-theyre-being-recorded-2019--10
[39]
Chun-Lung Huang and Peter Haried. 2020. An Evaluation of Uncertainty and Anticipatory Anxiety Impacts on Technology Use. International Journal of Human--Computer Interaction 36, 7 (April 2020), 641--649.
[40]
Danny Yuxing Huang, Noah Apthorpe, Frank Li, Gunes Acar, and Nick Feamster. 2020. IoT Inspector: Crowdsourcing Labeled Network Traffic from Smart Home Devices at Scale. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4, 2 (June 2020), 1--21.
[41]
Yue Huang, Borke Obada-Obieh, and Konstantin (Kosta) Beznosov. 2020. Amazon vs. My Brother: How Users of Shared Smart Speakers Perceive and Cope with Privacy Risks. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, ACM, Honolulu HI USA, 1--13.
[42]
Haris Isyanto, Ajib Setyo Arifin, and Muhammad Suryanegara. 2020. Performance of Smart Personal Assistant Applications Based on Speech Recognition Technology using IoT-based Voice Commands. In 2020 International Conference on Information and Communication Technology Convergence (ICTC), 640--645.
[43]
Andreas Jacobsson and Paul Davidsson. 2015. Towards a model of privacy and security for smart homes. In 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 727--732.
[44]
Esther D. T. Jaspers and Erika Pearson. 2022. Consumers' acceptance of domestic Internet-of-Things: The role of trust and privacy concerns. Journal of Business Research 142, (March 2022), 255--265.
[45]
Haojian Jin, Boyuan Guo, Rituparna Roychoudhury, Yaxing Yao, Swarun Kumar, Yuvraj Agarwal, and Jason I. Hong. 2022. Exploring the Needs of Users for Supporting Privacy-Protective Behaviors in Smart Homes. In CHI Conference on Human Factors in Computing Systems, ACM, New Orleans LA USA, 1--19.
[46]
Yong Jin, Masahiko Tomoishi, and Nariyoshi Yamai. 2017. A Secure and Lightweight IoT Device Remote Monitoring and Control Mechanism Using DNS. In 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), 282--283.
[47]
Maritza Johnson, Serge Egelman, and Steven M. Bellovin. 2012. Facebook and privacy: it's complicated. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12), Association for Computing Machinery, New York, NY, USA, 1--15.
[48]
Hyunjin Kang and Wonsun Shin. 2016. Do Smartphone Power Users Protect Mobile Privacy Better than Nonpower Users? Exploring Power Usage as a Factor in Mobile Privacy Protection and Disclosure. Cyberpsychology, Behavior, and Social Networking 19, 3 (March 2016), 179--185.
[49]
Patrick Gage Kelley, Joanna Bresee, Lorrie Faith Cranor, and Robert W. Reeder. 2009. A ?nutrition label" for privacy. In Proceedings of the 5th Symposium on Usable Privacy and Security - SOUPS '09, ACM Press, Mountain View, California, 1.
[50]
Kanitkorn Khanchuea and Rawat Siripokarpirom. 2019. A Multi-Protocol IoT Gateway and WiFi/BLE Sensor Nodes for Smart Home and Building Automation: Design and Implementation. In 2019 10th International Conference of Information and Communication Technology for Embedded Systems (IC-ICTES), 1--6.
[51]
Richard A. Krueger and Mary Anne Casey. 2014. Focus Groups: A Practical Guide for Applied Research (5th edition ed.). SAGE Publications, Inc, Los Angeles London New Delhi Singapore Washington DC.
[52]
Albrecht Kurze, Andreas Bischof, Sören Totzauer, Michael Storz, Maximilian Eibl, Margot Brereton, and Arne Berger. 2020. Guess the Data: Data Work to Understand How People Make Sense of and Use Simple Sensor Data from Homes. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, ACM, Honolulu HI USA, 1--12.
[53]
Hyosun Kwon, Joel E. Fischer, Martin Flintham, and James Colley. 2018. The Connected Shower: Studying Intimate Data in Everyday Life. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 4 (December 2018), 1--22.
[54]
Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, Are You Listening?: Privacy Perceptions, Concerns and Privacy-seeking Behaviors with Smart Speakers. Proc. ACM Hum.-Comput. Interact. 2, CSCW (November 2018), 1--31.
[55]
Scott Lederer, Jennifer Mankoff, and Anind K. Dey. 2003. Who wants to know what when? privacy preference determinants in ubiquitous computing. In CHI '03 extended abstracts on Human factors in computing systems - CHI '03, ACM Press, Ft. Lauderdale, Florida, USA, 724.
[56]
Hosub Lee and Alfred Kobsa. 2016. Understanding user privacy in Internet of Things environments. In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 407--412.
[57]
Tianshi Li, Elizabeth Louie, Laura Dabbish, and Jason I. Hong. 2021. How Developers Talk About Personal Data and What It Means for User Privacy: A Case Study of a Developer Forum on Reddit. Proc. ACM Hum.-Comput. Interact. 4, CSCW3 (January 2021), 1--28.
[58]
Tianshi Li, Kayla Reiman, Yuvraj Agarwal, Lorrie Faith Cranor, and Jason I. Hong. 2022. Understanding Challenges for Developers to Create Accurate Privacy Nutrition Labels. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems (CHI '22), Association for Computing Machinery, New York, NY, USA, 1--24.
[59]
Yuting Liao, Jessica Vitak, Priya Kumar, Michael Zimmer, and Katherine Kritikos. 2019. Understanding the Role of Privacy and Trust in Intelligent Personal Assistant Adoption. In Information in Contemporary Society (Lecture Notes in Computer Science), Springer International Publishing, Cham, 102--113.
[60]
Michael Liedtke and Matt O'Brien. 2021. Apple delays iPhone photo-scanning plan amid fierce backlash. AP NEWS. Retrieved July 4, 2022 from https://apnews.com/article/technology-business-d796d5ca2ca5932790ad806b9c119d71
[61]
Michelle Madejski, Maritza Johnson, and Steven M. Bellovin. 2012. A study of privacy settings errors in an online social network. In 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, 340--345.
[62]
Nathan Malkin, Julia Bernd, Maritza Johnson, and Serge Egelman. 2018. ?What Can't Data Be Used For?": Privacy Expectations about Smart TVs in the U.S. In Proceedings 3rd European Workshop on Usable Security, Internet Society, London, England.
[63]
Shelley Mallett. 2004. Understanding Home: A Critical Review of the Literature. The Sociological Review 52, 1 (February 2004), 62--89.
[64]
S. Marathe, S. Sundar, M. Bijvank, H. C. V. Vugt, and J. Veldhuis. 2007. Who are these power users anyway? Building a psychological profile. San Francisco, CA. Retrieved July 6, 2022 from https://www.semanticscholar.org/paper/Who-are-these-power-users-anyway-Building-a-profile-Marathe-Sundar/1455563bf9242612c36f08e5a295aa139b8a1f04
[65]
Shrirang Mare, Logan Girvin, Franziska Roesner, and Tadayoshi Kohno. 2019. Consumer Smart Homes: Where We Are and Where We Need to Go. In Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications (HotMobile '19), Association for Computing Machinery, New York, NY, USA, 117--122.
[66]
Kirsten Martin. 2018. The penalty for privacy violations: How privacy violations impact trust online. Journal of Business Research 82, (January 2018), 103--116.
[67]
Friedemann Mattern and Christian Floerkemeier. 2010. From the Internet of Computers to the Internet of Things. In From Active Data Management to Event-Based Systems and More: Papers in Honor of Alejandro Buchmann on the Occasion of His 60th Birthday, Kai Sachs, Ilia Petrov and Pablo Guerrero (eds.). Springer, Berlin, Heidelberg, 242--259.
[68]
Faith McCreary, Alexandra Zafiroglu, and Heather Patterson. 2016. The Contextual Complexity of Privacy in Smart Homes and Smart Buildings. In HCI in Business, Government, and Organizations: Information Systems, Fiona Fui-Hoon Nah and Chuan-Hoo Tan (eds.). Springer International Publishing, Cham, 67--78.
[69]
Matthew B. Miles, A. Michael Huberman, and Johnny Saldana. 2018. Qualitative Data Analysis: A Methods Sourcebook. SAGE Publications.
[70]
Moses Namara, Reza Ghaiumy Anaraky, Pamela Wisniewski, Xinru Page, and Bart P. Knijnenburg. 2021. Examining Power Use and the Privacy Paradox between Intention vs. Actual Use of Mobile Applications. In European Symposium on Usable Security 2021. Association for Computing Machinery, New York, NY, USA, 223--235. Retrieved July 11, 2022 from http://doi.org/10.1145/3481357.3481513
[71]
Lily Hay Newman. 2020. Apple's App ?Privacy Labels" Are Here-and They're a Big Step Forward. WIred. Retrieved July 4, 2022 from https://www.wired.com/story/apple-app-privacy-labels/
[72]
NPR and Edison Research. 2022. Smart Speaker Ownership Reaches 35% of Americans. NPR. Retrieved July 6, 2022 from https://www.npr.org/about-npr/1105579648/npr-edison-research-smart-speaker-ownership-reaches-35-of-americans
[73]
TJ OConnor, Reham Mohamed, Markus Miettinen, William Enck, Bradley Reaves, and Ahmad-Reza Sadeghi. 2019. HomeSnitch: behavior transparency and control for smart home IoT devices. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '19), Association for Computing Machinery, New York, NY, USA, 128--138.
[74]
Antti Oulasvirta, Aurora Pihlajamaa, Jukka Perkiö, Debarshi Ray, Taneli Vähäkangas, Tero Hasu, Niklas Vainio, and Petri Myllymäki. 2012. Long-term effects of ubiquitous surveillance in the home. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing - UbiComp '12, ACM Press, Pittsburgh, Pennsylvania, 41.
[75]
Sunyup Park, Anna Lenhart, Michael Zimmer, and Jessica Vitak. 2023. ?Nobody's Happy": Design Insights from Privacy-Conscious Smart Home Power Users on Enhancing Data Transparency, Visibility, and Control. In Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), USENIX Association, Anaheim, CA, 543--558. Retrieved from https://www.usenix.org/conference/soups2023/presentation/park
[76]
Michael Quinn Patton. 2005. Qualitative research. In Encyclopedia of Statistics in Behavioral Science. John Wiley & Sons, Ltd, Hoboken, NJ.
[77]
James Pierce. 2019. Smart Home Security Cameras and Shifting Lines of Creepiness: A Design-Led Inquiry. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, ACM, Glasgow Scotland Uk, 1--14.
[78]
James Pierce, Claire Weizenegger, Parag Nandi, Isha Agarwal, Gwenna Gram, Jade Hurrle, Hannah Liao, Betty Lo, Aaron Park, Aivy Phan, Mark Shumskiy, and Grace Sturlaugson. 2022. Addressing Adjacent Actor Privacy: Designing for Bystanders, Co-Users, and Surveilled Subjects of Smart Home Cameras. In Designing Interactive Systems Conference, ACM, Virtual Event Australia, 26--40.
[79]
Michael Potuck. 2022. Report: Amazon and third parties use Alexa voice data for ads while Siri respects privacy. 9to5Mac. Retrieved July 4, 2022 from https://9to5mac.com/2022/04/29/amazon-alexa-voice-data-used-for-ads/
[80]
Richard L. Rutledge, Aaron K. Massey, and Annie I. Antón. 2016. Privacy Impacts of IoT Devices: A SmartTV Case Study. In 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW), 261--270.
[81]
Johnny Saldana. 2021. The Coding Manual for Qualitative Researchers (Fourth edition ed.). SAGE Publications Ltd, Los Angeles London New Delhi Singapore Washington DC Melbourne.
[82]
Benjamin Saunders, Julius Sim, Tom Kingstone, Shula Baker, Jackie Waterfield, Bernadette Bartlam, Heather Burroughs, and Clare Jinks. 2018. Saturation in qualitative research: exploring its conceptualization and operationalization. Qual Quant 52, 4 (July 2018), 1893--1907.
[83]
William Seymour, Martin J. Kraemer, Reuben Binns, and Max Van Kleek. 2020. Informing the Design of Privacy-Empowering Tools for the Connected Home. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, ACM, Honolulu HI USA, 1--14.
[84]
Tyler Sonnemaker. 2021. Texas power companies automatically raised the temperature of customers' smart thermostats in the middle of a heat wave. Business Insider. Retrieved July 4, 2022 from https://www.businessinsider.com/texas-energy-companies-remotely-raised-smart-thermostats-temperatures-2021--6
[85]
Nick Statt. 2020. Apple updates Safari's anti-tracking tech with full third-party cookie blocking. The Verge. Retrieved July 4, 2022 from https://www.theverge.com/2020/3/24/21192830/apple-safari-intelligent-tracking-privacy-full-third-party-cookie-blocking
[86]
David W. Stewart and Prem Shamdasani. 2017. Online Focus Groups. Journal of Advertising 46, 1 (January 2017), 48--60.
[87]
Chris Stokel-Walker. 2022. Apple Is an Ad Company Now. Wired. Retrieved January 13, 2023 from https://www.wired.com/story/apple-is-an-ad-company-now/
[88]
Roger A. Straus. 2019. Mastering focus groups and depth interviews: a practitioner's guide. Paramount Market Publishing, Rochester, NY.
[89]
Madiha Tabassum, Tomasz Kosi'ski, and Heather Richter Lipford. 2019. "I don't own the data": end user perceptions of smart home device data practices and risks. In Proceedings of the Fifteenth USENIX Conference on Usable Privacy and Security (SOUPS'19), USENIX Association, USA, 435--450.
[90]
Neilly Tan, Richmond Wong, Audrey Desjardins, Sean Munson, and James Pierce. 2022. Monitoring Pets, Deterring Intruders, and Casually Spying on Neighbors: Everyday Uses of Smart Home Cameras. In CHI Conference on Human Factors in Computing Systems, ACM, New Orleans LA USA, 1--25.
[91]
J Tassone, PZ Yan, M Simpson, C Mendhe, V Mago, and S Choudhury. 2020. Utilizing deep learning and graph mining to identify drug use on Twitter data. BMC MEDICAL INFORMATICS AND DECISION MAKING 20, (December 2020).
[92]
Tech-FAQ. 2019. Flashing Firmware. Tech-FAQ. Retrieved July 6, 2022 from https://www.tech-faq.com/flashing-firmware.html
[93]
Cadie Thompson. 2015. Apple is running into some problems with its big smart home plans. Business Insider. Retrieved July 6, 2022 from https://www.businessinsider.com/why-there-arent-many-apple-homekit-devices-available-2015--7
[94]
Bergur Thormundsson. 2022. Smart home: Statistics and facts. Statista. Retrieved July 4, 2022 from https://www.statista.com/topics/2430/smart-homes/
[95]
Rahmadi Trimananda, Janus Varmarken, Athina Markopoulou, and Brian Demsky. 2020. PingPong: Packet-Level Signatures for Smart Home Device Events.
[96]
Jennifer Pattison Tuohy. 2022. Matter has been delayed, again. The Verge. Retrieved July 12, 2022 from https://www.theverge.com/2022/3/17/22982166/matter-smart-home-standard-postponed-fall-2022
[97]
Jennifer Pattison Tuohy. 2022. Matter is here to save the smart home. The Verge. Retrieved January 14, 2023 from https://www.theverge.com/22787729/matter-smart-home-standard-apple-amazon-google
[98]
Jessica Vitak, Stacy Blasiola, Sameer Patil, and Eden Litt. 2015. Balancing Audience and Privacy Tensions on Social Network Sites: Strategies of Highly Engaged Users. International Journal of Communication 9, 0 (May 2015), 20.
[99]
Jessica Vitak, Priya Kumar, Yuting Liao, and Michael Zimmer. 2023. Boundary Regulation Processes and Privacy Concerns With (Non-)Use of Voice-Based Assistants. HMC 6, (July 2023), 183--201.
[100]
Jessica Vitak, Michael Zimmer, Anna Lenhart, Sunyup Park, Richmond Y. Wong, and Yaxing Yao. 2021. Designing for Data Awareness: Addressing Privacy and Security Concerns About ?Smart" Technologies. In Companion Publication of the 2021 Conference on Computer Supported Cooperative Work and Social Computing (CSCW '21), Association for Computing Machinery, New York, NY, USA, 364--367.
[101]
Yang Wang, Gregory Norcie, Saranga Komanduri, Alessandro Acquisti, Pedro Giovanni Leon, and Lorrie Faith Cranor. 2011. ?I regretted the minute I pressed share": a qualitative study of regrets on Facebook. In Proceedings of the Seventh Symposium on Usable Privacy and Security (SOUPS '11), Association for Computing Machinery, New York, NY, USA, 1--16.
[102]
Bruce D. Weinberg, George R. Milne, Yana G. Andonova, and Fatima M. Hajjat. 2015. Internet of Things: Convenience vs. privacy and secrecy. Business Horizons 58, 6 (November 2015), 615--624.
[103]
Meredydd Williams, Jason R. C. Nurse, and Sadie Creese. 2017. Privacy is the Boring Bit: User Perceptions and Behaviour in the Internet-of-Things. In 2017 15th Annual Conference on Privacy, Security and Trust (PST), 181--18109.
[104]
Owen Williams. 2022. The average person doesn't have a chance with the smart home. TechCrunch. Retrieved December 29, 2022 from https://techcrunch.com/2022/02/18/the-average-person-doesnt-have-a-chance-with-the-smart-home/
[105]
Richmond Y. Wong and Deirdre K. Mulligan. 2019. Bringing Design to the Privacy Table: Broadening ?Design" in "Privacy by Design" Through the Lens of HCI. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, ACM, Glasgow Scotland Uk, 1--17.
[106]
Peter Worthy, Ben Matthews, and Stephen Viller. 2016. Trust Me: Doubts and Concerns Living with the Internet of Things. In Proceedings of the 2016 ACM Conference on Designing Interactive Systems (DIS '16), Association for Computing Machinery, New York, NY, USA, 427--434.
[107]
Daniel Wroclawski. 2022. Matter Smart Home Standard FAQ. Consumer Reports. Retrieved July 12, 2022 from https://www.consumerreports.org/smart-home/matter-smart-home-standard-faq-a9475777045/
[108]
Yaxing Yao, Justin Reed Basdeo, Oriana Rosata Mcdonough, and Yang Wang. 2019. Privacy Perceptions and Designs of Bystanders in Smart Homes. Proc. ACM Hum.-Comput. Interact. 3, CSCW (November 2019), 1--24.
[109]
Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End user security & privacy concerns with smart homes. In Proceedings of the Thirteenth USENIX Conference on Usable Privacy and Security (SOUPS '17), USENIX Association, USA, 65--80.
[110]
Wei Zhang, Yan Meng, Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang, and Haojin Zhu. 2018. HoMonit: Monitoring Smart Home Apps from Encrypted Traffic. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS '18), Association for Computing Machinery, New York, NY, USA, 1074--1088.
[111]
Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. 2018. User Perceptions of Smart Home IoT Privacy. Proc. ACM Hum.-Comput. Interact. 2, CSCW (November 2018), 1--20.
[112]
Bu Zhong. 2013. From smartphones to iPad: Power users' disposition toward mobile media devices. Computers in Human Behavior 29, 4 (July 2013), 1742--1748.
[113]
Michael Zimmer, Priya Kumar, Jessica Vitak, Yuting Liao, and Katie Chamberlain Kritikos. 2020. "There's nothing really they can do with this information': unpacking how users manage privacy boundaries for personal fitness information. Information, Communication & Society 23, 7 (June 2020), 1020--1037.

Index Terms

  1. "You Shouldn't Need to Share Your Data": Perceived Privacy Risks and Mitigation Strategies Among Privacy-Conscious Smart Home Power Users

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Proceedings of the ACM on Human-Computer Interaction
      Proceedings of the ACM on Human-Computer Interaction  Volume 7, Issue CSCW2
      CSCW
      October 2023
      4055 pages
      EISSN:2573-0142
      DOI:10.1145/3626953
      Issue’s Table of Contents
      This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives International 4.0 License.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 04 October 2023
      Published in PACMHCI Volume 7, Issue CSCW2

      Check for updates

      Author Tags

      1. IoT
      2. internet of things
      3. power users
      4. privacy
      5. security
      6. smart homes
      7. trust

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 869
        Total Downloads
      • Downloads (Last 12 months)805
      • Downloads (Last 6 weeks)101
      Reflects downloads up to 10 Nov 2024

      Other Metrics

      Citations

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Full Access

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media