Abstract
The increase in the usage of the Internet of Things (IoT) raises privacy concerns for users. Depending on the types of information collected by IoT devices and shared with third-parties, users’ privacy concerns may vary. In this paper, we describe our detailed analysis of a two-fold user study with (1) 70 students from our institution and (2) 164 Amazon Mechanical Turk workers to understand how users perceive sensitivity level of different information types and to examine their attitude towards sharing their personal information with third-parties. We developed a taxonomy of IoT data practices to use for the study. In both of our studies, we noticed that users’ understanding of sensitivity levels differs based on their gender. We also identified users’ willingness to share an information with a third-party strongly depends on the sensitivity levels of the information type and the third-party categories. Based on our findings, we provide suggestions for privacy regulators, policymakers, companies, and researchers to mitigate and resolve IoT privacy risks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
List of 79 information types: https://tinyurl.com/3vpk6evr.
- 2.
Survey Questionnaires: https://tinyurl.com/wcxw5tfk.
- 3.
\(\chi ^2\) Critical Value is 9.48 at 4\(^\circ \) of freedom (df) and 5% level of significance.
- 4.
The detailed results can be found: https://tinyurl.com/yhschu2o.
References
California Consumers’ Privacy Act. https://oag.ca.gov/privacy/ccpa
International Data Corporation Forecast. https://tinyurl.com/y694wg2v
IoT Line Up. http://iotlineup.com/
Privacy Grade Website. http://privacygrade.org/third_party_libraries
Spearman Coefficient. https://tinyurl.com/nctpfudu
The EU GDPR - Article 14. https://eugdpr.org. Accessed 01 May 2020
The Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Nobakht, M., et al.: PGFit: static permission analysis of health and fitness apps in IoT programming frameworks. J. Network Comput. Appl. 152, 102509 (2020)
Nickerson, R.C., et al.: A method for taxonomy development and its application in information systems. Eur. J. Inf. Syst. 22(3), 336–359 (2013). https://doi.org/10.1057/ejis.2012.26
Kang, R., et al.: Privacy attitudes of mechanical Turk workers and the US public. In: 10th Symposium on Usable Privacy and Security (\(\{\)SOUPS\(\}\) 2014) (2014)
Gupta, S.D., Nygaard, A., Kaplan, S., Jain, V., Ghanavati, S.: PHIN: a privacy protected heterogeneous IoT network. In: Cherfi, S., Perini, A., Nurcan, S. (eds.) RCIS 2021. LNBIP, vol. 415, pp. 124–141. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-75018-3_8
Mare, S., et al.: Smart devices in AirBnBs: considering privacy and security for both guests and hosts. In: Proceedings on Privacy Enhancing Technologies
Slavin, R., et al.: PVDetector: a detector of privacy-policy violations for android apps. In: IEEE/ACM International Conference on Mobile Software Engineering and Systems, pp. 299–300 (2016)
Zimmeck, S., et al.: Maps: scaling privacy compliance analysis to a million apps. Proc. Priv. Enhancing Technol. 2019(3), 66–86 (2019)
Zimmer, M., et al.: ‘There’s nothing really they can do with this information’: unpacking how users manage privacy boundaries for personal fitness information. Inf. Commun. Soc. 23(7), 1020–1037 (2020)
Bhatia, J., Breaux, T.D.: Privacy risk in cybersecurity data sharing. In: ISCS 2016 (2016)
Bhatia, J., Breaux, T.D.: Empirical measurement of perceived privacy risk. ACM Trans. Comput. Hum. Interact. (TOCHI) 25(6), 1–47 (2018)
Bokaie, H.M.: Information Retrieval and Semantic Inference from Natural Language Privacy Policies. Ph.D. thesis, The University of Texas at San Antonio (2019)
Breaux, T., Hibshi, H.: Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements. REJ 19(3), 281–307 (2014)
Breaux, T.D., Smullen, D., Hibshi, H.: Detecting repurposing and over-collection in multi-party privacy requirements specifications. In: 2015 IEEE 23rd International Requirements Engineering Conference (RE). IEEE (2015)
Checkit, G.: Smart home device adoption. Article. https://tinyurl.com/yba69fcp
Cyber Physical Systems Public Working Group: PRELIMINARY DISCUSSION DRAFT - Framework for Cyber-Physical Systems - Release 0.7 (2015)
Dinev, T., Hart, P.: An extended privacy calculus model for e-commerce transactions. Inf. Syst. Res. 17(1), 61–80 (2006)
Emami-Naeini, P., Agarwal, Y., Cranor, L.F., Hibshi, H.: Ask the experts: what should be on an IoT privacy and security label? In: 2020 IEEE S&P (2020)
Emami-Naeini, P., Dheenadhayalan, J., Agarwal, Y., Cranor, L.F.: Which privacy and security attributes most impact consumers’ risk perception and willingness to purchase IoT devices?
Haney, J., Acar, Y., Furman, S.: “It’s the company, the government, you and i”: user perceptions of responsibility for smart home privacy and security. In: 30th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 21) (2021)
Kim, D., Park, K., Park, Y., Ahn, J.H.: Willingness to provide personal information: Perspective of privacy calculus in IoT services. Comput. Hum. Behav. 92, 273–281 (2019)
Liu, L., Karatas, C., et al.: Toward detection of unsafe driving with wearables. In: Proceedings of the 2015 Workshop on WSA, pp. 27–32. ACM (2015)
Maitra, S., Suh, B., Ghanavati, S.: Privacy consistency analyzer for android applications. In: 5th International Workshop (ESPRE), pp. 28–33 (2018)
Markos, E.C.: Consumer privacy: A two essay dissertation examining perceptions of information sensitivity. University of Massachusetts Amherst (2010)
Mekovec, R.: Factors that influence internet users’ privacy perception. In: ITI 2011, pp. 227–232. IEEE (2011)
Michalevsky, Y., Schulman, A.: Powerspy: location tracking using mobile device power analysis. In: 24th \(\{\)USENIX\(\}\) Security Symposium, pp. 785–800 (2015)
Milne, G.R., Pettinico, G., Hajjat, F.M., Markos, E.: Information sensitivity typology: mapping the degree and type of risk consumers perceive in personal data sharing. J. Consum. Affairs 51(1), 133–161 (2017)
National Science and Technology Council: National Privacy Research Strategy (2016). https://www.nitrd.gov/PUBS/NationalPrivacyResearchStrategy.pdf
Okoyomon, E., Samarin, N., et al.: On the ridiculousness of notice and consent: contradictions in app privacy policies (2019)
Safi, M., Reyes, I., Egelman, S.: Inference of user demographics and habits from seemingly benign smartphone sensors
Smullen, D.: Modeling, analyzing, and consistency checking privacy requirements using eddy. In: Proceedings of the Symposium and Bootcamp on the Science of Security
Torabi, S.: Understanding users’ perception toward sharing personal health information
Weible, R.J.: Privacy and data: An empirical study of the influence of types of data and situational context upon privacy perceptions. Ph.D. thesis, MSU (1993)
Xu, F., Michael, K., Chen, X.: Factors affecting privacy disclosure on social network sites: an integrated model. Electron. Comm. Res. 13(2), 151–168 (2013)
Yu, L., Lou, X.: Can we trust the privacy policies of android apps? IEEE (2016)
Zeng, E.: End user security and privacy concerns with smart homes. In: SOUPS
Zheng, S., Apthorpe, N., Chetty, M., Feamster, N.: User perceptions of smart home IoT privacy. In: Proceedings of the ACM on Human-Computer Interaction (CSCW), vol. 2
Creswell, J.W., Creswell, J.D.: Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. Sage publications (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this paper
Cite this paper
Gupta, S.D., Kaplan, S., Nygaard, A., Ghanavati, S. (2022). A Two-Fold Study to Investigate Users’ Perception of IoT Information Sensitivity Levels and Their Willingness to Share the Information. In: Meng, W., Katsikas, S.K. (eds) Emerging Information Security and Applications. EISA 2021. Communications in Computer and Information Science, vol 1403. Springer, Cham. https://doi.org/10.1007/978-3-030-93956-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-93956-4_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-93955-7
Online ISBN: 978-3-030-93956-4
eBook Packages: Computer ScienceComputer Science (R0)