Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3411764.3445691acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

“It did not give me an option to decline”: A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products

Published: 07 May 2021 Publication History

Abstract

Smart home products aren’t living up to their promise. They claim to transform the way we live, providing convenience, energy efficiency, and safety. However, the reality is significantly less profound and often frustrating. This is particularly apparent in security and privacy experiences: powerlessness, confusion, and annoyance have all been reported.
In order to reduce frustration and help fulfill the promise of smart homes, we need to explore the experience of security and privacy in situ. We analyze an ethnographic study observing six UK households over six months to present a longitudinal view of security and privacy user experiences in smart products. We find inconsistencies in managing security and privacy, e.g., contrasting the ease of granting and difficulty of withholding consent. We identify security and privacy issues in repurposing smart home devices – using devices outside of their initial intended purposes. We conclude with recommendations for design in smart home devices.

References

[1]
Noura Abdi, Kopo M. Ramokapane, and Jose M. Such. 2019. More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019).
[2]
Muhammad Raisul Alam, Mamun Bin Ibne Reaz, and Mohd Alauddin Mohd Ali. 2012. A Review of Smart Homes—Past, Present, and Future. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 42, 6 (Nov. 2012), 1190–1203. https://doi.org/10.1109/TSMCC.2012.2189204
[3]
Alaa Althubaiti. 2016. Information bias in health research: definition, pitfalls, and adjustment methods. Journal of Multidisciplinary Healthcare 9 (May 2016), 211–217. https://doi.org/10.2147/JMDH.S104807
[4]
Noah Apthorpe, Dillon Reisman, and Nick Feamster. 2017. A smart home is no castle: Privacy vulnerabilities of encrypted iot traffic. arXiv preprint arXiv:1705.06805(2017).
[5]
Noah Apthorpe, Yan Shvartzshnaider, Arunesh Mathur, Dillon Reisman, and Nick Feamster. 2018. Discovering smart home internet of things privacy norms using contextual integrity. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 2 (2018), 59.
[6]
Gaurav Bansal, Fatemeh ‘Mariam’ Zahedi, and David Gefen. 2015. The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern. European Journal of Information Systems 24, 6 (2015), 624–644.
[7]
Genevieve Bell and Paul Dourish. 2007. Yesterday’s tomorrows: notes on ubiquitous computing’s dominant vision. Personal and Ubiquitous Computing 11, 2 (Feb. 2007), 133–143. https://doi.org/10.1007/s00779-006-0071-x
[8]
Victoria Bellotti and Abigail Sellen. 1993. Design for privacy in ubiquitous computing environments. In Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work(ECSCW’93). Kluwer Academic Publishers, Milan, Italy, 77–92.
[9]
Asa Blomquist and Mattias Arvola. 2002. Personas in action: ethnography in an interaction design team. In Proceedings of the second Nordic conference on Human-computer interaction. 197–200.
[10]
Virginia Braun and Victoria Clarke. 2012. Thematic analysis. In APA handbook of research methods in psychology, Vol 2: Research designs: Quantitative, qualitative, neuropsychological, and biological. American Psychological Association, Washington, DC, US, 57–71. https://doi.org/10.1037/13620-004
[11]
A.J. Bernheim Brush, Bongshin Lee, Ratul Mahajan, Sharad Agarwal, Stefan Saroiu, and Colin Dixon. 2011. Home automation in the wild: challenges and opportunities. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI ’11). Association for Computing Machinery, Vancouver, BC, Canada, 2115–2124. https://doi.org/10.1145/1978942.1979249
[12]
Marta Cecchinato and Daniel Harrison. 2017. Degrees of Agency in Owners and Users of Home IoT Devices. In CHI’17 workshop: Making Home: Asserting Agency in the Age of IoT. Association for Computing Machinery (ACM).
[13]
George Chalhoub, Ivan Flechais, Norbert Nthala, and Ruba Abu-Salma. 2020. Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home Cameras. In Sixteenth Symposium on Usable Privacy and Security (${$SOUPS$}$ 2020). 185–204.
[14]
Bradley Chambers. 2020. HomeKit Weekly: Apple should allow selective access to HomeKit devices for Family Sharing. https://9to5mac.com/2020/01/24/homekit-family-sharing/
[15]
Charlton, Alistair. 2018. Sharing your smart home with others is a minefield of inconvenience. https://www.gearbrain.com/sharing-smart-home-devices-2608366363.html
[16]
Marshini Chetty, Richard Banks, Richard Harper, Tim Regan, Abigail Sellen, Christos Gkantsidis, Thomas Karagiannis, and Peter Key. 2010. Who’s hogging the bandwidth: the consequences of revealing the invisible in the home. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI ’10). Association for Computing Machinery, Atlanta, Georgia, USA, 659–668. https://doi.org/10.1145/1753326.1753423
[17]
Marshini Chetty, Ja-Young Sung, and Rebecca E. Grinter. 2007. How Smart Homes Learn: The Evolution of the Networked Home and Household. In UbiComp 2007: Ubiquitous Computing(Lecture Notes in Computer Science), John Krumm, Gregory D. Abowd, Aruna Seneviratne, and Thomas Strang (Eds.). Springer, Berlin, Heidelberg, 127–144. https://doi.org/10.1007/978-3-540-74853-3_8
[18]
Eun Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly Harrison, and Julie A. Kientz. 2011. Living in a glass house: a survey of private moments in the home. In Proceedings of the 13th international conference on Ubiquitous computing(UbiComp ’11). Association for Computing Machinery, Beijing, China, 41–44. https://doi.org/10.1145/2030112.2030118
[19]
Eun Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly Harrison, Shwetak N. Patel, and Julie A. Kientz. 2012. Investigating receptiveness to sensing and inference in the home using sensor proxies. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing(UbiComp ’12). Association for Computing Machinery, Pittsburgh, Pennsylvania, 61–70. https://doi.org/10.1145/2370216.2370226
[20]
K. L. Courtney. 2008. Privacy and Senior Willingness to Adopt Smart Home Information Technology in Residential Care Facilities. Methods of Information in Medicine 47, 1 (2008), 76–81. https://doi.org/10.3414/ME9104 Publisher: Schattauer GmbH.
[21]
L. Cranor, T. Rabin, V. Shmatikov, S. Vadhan, and D. Weitzner. 2015. Towards a Privacy Research Roadmap for the Computing Community: A white paper prepared for the computing community consortium committee of the computing research association. (2015).
[22]
John W. Creswell and J. David Creswell. 2017. Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications.
[23]
Ry Crist. 2015. Multiple users, multiple systems, multiple devices: Is this the smart home from hell?https://www.cnet.com/news/multiple-users-multiple-systems-multiple-devices-is-this-the-smart-home-from-hell/
[24]
Alexei Czeskis, Ivayla Dermendjieva, Hussein Yapit, Alan Borning, Batya Friedman, Brian Gill, and Tadayoshi Kohno. 2010. Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety. In Proceedings of the Sixth Symposium on Usable Privacy and Security(SOUPS ’10). Association for Computing Machinery, Redmond, Washington, USA, 1–15. https://doi.org/10.1145/1837110.1837130
[25]
Angela Dale, Sara Arber, and Michael Procter. 1988. Doing secondary analysis. Unwin Hyman.
[26]
Anupam Das, Joseph Bonneau, Matthew Caesar, Nikita Borisov, and XiaoFeng Wang. 2014. The tangled web of password reuse. In NDSS, Vol. 14. 23–26.
[27]
Scott Davidoff, Min Kyung Lee, Charles Yiu, John Zimmerman, and Anind K. Dey. 2006. Principles of Smart Home Control. In UbiComp 2006: Ubiquitous Computing(Lecture Notes in Computer Science), Paul Dourish and Adrian Friday (Eds.). Springer, Berlin, Heidelberg, 19–34. https://doi.org/10.1007/11853565_2
[28]
George Demiris and Brian K. Hensel. 2008. Technologies for an aging society: a systematic review of “smart home” applications. Yearb Med Inform 3(2008), 33–40.
[29]
ISO DIS. 2010. 9241-210: 2010. Ergonomics of human system interaction-Part 210: Human-centred design for interactive systems (formerly known as 13407). International Standardization Organization (ISO). Switzerland (2010).
[30]
Daniel M. Doolan and Erika S. Froelicher. 2009. Using an existing data set to answer new research questions: a methodological review. Research and Theory for Nursing Practice 23, 3 (2009), 203–215. https://doi.org/10.1891/1541-6577.23.3.203
[31]
Paul Dourish, Rebecca E. Grinter, Jessica Delgado De La Flor, and Melissa Joseph. 2004. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing 8, 6 (2004), 391–401.
[32]
Stuart E. Dreyfus and Hubert L. Dreyfus. 1980. A five-stage model of the mental activities involved in directed skill acquisition. Technical Report. California Univ Berkeley Operations Research Center.
[33]
Chris Duckett. 2018. Google needs to break up its all-or-nothing approach to permissions. https://www.zdnet.com/article/google-needs-to-break-up-its-all-or-nothing-approach-to-permissions/
[34]
Serge Egelman, Raghudeep Kannavara, and Richard Chow. 2015. Is This Thing On? Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems(CHI ’15). Association for Computing Machinery, Seoul, Republic of Korea, 1669–1678. https://doi.org/10.1145/2702123.2702251
[35]
Pardis Emami-Naeini, Henry Dixon, Yuvraj Agarwal, and Lorrie Faith Cranor. 2019. Exploring How Privacy and Security Factor into IoT Device Purchase Behavior. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems(CHI ’19). Association for Computing Machinery, New York, NY, USA, 1–12. https://doi.org/10.1145/3290605.3300764
[36]
Christine Geeng and Franziska Roesner. 2019. Who’s In Control?: Interactions In Multi-User Smart Homes. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, 268.
[37]
Esther Goernemann and Sarah Spiekermann. 2020. Moments of Truth with Conversational Agents: An Exploratory Quest for the Relevant Experiences of Alexa Users. ECIS 2020 Research Papers (June 2020). https://aisel.aisnet.org/ecis2020_rp/169
[38]
Rebecca E. Grinter, W. Keith Edwards, Marshini Chetty, Erika S. Poole, Ja-Young Sung, Jeonghwa Yang, Andy Crabtree, Peter Tolmie, Tom Rodden, and Chris Greenhalgh. 2009. The ins and outs of home networking: The case for useful and usable domestic networking. ACM Transactions on Computer-Human Interaction (TOCHI) 16, 2(2009), 8.
[39]
Rebecca E. Grinter, W. Keith Edwards, Mark W. Newman, and Nicolas Ducheneaut. 2005. The Work to Make a Home Network Work. In ECSCW 2005, Hans Gellersen, Kjeld Schmidt, Michel Beaudouin-Lafon, and Wendy Mackay (Eds.). Springer Netherlands, Dordrecht, 469–488. https://doi.org/10.1007/1-4020-4023-7_24
[40]
Manu Gupta, Stephen S. Intille, and Kent Larson. 2009. Adding GPS-Control to Traditional Thermostats: An Exploration of Potential Energy Savings and Design Challenges. In Pervasive Computing(Lecture Notes in Computer Science), Hideyuki Tokuda, Michael Beigl, Adrian Friday, A. J. Bernheim Brush, and Yoshito Tobe (Eds.). Springer, Berlin, Heidelberg, 95–114. https://doi.org/10.1007/978-3-642-01516-8_8
[41]
Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus Dürmuth, Earlence Fernandes, and Blase Ur. 2018. Rethinking access control and authentication for the home internet of things (IoT). In 27th ${$USENIX$}$ Security Symposium (${$USENIX$}$ Security 18). 255–272.
[42]
Pamela S. Hinds, Ralph J. Vogel, and Laura Clarke-Steffen. 2016. The Possibilities and Pitfalls of Doing a Secondary Analysis of a Qualitative Data Set:. Qualitative Health Research (July 2016). https://doi.org/10.1177/104973239700700306 Publisher: Sage PublicationsSage CA: Thousand Oaks, CA.
[43]
Jason I. Hong and James A. Landay. 2004. An architecture for privacy-sensitive ubiquitous computing. In Proceedings of the 2nd international conference on Mobile systems, applications, and services(MobiSys ’04). Association for Computing Machinery, Boston, MA, USA, 177–189. https://doi.org/10.1145/990064.990087
[44]
Roberto Hoyle, Robert Templeman, Steven Armes, Denise Anthony, David Crandall, and Apu Kapadia. 2014. Privacy behaviors of lifeloggers using wearable cameras. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing(UbiComp ’14). Association for Computing Machinery, Seattle, Washington, 571–582. https://doi.org/10.1145/2632048.2632079
[45]
Information Commissioner’s Office. 2020. When is consent appropriate?https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/consent/when-is-consent-appropriate/
[46]
S.S. Intille. 2002. Designing a home of the future. IEEE Pervasive Computing 1, 2 (April 2002), 76–82. https://doi.org/10.1109/MPRV.2002.1012340
[47]
Timo Jakobi, Corinna Ogonowski, Nico Castelli, Gunnar Stevens, and Volker Wulf. 2017. The Catch(es) with Smart Home: Experiences of a Living Lab Field Study. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems(CHI ’17). Association for Computing Machinery, Denver, Colorado, USA, 1620–1633. https://doi.org/10.1145/3025453.3025799
[48]
Timo Jakobi, Gunnar Stevens, Nico Castelli, Corinna Ogonowski, Florian Schaub, Nils Vindice, Dave Randall, Peter Tolmie, and Volker Wulf. 2018. Evolving Needs in IoT Control and Accountability: A Longitudinal Study on Smart Home Intelligibility. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 4 (Dec. 2018), 171:1–171:28. https://doi.org/10.1145/3287049
[49]
Melissa P. Johnston. 2017. Secondary data analysis: A method of which the time has come. Qualitative and quantitative methods in libraries 3, 3 (2017), 619–626.
[50]
Meg Leta Jones. 2015. Privacy Without Screens & the Internet of Other People’s Things. SSRN Scholarly Paper ID 2614066. Social Science Research Network, Rochester, NY. https://papers.ssrn.com/abstract=2614066
[51]
Cory D. Kidd, Robert Orr, Gregory D. Abowd, Christopher G. Atkeson, Irfan A. Essa, Blair MacIntyre, Elizabeth Mynatt, Thad E. Starner, and Wendy Newstetter. 1999. The Aware Home: A Living Laboratory for Ubiquitous Computing Research. In Cooperative Buildings. Integrating Information, Organizations, and Architecture(Lecture Notes in Computer Science), Norbert A. Streitz, Jane Siegel, Volker Hartkopf, and Shin’ichi Konomi (Eds.). Springer, Berlin, Heidelberg, 191–198. https://doi.org/10.1007/10705432_17
[52]
Tiiu Koskela and Kaisa Väänänen-Vainio-Mattila. 2004. Evolution towards smart home environments: empirical evaluation of three user interfaces. Personal and Ubiquitous Computing 8, 3 (July 2004), 234–240. https://doi.org/10.1007/s00779-004-0283-x
[53]
Robert V. Labaree. 2009. Research Guides: Organizing Your Social Sciences Research Paper: 5. The Literature Review. (2009).
[54]
Roxanne Leitão. 2019. Anticipating Smart Home Security and Privacy Threats with Survivors of Intimate Partner Abuse. In Proceedings of the 2019 on Designing Interactive Systems Conference(DIS ’19). Association for Computing Machinery, New York, NY, USA, 527–539. https://doi.org/10.1145/3322276.3322366
[55]
Brian Y. Lim, Anind K. Dey, and Daniel Avrahami. 2009. Why and why not explanations improve the intelligibility of context-aware intelligent systems. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI ’09). Association for Computing Machinery, Boston, MA, USA, 2119–2128. https://doi.org/10.1145/1518701.1519023
[56]
Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera, Serge Egelman, and David Wagner. 2019. Privacy Attitudes of Smart Speaker Users. Proceedings on Privacy Enhancing Technologies 2019, 4(2019), 250–271.
[57]
Shrirang Mare, Logan Girvin, Franziska Roesner, and Tadayoshi Kohno. 2019. Consumer Smart Homes: Where We Are and Where We Need to Go. In Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications(HotMobile ’19). Association for Computing Machinery, Santa Cruz, CA, USA, 117–122. https://doi.org/10.1145/3301293.3302371
[58]
Michelle L. Mazurek, J. P. Arsenault, Joanna Bresee, Nitin Gupta, Iulia Ion, Christina Johns, Daniel Lee, Yuan Liang, Jenny Olsen, Brandon Salmon, Richard Shay, Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Gregory R. Ganger, and Michael K. Reiter. 2010. Access Control for Home Data Sharing: Attitudes, Needs and Practices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI ’10). Association for Computing Machinery, Atlanta, Georgia, USA, 645–654. https://doi.org/10.1145/1753326.1753421
[59]
Michelle L. Mazurek, Peter F. Klemperer, Richard Shay, Hassan Takabi, Lujo Bauer, and Lorrie Faith Cranor. 2011. Exploring reactive access control. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI ’11). Association for Computing Machinery, Vancouver, BC, Canada, 2085–2094. https://doi.org/10.1145/1978942.1979245
[60]
Mary L. McHugh. 2012. Interrater reliability: the kappa statistic. Biochemia medica: Biochemia medica 22, 3 (2012), 276–282. Publisher: Medicinska naklada.
[61]
Sarah Mennicken and Elaine M. Huang. 2012. Hacking the Natural Habitat: An In-the-Wild Study of Smart Homes, Their Development, and the People Who Live in Them. In Pervasive Computing(Lecture Notes in Computer Science), Judy Kay, Paul Lukowicz, Hideyuki Tokuda, Patrick Olivier, and Antonio Krüger(Eds.). Springer, Berlin, Heidelberg, 143–160. https://doi.org/10.1007/978-3-642-31205-2_10
[62]
Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman Sadeh. 2017. Privacy expectations and preferences in an IoT world. In Thirteenth Symposium on Usable Privacy and Security (${$SOUPS$}$ 2017). 399–412.
[63]
David H. Nguyen, Alfred Kobsa, and Gillian R. Hayes. 2008. An empirical investigation of concerns of everyday tracking and recording technologies. In Proceedings of the 10th international conference on Ubiquitous computing. Association for Computing Machinery, New York, NY, USA, 182–191. https://doi.org/10.1145/1409635.1409661
[64]
Norbert Nthala and Ivan Flechais. 2018. Informal support networks: an investigation into home data security practices. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). 63–82.
[65]
Norbert Nthala and Emilee Rader. 2020. Towards a Conceptual Model for Provoking Privacy Speculation. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems(CHI EA ’20). Association for Computing Machinery, New York, NY, USA, 1–8. https://doi.org/10.1145/3334480.3382815
[66]
Antti Oulasvirta, Aurora Pihlajamaa, Jukka Perkiö, Debarshi Ray, Taneli Vähäkangas, Tero Hasu, Niklas Vainio, and Petri Myllymäki. 2012. Long-term effects of ubiquitous surveillance in the home. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing(UbiComp ’12). Association for Computing Machinery, Pittsburgh, Pennsylvania, 41–50. https://doi.org/10.1145/2370216.2370224
[67]
Leysia Palen and Paul Dourish. 2003. Unpacking ”privacy” for a networked world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI ’03). Association for Computing Machinery, Ft. Lauderdale, Florida, USA, 129–136. https://doi.org/10.1145/642611.642635
[68]
Erika Shehan Poole, Marshini Chetty, Rebecca E. Grinter, and W. Keith Edwards. 2008. More than meets the eye: transforming the user experience of home network management. In Proceedings of the 7th ACM conference on Designing interactive systems(DIS ’08). Association for Computing Machinery, Cape Town, South Africa, 455–464. https://doi.org/10.1145/1394445.1394494
[69]
Dave Randall. 2003. Living Inside a Smart Home: A Case Study. In Inside the Smart Home, Richard Harper (Ed.). Springer, London, 227–246. https://doi.org/10.1007/1-85233-854-7_12
[70]
John P. Robinson, Phillip R. Shaver, and Lawrence S. Wrightsman. 2013. Measures of personality and social psychological attitudes: Measures of social psychological attitudes. Vol. 1. Academic Press.
[71]
Eyal Ronen and Adi Shamir. 2016. Extended Functionality Attacks on IoT Devices: The Case of Smart Lights. In 2016 IEEE European Symposium on Security and Privacy (EuroS P). 3–12. https://doi.org/10.1109/EuroSP.2016.13
[72]
Erika Shehan and W. Keith Edwards. 2007. Home networking and HCI: what hath god wrought?. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI ’07). Association for Computing Machinery, San Jose, California, USA, 547–556. https://doi.org/10.1145/1240624.1240712
[73]
Dale Smith. 2020. Fix 3 common Google Home music glitches before they happen. https://www.cnet.com/how-to/fix-3-common-google-home-music-glitches-before-they-happen/
[74]
Daniel J. Solove. 2008. Understanding privacy. (2008).
[75]
Ashkan Soltani. 2019. Abusability testing: Considering the ways your technology might be used for harm. In Enigma 2019 (Enigma 2019).
[76]
David W. Stewart, David W. Stewart, and Michael A. Kamins. 1993. Secondary research: Information sources and methods. Vol. 4. Sage.
[77]
Elizabeth A. Suter. 2000. Focus groups in ethnography of communication: Expanding topics of inquiry beyond participant observation. The Qualitative Report 5, 1 (2000), 1–14.
[78]
Peter Tolmie, Andy Crabtree, Tom Rodden, Chris Greenhalgh, and Steve Benford. 2007. Making the home network at home: Digital housekeeping. In ECSCW 2007, Liam J. Bannon, Ina Wagner, Carl Gutwin, Richard H. R. Harper, and Kjeld Schmidt (Eds.). Springer, London, 331–350. https://doi.org/10.1007/978-1-84800-031-5_18
[79]
Daphne Townsend, Frank Knoefel, and Rafik Goubran. 2011. Privacy versus autonomy: A tradeoff model for smart home monitoring technologies. In 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society. 4749–4752. https://doi.org/10.1109/IEMBS.2011.6091176 ISSN: 1558-4615.
[80]
Alexander Tsesis. 2014. The right to erasure: Privacy, data brokers, and the indefinite retention of data. Wake Forest L. Rev. 49(2014), 433. Publisher: HeinOnline.
[81]
Blase Ur, Jaeyeon Jung, and Stuart Schechter. 2013. The current state of access control for smart devices in homes. In Workshop on Home Usable Privacy and Security (HUPS), Vol. 29. HUPS 2014, 209–218.
[82]
Blase Ur, Jaeyeon Jung, and Stuart Schechter. 2014. Intruders versus intrusiveness: teens’ and parents’ perspectives on home-entryway surveillance. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 129–139.
[83]
Mojtaba Vaismoradi, Hannele Turunen, and Terese Bondas. 2013. Content analysis and thematic analysis: Implications for conducting a qualitative descriptive study. Nursing & Health Sciences 15, 3 (2013), 398–405. https://doi.org/10.1111/nhs.12048 _eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1111/nhs.12048.
[84]
Rick Wash and Emilee Rader. 2015. Too much knowledge? security beliefs and protective behaviors among united states internet users. In Eleventh Symposium On Usable Privacy and Security (${$SOUPS$}$ 2015). 309–325.
[85]
Meredydd Williams, Jason RC Nurse, and Sadie Creese. 2017. Privacy is the boring bit: user perceptions and behaviour in the Internet-of-Things. In 2017 15th Annual Conference on Privacy, Security and Trust (PST). IEEE, 181–18109.
[86]
Charlie Wilson, Tom Hargreaves, and Richard Hauxwell-Baldwin. 2015. Smart homes and their users: a systematic analysis and key challenges. Personal and Ubiquitous Computing 19, 2 (2015), 463–476.
[87]
Charlie Wilson, Tom Hargreaves, and Richard Hauxwell-Baldwin. 2017. Benefits and risks of smart home technologies. Energy Policy 103(2017), 72–83.
[88]
Jong-bum Woo and Youn-kyung Lim. 2015. User experience in do-it-yourself-style smart homes. In Proceedings of the 2015 ACM international joint conference on pervasive and ubiquitous computing. ACM, 779–790.
[89]
Allison Woodruff, Sally Augustin, and Brooke Foucault. 2007. Sabbath day home automation: ”it’s like mixing technology and religion”. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI ’07). Association for Computing Machinery, San Jose, California, USA, 527–536. https://doi.org/10.1145/1240624.1240710
[90]
Rayoung Yang and Mark W. Newman. 2013. Learning from a learning thermostat: lessons for intelligent systems for the home. In Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing(UbiComp ’13). Association for Computing Machinery, Zurich, Switzerland, 93–102. https://doi.org/10.1145/2493432.2493489
[91]
Robert K. Yin. 2015. Qualitative research from start to finish. Guilford publications.
[92]
Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End user security and privacy concerns with smart homes. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). 65–80.
[93]
Eric Zeng and Franziska Roesner. 2019. Understanding and improving security and privacy in multi-user smart homes: a design exploration and in-home user study. In 28th USENIX Security Symposium (USENIX Security 19). 159–176.
[94]
Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. 2018. User perceptions of smart home IoT privacy. Proceedings of the ACM on Human-Computer Interaction 2, CSCW(2018), 200.

Cited By

View all
  • (2024)Conception of Smartness: A Design Research on User Experience of Smart ArtifactsHuman Behavior and Emerging Technologies10.1155/2024/44257342024:1Online publication date: 3-Oct-2024
  • (2024)Moat: Adaptive Inside/Outside Detection System for Smart HomesProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36997518:4(1-31)Online publication date: 21-Nov-2024
  • (2024)Exploration of User Perspectives around Software and Data-Related Challenges Associated with IoT Repair and Maintenance against Obsolescence: User Study on Software and Data Interactions and Considerations for IoT Repair and Maintenance against ObsolescenceProceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685383(1-17)Online publication date: 13-Oct-2024
  • Show More Cited By

Index Terms

  1. “It did not give me an option to decline”: A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '21: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems
    May 2021
    10862 pages
    ISBN:9781450380966
    DOI:10.1145/3411764
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 May 2021

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. longitudinal study
    2. privacy
    3. qualitative study
    4. security
    5. smart home
    6. user experience

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    CHI '21
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Upcoming Conference

    CHI '25
    CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)282
    • Downloads (Last 6 weeks)25
    Reflects downloads up to 25 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Conception of Smartness: A Design Research on User Experience of Smart ArtifactsHuman Behavior and Emerging Technologies10.1155/2024/44257342024:1Online publication date: 3-Oct-2024
    • (2024)Moat: Adaptive Inside/Outside Detection System for Smart HomesProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36997518:4(1-31)Online publication date: 21-Nov-2024
    • (2024)Exploration of User Perspectives around Software and Data-Related Challenges Associated with IoT Repair and Maintenance against Obsolescence: User Study on Software and Data Interactions and Considerations for IoT Repair and Maintenance against ObsolescenceProceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685383(1-17)Online publication date: 13-Oct-2024
    • (2024)Dr. Convenience Love or: How I Learned to Stop Worrying and Love my Voice Assistant✱Proceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685364(1-14)Online publication date: 13-Oct-2024
    • (2024)Exploring Users' Mental Models and Privacy Concerns During Interconnected InteractionsProceedings of the ACM on Human-Computer Interaction10.1145/36765048:MHCI(1-23)Online publication date: 24-Sep-2024
    • (2024)Manual, Hybrid, and Automatic Privacy Covers for Smart Home CamerasProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661569(3453-3470)Online publication date: 1-Jul-2024
    • (2024)Designing Interactive Privacy Labels for Advanced Smart Home Device Configuration OptionsProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661527(3372-3388)Online publication date: 1-Jul-2024
    • (2024)Do You Need to Touch? Exploring Correlations between Personal Attributes and Preferences for Tangible Privacy MechanismsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642863(1-23)Online publication date: 11-May-2024
    • (2024)SoK: Technical Implementation and Human Impact of Internet Privacy Regulations2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00206(673-696)Online publication date: 19-May-2024
    • (2024)A Room With an Overview: Toward Meaningful Transparency for the Consumer Internet of ThingsIEEE Internet of Things Journal10.1109/JIOT.2023.331836911:5(7583-7603)Online publication date: 1-Mar-2024
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media