Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3544548.3581167acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Investigating Tangible Privacy-Preserving Mechanisms for Future Smart Homes

Published: 19 April 2023 Publication History

Abstract

Most smart home devices have multiple sensors, such as cameras and microphones; however, most cannot be controlled individually. Tangible privacy mechanisms provide control over individual sensors and instill high certainty of privacy. Yet, it remains unclear how they can be used in future smart homes. We conducted three studies to understand how tangible privacy mechanisms scale across multiple devices and respond to user needs. First, we conducted a focus group (N=8) on speculative tangible control artifacts to understand the user perspective. Second, we ran a workshop at a human-computer interaction conference (N=8) on tangible privacy. Third, we conducted a six-week in-the-wild study with a tangible, static privacy dashboard across six households. Our findings help to contrast the need for tangible privacy mechanisms on the sensor level with user needs on a smart home level. Finally, we discuss our design implications for future smart homes through the lens of inclusive privacy.

Supplementary Material

Supplemental Materials (3544548.3581167-supplemental-materials.zip)
MP4 File (3544548.3581167-talk-video.mp4)
Pre-recorded Video Presentation
MP4 File (3544548.3581167-video-preview.mp4)
Video Preview
MP4 File (3544548.3581167-video-figure.mp4)
Video Figure

References

[1]
Imtiaz Ahmad, Rosta Farzan, Apu Kapadia, and Adam J. Lee. 2020. Tangible Privacy: Towards User-Centric Sensor Designs for Bystander Privacy. Proc. ACM Hum.-Comput. Interact. 4, CSCW2, Article 116 (oct 2020), 28 pages. https://doi.org/10.1145/3415187
[2]
Noah Apthorpe, Dillon Reisman, and Nick Feamster. 2016. A smart home is no castle: Privacy vulnerabilities of encrypted iot traffic. Workshop on Data and Algorithmic Transparency (2016).
[3]
Noah Apthorpe, Dillon Reisman, Srikanth Sundaresan, Arvind Narayanan, and Nick Feamster. 2017. Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic. arXiv preprint arXiv:1708.05044(2017).
[4]
Abdullahi Arabo, Ian Brown, and Fadi El-Moussa. 2012. Privacy in the Age of Mobility and Smart Devices in Smart Homes. In 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing. 819–826. https://doi.org/10.1109/SocialCom-PASSAT.2012.108
[5]
Natã M Barbosa, Joon S Park, Yaxing Yao, and Yang Wang. 2019. “What if?” Predicting Individual Users’ Smart Home Privacy Preferences and Their Changes. Proceedings on Privacy Enhancing Technologies 2019, 4(2019), 211–231. https://doi.org/10.2478/popets-2019-0066
[6]
Florian Bemmann, Maximiliane Windl, Jonas Erbe, Sven Mayer, and Heinrich Hussmann. 2022. The Influence of Transparency and Control on the Willingness of Data Sharing in Adaptive Mobile Apps. Proc. ACM Hum.-Comput. Interact. 6, MHCI, Article 189 (sep 2022), 26 pages. https://doi.org/10.1145/3546724
[7]
Ann Blandford, Dominic Furniss, and Stephann Makri. 2016. Qualitative HCI Research: Going Behind the Scenes. Morgan & Claypool Publishers, 51–60. https://doi.org/10.2200/S00706ED1V01Y201602HCI034
[8]
Joseph Bugeja, Andreas Jacobsson, and Paul Davidsson. 2016. On privacy and security challenges in smart connected homes. In 2016 European Intelligence and Security Informatics Conference(EISIC, 16). IEEE, 172–175. https://doi.org/10.1109/EISIC.2016.044
[9]
George Chalhoub, Martin J Kraemer, Norbert Nthala, and Ivan Flechais. 2021. “It Did Not Give Me an Option to Decline”: A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products. Association for Computing Machinery, New York, NY, USA. https://doi.org/10.1145/3411764.3445691
[10]
Yuxin Chen, Huiying Li, Shan-Yuan Teng, Steven Nagels, Zhijing Li, Pedro Lopes, Ben Y. Zhao, and Haitao Zheng. 2020. Wearable Microphone Jamming. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–12. https://doi.org/10.1145/3313831.3376304
[11]
Eun Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly Harrison, Shwetak N. Patel, and Julie A. Kientz. 2012. Investigating Receptiveness to Sensing and Inference in the Home Using Sensor Proxies. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (Pittsburgh, Pennsylvania) (UbiComp ’12). Association for Computing Machinery, New York, NY, USA, 61–70. https://doi.org/10.1145/2370216.2370226
[12]
Jessica Colnago, Yuanyuan Feng, Tharangini Palanivel, Sarah Pearman, Megan Ung, Alessandro Acquisti, Lorrie Faith Cranor, and Norman Sadeh. 2020. Informing the Design of a Personalized Privacy Assistant for the Internet of Things. Association for Computing Machinery, New York, NY, USA, 1–13. https://doi.org/10.1145/3313831.3376389
[13]
Sarah Delgado Rodriguez, Sarah Prange, and Florian Alt. 2021. Take Your Security and Privacy Into Your Own Hands! Why Security and Privacy Assistants Should be Tangible. In Mensch und Computer 2021 - Workshopband, Carolin Wienrich, Philipp Wintersberger, and Benjamin Weyers (Eds.). Gesellschaft für Informatik e.V., Bonn. https://doi.org/10.18420/muc2021-mci-ws09-393
[14]
Youngwook Do, Jung Wook Park, Yuxi Wu, Avinandan Basu, Dingtian Zhang, Gregory D. Abowd, and Sauvik Das. 2022. Smart Webcam Cover: Exploring the Design of an Intelligent Webcam Cover to Improve Usability and Trust. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5, 4, Article 154 (dec 2022), 21 pages. https://doi.org/10.1145/3494983
[15]
Anthony Dunne and Fiona Raby. 2013. Speculative everything: design, fiction, and social dreaming. MIT press.
[16]
Yuanyuan Feng, Yaxing Yao, and Norman Sadeh. 2021. A Design Space for Privacy Choices: Towards Meaningful Privacy Control in the Internet of Things. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (Yokohama, Japan) (CHI ’21). Association for Computing Machinery, New York, NY, USA, Article 64, 16 pages. https://doi.org/10.1145/3411764.3445148
[17]
Susanne Friese. 2020. Inter-Coder Agreement Analysis. http://downloads.atlasti.com/docs/ICA_a8_mac_en.pdf Accessed: 2022-12-12.
[18]
Nina Gerber, Paul Gerber, Hannah Drews, Elisa Kirchner, Noah Schlegel, Tim Schmidt, and Lena Scholz. 2018. FoxIT: Enhancing Mobile Users’ Privacy Behavior by Increasing Knowledge and Awareness. In Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust(Orlando, Florida, USA) (STAST ’17). Association for Computing Machinery, New York, NY, USA, 53–63. https://doi.org/10.1145/3167996.3167999
[19]
Nina Gerber, Benjamin Reinheimer, and Melanie Volkamer. 2018. Home Sweet Home? Investigating Users’ Awareness of Smart Home Privacy Threats. In Proceedings of An Interactive Workshop on the Human aspects of Smarthome Security and Privacy (WSSP). USENIX, Baltimore, MD, USA. https://doi.org/10.5445/IR/1000083578
[20]
Hana Habib, Yixin Zou, Yaxing Yao, Alessandro Acquisti, Lorrie Cranor, Joel Reidenberg, Norman Sadeh, and Florian Schaub. 2021. Toggles, Dollar Signs, and Triangles: How to (In)Effectively Convey Privacy Choices with Icons and Link Texts. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (Yokohama, Japan) (CHI ’21). Association for Computing Machinery, New York, NY, USA, Article 63, 25 pages. https://doi.org/10.1145/3411764.3445387
[21]
Woodrow Hartzog. 2018. The case against idealising control. Eur. Data Prot. L. Rev. 4 (2018), 423.
[22]
Corey Brian Jackson and Yang Wang. 2018. Addressing The Privacy Paradox through Personalized Privacy Notifications. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 2, Article 68 (jul 2018), 25 pages. https://doi.org/10.1145/3214271
[23]
Yunhan Jack Jia, Qi Alfred Chen, Shiqi Wang, Amir Rahmati, Earlence Fernandes, Zhuoqing Morley Mao, Atul Prakash, and SJ Unviersity. 2017. ContexloT: Towards providing contextual integrity to appified IoT platforms. In NDSS, Vol. 2. San Diego, 2–2.
[24]
Haojian Jin, Boyuan Guo, Rituparna Roychoudhury, Yaxing Yao, Swarun Kumar, Yuvraj Agarwal, and Jason I. Hong. 2022. Exploring the Needs of Users for Supporting Privacy-Protective Behaviors in Smart Homes. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems (New Orleans, LA, USA) (CHI ’22). Association for Computing Machinery, New York, NY, USA, Article 449, 19 pages. https://doi.org/10.1145/3491102.3517602
[25]
Patrick Gage Kelley, Lucian Cesca, Joanna Bresee, and Lorrie Faith Cranor. 2010. Standardizing Privacy Notices: An Online Study of the Nutrition Label Approach. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Atlanta, Georgia, USA) (CHI ’10). ACM, New York, NY, USA, 1573–1582. https://doi.org/10.1145/1753326.1753561
[26]
Nari Kim, Juntae Kim, Bomin Kim, and Young-Woo Park. 2021. The Trial of Posit in Shared Offices: Controlling Disclosure Levels of Schedule Data for Privacy by Changing the Placement of a Personal Interactive Calendar. In Designing Interactive Systems Conference 2021 (Virtual Event, USA) (DIS ’21). Association for Computing Machinery, New York, NY, USA, 149–159. https://doi.org/10.1145/3461778.3462073
[27]
Jacob Leon Kröger, Otto Hans-Martin Lutz, and Stefan Ullrich. 2021. The myth of individual control: Mapping the limitations of privacy self-management. Available at SSRN (2021).
[28]
Hyosun Kwon, Joel E Fischer, Martin Flintham, and James Colley. 2018. The connected shower: Studying intimate data in everyday life. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 4 (2018), 1–22.
[29]
Evan Lafontaine, Aafaq Sabir, and Anupam Das. 2021. Understanding People’s Attitude and Concerns towards Adopting IoT Devices. In Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems(CHI’21). Association for Computing Machinery, New York, NY, USA, Article 307, 10 pages. https://doi.org/10.1145/3411763.3451633
[30]
Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, Are You Listening? Privacy Perceptions, Concerns and Privacy-Seeking Behaviors with Smart Speakers. Proc. ACM Hum.-Comput. Interact. 2, CSCW, Article 102 (nov 2018), 31 pages. https://doi.org/10.1145/3274371
[31]
Roxanne Leitão. 2019. In Proceedings of the 2019 on Designing Interactive Systems Conference (San Diego, CA, USA) (DIS ’19). Association for Computing Machinery, New York, NY, USA, 527–539. https://doi.org/10.1145/3322276.3322366
[32]
Huichen Lin and Neil W. Bergmann. 2016. IoT Privacy and Security Challenges for Smart Home Environments. Information 7, 3 (2016). https://doi.org/10.3390/info7030044
[33]
Michal Luria, Guy Hoffman, and Oren Zuckerman. 2017. Comparing Social Robot, Screen and Voice Interfaces for Smart-Home Control. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (Denver, Colorado, USA) (CHI ’17). Association for Computing Machinery, New York, NY, USA, 580–628. https://doi.org/10.1145/3025453.3025786
[34]
Nathan Malkin, Julia Bernd, Maritza Johnson, and Serge Egelman. 2018. “What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the US. In Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC), London, UK. https://doi.org/10.14722/eurousec.2018.23016
[35]
Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera, Serge Egelman, and David Wagner. 2019. Privacy attitudes of smart speaker users. Proceedings on Privacy Enhancing Technologies 2019, 4(2019). https://doi.org/10.2478/popets-2019-0068
[36]
Shrirang Mare, Franziska Roesner, and Tadayoshi Kohno. 2020. Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts. Proceedings on Privacy Enhancing Technologies 2020, 2(2020), 436–458. https://doi.org/
[37]
Karola Marky, Alexandra Voit, Alina Stöver, Kai Kunze, Svenja Schröder, and Max Mühlhäuser. 2020. ”I Don’t Know How to Protect Myself”: Understanding Privacy Perceptions Resulting from the Presence of Bystanders in Smart Environments. In Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society (Tallinn, Estonia) (NordiCHI ’20). Association for Computing Machinery, New York, NY, USA, Article 4, 11 pages. https://doi.org/10.1145/3419249.3420164
[38]
Emily McReynolds, Sarah Hubbard, Timothy Lau, Aditya Saraf, Maya Cakmak, and Franziska Roesner. 2017. Toys That Listen: A Study of Parents, Children, and Internet-Connected Toys. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (Denver, Colorado, USA) (CHI ’17). Association for Computing Machinery, New York, NY, USA, 5197–5207. https://doi.org/10.1145/3025453.3025735
[39]
Vikram Mehta. 2019. Tangible Interactions for Privacy Management. In Proceedings of the Thirteenth International Conference on Tangible, Embedded, and Embodied Interaction (Tempe, Arizona, USA) (TEI ’19). Association for Computing Machinery, New York, NY, USA, 723–726. https://doi.org/10.1145/3294109.3302934
[40]
Vikram Mehta, Daniel Gooch, Arosha Bandara, Blaine Price, and Bashar Nuseibeh. 2021. Privacy Care: A Tangible Interaction Framework for Privacy Management. ACM Trans. Internet Technol. 21, 1, Article 25 (feb 2021), 32 pages. https://doi.org/10.1145/3430506
[41]
Jaron Mink, Amanda Rose Yuile, Uma Pal, Adam J Aviv, and Adam Bates. 2022. Users Can Deduce Sensitive Locations Protected by Privacy Zones on Fitness Tracking Apps. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems (New Orleans, LA, USA) (CHI ’22). Association for Computing Machinery, New York, NY, USA, Article 448, 21 pages. https://doi.org/10.1145/3491102.3502136
[42]
Andrés Molina-Markham, Prashant Shenoy, Kevin Fu, Emmanuel Cecchet, and David Irwin. 2010. Private Memoirs of a Smart Meter. In Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building (Zurich, Switzerland) (BuildSys ’10). Association for Computing Machinery, New York, NY, USA, 61–66. https://doi.org/10.1145/1878431.1878446
[43]
Simon Moncrieff, Svetha Venkatesh, and Geoff West. 2007. Dynamic Privacy in a Smart House Environment. In 2007 IEEE International Conference on Multimedia and Expo. 2034–2037. https://doi.org/10.1109/ICME.2007.4285080
[44]
Mainack Mondal, Günce Su Yilmaz, Noah Hirsch, Mohammad Taha Khan, Michael Tang, Christopher Tran, Chris Kanich, Blase Ur, and Elena Zheleva. 2019. Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (London, United Kingdom) (CCS ’19). Association for Computing Machinery, New York, NY, USA, 991–1008. https://doi.org/10.1145/3319535.3354202
[45]
David H. Nguyen, Alfred Kobsa, and Gillian R. Hayes. 2008. An Empirical Investigation of Concerns of Everyday Tracking and Recording Technologies. In Proceedings of the 10th International Conference on Ubiquitous Computing (Seoul, Korea) (UbiComp ’08). Association for Computing Machinery, New York, NY, USA, 182–191. https://doi.org/10.1145/1409635.1409661
[46]
Helen Nissenbaum. 2004. Privacy as contextual integrity. Washington Law Review 79(2004), 119–158.
[47]
Johannes Obermaier and Martin Hutle. 2016. Analyzing the Security and Privacy of Cloud-Based Video Surveillance Systems. In Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security (Xi’an, China) (IoTPTS ’16). Association for Computing Machinery, New York, NY, USA, 22–28. https://doi.org/10.1145/2899007.2899008
[48]
Robert W. Reeder, Patrick Gage Kelley, Aleecia M. McDonald, and Lorrie Faith Cranor. 2008. A User Study of the Expandable Grid Applied to P3P Privacy Policy Visualization. In Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society (Alexandria, Virginia, USA) (WPES ’08). Association for Computing Machinery, New York, NY, USA, 45–54. https://doi.org/10.1145/1456403.1456413
[49]
Sarah Delgado Rodriguez, Sarah Prange, Christina Vergara Ossenberg, Markus Henkel, Florian Alt, and Karola Marky. 2022. PriKey – Investigating Tangible Privacy Control for Smart Home Inhabitants and Visitors. In Proceedings of the 12th Nordic Conference on Human-Computer Interaction: (Denmark) (NordiCHI ’22). Association for Computing Machinery, New York, NY, USA. http://www.florian-alt.org/unibw/wp-content/publications/delgado2022nordichi.pdfdelgado2022nordichi.
[50]
Tanuja Singh and Mark E Hill. 2003. Consumer privacy and the Internet in Europe: a view from Germany. Journal of consumer marketing(2003).
[51]
Stephen Snow, Awais Hameed Khan, Mashhuda Glencross, and Neil Horrocks. 2021. Neighbourhood Wattch: Using Speculative Design to Explore Values Around Curtailment and Consent in Household Energy Interactions. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (Yokohama, Japan) (CHI ’21). Association for Computing Machinery, New York, NY, USA, Article 643, 12 pages. https://doi.org/10.1145/3411764.3445095
[52]
Eleftherios Spyromitros-Xioufis, Symeon Papadopoulos, Adrian Popescu, and Yiannis Kompatsiaris. 2016. Personalized Privacy-Aware Image Classification. In Proceedings of the 2016 ACM on International Conference on Multimedia Retrieval (New York, New York, USA) (ICMR ’16). Association for Computing Machinery, New York, NY, USA, 71–78. https://doi.org/10.1145/2911996.2912018
[53]
Christian Tiefenau, Maximilian Häring, Eva Gerlitz, and Emanuel von Zezschwitz. 2019. Making Privacy Graspable: Can we Nudge Users to use Privacy Enhancing Techniques?https://doi.org/10.48550/ARXIV.1911.07701
[54]
Yang Wang. 2018. Inclusive security and privacy. IEEE Security & Privacy 16, 4 (2018), 82–87.
[55]
Maximiliane Windl, Niels Henze, Albrecht Schmidt, and Sebastian S. Feger. 2022. Automating Contextual Privacy Policies: Design and Evaluation of a Production Tool for Digital Consumer Privacy Awareness. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems (New Orleans, LA, USA) (CHI ’22). Association for Computing Machinery, New York, NY, USA, Article 34, 18 pages. https://doi.org/10.1145/3491102.3517688
[56]
Maximiliane Windl, Alexander Hiesinger, Robin Welsch, Albrecht Schmidt, and Sebastian S. Feger. 2022. SaferHome: Interactive Physical and Digital Smart Home Dashboards for Communicating Privacy Assessments to Owners and Bystanders. Proc. ACM Hum.-Comput. Interact. 6, ISS, Article 586 (nov 2022), 20 pages. https://doi.org/10.1145/3567739
[57]
Maximiliane Windl and Sven Mayer. 2022. The Skewed Privacy Concerns of Bystanders in Smart Environments. Proc. ACM Hum.-Comput. Interact. 6, MHCI, Article 184 (sep 2022), 21 pages. https://doi.org/10.1145/3546719
[58]
Xiaokui Xiao and Yufei Tao. 2006. Personalized Privacy Preservation. In Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data (Chicago, IL, USA) (SIGMOD ’06). Association for Computing Machinery, New York, NY, USA, 229–240. https://doi.org/10.1145/1142473.1142500
[59]
Yaxing Yao, Justin Reed Basdeo, Smirity Kaushik, and Yang Wang. 2019. Defending My Castle: A Co-Design Study of Privacy Mechanisms for Smart Homes. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI ’19). Association for Computing Machinery, New York, NY, USA, 1–12. https://doi.org/10.1145/3290605.3300428
[60]
Yaxing Yao, Justin Reed Basdeo, Oriana Rosata Mcdonough, and Yang Wang. 2019. Privacy Perceptions and Designs of Bystanders in Smart Homes. Proc. ACM Hum.-Comput. Interact. 3, CSCW, Article 59 (nov 2019), 24 pages. https://doi.org/10.1145/3359161
[61]
Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. 2018. User Perceptions of Smart Home IoT Privacy. Proc. ACM Hum.-Comput. Interact. 2, CSCW, Article 200 (nov 2018), 20 pages. https://doi.org/10.1145/3274469

Cited By

View all
  • (2024)Privacy communication patterns for domestic robotsProceedings of the Twentieth USENIX Conference on Usable Privacy and Security10.5555/3696899.3696906(121-138)Online publication date: 12-Aug-2024
  • (2024)Dr. Convenience Love or: How I Learned to Stop Worrying and Love my Voice Assistant✱Proceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685364(1-14)Online publication date: 13-Oct-2024
  • (2024)How to Respect Bystanders' Privacy in Smart Homes - A Co-Creation StudyProceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685340(1-19)Online publication date: 13-Oct-2024
  • Show More Cited By

Index Terms

  1. Investigating Tangible Privacy-Preserving Mechanisms for Future Smart Homes

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '23: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems
    April 2023
    14911 pages
    ISBN:9781450394215
    DOI:10.1145/3544548
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 19 April 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Configurable Smart Devices
    2. Inclusive Privacy
    3. Privacy
    4. Speculative Design
    5. Tangible Privacy Spectrum.

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    CHI '23
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Upcoming Conference

    CHI 2025
    ACM CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)546
    • Downloads (Last 6 weeks)32
    Reflects downloads up to 29 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Privacy communication patterns for domestic robotsProceedings of the Twentieth USENIX Conference on Usable Privacy and Security10.5555/3696899.3696906(121-138)Online publication date: 12-Aug-2024
    • (2024)Dr. Convenience Love or: How I Learned to Stop Worrying and Love my Voice Assistant✱Proceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685364(1-14)Online publication date: 13-Oct-2024
    • (2024)How to Respect Bystanders' Privacy in Smart Homes - A Co-Creation StudyProceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685340(1-19)Online publication date: 13-Oct-2024
    • (2024)Exploring Users' Mental Models and Privacy Concerns During Interconnected InteractionsProceedings of the ACM on Human-Computer Interaction10.1145/36765048:MHCI(1-23)Online publication date: 24-Sep-2024
    • (2024)Manual, Hybrid, and Automatic Privacy Covers for Smart Home CamerasProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661569(3453-3470)Online publication date: 1-Jul-2024
    • (2024)Designing Interactive Privacy Labels for Advanced Smart Home Device Configuration OptionsProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661527(3372-3388)Online publication date: 1-Jul-2024
    • (2024)Bring Privacy To The Table: Interactive Negotiation for Privacy Settings of Shared Sensing DevicesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642897(1-22)Online publication date: 11-May-2024
    • (2024)Do You Need to Touch? Exploring Correlations between Personal Attributes and Preferences for Tangible Privacy MechanismsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642863(1-23)Online publication date: 11-May-2024
    • (2024)Decide Yourself or Delegate - User Preferences Regarding the Autonomy of Personal Privacy Assistants in Private IoT-Equipped EnvironmentsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642591(1-20)Online publication date: 11-May-2024
    • (2024)More than just informed: The importance of consent facets in smart homesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642288(1-21)Online publication date: 11-May-2024
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media