Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article
Public Access

Privacy Perceptions and Designs of Bystanders in Smart Homes

Published: 07 November 2019 Publication History

Abstract

As the Internet of Things (IoT) devices make their ways into people's homes, traditional dwellings are turning into smart homes. While prior empirical studies have examined people's privacy concerns of smart homes and their desired ways of mitigating these concerns, the focus was primarily on the end users or device owners. Our research investigated the privacy perceptions and design ideas of smart home bystanders, i.e., people who are not the owners nor the primary users of smart home devices but can potentially be involved in the device usage, such as other family members or guests. We conducted focus groups and co-design activities with eighteen participants. We identified three impacting factors of bystanders' privacy perceptions (e.g., perceived norms) and a number of design factors to mitigate their privacy concerns (e.g., asking for device control). We highlighted bystanders' needs for privacy and controls, as well as the tension of privacy expectations between the owners/users and the bystanders in smart homes. We discussed how future designs can better support and balance the privacy needs of different stakeholders in smart homes.

References

[1]
Noah Apthorpe, Dillon Reisman, and Nick Feamster. 2017. A smart home is no castle: Privacy vulnerabilities of encrypted IoT traffic. arXiv preprint arXiv:1705.06805 (2017).
[2]
Noah Apthorpe, Dillon Reisman, Srikanth Sundaresan, Arvind Narayanan, and Nick Feamster. 2017. Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic. arXiv preprint arXiv:1708.05044 (2017).
[3]
Noah Apthorpe, Yan Shvartzshnaider, Arunesh Mathur, Dillon Reisman, and Nick Feamster. 2018. Discovering Smart Home Internet of Things Privacy Norms Using Contextual Integrity. arXiv preprint arXiv:1805.06031 (2018).
[4]
Abdullahi Arabo, Ian Brown, and Fadi El-Moussa. 2012. Privacy in the age of mobility and smart devices in smart homes. In Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom). IEEE, 819--826.
[5]
Andrew Besmer and Heather Richter Lipford. 2010. Moving beyond untagging: photo privacy in a tagged world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1563--1572.
[6]
Richard E Boyatzis. 1998. Transforming qualitative information: Thematic analysis and code development. sage.
[7]
Joseph Bugeja, Andreas Jacobsson, and Paul Davidsson. 2016. On privacy and security challenges in smart connected homes. In Intelligence and Security Informatics Conference (EISIC), 2016 European. IEEE, 172--175.
[8]
Antorweep Chakravorty, Tomasz Wlodarczyk, and Chunming Rong. 2013. Privacy preserving data analytics for smart homes. In Security and Privacy Workshops (SPW), 2013 IEEE. IEEE, 23--27.
[9]
Andria Cheng. 2018. Amazon-Marriott Deal Will Make Alexa A Hotel Butler, But The Implications Range Far Wider. (Jun 2018). https://www.forbes.com/sites/andriacheng/2018/06/19/ amazons-marriott-deal-is-way-beyond-alexa-as-your-new-hotelbutler/#22b53db9721e
[10]
Federal Trade Commission et al. 2015. Internet of Things: Privacy & security in a connected world. Washington, DC: Federal Trade Commission (2015).
[11]
Anupam Das, Martin Degeling, Daniel Smullen, and Norman Sadeh. 2018. Personalized Privacy Assistants for the Internet of Things. (2018).
[12]
Trisha Datta, Noah Apthorpe, and Nick Feamster. 2018. A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation. In Proceedings of the 2018 Workshop on IoT Security and Privacy. ACM, 43--48.
[13]
Tamara Denning, Zakariya Dehlawi, and Tadayoshi Kohno. 2014. In situ with bystanders of augmented reality glasses: Perspectives on recording and privacy-mediating technologies. In Proceedings of the 32nd annual ACM conference on Human factors in computing systems. ACM, 2377--2386.
[14]
Emily Dixon. 2019. Family finds hidden camera livestreaming from their Airbnb in Ireland. (Apr 2019). https://www.cnn.com/2019/04/05/europe/ireland-airbnb-hidden-camera-scli-intl/index.html
[15]
Joseph L Fleiss, Bruce Levin, and Myunghee Cho Paik. 2013. Statistical methods for rates and proportions. John Wiley & Sons.
[16]
Geoffrey A. Fowler. 2015. Talking Toys Are Getting Smarter: Should We Be Worried? (Dec 2015). https://www.wsj.com/articles/talking-toys-are-getting-smarter-should-we-be-worried-1450378215
[17]
Sidney Fussell. 2019. Airbnb Has a Hidden-Camera Problem. (Mar 2019). https://www.theatlantic.com/technology/archive/2019/03/what-happens-when-you-find-cameras-your-airbnb/585007/
[18]
Jonathan Grudin. 1994. Computer-supported cooperative work: History and focus. Computer 27, 5 (1994), 19--26.
[19]
Roberto Hoyle, Robert Templeman, Denise Anthony, David Crandall, and Apu Kapadia. 2015. Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 1645--1648.
[20]
Roberto Hoyle, Robert Templeman, Steven Armes, Denise Anthony, David Crandall, and Apu Kapadia. 2014. Privacy behaviors of lifeloggers using wearable cameras. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 571--582.
[21]
Andreas Jacobsson, Martin Boldt, and Bengt Carlsson. 2016. A risk analysis of a smart home automation system. Future Generation Computer Systems 56 (2016), 719--733.
[22]
Timo Jakobi, Gunnar Stevens, Nico Castelli, Corinna Ogonowski, Florian Schaub, Nils Vindice, Dave Randall, Peter Tolmie, and Volker Wulf. 2018. Evolving Needs in IoT Control and Accountability: A Longitudinal Study on Smart Home Intelligibility. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 4 (2018), 171.
[23]
Li Jiang, Da-You Liu, and Bo Yang. 2004. Smart home research. In Machine Learning and Cybernetics, 2004. Proceedings of 2004 International Conference on, Vol. 2. IEEE, 659--663.
[24]
Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, are you listening? privacy perceptions, concerns and privacy-seeking behaviors with smart speakers. In Pro. ACM Human-Computer Interaction CSCW. ACM.
[25]
Huichen Lin and NeilWBergmann. 2016. IoT privacy and security challenges for smart home environments. Information 7, 3 (2016), 44.
[26]
Nathan Malkin, Julia Bernd, Maritza Johnson, and Serge Egelman. 2018. "What Can't Data Be Used For?" Privacy Expectations about Smart TVs in the US. European Workshop on Usable Security (EuroUSEC) (2018).
[27]
Emily McReynolds, Sarah Hubbard, Timothy Lau, Aditya Saraf, Maya Cakmak, and Franziska Roesner. 2017. Toys that listen: A study of parents, children, and internet-connected toys. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 5197--5207.
[28]
Simon Moncrieff, Svetha Venkatesh, and Geoff West. 2007. Dynamic privacy in a smart house environment. In Multimedia and Expo, 2007 IEEE International Conference on. IEEE, 2034--2037.
[29]
Nata M. Barbosa, Joon S. Park, Yaxing Yao, and Yang Wang. 2019. "What if?" Predicting Individual Users' Smart Home Privacy Preferences and Their Changes. Proceedings on Privacy Enhancing Technologies (PoPETS) 4 (2019), 211--231.
[30]
Helen Nissenbaum. 2004. Privacy as contextual integrity. Washington law review 79, 1 (2004), 119--158.
[31]
Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press.
[32]
Erika Shehan Poole, Marshini Chetty, Rebecca E Grinter, and W Keith Edwards. 2008. More than meets the eye: transforming the user experience of home network management. In Proceedings of the 7th ACM conference on Designing interactive systems. ACM, 455--464.
[33]
Elizabeth B-N Sanders and Pieter Jan Stappers. 2008. Co-creation and the new landscapes of design. Co-design 4, 1 (2008), 5--18.
[34]
Marc Steen, Menno Manschot, and Nicole De Koning. 2011. Benefits of co-design in service design projects. International Journal of Design 5, 2 (2011).
[35]
Froukje Sleeswijk Visser, Pieter Jan Stappers, Remko Van der Lugt, and Elizabeth BN Sanders. 2005. Contextmapping: experiences from practice. CoDesign 1, 2 (2005), 119--149.
[36]
James Vlahos. 2019. Smart talking: are our devices threatening our privacy? (Mar 2019). https://www.theguardian.com/technology/2019/mar/26/smart-talking-are-our-devices-threatening-our-privacy
[37]
Junjue Wang, Brandon Amos, Anupam Das, Padmanabhan Pillai, Norman Sadeh, and Mahadev Satyanarayanan. 2018. Enabling Live Video Analytics with a Scalable and Privacy-Aware Framework. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 14, 3s (2018), 64.
[38]
Yang Wang, Huichuan Xia, Yaxing Yao, and Yun Huang. 2016. Flying Eyes and Hidden Controllers: A Qualitative Study of People's Privacy Perceptions of Civilian Drones in The US. Proceedings on Privacy Enhancing Technologies 2016, 3 (2016), 172--190.
[39]
Rick Wash. 2010. Folk models of home computer security. In Proceedings of the Sixth Symposium on Usable Privacy and Security. ACM, 11:1--11:16.
[40]
Peter Worthy, Ben Matthews, and Stephen Viller. 2016. Trust me: doubts and concerns living with the Internet of Things. In Proceedings of the 2016 ACM Conference on Designing Interactive Systems. ACM, 427--434.
[41]
Heng Xu, Robert E Crossler, and France BéLanger. 2012. A value sensitive design investigation of privacy enhancing tools in web browsers. Decision support systems 54, 1 (2012), 424--433.
[42]
Yaxing Yao, Justin Reed Basdeo, Smirity Kaushik, and Yang Wang. 2019. Defending My Castle: A Co-Design Study of Privacy Mechanisms for Smart Homes. (2019).
[43]
Yaxing Yao, Davide Lo Re, and Yang Wang. 2017. Folk Models of Online Behavioral Advertising. In Proceedings of the Computer Supported Cooperative Work (CSCW). ACM.
[44]
Yaxing Yao, Huichuan Xia, Yun Huang, and Yang Wang. 2017. Free to Fly in Public Spaces: Drone Controllers' Privacy Perceptions and Practices. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 6789--6793.
[45]
Yaxing Yao, Huichuan Xia, Yun Huang, and Yang Wang. 2017. Privacy Mechanisms for Drones: Perceptions of Drone Controllers and Bystanders. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 6777--6788.
[46]
Kenji Yoshigoe, Wei Dai, Melissa Abramson, and Alexander Jacobs. 2015. Overcoming invasion of privacy in smart home environment with synthetic packet injection. In TRON Symposium (TRONSHOW), 2015. IEEE, 1--7.
[47]
Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security & Privacy Concerns with Smart Homes. In Symposium on Usable Privacy and Security (SOUPS).
[48]
Serena Zheng, Marshini Chetty, and Nick Feamster. 2018. User Perceptions of Privacy in Smart Homes. arXiv preprint arXiv:1802.08182 (2018).
[49]
Verena Zimmermann, Merve Bennighof, Miriam Edel, Oliver Hofmann, Judith Jung, and Melina von Wick. 2018. "Home, Smart Home'--Exploring End Users' Mental Models of Smart Homes. Mensch und Computer 2018-Workshopband (2018).

Cited By

View all
  • (2024)Privacy Barriers in Health Monitoring: Scoping ReviewJMIR Nursing10.2196/535927(e53592)Online publication date: 9-May-2024
  • (2024)Dr. Convenience Love or: How I Learned to Stop Worrying and Love my Voice Assistant✱Proceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685364(1-14)Online publication date: 13-Oct-2024
  • (2024)How to Respect Bystanders' Privacy in Smart Homes - A Co-Creation StudyProceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685340(1-19)Online publication date: 13-Oct-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Human-Computer Interaction
Proceedings of the ACM on Human-Computer Interaction  Volume 3, Issue CSCW
November 2019
5026 pages
EISSN:2573-0142
DOI:10.1145/3371885
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 November 2019
Published in PACMHCI Volume 3, Issue CSCW

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. bystanders
  2. co-design
  3. collaborative privacy
  4. smart home

Qualifiers

  • Research-article

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)583
  • Downloads (Last 6 weeks)75
Reflects downloads up to 01 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Privacy Barriers in Health Monitoring: Scoping ReviewJMIR Nursing10.2196/535927(e53592)Online publication date: 9-May-2024
  • (2024)Dr. Convenience Love or: How I Learned to Stop Worrying and Love my Voice Assistant✱Proceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685364(1-14)Online publication date: 13-Oct-2024
  • (2024)How to Respect Bystanders' Privacy in Smart Homes - A Co-Creation StudyProceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685340(1-19)Online publication date: 13-Oct-2024
  • (2024)A Roadmap for Applying the Contextual Integrity Framework in Qualitative Privacy ResearchProceedings of the ACM on Human-Computer Interaction10.1145/36537108:CSCW1(1-29)Online publication date: 26-Apr-2024
  • (2024)Manual, Hybrid, and Automatic Privacy Covers for Smart Home CamerasProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661569(3453-3470)Online publication date: 1-Jul-2024
  • (2024)Beyond Individual Concerns: Multi-user Privacy in Large Language ModelsProceedings of the 6th ACM Conference on Conversational User Interfaces10.1145/3640794.3665883(1-6)Online publication date: 8-Jul-2024
  • (2024)Understanding Perceived Utility and Comfort of In-Home General-Purpose Sensing through Progressive ExposureProceedings of the ACM on Human-Computer Interaction10.1145/36374328:CSCW1(1-32)Online publication date: 26-Apr-2024
  • (2024)Unfulfilled Promises of Child Safety and Privacy: Portrayals and Use of Children in Smart Home MarketingProceedings of the ACM on Human-Computer Interaction10.1145/36374228:CSCW1(1-29)Online publication date: 26-Apr-2024
  • (2024)Healthcare Voice AI Assistants: Factors Influencing Trust and Intention to UseProceedings of the ACM on Human-Computer Interaction10.1145/36373398:CSCW1(1-37)Online publication date: 26-Apr-2024
  • (2024)Bring Privacy To The Table: Interactive Negotiation for Privacy Settings of Shared Sensing DevicesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642897(1-22)Online publication date: 11-May-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media