Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article
Open access

Security and Privacy Perspectives of People Living in Shared Home Environments

Published: 08 November 2024 Publication History

Abstract

Security and privacy (S&P) perspectives of people in a multi-user home are a growing area of research, with many researchers reflecting on the complicated power imbalance and challenging access control issues of the devices involved. However, these studies primarily focused on the multi-user scenarios in traditional family home settings, leaving other types of multi-user home environments, such as homes shared by co-habitants without a familial relationship, under-studied. This paper closes this research gap via quantitative and qualitative analysis of results from an online survey and qualitative content analysis of sampled online posts on Reddit. The study explores the complex roles of shared home users, which depend on various factors unique to the shared home environment, e.g., who owns what home devices, how home devices are used by multiple users, and more complicated relationships between the landlord and people in the shared home and among co-habitants. Half (50.7%) of our survey participants thought that devices in a shared home are less secure than in a traditional family home. This perception was found statistically significantly associated with factors such as the fear of devices being tampered with in their absence and (lack of) trust in other co-habitants and their visitors. We observed cyber-physical threats being a prominent topic discussed in Reddit posts. Our study revealed new user types and user relationships in a multi-user environment such as ExternalPrimary-InternalPrimary while analysing the landlord and shared home resident relationship with regard to shared home device use. Based on the results of the online survey and the Reddit data, we propose a threat actor model for shared home environments, which has a focus on possible malicious behaviours of current and past co-habitants of a shared home, as a special type of insider threat in a home environment. We also recommend further research to understand the complex roles co-habitants can play in navigating and adapting to a shared home environment's security and privacy landscape.

References

[1]
Imtiaz Ahmad, Rosta Farzan, Apu Kapadia, and Adam J. Lee. 2020. Tangible Privacy: Towards User-Centric Sensor Designs for Bystander Privacy. Proceedings of the ACM on Human-Computer Interaction, Vol. 4, CSCW2, Article 116 (2020), 28 pages. https://doi.org/10.1145/3415187
[2]
Mahdi Nasrullah Al-Ameen, Huzeyfe Kocabas, Swapnil Nandy, and Tanjina Tamanna. 2021. “We, three brothers have always known everything of each other”': A Cross-cultural Study of Sharing Digital Devices and Online Accounts. Proceedings on Privacy Enhancing Technologies, Vol. 2021, 4 (2021), 203--224. https://doi.org/10.2478/popets-2021-0067
[3]
Abayomi Alase. 2017. The Interpretative Phenomenological Analysis (IPA): A Guide to a Good Qualitative Research Approach. International Journal of Education and Literacy Studies, Vol. 5, 2 (2017), 9--19. https://doi.org/10.7575/aiac.ijels.v.5n.2p.9
[4]
Irwin Altman. 1975. The environment and social behavior: privacy, personal space, territory, and crowding. (1975).
[5]
Irwin Altman. 1977. Privacy regulation: Culturally universal or culturally specific? Journal of Social Issues, Vol. 33, 3 (1977), 66--84. https://doi.org/10.1111/j.1540--4560.1977.tb01883.x
[6]
Noah Apthorpe, Pardis Emami-Naeini, Arunesh Mathur, Marshini Chetty, and Nick Feamster. 2022. You, Me, and IoT: How Internet-connected Consumer Devices Affect Interpersonal Relationships. ACM Transactions on Internet of Things, Vol. 3 (2022). Issue 4. https://doi.org/10.1145/3539737
[7]
Julia Bernd, Ruba Abu-Salma, Junghyun Choy, and Alisa Frik. 2022. Balancing Power Dynamics in Smart Homes: Nannies' Perspectives on How Cameras Reflect and Affect Relationships Balancing Power Dynamics in Smart Homes: Nannies' Perspectives on How Cameras Reflect and Affect Relationships. In Proceedings of the 18th Symposium on Usable Privacy and Security. USENIX Association. https://www.usenix.org/conference/soups2022/presentation/bernd
[8]
Julia Bernd, Ruba Abu-Salma, and Alisa Frik. 2020. Bystanders' Privacy: The Perspectives of Nannies on Smart Home Surveillance. In Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet. USENIX Association, 14 pages. https://www.usenix.org/conference/foci20/presentation/bernd
[9]
Julia Bernd, Alisa Frik, Maritza Johnson, and Nathan Malkin. 2019. Smart Home Bystanders: Further Complexifying a Complex Context. In Proceedings of CI Symposium 2019. PrivaCI, 6 pages. https://privaci.info/symposium2/papers_and_slides/Sub_Bernd_et_al_Bystanders_CI_2019.pdf
[10]
Nicola Bleu. 2023. 23 Reddit Statistics For 2023: Users, Revenue, And Growth. https://startupbonsai.com/reddit-statistics/
[11]
Virginia Braun, Victoria Clarke, Nikki Hayfield, and Gareth Terry. 2019. Thematic Analysis 48. Handbook of research methods in health social sciences (2019), 843--860. https://doi.org/10.1007/978--981--10--5251--4_103
[12]
BT. 2020. 83% of UK consumers are planning to gift a connected device as families get set for Christmas, according to study by BT Full Fibre. https://newsroom.bt.com/83-of-uk-consumers-are-planning-to-gift-a-connected-device-as-families-get-set-for-christmas-according-to-study-by-bt-full-fibre/
[13]
Michael Byrne and Rachel McArdle. 2022. Secure occupancy, power and the landlord-tenant relation: a qualitative exploration of the Irish private rental sector. Housing Studies, Vol. 37, 1 (2022), 124--142. https://doi.org/10.1080/02673037.2020.1803801
[14]
Jiayi Chen, Urs Hengartner, and Hassan Khan. 2022. Sharing without Scaring: Enabling Smartphones to Become Aware of Temporary Sharing. In Proceedings of the 18th Symposium on Usable Privacy and Security. USENIX Association, 671--685. https://www.usenix.org/conference/soups2022/presentation/chen
[15]
Eun Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly Harrison, Shwetak N. Patel, and Julie A. Kientz. 2012. Investigating Receptiveness to Sensing and Inference in the Home Using Sensor Proxies. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing. ACM, 61--70. https://doi.org/10.1145/2370216.2370226
[16]
Vicky Clark, Keith Tuffin, Natilene Bowker, and Karen Frewin. 2019. Rosters: Freedom, responsibility, and co-operation in young adult shared households. Australian Journal of Psychology, Vol. 71, 3 (2019), 232--240. https://doi.org/10.1111/ajpy.12238
[17]
Camille Cobb, Sruti Bhagavatula, Kalil Anderson Garrett, Alison Hoffman, Varun Rao, and Lujo Bauer. 2021. “I would have to evaluate their objections”": Privacy tensions between smart home device owners and incidental users. Proceedings on Privacy Enhancing Technologies, Vol. 2021, 4 (2021), 54--75. https://doi.org/10.2478/popets-2021-0060
[18]
Camille Cobb, Sruti Bhagavatula, Kalil Anderson Garrett, Alison Hoffman, Varun Rao, and Lujo Bauer. 2021. “I would have to evaluate their objections”: Privacy tensions between smart home device owners and incidental users. Proceedings on Privacy Enhancing Technologies, Vol. 2021, 4 (2021), 54--75. https://doi.org/10.2478/popets-2021-0060
[19]
Sauvik Das, Laura A. Dabbish, and Jason I. Hong. 2019. A Typology of Perceived Triggers for End-User Security and Privacy Behaviors. In Proceedings of the 15th Symposium on Usable Privacy and Security. USENIX Association, 97--115. https://www.usenix.org/conference/soups2019/presentation/das
[20]
Sauvik Das, Tiffany Hyun-Jin Kim, Laura A. Dabbish, and Jason I. Hong. 2014. The Effect of Social Influence on Security Sensitivity. In Proceedings of the 10th Symposium On Usable Privacy and Security. USENIX Association, 143--157. https://www.usenix.org/conference/soups2014/proceedings/presentation/das
[21]
Department for Levelling Up, Housing and Communities and Ministry of Housing, Communities & Local Government, UK Government. 2019. Guidance Landlord and tenant rights and responsibilities in the private rented sector. https://www.gov.uk/government/publications/landlord-and-tenant-rights-and-responsibilities-in-the-private-rented-sector/landlord-and-tenant-rights-and-responsibilities-in-the-private-rented-sector#landlords-rights-responsibilities-and-advice
[22]
Rajib Dey, Sayma Sultana, Afsaneh Razi, and Pamela J Wisniewski. 2020. Exploring smart home device use by airbnb hosts. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, Article LBW082, 8 pages. https://doi.org/10.1145/3334480.3382900
[23]
Oana Druta and Richard Ronald. 2021. Living alone together in Tokyo share houses. Social & Cultural Geography, Vol. 22, 9 (2021), 1223--1240. https://doi.org/10.1080/14649365.2020.1744704
[24]
Christine Geeng and Franziska Roesner. 2019. Who's In Control? Interactions In Multi-User Smart Homes. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, 13 pages. https://doi.org/10.1145/3290605.3300498
[25]
Greater London Authority. 2022. Housing in London 2022. https://data.london.gov.uk/housing/housing-in-london/
[26]
Manjul Gupta, Pouyan Esmaeilzadeh, Irem Uz, and Vanesa M. Tennant. 2019. The effects of national cultural values on individuals' intention to participate in peer-to-peer sharing economy. Journal of Business Research, Vol. 97 (2019), 20--29. https://doi.org/10.1016/j.jbusres.2018.12.018
[27]
Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus Dürmuth, Earlence Fernandes, and Blase Ur. 2018. Rethinking Access Control and Authentication for the Home Internet of Things (IoT). In Proceedings of the 27th USENIX Security Symposium. USENIX Assocaition, 255--272. https://www.usenix.org/conference/usenixsecurity18/presentation/he
[28]
Weijia He, Valerie Zhao, Olivia Morkved, Sabeeka Siddiqui, Earlence Fernandes, Josiah Hester, and Blase Ur. 2021. SoK: Context Sensing for Access Control in the Adversarial Home IoT. In Proceedings of the 2021 IEEE European Symposium on Security and Privacy. IEEE, 37--53. https://doi.org/10.1109/EUROSP51992.2021.00014
[29]
Ryan Heartfield, George Loukas, Sanja Budimir, Anatolij Bezemskij, Johnny R.J. Fontaine, Avgoustinos Filippoupolitis, and Etienne Roesch. 2018. A taxonomy of cyber-physical threats and impact in the smart home. Computers & Security, Vol. 78 (2018), 398--428. https://doi.org/10.1016/j.cose.2018.07.011
[30]
Eric Hirsch and Roger Silverstone. 2003. Information and communication technologies and the moral economy of the household. In Consuming Technologies. Routledge, 25--40.
[31]
Yue Huang, Borke Obada-Obieh, and Konstantin (Kosta) Beznosov. 2020. Amazon vs. My Brother: How Users of Shared Smart Speakers Perceive and Cope with Privacy Risks. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, Article 402, 13 pages. https://doi.org/10.1145/3313831.3376529
[32]
Kath Hulse and Vivienne Milligan. 2014. Secure occupancy: A new framework for analysing security in rental housing. Housing Studies, Vol. 29, 5 (2014), 638--656. https://doi.org/10.1080/02673037.2013.873116
[33]
Maia Jacobs, Henriette Cramer, and Louise Barkhuus. 2016. Caring About Sharing: Couples' Practices in Single User Device Access. In Proceedings of the 2016 ACM International Conference on Supporting Group Work. ACM, 235--243. https://doi.org/10.1145/2957276.2957296
[34]
Matthew R. Jamnik and David J. Lane. 2019. The use of Reddit as an inexpensive source for high-quality data. Practical Assessment, Research, and Evaluation, Vol. 22, 1, Article 5 (2019), 10 pages. https://doi.org/10.7275/j18t-c009
[35]
William Jang, Adil Chhabra, and Aarathi Prasad. 2017. Enabling Multi-User Controls in Smart Home Devices. In Proceedings of the 2017 Workshop on Internet of Things Security and Privacy. ACM, 49--54. https://doi.org/10.1145/3139937.3139941
[36]
Shravya Kanchi and Kamalakar Karlapalem. 2021. A Multi Perspective Access Control in a Smart Home. In Proceedings of the 11th ACM Conference on Data and Application Security and Privacy. ACM, 321--323. https://doi.org/10.1145/3422337.3450324
[37]
Leah Komen. 2016. “Here you can use it”: Understanding mobile phone sharing and the concerns it elicits in rural Kenya. for(e)dialogue, Vol. 1, 1 (2016), 52--65. https://doi.org/10.29311/for(e)dialogue.v1i1.532
[38]
Vinay Koshy, Joon Sung Sung Park, Ti-Chung Cheng, and Karrie Karahalios. 2021. “We Just Use What They Give Us”: Understanding Passenger User Perspectives in Smart Homes. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. ACM, Article 41, 14 pages. https://doi.org/10.1145/3411764.3445598
[39]
Vinay Koshy, Joon Sung Sung Park, Ti-Chung Cheng, and Karrie Karahalios. 2021. “We Just Use What They Give Us”: Understanding Passenger User Perspectives in Smart Homes. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. ACM, Article 41, 14 pages. https://doi.org/10.1145/3411764.3445598
[40]
Stephanie Kramer. 2020. With billions confined to their homes worldwide, which living arrangements are most common? https://www.pewresearch.org/short-reads/2020/03/31/with-billions-confined-to-their-homes-worldwide-which-living-arrangements-are-most-common/
[41]
Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, Are You Listening?: Privacy Perceptions, Concerns and Privacy-seeking Behaviors with Smart Speakers. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, CSCW, Article 102 (2018), 31 pages. https://doi.org/10.1145/3274371
[42]
Roxanne Leit ao. 2019. Anticipating Smart Home Security and Privacy Threats with Survivors of Intimate Partner Abuse. In Proceedings of the 2019 ACM Designing Interactive Systems Conference. ACM, 527--539. https://doi.org/10.1145/3322276.3322366
[43]
Vanessa Z. Lin and Simon Parkin. 2020. Transferability of privacy-related behaviours to shared smart home assistant devices. In Proceedings of the 2020 7th International Conference on Internet of Things: Systems, Management and Security. IEEE, 8 pages. https://doi.org/10.1109/IOTSMS52051.2020.9340199
[44]
George Loukas. 2015. Cyber-Physical Attacks: A Growing Invisible Threat. Butterworth-Heinemann.
[45]
Sophia Maalsen. 2020. 'Generation Share': digitalized geographies of shared housing. Social & Cultural Geography, Vol. 21, 1 (2020), 105--113. https://doi.org/10.1080/14649365.2018.1466355
[46]
Sophia Maalsen. 2023. `We're the cheap smart home': the actually existing smart home as rented and shared. Social & Cultural Geography, Vol. 24, 8 (2023), 1383--1402. https://doi.org/10.1080/14649365.2022.2065693
[47]
Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera, Serge Egelman, and David Wagner. 2019. Privacy Attitudes of Smart Speaker Users. Proceedings on Privacy Enhancing Technologies, Vol. 2019, 4 (2019), 250--271. https://doi.org/10.2478/popets-2019-0068
[48]
Shrirang Mare, Franziska Roesner, and Tadayoshi Kohno. 2020. Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts. Proceedings on Privacy Enhancing Technologies, Vol. 2000, 2 (2020), 436--458. https://doi.org/10.2478/popets-2020-0035
[49]
Karola Marky, Paul Gerber, Michelle Gabriela Pelzer, Mohamed Khamis, and Max Mühlhäuser. 2022. “You offer privacy like you offer tea”?: Investigating Mechanisms for Improving Guest Privacy in IoT-Equipped Households. Proceedings on Privacy Enhancing Technologies, Vol. 2022, 4 (2022), 400--420. https://doi.org/10.56553/popets-2022-0115
[50]
Karola Marky, Sarah Prange, Florian Krell, Max Mühlhäuser, and Florian Alt. 2020. “You Just Can't Know about Everything”: Privacy Perceptions of Smart Home Visitors. In Proceedings of the 19th International Conference on Mobile and Ubiquitous Multimedia. ACM, 83--95. https://doi.org/10.1145/3428361.3428464
[51]
Karola Marky, Sarah Prange, Max Mühlhäuser, and Florian Alt. 2021. Roles matter! Understanding differences in the privacy mental models of smart home visitors and residents. In Proceedings of the 20th International Conference on Mobile and Ubiquitous Multimedia. ACM, 108--122. https://doi.org/10.1145/3490632.3490664
[52]
Karola Marky, Sarah Prange, Max Mühlhäuser, and Florian Alt. 2022. Roles Matter! Understanding Differences in the Privacy Mental Models of Smart Home Visitors and Residents. In Proceedings of the 20th International Conference on Mobile and Ubiquitous Multimedia. ACM, 108--122. https://doi.org/10.1145/3490632.3490664
[53]
Karola Marky, Alexandra Voit, Alina Stöver, Kai Kunze, Svenja Schröder, and Max Mühlhäuser. 2020. “I Don't Know How to Protect Myself”: Understanding Privacy Perceptions Resulting from the Presence of Bystanders in Smart Environments. In Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society. ACM, Article 4, 11 pages. https://doi.org/10.1145/3419249.3420164
[54]
Karola Marky, Verena Zimmermann, Alina Stöver, Philipp Hoffmann, Kai Kunze, and Max Mühlhäuser. 2020. All in One! User Perceptions on Centralized IoT Privacy Settings. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, Article LBW071, 8 pages. https://doi.org/10.1145/3334480.3383016
[55]
Tara Matthews, Kerwell Liao, Anna Turner, Marianne Berkovich, Robert Reeder, and Sunny Consolvo. 2016. “She'll just grab any device that's closer”: A Study of Everyday Device & Account Sharing in Households. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 5921--5932. https://doi.org/10.1145/2858036.2858051
[56]
Dana McKay and Charlynn Miller. 2021. Standing in the Way of Control: A Call to Action to Prevent Abuse through Better Design of Smart Technologies. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. ACM, Article 332, 14 pages. https://doi.org/10.1145/3411764.3445114
[57]
Nicole Meng. 2021. Owning and Sharing: Privacy Perceptions of Smart Speaker Users. Proceedings of the ACM on Human-Computer Interaction, Vol. 5, CSCW1, Article 45 (2021), 29 pages. https://doi.org/10.1145/3449119
[58]
Phoebe Moh, Pubali Datta, Noel Warford, Adam Bates, Nathan Malkin, and Michelle L. Mazurek. 2022. Characterizing Everyday Misuse of Smart Home Devices. In Proceedings of the 2023 IEEE Symposium on Security and Privacy. IEEE, 1558--1572. https://doi.org/10.1109/SP46215.2023.00089
[59]
Becky Mortan. 2022. Over-50s turn to house-shares to beat rising rents. https://www.bbc.co.uk/news/business-62344571
[60]
Megan Nethercote. 2019. Caring households: The social ties that house. Housing, Theory and Society, Vol. 36, 3 (2019), 257--273. https://doi.org/10.1080/14036096.2018.1465994
[61]
Megan Nethercote. 2023. Platform landlords: Renters, personal data and new digital footholds of urban control. Digital Geography and Society, Vol. 5, Article 100060 (2023), 15 pages. https://doi.org/10.1016/j.diggeo.2023.100060
[62]
Helen Nissenbaum. 2004. Privacy as Contextual Integrity. Washington Law Review, Vol. 79, 1 (2004), 119--158. https://digitalcommons.law.uw.edu/wlr/vol79/iss1/10
[63]
Tushar P Parikh and Ashok R Patel. 2017. Cyber security: Study on attack, threat, vulnerability. 2017 International Journal of Research in Modern Engineering and Emerging Technology, Vol. 5, 6 (2017).
[64]
Albert Park, Mike Conway, and Annie T. Chen. 2018. Examining thematic similarity, difference, and membership in three online mental health communities from reddit: A text mining and visualization approach. Computers in Human Behavior, Vol. 78 (2018), 98--112. https://doi.org/10.1016/j.chb.2017.09.001
[65]
Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, and Jason Hong. 2018. Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships. In Proceedings of the 14th Symposium on Usable Privacy and Security. USENIX Association, 83--102. https://www.usenix.org/conference/soups2018/presentation/park
[66]
Sunjeong Park and Youn-kyung Lim. 2020. Investigating User Expectations on the Roles of Family-Shared AI Speakers. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, Article 323, 13 pages. https://doi.org/10.1145/3313831.3376450
[67]
Nandita Pattnaik, Shujun Li, and Jason R. C. Nurse. 2023. A Survey of User Perspectives on Security and Privacy in a Home Networking Environment. Comput. Surveys, Vol. 55, 9, Article 180 (2023), 38 pages.
[68]
Rizu Paudel, Prakriti Dumaru, Ankit Shrestha, Huzeyfe Kocabas, and Mahdi Nasrullah Al-Ameen. 2023. A Deep Dive into User's Preferences and Behavior around Mobile Phone Sharing. Proceedings of the ACM on Human-Computer Interaction, Vol. 7, CSCW1, Article 119 (2023), 22 pages. https://doi.org/10.1145/3579595
[69]
Nicholas Proferes, Naiyan Jones, Sarah Gilbert, Casey Fiesler, and Michael Zimmer. 2021. Studying Reddit: A Systematic Overview of Disciplines, Approaches, Methods, and Ethics. Social Media Society, Vol. 7, 2 (2021), 14 pages. https://doi.org/10.1177/2056305121101900
[70]
Reddit. 2023. Data API Terms. https://www.redditinc.com/policies/data-api-terms
[71]
Tiago Rocha-Silva, Conceicc ao Nogueira, and Liliana Rodrigues. 2023. Passive data collection on Reddit: a practical approach. Research Ethics, Article 17470161231210542 (2023), 18 pages. https://doi.org/10.1177/17470161231210542
[72]
Richard Ronald, Pauline Schijf, and Kelly Donovan. 2023. The institutionalization of shared rental housing and commercial co-living. Housing Studies (2023), 1--25. https://doi.org/10.1080/02673037.2023.2176830
[73]
Indira Sen, Fabian Flöck, Katrin Weller, Bernd Weiß, and Claudia Wagner. 2021. A total error framework for digital traces of human behavior on online platforms. Public Opinion Quarterly, Vol. 85, S1 (2021), 399--422.
[74]
Julia Slupska. 2019. Safe at home: Towards a feminist critique of cybersecurity. St Antony's International Review, Vol. 15, 1 (2019), 83--100. https://www.jstor.org/stable/27027755
[75]
Julia Slupska and Leonie Maria Tanczer. 2021. Threat modeling intimate partner violence: tech abuse as a cybersecurity challenge in the Internet of Things. In The Emerald International Handbook of Technology-Facilitated Violence and Abuse. Emerald. https://doi.org/10.1108/978--1--83982--848--520211049
[76]
Julia Muller Spiti, Ellen Davies, Paul McLiesh, and Janet Kelly. 2022. How social media data are being used to research the experience of mourning: A scoping review. PLOS ONE, Vol. 17, 7, Article e0271034 (2022), 25 pages. https://doi.org/10.1371/journal.pone.0271034
[77]
Statista. 2021. Average number of devices residents have access to in UK households in 2020, by device. https://www.statista.com/study/41673/connected-devices-in-the-united-kingdom-uk/
[78]
Madiha Tabassum and Heather Lipford. 2023. Exploring privacy implications of awareness and control mechanisms in smart home devices. Proceedings on Privacy Enhancing Technologies, Vol. 1 (2023), 571--588. https://doi.org/10.56553/popets-2023-0033
[79]
Sarah Turner, Nandita Pattnaik, Jason R.C. Nurse, and Shujun Li. 2022. "You Just Assume It Is In There, I Guess": Understanding UK Families' Application and Knowledge of Smart Home Cyber Security. Proceedings of the ACM on Human-Computer Interaction, Vol. 6, CSCW2, Article 269 (2022), 34 pages. https://doi.org/10.1145/3555159
[80]
Constance Uyttebrouck, Ellen Van Bueren, and Jacques Teller. 2020. Shared housing for students and young professionals: evolution of a market in need of regulation. Journal of Housing and the Built Environment, Vol. 35, 4 (2020), 1017--1035. https://doi.org/10.1007/s10901-020-09778-w
[81]
Juite Wang and Y.-L. Liu. 2023. Deep learning-based social media mining for user experience analysis: A case study of smart home products. Technology in Society, Vol. 73, Article 102220 (2023), 18 pages. https://doi.org/10.1016/j.techsoc.2023.102220
[82]
Hue Watson, Eyitemi Moju-Igbene, Akanksha Kumari, and Sauvik Das. 2020. “We Hold Each Other Accountable”": Unpacking How Social Groups Approach Cybersecurity and Privacy Together. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, Article 478, 12 pages. https://doi.org/10.1145/3313831.3376605
[83]
Chathurangi Ishara Wickramasinghe and Delphine Reinhardt. 2019. A Survey-Based Exploration of Users' Awareness and Their Willingness to Protect Their Data with Smart Objects. In Privacy and Identity Management. Data for Better Living: AI and Privacy -- 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19--23, 2019, Revised Selected Papers. Springer, 427--446. https://doi.org/10.1007/978--3-030--42504--3_27
[84]
Eleanor Wilkinson. 2014. Single people's geographies of home: intimacy and friendship beyond `the family'. Environment and Planning A, Vol. 46, 10 (2014), 2452--2468. https://doi.org/10.1068/a130069p
[85]
Eleanor Wilkinson and Iliana Ortega-Alcázar. 2019. Stranger danger? The intersectional impacts of shared housing on young people's health & wellbeing. Health & Place, Vol. 60, Article 102191 (2019), 7 pages. https://doi.org/10.1016/j.healthplace.2019.102191
[86]
Michael Williams and Tami Moser. 2019. The art of coding and thematic exploration in qualitative research. International management review, Vol. 15, 1 (2019), 45--55.
[87]
Maximiliane Windl and Sven Mayer. 2022. The Skewed Privacy Concerns of Bystanders in Smart Environments. Proceedings of the ACM on Human-Computer Interaction, Vol. 6, MHCI, Article 184 (2022), 21 pages. https://doi.org/10.1145/3546719
[88]
Yuxi Wu, W. Keith Edwards, and Sauvik Das. 2022. SoK: Social Cybersecurity. In Proceedings of the 2022 IEEE Symposium on Security and Privacy. IEEE, 1863--1879. https://doi.org/10.1109/SP46214.2022.9833757
[89]
Yaxing Yao, Justin Reed Basdeo, Oriana Rosata Mcdonough, and Yang Wang. 2019. Privacy Perceptions and Designs of Bystanders in Smart Homes. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW, Article 59 (2019), 24 pages. https://doi.org/10.1145/3359161
[90]
Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security and Privacy Concerns with Smart Homes. In Proceedings of the 13th Symposium on Usable Privacy and Security. USENIX Association, 65--80. https://www.usenix.org/conference/soups2017/technical-sessions/presentation/zeng
[91]
Eric Zeng and Franziska Roesner. 2019. Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study. In Proceedings of the 28th USENIX Security Symposium. USENIX Association, 159--176. https://www.usenix.org/conference/usenixsecurity19/presentation/zeng
[92]
Bo Zhao. 2020. Unraveling Home Protection in the IoT Age: Living, Mixed Reality, and Home 2.0. Science and Technology Law Review, Vol. 21, 1 (2020), 43--80. https://doi.org/10.7916/stlr.v21i1.5763
[93]
Verena Zimmermann, Paul Gerber, Karola Marky, Leon Böck, and Florian Kirchbuchner. 2019. Assessing Users' Privacy and Security Concerns of Smart Home Technologies. i-com, Vol. 18, 3 (2019), 197--216. https://doi.org/10.1515/icom-2019-0015

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Human-Computer Interaction
Proceedings of the ACM on Human-Computer Interaction  Volume 8, Issue CSCW2
CSCW
November 2024
5177 pages
EISSN:2573-0142
DOI:10.1145/3703902
Issue’s Table of Contents
This work is licensed under a Creative Commons Attribution International 4.0 License.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 November 2024
Published in PACMHCI Volume 8, Issue CSCW2

Check for updates

Author Tags

  1. bystander
  2. contextual analysis
  3. demographic analysis
  4. empirical study
  5. multi-user
  6. online social network
  7. privacy
  8. rental home security
  9. security
  10. shared home
  11. smart device
  12. smart home
  13. survey
  14. threat model
  15. user behaviour
  16. user perspectives

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 76
    Total Downloads
  • Downloads (Last 12 months)76
  • Downloads (Last 6 weeks)76
Reflects downloads up to 30 Nov 2024

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media