Abstract
We explored perceptions regarding the value and sensitivity of the data collected by a variety of everyday smart devices. Via semi-structured interviews, we found that people’s conceptualizations of operational details and privacy and security threats of “smart” functions are greatly limited. Our findings point to the need for designs that readily enable users to separate the physical and digital aspects of device operation and call for further exploration of the design space of privacy and security controls and indicators for smart devices.
H. Hadan and S. Patil—Understanding Perceptions of Smart Devices, Proceedings of AsiaUSEC ‘20, Financial Cryptography and Data Security 2019 (FC). February 14, 2020 Kota Kinabalu, Sabah, Malaysia Springer, 2020.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
In the rest of the paper, we use the term smart devices to refer to any typical household device or object with augmented capabilities and/or Internet connectivity.
References
Abdi, N., Ramokapane, K.M., Such, J.M.: More than smart speakers: security and privacy perceptions of smart home personal assistants. In: Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, August 2019. https://www.usenix.org/conference/soups2019/presentation/abdi
Acquisti, A., John, L.K., Loewenstein, G.: What is privacy worth? J. Legal Stud. 42(2), 249–274 (2013). https://doi.org/10.1086/671754
Barbosa, N.M., Park, J.S., Yao, Y., Wang, Y.: “What if?" Predicting individual users’ smart home privacy preferences and their changes. In: Proceedings on Privacy Enhancing Technologies, vol. 2019, no. 4, pp. 211–231 (2019). https://doi.org/10.2478/popets-2019-0066
California State Legislature: California consumer privacy act of 2018 (2018). https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=201720180AB375
Chandrasekaran, V., Fawaz, K., Mutlu, B., Banerjee, S.: Characterizing privacy perceptions of voice assistants: a technology probe study. CoRR abs/1812.00263 (2018). http://arxiv.org/abs/1812.00263
Emami-Naeini, P., Dixon, H., Agarwal, Y., Cranor, L.F.: Exploring how privacy and security factor into IoT device purchase behavior. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. CHI 2019. Association for Computing Machinery, New York (2019). https://doi.org/10.1145/3290605.3300764
European Parliament and Council of the European Union: Regulation (EU) 2016/679 of the European parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (2016). http://data.europa.eu/eli/reg/2016/679/oj
Ghiglieri, M., Waidner, M.: HbbTV security and privacy: issues and challenges. IEEE Secur. Priv. 14(3), 61–67 (2016). https://doi.org/10.1109/MSP.2016.54
Ghiglieri, M., Volkamer, M., Renaud, K.: Exploring consumers’ attitudes of smart TV related privacy risks. In: Tryfonas, T. (ed.) HAS 2017. LNCS, vol. 10292, pp. 656–674. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-58460-7_45
Glaser, B.G., Strauss, A.L.: Discovery of Grounded Theory: Strategies for Qualitative Research. Routledge, Abingdon (2017)
Grossklags, J., Acquisti, A.: When 25 cents is too much: an experiment on willingness-to-sell and willingness-to-protect personal information. In: Proceedings of the Sixth Workshop on Economics of Information Security, WEIS 2007 (2007)
Hann, I.H., Hui, K.L., Lee, S.Y.T., Png, I.P.: Overcoming online information privacy concerns: an information-processing theory approach. J. Manag. Inf. Syst. 24(2), 13–42 (2007). https://doi.org/10.2753/MIS0742-1222240202
Hernandez, G., Arias, O., Buentello, D., Jin, Y.: Smart Nest thermostat: a smart spy in your home. In: Blackhat USA (2014). https://blackhat.com/docs/us-14/materials/us-14-Jin-Smart-Nest-Thermostat-A-Smart-Spy-In-Your-Home-WP.pdf
Kang, R., Dabbish, L., Fruchter, N., Kiesler, S.: “My data just goes everywhere:” user mental models of the Internet and implications for privacy and security. In: Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), pp. 39–52. USENIX Association, Ottawa, July 2015. https://www.usenix.org/conference/soups2015/proceedings/presentation/kang
Lau, J., Zimmerman, B., Schaub, F.: Alexa, are you listening? Privacy perceptions, concerns and privacy-seeking behaviors with smart speakers. Proc. ACM Hum.-Comput. Interact. 2(CSCW), 1–31 (2018). https://doi.org/10.1145/3274371
Malkin, N., Bernd, J., Johnson, M., Egelman, S.: “What can’t data be used for?” Privacy expectations about smart TVs in the US. In: European Workshop on Usable Security (Euro USEC) (2018)
Malkin, N., Deatrick, J., Tong, A., Wijesekera, P., Egelman, S., Wagner, D.: Privacy attitudes of smart speaker users. Proc. Priv. Enhanc. Technol. 2019(4), 250–271 (2019). https://doi.org/10.2478/popets-2019-0068
Matsakis, L.: We’re all just starting to realize the power of personal data, December 2018. https://www.wired.com/story/2018-power-of-personal-data/
Oulasvirta, A., et al.: Long-term effects of ubiquitous surveillance in the home. In: Proceedings of the 2012 ACM Conference on Ubiquitous Computing, UbiComp 2012, pp. 41–50. Association for Computing Machinery, New York (2012). https://doi.org/10.1145/2370216.2370224
Pierce, J.: Smart home security cameras and shifting lines of creepiness: a design-led inquiry. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. CHI 2019. Association for Computing Machinery, New York (2019). https://doi.org/10.1145/3290605.3300275
United States Congress: Children’s online privacy protection act of 1998. 15 U. S. C. 6501–6505. https://uscode.house.gov/view.xhtml?req=granuleid%3AUSC-prelim-title15-section6501&edition=prelim
Worthy, P., Matthews, B., Viller, S.: Trust me: doubts and concerns living with the Internet of Things. In: Proceedings of the 2016 ACM Conference on Designing Interactive Systems, DIS 2016, pp. 427–434. Association for Computing Machinery, New York (2016). https://doi.org/10.1145/2901790.2901890
Yao, Y., Basdeo, J.R., Kaushik, S., Wang, Y.: Defending my castle: a co-design study of privacy mechanisms for smart homes. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, CHI 2019. Association for Computing Machinery, New York (2019). https://doi.org/10.1145/3290605.3300428
Zeng, E., Mare, S., Roesner, F.: End user security and privacy concerns with smart homes. In: Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pp. 65–80. USENIX Association, Santa Clara, July 2017. https://www.usenix.org/conference/soups2017/technical-sessions/presentation/zeng
Zheng, S., Apthorpe, N., Chetty, M., Feamster, N.: User perceptions of smart home IoT privacy. Proc. ACM Hum.-Comput. Interact. 2(CSCW), 1–20 (2018). https://doi.org/10.1145/3274469
Zimmermann, V., Bennighof, M., Edel, M., Hofmann, O., Jung, J., von Wick, M.: ‘Home, smart home’ - Exploring end users’ mental models of smart homes. In: Dachselt, R., Weber, G. (eds.) Mensch und Computer 2018 - Workshopband. Gesellschaft für Informatik e.V., Bonn (2018). https://doi.org/10.18420/muc2018-ws08-0539
Acknowledgments
We thank the study participants. We are grateful to anonymous reviewers for feedback that helped improve the paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix
Appendix
1.1 Participant Demographics and Smart Device Ownership
1.2 Results of the Ranking Exercises
1.3 Screening Questionnaire
Thank you for your interest in participating in our study on Understanding People’s Use and Perceptions of Internet-Connected Everyday Objects.
Please fill out this brief 1-minute questionnaire regarding yourself and your experience of using Internet-connected devices. We will use your answers to determine if you are eligible to participate in the study.
If you qualify, we will contact you via email for a 45–60 minute in-person/video conference/telephone interview for which you will receive $10 cash/cash equivalent (for in-person interview) or $10 Amazon gift certificate (for video interview) as a token of our appreciation for your participation. If you do not qualify for participation, your responses will be safely discarded.
-
1.
What is your Year of Birth?
-
2.
What is your Gender?
-
(a)
Male
-
(b)
Female
-
(c)
Something else. Please specify:
-
(d)
Do not wish to answer
-
(a)
-
3.
How long have you been living in the United States?
-
(a)
All my life
-
(b)
Less than a year
-
(c)
1 year
-
(d)
2 years
-
(e)
3 years
-
(f)
4 years
-
(g)
5 years
-
(h)
6 years
-
(i)
7 years
-
(j)
8 years
-
(k)
9 years
-
(l)
10 years
-
(m)
More than 10 years
-
(a)
-
4.
Are you a resident of Bloomington, Indiana?
-
(a)
Yes
-
(b)
No
-
(a)
-
5.
Are you affiliated with Indiana University Bloomington?
-
(a)
Yes
-
(b)
No
-
(a)
-
6.
[If YES to Q5] What is your affiliation with Indiana University Bloomington? (Check all that apply.)
-
(a)
Undergraduate Student
-
(b)
Graduate Student
-
(c)
Faculty
-
(d)
Staff
-
(e)
Retired
-
(f)
Something else. Please specify:
-
(a)
-
7.
[If Q6 is answered as Faculty, Staff, Retired] What department or school are you affiliated with?
-
8.
[If Q6 is answered as Undergraduate Student, Graduate Student] What is your major/field of study?
-
9.
Which of the following Internet-connected device(s) do you own?
-
(a)
TV
-
(b)
Thermostat
-
(c)
Speaker (e.g., Amazon Echo, Google Home, etc.)
-
(d)
Refrigerator
-
(e)
Light bulb
-
(f)
Doorbell
-
(g)
Door lock
-
(h)
Burglar alarm
-
(i)
Toy
-
(j)
Small household appliance (e.g., Coffee maker, Toaster, Crock pot, etc.)
-
(k)
Garage door opener
-
(l)
Car
-
(m)
Other. Please specify:
-
(a)
-
10.
How would you rate your familiarity with the following concepts or tools?

-
11.
Please indicate whether you think each statement is true or false. Please select “I’m not sure” if you don’t know the answer.
True | False | I’m not sure | |
---|---|---|---|
Incognito mode/private browsing mode in browsers prevents websites from collecting information about you |
|
|
|
Tor can be used to hide the source of a network request from the destination |
|
|
|
A VPN is the same as a proxy server |
|
|
|
IP addresses can always uniquely identify your computer |
|
|
|
HTTPS is standard HTTP with SSL to preserve the confidentiality of network traffic |
|
|
|
A request coming from a proxy server cannot be tracked to the original source |
|
|
|
-
12.
How would you prefer to be interviewed? (Check all that apply.)
-
(a)
In-person
-
(b)
Telephone
-
(c)
Video Conference (e.g., Zoom)
-
(a)
-
13.
If you qualify for the study, which email address should we use to contact you for scheduling a study session?
1.4 Semi-structured Interview Protocol
The interview should take around 45–60 minutes. I would like to ask you some questions about Internet-connected objects and devices you commonly use. It could be any object that connects to the Internet in some way. Some examples are security cameras, thermostats, TVs, etc. I would like to ask about your experiences of using such objects and devices and your thoughts on how they operate.
Before we start, do you have any questions?
-
1.
Tell me a little bit about yourself.
-
2.
Tell me your experience with technology.
-
3.
Tell me some Internet-connected objects or devices you commonly use.
For participants who do not own a smart device, ask the following questions:
-
4.
Have you ever considered getting one? Could you give me some examples?
-
5.
[If No to Q4] What has prevented you from getting one?
-
6.
[If Yes to Q4] Imagine that you have a (the item mentioned in Q4 or each of the following devices: Smart Speaker, Smart TV, Smart Weighing Scale, Smart Refrigerator, Smart Toy, Smart Thermostat, Anything else the participant thinks could be Internet-connected): How would you set it up?
-
7.
How would you use it? What would be the process?
-
8.
What data do you think it would use?
-
9.
How do you think it would use this data?
-
10.
What is your opinion about the data being collected and used?
-
11.
What is the benefit or value you perceive in this data?
-
12.
How do you perceive the sensitivity of the data?
-
13.
How often do you think it would use this data?
-
14.
How often do you think you would interact with it?
-
15.
How or where do you think it would store this data?
-
(a)
What do you mean by cloud/local/etc.?
-
(b)
Who will provide the storage service?
-
(c)
Where is the storage located?
-
(d)
What kind of storage is it?
-
(e)
How will the storage protect your data from unauthorized access?
-
(a)
-
16.
Who do you think owns this data?
-
(a)
How do you think they would access it?
-
(b)
Why do you think they own the data?
-
(c)
Why would they want to own the data?
-
(d)
What could they do with the data?
-
(a)
-
17.
Who do you believe can see this data? How do you think they access it?
-
18.
What benefit or value do you perceive other parties can get from this data (e.g., anyone else besides yourself, such as your friends, colleagues, other companies, device manufacturers, government, etc.)? Why?
-
19.
Do you think you would be able to control or access this data? Why or why not?
-
(a)
What rights do you think you would have over the data?
-
(b)
What rights would you like to have over the data?
-
(c)
Why do you believe so?
-
(d)
Would you like to have control and access? If yes, how would you want to view/access/control the data? If no, why not?
-
(a)
-
20.
What do you think the data collected by this device is worth? Why?
-
21.
Who would pay for this data? (May need to inform the participant that different parties could have different valuations.)
-
22.
How do you handle or manage the data collected about you by this device?
-
(a)
If the person does not manage or handle data: Why not?
-
(b)
If the person does manage or handle data: Why do you do it this way?
-
(c)
If the person wishes to manage or handle data but cannot do it or cannot do it well: What would make it easier or more convenient for you to manage the data?
-
(a)
For smart device owned by the participant, ask following questions:
-
23.
When did you buy it?
-
24.
Why did you buy it?
-
25.
How did you set it up?
-
26.
Could you please describe your experience? How do you use it? What is the process?
-
27.
How do you think it operates?
-
28.
What data do you think it uses?
-
29.
Why do you think it uses this data?
-
30.
How do you think this data is used?
-
31.
What is your opinion about the data being collected and used?
-
32.
What is the benefit or value you perceive in this data?
-
33.
How do you perceive the sensitivity of the data?
-
34.
How often do you think it uses this data?
-
35.
How often do you interact with it?
-
36.
How or where do you think it stores these data?
-
(a)
What do you mean by cloud/local/etc.?
-
(b)
Who do you think provides the storage service?
-
(c)
Where is the storage located?
-
(d)
What kind of storage is it?
-
(e)
How will the storage protect your data from unauthorized access?
-
(a)
-
37.
Who do you think owns this data?
-
(a)
How do you think they access it?
-
(b)
Why do you think they own the data?
-
(c)
Why would they want to own the data?
-
(d)
What could they do with the data?
-
(a)
-
38.
Who do you believe can see this data? How do you think they access it?
-
39.
What benefit or value do you perceive other parties can get from this data (e.g., anyone else besides yourself, such as your friends, colleagues, other companies, device manufacturers, government, etc.)? Why?
-
40.
Do you think you can control or access this data? Why or why not?
-
(a)
What rights do you think you have over the data?
-
(b)
What rights would you like to have over the data?
-
(c)
Why do you believe so?
-
(d)
Would you like to have control and access? If yes, how would you want to view/access/control the data? If no, why not?
-
(a)
-
41.
What do you think the data collected by this device is worth? Why?
-
42.
Who would pay for this data? (May need to inform the participant that different parties could have different valuations.)
-
43.
How do you handle or manage the data collected about you by this device?
-
(a)
If the person does not manage or handle: Why not?
-
(b)
If the person does manage or handle: Why do you do it this way?
-
(c)
If the person wishes to manage or handle but cannot do it or cannot do it well: What would make it easier or more convenient for you to manage the data?
-
(a)
Give participants handouts and ask the following questions:
-
44.
Here is a sheet of paper that has various common objects that are augmented with smart Internet-connected capabilities. Could you please write down your ranking of these devices in terms of the benefit or value you expect from them? Please rank in order starting from the most beneficial and ending with the least beneficial.
Device | Rank |
---|---|
Smart Speaker (e.g., Echo, Alexa, Google Home) | |
Smart TV | |
Smart thermostat | |
Smart doorbell | |
Smart toy | |
Smart refrigerator | |
Internet connected home security camera | |
Smart light bulb | |
Smart household appliance (e.g., Coffee maker, Toaster, Crock pot, etc.) | |
Smart car |
-
(a)
Could you elaborate why you ranked the devices the way you did?
-
(b)
Why do you think [device] is the most beneficial one?
-
(c)
Why do you think [device] is the least beneficial one?
-
45.
Here is another sheet of paper that has the same common objects that are augmented with smart Internet-connected capabilities. This time could you please write down your ranking of these devices in terms of your opinion regarding the sensitivity of the data they collect and process? Please rank in order starting from the most sensitive and ending with the least sensitive.
Device | Rank |
---|---|
Smart Speaker (e.g., Echo, Alexa, Google Home) | |
Smart TV | |
Smart thermostat | |
Smart doorbell | |
Smart toy | |
Smart refrigerator | |
Internet connected home security camera | |
Smart light bulb | |
Smart household appliance (e.g., Coffee maker, Toaster, Crock pot, etc.) | |
Smart car |
-
(a)
Could do you elaborate why you ranked the devices the way you did?
-
(b)
Why do you think [device] is the most sensitive one?
-
(c)
Why do you think [device] is the least sensitive one?
Wrap-up:
-
46.
Is there anything you want to add?
-
47.
Is there any other question I should have asked?
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Hadan, H., Patil, S. (2020). Understanding Perceptions of Smart Devices. In: Bernhard, M., et al. Financial Cryptography and Data Security. FC 2020. Lecture Notes in Computer Science(), vol 12063. Springer, Cham. https://doi.org/10.1007/978-3-030-54455-3_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-54455-3_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-54454-6
Online ISBN: 978-3-030-54455-3
eBook Packages: Computer ScienceComputer Science (R0)