Skip to main content
Top

2020 | OriginalPaper | Chapter

A User-Centered Approach to Digital Household Risk Management

Authors : Cristina Paupini, G. Anthony Giannoumis, Terje Gjøsæter

Published in: HCI International 2020 - Posters

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Internet of Things (IoT) is expected to become as common as electricity (OECD 2016) and there is a high probability for connected homes to become central parts of critical societal. IoT technologies might access, manage and record sensitive data about citizens and, as they become more and more pervasive, unintended data breaches reports increase every week. However, most of the tools designed to protect users’ privacy and personal data on IoT devices fail to contemplate the experience of persons with disabilities, elderly and other vulnerable categories of people. As a consequence, they are forced to rely on the help of family members or other related persons with technical skills, as frequent technical problems turn out to be the rule rather than the exception. With humans traditionally considered to be the “weak link” in technological networks there is the need of a vast educational project to raise awareness on the subject. This ongoing research paper aims to fill the existing gap in research by asking how humans deal with the risk factors linked to connected homes and how to develop a universally designed set of tools for everyday risk management in connected homes.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Helle-Valle, J., Slettemeås, D.: ICTs, domestication and language-games: a Wittgensteinian approach to media uses. New Media Soc. 10(1), 45–66 (2008)CrossRef Helle-Valle, J., Slettemeås, D.: ICTs, domestication and language-games: a Wittgensteinian approach to media uses. New Media Soc. 10(1), 45–66 (2008)CrossRef
2.
go back to reference Kuruczleki, E., et al.: The Readiness of the european union to embrace the fourth industrial revolution. Management (18544223), 11(4) (2016) Kuruczleki, E., et al.: The Readiness of the european union to embrace the fourth industrial revolution. Management (18544223), 11(4) (2016)
3.
go back to reference Dorsemaine, B., et al.: Internet of things: a definition & taxonomy. In: 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies. IEEE (2015) Dorsemaine, B., et al.: Internet of things: a definition & taxonomy. In: 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies. IEEE (2015)
4.
go back to reference Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRef Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRef
5.
go back to reference Ferrara, P., Spoto, F.: Static analysis for GDPR compliance. In: ITASEC (2018) Ferrara, P., Spoto, F.: Static analysis for GDPR compliance. In: ITASEC (2018)
6.
go back to reference Sauer, G., et al.: Accessible privacy and security: a universally usable human-interaction proof tool. Univ. Access Inf. Soc. 9(3), 239–248 (2010)CrossRef Sauer, G., et al.: Accessible privacy and security: a universally usable human-interaction proof tool. Univ. Access Inf. Soc. 9(3), 239–248 (2010)CrossRef
8.
go back to reference Sasse, M.A., Brostoff, S., Weirich, D.: Transforming the ‘weakest link’—a human/computer interaction approach to usable and effective security. BT Technol. J. 19(3), 122–131 (2001)CrossRef Sasse, M.A., Brostoff, S., Weirich, D.: Transforming the ‘weakest link’—a human/computer interaction approach to usable and effective security. BT Technol. J. 19(3), 122–131 (2001)CrossRef
9.
go back to reference Schwab, K.: The Fourth Industrial Revolution. Currency (2017) Schwab, K.: The Fourth Industrial Revolution. Currency (2017)
10.
go back to reference Vulkanovski, A.: Home, Tweet Home”: Implications of the Connected Home, Human and Habitat on Australian Consumers. Australian Communications Consumer Action Network, Sydney (2016) Vulkanovski, A.: Home, Tweet Home”: Implications of the Connected Home, Human and Habitat on Australian Consumers. Australian Communications Consumer Action Network, Sydney (2016)
11.
go back to reference Bertino, E. Data Security and Privacy in the IoT. in EDBT. 2016 Bertino, E. Data Security and Privacy in the IoT. in EDBT. 2016
12.
go back to reference Zanella, A., et al.: Internet of things for smart cities. IEEE Internet Things J. 1(1), 22–32 (2014)CrossRef Zanella, A., et al.: Internet of things for smart cities. IEEE Internet Things J. 1(1), 22–32 (2014)CrossRef
13.
go back to reference Ransbotham, S., et al.: Special section introduction—ubiquitous IT and digital vulnerabilities. Inf. Syst. Res. 27(4), 834–847 (2016)CrossRef Ransbotham, S., et al.: Special section introduction—ubiquitous IT and digital vulnerabilities. Inf. Syst. Res. 27(4), 834–847 (2016)CrossRef
14.
go back to reference Angrishi, K.: Turning internet of things (iot) into internet of vulnerabilities (iov): Iot botnets (2017). arXiv preprint arXiv:1702.03681 Angrishi, K.: Turning internet of things (iot) into internet of vulnerabilities (iov): Iot botnets (2017). arXiv preprint arXiv:​1702.​03681
15.
go back to reference Xi, W., Ling, L.: Research on IoT privacy security risks. In: 2016 International Conference on Industrial Informatics-Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII). IEEE (2016) Xi, W., Ling, L.: Research on IoT privacy security risks. In: 2016 International Conference on Industrial Informatics-Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII). IEEE (2016)
16.
go back to reference Rawlinson, K.: Hp study reveals 70 percent of internet of things devices vulnerable to attack. HP, 29, July 2014 Rawlinson, K.: Hp study reveals 70 percent of internet of things devices vulnerable to attack. HP, 29, July 2014
17.
go back to reference Bertino, E.: Data privacy for IoT systems: concepts, approaches, and research directions. In: 2016 IEEE International Conference on Big Data (Big Data). IEEE (2016) Bertino, E.: Data privacy for IoT systems: concepts, approaches, and research directions. In: 2016 IEEE International Conference on Big Data (Big Data). IEEE (2016)
18.
go back to reference Barth, S., De Jong, M.D.: The privacy paradox–Investigating discrepancies between expressed privacy concerns and actual online behavior–a systematic literature review. Telematics Inf. 34(7), 1038–1058 (2017)CrossRef Barth, S., De Jong, M.D.: The privacy paradox–Investigating discrepancies between expressed privacy concerns and actual online behavior–a systematic literature review. Telematics Inf. 34(7), 1038–1058 (2017)CrossRef
19.
go back to reference Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Secur. Priv. 3(1), 26–33 (2005)CrossRef Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Secur. Priv. 3(1), 26–33 (2005)CrossRef
20.
go back to reference Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. In: Proceedings of the 3rd ACM Conference on Electronic Commerce. ACM (2001) Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. In: Proceedings of the 3rd ACM Conference on Electronic Commerce. ACM (2001)
21.
go back to reference Morando, F., R. Iemma, and E. Raiteri, Privacy evaluation: what empirical research on users’ valuation of personal data tells us. Internet Policy Rev. 3(2) (2014) Morando, F., R. Iemma, and E. Raiteri, Privacy evaluation: what empirical research on users’ valuation of personal data tells us. Internet Policy Rev. 3(2) (2014)
22.
go back to reference Norberg, P.A., Horne, D.R., Horne, D.A.: The privacy paradox: personal information disclosure intentions versus behaviors. J. Consum. Aff. 41(1), 100–126 (2007)CrossRef Norberg, P.A., Horne, D.R., Horne, D.A.: The privacy paradox: personal information disclosure intentions versus behaviors. J. Consum. Aff. 41(1), 100–126 (2007)CrossRef
23.
go back to reference Cohen, D., Crabtree, B.: Qualitative research guidelines project (2006) Cohen, D., Crabtree, B.: Qualitative research guidelines project (2006)
24.
go back to reference Bilandzic, M., Venable, J.: Towards participatory action design research: adapting action research and design science research methods for urban informatics. J. Commun. Inf. 7(3) (2011) Bilandzic, M., Venable, J.: Towards participatory action design research: adapting action research and design science research methods for urban informatics. J. Commun. Inf. 7(3) (2011)
25.
go back to reference McTaggart, R.: Principles for participatory action research. Adult Educ. Q. 41(3), 168–187 (1991)CrossRef McTaggart, R.: Principles for participatory action research. Adult Educ. Q. 41(3), 168–187 (1991)CrossRef
26.
go back to reference Sanders, E.B.-N., Stappers, P.J.: Co-creation and the new landscapes of design. Co-design 4(1), 5–18 (2008) Sanders, E.B.-N., Stappers, P.J.: Co-creation and the new landscapes of design. Co-design 4(1), 5–18 (2008)
27.
go back to reference Schön, D.A.: The Reflective Practitioner, vol. 1083, New York (1983) Schön, D.A.: The Reflective Practitioner, vol. 1083, New York (1983)
Metadata
Title
A User-Centered Approach to Digital Household Risk Management
Authors
Cristina Paupini
G. Anthony Giannoumis
Terje Gjøsæter
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-50732-9_12