Skip to main content

2024 | OriginalPaper | Buchkapitel

User-Driven Privacy Factors in Trigger-Action Apps: A Comparative Analysis with General IoT

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The growing adoption of Trigger-Action Platforms (TAPs) in the Internet of Things (IoT) paradigm has evolved users’ ability to automate their digital environments. However, this automation also introduces potential threats to users’ privacy. To enhance users’ privacy decisions and develop effective permission management systems, it is crucial to understand users’ comprehension of privacy factors in the IoT. This paper presents a literature review on privacy factors in the general IoT environment and compares them with users’ priorities and preferences for privacy factors specific to TAPs. To this end, we earlier conducted three Focus Groups (FGs) to gather users’ definitions and rankings of privacy factors in the TAPs context. Through the comparison with the general IoT literature, we highlight the similarities and differences in privacy factors between TAPs and traditional IoT applications. The outcomes of this study can inform the designers and developers with an emphasis on privacy-centric IoT TAPs.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Abbott, J., et al.: Privacy lessons learnt from deploying an IoT ecosystem in the home. In: EuroUSEC 2022 (2022) Abbott, J., et al.: Privacy lessons learnt from deploying an IoT ecosystem in the home. In: EuroUSEC 2022 (2022)
2.
Zurück zum Zitat Al-Ameen, M.N., Chauhan, A., Ahsan, M.A.M., Kocabas, H.: A look into user’s privacy perceptions and data practices of IoT devices. IJICS (2021) Al-Ameen, M.N., Chauhan, A., Ahsan, M.A.M., Kocabas, H.: A look into user’s privacy perceptions and data practices of IoT devices. IJICS (2021)
3.
Zurück zum Zitat Alaiad, A., Zhou, L.: Patients’ Adoption of WSN-based smart home healthcare systems: an integrated model of facilitators and barriers. In: ProComm (2017) Alaiad, A., Zhou, L.: Patients’ Adoption of WSN-based smart home healthcare systems: an integrated model of facilitators and barriers. In: ProComm (2017)
4.
Zurück zum Zitat Alraja, M.: Frontline healthcare providers’ behavioural intention to internet of things (IoT)-enabled healthcare applications: a gender-based, cross-generational study. Technol. Forecast. Soc. Change 174, 121256 (2022)CrossRef Alraja, M.: Frontline healthcare providers’ behavioural intention to internet of things (IoT)-enabled healthcare applications: a gender-based, cross-generational study. Technol. Forecast. Soc. Change 174, 121256 (2022)CrossRef
5.
Zurück zum Zitat Alshehri, A., Spielman, J., Prasad, A., Yue, C.: Exploring the privacy concerns of bystanders in smart homes from the perspectives of both owners and bystanders. In: Proceedings on Privacy Enhancing Technologies (2022) Alshehri, A., Spielman, J., Prasad, A., Yue, C.: Exploring the privacy concerns of bystanders in smart homes from the perspectives of both owners and bystanders. In: Proceedings on Privacy Enhancing Technologies (2022)
6.
Zurück zum Zitat Ando, R., Shima, S., Takemura, T.: Analysis of privacy and security affecting the intention of use in personal data collection in an IoT environment (2016) Ando, R., Shima, S., Takemura, T.: Analysis of privacy and security affecting the intention of use in personal data collection in an IoT environment (2016)
7.
Zurück zum Zitat Apthorpe, N., Shvartzshnaider, Y., Mathur, A., Reisman, D., Feamster, N.: Discovering smart home internet of things privacy norms using contextual integrity. In: IMWUT (2018) Apthorpe, N., Shvartzshnaider, Y., Mathur, A., Reisman, D., Feamster, N.: Discovering smart home internet of things privacy norms using contextual integrity. In: IMWUT (2018)
8.
Zurück zum Zitat Brandtzaeg, P.B., Pultier, A., Moen, G.M.: Losing control to data-hungry apps: a mixed-methods approach to mobile app privacy. Soc. Sci. Comput. Rev. 37, 466–488 (2019)CrossRef Brandtzaeg, P.B., Pultier, A., Moen, G.M.: Losing control to data-hungry apps: a mixed-methods approach to mobile app privacy. Soc. Sci. Comput. Rev. 37, 466–488 (2019)CrossRef
9.
Zurück zum Zitat Cannizzaro, S., Procter, R., Ma, S., Maple, C.: Trust in the smart home: findings from a nationally representative survey in the UK. PLoS ONE 15, e0231615 (2020)CrossRef Cannizzaro, S., Procter, R., Ma, S., Maple, C.: Trust in the smart home: findings from a nationally representative survey in the UK. PLoS ONE 15, e0231615 (2020)CrossRef
10.
Zurück zum Zitat Celik, Z.B., McDaniel, P., Tan, G.: SOTERIA: automated IoT safety and security analysis. In: USENIX ATC 2018 (2018) Celik, Z.B., McDaniel, P., Tan, G.: SOTERIA: automated IoT safety and security analysis. In: USENIX ATC 2018 (2018)
11.
Zurück zum Zitat Cheong, P.H., Nyaupane, P.: Smart campus communication, IoT, and data governance: understanding student tensions and imaginaries. Big Data Soc. (2022) Cheong, P.H., Nyaupane, P.: Smart campus communication, IoT, and data governance: understanding student tensions and imaginaries. Big Data Soc. (2022)
12.
Zurück zum Zitat Cleveland, S.M., Haddara, M.: Internet of Things for diabetics: identifying adoption issues. Internet Things (2023) Cleveland, S.M., Haddara, M.: Internet of Things for diabetics: identifying adoption issues. Internet Things (2023)
13.
Zurück zum Zitat Cobb, C., et al.: How risky are real users’ IFTTT applets? In: Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020) (2020) Cobb, C., et al.: How risky are real users’ IFTTT applets? In: Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020) (2020)
14.
Zurück zum Zitat Colnago, J., et al.: Informing the design of a personalized privacy assistant for the internet of things. In: CHI (2020) Colnago, J., et al.: Informing the design of a personalized privacy assistant for the internet of things. In: CHI (2020)
16.
Zurück zum Zitat Dong, X., Chang, Y., Wang, Y., Yan, J.: Understanding usage of internet of things (IOT) systems in China. Inf. Technol. People 30, 117–138 (2017)CrossRef Dong, X., Chang, Y., Wang, Y., Yan, J.: Understanding usage of internet of things (IOT) systems in China. Inf. Technol. People 30, 117–138 (2017)CrossRef
17.
Zurück zum Zitat Emami-Naeini, P., Agarwal, Y., Cranor, L.F., Hibshi, H.: Ask the experts: what should be on an IoT privacy and security label? In: S&P (2020) Emami-Naeini, P., Agarwal, Y., Cranor, L.F., Hibshi, H.: Ask the experts: what should be on an IoT privacy and security label? In: S&P (2020)
18.
Zurück zum Zitat Emami-Naeini, P., Dheenadhayalan, J., Agarwal, Y., Cranor, L.F.: Which privacy and security attributes most impact consumers’ risk perception and willingness to purchase IoT devices? In: S&P (2021) Emami-Naeini, P., Dheenadhayalan, J., Agarwal, Y., Cranor, L.F.: Which privacy and security attributes most impact consumers’ risk perception and willingness to purchase IoT devices? In: S&P (2021)
19.
Zurück zum Zitat Emami-Naeini, P., Dixon, H., Agarwal, Y., Cranor, L.F.: Exploring how privacy and security factor into IoT device purchase behavior. In: CHI (2019) Emami-Naeini, P., Dixon, H., Agarwal, Y., Cranor, L.F.: Exploring how privacy and security factor into IoT device purchase behavior. In: CHI (2019)
20.
Zurück zum Zitat Foltz, C.B., Foltz, L.: Mobile users’ information privacy concerns instrument and IoT. Inf. Comput. Secur. 28, 359–371 (2020)CrossRef Foltz, C.B., Foltz, L.: Mobile users’ information privacy concerns instrument and IoT. Inf. Comput. Secur. 28, 359–371 (2020)CrossRef
21.
Zurück zum Zitat George, J.F., Chen, R., Yuan, L.: Intent to purchase IoT home security devices: fear vs privacy. PLoS ONE 16, e0257601 (2021)CrossRef George, J.F., Chen, R., Yuan, L.: Intent to purchase IoT home security devices: fear vs privacy. PLoS ONE 16, e0257601 (2021)CrossRef
22.
Zurück zum Zitat Gopalakrishna, N.K., Anandayuvaraj, D., Detti, A., Bland, F.L., Rahaman, S., Davis, J.C.: If security is required. In: Proceedings of the 4th International Workshop on Software Engineering Research and Practice for the IoT (2022) Gopalakrishna, N.K., Anandayuvaraj, D., Detti, A., Bland, F.L., Rahaman, S., Davis, J.C.: If security is required. In: Proceedings of the 4th International Workshop on Software Engineering Research and Practice for the IoT (2022)
23.
Zurück zum Zitat Harkin, D., Mann, M., Warren, I.: Consumer IoT and its under-regulation: findings from an Australian study. Policy Internet 14, 96–113 (2022)CrossRef Harkin, D., Mann, M., Warren, I.: Consumer IoT and its under-regulation: findings from an Australian study. Policy Internet 14, 96–113 (2022)CrossRef
24.
Zurück zum Zitat Hong, A., Nam, C., Kim, S.: What will be the possible barriers to consumers’ adoption of smart home services? Telecommun. Policy 44, 101867 (2020)CrossRef Hong, A., Nam, C., Kim, S.: What will be the possible barriers to consumers’ adoption of smart home services? Telecommun. Policy 44, 101867 (2020)CrossRef
25.
Zurück zum Zitat Hsu, C.L., Lin, J.C.C.: An empirical examination of consumer adoption of Internet of Things services: network externalities and concern for information privacy perspectives. Comput. Hum. Behav. 62, 516–527 (2016)CrossRef Hsu, C.L., Lin, J.C.C.: An empirical examination of consumer adoption of Internet of Things services: network externalities and concern for information privacy perspectives. Comput. Hum. Behav. 62, 516–527 (2016)CrossRef
26.
Zurück zum Zitat Jaspers, E.D.T., Pearson, E.: Consumers’ acceptance of domestic internet-of-things: the role of trust and privacy concerns. J. Bus. Res. 142, 255–265 (2022)CrossRef Jaspers, E.D.T., Pearson, E.: Consumers’ acceptance of domestic internet-of-things: the role of trust and privacy concerns. J. Bus. Res. 142, 255–265 (2022)CrossRef
27.
Zurück zum Zitat Jeon, H., Lee, C.: Internet of things technology: balancing privacy concerns with convenience. Telemat. Inform. 70, 101816 (2022)CrossRef Jeon, H., Lee, C.: Internet of things technology: balancing privacy concerns with convenience. Telemat. Inform. 70, 101816 (2022)CrossRef
28.
Zurück zum Zitat Kim, D., Park, K., Park, Y., Ahn, J.H.: Willingness to provide personal information: perspective of privacy calculus in IoT services. Comput. Hum. Behav. 92, 273–281 (2019)CrossRef Kim, D., Park, K., Park, Y., Ahn, J.H.: Willingness to provide personal information: perspective of privacy calculus in IoT services. Comput. Hum. Behav. 92, 273–281 (2019)CrossRef
31.
Zurück zum Zitat Kulyk, O., Milanovic, K., Pitt, J.: Does my smart device provider care about my privacy? investigating trust factors and user attitudes in iot systems. In: Proceedings of the 11th NordiCHI (2020) Kulyk, O., Milanovic, K., Pitt, J.: Does my smart device provider care about my privacy? investigating trust factors and user attitudes in iot systems. In: Proceedings of the 11th NordiCHI (2020)
32.
Zurück zum Zitat Lafontaine, E., Sabir, A., Das, A.: Understanding people’s attitude and concerns towards adopting IoT devices. In: Extended Abstracts of the 2021 CHI (2021) Lafontaine, E., Sabir, A., Das, A.: Understanding people’s attitude and concerns towards adopting IoT devices. In: Extended Abstracts of the 2021 CHI (2021)
33.
Zurück zum Zitat Lee, A.R.: Investigating the personalization-privacy paradox in internet of things (IoT) based on dual-factor theory, moderating effects of type of IoT service and user value. Sustainability 13, 10679 (2021)CrossRef Lee, A.R.: Investigating the personalization-privacy paradox in internet of things (IoT) based on dual-factor theory, moderating effects of type of IoT service and user value. Sustainability 13, 10679 (2021)CrossRef
34.
Zurück zum Zitat Lee, H., Kobsa, A.: Privacy preference modeling and prediction in a simulated campuswide IoT environment. In: PerCom (2017) Lee, H., Kobsa, A.: Privacy preference modeling and prediction in a simulated campuswide IoT environment. In: PerCom (2017)
35.
36.
Zurück zum Zitat Lenz, J., Bozakov, Z., Wendzel, S., Vrhovec, S.: Why people replace their aging smart devices: a push-pull-mooring perspective. Comput. Secur. 130, 103258 (2023)CrossRef Lenz, J., Bozakov, Z., Wendzel, S., Vrhovec, S.: Why people replace their aging smart devices: a push-pull-mooring perspective. Comput. Secur. 130, 103258 (2023)CrossRef
37.
Zurück zum Zitat Liu, Y.L., Huang, L., Yan, W., Wang, X., Zhang, R.: Privacy in AI and the IoT: the privacy concerns of smart speaker users and the personal information protection law in China. Telecommun. Policy 46, 102334 (2022)CrossRef Liu, Y.L., Huang, L., Yan, W., Wang, X., Zhang, R.: Privacy in AI and the IoT: the privacy concerns of smart speaker users and the personal information protection law in China. Telecommun. Policy 46, 102334 (2022)CrossRef
38.
Zurück zum Zitat Luthfi, A., Emigawaty, E.: Towards privacy by design on the internet of things (IoT) use: a qualitative descriptive study. IJHISI (2022) Luthfi, A., Emigawaty, E.: Towards privacy by design on the internet of things (IoT) use: a qualitative descriptive study. IJHISI (2022)
39.
Zurück zum Zitat Mahadewa, K., et al.: Identifying privacy weaknesses from multi-party trigger-action integration platforms. In: 30th ACM SIGSOFT (2021) Mahadewa, K., et al.: Identifying privacy weaknesses from multi-party trigger-action integration platforms. In: 30th ACM SIGSOFT (2021)
40.
Zurück zum Zitat Mann, M., Wilson, M., Warren, I.: Smart parenting? The internet of things, children’s privacy, and data justice. Int. J. Child. Rights 30, 204–231 (2022)CrossRef Mann, M., Wilson, M., Warren, I.: Smart parenting? The internet of things, children’s privacy, and data justice. Int. J. Child. Rights 30, 204–231 (2022)CrossRef
41.
Zurück zum Zitat Marky, K., Gerber, N., Pelzer, M.G., Khamis, M., Mühlhäuser, M.: “You offer privacy like you offer tea”: investigating mechanisms for improving guest privacy in IoT-equipped households. Proc. Priv. Enhanc. Technol. (2022) Marky, K., Gerber, N., Pelzer, M.G., Khamis, M., Mühlhäuser, M.: “You offer privacy like you offer tea”: investigating mechanisms for improving guest privacy in IoT-equipped households. Proc. Priv. Enhanc. Technol. (2022)
42.
Zurück zum Zitat Marreiros, H., Gomer, R.C., Vlassopoulos, M., Tonin, M., Schraefel, M.C.: Exploring user perceptions of online privacy disclosures. In: IADIS (2015) Marreiros, H., Gomer, R.C., Vlassopoulos, M., Tonin, M., Schraefel, M.C.: Exploring user perceptions of online privacy disclosures. In: IADIS (2015)
43.
Zurück zum Zitat Maus, B., Olsson, C.M., Salvi, D.: Privacy personas for IoT-based health research: a privacy calculus approach. Front. Digit. Health 3, 675754 (2021)CrossRef Maus, B., Olsson, C.M., Salvi, D.: Privacy personas for IoT-based health research: a privacy calculus approach. Front. Digit. Health 3, 675754 (2021)CrossRef
44.
Zurück zum Zitat Menard, P., Bott, G.J.: Analyzing IOT users’ mobile device privacy concerns: extracting privacy permissions using a disclosure experiment. Comput. Secur. 95, 101856 (2020)CrossRef Menard, P., Bott, G.J.: Analyzing IOT users’ mobile device privacy concerns: extracting privacy permissions using a disclosure experiment. Comput. Secur. 95, 101856 (2020)CrossRef
45.
Zurück zum Zitat Montanari, A., Mashhadi, A., Mathur, A., Kawsar, F.: Understanding the privacy design space for personal connected objects. In: eWiC (2016) Montanari, A., Mashhadi, A., Mathur, A., Kawsar, F.: Understanding the privacy design space for personal connected objects. In: eWiC (2016)
46.
Zurück zum Zitat Morgan, P.L., Collins, E.I., Spiliotopoulos, T., Greeno, D.J., Jones, D.M.: Reducing risk to security and privacy in the selection of trigger-action rules: implicit vs. explicit priming for domestic smart devices. Int. J. Hum.-Comput. Stud. 168, 102902 (2022) Morgan, P.L., Collins, E.I., Spiliotopoulos, T., Greeno, D.J., Jones, D.M.: Reducing risk to security and privacy in the selection of trigger-action rules: implicit vs. explicit priming for domestic smart devices. Int. J. Hum.-Comput. Stud. 168, 102902 (2022)
47.
Zurück zum Zitat Naeini, P.E., et al.: Privacy expectations and preferences in an IoT world. In: SOUPS (2017) Naeini, P.E., et al.: Privacy expectations and preferences in an IoT world. In: SOUPS (2017)
48.
Zurück zum Zitat Naeini, P.E., et al.: Privacy expectations and preferences in an IoT world. In: Symposium on Usable Privacy and Security (2017) Naeini, P.E., et al.: Privacy expectations and preferences in an IoT world. In: Symposium on Usable Privacy and Security (2017)
49.
Zurück zum Zitat Padyab, A., Ståhlbröst, A.: Exploring the dimensions of individual privacy concerns in relation to the internet of things use situations. Digit. Policy Regul. Govern. 20, 528–544 (2018)CrossRef Padyab, A., Ståhlbröst, A.: Exploring the dimensions of individual privacy concerns in relation to the internet of things use situations. Digit. Policy Regul. Govern. 20, 528–544 (2018)CrossRef
50.
Zurück zum Zitat Pal, D., Papasratorn, B., Chutimaskul, W., Funilkul, S.: Embracing the smart-home revolution in Asia by the elderly: an end-user negative perception modeling. IEEE Access 7, 38535–38549 (2019)CrossRef Pal, D., Papasratorn, B., Chutimaskul, W., Funilkul, S.: Embracing the smart-home revolution in Asia by the elderly: an end-user negative perception modeling. IEEE Access 7, 38535–38549 (2019)CrossRef
51.
Zurück zum Zitat Ponciano, L., Barbosa, P., Brasileiro, F., Brito, A., Andrade, N.: Designing for pragmatists and fundamentalists. In: IHC (2017) Ponciano, L., Barbosa, P., Brasileiro, F., Brito, A., Andrade, N.: Designing for pragmatists and fundamentalists. In: IHC (2017)
52.
Zurück zum Zitat Psychoula, I., Singh, D., Chen, L., Chen, F., Holzinger, A., Ning, H.: Users’ privacy concerns in IoT based applications. In: SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI (2018) Psychoula, I., Singh, D., Chen, L., Chen, F., Holzinger, A., Ning, H.: Users’ privacy concerns in IoT based applications. In: SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI (2018)
53.
Zurück zum Zitat Railean, A., Reinhardt, D.: Life-long privacy in the IoT? Measuring privacy attitudes throughout the life-cycle of IoT devices. In: Hansen, M., Kosta, E., Nai-Fovino, I., Fischer-Hübner, S. (eds.) Privacy and Identity 2017. IAICT, vol. 526, pp. 132–149. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-92925-5_9CrossRef Railean, A., Reinhardt, D.: Life-long privacy in the IoT? Measuring privacy attitudes throughout the life-cycle of IoT devices. In: Hansen, M., Kosta, E., Nai-Fovino, I., Fischer-Hübner, S. (eds.) Privacy and Identity 2017. IAICT, vol. 526, pp. 132–149. Springer, Cham (2018). https://​doi.​org/​10.​1007/​978-3-319-92925-5_​9CrossRef
54.
Zurück zum Zitat Romare, P., Morel, V., Karegar, F., Fischer-Hübner, S.: Tapping into privacy: a study of user preferences and concerns on trigger-action platforms. In: 2023 20th Annual International Conference on Privacy, Security and Trust (PST) (2023) Romare, P., Morel, V., Karegar, F., Fischer-Hübner, S.: Tapping into privacy: a study of user preferences and concerns on trigger-action platforms. In: 2023 20th Annual International Conference on Privacy, Security and Trust (PST) (2023)
55.
Zurück zum Zitat Saeidi, M., Calvert, M., Au, A., Sarma, A., Bobba, R.B.: If this context then that concern: exploring users’ concerns with IFTTT applets. CoRR (2020) Saeidi, M., Calvert, M., Au, A., Sarma, A., Bobba, R.B.: If this context then that concern: exploring users’ concerns with IFTTT applets. CoRR (2020)
56.
Zurück zum Zitat Sah, J., Jun, S.: The role of consumers’ privacy awareness in the privacy calculus for IoT services. Int. J. Hum.-Comput. Interact. (2023) Sah, J., Jun, S.: The role of consumers’ privacy awareness in the privacy calculus for IoT services. Int. J. Hum.-Comput. Interact. (2023)
58.
Zurück zum Zitat Spahn, M., Dörner, C., Wulf, V.: End user development: approaches towards a flexible software design. In: European Conference on Information Systems (2008) Spahn, M., Dörner, C., Wulf, V.: End user development: approaches towards a flexible software design. In: European Conference on Information Systems (2008)
59.
Zurück zum Zitat Surbatovich, M., Aljuraidan, J., Bauer, L., Das, A., Jia, L.: Some recipes can do more than spoil your appetite: analyzing the security and privacy risks of IFTTT recipes. In: Proceedings of the 26th International Conference on WWW (2017) Surbatovich, M., Aljuraidan, J., Bauer, L., Das, A., Jia, L.: Some recipes can do more than spoil your appetite: analyzing the security and privacy risks of IFTTT recipes. In: Proceedings of the 26th International Conference on WWW (2017)
60.
Zurück zum Zitat Wang, S., et al.: Technology to Support Aging in Place: Older Adults’ Perspectives. In: Healthcare (2019) Wang, S., et al.: Technology to Support Aging in Place: Older Adults’ Perspectives. In: Healthcare (2019)
61.
Zurück zum Zitat Wang, X., McGill, T.J., Klobas, J.E.: I want it anyway: consumer perceptions of smart home devices. J. Comput. Inf. Syst. (2018) Wang, X., McGill, T.J., Klobas, J.E.: I want it anyway: consumer perceptions of smart home devices. J. Comput. Inf. Syst. (2018)
62.
Zurück zum Zitat Wickramasinghe, C.I., Reinhardt, D.: A survey-based exploration of users’ awareness and their willingness to protect their data with smart objects. In: Friedewald, M., Önen, M., Lievens, E., Krenn, S., Fricker, S. (eds.) Privacy and Identity 2019. IAICT, vol. 576, pp. 427–446. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-42504-3_27CrossRef Wickramasinghe, C.I., Reinhardt, D.: A survey-based exploration of users’ awareness and their willingness to protect their data with smart objects. In: Friedewald, M., Önen, M., Lievens, E., Krenn, S., Fricker, S. (eds.) Privacy and Identity 2019. IAICT, vol. 576, pp. 427–446. Springer, Cham (2020). https://​doi.​org/​10.​1007/​978-3-030-42504-3_​27CrossRef
63.
Zurück zum Zitat Williams, M., Nurse, J.R.C., Creese, S.: Privacy is the boring bit: user perceptions and behaviour in the internet-of-things. In: PST (2017) Williams, M., Nurse, J.R.C., Creese, S.: Privacy is the boring bit: user perceptions and behaviour in the internet-of-things. In: PST (2017)
64.
Zurück zum Zitat Yao, Y., Basdeo, J.R., Mcdonough, O.R., Wang, Y.: Privacy perceptions and designs of bystanders in smart homes. Proc. ACM Hum. Comput. Interact. 3, 1–24 (2019)CrossRef Yao, Y., Basdeo, J.R., Mcdonough, O.R., Wang, Y.: Privacy perceptions and designs of bystanders in smart homes. Proc. ACM Hum. Comput. Interact. 3, 1–24 (2019)CrossRef
65.
Zurück zum Zitat Yildirim, H., Ali-Eldin, A.M.T.: A model for predicting user intention to use wearable IoT devices at the workplace. J. King Saud Univ. Comput. Inf. Sci. 31, 497-505 (2019) Yildirim, H., Ali-Eldin, A.M.T.: A model for predicting user intention to use wearable IoT devices at the workplace. J. King Saud Univ. Comput. Inf. Sci. 31, 497-505 (2019)
66.
Zurück zum Zitat Zeng, E., Mare, S., Roesner, F.: End user security & privacy concerns with smart homes. In: USENIX (2017) Zeng, E., Mare, S., Roesner, F.: End user security & privacy concerns with smart homes. In: USENIX (2017)
68.
Zurück zum Zitat Zhao, V., Zhang, L., Wang, B., Lu, S., Ur, B.: Visualizing differences to improve end-user understanding of trigger-action programs. In: CHI EA 2020 (2020) Zhao, V., Zhang, L., Wang, B., Lu, S., Ur, B.: Visualizing differences to improve end-user understanding of trigger-action programs. In: CHI EA 2020 (2020)
69.
Zurück zum Zitat Zheng, S., Apthorpe, N., Chetty, M., Feamster, N.: User perceptions of smart home IoT privacy. Proc. ACM Hum. Comput. Interact. 2, 1–20 (2018)CrossRef Zheng, S., Apthorpe, N., Chetty, M., Feamster, N.: User perceptions of smart home IoT privacy. Proc. ACM Hum. Comput. Interact. 2, 1–20 (2018)CrossRef
Metadaten
Titel
User-Driven Privacy Factors in Trigger-Action Apps: A Comparative Analysis with General IoT
verfasst von
Piero Romare
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-57978-3_16