Privacy Concerns about Smart Home Devices: A Comparative Analysis between Non-Users and Users

  • Abstract
  • Literature Map
  • Similar Papers
Abstract
Translate article icon Translate Article Star icon
Take notes icon Take Notes

Privacy concerns of smart home device (SHD) users have been largely explored but those of non-users are under-explored. The success of smart home technology comes to fruition only when concerns of both users and non-users are addressed. Understanding of non-user concerns is essential to inform the design of user-centric privacy-preserving SHDs, facilitate acceptance, and bridge the digital divide between non-users and users. To address this gap, we conducted a survey of SHD non-users and comparatively analyzed their privacy concerns with those of users.Methods: We used university email list-servs, snowball sampling and random sampling methods to recruit participants (n=91) for an IRB-approved online survey, titled ‘smart home study’. Our pre-tested questionnaire asked about SHD (non-)usage, privacy concerns (open-ended), suggestions for developers and demographics. We followed a mixed-methods approach to analyze privacy concerns (qualitative/thematic), explore non-use reasons (qualitative/thematic), compare non-users and users concerns (quantitative), and analyze design suggestions (qualitative/thematic). Results: Thematic analysis of privacy concerns of non-users (n=41) and users (n=50) by two researchers performing open-coding (Cohen’s kappa = 0.8) resulted in 17 codes. We then performed axial coding to generate three thematic areas of privacy concerns. The first theme was ‘data collection concerns’ which included five codes: recording audio/video, tracking occupancy, listening to private conversations, monitoring usage/behavior, and identity theft. The second theme was ‘data sharing concerns’ which included four codes: selling data, third party data access, leakage without consent, and marketing data. The third theme was ‘data protection concerns’ which included eight codes: hacking, data handling, protecting data, secondary use, aggregation, data abuse, data loss, and fraud. The three privacy concerns themes belong to the personal communication and personal data privacy dimensions of privacy. Chi-square test between non-users and users showed the privacy concerns of non-users differed significantly (X2=8.46, p<0.05) from users. Non-users reported higher level of concerns in data collection and data protection themes than those of users (46% vs 24% and 34% vs 30% respectively). However, non-users reported fewer concerns in the data sharing theme than those of users (15% vs 28% respectively).Most non-users reported their non-use reason to be privacy concerns (68%). Other non-use reasons included lack of interest in SHDs (32%), cost (22%), lack of perceived usefulness (12%), insecurity or potential of hacking (10%), and perceived difficulty of usage (7%).The thematic analysis of participants’ suggestions for developers resulted in four main themes: (a) data anonymization and minimization, (b) data protection and security, (c) transparent data use policies, and (d) user-centric practices. Based on our findings, we recommend that developers address the data collection and data protection concerns to allow SHD non-users to consider using them. In addition, we recommend addressing data sharing concerns to retain trust of current users. We discuss some guidelines in the paper.Conclusion: This paper contributes by eliciting SHD non-user privacy concerns and provides insights on addressing the concerns, which will be useful for developers towards the design of user-centric privacy-preserving SHDs.

Similar Papers
  • Book Chapter
  • Cite Count Icon 3
  • 10.1007/978-3-030-21935-2_6
Towards an Understanding of College Students’ Perceptions of Smart Home Devices
  • Jan 1, 2019
  • Christine E Wania

The concept of a smart home has evolved over several decades. There are many advantages and potential advantages of smart homes, smart home devices and smart living. There are also disadvantages, risks and concerns with smart home devices. There has been significant work examining adults’ perceptions of smart home technologies and devices, particularly in adults over the age of 40 in the areas of energy policy and assistive technologies. There has not been as much work examining perceptions of adults under the age of 40. The goal of this research is to further understand college students’ familiarity with smart home devices, use of smart home devices, willingness to use such devices, and the perceived advantages and disadvantages of smart home devices. This study extends previous research by gathering college students’ perceptions of smart home devices. The results of this study suggest that most of the college students surveyed perceived some usefulness and potential benefits of smart home devices, but they also had many concerns. Less than half of the college students surveyed indicated a desire to use smart home devices. A deeper understanding of younger adults’ perceptions, expectations, and concerns may assist device manufacturers, researchers, and potential users of smart home devices. Further work is needed in this area.

  • Research Article
  • Cite Count Icon 1
  • 10.1044/leader.hytt.25032020.38
Motivate AAC Switch Practice With Smart-Home Tech
  • Feb 28, 2020
  • The ASHA Leader
  • Pei-Lin Weng

Motivate AAC Switch Practice With Smart-Home Tech

  • Research Article
  • 10.26265/polynoe-967
Ασφάλεια και προστασία ιδιωτικότητας οικιακών συσκευών που λειτουργούν σε περιβάλλον ΔτΠ
  • Jul 1, 2021
  • Σταύρος Μάρας

Nowadays, Internet of Things (IoT) is a technology that is steadily moving towards universal acceptance. Terms like smart home are no longer a science fiction scenario but a reality. Home appliances and their applications have now evolved to connect to the home network and communicate with the Internet. For this reason, they are known as smart home devices, which can communicate with each other or with humans, analyzing and exchanging information using standard communication protocols to connect to the home network and the Internet. The use of IoT technology in the context of the smart home leads to new security and privacy challenges, as a huge amount of data is transmitted from the devices within the IoT environment. Therefore, IoT-enabled smart homes have high security requirements, as the home environment contains important and private information. Although, modern technologies can offer great opportunities to users, at the same time they present a serious of risks. An IoT-enabled smart home seems to be very vulnerable to cyber-attacks. In case that a smart home or a smart home devise is compromised, the attacker has the ability to invade the user's privacy, steal personal information and monitor everything that happens in the home. For this reason, taking appropriate protection measures is more than necessary. The purpose of this paper is to study the security and privacy protection of IoT- enabled smart home devices. For this reason, first, there will be a presentation of smart home devices and their communication architecture in the field of a smart home. Next, an analysis will be made of the security and privacy issues that may arise as well as the cyber-attacks they may undergo. Finally, examples of attacks on IoT-enabled smart home devices will be given and a reference to the security solutions and solutions presented in the literature will be given.

  • Conference Article
  • Cite Count Icon 6
  • 10.1145/3472307.3484664
Smart Home Agents and Devices of Today and Tomorrow: Surveying Use and Desires
  • Nov 9, 2021
  • Samantha Reig + 5 more

How are people using current smart home technologies, and how do they conceptualize future ones that are more interconnected and more capable than those available today? We deployed an online survey study to 150 participants to investigate use of and opinions about smart speakers, home robots, virtual assistants, and other smart home devices. We also gauged how impressions of connected smart home devices are shaped by the way the devices interact with one another. Through a mixed-methods qualitative and quantitative approach, we found that people mostly use single devices for single functions, and have simple and brief interactions with virtual assistants. However, they imagine their future devices to have more control over the physical environment (i.e., interact with each other) and envision them interacting with people in more socially complex ways. These findings motivate design considerations and research directions for connected smart home technologies.

  • Research Article
  • Cite Count Icon 10
  • 10.1016/j.pmcj.2023.101843
A puf-based three-party authentication key establishment scheme for fog-enabled smart home
  • Sep 18, 2023
  • Pervasive and Mobile Computing
  • Huan Yang + 2 more

A puf-based three-party authentication key establishment scheme for fog-enabled smart home

  • Research Article
  • Cite Count Icon 69
  • 10.1016/j.chb.2017.06.031
Companionship with smart home devices: The impact of social connectedness and interaction types on perceived social support and companionship in smart homes
  • Jun 20, 2017
  • Computers in Human Behavior
  • Byounggwan Lee + 3 more

Companionship with smart home devices: The impact of social connectedness and interaction types on perceived social support and companionship in smart homes

  • Research Article
  • Cite Count Icon 17
  • 10.1145/3546719
The Skewed Privacy Concerns of Bystanders in Smart Environments
  • Sep 19, 2022
  • Proceedings of the ACM on Human-Computer Interaction
  • Maximiliane Windl + 1 more

As ubiquitous computing brings sensors and actuators directly into our homes, they introduce privacy concerns for the owners and bystanders. However, privacy concerns may vary among devices and depend on the bystanders' social relation to the owner. In this work, we hypothesize 1) that bystanders assign more privacy concerns to smart home devices than personal computing devices, such as smartphones, even though they have the same capabilities, and 2) that a stronger social relationship mitigates some of the bystanders' privacy concerns. By conducting an online survey (n=170), we found that personal computing devices are perceived as significantly less privacy-concerning than smart home devices while having equal capabilities. By varying the assumed social relationship, we further found that a stronger connection to the owner reduces privacy concerns. Thus, as bystanders underestimate the risk of personal computing devices and are generally concerned about smart home devices, it is essential to alert the user about the presence of both. We argue that bystanders have to be informed about the privacy risks while entering a new space, in the best case, already in the entrance area.

  • Book Chapter
  • Cite Count Icon 1
  • 10.1007/978-981-10-7605-3_154
The Study on Data of Smart Home System as Digital Evidence
  • Dec 20, 2017
  • Jung Hyun Ryu + 2 more

The Internet of Things (IoT) presents many possibilities, including security and privacy issues. The Digital Forensics has long been studied in academia and industry, but forensics for smart home device has never been attempted. Smart home forensics deals with tools and techniques for recovering data and evidence from mobile devices. This paper describes a data acquisition, classification and analysis process of smart home devices using the IoT. It also includes analysis based on attack scenarios of collected data and smart home device forensic models suitable for such scenarios.

  • Research Article
  • Cite Count Icon 3
  • 10.4028/www.scientific.net/amm.121-126.4284
Constructing an Architectural Designer-Oriented Computer-Aided Design Tool for Smart Home Device
  • Oct 1, 2011
  • Applied Mechanics and Materials
  • Yi Feng Chang + 1 more

This study developed a designer-oriented smart home device computer-aided design tool that can help architectural designers to design smart home. This design tool is intended to incorporate smart home devices into overall spatial planning from the beginning of the planning process. Cloud computing [1] facilitates opportunities for online collaboration and coordination between individuals, between individuals and objects, and between objects, and will help speed the evolution smart home from centrally-controlled intelligent buildings to "smart living space" emphasizing distributed computation ability. This study employs (1) the theory of intelligent agents and (2) scenario-oriented design as an integrated framework for computer-aided design of smart home device. Smart home device are redefined based on agent theory. Agents' behavioral models include the five types of passive, reactive, active, interactive, and communicative; a comparison of these types provides a basis for the selection of home elements. Scenario-oriented design is employed to construct a smart living space (the AI. Living Lab.), which verifies the feasibility of the interface's operations. Finally, the resulting design methods and practical results are used to create a system development blueprint. Real life scenarios provide a basis for communication with smart home industry collaborators, enabling architectural designers to perform scenario modeling of a smart home proposal, quickly and conveniently establish a smart home information modeling system, and promote teamwork with smart home industry personnel.

  • Conference Article
  • Cite Count Icon 2
  • 10.1109/apwconcse.2018.00022
A Survey on Internet of Things Security Based on Smart Home
  • Dec 1, 2018
  • Xu Feng + 4 more

With the continuous development of information industry, Internet of Things (IoT) technology has been applied to all aspects of our life. One of the most common aspect is smart home. Nowadays, more and more smart home devices are used in people's daily life. With the explosive growth in IoT devices, a problem that we must focus on is the security of smart home. Because many smart home devices can leak user's privacy to others or can be exploited and controlled by hackers. So, many researchers in the world are paying attention to the security of the IoT, especially the security of smart home, and have done a lot of research on this. Their research directions mainly include access control, data protection, encryption algorithms, communication protocols, and so on. In this article, we will briefly discuss smart home and its security, introduce its general framework, then we will list some of the main research aspects of smart home, and finally introduce some smart home brands that are common in the market.

  • PDF Download Icon
  • Research Article
  • Cite Count Icon 4
  • 10.14569/ijacsa.2021.0120477
Investigation of Smart Home Security and Privacy: Consumer Perception in Saudi Arabia
  • Jan 1, 2021
  • International Journal of Advanced Computer Science and Applications
  • Omar Almutairi + 1 more

One of the fastest and most developing technologies around the globe is the Internet of things (IoT). The research questions in this study focus on the security and privacy challenges for a smart home environment. The geographical region of Saudi Arabia is the selected boundary for the study. The study is focused on finding the problems associated with the Smart Home adaption in Saudi Arabia. However, there is a large phase shift, which is seen towards the increase of threats in smart homes. It is believed that the awareness by humans towards the use of these devices. The level of security offered by the devices, is one of the factors for these threats and privacy issues. This research targets to identify all the facts that can be discarded towards adaption of Smart Homes. It is desirable that a quantitative methodology must be implemented for identification of the population under threat due to IoT devices in smart homes. The views of the users are the major input values to trace the problems. The expected results from this research will provide all the factors which can be improved and provided with proper solution to avoid any security or privacy threats in the Saudi Arabian realm.

  • Research Article
  • Cite Count Icon 77
  • 10.1016/j.cose.2019.101571
How perceived security risk affects intention to use smart home devices: A reasoned action explanation
  • Jul 17, 2019
  • Computers & Security
  • Jane E Klobas + 2 more

How perceived security risk affects intention to use smart home devices: A reasoned action explanation

  • Conference Article
  • Cite Count Icon 11
  • 10.1109/trustcom/bigdatase.2019.00073
An Adaptive Physical Layer Key Extraction Scheme for Smart Homes
  • Aug 1, 2019
  • Hong Zhao + 3 more

The wireless transmission of home area networks contributes to the vulnerabilities of smart homes. As a result, smart homes are vulnerable to malicious attacks like eavesdropping. To secure the transmissions, secret keys should be established for smart home devices. In practical smart home applications, smart home devices might be resource-constrained devices. Thus, the lightweight key establishment schemes are preferred. Typically, lightweight physical layer key extraction schemes can be employed by the smart home devices. However, the key generation rate of the schemes is low. To improve the key generation rate, in this paper we propose an adaptive physical layer key extraction scheme for smart homes by making use of the Received Signal Strength (RSS). Specifically, in our scheme, two smart home devices collect the RSS measurements by probing with each other. Then, the collected measurements are quantized by running the proposed Self-adaptive Lossless Quantization algorithm. Completing these operations, the two smart home devices can obtain the secret key. In our scheme, we design the self-adaptive lossless quantization algorithm to improve the key generation rate. To show the practicality of the new scheme, we implement it using the Ralink WiFi cards. Additionally, we analyse the performance of our scheme and compare it with that of other related works.

  • Research Article
  • Cite Count Icon 3
  • 10.56940/sc.v2.i1.5
Hey Google: Does Environmental Beliefs and Perceived Privacy Risk Influence Potential User’s Intention to Use a Smart Home System in Indonesia?
  • Aug 18, 2022
  • Smart City
  • Adrian Adhe Elian

Automation technology has grown in a rapid pace recently. One of the technology that is growing rapidly right now is the Internet of Things or IoT. IoT consist of many devices, and one of the IoT device that are popular right now is called the smart home device. This smart home device can be use to make the house of the user be smart and can be use to save energy for efficiency for the daily life of the user, such as electricity and water that kan provide a negative impact on the environment if used extensively. This smart home device can help to make the energy expense much more efficient. Therefore, this study aims to see and examine the relation between pro-environmental behavior (environmental beliefs and concern), the moderating variable of materialism, perceived privacy risk and trust that can influenced the intention to use of smart home device. This study is an empirical study with quantitative research method. The respondent used in this study is live in Jabodetabek, age above 18 years old, tech savvy, and know the concept of smart home technology but does not have the smart home device. The sample use in this study are 294 samples. The data collected was tested using and analyzed using SEM with LISREL 8.5. The result of the research shows that environmental concern, perceived usefulness, and trust has a positive and significant effect towards intention to use smart home device. For the relationship between environmental beliefs and environmental concern, it was also has positif and significant effect. The result also shown that perceived privacy risk has a negatif significant effect towards trust of smart home device. The result of this research are important for the development of smart home market in Indonesia.

  • Conference Article
  • Cite Count Icon 2
  • 10.1109/ccnc49033.2022.9700731
An End-to-End System for Monitoring IoT Devices in Smart Homes
  • Jan 8, 2022
  • Keith Erkert + 6 more

The technology advance and convergence of cyber physical systems, smart sensors, short-range wireless communications, cloud computing, and smartphone apps have driven the proliferation of Internet of things (IoT) devices in smart homes and smart industry. In light of the high heterogeneity of IoT system, the prevalence of system vulnerabilities in IoT devices and applications, and the broad attack surface across the entire IoT protocol stack, a fundamental and urgent research problem of IoT security is how to effectively collect, analyze, extract, model, and visualize the massive network traffic of IoT devices for understanding what is happening to IoT devices. Towards this end, this paper develops and demonstrates an end-to-end system with three key components, i.e., the IoT network traffic monitoring system via programmable home routers, the backend IoT traffic behavior analysis system in the cloud, and the frontend IoT visualization system via smartphone apps, for monitoring, analyzing and virtualizing network traffic behavior of heterogeneous IoT devices in smart homes. The main contributions of this demonstration paper is to present a novel system with an end-to-end process of collecting, analyzing and visualizing IoT network traffic in smart homes.

Save Icon
Up Arrow
Open/Close
  • Ask R Discovery Star icon
  • Chat PDF Star icon

AI summaries and top papers from 250M+ research sources.