Vous êtes sur la page 1sur 9

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/327861239

Users' Privacy Concerns in IoT Based Applications

Conference Paper · September 2018


DOI: 10.1109/SmartWorld.2018.00317

CITATIONS READS
0 398

6 authors, including:

Ismini Psychoula Deepika Singh


De Montfort University Austrain Institute of Technology AIT
8 PUBLICATIONS   26 CITATIONS    11 PUBLICATIONS   41 CITATIONS   

SEE PROFILE SEE PROFILE

Liming Chen Andreas Holzinger


De Montfort University Medical University of Graz
186 PUBLICATIONS   2,574 CITATIONS    510 PUBLICATIONS   6,992 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

MAKEpatho - Machine Learning & Knowledge Extraction for Digital Pathology View project

HCI for Teaching View project

All content following this page was uploaded by Ismini Psychoula on 18 October 2018.

The user has requested enhancement of the downloaded file.


Users’ Privacy Concerns in IoT based Applications
Ismini Psychoula∗ , Deepika Singh† ‡ , Liming Chen∗ , Feng Chen∗ ,
Andreas Holzinger‡ , Huansheng Ning§
∗ Schoolof Computer Science and Informatics, De Montfort University, Leicester, UK
Email: ismini.psychoula@dmu.ac.uk
† Center for Health & Bioresources, AIT Austrian Institute of Technology, Wiener Neustadt, Austria
‡ Holzinger Group, Institute for Medical Informatics/Statistics, Medical University Graz, A-8036 Graz, Austria
§ School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China

Abstract—In recent years user privacy has become an im- intelligent IoT services more acceptable to the public. In order
portant aspect in the development of the Internet of Things to achieve these objectives, researchers and developers should
(IoT) services due to their privacy invasive nature. However, understand how different factors influence peoples privacy
there has been comparatively little research so far that aims
to understanding users’ notion of privacy in connection with perceptions in an IoT environment. This understanding will
IoT. In this work, we aim to understand how and if contextual enable them to better design privacy-preserving IoT systems
factors affect users’ privacy perceptions of IoT environments. To and services. To address this gap, we conduct a survey and
ascertain privacy perceptions, we deployed a public online survey semi-structured interviews to learn about what are the features
(N=236) and contacted interviews (N=41) to explore factors that they want from IoT, and to understand their security and
could have an influence. Although a lot of the participants
identified privacy risks in IoT and rated the collected information privacy related attitudes, expectations, and actions.
items with high privacy ratings, we find that quite a large number The paper is organized as follows. First we discuss related
of participants would still decide to have the offered IoT service work. Then we describe the design of our study and discuss the
if they find it useful and practical for their daily lives despite qualitative and quantitative analysis of the collected data. Next
the infringement on their privacy. We conclude by highlighting we present and discuss our results along with highlighting
and analyzing the qualitative comments of the participants and
suggest possible solutions for the identified issues. and categorizing the qualitative comments of the participants.
Finally we discuss the limitations of the study and ways to
I. I NTRODUCTION address the issues identified.
With the rapid deployment of the Internet of Things (IoT)
and the advances in artificial intelligence technologies, tech- II. R ELATED W ORK
nology companies are developing new products aiming to In most IoT environments users are surrounded by a variety
make the users’ lives more convenient. By some estimates, of sensors and devices that monitor their activities. Prior
the installed base of Internet of Things devices is forecast research on privacy has produced contradictory results. On
to grow to almost 75 billion worldwide by 2025 [1]. The one hand it shows that privacy is a primary concern for users
rise of consumer smart home platforms as well as connected in the IoT era [2]. On the other hand experimental studies
devices, means end users are empowered to set up their own show that individuals reveal personal information for relatively
automated IoT environments. These smart devices support small rewards [3]. Several studies have shown a difference
desirable features, such as voice-controlled appliances and between privacy concerns and attitudes and actual privacy
remote-controlled thermostats. However, these devices also behaviour, while other studies indicate that individuals privacy
collect and use personal data in order to tailor the offered behaviour is in line with their concerns and attitudes. Although
services to each individual user. These data collection practices information privacy in general and data sharing and control
will become even more powerful in future IoT environments, are universal issues, a lot of researchers argue that the precise
given that nearly all of the IoT devices are connected to concerns and responses to data sharing requests depend on
the Internet and can collectively monitor and gather personal the users characteristics, including their culture [4], [5] and
information of users. For instance, the IoT devices may collect age [6]. Studies have investigated various factors that can
users personal information without asking for their permission, impact privacy [7], but the new methods of data collection
or may not give notice to them when collecting potentially in the IoT environments have led to new privacy challenges
sensitive information which raises security and privacy issues. and introduced new factors. Some of these challenges include
There is a need for new tools to provide transparency, user obtaining consent for data collection, allowing users to control
control, and ensure that individual privacy requirements are and choose the data they share, while at the same time
met. To develop these tools, it is important to better understand ensuring the use of collected data is limited to the stated
how people feel about the privacy implications of IoT and the purpose [7]. These challenges become even more difficult by
situations they prefer to have control of their privacy. Hence, the increased potential for misuse of personal information in
providing services with minimized privacy risks is very impor- the IoT environment. This arises from the pervasive tracking
tant for both protecting users privacy expectations and making of habits, behaviors, and locations over a long period of time.
There are new risks to personal safety as a result of the to IoT scenarios. These findings will help understand the
use of IoT systems [8], [9]. Several studies were aimed at relative importance of different privacy concerns to individuals
understanding individuals IoT-related privacy concerns, and and act as a basis for the development of privacy-preserving
proposing potential solutions for them [8], [10]. Prior work has mechanisms.
shown that user adoption of innovative and recent technologies
is significantly related to their individual characteristics [11] III. M ETHODOLOGY
and the trustworthiness of IoT services is affected by the In this section we discuss the collection and analysis of the
implemented privacy and security practices [12]. data. In the first part of the research we conducted an interview
The work presented in [13] discusses the use of smart home study with 41 older adults (31 female and 10 male) affected
devices in the living environment of residents aged 65 or over by chronic diseases with the goal of qualitatively assessing
in residential care. Interestingly, a key point of the study’s their perceptions regarding different IoT scenarios and their
findings is that the privacy concerns of the users reduces when privacy concerns. Also an online survey was used where 236
the smart devices are being used for a medical intentions or in people participated from around the world. The goal was to
the case of a potential emergency. While, it appears that it is understand the individuals’ attitude towards IoT devices and
the thought of being watched and tracked that causes privacy technologies as well as the participants’ opinions in regards
concerns. to monitoring, data sharing and privacy. The questionnaire
Other studies more closely related to this work have evalu- was advertised via social media and email. No screening
ated several factors that may impact privacy concerns related criteria were applied, other than the participants being able
to IoT data collection. In the research presented in [14] the to respond in English. The study was approved by the Ethics
authors studied the relative importance of two factors with Committee of De Montfort University. The participation in
the first being the entity collecting data, and the second both the interviews and the survey was voluntary and the
being the situation in which the data are being collected, duration was approximately 15 minutes. The study provided
in order to determine users privacy preferences in ubiquitous full anonymity to the participants.
computing settings. Their results indicate that individuals base The questions followed a similar pattern in both the inter-
their privacy decisions on who is collecting their data, rather views and the online survey. The first part of the questions
than the context in which it is being collected. In the studies focused on socio-demographic questions such as age, gender,
discussed in [15] and [16] the authors tested five factors related location, education and familiarity with technology. The sec-
to the context of data collection in two separate studies and ond part consisted of questions about the IoT devices the users’
found that individuals generally thought that monitoring in already own and what do they perceive as benefits, drawbacks
personal spaces was unacceptable, along with monitoring by and concerns related to IoT systems. The third part had
an unknown entity or the government. Their results also indi- questions on the participants’ attitudes towards monitoring and
cate that photo and video monitoring may cause some privacy data sharing while the last section focused on the participants’
concern regardless of context. Additional smaller, qualitative privacy and security concerns. The study was described as a
studies have focused on individuals privacy preferences related Survey on IoT Technologies to avoid having the participants
to wearable sensors. These studies showed that users want to believe that their privacy perceptions are being evaluated,
have ownership of the data they produce, and that privacy because then they might adjust their responses [19]. Thus,
concerns vary depending on factors including retention time our survey and interviews were framed as concerning general
and the perceived value of the data collected [17], [18]. opinions. More obvious privacy related questions were placed
According to the findings in [8] a limitation of prior near the end to ensure earlier responses were not primed. For
work is that the studies usually focus on a single scenario the analysis, we used two software packages Microsoft Excel
in which sensing is occurring. Thus, many of the proposed for sentiment analysis and IBM SPSS Statistics to generate the
solutions do not generalize to other contexts. This work will descriptive statistics of the data and the item-level results of
attempt to address this gap by identifying privacy concerns each question. A significance level of 5% was used for all the
in heterogeneous scenarios which use different types of data reported results. To test the reliability of the measure we used
collection and data formats. This way, we can determine which Cronbach’s alpha. For this set of questions it was α = 0.808
factors have the greatest impact on measures of individuals which indicates a high level of internal consistency.
privacy concerns in regards to IoT and data sharing. The
IV. R ESULTS & D ISCUSSION
results will enable the design of privacy-enabling solutions
appropriate to a variety of contexts applicable in IoT environ- A. Interviews
ments. Moreover, it will address the gap of identifying privacy Interviews were conducted one-on-one, with informed con-
concerns individuals have in data collection scenarios which sent received at the start. All interviews were recorded and then
are not obviously aligned with specific privacy risks. While transcribed in order to be analyzed. The majority of the older
the impact of the location of the data collection, type of data adults with chronic diseases that participated in the interviews
being collected, and purpose for collection have already been were not aware of smart homes and IoT technology they use.
studied in prior work considering IoT contexts [15], [16]. This After the researcher explained to them the concept and services
study aims capturing more contextual nuances that are specific that IoT could potentially offer a small part of them (30%)
Type of IoT Device Count
found the technology useful and something they would like to Smartphone 224
have if they could afford it but the majority of them (70%) Tablet 143
felt that this kind of technology cannot help them at this point Smart Watch 68
in their life and that it would be too difficult to learn to use Smart TV 134
Fitness Bracelet 73
it. In regards to data sharing most of the participants (80%) Presence Sensors 32
of the interview participants said they would not mind sharing Sleep Monitors 34
medical and daily life data. They thought the sharing of daily Cameras 55
Smart Blood Pressure Cuff 31
behavior data is particularly useful for their doctors and family Smart Personal Assistant 55
members. Smart Thermostat 82
Smart Plugs & Lights 4
B. Online Survey
TABLE II: IoT Devices owned by participants
Characteristics of the Sample Count Percentage
Gender Male 137 58.1%
Female 99 41.9% the increased dependence on technology (more than 65% for
Age Under 18 5 2.1% all devices) and the monitoring of private activities which is
18 − 24 58 24.6%
25 − 35 100 42.4% high (around 65%) for owners of ubiquitous sensors, cameras,
36 − 55 50 21.2% personal gadgets and virtual assistants and comparatively less
56 − 70 23 9.7% (around 55%) for owners of wearable devices. There is no
Location Asia 102 43.2%
Africa 2 0.8% denying that technology has made things easier and helps
North America 24 10.2% people in day to day lives but users’ concerns also need to be
South America 3 1.3% addressed while developing such intelligent systems. Another
Europe 101 42.8%
Australia/Oceania 4 1.7% drawback users perceived is the increased physical inactivity
Education Not completed school 7 3.0% which can be correlated to the dependence on technology.
Completed school 35 14.8% Furthermore, regular charging, periodical maintenance, system
University degree 101 42.8%
Postgraduate degree 93 39.4% updates and connectivity issues (internet, mobile services) are
Familiarity with Beginner 2 0.8% also drawbacks raised by users.
Technology Basic Knowledge 21 8.9%
Moderate 90 38.1% D. Data Sharing
Expert 123 52.1%
The survey investigated the data sharing attitudes of the
TABLE I: Demographic information of the online survey participants. To measure the participants’ view on privacy, the
participants (N=236) participants were asked by means of multiple questions to
what extent they favor convenience and safety over privacy.
Socio-demographic information was gathered on the factors The questions were related to the infringement on privacy by
of gender, age, location, familiarity with technology and surveillance cameras, the sharing of health data with family
education level. The reason for recording these factors is members and doctors, and the manner in which government
that previous research has suggested that women possess agencies handle users’ personal data in general. Every question
larger privacy concerns than men [20]. It has also reported was written as a statement, for example: “I am willing to have
that older people care more about privacy [21], and this information from activity monitoring shared with my doctor”.
could be reflected in the responses. Previous work also found The participant could indicate how much he or she agrees or
that education correlates with privacy concern [22]. The data disagrees with the statement by selecting a value from 1 to 5
sample consists of 236 responses with 58.1% male and 41.9% on a 5-point Likert scale, where 1 means Strongly Disagree
female. In regards to age 42.4% of the responses came from and 5 means Strongly Agree.
the 25-35 age group, with 39.4% of the participants having In regards to information sharing (Figure 2) most of the
a postgraduate degree, implying a well-educated participant participants strongly agree (40%) or agree (28%) on monitored
group (Table I). activity data being send to their doctor if it suggests they
might suffer from a chronic disease. But these percentages
C. IoT Devices change significantly if the data are to be shared with family
Participants reported having a large variety of internet- members with only 24% strongly agreeing and 20% agreeing.
connected devices. We summarize these devices in Table II. Also the percentages that would want information send to
Most common are wearable devices, thermostats, cameras, and them are much less than being send to the doctor with
smart personal assistants. Then we classified the devices on 5 29% of the participants strongly agreeing and 28% agreeing.
categories Wearable Devices, Ubiquitous Sensors, Cameras, With respect to the statement “It bothers me that my data
Personal Gadgets and Virtual Assistants (Figure 1) in order to might be visible and accessible by others”, 59% of all the
examine if there are differences in the participant’s perceived participants strongly agreed and 25% agreed. We notice similar
drawbacks based on the type of devices owned by them. percentages to the statement “I am concerned about privacy
The most prominent drawbacks as perceived by the users are in regards to in-home monitoring”. While for the statement
Fig. 1: Perceived Drawbacks Based on IoT Device Type

Fig. 2: Participants’ Data Sharing Attitudes

“I am concerned information from my smart home could be personal data that is being collected by sensor technologies.
given to people/organization that would use it in a way that A two way analysis of variance (ANOVA) was performed to
would harm me” the percentages are a bit different with 53% examine if Gender and Age have an effect on the participants’
strongly agreeing and 21% agreeing. preferences in regards to continuing to stay at home with the
help of technology even if that might be at the expense of
Further analysis of the individual questions in the section
their privacy. In Figure 3c, it can be seen that the effect of
about attitudes towards data sharing (Figure 3) shows that age
gender is not important while there is a trend for age especially
plays an important role in the attitude of the participants. More
between the age groups 18-35 and 35 and older. For the older
specifically in the statement “I would want information about
generations, it is important (p=0.001) to be able to live in
my activity monitoring send to a family member if the changes
their own house as long as possible, even if it comes at the
suggest I might have a chronic disease”, a difference (p=0.05)
expense of privacy, in contrast with the younger generation
can be seen (Figure 3a) in the opinions depending on the Age
that disagreed with the statement.
of the participants, especially between the age groups 25-35
and 56-70. There is also an effect of Age on the statement “I
E. Information Items & Privacy Ratings
am willing to have information from activity monitoring (e.g
sleeping, eating, exercising) shared with my family” (Figure In Figure 4 we show the participants’ rating of information
3b). The age group 25-35 disagree with the statement while the items between 0 - “Non private” and 5 - “Extremely Private”.
older generations agree (p=0.001). Regarding these questions, The majority of participants (76%) considers baking details
we can conclude that people with an age ranging from 25 “Very Private” followed by data collected from monitoring
and 35 years are, compared to people of a much older age cameras (54%), medical information (42%) and home security
between 56 and 70, significantly less willing to share their information (41%). In regards to shopping habits, energy
(a) “I would want information about my activity (b) “I am willing to have information from ac- (c) “I prefer to live in my own house as long as
monitoring send to a family member, if the tivity monitoring shared with my family” technology allows this even if it is at the expense
changes suggest a chronic disease.” of my privacy”

Fig. 3: Effect of age and gender on data sharing preferences

consumption, movement from room to room, exercise and smart home. Specifically someone else would have access
location data the participants’ opinions are divided on the level to: medical information, banking details, location, movement
of privacy with some considering them “Neutral” and others from room to room, energy consumption, monitoring cameras,
“Somewhat Private” or “Private”. home security system, exercise and shopping habits.” (The
To analyze the results in more detail we examined the participants had the option to select multiple items). A lot
effect of Culture (Figure 5) and Age (Figure 6). Here we of the participants where concerned about potentially being
present the the information items that are most affected by embarrassed about the content and the financial risk of the
these factors. Banking Details are considered extremely private content, while the ease of access by third parties is not a very
for people from Africa, South America and Australia in prominent concern with the exception of Location data.
comparison to people from Asia . The same can be observed The participants where also asked if they would have any
for the Age group 25-35 . With regards to monitoring cameras concerns about living in a smart home in an open ended type
Europeans and South Americans consider them more private of question. (This question was asked at the beginning of
in comparison to people in Africa and Asia , also there is a the questionnaire in order to gather the participants unbiased
clear difference in the opinions between the 25-35 age group answers before we presented them with other risky scenarios
and the people over 35 . When it comes to location data the it and questions). From the 236 participants 108 (45.7%)
is considered more private for participants in the age groups replied that they would have no concerns about living in a
of Under 18 and 25-35 while it is not ranked as “Somewhat smart home environment. Participants mentioned a diverse
private” for people from Asia and South America . For medical set of potential security and privacy issues, but few concrete
information we observe a similar pattern where the age group concerns were articulated by a majority of participants.
25-35 considers it much more private than the age group Moreover, participants were sometimes aware of potential
56-70 also participants from Asia consider it less private issues but were not concerned about them. After analyzing
compared to the rest . Energy consumption and Exercise Data the survey answers of the participants that mentioned they
are considered as Neutral by all cultures and age groups. We have concerns, we identified several concern categories such
also performed the same analysis for the factors Familiarity as privacy and security , data sharing, cost, dependence on
with technology and Education. In regards to familiarity with technology and trust on technology (Table III). It is interesting
technology the participants with higher expertise gave higher to note that from the people that mentioned concerns most of
privacy ratings to all information items compared to beginners them belong in the 25-35 age group.
or moderate users. The same cannot be said for education
as the privacy ratings were quite varied depending on the F. Internet of Things Scenarios
information item. In some cases the privacy rating of people The participants of the online survey where also presented
that have not completed school is higher than that of people with IoT scenarios, two of those along with example responses
with postgraduate degrees. Furthermore, on the gender factor are presented below.
there appears to be a trend with females have giving higher
privacy ratings than males. Scenario I: “Imagine there is a new inexpensive thermostat
Figure 7 shows the participants responses when asked what sensor for your house that can learn about your temperature
would concern them for each of the information items in preferences and movements around the house and potentially
the following scenario “Suppose there was a leak of in- save money on your energy bill. It is programmable remotely
formation that gave access to all the information in your in return for sharing data about some of the basic activities
Fig. 4: Participants’ Privacy Rating of Collected Data

Fig. 5: Effect of Culture on Participants’ Privacy Rating of Collected Data

Fig. 6: Effect of Age on Participants’ Privacy Rating of Collected Data


Categories Representative Quotes
Type of [P97]: “Yes, as I consider such information to not be
Informa- too intrusive. However, it strictly depends on the type
tion of information collected and whether it is specifically
stated it collects such information or not.”
Data [P3]: “ I wouldn’t want to share information but if
Sharing there isn’t any other way for the thermostat to work,
then I am ok with sharing”
Terms of [P115]: “If there is a clear ToS where the user is
Service protected and can decide then I see no problem.
Informed consent is a must if others see the data.”
Privacy & P[185]: “It may be acceptable, but there is always a
Security concern about privacy and big brother watching you all
the time. If it was anonymous ie not linked specifically
to individuals but monitoring movement of people in
the house I would not mind.”
TABLE IV: Participants’ Responses to Scenario I
Fig. 7: Summary statistics showing the relationship between
various factors and participants concerns for each one. (E.g. Categories Representative Quotes
71% of the participants were worried about potential embar- Benefits P[49]: “ It is acceptable to lose some privacy for the
benefits this smart fridge provides to me.”, [P217]: “
rassment upon potential exposure of monitoring camera data.) Not 100% sure. It’s all about privacy vs easiness!”
Exploitation [P224]: No I would not like that. It is private data!
Categories Representative Quotes I would not like someone to profit with my daily
Cost [P8]: “If a whole automated system already existed collected data or even just know them and create a
and it was affordable it would be really helpful in pattern for my daily food habits. Only if it would be my
my condition (paraplegia). Although I am aware of the doctor I would accept it and under specific conditions.
potential threats in my condition the benefits outweigh Data P[105]: “Partially acceptable. Will only be completely
the risks.“ Sharing acceptable if there is a clear option to enable and
Dependence [P37]: “In my point of view living in a smart home disable data sharing with 3rd parties and functions
on Tech- would decrease persons efficiency of doing physical related to it at any time without any cost to my person.”
nology work and increase dependency on machines and tech- Privacy & [P209]: “ Security concerns. I don’t like third parties
nologies.” Security knowing when I’m about to go out of my home and
Trust on [P196]: “The worry of it backfiring, alarms going be at a specific place.
Technol- off incorrectly, doors unlocking by mistake. AI is
ogy improving at an alarming rate... TABLE V: Participants’ Responses to Scenario II
Information [P224]: “The major thing that concerns me is the
Control gathering of information. Who will be able to access another 30 participants found it partly acceptable depending
in database? Would it be easy for me to shut down all
of these systems ,at once, in emergency cases?” on various factors (see Table V). Most of the participants that
Privacy & [P154]: “I would be concerned with the possibility that found this scenario unacceptable mentioned privacy concerns,
Security they could easily be hacked”, [P161] “I might feel with a small percentage of them reporting practical issues (how
uncomfortable because of lack of privacy ” is the selection of products done, how to order things that
TABLE III: Participants’ Concerns are not store in the fridge etc.) as the reasons they found the
scenario unacceptable.
In all the open ended questions the identified concern
that take place in your house like when people are there and themes are recurring with the participants mentioning that
when they move from room to room.” their acceptance of the technology depends on the terms on
service, the informed consent, the security measures that are
After performing sentiment analysis on the comments from implemented and their want for data sharing control. Another
the participants we found that 104 found the service ac- concern for the users was the availability and reliability of the
ceptable, 108 found it unacceptable and 23 where neutral service. Also it is noteworthy that some participants identified
depending on the benefits they might receive or what are availability of device functionality as an asset that might be
the terms of service that where offered. Table IV shows the attacked. Although several participants voiced concerns about
identified categories resulting from the sentiment analysis and reliability and trust on technology none connected this concern
showcases some of the participants’ responses. to security risks. Interestingly when the participants speculated
Scenario II: “ Imagine that in the future a smart fridge about potential attacks on their IoT environment, they did not
would be able to know when you run out of food and order articulate specific adversaries, they often referred to potential
for you all the groceries you need. The smart fridge will keep adversaries as someone.
track of your shopping habits and might give them to third Many participants identified a trade off between security
parties.” and privacy with functionality and convenience, in some cases
In the second scenario 74 participants found it acceptable and sounding resigned to it. There is a growing need to present a
better trade-off to the end users. For example, certain technical [2] C. L. Miltgen and D. Peyrat-Guillard, “Cultural and generational in-
design choices can reduce risks without significantly impacting fluences on privacy concerns: a qualitative study in seven european
countries,” European Journal of Information Systems, vol. 23, no. 2,
functionality, like not always requiring the cloud but also pp. 103–125, 2014.
running automation services locally. By minimizing these trade [3] J. P. Carrascal, C. Riederer, V. Erramilli, M. Cherubini, and
offs where possible, we can ease the decision-making burden R. de Oliveira, “Your browsing behavior for a big mac: Economics of
personal information online,” in Proceedings of the 22nd international
from users and enable adoption of IoT technologies by people conference on World Wide Web. ACM, 2013, pp. 189–200.
who are not willing to make the trade offs required today. [4] R. Thomson, M. Yuki, and N. Ito, “A socio-ecological approach to
national differences in online privacy concern: The role of relational
mobility and trust,” Computers in Human Behavior, vol. 51, pp. 285–
V. C ONCLUSION 292, 2015.
[5] S. Trepte and P. Masur, “Cultural differences in social media use,
Our results provide contributions to privacy literature that privacy, and self-disclosure,” Research Report on a multicultural sur-
comes from a qualitative and quantitative angle to provide vey study. University of Hohenheim. Retrieved from http://opus. uni-
insights into privacy issues from the perspective, of partic- hohenheim. de/volltexte/2016/1218/pdf/Trepte Masur ResearchReport.
pdf, Tech. Rep., 2016.
ipants around the world. The findings in this study offer a [6] D. Singh, I. Psychoula, J. Kropf, S. Hanke, and A. Holzinger, “Users
more profound consideration of the various issues that worry perceptions and attitudes towards smart home technologies,” in Interna-
IoT users and provide a detailed assessment of the similarities tional Conference on Smart Homes and Health Telematics. Springer,
2018, pp. 203–214.
and differences in peoples attitudes and behaviours, depending [7] C. Perera, R. Ranjan, L. Wang, S. U. Khan, and A. Y. Zomaya, “Big
on socio-demographic background. Moreover our findings data privacy in the internet of things era,” IT Professional, vol. 17, no. 3,
analyze and identify themes for the participants’ privacy and pp. 32–39, 2015.
[8] P. Bhaskar and S. I. Ahamed, “Privacy in pervasive computing and open
security concerns (or lack thereof). We notice that With the IoT issues,” in Availability, Reliability and Security, 2007. ARES 2007. The
environments, people have a sense that there’s some privacy Second International Conference on. IEEE, 2007, pp. 147–154.
issues, but they dont always know or understand what data [9] F. T. Commission et al., “Internet of things: Privacy & security in a
connected world,” Washington, DC: Federal Trade Commission, 2015.
is being collected, or how or why. Out results also indicate [10] R. Chow, S. Egelman, R. Kannavara, H. Lee, S. Misra, and E. Wang,
that elderly people are more open to data sharing and are “Hci in business: A collaboration with academia in iot privacy,” in
less concerned about privacy issues compared to younger International Conference on HCI in Business. Springer, 2015, pp.
679–687.
generations. This result can be explained by the tendency [11] A. Burton-Jones and G. S. Hubona, “Individual differences and usage
of younger people to be more familiar with technology and behavior: revisiting a technology acceptance model assumption,” ACM
more aware about the risks IoT technologies pose. Our study SIGMIS Database: the DATABASE for Advances in Information Systems,
vol. 36, no. 2, pp. 58–77, 2005.
focused mainly on peoples perceptions, attitudes, and opinions [12] I. D. Addo, S. I. Ahamed, S. S. Yau, and A. Buduru, “A reference
but it also tests causal links among the interesting concepts and architecture for improving security and privacy in internet of things
factors. Moreover we find that to the people that have privacy applications,” in Mobile Services (MS), 2014 IEEE International Con-
ference on. IEEE, 2014, pp. 108–115.
concerns or are on the fence about IoT environments control [13] K. L. Courtney, “Privacy and senior willingness to adopt smart home
has a significant influence along with trust. Regulations and information technology in residential care facilities,” 2008.
security mechanisms are important factors for the acceptance [14] S. Lederer, J. Mankoff, and A. K. Dey, “Who wants to know what when?
privacy preference determinants in ubiquitous computing,” in CHI’03
of the technology. One of the limitations of our study is the extended abstracts on Human factors in computing systems. ACM,
small participant number which makes the results not easily 2003, pp. 724–725.
statistically generalizable to all people and settings. Our future [15] H. Lee and A. Kobsa, “Understanding user privacy in internet of things
environments,” in Internet of Things (WF-IoT), 2016 IEEE 3rd World
work will investigate which of factors are direct or indirect Forum on. IEEE, 2016, pp. 407–412.
determinants of privacy, whether it is trust, risk, perception, [16] ——, “Privacy preference modeling and prediction in a simulated cam-
knowledge, awareness or all of the above that shape a user’s puswide iot environment,” in Pervasive Computing and Communications
(PerCom), 2017 IEEE International Conference on. IEEE, 2017, pp.
privacy attitude with a larger number of participants and 276–285.
test whether these processes are similar or different between [17] D. Barua, J. Kay, and C. Paris, “Viewing and controlling personal sensor
different groups. data: what do users want?” in International Conference on Persuasive
Technology. Springer, 2013, pp. 15–26.
[18] P. Klasnja, S. Consolvo, T. Choudhury, R. Beckwith, and J. Hightower,
ACKNOWLEDGMENT “Exploring privacy concerns about personal sensing,” in International
Conference on Pervasive Computing. Springer, 2009, pp. 176–183.
This work has been funded by the European Union Horizon [19] P. Rajivan and L. J. Camp, “Influence of privacy attitude and privacy
2020 MSCA ITN ACROSSING project (GA no. 616757) and cue framing on android app choices.” in WPI@ SOUPS, 2016.
[20] K. B. Sheehan, “An investigation of gender differences in on-line privacy
partly supported by the National Natural Science Foundation concerns and resultant behaviors,” Journal of Interactive Marketing,
of China under Grant 61811530335. The authors would also vol. 13, no. 4, pp. 24–38, 1999.
like to thank the participants and AKTIOS care units for [21] P. Han and A. Maclaurin, “Do consumers really care about online
privacy?” Marketing Management, vol. 11, no. 1, p. 35, 2002.
facilitating the interviews with people with chronic diseases. [22] D. ONeil, “Analysis of internet users level of online privacy concerns,”
Social Science Computer Review, vol. 19, no. 1, pp. 17–31, 2001.
R EFERENCES
[1] Internet of Things (IoT) connected devices installed worldwide.
https://www.statista.com/statistics/471264/iot-number-of-connected-
devices-worldwide/.

View publication stats

Vous aimerez peut-être aussi