Users' Privacy Concerns in IoT based Applications

被引:39
作者
Psychoula, Ismini [1 ]
Singh, Deepika [2 ,3 ]
Chen, Liming [1 ]
Chen, Feng [1 ]
Holzinger, Andreas [2 ]
Ning, Huansheng [4 ]
机构
[1] De Montfort Univ, Sch Comp Sci & Informat, Leicester, Leics, England
[2] AIT Austrian Inst Technol, Ctr Hlth & Bioresources, Wiener Neustadt, Austria
[3] Med Univ Graz, Holzinger Grp, Inst Med Informat Stat, A-8036 Graz, Austria
[4] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing, Peoples R China
来源
2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI) | 2018年
基金
中国国家自然科学基金;
关键词
ONLINE PRIVACY; INTERNET;
D O I
10.1109/SmartWorld.2018.00317
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years user privacy has become an important aspect in the development of the Internet of Things (IoT) services due to their privacy invasive nature. However, there has been comparatively little research so far that aims to understanding users' notion of privacy in connection with IoT. In this work, we aim to understand how and if contextual factors affect users' privacy perceptions of IoT environments. To ascertain privacy perceptions, we deployed a public online survey (N=236) and contacted interviews (N=41) to explore factors that could have an influence. Although a lot of the participants identified privacy risks in IoT and rated the collected information items with high privacy ratings, we find that quite a large number of participants would still decide to have the offered IoT service if they find it useful and practical for their daily lives despite the infringement on their privacy. We conclude by highlighting and analyzing the qualitative comments of the participants and suggest possible solutions for the identified issues.
引用
收藏
页码:1887 / 1894
页数:8
相关论文
共 21 条
[1]   A Reference Architecture for Improving Security and Privacy in Internet of Things Applications [J].
Addo, Ivor D. ;
Ahamed, Sheikh I. ;
Yau, Stephen S. ;
Buduru, Arun .
2014 IEEE INTERNATIONAL CONFERENCE ON MOBILE SERVICES (MS), 2014, :108-115
[2]  
[Anonymous], 2003, CHI03 extended abstracts on Human factors in computing systems, DOI DOI 10.1145/765891.765952
[3]  
Barua Debjanee, 2013, Persuasive Technology. 8th International Conference, PERSUASIVE 2013. Proceedings, P15, DOI 10.1007/978-3-642-37157-8_4
[4]  
Bhaskar P, 2007, ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, P147
[5]  
Burton-Jones A., 2005, SIGMIS DATABASE, V36, P58, DOI DOI 10.1145/1066149.1066155
[6]  
Carrascal J.P., 2013, P 22 INT C WORLD WID, P189, DOI DOI 10.1145/2488388.2488406
[7]  
Chow Richard, 2015, HCI in Business. Second International Conference, HCIB 2015, held as part of HCI International 2015. Proceedings: LNCS 9191, P679, DOI 10.1007/978-3-319-20895-4_63
[8]  
Courtney K. L., 2008, PRIVACY SENIOR WILLI
[9]  
F. T. Commission, 2015, INT THINGS PRIV SEC
[10]  
Han P, 2002, MARK MANAG, V11, P35