Advertisement

Life-Long Privacy in the IoT? Measuring Privacy Attitudes Throughout the Life-Cycle of IoT Devices

  • Alexandr RaileanEmail author
  • Delphine Reinhardt
Chapter
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 526)

Abstract

The novelty of the Internet of Things (IoT) as a trend has not given society sufficient time to establish a clear view of what IoT is and how it operates. As such, people are likely to be unaware of the privacy implications, thus creating a gap between the belief of what a device does and its actual behaviour. The responses collected in our online survey indicate that participants tend to see IoT as computer -like devices, rather than appliances, though there are some important misconceptions about the way these devices function. We also find that privacy is a primary concern when it comes to IoT adoption. Nevertheless, participants have a propensity to keep using IoT devices even after they find out that the device abuses their trust. Finally, we provide recommendations to IoT vendors, to make their products more transparent in terms of privacy.

Keywords

Internet of Things IoT Privacy Usability 

Notes

Acknowledgments

This project has received funding from the European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant agreement No 675730. We would like to thank the survey participants, Harald Zwingelberg and the anonymous peer reviewers for their helpful comments.

References

  1. 1.
    ACLU Files FTC Complaint Over Android Smartphone Security. https://aclu.org/blog/national-security/aclu-files-ftc-complaint-over-android-smartphone-security. Accessed 14 Nov 2017
  2. 2.
    Akhawe, D., et al.: Alice in warningland: a large-scale field study of browser security warning effectiveness. In: Usenix Security (2013)Google Scholar
  3. 3.
    Android API Versions. https://developer.android.com/about/dashboards/index.html. Accessed 14 Nov 2017
  4. 4.
    Atzori, L., et al.: The Internet of Things: a survey. In: Computer Networks (2010)CrossRefGoogle Scholar
  5. 5.
    Barnes, S.B.: A privacy paradox: social networking in the United States. First Monday 11, 9 (2006)CrossRefGoogle Scholar
  6. 6.
    Careful Connections: Building Security in the Internet of Things (2015). https://ftc.gov/system/files/documents/plain-language/pdf0199-carefulconnections-buildingsecurityinternetofthings.pdf. Accessed 02 May 2017
  7. 7.
    Caron, X., et al.: The Internet of Things (IoT) and its impact on individual privacy: an australian perspective. Comput. Law Secur. Rev. 32, 4–15 (2016)CrossRefGoogle Scholar
  8. 8.
    Christin, D.: Privacy in mobile participatory sensing: current trends and future challenges. J. Syst. Softw. 116, 57–68 (2016)CrossRefGoogle Scholar
  9. 9.
    De Luca, A., et al.: Expert and non-expert attitudes towards (secure) instant messaging. In: Proceedings of the 12th Symposium on Usable Privacy and Security (SOUPS) (2016)Google Scholar
  10. 10.
    Elkhodr, M., et al.: A review of mobile location privacy in the Internet of Things. In: Proceedings of the 10th International Conference on ICT and Knowledge Engineering (2012)Google Scholar
  11. 11.
    Evans, D.: The Internet of Things - How the Next Evolution of the Internet is Changing Everything. Cisco (2011). http://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf. Accessed 25 Apr 2017
  12. 12.
    Hardin, G.: The tragedy of the commons. J. Nat. Resour. Policy Res. 1, 243–253 (2009)CrossRefGoogle Scholar
  13. 13.
  14. 14.
    Kang, R., et al.: “My data just goes everywhere” user mental models of the internet and implications for privacy and security. In: Proceedings of the 11th Symposium on Usable Privacy and Security (SOUPS) (2015)Google Scholar
  15. 15.
    Kosinski, M., et al.: Private traits and attributes are predictable from digital records of human behavior. In: Proceedings of the National Academy of Sciences (2013)Google Scholar
  16. 16.
    Lane, N.D., et al.: On the feasibility of user de-anonymization from shared mobile sensor data. In: Proceedings of the 3rd International Workshop on Sensing Applications on Mobile Phones (2012)Google Scholar
  17. 17.
    Mendez, D.M., et al.: Internet of Things: survey on security and privacy. arXiv:1707.01879 [cs] (2017)
  18. 18.
    Minch, R.P.: Location privacy in the era of the Internet of Things and big data analytics. In: Proceedings of 48th Hawaii International Conference on System Sciences (HICSS) (2015)Google Scholar
  19. 19.
    Naeini, P.E., et al.: Privacy expectations and preferences in an IoT World. In: Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS) (2017)Google Scholar
  20. 20.
    Narayanan, A., et al.: How to break anonymity of the netix prize dataset. arXiv preprint cs/0610105 (2006)Google Scholar
  21. 21.
    OECD: Skills Matter. OECD Skills Studies (2016). http://www.oecd-ilibrary.org/education/skills-matter_9789264258051-en. Accessed 15 Sept 2016
  22. 22.
    Peppet, S.R.: Regulating the Internet of Things: first steps toward managing discrimination, privacy, security and consent. Tex. L. Rev. 93, 85 (2014)Google Scholar
  23. 23.
    Regulation of the European Parliament and of the Council Concerning the Respect for Private Life and the Protection of Personal Data in Electronic Communications and Repealing Directive 2002/58/EC (Regulation on Privacy and Electronic Communications) (2017)Google Scholar
  24. 24.
    Samsung: By 2020, All of Our Products Will Be Connected to the Web. http://mashable.com/2015/01/05/amsung-internet-of-things. Accessed 14 Nov 2017
  25. 25.
    Schneier, B.: Secrets and Lies: Digital Security in a Networked World (2008)Google Scholar
  26. 26.
    Trends 17: Globalwebindex (2016). http://insight.globalwebindex.net/hubfs/Reports/Trends-17.pdf. Accessed 25 Apr 2017
  27. 27.
    Volkamer, M., Renaud, K.: Mental models – general introduction and review of their application to human-centred security. In: Fischlin, M., Katzenbeisser, S. (eds.) Number Theory and Cryptography. LNCS, vol. 8260, pp. 255–280. Springer, Heidelberg (2013).  https://doi.org/10.1007/978-3-642-42001-6_18CrossRefzbMATHGoogle Scholar
  28. 28.
    Zhou, W., et al.: Security/privacy of wearable fitness tracking IoT Devices. In: Proceedings of the 9th Iberian Conference on Information Systems and Technologies (CISTI) (2014)Google Scholar
  29. 29.
    Ziegeldorf, J.H., et al.: Privacy in the Internet of Things: threats and challenges. Secur. Commun. Netw. 7, 2728–2742 (2014)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2018

Authors and Affiliations

  1. 1.Unabhängiges Landeszentrum für DatenschutzKielGermany
  2. 2.University of BonnBonnGermany
  3. 3.Fraunhofer FKIE BonnBonnGermany

Personalised recommendations