2023
DOI: 10.1613/jair.1.14000
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Understanding and Representing Privacy Requirements in the Internet-of-Things

Abstract: People are interacting with online systems all the time. In order to use the services being provided, they give consent for their data to be collected. This approach requires too much human effort and is impractical for systems like Internet-of-Things (IoT) where human-device interactions can be large. Ideally, privacy assistants can help humans make privacy decisions while working in collaboration with them. In our work, we focus on the identification and representation of privacy requirements in IoT to help … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 88 publications
0
4
0
1
Order By: Relevance
“…Privacy requirements specify the capabilities and functions that must be embedded in a system to protect the personal data of end users and to empower them with control of their data Ogunniye and Kokciyan (2023a). These requirements are generally based on fundamental privacy objectives specified in the relevant privacy regulatory policy or guidance, such as GDPR Voigt and Von Dem Bussche (2017).…”
Section: Privacy and Trustmentioning
confidence: 99%
See 2 more Smart Citations
“…Privacy requirements specify the capabilities and functions that must be embedded in a system to protect the personal data of end users and to empower them with control of their data Ogunniye and Kokciyan (2023a). These requirements are generally based on fundamental privacy objectives specified in the relevant privacy regulatory policy or guidance, such as GDPR Voigt and Von Dem Bussche (2017).…”
Section: Privacy and Trustmentioning
confidence: 99%
“…The importance of the IoT is largely achieved through connected data, allowing objects or things to be readable, recognisable, locatable, addressable, and/or controllable over a network. Although this presents significant opportunities, the main areas of public concern about the technology include the potential impact of information flow on user privacy Ogunniye and Kokciyan (2023a), protection of data assets and the increased capabilities of IoT devices against unauthorised access and manipulations Ghafir et al (2018), how to minimise security and privacy risks to make the technology more acceptable, how to build public trust in the technology Mullagh et al (2022), and ethical problems such as profitability versus ethics, business versus politics Nehme et al (2022), among others.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…As the application scenario shifts from sharing photos on social networks to the interaction between users and personal assistants, and even as users manage their privacy needs across multiple devices, context has become a focus for researchers [33,19,4]. This notion serves as the impetus for Kokciyan et al [23] to put forth a situation-based model for privacy protection.…”
Section: Related Workmentioning
confidence: 99%
“…Безпека IoT з акцентом на вплив нових технологій представлена у роботі [9]. Питання формування вимог безпеки до компонентів IoT розглядаються в [10,11]. Огляд заходів безпеки для IoT представлено в [12].…”
Section: вступunclassified