2022
DOI: 10.1007/978-3-030-93956-4_6
|View full text |Cite
|
Sign up to set email alerts
|

A Two-Fold Study to Investigate Users’ Perception of IoT Information Sensitivity Levels and Their Willingness to Share the Information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…However, the approach does not consider the magnitude of an inconsistency. As shown in [83], consumers' perception of sensitivity towards IoT information varies based on the types of information. For instance, if an IoT application collects the users' biometric information without mentioning it in its privacy policy, the magnitude of the inconsistency may not be same as if the information in question belongs to a less sensitive category (such as internet-based).…”
Section: Source Code Analysis-based Approachesmentioning
confidence: 99%
See 3 more Smart Citations
“…However, the approach does not consider the magnitude of an inconsistency. As shown in [83], consumers' perception of sensitivity towards IoT information varies based on the types of information. For instance, if an IoT application collects the users' biometric information without mentioning it in its privacy policy, the magnitude of the inconsistency may not be same as if the information in question belongs to a less sensitive category (such as internet-based).…”
Section: Source Code Analysis-based Approachesmentioning
confidence: 99%
“…Additionally, current research do not evaluate the magnitude of inconsistencies based on the IoT information sensitivity. For instance, inconsistencies related to location information and environmental temperature information are considered on the same scale, which might not be the same from users' perspectives [83].…”
Section: A Analysis Of Research Questionsmentioning
confidence: 99%
See 2 more Smart Citations
“…They summarized the threats in several categories, i.e., identity theft, social threat, online safety, data security, cyber attacks. Some other research works also reported that users in general are not aware of these privacy threats since they are not informed how and to what extent their personal information is being accessed [31,14,23,11]. Additionally, smart home users often share their devices with trusted people who live outside of their home [27].…”
Section: Related Workmentioning
confidence: 99%