Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems 2020
DOI: 10.1145/3334480.3383016
|View full text |Cite
|
Sign up to set email alerts
|

All in One! User Perceptions on Centralized IoT Privacy Settings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…In this work, we focused on authentication as a sub-domain of USEC research. However, USEC research covers much more including privacy on IoT devices [65,93,113], users' perception of technologies (e.g., drones [12]) and how they affect privacy and security, or social engineering [36,59]. Based on the results and our experience conducting this work, we discuss two potential research directions where we see great potential of VR studies as a study method.…”
Section: Vr Studies For Human-centred Usability Privacy and Security Researchmentioning
confidence: 99%
“…In this work, we focused on authentication as a sub-domain of USEC research. However, USEC research covers much more including privacy on IoT devices [65,93,113], users' perception of technologies (e.g., drones [12]) and how they affect privacy and security, or social engineering [36,59]. Based on the results and our experience conducting this work, we discuss two potential research directions where we see great potential of VR studies as a study method.…”
Section: Vr Studies For Human-centred Usability Privacy and Security Researchmentioning
confidence: 99%
“…Previous research found that current smarthome systems frequently fail to meet users' privacy demands and expectations [27,45]. Some studies thus designed various smart home interfaces and systems to enhance the data transparency in a smart home and enable better privacy settings [14,16,36,44]. Through surveys, interviews, and co-design workshops, researchers find that users have a strong need for data control [12,49].…”
Section: Smart Home Privacy Research and Access Controlmentioning
confidence: 99%
“…4.2.5 RQ2: Multiple inter-connected devices. For this theme, we found only a small number of (four) papers [7,34,119,166], which are briefly introduced below.…”
Section: Periodmentioning
confidence: 99%
“…Sikder et al [166] discussed the complex and conflicting demands of multiple users in a multi-device home compared to a single-users environments and suggested a new access control system called Kratos to enhance awareness of related environment. Marky et al [119] (lab-based study, 𝑛 = 15) found that users would prefer to have detailed information about each device, a clear status communication, more dynamic and rule-based settings, and delegation options to adjust privacy settings in a multi-device setting.…”
Section: Periodmentioning
confidence: 99%
See 1 more Smart Citation