2017 15th Annual Conference on Privacy, Security and Trust (PST) 2017
DOI: 10.1109/pst.2017.00029
|View full text |Cite
|
Sign up to set email alerts
|

Privacy is the Boring Bit: User Perceptions and Behaviour in the Internet-of-Things

Abstract: In opinion polls, the public frequently claim to value their privacy. However, individuals often seem to overlook the principle, contributing to a disparity labelled the 'Privacy Paradox'. The growth of the Internet-of-Things (IoT) is frequently claimed to place privacy at risk. However, the Paradox remains underexplored in the IoT. In addressing this, we first conduct an online survey (N = 170) to compare public opinions of IoT and less-novel devices. Although we find users perceive privacy risks, many still … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
39
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3
1

Relationship

3
6

Authors

Journals

citations
Cited by 44 publications
(40 citation statements)
references
References 27 publications
1
39
0
Order By: Relevance
“…However, IoT provides many advantages it comes with the price of privacy risk [27]. The security and privacy risks in IoT need to be addressed to provide better solutions [28]. When the vulnerabilities in IoT environment are exploited, there will be a great loss in terms of authenticity, integrity, security and confidentiality [29].…”
Section: Challenges In Iot Implementationmentioning
confidence: 99%
See 1 more Smart Citation
“…However, IoT provides many advantages it comes with the price of privacy risk [27]. The security and privacy risks in IoT need to be addressed to provide better solutions [28]. When the vulnerabilities in IoT environment are exploited, there will be a great loss in terms of authenticity, integrity, security and confidentiality [29].…”
Section: Challenges In Iot Implementationmentioning
confidence: 99%
“…This is the prime motive behind the combination of blockchain and IoT technologies [7]. Researches have proved that blockchain provides solutions for security issues in IoT like Denial of Service (DoS) [33], Authorization [19], Identity management [28] and data protection [33].…”
Section: Advantages Of Using Blockchain With Iotmentioning
confidence: 99%
“…The IoT could pose a real challenge here given the amount of personal information that may be leaked via the usage of smart devices-be they wearables (smart watches, fitness trackers), voice assistants (e.g., Amazon Alexa, Google Home, or Apple HomePod), or smart appliances (e.g., smart TVs, fridges, and ovens). Research has already demonstrated the somewhat irrational behavior of individuals when using the IoT, considering their beliefs regarding privacy versus their inaction to behave privately (i.e., the privacy paradox) [86,87].…”
Section: Account and Password Hackingmentioning
confidence: 99%
“…CPSMs will bring inevitable challenges of governance and ethics since they involve humans and their resources. The IoT brings with it threats of privacy-violating interactions, life-cycle transitions, inventory attacks and information linkage (N. arising during data aggregation and standardisation phases (Ziegeldorf et al 2014, Williams et al 2017. Another hard to predict factor is that of emergent behaviours in complex systems (O'Hara et al 2013), including the accidental assembly of CPSMs; the opportunity to innovate always needs to be balanced against unintended consequences, especially in these hyper-social environments at scale.…”
Section: Observing Cyber-physical Social Machinesmentioning
confidence: 99%