skip to main content
10.1145/3334480.3382850acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
abstract

Factoring User Experience into the Security and Privacy Design of Smart Home Devices: A Case Study

Authors Info & Claims
Published:25 April 2020Publication History

ABSTRACT

Smart home devices are growing in popularity due to their functionality, convenience, and comfort. However, they are raising security and privacy concerns for users who may have very little technical ability. User experience (UX) focuses on improving user interactions, but little work has investigated how companies factor user experience into the security and privacy design of smart home devices as a means of addressing these concerns. To explore this in more detail, we designed and conducted six in-depth interviews with employees of a large smart home company in the United Kingdom. We analyzed the data using Grounded Theory, and found little evidence that UX is a consideration for the security design of these devices. Based on the results of our study, we proposed user-centered design guidelines and recommendations to improve data protection in smart homes.

References

  1. Statista. 2020. Smart Home - worldwide | Statista Market Forecast. (Jan. 2020). https://www.statista. com/outlook/279/100/smart-home/worldwideGoogle ScholarGoogle Scholar
  2. Noura Abdi, Kopo M. Ramokapane, and Jose M. Such. 2019. More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019).Google ScholarGoogle Scholar
  3. Noura Aleisa and Karen Renaud. 2017. Privacy of the Internet of Things: A systematic literature review. In Proceedings of the 50th Hawaii International Conference on System Sciences.Google ScholarGoogle ScholarCross RefCross Ref
  4. Noah Apthorpe, Dillon Reisman, and Nick Feamster. 2017. A smart home is no castle: Privacy vulnerabilities of encrypted iot traffic. arXiv preprint arXiv:1705.06805 (2017).Google ScholarGoogle Scholar
  5. Parks Associates. 2019. Parks Associates: Privacy concerns increasing among smart home device owners. (Oct. 2019).Google ScholarGoogle Scholar
  6. Daniel Bastos, Fabio Giubilo, Mark Shackleton, and Fadi El-Moussa. 2018. GDPR Privacy Implications for the Internet of Things.Google ScholarGoogle Scholar
  7. Johanna Bergman and Isabelle Johansson. 2017. The user experience perspective of Internet of Things development. (2017).Google ScholarGoogle Scholar
  8. Johanna Bergman, Thomas Olsson, Isabelle Johansson, and Kirsten Rassmus-Gröhn. 2018. An exploratory study on how Internet of Things developing companies handle User Experience Requirements. In International Working Conference on Requirements Engineering: Foundation for Software Quality. Springer, 20--36.Google ScholarGoogle ScholarCross RefCross Ref
  9. Dennis Basil Bromley and Dennis Basil Bromley. 1986. The case-study method in psychology and related disciplines. Wiley Chichester.Google ScholarGoogle Scholar
  10. Matt Burgess. 2018. The IoT's security nightmare will never end. You can now search insecure cameras by address. Wired UK (Nov. 2018). https://www.wired.co.uk/article/internet-of-things-security-camera-search-locationGoogle ScholarGoogle Scholar
  11. William Buxton and Richard Sniderman. 1980. Iteration in the design of the human-computer interface. In proceedings of the 13th Annual Meeting of the Human Factors Association of Canada, Vol. 7281. 37.Google ScholarGoogle Scholar
  12. Lee A. Bygrave. 2017. Data protection by design and by default: Deciphering the EU's legislative requirements. Oslo Law Review 4, 02 (2017), 105--120.Google ScholarGoogle ScholarCross RefCross Ref
  13. Charles F. Cannell, Peter V. Miller, and Lois Oksenberg. 1981. Research on interviewing techniques. Sociological methodology 12 (1981), 389--437.Google ScholarGoogle Scholar
  14. Isis Chong, Aiping Xiong, and Robert W. Proctor. 2019. Human factors in the privacy and security of the internet of things. Ergonomics in Design 27, 3 (2019), 5--10.Google ScholarGoogle ScholarCross RefCross Ref
  15. Paul Dunphy, John Vines, Lizzie Coles-Kemp, Rachel Clarke, Vasilis Vlachokyriakos, Peter Wright, John McCarthy, and Patrick Olivier. 2014. Understanding the experience-centeredness of privacy and security technologies. In Proceedings of the 2014 New Security Paradigms Workshop. ACM, 83--94.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Ivan Flechais, M. Angela Sasse, and Stephen Hailes. 2003. Bringing security home: A process for developing secure and usable systems. In Proceedings of the 2003 workshop on New security paradigms. ACM, 49--57.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Jesse James Garrett. 2010. The elements of user experience: user-centered design for the web and beyond. Pearson Education.Google ScholarGoogle Scholar
  18. Christine Geeng and Franziska Roesner. 2019. Who's In Control?: Interactions In Multi-User Smart Homes. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, 268.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Leo A. Goodman. 1961. Snowball sampling. The annals of mathematical statistics (1961), 148--170.Google ScholarGoogle Scholar
  20. Seda Gürses, Carmela Troncoso, and Claudia Diaz. 2015. Engineering privacy by design reloaded. In Amsterdam Privacy Conference. 1--21.Google ScholarGoogle Scholar
  21. Marc Hassenzahl, Sarah Diefenbach, and Anja Göritz. 2010. Needs, affect, and interactive products--Facets of user experience. Interacting with computers 22, 5 (2010), 353--362.Google ScholarGoogle Scholar
  22. Marc Hassenzahl and Noam Tractinsky. 2006. User experience-a research agenda. Behaviour & information technology 25, 2 (2006), 91--97.Google ScholarGoogle Scholar
  23. Lassi A. Liikkanen, Harri Kilpiö, Lauri Svan, and Miko Hiltunen. 2014. Lean UX: the next generation of user-centered agile development?. In Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational. ACM, 1095--1100.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Kuo-Yi Lin, Chen-Fu Chien, and Rhoann Kerh. 2016. UNISON framework of data-driven innovation for extracting user experience of product design of wearable devices. Computers & Industrial Engineering 99 (2016), 487--502.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Robert C. Martin. 2002. Agile software development: principles, patterns, and practices. Prentice Hall.Google ScholarGoogle Scholar
  26. John McCarthy and Peter Wright. 2007. Technology as experience. MIT press.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Sharan B. Merriam. 1988. Case study research in education: A qualitative approach. Jossey-Bass.Google ScholarGoogle Scholar
  28. Sharan B. Merriam. 1998. Qualitative Research and Case Study Applications in Education. Revised and Expanded from" Case Study Research in Education.". ERIC.Google ScholarGoogle Scholar
  29. Gabe Morazan. 2019. What Is Privacy UX? (May 2019). https://www.cmswire.com/digital-experience/what-is-privacy-ux/Google ScholarGoogle Scholar
  30. Jack Narcotta. 2018. Smart Home Surveillance Camera Market Analysis and Forecast. (April 2018).Google ScholarGoogle Scholar
  31. Razvan Nicolescu, Michael Huth, Petar Radanliev, and David De Roure. 2018. State of The Art in IoT-Beyond Economic Value. London. (2018).Google ScholarGoogle Scholar
  32. Norbert Nthala and Ivan Flechais. 2018. Informal support networks: An investigation into home data security practices. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). 63--82.Google ScholarGoogle Scholar
  33. Jeungmin Oh and Uichin Lee. 2015. Exploring UX issues in Quantified Self technologies. In 2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICarnegie Mellon University). 53--59. DOI: http://dx.doi.org/10.1109/ICarnegie Mellon University.2015.7061028Google ScholarGoogle ScholarCross RefCross Ref
  34. Helena Holmström Olsson, Jan Bosch, and Brian Katumba. 2016. User Dimensions in 'Internet of Things' Systems: The UDIT Model. In Software Business (Lecture Notes in Business Information Processing), Andrey Maglyas and Anna-Lena Lamprecht (Eds.). Springer International Publishing, Cham, 161--168. DOI: http://dx.doi.org/10.1007/978--3--319--40515--5_13Google ScholarGoogle ScholarCross RefCross Ref
  35. Janice Redish and Carol Barnum. 2011. Overlap, influence, intertwining: The interplay of UX and technical communication. Journal of Usability Studies 6, 3 (2011), 90--101.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Claire Rowland and Martin Charlier. 2015. User Experience Design for the Internet of Things. O'Reilly Media.Google ScholarGoogle Scholar
  37. Claire Rowland, Elizabeth Goodman, Martin Charlier, Ann Light, and Alfred Lui. 2015. Designing connected products: UX for the consumer Internet of Things. "O'Reilly Media, Inc.".Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. F. B. Shava and D. Van Greunen. 2013. Factors affecting user experience with security features: A case study of an academic institution in Namibia. In 2013 Information Security for South Africa. 1--8. DOI: http://dx.doi.org/10.1109/ISSA.2013.6641061Google ScholarGoogle ScholarCross RefCross Ref
  39. Anselm Strauss and Juliet M. Corbin. 1997. Grounded theory in practice. Sage.Google ScholarGoogle Scholar
  40. Jitesh Ubrani, Ramon Llamas, and Michael Shirer. 2019. Double-Digit Growth Expected in the Smart Home Market, Says IDC. (March 2019). https://www.idc.com/getdoc.jsp?containerId=prUS44971219Google ScholarGoogle Scholar
  41. Paul Voigt and Axel Von dem Bussche. 2017. The eu general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing (2017).Google ScholarGoogle ScholarCross RefCross Ref
  42. Elizabeth Wolfe and Brian Ries. 2019. Ring camera: A hacker accessed a family's security camera told their 8-year-old daughter he was Santa Claus - CNN. (Dec. 2019). https://edition.cnn.com/2019/12/12/tech/ring-security-camera-hacker-harassed-girl-trnd/index.htmlGoogle ScholarGoogle Scholar
  43. Teng Xu, James B. Wendt, and Miodrag Potkonjak. 2014. Security of IoT systems: Design challenges and opportunities. In Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design. IEEE Press, 417--423.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Robert K. Yin. 2017. Case study research and applications: Design and methods. Sage publications.Google ScholarGoogle Scholar
  45. Eric Zeng and Franziska Roesner. 2019. Understanding and improving security and privacy in multi-user smart homes: A design exploration and in-home user study. In 28th USENIX Security Symposium (USENIX Security 19). 159--176.Google ScholarGoogle Scholar
  46. Kai Zhao and Lina Ge. 2013. A survey on the internet of things security. In 2013 Ninth international conference on computational intelligence and security. IEEE, 663--667.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. 2018. User perceptions of smart home IoT privacy. Proceedings of the ACM on Human-Computer Interaction 2, CSCW (2018), 200.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Mary Ellen Zurko. 2005. User-centered security: Stepping up to the grand challenge. In 21st Annual Computer Security Applications Conference (ACSAC'05). IEEE, 14--pp.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Factoring User Experience into the Security and Privacy Design of Smart Home Devices: A Case Study

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CHI EA '20: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems
          April 2020
          4474 pages
          ISBN:9781450368193
          DOI:10.1145/3334480

          Copyright © 2020 Owner/Author

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 25 April 2020

          Check for updates

          Qualifiers

          • abstract

          Acceptance Rates

          Overall Acceptance Rate6,164of23,696submissions,26%

          Upcoming Conference

          CHI '24
          CHI Conference on Human Factors in Computing Systems
          May 11 - 16, 2024
          Honolulu , HI , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format