skip to main content
research-article

The Skewed Privacy Concerns of Bystanders in Smart Environments

Published:20 September 2022Publication History
Skip Abstract Section

Abstract

As ubiquitous computing brings sensors and actuators directly into our homes, they introduce privacy concerns for the owners and bystanders. However, privacy concerns may vary among devices and depend on the bystanders' social relation to the owner. In this work, we hypothesize 1) that bystanders assign more privacy concerns to smart home devices than personal computing devices, such as smartphones, even though they have the same capabilities, and 2) that a stronger social relationship mitigates some of the bystanders' privacy concerns. By conducting an online survey (n=170), we found that personal computing devices are perceived as significantly less privacy-concerning than smart home devices while having equal capabilities. By varying the assumed social relationship, we further found that a stronger connection to the owner reduces privacy concerns. Thus, as bystanders underestimate the risk of personal computing devices and are generally concerned about smart home devices, it is essential to alert the user about the presence of both. We argue that bystanders have to be informed about the privacy risks while entering a new space, in the best case, already in the entrance area.

References

  1. Imtiaz Ahmad, Rosta Farzan, Apu Kapadia, and Adam J. Lee. 2020. Tangible Privacy: Towards User-Centric Sensor Designs for Bystander Privacy. Proc. ACM Hum.-Comput. Interact. , Vol. 4, CSCW2, Article 116 (oct 2020), 28 pages. https://doi.org/10.1145/3415187Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Tousif Ahmed, Apu Kapadia, Venkatesh Potluri, and Manohar Swaminathan. 2018. Up to a Limit? Privacy Concerns of Bystanders and Their Willingness to Share Additional Information with Visually Impaired Users of Assistive Technologies. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. , Vol. 2, 3, Article 89 (sep 2018), 27 pages. https://doi.org/10.1145/3264899Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Noah Apthorpe, Dillon Reisman, and Nick Feamster. 2016. A smart home is no castle: Privacy vulnerabilities of encrypted iot traffic. Workshop on Data and Algorithmic Transparency (2016).Google ScholarGoogle Scholar
  4. Noah Apthorpe, Yan Shvartzshnaider, Arunesh Mathur, Dillon Reisman, and Nick Feamster. 2018. Discovering Smart Home Internet of Things Privacy Norms Using Contextual Integrity. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. , Vol. 2, 2, Article 59 (jul 2018), 23 pages. https://doi.org/10.1145/3214262Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Nat a M Barbosa, Joon S Park, Yaxing Yao, and Yang Wang. 2019. "What if?" Predicting Individual Users' Smart Home Privacy Preferences and Their Changes. Proceedings on Privacy Enhancing Technologies, Vol. 2019, 4 (2019), 211--231. https://doi.org/10.2478/popets-2019-0066Google ScholarGoogle ScholarCross RefCross Ref
  6. Joseph Bugeja, Andreas Jacobsson, and Paul Davidsson. 2016. On privacy and security challenges in smart connected homes. In 2016 European Intelligence and Security Informatics Conference (EISIC, 16). IEEE, 172--175. https://doi.org/10.1109/EISIC.2016.044Google ScholarGoogle ScholarCross RefCross Ref
  7. Mark Chatfield and Adrian Mander. 2009. The Skillings-Mack test (Friedman test when there are missing data). The Stata journal, Vol. 9, 2 (01 Apr 2009), 299--305. https://pubmed.ncbi.nlm.nih.gov/19829764Google ScholarGoogle Scholar
  8. Eun Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly Harrison, Shwetak N. Patel, and Julie A. Kientz. 2012. Investigating Receptiveness to Sensing and Inference in the Home Using Sensor Proxies. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (Pittsburgh, Pennsylvania) (UbiComp '12). Association for Computing Machinery, New York, NY, USA, 61--70. https://doi.org/10.1145/2370216.2370226Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Benjamin R. Cowan, Nadia Pantidi, David Coyle, Kellie Morrissey, Peter Clarke, Sara Al-Shehri, David Earley, and Natasha Bandeira. 2017. "What Can i Help You with?": Infrequent Users' Experiences of Intelligent Personal Assistants. In Proceedings of the 19th International Conference on Human-Computer Interaction with Mobile Devices and Services (Vienna, Austria) (MobileHCI '17). Association for Computing Machinery, New York, NY, USA, Article 43, 12 pages. https://doi.org/10.1145/3098279.3098539Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Tamara Denning, Zakariya Dehlawi, and Tadayoshi Kohno. 2014. In Situ with Bystanders of Augmented Reality Glasses: Perspectives on Recording and Privacy-Mediating Technologies. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Toronto, Ontario, Canada) (CHI '14). Association for Computing Machinery, New York, NY, USA, 2377--2386. https://doi.org/10.1145/2556288.2557352Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Wenrui Diao, Xiangyu Liu, Zhe Zhou, and Kehuan Zhang. 2014. Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone. In Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices (Scottsdale, Arizona, USA) (SPSM '14). Association for Computing Machinery, New York, NY, USA, 63--74. https://doi.org/10.1145/2666620.2666623Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Thomas Franke, Christiane Attig, and Daniel Wessel. 2019. A Personal Resource for Technology Interaction: Development and Validation of the Affinity for Technology Interaction (ATI) Scale. International Journal of Human--Computer Interaction, Vol. 35, 6 (2019), 456--467. https://doi.org/10.1080/10447318.2018.1456150Google ScholarGoogle ScholarCross RefCross Ref
  13. Frederik Funke and Ulf-Dietrich Reips. 2012. Why Semantic Differentials in Web-Based Research Should Be Made from Visual Analogue Scales and Not from 5-Point Scales. Field Methods, Vol. 24, 3 (2012), 310--327. https://doi.org/10.1177/1525822X12444061Google ScholarGoogle ScholarCross RefCross Ref
  14. Sidney Fussell. 2019. Airbnb Has a Hidden-Camera Problem. https://www.theatlantic.com/technology/archive/2019/03/what-happens-when-you-find-cameras-your-airbnb/585007/Google ScholarGoogle Scholar
  15. Nina Gerber, Benjamin Reinheimer, and Melanie Volkamer. 2018. Home Sweet Home? Investigating Users' Awareness of Smart Home Privacy Threats. In Proceedings of An Interactive Workshop on the Human aspects of Smarthome Security and Privacy (WSSP). USENIX, Baltimore, MD, USA. https://doi.org/10.5445/IR/1000083578Google ScholarGoogle Scholar
  16. Loni Hagen. 2017. Overcoming the Privacy Challenges of Wearable Devices: A Study on the Role of Digital Literacy. In Proceedings of the 18th Annual International Conference on Digital Government Research (Staten Island, NY, USA) (dg.o '17). Association for Computing Machinery, New York, NY, USA, 598--599. https://doi.org/10.1145/3085228.3085254Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Gunnar Harboe and Elaine M. Huang. 2015. Real-World Affinity Diagramming Practices: Bridging the Paper-Digital Gap. In Proc. 33rd Annual ACM Conf. Human Factors in Computing Systems. ACM, New York, NY, USA, 95--104. https://doi.org/10.1145/2702123.2702561Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Roberto Hoyle, Luke Stark, Qatrunnada Ismail, David Crandall, Apu Kapadia, and Denise Anthony. 2020. Privacy Norms and Preferences for Photos Posted Online. ACM Trans. Comput.-Hum. Interact. , Vol. 27, 4, Article 30 (aug 2020), 27 pages. https://doi.org/10.1145/3380960Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Roberto Hoyle, Robert Templeman, Denise Anthony, David Crandall, and Apu Kapadia. 2015. Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (Seoul, Republic of Korea) (CHI '15). Association for Computing Machinery, New York, NY, USA, 1645--1648. https://doi.org/10.1145/2702123.2702183Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Roberto Hoyle, Robert Templeman, Steven Armes, Denise Anthony, David Crandall, and Apu Kapadia. 2014. Privacy Behaviors of Lifeloggers Using Wearable Cameras. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (Seattle, Washington) (UbiComp '14). Association for Computing Machinery, New York, NY, USA, 571--582. https://doi.org/10.1145/2632048.2632079Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Hilary Hutchinson, Wendy Mackay, Bo Westerlund, Benjamin B. Bederson, Allison Druin, Catherine Plaisant, Michel Beaudouin-Lafon, Stéphane Conversy, Helen Evans, Heiko Hansen, Nicolas Roussel, and Björn Eiderb"ack. 2003. Technology Probes: Inspiring Design for and with Families. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Ft. Lauderdale, Florida, USA) (CHI '03). Association for Computing Machinery, New York, NY, USA, 17--24. https://doi.org/10.1145/642611.642616Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Anindya Maiti Kirsten Crager. 2017. Information Leakage through Mobile Motion Sensors: User Awareness and Concerns. Proceedings of the European Workshop on Usable Security (EuroUSEC) (2017). http://dx.doi.org/10.14722/eurousec.2017.23013Google ScholarGoogle ScholarCross RefCross Ref
  23. Marion Koelle, Katrin Wolf, and Susanne Boll. 2018. Beyond LED Status Lights - Design Requirements of Privacy Notices for Body-Worn Cameras. In Proceedings of the Twelfth International Conference on Tangible, Embedded, and Embodied Interaction (Stockholm, Sweden) (TEI '18). Association for Computing Machinery, New York, NY, USA, 177--187. https://doi.org/10.1145/3173225.3173234Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Evan Lafontaine, Aafaq Sabir, and Anupam Das. 2021. Understanding People's Attitude and Concerns towards Adopting IoT Devices. In Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems (CHI'21). Association for Computing Machinery, New York, NY, USA, Article 307, 10 pages. https://doi.org/10.1145/3411763.3451633Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, Are You Listening? Privacy Perceptions, Concerns and Privacy-Seeking Behaviors with Smart Speakers. Proc. ACM Hum.-Comput. Interact. , Vol. 2, CSCW, Article 102 (nov 2018), 31 pages. https://doi.org/10.1145/3274371Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Naresh K. Malhotra, Sung S. Kim, and James Agarwal. 2004. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research , Vol. 15, 4 (2004), 336--355. http://www.jstor.org/stable/23015787Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Nathan Malkin, Julia Bernd, Maritza Johnson, and Serge Egelman. 2018. "What Can't Data Be Used For?" Privacy Expectations about Smart TVs in the US. In Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC), London, UK. https://doi.org/10.14722/eurousec.2018.23016Google ScholarGoogle ScholarCross RefCross Ref
  28. Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera, Serge Egelman, and David Wagner. 2019. Privacy attitudes of smart speaker users. Proceedings on Privacy Enhancing Technologies, Vol. 2019, 4 (2019). https://doi.org/10.2478/popets-2019-0068Google ScholarGoogle ScholarCross RefCross Ref
  29. Shrirang Mare, Franziska Roesner, and Tadayoshi Kohno. 2020. Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts. Proceedings on Privacy Enhancing Technologies, Vol. 2020, 2 (2020), 436--458. https://doi.org/doi:10.2478/popets-2020-0035Google ScholarGoogle ScholarCross RefCross Ref
  30. Justin Matejka, Michael Glueck, Tovi Grossman, and George Fitzmaurice. 2016. The Effect of Visual Appearance on the Performance of Continuous Sliders and Visual Analogue Scales. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (San Jose, California, USA) (CHI '16). Association for Computing Machinery, New York, NY, USA, 5421--5432. https://doi.org/10.1145/2858036.2858063Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Maryam Mehrnezhad, Ehsan Toreini, and Sami Alajrami. 2018a. Making Sense of Sensors: Mobile Sensor Security Awareness and Education. In Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust (Orlando, Florida, USA) (STAST '17). Association for Computing Machinery, New York, NY, USA, 40--52. https://doi.org/10.1145/3167996.3168001Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Maryam Mehrnezhad, Ehsan Toreini, Siamak F Shahandashti, and Feng Hao. 2018b. Stealing PINs via mobile sensors: actual risk versus user perception. International Journal of Information Security, Vol. 17, 3 (2018), 291--313. https://doi.org/10.1007/s10207-017-0369-xGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  33. Andrés Molina-Markham, Prashant Shenoy, Kevin Fu, Emmanuel Cecchet, and David Irwin. 2010. Private Memoirs of a Smart Meter. In Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building (Zurich, Switzerland) (BuildSys '10). Association for Computing Machinery, New York, NY, USA, 61--66. https://doi.org/10.1145/1878431.1878446Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, Santa Clara, CA, 399--412. https://www.usenix.org/conference/soups2017/technical-sessions/presentation/naeiniGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  35. Johannes Obermaier and Martin Hutle. 2016. Analyzing the Security and Privacy of Cloud-Based Video Surveillance Systems. In Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security (Xi'an, China) (IoTPTS '16). Association for Computing Machinery, New York, NY, USA, 22--28. https://doi.org/10.1145/2899007.2899008Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Rebecca S. Portnoff, Linda N. Lee, Serge Egelman, Pratyush Mishra, Derek Leung, and David Wagner. 2015. Somebody's Watching Me? Assessing the Effectiveness of Webcam Indicator Lights. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (Seoul, Republic of Korea) (CHI '15). Association for Computing Machinery, New York, NY, USA, 1649--1658. https://doi.org/10.1145/2702123.2702164Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Ulf-Dietrich Reips and Frederik Funke. 2008. Interval-level measurement with visual analogue scales in Internet-based research: VAS Generator. Behavior Research Methods , Vol. 40, 3 (01 Aug 2008), 699--704. https://doi.org/10.3758/BRM.40.3.699Google ScholarGoogle ScholarCross RefCross Ref
  38. Emmanuel Sebastian Udoh and Abdulwahab Alkharashi. 2016. Privacy risk awareness and the behavior of smartwatch users: A case study of Indiana University students. In 2016 Future Technologies Conference (FTC). IEEE, 926--931. https://doi.org/10.1109/FTC.2016.7821714Google ScholarGoogle ScholarCross RefCross Ref
  39. Yang Wang, Huichuan Xia, Yaxing Yao, and Yun Huang. 2016. Flying Eyes and Hidden Controllers: A Qualitative Study of People's Privacy Perceptions of Civilian Drones in The US. Proc. Priv. Enhancing Technol. , Vol. 2016, 3 (2016), 172--190. https://doi.org/10.1515/popets-2016-0022Google ScholarGoogle ScholarCross RefCross Ref
  40. Jacob O. Wobbrock, Leah Findlater, Darren Gergle, and James J. Higgins. 2011. The Aligned Rank Transform for Nonparametric Factorial Analyses Using Only Anova Procedures. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Vancouver, BC, Canada) (CHI '11). Association for Computing Machinery, New York, NY, USA, 143--146. https://doi.org/10.1145/1978942.1978963Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Peter Worthy, Ben Matthews, and Stephen Viller. 2016. Trust Me: Doubts and Concerns Living with the Internet of Things. In Proceedings of the 2016 ACM Conference on Designing Interactive Systems (Brisbane, QLD, Australia) (DIS '16). Association for Computing Machinery, New York, NY, USA, 427--434. https://doi.org/10.1145/2901790.2901890Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Yaxing Yao, Justin Reed Basdeo, Oriana Rosata Mcdonough, and Yang Wang. 2019. Privacy Perceptions and Designs of Bystanders in Smart Homes. Proc. ACM Hum.-Comput. Interact. , Vol. 3, CSCW, Article 59 (nov 2019), 24 pages. https://doi.org/10.1145/3359161Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Yaxing Yao, Huichuan Xia, Yun Huang, and Yang Wang. 2017a. Free to Fly in Public Spaces: Drone Controllers' Privacy Perceptions and Practices. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (Denver, Colorado, USA) (CHI '17). Association for Computing Machinery, New York, NY, USA, 6789--6793. https://doi.org/10.1145/3025453.3026049Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Yaxing Yao, Huichuan Xia, Yun Huang, and Yang Wang. 2017b. Privacy Mechanisms for Drones: Perceptions of Drone Controllers and Bystanders. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (Denver, Colorado, USA) (CHI '17). Association for Computing Machinery, New York, NY, USA, 6777--6788. https://doi.org/10.1145/3025453.3025907Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. 2018. User Perceptions of Smart Home IoT Privacy. Proc. ACM Hum.-Comput. Interact. , Vol. 2, CSCW, Article 200 (nov 2018), 20 pages. https://doi.org/10.1145/3274469Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image Proceedings of the ACM on Human-Computer Interaction
    Proceedings of the ACM on Human-Computer Interaction  Volume 6, Issue MHCI
    MHCI
    September 2022
    852 pages
    EISSN:2573-0142
    DOI:10.1145/3564624
    Issue’s Table of Contents

    Copyright © 2022 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 20 September 2022
    Published in pacmhci Volume 6, Issue MHCI

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader