Abstract
Sensor-enabled computers in the form of 'IoT' devices such as home security cameras and voice assistants are increasingly becoming pervasive in our environment. With the embedded cameras and microphones in these devices, this 'invasion' of our everyday spaces can pose significant threats to the privacy of bystanders. Because of their complex functionality, even when people attempt privacy measures (such as asking the owner to "turn the camera off"), these devices may still record information because of the lack of a 'real' off button. With the ambiguities of current designs, a bystander's perceived privacy can diverge from their actual privacy. Indeed, being able to assess one's actual privacy is a key aspect in managing one's privacy according to Altman's theory of boundary regulation, and current designs fall short in assuring people of their privacy. To understand how people as bystanders manage their privacy with IoT devices, we conducted an interview study about people's perceptions of and behaviors around current IoT devices. We find that although participants' behaviors line up with Altman's theory of boundary regulation, in the face of uncertainty about their privacy, they desire or engage in various 'tangible' workarounds. Based on our findings, we identify and introduce the concept of 'tangible privacy' as being essential to boundary regulation with IoT devices. We argue that IoT devices should be designed in a way that clearly and unambiguously conveys sensor states to people around them and make actionable design recommendations to provide strong privacy assurances to bystanders.
- Irwin Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole Pub. Co.Google Scholar
- Leonardo Angelini, Elena Mugellini, Omar Abou Khaled, and Nadine Couture. 2018. Internet of Tangible Things (IoTT): Challenges and Opportunities for Tangible Interaction with IoT. Informatics, Vol. 5, 7 (2018).Google Scholar
- Orlando Arias, Jacob Wurm, Khoa Hoang, and Yier Jin. 2015. Privacy and Security in Internet of Things and Wearable Devices. IEEE Transactions on Multi-Scale Computing Systems, Vol. 1, 2 (2015), 99--109.Google Scholar
Digital Library
- David Armstrong, Ann Gosling, John Weinman, and Theresa Marteau. 1997. The Place of Inter-Rater Reliability in Qualitative Research: An Empirical Study. Sociology, Vol. 31, 3 (1997), 597--606.Google Scholar
Cross Ref
- Victoria Bellotti and Abigail Sellen. 1993. Design for Privacy in Ubiquitous Computing Environments. In Proceedings of the Third European Conference on Computer-Supported Cooperative Work 13--17 September 1993, Milan, Italy ECSCW'93. Springer, 77--92.Google Scholar
Cross Ref
- Lucia Benaquisto and L Given. 2008. The SAGE encyclopedia of qualitative research methods. New York: Sage (2008).Google Scholar
- Matthew Brocker and Stephen Checkoway. 2014. iSeeYou: Disabling the MacBook Webcam Indicator LED. In 23rd USENIX Security Symposium (USENIX Security 14). San Diego, CA, 337--352.Google Scholar
- Joseph Bugeja, Andreas Jacobsson, and Paul Davidsson. 2016. On privacy and security challenges in smart connected homes. In 2016 European Intelligence and Security Informatics Conference (EISIC). IEEE, 172--175.Google Scholar
Cross Ref
- Gary Burnett and Laurie Bonnici. 2003. Beyond the FAQ: Explicit and implicit norms in Usenet newsgroups. Library & Information Science Research, Vol. 25, 3 (2003), 333--351.Google Scholar
Cross Ref
- Kelly E. Caine, Celine Y. Zimmerman, Zachary Schall-Zimmerman, William R. Hazlewood, Alexander C. Sulgrove, L. Jean Camp, Katherine H. Connelly, Lesa L. Huber, and Kalpana Shankar. 2010. DigiSwitch: Design and Evaluation of a Device for Older Adults to Preserve Privacy While Monitoring Health at Home. In Proceedings of the 1st ACM International Health Informatics Symposium (Arlington, Virginia, USA) (IHI '10). ACM, New York, NY, USA, 153--162.Google Scholar
Digital Library
- Nico Castelli, Corinna Ogonowski, Timo Jakobi, Martin Stein, Gunnar Stevens, and Volker Wulf. 2017. What Happened in My Home?: An End-User Development Approach for Smart Home Data Visualization. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (Denver, Colorado, USA) (CHI '17). ACM, New York, NY, USA, 853--866.Google Scholar
Digital Library
- Varun Chandrasekaran, Kassem Fawaz, Bilge Mutlu, and Suman Banerjee. 2018. Characterizing Privacy Perceptions of Voice Assistants: A Technology Probe Study. ArXiv, Vol. abs/1812.00263 (2018).Google Scholar
- Soumyadeb Chowdhury, Md Sadek Ferdous, and Joemon M Jose. 2016. Bystander privacy in lifelogging. In Proceedings of the 30th International BCS Human Computer Interaction Conference: Companion Volume. BCS Learning & Development Ltd., 15.Google Scholar
Digital Library
- Yaliang Chuang, Lin-Lin Chen, and Yoga Liu. 2018. Design Vocabulary for Human-IoT Systems Communication. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI '18). ACM, New York, NY, USA, Article 274, bibinfonumpages11 pages.Google Scholar
Digital Library
- Nigel Davies, Nina Taft, Mahadev Satyanarayanan, Sarah Clinch, and Brandon Amos. 2016. Privacy mediators: Helping IoT cross the chasm. In Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications. ACM, 39--44.Google Scholar
Digital Library
- Eva Deckers, Stephan Wensveen, Pierre Levy, and Rene Ahn. 2013. Designing for perceptual crossing: Designing and comparing three behaviors. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1901--1910.Google Scholar
Digital Library
- Tamara Denning, Zakariya Dehlawi, and Tadayoshi Kohno. 2014. In Situ with Bystanders of Augmented Reality Glasses: Perspectives on Recording and Privacy-mediating Technologies. In Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems (Toronto, Ontario, Canada) (CHI '14). ACM, New York, NY, USA, 2377--2386.Google Scholar
Digital Library
- Tamara Denning, Tadayoshi Kohno, and Henry M Levy. 2013. Computer security and the modern home. Commun. ACM, Vol. 56, 1 (2013), 94--103.Google Scholar
Digital Library
- Tamara Denning, Cynthia Matuszek, Karl Koscher, Joshua R Smith, and Tadayoshi Kohno. 2009. A spotlight on security and privacy risks with future household robots: attacks and lessons. In Proceedings of the 11th international conference on Ubiquitous computing. ACM, 105--114.Google Scholar
Digital Library
- Emily Dixon. 2019. Family finds hidden camera livestreaming from their Airbnb in Ireland. https://www.cnn.com/2019/04/05/europe/ireland-airbnb-hidden-camera-scli-intl/index.html.Google Scholar
- Pardis Emami-Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. In Proceedings of the Thirteenth USENIX Conference on Usable Privacy and Security (Santa Clara, CA, USA) (SOUPS'17). USENIX Association, Berkeley, CA, USA, 399--412.Google Scholar
Digital Library
- Batya Friedman, Peter H. Kahn, Jr., Jennifer Hagman, Rachel L. Severson, and Brian Gill. 2008. The Watcher and the Watched: Social Judgments About Privacy in a Public Place. Hum.-Comput. Interact., Vol. 21, 2 (May 2008), 235--272.Google Scholar
- Nina Gerber, Benjamin Reinheimer, and Melanie Volkamer. 2018. Home Sweet Home? Investigating Users? Awareness of Smart Home Privacy Threats. In Proceedings of An Interactive Workshop on the Human aspects of Smarthome Security and Privacy (WSSP), Baltimore, MD, August 12, 2018. USENIX, Berkeley, CA.Google Scholar
- Stacy Gray. 2016. Always on: privacy implications of microphone-enabled devices. In Future of privacy forum.Google Scholar
- Chris Harrison, John Horstman, Gary Hsieh, and Scott Hudson. 2012. Unlocking the expressivity of point lights. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1683--1692.Google Scholar
Digital Library
- Eva Hornecker and Jacob Buur. 2006. Getting a grip on tangible interaction: a framework on physical space and social interaction. In Proceedings of the SIGCHI conference on Human Factors in computing systems. ACM, 437--446.Google Scholar
Digital Library
- Roberto Hoyle, Robert Templeman, Steven Armes, Denise Anthony, David Crandall, and Apu Kapadia. 2014. Privacy behaviors of lifeloggers using wearable cameras. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. 571--582.Google Scholar
Digital Library
- Intel. 2014. Intel IoT Gateway. https://www.intel.com/content/dam/www/public/us/en/documents/product-briefs/gateway-solutions-iot-brief.pdf.Google Scholar
- Judy Kendall. 1999. Axial coding and the grounded theory controversy. Western journal of nursing research, Vol. 21, 6 (1999), 743--757.Google Scholar
- Marion Koelle, Katrin Wolf, and Susanne Boll. 2018. Beyond LED Status Lights-Design Requirements of Privacy Notices for Body-worn Cameras. In Proceedings of the Twelfth International Conference on Tangible, Embedded, and Embodied Interaction. ACM, 177--187.Google Scholar
Digital Library
- Karen L Courtney, George Demiris, Marilyn Rantz, and Marjorie Skubic. 2008. Needing smart home technologies: The perspectives of older adults in continuing care retirement communities. Intformatics in primary care, Vol. 16 (02 2008), 195--201.Google Scholar
- Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, Are You Listening? Privacy Perceptions, Concerns and Privacy-seeking Behaviors with Smart Speakers. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, CSCW (2018), 102.Google Scholar
- Adam J. Lee, Rosta Farzan, Apu Kapadia, and Imtiaz Ahmad. 2020. Making sense of risk in an increasingly cyber-physical world. Critical Quarterly, Vol. 62, 1 (2020), 40--48.Google Scholar
Cross Ref
- Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera, Serge Egelman, and David Wagner. 2019. Privacy Attitudes of Smart Speaker Users. Proceedings on Privacy Enhancing Technologies, Vol. 2019, 4 (2019), 250 -- 271.Google Scholar
- Shrirang Mare, Franziska Roesner, and Tadayoshi Kohno. 2020. Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts. Proceedings on Privacy Enhancing Technologies, Vol. 2020, 2 (2020), 436--458.Google Scholar
Cross Ref
- Nora McDonald, Sarita Schoenebeck, and Andrea Forte. 2019. Reliability and Inter-rater Reliability in Qualitative Research: Norms and Guidelines for CSCW and HCI Practice. Proc. ACM Hum.-Comput. Interact., Vol. 3, CSCW, Article 72 (Nov. 2019), bibinfonumpages23 pages.Google Scholar
Digital Library
- Emily McReynolds, Sarah Hubbard, Timothy Lau, Aditya Saraf, Maya Cakmak, and Franziska Roesner. 2017. Toys that listen: A study of parents, children, and internet-connected toys. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 5197--5207.Google Scholar
Digital Library
- B. Momenzadeh, H. Dougherty, M. Remmel, S. Myers, and L. J. Camp. 2020. Best Practices Would Make Things Better in the IoT. IEEE Security & Privacy, Vol. 18, 4 (2020), 38--47.Google Scholar
Digital Library
- David M Newman. 2020. Sociology: Exploring the architecture of everyday life .SAGE Publications, Incorporated.Google Scholar
- Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev., Vol. 79 (2004), 119.Google Scholar
- Don Norman. 2014. Turn signals are the facial expressions of automobiles .Diversion Books.Google Scholar
- Antti Oulasvirta, Aurora Pihlajamaa, Jukka Perkiö, Debarshi Ray, Taneli V"ah"akangas, Tero Hasu, Niklas Vainio, and Petri Myllym"aki. 2012. Long-term Effects of Ubiquitous Surveillance in the Home. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (Pittsburgh, Pennsylvania) (UbiComp '12). ACM, New York, NY, USA, 41--50.Google Scholar
Digital Library
- Joann Peck and Terry L Childers. 2003. To have and to hold: The influence of haptic information on product judgments. Journal of Marketing, Vol. 67, 2 (2003), 35--48.Google Scholar
Cross Ref
- Joann Peck and Jennifer Wiggins Johnson. 2011. Autotelic need for touch, haptics, and persuasion: The role of involvement. Psychology & Marketing, Vol. 28, 3 (2011), 222--239.Google Scholar
Cross Ref
- James Pierce. 2019. Smart Home Security Cameras and Shifting Lines of Creepiness: A Design-Led Inquiry. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI '19). ACM, New York, NY, USA, Article 45, bibinfonumpages14 pages.Google Scholar
Digital Library
- Rebecca S. Portnoff, Linda N. Lee, Serge Egelman, Pratyush Mishra, Derek Leung, and David Wagner. 2015. Somebody's Watching Me? Assessing the Effectiveness of Webcam Indicator Lights. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (Seoul, Republic of Korea) (CHI '15). ACM, New York, NY, USA, 1649--1658.Google Scholar
Digital Library
- Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, and Norman Makoto Su. 2018. “You don't want to be the next meme”: College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography. In Proceedings of the USENIX Symposium on Usable Privacy and Security (SOUPS '18). 143--157.Google Scholar
- Joel R Reidenberg. 2014. Privacy in public. U. Miami L. Rev., Vol. 69 (2014), 141.Google Scholar
- Tom A Rodden, Joel E Fischer, Nadia Pantidi, Khaled Bachour, and Stuart Moran. 2013. At home with agents: exploring attitudes towards future smart energy infrastructures. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1173--1182.Google Scholar
Digital Library
- Rodrigo Roman, Jianying Zhou, and Javier Lopez. 2013. On the features and challenges of security and privacy in distributed internet of things. Computer Networks, Vol. 57, 10 (2013), 2266--2279.Google Scholar
Digital Library
- Gilad Rosner and Erin Kenneally. 2018. Clearly Opaque: Privacy Risks of the Internet of Things. In Rosner, Gilad and Kenneally, Erin, Clearly Opaque: Privacy Risks of the Internet of Things (May 1, 2018). IoT Privacy Forum.Google Scholar
- Mike Scaife and Yvonne Rogers. 1996. External cognition: how do graphical representations work? International journal of human-computer studies, Vol. 45, 2 (1996), 185--213.Google Scholar
- Roman Schlegel, Kehuan Zhang, Xiaoyong Zhou, Mehool Intwala, Apu Kapadia, and XiaoFeng Wang. 2011. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. In Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS). 17--33.Google Scholar
- Bertrand Schneider, Patrick Jermann, Guillaume Zufferey, and Pierre Dillenbourg. 2010. Benefits of a tangible interface for collaborative learning and interaction. IEEE Transactions on Learning Technologies, Vol. 4, 3 (2010), 222--232.Google Scholar
Digital Library
- Irving Seidman. 2006. Interviewing as qualitative research: A guide for researchers in education and the social sciences .Teachers college press.Google Scholar
- Teddy Seyed, Xing-Dong Yang, and Daniel Vogel. 2017. A Modular Smartphone for Lending. In Proceedings of the 30th Annual ACM Symposium on User Interface Software and Technology (UIST '17). ACM, New York, NY, USA, 205--215.Google Scholar
Digital Library
- Sabrina Sicari, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini. 2015. Security, privacy and trust in Internet of Things: The road ahead. Computer networks, Vol. 76 (2015), 146--164.Google Scholar
Digital Library
- Deepika Singh, Ismini Psychoula, Johannes Kropf, Sten Hanke, and Andreas Holzinger. 2018. Users? Perceptions and Attitudes Towards Smart Home Technologies. In International Conference on Smart Homes and Health Telematics. Springer, 203--214.Google Scholar
- Yunpeng Song, Yun Huang, Zhongmin Cai, and Jason I Hong. 2020. I'm All Eyes and Ears: Exploring Effective Locators for Privacy Awareness in IoT Scenarios. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--13.Google Scholar
Digital Library
- Luke Stark. 2016. The emotional context of information privacy. The Information Society, Vol. 32, 1 (2016), 14--27.Google Scholar
Digital Library
- Joshua Streiff, Olivia Kenny, Sanchari Das, Andrew Leeth, and L Jean Camp. 2018. Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears. In 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, 285--286.Google Scholar
- Harald Sundmaeker, Patrick Guillemin, Peter Friess, and Sylvie Woelfflé. 2010. Vision and challenges for realising the Internet of Things. Cluster of European Research Projects on the Internet of Things, European Commision, Vol. 3, 3 (2010), 34--36.Google Scholar
- Robert Templeman, Zahid Rahman, David Crandall, and Apu Kapadia. 2013. PlaceRaider: Virtual Theft in Physical Spaces with Smartphones. In Proceedings of The 20th Annual Network and Distributed System Security Symposium (NDSS).Google Scholar
- Brygg Ullmer and Hiroshi Ishii. 2000. Emerging frameworks for tangible user interfaces. IBM systems journal, Vol. 39, 3.4 (2000), 915--931.Google Scholar
- Elise Van Den Hoven, Evelien Van De Garde-Perik, Serge Offermans, Koen Van Boerdonk, and Kars-Michiel H Lenssen. 2013. Moving Tangible Interaction Systems to the Next Level. IEEE Computer, Vol. 46, 8 (2013), 70--76.Google Scholar
Digital Library
- Yang Wang, Huichuan Xia, Yaxing Yao, and Yun Huang. 2016. Flying eyes and hidden controllers: A qualitative study of people?s privacy perceptions of civilian drones in the US. Proceedings on Privacy Enhancing Technologies, Vol. 2016, 3 (2016), 172--190.Google Scholar
Cross Ref
- Meredydd Williams, Jason RC Nurse, and Sadie Creese. 2016. The perfect storm: The privacy paradox and the Internet-of-Things. In 2016 11th International Conference on Availability, Reliability and Security (ARES). IEEE, 644--652.Google Scholar
Cross Ref
- Yaxing Yao, Justin Reed Basdeo, Smirity Kaushik, and Yang Wang. 2019 a. Defending My Castle: A Co-Design Study of Privacy Mechanisms for Smart Homes. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, 198.Google Scholar
Digital Library
- Yaxing Yao, Justin Reed Basdeo, Oriana Rosata Mcdonough, and Yang Wang. 2019 b. Privacy Perceptions and Designs of Bystanders in Smart Homes. Proc. ACM Hum.-Comput. Interact., Vol. 3, CSCW, Article 59 (Nov. 2019), bibinfonumpages24 pages.Google Scholar
- Yaxing Yao, Huichuan Xia, Yun Huang, and Yang Wang. 2017. Privacy Mechanisms for Drones: Perceptions of Drone Controllers and Bystanders. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (Denver, Colorado, USA) (CHI '17). ACM, New York, NY, USA, 6777--6788.Google Scholar
Digital Library
- Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security and Privacy Concerns with Smart Homes. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, Santa Clara, CA, 65--80.Google Scholar
- Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. 2018. User Perceptions of Smart Home IoT Privacy. Proc. ACM Hum.-Comput. Interact., Vol. 2, CSCW, Article 200 (Nov. 2018), bibinfonumpages20 pages.Google Scholar
Digital Library
- Oren Zuckerman. 2015. Objects for change: A case study of a tangible user interface for behavior change. In Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction. 649--654.Google Scholar
Digital Library
Index Terms
Tangible Privacy: Towards User-Centric Sensor Designs for Bystander Privacy
Recommendations
Freedom of Privacy: Anonymous Data Collection with Respondent-Defined Privacy Protection
The massive amount of sensitive survey data about individuals that agencies collect and share through the Internet is causing a great deal of privacy concerns. These concerns may discourage individuals from revealing their sensitive information. ...
On two RFID privacy notions and their relations
Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions in the literature: one based on the indistinguishability of two tags, denoted as ind-privacy, and the other based on ...
IoT: Imminent ownership Threat
IDEAS '17: Proceedings of the 21st International Database Engineering & Applications SymposiumInternet of things (IoT) is the current trend to connect all types of devices to the internet with the purpose of making remote control of these devices possible from anywhere. This allows for convenience, efficiency and the benefit of collecting data ...






Comments