“You offer privacy like you offer tea”: Investigating Mechanisms for Improving Guest Privacy in IoT-Equipped Households
نویسندگان
چکیده
IoT devices are becoming more common and prevalent in private households. Since guests can be present IoT-equipped households, pose considerable privacy risks to them. In this paper, we an in-depth evaluation of protection for considering the perspectives hosts guests. First, interviewed 21 device owners about four classes mechanisms obtained from literature social aspects. Second, conducted online survey (N=264) that investigates perspective From our results, learn should not introduce threats require low resources. Further, keep control over their aesthetics living spaces. Guests, however, value feedback status which interfere with aesthetics. Privacy rather foster collaboration impact visit guest too severely. We use results identify a design space
منابع مشابه
Designing Privacy for You : A User Centric Approach For Privacy
Privacy directly concerns the user as the data owner (datasubject) and hence privacy in systems should be implemented in a manner which concerns the user (user-centered). There are many concepts and guidelines that support development of privacy and embedding privacy into systems. However, none of them approaches privacy in a usercentered manner. Through this research we propose a framework tha...
متن کاملAn Offer You Can’t Refuse: Who Uses Cigarette Price Discounts?
We investigate whether and how current sales of cigarettes vary with past and future sales made under two different types of in-store price discounts: those that require a smoker to buy a carton (10 packs) and those that require a smoker to only buy a single pack. We hypothesize that different types of consumers respond to these promotions. We posit that smokers who utilize discounts tied to a ...
متن کاملWhen You Say (DCOP) Privacy, What do You Mean? - Categorization of DCOP Privacy and Insights on Internal Constraint Privacy
Privacy preservation is a main motivation for using the DCOP model and as such, it has been the subject of comprehensive research. The present paper provides for the first time a categorization of all possible DCOP privacy types. The paper focuses on a specific type, internal constraint privacy, which is highly relevant for models that enable asymmetric payoffs (PEAV-DCOP and ADCOP). An analysi...
متن کاملHow Badly Do You Want Privacy?
S o you want to be a whistle blower. Just gen up a strong PGP key, hide your IP address with Tails and the Tor browser (running off your USB stick), and use a secure email such as Hushmail (www.hushmail.com) or Hide My Ass (www.hidemyass.com). Make sure you're using HTTPS. Done, yes? So, why did Edward Snowden have to flee? Not only did he know that they would find him sooner or later, but that...
متن کاملSocial Networking Privacy - Who's Stalking You?
This research investigates the privacy issues that exist on social networking sites. It is reasonable to assume that many Twitter users are unaware of the dangers of uploading a tweet to their timeline which can be seen by anyone. Enabling geo-location tagging on tweets can result in personal information leakage, which the user did not intend to be public and which can seriously affect that use...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings on Privacy Enhancing Technologies
سال: 2022
ISSN: ['2299-0984']
DOI: https://doi.org/10.56553/popets-2022-0115