MJ Kraemer - Extended Abstracts of the 2018 CHI Conference on …, 2018 - dl.acm.org
Smart homes are expected to reduce the time we spend on routine activities. Data becomes an enabler and asset, as smart devices collect and process it. Smart homes also have the …
C Chhetri - Companion Publication of the 2019 Conference on …, 2019 - dl.acm.org
Smart home devices have gained widespread adoption and are expected to grow rapidly in usage. However, they introduce new challenges to the privacy of the user and the security of …
Y Yao, JR Basdeo, S Kaushik, Y Wang - … of the 2019 chi conference on …, 2019 - dl.acm.org
Home is a person's castle, a private and protected space. Internet-connected devices such as locks, cameras, and speakers might make a home" smarter" but also raise privacy issues …
H Jin, B Guo, R Roychoudhury, Y Yao… - Proceedings of the …, 2022 - dl.acm.org
In this paper, we studied people's smart home privacy-protective behaviors (SH-PPBs), to gain a better understanding of their privacy management do's and don'ts in this context. We …
MJ Kraemer, I Flechais - Living in the Internet of Things …, 2018 - ieeexplore.ieee.org
The adoption of smart devices in homes is rapidly advancing, and information on our daily routines and activities is collected, processed, disseminated by these devices in order to …
IoT devices can harvest personal information of any person in their surroundings and this includes data from visitors. Visitors often cannot protect their privacy in a foreign smart …
In this paper, we contribute an in-depth study of the mental models of various roles in smart home ecosystems. In particular, we compared mental models regarding data collection …
C Chhetri, VG Motti - Human Factors in …, 2022 - openaccess.cms-conferences.org
Privacy concerns of smart home device (SHD) users have been largely explored but those of non-users are under-explored. The success of smart home technology comes to fruition only …
Albeit providing many benefits, smart homes collect and process large amounts of sensitive data. In order to successfully cope with the resulting risks for their privacy, users have to be …