Informing the design of privacy-empowering tools for the connected home

W Seymour, MJ Kraemer, R Binns… - Proceedings of the 2020 …, 2020 - dl.acm.org
Connected devices in the home represent a potentially grave new privacy threat due to their
unfettered access to the most personal spaces in people's lives. Prior work has shown that …

Fortniot: Intelligible predictions to improve user understanding of smart home behavior

S Coppers, D Vanacken, K Luyten - … of the ACM on interactive, mobile …, 2020 - dl.acm.org
Ubiquitous environments, such as smart homes, are becoming more intelligent and
autonomous. As a result, their behavior becomes harder to grasp and unintended behavior …

Trace2tap: Synthesizing trigger-action programs from traces of behavior

L Zhang, W He, O Morkved, V Zhao… - Proceedings of the …, 2020 - dl.acm.org
Two common approaches for automating IoT smart spaces are having users write rules
using trigger-action programming (TAP) or training machine learning models based on …

Read between the lines: An empirical measurement of sensitive applications of voice personal assistant systems

FH Shezan, H Hu, J Wang, G Wang… - Proceedings of the Web …, 2020 - dl.acm.org
Voice Personal Assistant (VPA) systems such as Amazon Alexa and Google Home have
been used by tens of millions of households. Recent work demonstrated proof-of-concept …

GDPR reality check-claiming and investigating personally identifiable data from companies

F Alizadeh, T Jakobi, A Boden… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
Today, more personal data than ever before Is being collected and stored by companies of
all types for a wide variety of purposes. The General Data Protection Regulation (GDPR) …

Safer: Development and evaluation of an iot device risk assessment framework in a multinational organization

P Oser, S Feger, PW Woźniak, J Karolus… - Proceedings of the …, 2020 - dl.acm.org
Users of Internet of Things (IoT) devices are often unaware of their security risks and cannot
sufficiently factor security considerations into their device selection. This puts networks …

All in one! user perceptions on centralized iot privacy settings

K Marky, V Zimmermann, A Stöver… - Extended Abstracts of …, 2020 - dl.acm.org
IoT devices deliver their functionality by accessing data. Users decide which data they are
willing to share via privacy settings interfaces that are typically on the device, or in the app …

On the principle of accountability: Challenges for smart homes & cybersecurity

L Urquhart, J Chen - arXiv preprint arXiv:2006.11043, 2020 - arxiv.org
This chapter introduces the Accountability Principle and its role in data protection
governance. We focus on what accountability means in the context of cybersecurity …

Further exploring communal technology use in smart homes: social expectations

MJ Kraemer, U Lyngs, H Webb, I Flechais - Extended Abstracts of the …, 2020 - dl.acm.org
Device use in smart homes is becoming increasingly communal, requiring cohabitants to
navigate a complex social and technological context. In this paper, we report findings from …

User-friendly formulation of data processing purposes of voice assistants: A user perspective on the principle of purpose limitation

T Jakobi, G Stevens, M von Grafenstein… - Proceedings of Mensch …, 2020 - dl.acm.org
In 2019 it was revealed that several providers of voice assistants had systematically
evaluated voice recordings of their users. Since the data protection notices stated that data …