Home automation in the wild: challenges and opportunities

AJB Brush, B Lee, R Mahajan, S Agarwal… - proceedings of the …, 2011 - dl.acm.org
Visions of smart homes have long caught the attention of researchers and considerable
effort has been put toward enabling home automation. However, these technologies have …

The psychology of security for the home computer user

AE Howe, I Ray, M Roberts… - … IEEE Symposium on …, 2012 - ieeexplore.ieee.org
The home computer user is often said to be the weakest link in computer security. They do
not always follow security advice, and they take actions, as in phishing, that compromise …

User perceptions of smart home IoT privacy

S Zheng, N Apthorpe, M Chetty… - Proceedings of the ACM on …, 2018 - dl.acm.org
Smart home Internet of Things (IoT) devices are rapidly increasing in popularity, with more
households including Internet-connected devices that continuously monitor user activities. In …

End user security and privacy concerns with smart homes

E Zeng, S Mare, F Roesner - … symposium on usable privacy and security …, 2017 - usenix.org
The Internet of Things is becoming increasingly widespread in home environments.
Consumers are transforming their homes into smart homes, with internet-connected sensors …

“A Stalker's Paradise” How Intimate Partner Abusers Exploit Technology

D Freed, J Palmer, D Minchala, K Levy… - Proceedings of the …, 2018 - dl.acm.org
This paper describes a qualitative study with 89 participants that details how abusers in
intimate partner violence (IPV) contexts exploit technologies to intimidate, threaten, monitor …

Who's in control? Interactions in multi-user smart homes

C Geeng, F Roesner - Proceedings of the 2019 CHI conference on …, 2019 - dl.acm.org
Adoption of commercial smart home devices is rapidly increasing, allowing in-situ research
in people's homes. As these technologies are deployed in shared spaces, we seek to …

Rethinking access control and authentication for the home internet of things ({{{{{IoT}}}}})

W He, M Golla, R Padhi, J Ofek, M Dürmuth… - 27th USENIX Security …, 2018 - usenix.org
Computing is transitioning from single-user devices to the Internet of Things (IoT), in which
multiple users with complex social relationships interact with a single device. Currently …

Access control in Internet-of-Things: A survey

S Ravidas, A Lekidis, F Paci, N Zannone - Journal of Network and …, 2019 - Elsevier
Abstract The Internet of Things (IoT) is an emerging technology that is revolutionizing the
global economy and society. IoT enables a collaborative environment where different …

[HTML][HTML] A capability-based security approach to manage access control in the internet of things

S Gusmeroli, S Piccione, D Rotondi - Mathematical and Computer …, 2013 - Elsevier
Resource and information protection plays a relevant role in distributed systems like the
ones present in the Internet of Things (IoT). Authorization frameworks like RBAC and ABAC …

Stories from survivors: Privacy & security practices when coping with intimate partner abuse

T Matthews, K O'Leary, A Turner, M Sleeper… - Proceedings of the …, 2017 - dl.acm.org
We present a qualitative study of the digital privacy and security motivations, practices, and
challenges of survivors of intimate partner abuse (IPA). This paper provides a framework for …