2020
DOI: 10.1007/978-3-030-57404-8_25
|View full text |Cite
|
Sign up to set email alerts
|

“Most Companies Share Whatever They Can to Make Money!”: Comparing User’s Perceptions with the Data Practices of IoT Devices

Abstract: With the rapid deployment of Internet of Things (IoT) technologies, it has been essential to address the security and privacy issues through maintaining transparency in data practices, and designing new tools for data protection. To address these challenges, the prior research focused on identifying user's privacy preferences in di↵erent contexts of IoT usage, user's mental model of security threats, and their privacy practices for a specific type of IoT device (e.g., smart speaker). However, there is a dearth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…43 When specific privacy-impacting features are examined, users are unaware of them, as in the case of undesired recordings. 35 A detailed examination of the perception of privacy/security issues in four function categories (built-in skills, third-party skills, management of smart home devices, and shopping) is carried out in Abdi et al 30 The same conclusion is reached in Al-Ameen et al 37 The perception of data collection, sharing, and protection also appears at odds with the data practices stated in the privacy policy of manufacturers. 37 Also, the uncritical acceptance of smart speakers appears to be favored by the diffusion of unboxing videos on YouTube.…”
Section: Privacy Concernsmentioning
confidence: 91%
See 1 more Smart Citation
“…43 When specific privacy-impacting features are examined, users are unaware of them, as in the case of undesired recordings. 35 A detailed examination of the perception of privacy/security issues in four function categories (built-in skills, third-party skills, management of smart home devices, and shopping) is carried out in Abdi et al 30 The same conclusion is reached in Al-Ameen et al 37 The perception of data collection, sharing, and protection also appears at odds with the data practices stated in the privacy policy of manufacturers. 37 Also, the uncritical acceptance of smart speakers appears to be favored by the diffusion of unboxing videos on YouTube.…”
Section: Privacy Concernsmentioning
confidence: 91%
“…35 A detailed examination of the perception of privacy/security issues in four function categories (built-in skills, third-party skills, management of smart home devices, and shopping) is carried out in Abdi et al 30 The same conclusion is reached in Al-Ameen et al 37 The perception of data collection, sharing, and protection also appears at odds with the data practices stated in the privacy policy of manufacturers. 37 Also, the uncritical acceptance of smart speakers appears to be favored by the diffusion of unboxing videos on YouTube. 39 The benefits and costs of three different policy management approaches are examined in Kang and Oh, 46 where privacy calculus is adopted.…”
Section: Privacy Concernsmentioning
confidence: 91%