2017
DOI: 10.24251/hicss.2017.717
|View full text |Cite
|
Sign up to set email alerts
|

Privacy of the Internet of Things: A Systematic Literature Review

Abstract: The Internet of Things' potential

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0
5

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 46 publications
(34 citation statements)
references
References 52 publications
(100 reference statements)
0
29
0
5
Order By: Relevance
“…But for most participants, this question did not seem to bring to mind the risk that a compromised TV could reveal sensor data to the attacker. 1 In particular, even where respondents mentioned information theft, most phrased it in terms of credit card numbers and account credentials: "I could have my card and bank information stolen." "The hacker may install a program that can collect information from the user like usernames and passwords."…”
Section: ) What Data Is Collected?mentioning
confidence: 99%
See 1 more Smart Citation
“…But for most participants, this question did not seem to bring to mind the risk that a compromised TV could reveal sensor data to the attacker. 1 In particular, even where respondents mentioned information theft, most phrased it in terms of credit card numbers and account credentials: "I could have my card and bank information stolen." "The hacker may install a program that can collect information from the user like usernames and passwords."…”
Section: ) What Data Is Collected?mentioning
confidence: 99%
“…More third-party tools are needed to help people manage the digital exhaust generated by a smart home. (Aleisa and Renaud [1] provide a review of what is currently available.) Users could be notified when potentially sensitive data is being collected (e.g., [11], [39]).…”
Section: Designers Of Privacy-enhancing Technologiesmentioning
confidence: 99%
“…Já a revisão sistemática de literatura empreendida por Aleisa e Renaud (2017) [Aleisa and Renaud 2017] apresentou uma visão geral das pesquisas relacionadasà privacidade em IoT, identificando que as pesquisas têm focado em análises das violações e ameaças de privacidade e no desenvolvimento de mecanismos de proteção da privacidade. Os autores destacaram a necessidade de mais pesquisas que envolvam os seres humanos no processo, considerando os poucos estudos observacionais e levantamentos (surveys) sobre violações e percepções da privacidade [Aleisa and Renaud 2017].…”
Section: Trabalhos Relacionadosunclassified
“…Se por um lado a proliferação de soluções digitais inteligentes é acompanhada por um discurso mercadológico que privilegia a conveniência, conforto e otimização, também há um entendimento de que o regime de coleta e análise de dados no qual se baseia boa parte das soluções de IoT pode produzir impactos negativos nos campos da segurança, vigilância e privacidade (ALEISA; RENAUD, 2017;DESAI, 2016;JONES, 2015;LOPEZ et al, 2017;PONCIANO et al, 2017;MARQUES;LEMOS, 2017).…”
Section: Introductionunclassified