Who's In Control?: Interactions In Multi-User Smart Homes

Adoption of commercial smart home devices is rapidly increasing, allowing in-situ research in people's homes. As these technologies are deployed in shared spaces, we seek to understand interactions among multiple people and devices in a smart home. We conducted a mixed-methods study with 18 participants (primarily people who drive smart device adoption in their homes) living in multi-user smart homes, combining semi-structured interviews and experience sampling. Our findings surface tensions and cooperation among users in several phases of smart device use: device selection and installation, ordinary use, when the smart home does not work as expected, and over longer term use. We observe an outsized role of the person who installs devices in terms of selecting, controlling, and fixing them; negotiations between parents and children; and minimally voiced privacy concerns among co-occupants, possibly due to participant sampling. We make design recommendations for supporting long-term smart homes and non-expert household members.

[1]  Sunny Consolvo,et al.  Living in a glass house: a survey of private moments in the home , 2011, UbiComp '11.

[2]  Nick Feamster,et al.  Discovering Smart Home Internet of Things Privacy Norms Using Contextual Integrity , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..

[3]  Stephen Snow,et al.  Log it While it's Hot: Designing Human Interaction with Smart Thermostats for Shared Work Environments , 2017, CHI.

[4]  Blase Ur,et al.  The Current State of Access Control for Smart Devices in Homes , 2013 .

[5]  Rafik A. Goubran,et al.  Privacy versus autonomy: A tradeoff model for smart home monitoring technologies , 2011, 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[6]  Christos Gkantsidis,et al.  Who's hogging the bandwidth: the consequences of revealing the invisible in the home , 2010, CHI.

[7]  Blase Ur,et al.  Rethinking Access Control and Authentication for the Home Internet of Things (IoT) , 2018, USENIX Security Symposium.

[8]  Jun Zhao,et al.  A capability-oriented approach to assessing privacy risk in smart home ecosystems , 2018, IoT 2018.

[9]  Mark W. Newman,et al.  Learning from a learning thermostat: lessons for intelligent systems for the home , 2013, UbiComp.

[10]  Margaret M. Burnett,et al.  Gender pluralism in problem-solving software , 2011, Interact. Comput..

[11]  James A. Landay,et al.  An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.

[12]  Paul Dourish,et al.  Yesterday’s tomorrows: notes on ubiquitous computing’s dominant vision , 2007, Personal and Ubiquitous Computing.

[13]  Elaine M. Huang,et al.  Hacking the Natural Habitat: An In-the-Wild Study of Smart Homes, Their Development, and the People Who Live in Them , 2012, Pervasive.

[14]  Stefan Saroiu,et al.  Home automation in the wild: challenges and opportunities , 2011, CHI.

[15]  David Arney - 1-Toward a Safe and Secure Medical Internet of Things , 2016 .

[16]  John Zimmerman,et al.  Principles of Smart Home Control , 2006, UbiComp.

[17]  Antti Oulasvirta,et al.  Long-term effects of ubiquitous surveillance in the home , 2012, UbiComp.

[18]  Volker Wulf,et al.  The Catch(es) with Smart Home: Experiences of a Living Lab Field Study , 2017, CHI.

[19]  Noelle Chesley,et al.  Families in a High-Tech Age , 2006 .

[20]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[21]  Andrew N. Meltzoff,et al.  Classrooms matter: The design of virtual classrooms influences gender disparities in computer science classes , 2011, Comput. Educ..

[22]  Jones,et al.  Privacy Without Screens & the Internet of Other People's Things , 2015 .

[23]  Mary Beth Rosson,et al.  Design Planning in End-User Web Development: Gender, Feature Exploration and Feelings of Success , 2010, 2010 IEEE Symposium on Visual Languages and Human-Centric Computing.

[24]  W. Keith Edwards,et al.  More than meets the eye: transforming the user experience of home network management , 2008, DIS '08.

[25]  Sunny Consolvo,et al.  Using the Experience Sampling Method to Evaluate Ubicomp Applications , 2003, IEEE Pervasive Comput..

[26]  Franziska Roesner,et al.  End User Security and Privacy Concerns with Smart Homes , 2017, SOUPS.

[27]  Tara Matthews,et al.  Stories from Survivors: Privacy & Security Practices when Coping with Intimate Partner Abuse , 2017, CHI.

[28]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[29]  Allison Woodruff,et al.  Sabbath day home automation: "it's like mixing technology and religion" , 2007, CHI.

[30]  Jo Vermeulen,et al.  From today's augmented houses to tomorrow's smart homes: new directions for home automation research , 2014, UbiComp.

[31]  M. Courtney Careless talk costs privacy [Censorship Digital Assistants] , 2017 .

[32]  G. Demiris,et al.  Technologies for an Aging Society: A Systematic Review of “Smart Home” Applications , 2008, Yearbook of Medical Informatics.

[33]  David Philip Green,et al.  Making Home: Asserting Agency in the Age of IoT , 2017, CHI Extended Abstracts.

[34]  Shwetak N. Patel,et al.  Investigating receptiveness to sensing and inference in the home using sensor proxies , 2012, UbiComp.

[35]  Marta E. Cecchinato,et al.  Degrees of Agency in Owners and Users of Home IoT Devices , 2017, CHI 2017.

[36]  Sabrina Thai,et al.  ExperienceSampler: An Open-Source Scaffold for Building Smartphone Apps for Experience Sampling , 2018, Psychological methods.

[37]  Youn-Kyung Lim,et al.  User experience in do-it-yourself-style smart homes , 2015, UbiComp.

[38]  Hassan Takabi,et al.  Exploring reactive access control , 2010, CHI Extended Abstracts.

[39]  Allison Druin,et al.  Technology probes: inspiring design for and with families , 2003, CHI '03.

[40]  Nick Feamster,et al.  User Perceptions of Smart Home IoT Privacy , 2018, Proc. ACM Hum. Comput. Interact..

[41]  Erika Shehan Poole,et al.  Putting the gender back in digital housekeeping , 2018, GenderIT.

[42]  Nicola Dell,et al.  The Spyware Used in Intimate Partner Violence , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[43]  Margaret M. Burnett,et al.  Finding Gender-Inclusiveness Software Issues with GenderMag: A Field Investigation , 2016, CHI.

[44]  Lujo Bauer,et al.  Access Control for Home Data Sharing: Attitudes, Needs and Practices , 2010, CHI.

[45]  Alan Borning,et al.  Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety , 2010, SOUPS.

[46]  Jesse Hoey,et al.  Smart for Life: Designing Smart Home Technologies that Evolve with Users , 2015, CHI Extended Abstracts.

[47]  David J. Crandall,et al.  Privacy behaviors of lifeloggers using wearable cameras , 2014, UbiComp.

[48]  James A. Landay,et al.  Gender-Inclusive Design: Sense of Belonging and Bias in Web Interfaces , 2018, CHI.

[49]  Blase Ur,et al.  Intruders versus intrusiveness: teens' and parents' perspectives on home-entryway surveillance , 2014, UbiComp.