It Is About What They Could Do with the Data

Smart Meters are a key component of increasing the power efficiency of the Smart Grid. To help manage the grid effectively, these meters are designed to collect information on power consumption and send it to third parties. With Smart Metering, for the first time, these cloud-connected sensing devices are legally mandated to be installed in the homes of millions of people worldwide. Via a multi-staged empirical study that utilized an open-ended questionnaire, focus groups, and a design probe, we examined how people characterize the tension between the utility of Smart Metering and its impact on privacy. Our findings show that people seek to make abstract Smart Metering data accountable by connecting it to their everyday practices. Our insight can inform the design of usable privacy configuration tools that help Smart Metering consumers relate abstract data with the real-world implications of its disclosure.

[1]  Gregory D. Abowd,et al.  Charting past, present, and future research in ubiquitous computing , 2000, TCHI.

[2]  Alexander L. Davis,et al.  Preparing for smart grid technologies: A behavioral decision research approach to understanding consumer expectations about smart meters , 2012 .

[3]  Daniel R. Horne,et al.  The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .

[4]  Nicolette de Keizer,et al.  Eliciting end-user expectations to guide the implementation process of a new electronic health record: A case study using concept mapping , 2016, Int. J. Medical Informatics.

[5]  Curtis R. Taylor,et al.  The Economics of Privacy , 2016 .

[6]  Bart P. Knijnenburg Simplifying Privacy Decisions: Towards Interactive and Adaptive Solutions , 2013, Decisions@RecSys.

[7]  M. Kane Data Banks in a Free Society. By Alan F. Westin and Michael A. Baker. Records, Computers and the Rights of Citizens: Report of the Secretary's Advisory Committee on Automated Personal Data Systems , 2019 .

[8]  James A. Landay,et al.  The design of eco-feedback technology , 2010, CHI.

[9]  Joshua Fogel,et al.  Internet social network communities: Risk taking, trust, and privacy concerns , 2009, Comput. Hum. Behav..

[10]  J. Preece,et al.  User-Centered Design , 2004 .

[11]  Ninghui Li,et al.  End-User Privacy in Human–Computer Interaction , 2009 .

[12]  Alessandro Acquisti,et al.  Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.

[13]  Melanie Volkamer,et al.  Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy , 2015, CSOC.

[14]  Norman M. Sadeh,et al.  Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.

[15]  Xi Fang,et al.  3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .

[16]  Stefanie Pötzsch,et al.  Privacy Awareness: A Means to Solve the Privacy Paradox? , 2008, FIDIS.

[17]  A. Cavoukian Operationalizing Privacy by Design: A Guide to Implementing Strong Privacy Practices , 2012 .

[18]  L. Jean Camp,et al.  Peer-produced privacy protection , 2013, 2013 IEEE International Symposium on Technology and Society (ISTAS): Social Implications of Wearable Computing and Augmediated Reality in Everyday Life.

[19]  Tanzima Hashem,et al.  "Don't trust anyone": Privacy protection for location-based services , 2011, Pervasive Mob. Comput..

[20]  Alessandro Acquisti,et al.  Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions , 2016, SOUPS.

[21]  Sanjay Goel,et al.  Smart Grid Security , 2015, SpringerBriefs in Cybersecurity.

[22]  Marilyn A. Brown,et al.  Smart meter deployment in Europe: A comparative case study on the impacts of national policy schemes , 2017 .

[23]  Mark Rouncefield,et al.  Fieldwork for Design: Theory and Practice (Computer Supported Cooperative Work) , 2007 .

[24]  James A. Landay,et al.  Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.

[25]  Zekeriya Erkin,et al.  Private Computation of Spatial and Temporal Power Consumption with Smart Meters , 2012, ACNS.

[26]  Tom Rodden,et al.  At home with agents: exploring attitudes towards future smart energy infrastructures , 2013, IJCAI.

[27]  Starr Roxanne Hiltz,et al.  Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace , 2007, AMCIS.

[28]  Carrie Gates,et al.  Data Is the New Currency , 2014, NSPW '14.

[29]  Volker Wulf,et al.  Appropriation Infrastructure: Supporting the Design of Usages , 2009, IS-EUD.

[30]  Tony Flick,et al.  Securing the Smart Grid: Next Generation Power Grid Security , 2010 .

[31]  Robert D. Macredie,et al.  Navigation in hypermedia learning systems: experts vs. novices , 2006, Comput. Hum. Behav..

[32]  Gunnar Stevens,et al.  Mehrseitige, barrierefreie Sicherheit intelligenter Messsysteme , 2014, Datenschutz und Datensicherheit - DuD.

[33]  Clare-Marie Karat,et al.  Usable security and privacy: a case study of developing privacy management tools , 2005, SOUPS '05.

[34]  Ulrich Greveler Die Smart-Metering-Debatte 2010–2016 und ihre Ergebnisse zum Schutz der Privatsphäre , 2016, Datenbank-Spektrum.

[35]  Nancy C. Goodwin,et al.  Functionality and usability , 1987, CACM.

[36]  Bert-Jaap Koops,et al.  Smart Metering and Privacy in Europe: Lessons from the Dutch Case , 2013, European Data Protection.

[37]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[38]  Alfred Kobsa,et al.  Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users' Data Sharing and Purchase Behavior , 2004, Privacy Enhancing Technologies.

[39]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[40]  Volker Wulf,et al.  Engaging with practices: design case studies as a research framework in CSCW , 2011, CSCW.

[41]  Julia V. Gallenkamp,et al.  Exploring the Role of Control - Smart Meter Acceptance of Residential Consumers , 2010, AMCIS.

[42]  Xiaoqian Jiang,et al.  A Randomized Response Model for Privacy Preserving Smart Metering , 2012, IEEE Transactions on Smart Grid.

[43]  I. Coyne Sampling in qualitative research. Purposeful and theoretical sampling; merging or clear boundaries? , 1997, Journal of advanced nursing.

[44]  Oliver D. Doleski,et al.  Smart Meter Rollout , 2013 .

[45]  Giles Hogben,et al.  Privacy Features: Privacy features of European eID card specifications , 2008 .

[46]  Paul Dourish,et al.  How HCI interprets the probes , 2007, CHI.

[47]  Hamed Haddadi,et al.  Personal Data: Thinking Inside the Box , 2015, Aarhus Conference on Critical Alternatives.

[48]  Seda F. Gürses,et al.  A critical review of 10 years of Privacy Technology , 2010 .

[49]  Ian Richardson,et al.  Smart meter data: Balancing consumer privacy concerns with legitimate applications , 2012 .

[50]  G. W. Hart,et al.  Nonintrusive appliance load monitoring , 1992, Proc. IEEE.

[51]  Peter Tolmie,et al.  Repacking ‘Privacy’ for a Networked World , 2017, Computer Supported Cooperative Work (CSCW).

[52]  Marc Busch,et al.  Consumers’ privacy concerns and implications for a privacy preserving Smart Grid architecture—Results of an Austrian study , 2015 .

[53]  Andy Crabtree,et al.  Design in the absence of practice: breaching experiments , 2004, DIS '04.

[54]  Derek McAuley,et al.  The Dataware manifesto , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).

[55]  Volker Wulf,et al.  Uncovering practices of making energy consumption accountable: A phenomenological inquiry , 2013, TCHI.

[56]  I. Rubinstein Regulating Privacy by Design , 2011 .

[57]  Sarvapali D. Ramchurn,et al.  "Just whack it on until it gets hot": Working with IoT Data in the Home , 2016, CHI.

[58]  Georgios Kalogridis,et al.  Smart Grid Privacy via Anonymization of Smart Metering Data , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[59]  A. Acquisti The Economics of Personal Data and the Economics of Privacy , 2010 .

[60]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[61]  Marc Langheinrich,et al.  Privacy and trust issues with invisible computers , 2005, CACM.

[62]  Laura A. Dabbish,et al.  "My Data Just Goes Everywhere: " User Mental Models of the Internet and Implications for Privacy and Security , 2015, SOUPS.

[63]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[64]  Giacomo Verticale,et al.  Privacy-preserving smart metering with multiple data Consumers , 2013, Comput. Networks.

[65]  Alexander Dix,et al.  Smart Meters in Europe: Privacy by Design at its Best , 2012 .

[66]  Frank Pallas Data Protection and smart grid communication - The European perspective , 2012, 2012 IEEE PES Innovative Smart Grid Technologies (ISGT).

[67]  Carlo Maria Medaglia,et al.  An Overview of Privacy and Security Issues in the Internet of Things , 2010 .

[68]  Klemens Böhm,et al.  Re-identification of Smart Meter data , 2012, Personal and Ubiquitous Computing.

[69]  Jack I. Lerner,et al.  Taking the 'Long View' on the Fourth Amendment: Stored Records and the Sanctity of the Home , 2008 .

[70]  B. Glaser Doing grounded theory : issues and discussions , 1998 .

[71]  Tony Flick,et al.  Chapter 1 – Smart Grid: What Is It? , 2011 .

[72]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[73]  Jason I. Hong,et al.  End-User Privacy in Human-Computer Interaction , 2007, Found. Trends Hum. Comput. Interact..

[74]  Kelly Caine,et al.  Patients want granular privacy control over health information in electronic medical records , 2013, J. Am. Medical Informatics Assoc..

[75]  Gillian R. Hayes The relationship of action research to human-computer interaction , 2011, TCHI.

[76]  James A. Landay,et al.  Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.

[77]  I. Altman Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .

[78]  Mary Ellen Zurko User-centered security: stepping up to the grand challenge , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[79]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[80]  Georgios Kalogridis,et al.  Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[81]  可児 潤也 「"Little Brothers Watching You:" Raising Awareness of Data Leaks on Smartphones」の報告 , 2013 .

[82]  Minghua Chen,et al.  Enabling Multilevel Trust in Privacy Preserving Data Mining , 2011, IEEE Transactions on Knowledge and Data Engineering.

[83]  Andreas Pfitzmann,et al.  Multilateral Security: Enabling Technologies and Their Evaluation , 2001, Informatics.

[84]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[85]  David Wright,et al.  A framework for the ethical impact assessment of information technology , 2011, Ethics and Information Technology.

[86]  W. Thomas,et al.  The Child in America: Behavior Problems and Programs , 2017 .

[87]  B. Neenan,et al.  Societal Benefits of Smart Metering Investments , 2008 .

[88]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[89]  H. Simon,et al.  Models of Bounded Rationality: Empirically Grounded Economic Reason , 1997 .

[90]  Saonee Sarker,et al.  Adoption of Information Systems in the Electricity Sector: The Issue of Smart Metering , 2012, AMCIS.

[91]  Roger Clarke,et al.  Privacy impact assessment: Its origins and development , 2009, Comput. Law Secur. Rev..

[92]  Simson L. Garfinkel,et al.  Security and Usability , 2005 .

[93]  Lorrie Faith Cranor,et al.  Disagreeable Privacy Policies: Mismatches between Meaning and Users’ Understanding , 2014 .

[94]  David L. Schwartz,et al.  Legal Scholarship and the United States Court of Appeals for the Federal Circuit: An Empirical Study of a National Circuit , 2010 .

[95]  Clark W Gellings,et al.  The Smart Grid: Enabling Energy Efficiency and Demand Response , 2020 .

[96]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[97]  Andreas Reckwitz Toward a Theory of Social Practices , 2002 .

[98]  Richard H. R. Harper,et al.  Trust, Computing, and Society: Trust, Computing, and Society: Introduction , 2014 .

[99]  Mark S. Ackerman,et al.  Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.

[100]  Katie Shilton,et al.  Four billion little brothers? , 2009, Commun. ACM.

[101]  Mazdak Zamani,et al.  Study of smart card technology and probe user awareness about it: A case study of Middle Eastern students , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[102]  V. Braun,et al.  Using thematic analysis in psychology , 2006 .

[103]  Mark W. Newman,et al.  The Work to Make a Home Network Work , 2005, ECSCW.

[104]  Daniela Schiek,et al.  Das schriftliche Interview in der qualitativen Sozialforschung / The Written Interview in Qualitative Social Research , 2014 .

[105]  G Gigerenzer,et al.  Reasoning the fast and frugal way: models of bounded rationality. , 1996, Psychological review.

[106]  Willett Kempton,et al.  Folk quantification of energy , 1982 .

[107]  Alexander Hörbst,et al.  Attitudes and behaviors related to the introduction of electronic health records among Austrian and German citizens , 2010, Int. J. Medical Informatics.

[108]  Steven Reece,et al.  Recommending energy tariffs and load shifting based on smart household usage profiling , 2013, IUI '13.

[109]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[110]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[111]  Mark Rouncefield,et al.  Fieldwork for Design - Theory and Practice , 2007, Computer Supported Cooperative Work.

[112]  Johann Kranz,et al.  The role of smart metering and decentralized electricity storage for smart grids: The importance of positive externalities , 2012 .

[113]  Alan J. Dix,et al.  Designing for appropriation , 2007, BCS HCI.

[114]  L. Floridi The Ontological Interpretation of Informational Privacy , 2005, Ethics and Information Technology.

[115]  H. Simon Models of Bounded Rationality: Empirically Grounded Economic Reason , 1997 .

[116]  Louise Barkhuus The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI , 2012, CHI.

[117]  K. Himma The Handbook of Information and Computer Ethics , 2007 .

[118]  William W. Gaver What should we expect from research through design? , 2012, CHI.

[119]  Emilee J. Rader,et al.  The importance of visibility for folk theories of sensor data , 2017, SOUPS.

[120]  David J. Danelski,et al.  Privacy and Freedom , 1968 .

[121]  Lorrie Faith Cranor,et al.  A Design Space for Effective Privacy Notices , 2015, SOUPS.

[122]  Steve Benford,et al.  The ins and outs of home networking: The case for useful and usable domestic networking , 2009, TCHI.

[123]  Andy Crabtree,et al.  Human Data Interaction: Historical Lessons from Social Studies and CSCW , 2015, ECSCW.

[124]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[125]  Yuguang Fang,et al.  Privacy-Aware Profiling and Statistical Data Extraction for Smart Sustainable Energy Systems , 2013, IEEE Transactions on Smart Grid.

[126]  Rainer Knyrim,et al.  Smart metering under EU Data Protection Law , 2011 .

[127]  J. Doug Tygar,et al.  Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.

[128]  Vagelis Papakonstantinou,et al.  Legal Protection of Personal Data in Smart Grid and Smart Metering Systems from the European Perspective , 2015 .

[129]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[130]  Norman M. Sadeh,et al.  What do they know about me? Contents and Concerns of Online Behavioral Profiles , 2015, ArXiv.

[131]  Patrick D. McDaniel,et al.  Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.

[132]  C. Clastres Smart grids: Another step towards competition, energy security and climate change objectives , 2011 .

[133]  H. Vincent Poor,et al.  Smart Meter Privacy: A Theoretical Framework , 2013, IEEE Transactions on Smart Grid.

[134]  Harold Abelson,et al.  No technical understanding required: helping users make informed choices about access to their personal data , 2014, MobiQuitous.

[135]  James H. Moor,et al.  Towards a theory of privacy in the information age , 1997, CSOC.

[136]  Tom Rodden,et al.  “This has to be the cats”: Personal Data Legibility in Networked Sensing Systems , 2016, CSCW.