Privacy Perceptions and Designs of Bystanders in Smart Homes

As the Internet of Things (IoT) devices make their ways into people's homes, traditional dwellings are turning into smart homes. While prior empirical studies have examined people's privacy concerns of smart homes and their desired ways of mitigating these concerns, the focus was primarily on the end users or device owners. Our research investigated the privacy perceptions and design ideas of smart home bystanders, i.e., people who are not the owners nor the primary users of smart home devices but can potentially be involved in the device usage, such as other family members or guests. We conducted focus groups and co-design activities with eighteen participants. We identified three impacting factors of bystanders' privacy perceptions (e.g., perceived norms) and a number of design factors to mitigate their privacy concerns (e.g., asking for device control). We highlighted bystanders' needs for privacy and controls, as well as the tension of privacy expectations between the owners/users and the bystanders in smart homes. We discussed how future designs can better support and balance the privacy needs of different stakeholders in smart homes.

[1]  Kenji Yoshigoe,et al.  Overcoming invasion of privacy in smart home environment with synthetic packet injection , 2014, 2015 TRON Symposium (TRONSHOW).

[2]  Neil W. Bergmann,et al.  IoT Privacy and Security Challenges for Smart Home Environments , 2016, Inf..

[3]  Nick Feamster,et al.  A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic , 2017, ArXiv.

[4]  Robert E. Crossler,et al.  A Value Sensitive Design Investigation of Privacy Enhancing Tools in Web Browsers , 2012, Decis. Support Syst..

[5]  Volker Wulf,et al.  Evolving Needs in IoT Control and Accountability , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..

[6]  Antorweep Chakravorty,et al.  Privacy Preserving Data Analytics for Smart Homes , 2013, 2013 IEEE Security and Privacy Workshops.

[7]  Anupam Das,et al.  Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice , 2018, IEEE Pervasive Computing.

[8]  M.G.D. Steen,et al.  Benefits of co-design in service design projects , 2011 .

[9]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[10]  Mahadev Satyanarayanan,et al.  Enabling Live Video Analytics with a Scalable and Privacy-Aware Framework , 2018, ACM Trans. Multim. Comput. Commun. Appl..

[11]  Nick Feamster,et al.  A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation , 2018, IoT S&P@SIGCOMM.

[12]  David J. Crandall,et al.  Privacy behaviors of lifeloggers using wearable cameras , 2014, UbiComp.

[13]  Serge Egelman,et al.  "What Can't Data Be Used For?": Privacy Expectations about Smart TVs in the U.S. , 2018 .

[14]  W. Keith Edwards,et al.  More than meets the eye: transforming the user experience of home network management , 2008, DIS '08.

[15]  Maya Cakmak,et al.  Toys that Listen: A Study of Parents, Children, and Internet-Connected Toys , 2017, CHI.

[16]  Jonathan Grudin,et al.  Computer-supported cooperative work: history and focus , 1994, Computer.

[17]  Andreas Jacobsson,et al.  On Privacy and Security Challenges in Smart Connected Homes , 2016, 2016 European Intelligence and Security Informatics Conference (EISIC).

[18]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[19]  Andreas Jacobsson,et al.  A risk analysis of a smart home automation system , 2016, Future Gener. Comput. Syst..

[20]  Richard E. Boyatzis,et al.  Transforming Qualitative Information: Thematic Analysis and Code Development , 1998 .

[21]  Yang Wang,et al.  “What if?” Predicting Individual Users’ Smart Home Privacy Preferences and Their Changes , 2019, Proc. Priv. Enhancing Technol..

[22]  Yang Wang,et al.  Defending My Castle: A Co-Design Study of Privacy Mechanisms for Smart Homes , 2019, CHI.

[23]  Yang Wang,et al.  Privacy Mechanisms for Drones: Perceptions of Drone Controllers and Bystanders , 2017, CHI.

[24]  B. Everitt,et al.  Statistical methods for rates and proportions , 1973 .

[25]  Abdullahi Arabo,et al.  Privacy in the Age of Mobility and Smart Devices in Smart Homes , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.

[26]  Franziska Roesner,et al.  End User Security and Privacy Concerns with Smart Homes , 2017, SOUPS.

[27]  Yang Wang,et al.  Free to Fly in Public Spaces: Drone Controllers' Privacy Perceptions and Practices , 2017, CHI.

[28]  Pieter Jan Stappers,et al.  Contextmapping: experiences from practice , 2005 .

[29]  Josephine Lau,et al.  Alexa, Are You Listening? , 2018, Proc. ACM Hum. Comput. Interact..

[30]  Tadayoshi Kohno,et al.  In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies , 2014, CHI.

[31]  Yang Wang,et al.  Folk Models of Online Behavioral Advertising , 2017, CSCW.

[32]  Yang Wang,et al.  Flying Eyes and Hidden Controllers: A Qualitative Study of People’s Privacy Perceptions of Civilian Drones in The US , 2016, Proc. Priv. Enhancing Technol..

[33]  Ben Matthews,et al.  Trust Me: Doubts and Concerns Living with the Internet of Things , 2016, Conference on Designing Interactive Systems.

[34]  Pieter Jan Stappers,et al.  Co-creation and the new landscapes of design , 2008 .

[35]  Oliver Hofmann,et al.  'Home, Smart Home' - Exploring End Users' Mental Models of Smart Homes , 2018, Message Understanding Conference.

[36]  Svetha Venkatesh,et al.  Dynamic Privacy in a Smart House Environment , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[37]  Heather Richter Lipford,et al.  Moving beyond untagging: photo privacy in a tagged world , 2010, CHI.

[38]  Nick Feamster,et al.  Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic , 2017, ArXiv.

[39]  Bo Yang,et al.  Smart home research , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).

[40]  David J. Crandall,et al.  Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras , 2015, CHI.

[41]  J. Fleiss,et al.  Statistical methods for rates and proportions , 1973 .

[42]  Nick Feamster,et al.  User Perceptions of Privacy in Smart Homes , 2018, ArXiv.

[43]  L. M. Lieberman,et al.  What If … , 1983, Journal of learning disabilities.

[44]  Nick Feamster,et al.  Discovering Smart Home Internet of Things Privacy Norms Using Contextual Integrity , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..

[45]  Rick Wash,et al.  Organization Interfaces—collaborative computing General Terms , 2022 .