All in one! user perceptions on centralized IoT privacy settings

Karola Marky, Verena Zimmermann, Alina Stöver, Philipp Hoffmann, Kai Kunze, Max Mühlhäuser

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

IoT devices deliver their functionality by accessing data. Users decide which data they are willing to share via privacy settings interfaces that are typically on the device, or in the app controlling it. Thus, users have to interact with each device or app which is time-consuming and settings might be overlooked. In this paper, we provide a stepping stone into a multi-device interface for adjusting privacy settings. We present three levels of information detail: 1) sensor name 2), sensor name and information about captured data and 3) detailed information on each collected data type including consequences. Through a pre-study with 15 participants, we found that users prefer the access to detailed information because this offers the best decision support. They also wish for a clear status communication, a possibility for rule-based settings, and delegation options.

Original languageEnglish
Title of host publicationCHI EA 2020 - Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems
PublisherAssociation for Computing Machinery
ISBN (Electronic)9781450368193
DOIs
Publication statusPublished - 2020 Apr 25
Event2020 ACM CHI Conference on Human Factors in Computing Systems, CHI EA 2020 - Honolulu, United States
Duration: 2020 Apr 252020 Apr 30

Publication series

NameConference on Human Factors in Computing Systems - Proceedings

Conference

Conference2020 ACM CHI Conference on Human Factors in Computing Systems, CHI EA 2020
CountryUnited States
CityHonolulu
Period20/4/2520/4/30

Keywords

  • Internet of things
  • Privacy decision support
  • Smart home

ASJC Scopus subject areas

  • Human-Computer Interaction
  • Computer Graphics and Computer-Aided Design
  • Software

Fingerprint Dive into the research topics of 'All in one! user perceptions on centralized IoT privacy settings'. Together they form a unique fingerprint.

Cite this