Abstract
The last years have witnessed the rapid development and deployment of the Internet of Things (IoT) in societies. Along with the growth of IoT, new security and privacy issues arise and become more urgent. in this paper, we tried to study people’s awareness of this new technology and how do they deal with the risk to their privacy. In this paper, we explore the understanding and awareness of privacy in the field of IoT. We conducted a survey study for some IoT users in the Kingdom of Saudi Arabia. The main findings of this study shows that the users of IoT devices are about 65%. In addition, the results found that the users believe that IoT devices affect their level of privacy and they think that privacy is an obsession during the use of the IoT in Saudi Arabia. Moreover, we found that about 75% of the participants are dependant on their IoT devices some or most of their time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Haller, S., Karnouskos, S., Schroth, C.: The internet of things in an enterprise context. In: Domingue, J., Fensel, D., Traverso, P. (eds.) FIS 2008. LNCS, vol. 5468, pp. 14–28. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00985-3_2
Zheng, S., Apthorpe, N., Chetty, M., Feamster, N.: User perceptions of smart home IoT privacy. In: Proceedings of the ACM on human-computer interaction, vol. 2, no. CSCW, pp. 1–20 (2018)
Consumers International: Testing our trust: consumers and the Internet of Things 2017 review. https://www.consumersinternational.org/media/154746/iot2017review-2nded.pdf. (2017)
Zhang, Z., Yu, T., Ma, X., Guan, Y., Moll, P., Zhang, L.: Sovereign: self-contained smart home with data-centric network and security. IEEE Internet Things J. 9(15), 13808–13822 (2022)
Choe, E.K., et al.: Investigating receptiveness to sensing and inference in the home using sensor proxies. In: Proceedings of the 2012 ACM Conference on Ubiquitous Computing (2012)
Butler, D.J., et al.: The privacy-utility tradeoff for remotely teleoperated robots. In: Proceedings of the Tenth Annual ACM/IEEE International Conference on Human-Robot Interaction (2015)
Worthy, Peter, Matthews, B., Viller, S.: Trust me: doubts and concerns living with the Internet of Things. In: Proceedings of the 2016 ACM Conference on Designing Interactive Systems (2016)
de Boer, P.S., van Deursen, A.J.A.M., Van Rompay, T.J.L.: Accepting the Internet-of-Things in our homes: the role of user skills. Telematics Informatics 36, 147–156 (2019)
Kandasamy, K., Srinivas, S., Achuthan, K., Rangan, V.P.: IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process. EURASIP J. Inf. Secur. 2020(1), 1–18 (2020)
Profile, A.: Cybersecurity Threat. “for a Connected Lighting System.” (2022)
Yeboah-Ofori, A.: Cybercrime and risks for cyber physical systems. Int. J. Cyber-Secur. Digi. Forensics 8(1), 43–57 (2019). https://doi.org/10.17781/P002556
Palo Alto Networks, Unit 42, IoT threat report in 2020. https://start.paloaltonetworks.com/unit-42-iot-threat-report
Ali, A., Khan, A., Ahmed, M., Jeon, G.: BCALS: blockchain-based secure log management system for cloud computing. Trans. Emerg. Telecommun. Technol. 33, e4272 (2021)
Carroll, M., Van Der Merwe, A., Kotze, P.: Secure cloud computing: Benefits, risks and controls. In: 2011 Information Security for South Africa, pp. 1–9. IEEE (2011)
Weinberg, B.D., Milne, G.R., Andonova, Y.G., Hajjat, F.M.: Internet of Things: convenience vs. privacy and secrecy. Bus. Horiz. 58(6), 615–624 (2015)
Tan, C.C., Wang, H., Zhong, S., Li, Q.: IBE-Lite: a lightweight identity-based cryptography for body sensor networks. IEEE Trans. Inf Technol. Biomed. 13(6), 926–932 (2009)
Huang, C., Lee, H., Lee, D.H.: A privacy-strengthened scheme for E-healthcare monitoring system. J. Med. Syst. 36(5), 2959–2971 (2012)
Sbora, C.: Indicators for determining collaborative security level in organizational environments. Informatica Economica 18(4), 131–143 (2014)
Alraja, M.N., Murtaza, M.J.F., Basel, K.: The effect of security, privacy, familiarity, and trust on users’ attitudes toward the use of the IoT-based healthcare: the mediation role of risk perception. IEEE Access 7, 111341–111354 (2019)
Tawalbeh, L., Fadi, M., Mais, T., Muhannad, Q.: IoT privacy and security: challenges and solutions. Appl. Sci. 10(12), 4102 (2020)
Khan, M.A., Salah, K.: IoT security: review, Blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395–411 (2018). https://doi.org/10.1016/j.future.2017.11.022
McCreary, F., Zafiroglu, A., Patterson, H.: The contextual complexity of privacy in smart homes and smart buildings. In: Nah, F.F.-H., Tan, C.-H. (eds.) HCI in Business, Government, and Organizations: Information Systems: Third International Conference, HCIBGO 2016, Held as Part of HCI International 2016, Toronto, Canada, July 17–22, 2016, Proceedings, Part II, pp. 67–78. Springer International Publishing, Cham (2016). https://doi.org/10.1007/978-3-319-39399-5_7
Martin, K., Nissenbaum, H.: Measuring privacy: an empirical test using context to expose confounding variables. Colum. Sci. Tech. L. Rev. 18, 176 (2016)
Naeini, P.E., et al.: Privacy expectations and preferences in an {IoT} world. In: Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pp. 399–412 (2017)
Lee, H., Kobsa, A.: Understanding user privacy in Internet of Things environments. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), pp. 407–412. IEEE (2016)
Bohn, H., Bobek, A., Golatowski, F.: SIRENA-service infrastructure for real-time embedded networked devices: a service oriented framework for different domains. In: International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL’06), p. 43. IEEE (2006)
Deogirikar, J., Vidhate, A.: Security attacks in IoT: a survey. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pp. 32–37. IEEE (2017)
Atlam, H.F., Wills, G.B.: IoT security, privacy, safety and ethics. In: Farsi, M., Daneshkhah, A., Hosseinian-Far, A., Jahankhani, H. (eds.) Digital twin technologies and smart cities. IT, pp. 123–149. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-18732-3_8
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Almubark, H., Masmali, O. (2023). The Awareness of Internet of Things (IoT) Privacy Risk: A Survey Study. In: Arai, K. (eds) Proceedings of the Future Technologies Conference (FTC) 2022, Volume 2. FTC 2022 2022. Lecture Notes in Networks and Systems, vol 560. Springer, Cham. https://doi.org/10.1007/978-3-031-18458-1_13
Download citation
DOI: https://doi.org/10.1007/978-3-031-18458-1_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-18457-4
Online ISBN: 978-3-031-18458-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)