Skip to main content

User-Driven Privacy Factors in Trigger-Action Apps: A Comparative Analysis with General IoT

  • Conference paper
  • First Online:
Privacy and Identity Management. Sharing in a Digital World (Privacy and Identity 2023)

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 695))

Included in the following conference series:

  • 49 Accesses

Abstract

The growing adoption of Trigger-Action Platforms (TAPs) in the Internet of Things (IoT) paradigm has evolved users’ ability to automate their digital environments. However, this automation also introduces potential threats to users’ privacy. To enhance users’ privacy decisions and develop effective permission management systems, it is crucial to understand users’ comprehension of privacy factors in the IoT. This paper presents a literature review on privacy factors in the general IoT environment and compares them with users’ priorities and preferences for privacy factors specific to TAPs. To this end, we earlier conducted three Focus Groups (FGs) to gather users’ definitions and rankings of privacy factors in the TAPs context. Through the comparison with the general IoT literature, we highlight the similarities and differences in privacy factors between TAPs and traditional IoT applications. The outcomes of this study can inform the designers and developers with an emphasis on privacy-centric IoT TAPs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.scopus.com/search/form.uri?display=advanced.

  2. 2.

    https://dl.acm.org/action/doSearch.

  3. 3.

    https://api.semanticscholar.org/api-docs/.

References

  1. Abbott, J., et al.: Privacy lessons learnt from deploying an IoT ecosystem in the home. In: EuroUSEC 2022 (2022)

    Google Scholar 

  2. Al-Ameen, M.N., Chauhan, A., Ahsan, M.A.M., Kocabas, H.: A look into user’s privacy perceptions and data practices of IoT devices. IJICS (2021)

    Google Scholar 

  3. Alaiad, A., Zhou, L.: Patients’ Adoption of WSN-based smart home healthcare systems: an integrated model of facilitators and barriers. In: ProComm (2017)

    Google Scholar 

  4. Alraja, M.: Frontline healthcare providers’ behavioural intention to internet of things (IoT)-enabled healthcare applications: a gender-based, cross-generational study. Technol. Forecast. Soc. Change 174, 121256 (2022)

    Article  Google Scholar 

  5. Alshehri, A., Spielman, J., Prasad, A., Yue, C.: Exploring the privacy concerns of bystanders in smart homes from the perspectives of both owners and bystanders. In: Proceedings on Privacy Enhancing Technologies (2022)

    Google Scholar 

  6. Ando, R., Shima, S., Takemura, T.: Analysis of privacy and security affecting the intention of use in personal data collection in an IoT environment (2016)

    Google Scholar 

  7. Apthorpe, N., Shvartzshnaider, Y., Mathur, A., Reisman, D., Feamster, N.: Discovering smart home internet of things privacy norms using contextual integrity. In: IMWUT (2018)

    Google Scholar 

  8. Brandtzaeg, P.B., Pultier, A., Moen, G.M.: Losing control to data-hungry apps: a mixed-methods approach to mobile app privacy. Soc. Sci. Comput. Rev. 37, 466–488 (2019)

    Article  Google Scholar 

  9. Cannizzaro, S., Procter, R., Ma, S., Maple, C.: Trust in the smart home: findings from a nationally representative survey in the UK. PLoS ONE 15, e0231615 (2020)

    Article  Google Scholar 

  10. Celik, Z.B., McDaniel, P., Tan, G.: SOTERIA: automated IoT safety and security analysis. In: USENIX ATC 2018 (2018)

    Google Scholar 

  11. Cheong, P.H., Nyaupane, P.: Smart campus communication, IoT, and data governance: understanding student tensions and imaginaries. Big Data Soc. (2022)

    Google Scholar 

  12. Cleveland, S.M., Haddara, M.: Internet of Things for diabetics: identifying adoption issues. Internet Things (2023)

    Google Scholar 

  13. Cobb, C., et al.: How risky are real users’ IFTTT applets? In: Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020) (2020)

    Google Scholar 

  14. Colnago, J., et al.: Informing the design of a personalized privacy assistant for the internet of things. In: CHI (2020)

    Google Scholar 

  15. Corcella, L., Manca, M., Paternò, F., Santoro, C.: A visual tool for analysing IoT trigger/action programming. In: Bogdan, C., Kuusinen, K., Lárusdóttir, M.K., Palanque, P., Winckler, M. (eds.) HCSE 2018. LNCS, vol. 11262, pp. 189–206. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-05909-5_11

    Chapter  Google Scholar 

  16. Dong, X., Chang, Y., Wang, Y., Yan, J.: Understanding usage of internet of things (IOT) systems in China. Inf. Technol. People 30, 117–138 (2017)

    Article  Google Scholar 

  17. Emami-Naeini, P., Agarwal, Y., Cranor, L.F., Hibshi, H.: Ask the experts: what should be on an IoT privacy and security label? In: S&P (2020)

    Google Scholar 

  18. Emami-Naeini, P., Dheenadhayalan, J., Agarwal, Y., Cranor, L.F.: Which privacy and security attributes most impact consumers’ risk perception and willingness to purchase IoT devices? In: S&P (2021)

    Google Scholar 

  19. Emami-Naeini, P., Dixon, H., Agarwal, Y., Cranor, L.F.: Exploring how privacy and security factor into IoT device purchase behavior. In: CHI (2019)

    Google Scholar 

  20. Foltz, C.B., Foltz, L.: Mobile users’ information privacy concerns instrument and IoT. Inf. Comput. Secur. 28, 359–371 (2020)

    Article  Google Scholar 

  21. George, J.F., Chen, R., Yuan, L.: Intent to purchase IoT home security devices: fear vs privacy. PLoS ONE 16, e0257601 (2021)

    Article  Google Scholar 

  22. Gopalakrishna, N.K., Anandayuvaraj, D., Detti, A., Bland, F.L., Rahaman, S., Davis, J.C.: If security is required. In: Proceedings of the 4th International Workshop on Software Engineering Research and Practice for the IoT (2022)

    Google Scholar 

  23. Harkin, D., Mann, M., Warren, I.: Consumer IoT and its under-regulation: findings from an Australian study. Policy Internet 14, 96–113 (2022)

    Article  Google Scholar 

  24. Hong, A., Nam, C., Kim, S.: What will be the possible barriers to consumers’ adoption of smart home services? Telecommun. Policy 44, 101867 (2020)

    Article  Google Scholar 

  25. Hsu, C.L., Lin, J.C.C.: An empirical examination of consumer adoption of Internet of Things services: network externalities and concern for information privacy perspectives. Comput. Hum. Behav. 62, 516–527 (2016)

    Article  Google Scholar 

  26. Jaspers, E.D.T., Pearson, E.: Consumers’ acceptance of domestic internet-of-things: the role of trust and privacy concerns. J. Bus. Res. 142, 255–265 (2022)

    Article  Google Scholar 

  27. Jeon, H., Lee, C.: Internet of things technology: balancing privacy concerns with convenience. Telemat. Inform. 70, 101816 (2022)

    Article  Google Scholar 

  28. Kim, D., Park, K., Park, Y., Ahn, J.H.: Willingness to provide personal information: perspective of privacy calculus in IoT services. Comput. Hum. Behav. 92, 273–281 (2019)

    Article  Google Scholar 

  29. Kim, S., Yoon, J.: An exploratory study on consumer’s needs on smart home in Korea. In: Marcus, A. (ed.) DUXU 2016. LNCS, vol. 9748, pp. 337–345. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-40406-6_32

    Chapter  Google Scholar 

  30. Kowatsch, T., Maass, W.: Critical privacy factors of internet of things services: an empirical investigation with domain experts. In: Rahman, H., Mesquita, A., Ramos, I., Pernici, B. (eds.) MCIS 2012. LNBIP, vol. 129, pp. 200–211. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-33244-9_14

    Chapter  Google Scholar 

  31. Kulyk, O., Milanovic, K., Pitt, J.: Does my smart device provider care about my privacy? investigating trust factors and user attitudes in iot systems. In: Proceedings of the 11th NordiCHI (2020)

    Google Scholar 

  32. Lafontaine, E., Sabir, A., Das, A.: Understanding people’s attitude and concerns towards adopting IoT devices. In: Extended Abstracts of the 2021 CHI (2021)

    Google Scholar 

  33. Lee, A.R.: Investigating the personalization-privacy paradox in internet of things (IoT) based on dual-factor theory, moderating effects of type of IoT service and user value. Sustainability 13, 10679 (2021)

    Article  Google Scholar 

  34. Lee, H., Kobsa, A.: Privacy preference modeling and prediction in a simulated campuswide IoT environment. In: PerCom (2017)

    Google Scholar 

  35. Lee, S., Suk, J., Ha, H.R., Song, X.X., Deng, Y.Z.: Consumer’s information privacy and security concerns and use of intelligent technology. In: Ahram, T., Karwowski, W., Vergnano, A., Leali, F., Taiar, R. (eds.) IHSI 2020. AISC, vol. 1131, pp. 1184–1189. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-39512-4_180

    Chapter  Google Scholar 

  36. Lenz, J., Bozakov, Z., Wendzel, S., Vrhovec, S.: Why people replace their aging smart devices: a push-pull-mooring perspective. Comput. Secur. 130, 103258 (2023)

    Article  Google Scholar 

  37. Liu, Y.L., Huang, L., Yan, W., Wang, X., Zhang, R.: Privacy in AI and the IoT: the privacy concerns of smart speaker users and the personal information protection law in China. Telecommun. Policy 46, 102334 (2022)

    Article  Google Scholar 

  38. Luthfi, A., Emigawaty, E.: Towards privacy by design on the internet of things (IoT) use: a qualitative descriptive study. IJHISI (2022)

    Google Scholar 

  39. Mahadewa, K., et al.: Identifying privacy weaknesses from multi-party trigger-action integration platforms. In: 30th ACM SIGSOFT (2021)

    Google Scholar 

  40. Mann, M., Wilson, M., Warren, I.: Smart parenting? The internet of things, children’s privacy, and data justice. Int. J. Child. Rights 30, 204–231 (2022)

    Article  Google Scholar 

  41. Marky, K., Gerber, N., Pelzer, M.G., Khamis, M., Mühlhäuser, M.: “You offer privacy like you offer tea”: investigating mechanisms for improving guest privacy in IoT-equipped households. Proc. Priv. Enhanc. Technol. (2022)

    Google Scholar 

  42. Marreiros, H., Gomer, R.C., Vlassopoulos, M., Tonin, M., Schraefel, M.C.: Exploring user perceptions of online privacy disclosures. In: IADIS (2015)

    Google Scholar 

  43. Maus, B., Olsson, C.M., Salvi, D.: Privacy personas for IoT-based health research: a privacy calculus approach. Front. Digit. Health 3, 675754 (2021)

    Article  Google Scholar 

  44. Menard, P., Bott, G.J.: Analyzing IOT users’ mobile device privacy concerns: extracting privacy permissions using a disclosure experiment. Comput. Secur. 95, 101856 (2020)

    Article  Google Scholar 

  45. Montanari, A., Mashhadi, A., Mathur, A., Kawsar, F.: Understanding the privacy design space for personal connected objects. In: eWiC (2016)

    Google Scholar 

  46. Morgan, P.L., Collins, E.I., Spiliotopoulos, T., Greeno, D.J., Jones, D.M.: Reducing risk to security and privacy in the selection of trigger-action rules: implicit vs. explicit priming for domestic smart devices. Int. J. Hum.-Comput. Stud. 168, 102902 (2022)

    Google Scholar 

  47. Naeini, P.E., et al.: Privacy expectations and preferences in an IoT world. In: SOUPS (2017)

    Google Scholar 

  48. Naeini, P.E., et al.: Privacy expectations and preferences in an IoT world. In: Symposium on Usable Privacy and Security (2017)

    Google Scholar 

  49. Padyab, A., Ståhlbröst, A.: Exploring the dimensions of individual privacy concerns in relation to the internet of things use situations. Digit. Policy Regul. Govern. 20, 528–544 (2018)

    Article  Google Scholar 

  50. Pal, D., Papasratorn, B., Chutimaskul, W., Funilkul, S.: Embracing the smart-home revolution in Asia by the elderly: an end-user negative perception modeling. IEEE Access 7, 38535–38549 (2019)

    Article  Google Scholar 

  51. Ponciano, L., Barbosa, P., Brasileiro, F., Brito, A., Andrade, N.: Designing for pragmatists and fundamentalists. In: IHC (2017)

    Google Scholar 

  52. Psychoula, I., Singh, D., Chen, L., Chen, F., Holzinger, A., Ning, H.: Users’ privacy concerns in IoT based applications. In: SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI (2018)

    Google Scholar 

  53. Railean, A., Reinhardt, D.: Life-long privacy in the IoT? Measuring privacy attitudes throughout the life-cycle of IoT devices. In: Hansen, M., Kosta, E., Nai-Fovino, I., Fischer-Hübner, S. (eds.) Privacy and Identity 2017. IAICT, vol. 526, pp. 132–149. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-92925-5_9

    Chapter  Google Scholar 

  54. Romare, P., Morel, V., Karegar, F., Fischer-Hübner, S.: Tapping into privacy: a study of user preferences and concerns on trigger-action platforms. In: 2023 20th Annual International Conference on Privacy, Security and Trust (PST) (2023)

    Google Scholar 

  55. Saeidi, M., Calvert, M., Au, A., Sarma, A., Bobba, R.B.: If this context then that concern: exploring users’ concerns with IFTTT applets. CoRR (2020)

    Google Scholar 

  56. Sah, J., Jun, S.: The role of consumers’ privacy awareness in the privacy calculus for IoT services. Int. J. Hum.-Comput. Interact. (2023)

    Google Scholar 

  57. Santos, M., Villela, M.L.B.: Characterizing end-user development solutions: a systematic literature review. In: Kurosu, M. (ed.) HCII 2019. LNCS, vol. 11566, pp. 194–209. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-22646-6_14

    Chapter  Google Scholar 

  58. Spahn, M., Dörner, C., Wulf, V.: End user development: approaches towards a flexible software design. In: European Conference on Information Systems (2008)

    Google Scholar 

  59. Surbatovich, M., Aljuraidan, J., Bauer, L., Das, A., Jia, L.: Some recipes can do more than spoil your appetite: analyzing the security and privacy risks of IFTTT recipes. In: Proceedings of the 26th International Conference on WWW (2017)

    Google Scholar 

  60. Wang, S., et al.: Technology to Support Aging in Place: Older Adults’ Perspectives. In: Healthcare (2019)

    Google Scholar 

  61. Wang, X., McGill, T.J., Klobas, J.E.: I want it anyway: consumer perceptions of smart home devices. J. Comput. Inf. Syst. (2018)

    Google Scholar 

  62. Wickramasinghe, C.I., Reinhardt, D.: A survey-based exploration of users’ awareness and their willingness to protect their data with smart objects. In: Friedewald, M., Önen, M., Lievens, E., Krenn, S., Fricker, S. (eds.) Privacy and Identity 2019. IAICT, vol. 576, pp. 427–446. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-42504-3_27

    Chapter  Google Scholar 

  63. Williams, M., Nurse, J.R.C., Creese, S.: Privacy is the boring bit: user perceptions and behaviour in the internet-of-things. In: PST (2017)

    Google Scholar 

  64. Yao, Y., Basdeo, J.R., Mcdonough, O.R., Wang, Y.: Privacy perceptions and designs of bystanders in smart homes. Proc. ACM Hum. Comput. Interact. 3, 1–24 (2019)

    Article  Google Scholar 

  65. Yildirim, H., Ali-Eldin, A.M.T.: A model for predicting user intention to use wearable IoT devices at the workplace. J. King Saud Univ. Comput. Inf. Sci. 31, 497-505 (2019)

    Google Scholar 

  66. Zeng, E., Mare, S., Roesner, F.: End user security & privacy concerns with smart homes. In: USENIX (2017)

    Google Scholar 

  67. Zhang, Yu., Wang, D., Mu, J., Yang, Z.: Effects of transparency of service design on user attitude toward ‘exchanging information for service’. In: Stephanidis, C. (ed.) HCII 2019. CCIS, vol. 1032, pp. 225–232. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-23522-2_29

    Chapter  Google Scholar 

  68. Zhao, V., Zhang, L., Wang, B., Lu, S., Ur, B.: Visualizing differences to improve end-user understanding of trigger-action programs. In: CHI EA 2020 (2020)

    Google Scholar 

  69. Zheng, S., Apthorpe, N., Chetty, M., Feamster, N.: User perceptions of smart home IoT privacy. Proc. ACM Hum. Comput. Interact. 2, 1–20 (2018)

    Article  Google Scholar 

Download references

Acknowledgements

This work was partially supported by the Wallenberg AI, Autonomous Systems and Software Program (WASP) funded by the Knut and Alice Wallenberg Foundation. I would like to thank my supervisor Simone Fischer-Hübner and my co-supervisor Farzaneh Karegar for their helpful feedback and advice who together with Victor Morel also helped with conducting the focus groups and thematic analysis.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Piero Romare .

Editor information

Editors and Affiliations

A Appendix

A Appendix

Table 3. Summary of Privacy Factors in IoT context with mixed-methods
Table 4. Summary of Privacy Factors in IoT context with questionnaires
Table 5. Summary of Privacy Factors in IoT context with questionnaires
Table 6. Summary of Privacy Factors in IoT context with qualitative methods

Rights and permissions

Reprints and permissions

Copyright information

© 2024 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Romare, P. (2024). User-Driven Privacy Factors in Trigger-Action Apps: A Comparative Analysis with General IoT. In: Bieker, F., de Conca, S., Gruschka, N., Jensen, M., Schiering, I. (eds) Privacy and Identity Management. Sharing in a Digital World. Privacy and Identity 2023. IFIP Advances in Information and Communication Technology, vol 695. Springer, Cham. https://doi.org/10.1007/978-3-031-57978-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-57978-3_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-57977-6

  • Online ISBN: 978-3-031-57978-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics