Abstract
The growing adoption of Trigger-Action Platforms (TAPs) in the Internet of Things (IoT) paradigm has evolved users’ ability to automate their digital environments. However, this automation also introduces potential threats to users’ privacy. To enhance users’ privacy decisions and develop effective permission management systems, it is crucial to understand users’ comprehension of privacy factors in the IoT. This paper presents a literature review on privacy factors in the general IoT environment and compares them with users’ priorities and preferences for privacy factors specific to TAPs. To this end, we earlier conducted three Focus Groups (FGs) to gather users’ definitions and rankings of privacy factors in the TAPs context. Through the comparison with the general IoT literature, we highlight the similarities and differences in privacy factors between TAPs and traditional IoT applications. The outcomes of this study can inform the designers and developers with an emphasis on privacy-centric IoT TAPs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abbott, J., et al.: Privacy lessons learnt from deploying an IoT ecosystem in the home. In: EuroUSEC 2022 (2022)
Al-Ameen, M.N., Chauhan, A., Ahsan, M.A.M., Kocabas, H.: A look into user’s privacy perceptions and data practices of IoT devices. IJICS (2021)
Alaiad, A., Zhou, L.: Patients’ Adoption of WSN-based smart home healthcare systems: an integrated model of facilitators and barriers. In: ProComm (2017)
Alraja, M.: Frontline healthcare providers’ behavioural intention to internet of things (IoT)-enabled healthcare applications: a gender-based, cross-generational study. Technol. Forecast. Soc. Change 174, 121256 (2022)
Alshehri, A., Spielman, J., Prasad, A., Yue, C.: Exploring the privacy concerns of bystanders in smart homes from the perspectives of both owners and bystanders. In: Proceedings on Privacy Enhancing Technologies (2022)
Ando, R., Shima, S., Takemura, T.: Analysis of privacy and security affecting the intention of use in personal data collection in an IoT environment (2016)
Apthorpe, N., Shvartzshnaider, Y., Mathur, A., Reisman, D., Feamster, N.: Discovering smart home internet of things privacy norms using contextual integrity. In: IMWUT (2018)
Brandtzaeg, P.B., Pultier, A., Moen, G.M.: Losing control to data-hungry apps: a mixed-methods approach to mobile app privacy. Soc. Sci. Comput. Rev. 37, 466–488 (2019)
Cannizzaro, S., Procter, R., Ma, S., Maple, C.: Trust in the smart home: findings from a nationally representative survey in the UK. PLoS ONE 15, e0231615 (2020)
Celik, Z.B., McDaniel, P., Tan, G.: SOTERIA: automated IoT safety and security analysis. In: USENIX ATC 2018 (2018)
Cheong, P.H., Nyaupane, P.: Smart campus communication, IoT, and data governance: understanding student tensions and imaginaries. Big Data Soc. (2022)
Cleveland, S.M., Haddara, M.: Internet of Things for diabetics: identifying adoption issues. Internet Things (2023)
Cobb, C., et al.: How risky are real users’ IFTTT applets? In: Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020) (2020)
Colnago, J., et al.: Informing the design of a personalized privacy assistant for the internet of things. In: CHI (2020)
Corcella, L., Manca, M., Paternò, F., Santoro, C.: A visual tool for analysing IoT trigger/action programming. In: Bogdan, C., Kuusinen, K., Lárusdóttir, M.K., Palanque, P., Winckler, M. (eds.) HCSE 2018. LNCS, vol. 11262, pp. 189–206. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-05909-5_11
Dong, X., Chang, Y., Wang, Y., Yan, J.: Understanding usage of internet of things (IOT) systems in China. Inf. Technol. People 30, 117–138 (2017)
Emami-Naeini, P., Agarwal, Y., Cranor, L.F., Hibshi, H.: Ask the experts: what should be on an IoT privacy and security label? In: S&P (2020)
Emami-Naeini, P., Dheenadhayalan, J., Agarwal, Y., Cranor, L.F.: Which privacy and security attributes most impact consumers’ risk perception and willingness to purchase IoT devices? In: S&P (2021)
Emami-Naeini, P., Dixon, H., Agarwal, Y., Cranor, L.F.: Exploring how privacy and security factor into IoT device purchase behavior. In: CHI (2019)
Foltz, C.B., Foltz, L.: Mobile users’ information privacy concerns instrument and IoT. Inf. Comput. Secur. 28, 359–371 (2020)
George, J.F., Chen, R., Yuan, L.: Intent to purchase IoT home security devices: fear vs privacy. PLoS ONE 16, e0257601 (2021)
Gopalakrishna, N.K., Anandayuvaraj, D., Detti, A., Bland, F.L., Rahaman, S., Davis, J.C.: If security is required. In: Proceedings of the 4th International Workshop on Software Engineering Research and Practice for the IoT (2022)
Harkin, D., Mann, M., Warren, I.: Consumer IoT and its under-regulation: findings from an Australian study. Policy Internet 14, 96–113 (2022)
Hong, A., Nam, C., Kim, S.: What will be the possible barriers to consumers’ adoption of smart home services? Telecommun. Policy 44, 101867 (2020)
Hsu, C.L., Lin, J.C.C.: An empirical examination of consumer adoption of Internet of Things services: network externalities and concern for information privacy perspectives. Comput. Hum. Behav. 62, 516–527 (2016)
Jaspers, E.D.T., Pearson, E.: Consumers’ acceptance of domestic internet-of-things: the role of trust and privacy concerns. J. Bus. Res. 142, 255–265 (2022)
Jeon, H., Lee, C.: Internet of things technology: balancing privacy concerns with convenience. Telemat. Inform. 70, 101816 (2022)
Kim, D., Park, K., Park, Y., Ahn, J.H.: Willingness to provide personal information: perspective of privacy calculus in IoT services. Comput. Hum. Behav. 92, 273–281 (2019)
Kim, S., Yoon, J.: An exploratory study on consumer’s needs on smart home in Korea. In: Marcus, A. (ed.) DUXU 2016. LNCS, vol. 9748, pp. 337–345. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-40406-6_32
Kowatsch, T., Maass, W.: Critical privacy factors of internet of things services: an empirical investigation with domain experts. In: Rahman, H., Mesquita, A., Ramos, I., Pernici, B. (eds.) MCIS 2012. LNBIP, vol. 129, pp. 200–211. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-33244-9_14
Kulyk, O., Milanovic, K., Pitt, J.: Does my smart device provider care about my privacy? investigating trust factors and user attitudes in iot systems. In: Proceedings of the 11th NordiCHI (2020)
Lafontaine, E., Sabir, A., Das, A.: Understanding people’s attitude and concerns towards adopting IoT devices. In: Extended Abstracts of the 2021 CHI (2021)
Lee, A.R.: Investigating the personalization-privacy paradox in internet of things (IoT) based on dual-factor theory, moderating effects of type of IoT service and user value. Sustainability 13, 10679 (2021)
Lee, H., Kobsa, A.: Privacy preference modeling and prediction in a simulated campuswide IoT environment. In: PerCom (2017)
Lee, S., Suk, J., Ha, H.R., Song, X.X., Deng, Y.Z.: Consumer’s information privacy and security concerns and use of intelligent technology. In: Ahram, T., Karwowski, W., Vergnano, A., Leali, F., Taiar, R. (eds.) IHSI 2020. AISC, vol. 1131, pp. 1184–1189. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-39512-4_180
Lenz, J., Bozakov, Z., Wendzel, S., Vrhovec, S.: Why people replace their aging smart devices: a push-pull-mooring perspective. Comput. Secur. 130, 103258 (2023)
Liu, Y.L., Huang, L., Yan, W., Wang, X., Zhang, R.: Privacy in AI and the IoT: the privacy concerns of smart speaker users and the personal information protection law in China. Telecommun. Policy 46, 102334 (2022)
Luthfi, A., Emigawaty, E.: Towards privacy by design on the internet of things (IoT) use: a qualitative descriptive study. IJHISI (2022)
Mahadewa, K., et al.: Identifying privacy weaknesses from multi-party trigger-action integration platforms. In: 30th ACM SIGSOFT (2021)
Mann, M., Wilson, M., Warren, I.: Smart parenting? The internet of things, children’s privacy, and data justice. Int. J. Child. Rights 30, 204–231 (2022)
Marky, K., Gerber, N., Pelzer, M.G., Khamis, M., Mühlhäuser, M.: “You offer privacy like you offer tea”: investigating mechanisms for improving guest privacy in IoT-equipped households. Proc. Priv. Enhanc. Technol. (2022)
Marreiros, H., Gomer, R.C., Vlassopoulos, M., Tonin, M., Schraefel, M.C.: Exploring user perceptions of online privacy disclosures. In: IADIS (2015)
Maus, B., Olsson, C.M., Salvi, D.: Privacy personas for IoT-based health research: a privacy calculus approach. Front. Digit. Health 3, 675754 (2021)
Menard, P., Bott, G.J.: Analyzing IOT users’ mobile device privacy concerns: extracting privacy permissions using a disclosure experiment. Comput. Secur. 95, 101856 (2020)
Montanari, A., Mashhadi, A., Mathur, A., Kawsar, F.: Understanding the privacy design space for personal connected objects. In: eWiC (2016)
Morgan, P.L., Collins, E.I., Spiliotopoulos, T., Greeno, D.J., Jones, D.M.: Reducing risk to security and privacy in the selection of trigger-action rules: implicit vs. explicit priming for domestic smart devices. Int. J. Hum.-Comput. Stud. 168, 102902 (2022)
Naeini, P.E., et al.: Privacy expectations and preferences in an IoT world. In: SOUPS (2017)
Naeini, P.E., et al.: Privacy expectations and preferences in an IoT world. In: Symposium on Usable Privacy and Security (2017)
Padyab, A., Ståhlbröst, A.: Exploring the dimensions of individual privacy concerns in relation to the internet of things use situations. Digit. Policy Regul. Govern. 20, 528–544 (2018)
Pal, D., Papasratorn, B., Chutimaskul, W., Funilkul, S.: Embracing the smart-home revolution in Asia by the elderly: an end-user negative perception modeling. IEEE Access 7, 38535–38549 (2019)
Ponciano, L., Barbosa, P., Brasileiro, F., Brito, A., Andrade, N.: Designing for pragmatists and fundamentalists. In: IHC (2017)
Psychoula, I., Singh, D., Chen, L., Chen, F., Holzinger, A., Ning, H.: Users’ privacy concerns in IoT based applications. In: SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI (2018)
Railean, A., Reinhardt, D.: Life-long privacy in the IoT? Measuring privacy attitudes throughout the life-cycle of IoT devices. In: Hansen, M., Kosta, E., Nai-Fovino, I., Fischer-Hübner, S. (eds.) Privacy and Identity 2017. IAICT, vol. 526, pp. 132–149. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-92925-5_9
Romare, P., Morel, V., Karegar, F., Fischer-Hübner, S.: Tapping into privacy: a study of user preferences and concerns on trigger-action platforms. In: 2023 20th Annual International Conference on Privacy, Security and Trust (PST) (2023)
Saeidi, M., Calvert, M., Au, A., Sarma, A., Bobba, R.B.: If this context then that concern: exploring users’ concerns with IFTTT applets. CoRR (2020)
Sah, J., Jun, S.: The role of consumers’ privacy awareness in the privacy calculus for IoT services. Int. J. Hum.-Comput. Interact. (2023)
Santos, M., Villela, M.L.B.: Characterizing end-user development solutions: a systematic literature review. In: Kurosu, M. (ed.) HCII 2019. LNCS, vol. 11566, pp. 194–209. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-22646-6_14
Spahn, M., Dörner, C., Wulf, V.: End user development: approaches towards a flexible software design. In: European Conference on Information Systems (2008)
Surbatovich, M., Aljuraidan, J., Bauer, L., Das, A., Jia, L.: Some recipes can do more than spoil your appetite: analyzing the security and privacy risks of IFTTT recipes. In: Proceedings of the 26th International Conference on WWW (2017)
Wang, S., et al.: Technology to Support Aging in Place: Older Adults’ Perspectives. In: Healthcare (2019)
Wang, X., McGill, T.J., Klobas, J.E.: I want it anyway: consumer perceptions of smart home devices. J. Comput. Inf. Syst. (2018)
Wickramasinghe, C.I., Reinhardt, D.: A survey-based exploration of users’ awareness and their willingness to protect their data with smart objects. In: Friedewald, M., Önen, M., Lievens, E., Krenn, S., Fricker, S. (eds.) Privacy and Identity 2019. IAICT, vol. 576, pp. 427–446. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-42504-3_27
Williams, M., Nurse, J.R.C., Creese, S.: Privacy is the boring bit: user perceptions and behaviour in the internet-of-things. In: PST (2017)
Yao, Y., Basdeo, J.R., Mcdonough, O.R., Wang, Y.: Privacy perceptions and designs of bystanders in smart homes. Proc. ACM Hum. Comput. Interact. 3, 1–24 (2019)
Yildirim, H., Ali-Eldin, A.M.T.: A model for predicting user intention to use wearable IoT devices at the workplace. J. King Saud Univ. Comput. Inf. Sci. 31, 497-505 (2019)
Zeng, E., Mare, S., Roesner, F.: End user security & privacy concerns with smart homes. In: USENIX (2017)
Zhang, Yu., Wang, D., Mu, J., Yang, Z.: Effects of transparency of service design on user attitude toward ‘exchanging information for service’. In: Stephanidis, C. (ed.) HCII 2019. CCIS, vol. 1032, pp. 225–232. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-23522-2_29
Zhao, V., Zhang, L., Wang, B., Lu, S., Ur, B.: Visualizing differences to improve end-user understanding of trigger-action programs. In: CHI EA 2020 (2020)
Zheng, S., Apthorpe, N., Chetty, M., Feamster, N.: User perceptions of smart home IoT privacy. Proc. ACM Hum. Comput. Interact. 2, 1–20 (2018)
Acknowledgements
This work was partially supported by the Wallenberg AI, Autonomous Systems and Software Program (WASP) funded by the Knut and Alice Wallenberg Foundation. I would like to thank my supervisor Simone Fischer-Hübner and my co-supervisor Farzaneh Karegar for their helpful feedback and advice who together with Victor Morel also helped with conducting the focus groups and thematic analysis.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
A Appendix
A Appendix
Rights and permissions
Copyright information
© 2024 IFIP International Federation for Information Processing
About this paper
Cite this paper
Romare, P. (2024). User-Driven Privacy Factors in Trigger-Action Apps: A Comparative Analysis with General IoT. In: Bieker, F., de Conca, S., Gruschka, N., Jensen, M., Schiering, I. (eds) Privacy and Identity Management. Sharing in a Digital World. Privacy and Identity 2023. IFIP Advances in Information and Communication Technology, vol 695. Springer, Cham. https://doi.org/10.1007/978-3-031-57978-3_16
Download citation
DOI: https://doi.org/10.1007/978-3-031-57978-3_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-57977-6
Online ISBN: 978-3-031-57978-3
eBook Packages: Computer ScienceComputer Science (R0)