ABSTRACT
Home assistants such as Amazon's Echo and Google's Home have become a common household item. In this paper we investigate if and what consumers have reported online (in the form of reviews) related to privacy and security after purchasing or using these devices.
We use natural language processing to first identify privacy and security related reviews, and then to investigate the topics consumers discuss within the reviews. We were interested in understanding consumers' major concerns.
Issues and/or concerns related to security and privacy have have been reported within reviews; however, these topics only account for 2% of the total reviews given for these devices. Three major concerns were highlighted in our findings: data collection and scope, "creepy" device behavior, and violations of personal privacy thresholds.
- Alessandro Acquisti and Jens Grossklags. 2005. Privacy and rationality in individual decision making. IEEE Security & Privacy 2 (2005), 24--30. Google ScholarDigital Library
- Charu C. Aggarwal and ChengXiang Zhai. 2012. Mining text data. Springer Science & Business Media. Google ScholarDigital Library
- Strategy Analytics. 2017. Smart Speakers: Sales Head towards 24 Million in 2017 Despite Confusing Array of Choice. (October 2017). http://sa-link.cc/1lqGoogle Scholar
- Steven Bird, Edward Loper, and Ewan Klein. 2009. Natural Language Processing with Python. O'Reilly Media Inc. Google ScholarDigital Library
- Louis Columbus. 2016. Roundup Of Internet Of Things Forecasts And Market Estimates. (2016).Google Scholar
- Federal Trade Commission and others. 2015. Internet of things: Privacy & security in a connected world. (2015).Google Scholar
- Brian Krebs. 2016. KrebsOnSecurity Hit With Record DDoS. (2016).Google Scholar
- Pedro G. Leon, Ashwini Rao, Florian Schaub, Abigail Marsh, and Lorrie F. Cranor. 2015. Why people are (Un) willing to share information with online advertisers. Technical Report Carnegie Mellon University-ISR-15-106, Carnegie Mellon University (2015).Google Scholar
- Christopher Mele. 2016. Bid for Access to Amazon Echo Audio in Murder Case Raises Privacy Concerns. The New York Times (Dec 2016).Google Scholar
- Florian Michahelles and Stephan Karpischek. 2010. What can the Internet of Things do for the citizen (CIoT). IEEE Pervasive Computing 10 (2010), 102--104. Google ScholarDigital Library
- Scott R. Peppet. 2015. Regulating the Internet of Things : First Steps. Texas Law Review 93, 85 (2015).Google Scholar
- Lee Rainie and Maeve Duggan. 2016. Americans' opinions on privacy and information sharing. Technical Report. Pew Research Center.Google Scholar
- Joel R Reidenberg. 2005. Disagreeable Privacy Policies: Mismatches Between Meaning and User's Understanding. Erasmus November (2005).Google Scholar
- Irina Shklovski, Scott D. Mainwaring, Halla Hrund Skúladóttir, and Höskuldur Borgthorsson. 2014. Leakiness and Creepiness in App Space: Perceptions of Privacy and Mobile App Use. Proc. CHI'14 (2014). Google ScholarDigital Library
- Rick Wash. 2010. Folk Models of Home Computer Security. In Proc. SOUPS'10. ACM, Article 11, 11:1--11:16 pages. Google ScholarDigital Library
Index Terms
- Consumer Attitudes Towards Privacy and Security in Home Assistants
Recommendations
Exploring How Privacy and Security Factor into IoT Device Purchase Behavior
CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing SystemsDespite growing concerns about security and privacy of Internet of Things (IoT) devices, consumers generally do not have access to security and privacy information when purchasing these devices. We interviewed 24 participants about IoT devices they ...
Secure and privacy preserving IoT gateway for home automation
Highlights- Addressing security and privacy issues in IoT devices in a scalable way
- ...
AbstractInternet of Things (IoT) applications have become widely popular for academic and industrial purposes in recent years. One of the most important applications in IoT is Home Automation Systems. Home Automation Systems consist of a ...
Graphical AbstractDisplay Omitted
Privacy and Security Challenges in Internet of Things
ICDCIT 2015: Proceedings of the 11th International Conference on Distributed Computing and Internet Technology - Volume 8956Internet of Things IoT envisions as a global network, connecting any objects around us, ranging from home appliances, wearable things to military applications. With IoT infrastructure, physical objects such as wearable objects, television, refrigerator, ...
Comments