skip to main content
research-article

PARROT: Interactive Privacy-Aware Internet of Things Application Design Tool

Published: 28 March 2023 Publication History

Abstract

Internet of Things (IoT) applications typically collect and analyse personal data that is categorised as sensitive or special category of personal data. These data are subject to a higher degree of protection under data privacy laws. Regardless of legal requirements to support privacy practices, such as in Privacy by Design (PbD) schemes, these practices are not yet commonly followed by software developers. The difficulty of developing privacy-preserving applications emphasises the importance of exploring the problems developers face to embed privacy techniques, suggesting the need for a supporting tool. An interactive IoT application design tool - PARROT (PrivAcy by design tool foR inteRnet Of Things) - is presented. This tool helps developers to design privacy-aware IoT applications, taking account of privacy compliance during the design process and providing real-time feedback on potential privacy violations. A user study with 18 developers was conducted, comprising a semi-structured interview and a design exercise to understand how developers typically handle privacy within the design process. Collaboration with a privacy lawyer was used to review designs produced by developers to uncover privacy limitations that could be addressed by developing a software tool. Based on the findings, a proof-of-concept prototype of PARROT was implemented and evaluated in two controlled lab studies. The outcome of the study indicates that IoT applications designed with PARROT addressed privacy concerns better and managed to reduce several of the limitations identified. From a privacy compliance perspective, PARROT helps developers to address compliance requirements throughout the design and testing process. This is achieved by incorporating privacy specific design features into the IoT application from the beginning rather than retrospectively. (Demo Video).

Supplemental Material

ZIP File - alhirabi
Supplemental movie, appendix, image and software files for, PARROT: Interactive Privacy-Aware Internet of Things Application Design Tool

References

[1]
Yasemin Acar, Sascha Fahl, and Michelle L Mazurek. 2016. You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users. In 2016 IEEE Cybersecurity Development (SecDev). 3--8. https://doi.org/10.1109/SecDev.2016.013
[2]
Pierre A Akiki, Arosha K Bandara, and Yijun Yu. 2017. Visual Simple Transformations: Empowering End-Users to Wire Internet of Things Objects. ACM Trans. Comput.-Hum. Interact 24, 10 (2017). https://doi.org/10.1145/3057857
[3]
Nada Alhirabi, Omer Rana, and Charith Perera. 2021. Security and Privacy Requirements for the Internet of Things: A Survey. ACM Trans. Internet Things 2, 1 (feb 2021). https://doi.org/10.1145/3437537
[4]
Majedah Alrehiely, Parisa Eslambolchilar, and Rita Borgo. 2018. Evaluating Different Visualization Designs for Personal Health Data. April (2018). https://doi.org/10.14236/ewic/hci2018.205
[5]
Oshrat Ayalon, Eran Toch, Irit Hadar, and Michael Birnhack. 2017. How developers make design decisions about Users' Privacy: The place of professional communities and organizational climate. CSCW 2017 - Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (2017), 135--138. https://doi.org/10.1145/3022198.3026326
[6]
Barbara Rita Barricelli, Fabio Cassano, Daniela Fogli, and Antonio Piccinno. 2019. End-user development, end-user programming and end-user software engineering: A systematic mapping study. The Journal of Systems and Software 149 (2019), 101--137. https://doi.org/10.1016/j.jss.2018.11.041
[7]
Alex Barth, Emmanuel Caillaud, Bertrand Rose, and Others. 2011. How to validate research in engineering design?. In DS 68--2: Proceedings of the 18th International Conference on Engineering Design (ICED 11), Impacting Society through Engineering Design, Vol. 2: Design Theory and Research Methodology, Lyngby/Copenhagen, Denmark, 15.-19.08. 2011. 41--50.
[8]
Michael Blackstock and Rodger Lea. 2014. Toward a Distributed Data Flow Platform for the Web of Things (Distributed Node-RED). In Proceedings of the 5th International Workshop on Web of Things (WoT '14). Association for Computing Machinery, New York, NY, USA, 34--39. https://doi.org/10.1145/2684432.2684439
[9]
Joel Brandt, Mira Dontcheva, Marcos Weskamp, and Scott R Klemmer. 2010. Example-Centric Programming: Integrating Web Search into the Development Environment. Association for Computing Machinery, New York, NY, USA, 513--522. https://doi.org/10.1145/1753326.1753402
[10]
Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77--101.
[11]
Justine Brown. 2017. Why is IoT talent so hard to find? https://www.ciodive.com/news/why-is-iot-talent-so-hard-to-find/449576/
[12]
Jerome Seymour Bruner and Others. 1966. Toward a theory of instruction. Vol. 59. Harvard University Press.
[13]
Lee A Bygrave. 2017. Data protection by design and by default: Deciphering the EU's legislative requirements. Oslo Law Review 4, 02 (2017), 105--120.
[14]
Ann Cavoukian. 2009. Privacy by design: The 7 foundational principles. Information and privacy commissioner of Ontario, Canada 5 (2009), 12.
[15]
A Cavoukian and S Kingsmill. 2016. Privacy by Design Setting a new standard for privacy certification. https://www2.deloitte.com/content/dam/Deloitte/ca/Documents/risk/ca-en-ers-privacy-by-design-brochure.PDF
[16]
Abhik Chaudhuri and Ann Cavoukian. 2018. The Proactive and Preventive Privacy (3P) Framework for IoT Privacy by Design. EDPACS 57, 1 (2018), 1--16.
[17]
Yulia Cherdantseva. 2014. Secure BPMN - a graphical extension for BPMN 2. 0 based on a Reference Model of Information Assurance & Security. Ph.D. Dissertation. Cardiff University. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.655937
[18]
Saksham Chitkara, Nishad Gothoskar, Suhas Harish, Jason I Hong, and Yuvraj Agarwal. 2017. Does this app really need my location? Context-aware privacy management for smartphones. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, 3 (2017), 1--22.
[19]
Eric S. Chung, Jason I. Hong, Lin James, Madhu K. Prabaker, James A. Landay, and Alan L. Liu. 2004. Development and evaluation of emerging design patterns for ubiquitous computing. DIS2004 - Designing Interactive Systems: Across the Spectrum (2004), 233--242. https://doi.org/10.1145/1013115.1013148
[20]
CMS. 2021. GDPR Enforcement Tracker - List of GDPR Fines' (2021). https://www.enforcementtracker.com/
[21]
CNIL. 2021. The open source PIA software helps to carry out data protection impact assessment. https://www.cnil.fr/en/home
[22]
Collaboration. 2015. Privacy patterns org. https://privacypatterns.org/
[23]
Collaboration. 2016. Privacy patterns-collecting patterns for better privacy. https://privacypatterns.eu/#/?limit=6&offset=0
[24]
Fulvio Corno, Luigi De Russis, and Alberto Monge Roffarello. 2019. My IoT Puzzle: Debugging IF-THEN Rules Through the Jigsaw Metaphor. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11553 LNCS. Springer Verlag, 18--33. https://doi.org/10.1007/978-3-030-24781-2_2
[25]
George Danezis, Josep Domingo-Ferrer, Marit Hansen, Jaap-Henk Hoepman, Daniel Le Metayer, Rodica Tirtea, and Stefan Schiffner. 2015. Privacy and data protection by design-from policy to engineering. arXiv preprint arXiv:1501.03726 (2015).
[26]
Mina Deng, Kim Wuyts, Riccardo Scandariato, Bart Preneel, and Wouter Joosen. 2011. A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements. Requirements Engineering 16, 1 (2011), 3--32. https://doi.org/10.1007/s00766-010-0115-7
[27]
Paloma Díaz, Ignacio Aedo, Mary Beth Rosson, and John M Carroll. 2010. A visual tool for using design patterns as pattern languages. In Proceedings of the International Conference on Advanced Visual Interfaces. ACM, 67--74.
[28]
Paloma Díaz, Ignacio Aedo, Daniel Sanz, and Alessio Malizia. 2008. A model-driven approach for the visual specification of Role-Based Access Control policies in web systems. Proceedings - 2008 IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC 2008 (2008), 203--210. https://doi.org/10.1109/VLHCC.2008.4639087
[29]
Alan Dix and Geoffrey Ellis. 1998. Starting simple: adding value to static visualisation through simple interaction. In Proceedings of the working conference on Advanced visual interfaces. 124--134.
[30]
Tore Dybå and Torgeir Dingsøyr. 2008. Strength of Evidence in Systematic Reviews in Software Engineering. ESEM'08: Proceedings of the 2008 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement 7465 (2008), 178--187. https://doi.org/10.1145/1414004.1414034
[31]
EDPB. 2021. Binding decision 1/2021 on the dispute arisen on the draft decision of the Irish Supervisory Authority regarding WhatsApp Ireland under Article 65(1)(a) GDPR. https://edpb.europa.eu/our-work-tools/our-documents/binding-decision-board-art-65/binding-decision-12021-dispute-arisen_en
[32]
Dorothy Forbes. 2013. Blinding: An essential component in decreasing risk of bias in experimental designs. Evidence-Based Nursing 16, 3 (2013), 70--71. https://doi.org/10.1136/eb-2013-101382
[33]
Abdur Rahim Mohammad Forkan, Geoff Kimm, Ahsan Morshed, Prem Prakash Jayaraman, Abhik Banerjee, and Weidong Huang. 2019. AqVision: A tool for air quality data visualisation and pollution-free route tracking for smart city. Proceedings - 2019 23rd International Conference in Information Visualization - Part II, IV-2 2019 (2019), 47--51. https://doi.org/10.1109/IV-2.2019.00018
[34]
GDPR. 2018. Art. 83 GDPR. General conditions for imposing administrative fines. Technical Report. https://gdpr-text.com/read/article-83/
[35]
David Geer. 2010. Are companies actually using secure development life cycles? Computer 43, 6 (2010), 12--16.
[36]
Daniel Le Métayer George Danezis, Josep Domingo-Ferrer, Marit Hansen, Jaap-Henk Hoepman and Stefan Schiffner Rodica Tirtea. 2014. Data Protection by Design - From Policy to Engineering (European Union Agency for Network and Information Security 2014). Technical Report. https://www.enisa.europa.eu/publications/privacy-and-data-protection-by-design
[37]
Giacomo Ghidini, Vipul Gupta, and Sajal K Das. 2010. SNViz: Analysis-oriented Visualization for the Internet of Things. In IoT 2010 Workshop: The Urban Internet of Things. Citeseer.
[38]
Greg Guest, Arwen Bunce, and Laura Johnson. 2006. How Many Interviews Are Enough?: An Experiment with Data Saturation and Variability. Field Methods 18, 1 (2006), 59--82. https://doi.org/10.1177/1525822X05279903
[39]
Irit Hadar, Tomer Hasson, Oshrat Ayalon, Eran Toch, Michael Birnhack, Sofia Sherman, and Arod Balissa. 2018. Privacy by designers: software developers' privacy mindset. Empirical Software Engineering 23, 1 (2018), 259--289. https://doi.org/10.1007/s10664-017-9517-1
[40]
Julie M. Haney and Wayne G. Lutters. 2019. Motivating cybersecurity advocates: Implications for recruitment and retention. SIGMIS-CPR 2019-Proceedings of the 2019 Computers and People Research Conference (2019), 109--117. https://doi.org/10.1145/3322385.3322388
[41]
Richard M. Heiberger and Naomi B. Robbins. 2014. Design of diverging stacked bar charts for Likert scales and other applications. Journal of Statistical Software 57, 5 (2014), 1--32. https://doi.org/10.18637/jss.v057.i05
[42]
Michael S.H. Heng, Eileen M. Trauth, and Sven J. Fischer. 1999. Organisational champions of IT innovation. Accounting, Management and Information Technologies 9, 3 (1999), 193--222. https://doi.org/10.1016/S0959-8022(99)00008-9
[43]
Mireille Hildebrandt and Bert-Jaap Koops. 2010. The challenges of ambient law and legal protection in the profiling era. The Modern Law Review 73, 3 (2010), 428--460.
[44]
Janine S Hiller and Roberta S Russell. 2017. Privacy in Crises: The NIST Privacy Framework. Journal of Contingencies and Crisis Management 25, 1 (2017), 31--38. https://doi.org/10.1111/1468-5973.12143
[45]
Jaap-Henk Hoepman. 2014. Privacy Design Strategies. In ICT Systems Security and Privacy Protection, Nora Cuppens-Boulahia, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam, and Thierry Sans (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 446--459.
[46]
Martin Höst, Björn Regnell, and Claes Wohlin. 2000. Using students as subjects---a comparative study of students and professionals in lead-time impact assessment. Empirical Software Engineering 5, 3 (2000), 201--214.
[47]
Information Commissioner's Office (ICO). 2014. Conducting privacy impact assessments code of practice. (2014), 1--55.
[48]
Lukasz Jedrzejczyk, Blaine A Price, Arosha K Bandara, and Bashar Nuseibeh. 2010. On the impact of real-time feedback on users' behaviour in mobile location-sharing applications. In Proceedings of the Sixth Symposium on Usable Privacy and Security. 1--12.
[49]
Jeff Johnson and Austin Henderson. 2002. Conceptual models: begin by designing what to design. interactions 9, 1 (2002), 25--32.
[50]
Esther Jun, Huafei Liao, April Savoy, Liang Zeng, and Gavriel Salvendy. 2008. The design of future things, by D. A. Norman, basic books, New York, NY, USA. Vol. 18. 480--481 pages. https://doi.org/10.1002/hfm.20127
[51]
Himmet Karadal and A Mohammed Abubakar. 2021. Internet of things skills and needs satisfaction: do generational cohorts' variations matter? Online Information Review (2021).
[52]
Barbara A Kitchenham and Tore Dybå. 2004. Evidence-based Software Engineering. (2004).
[53]
Amy J Ko and Brad A Myers. 2004. Designing the Whyline: A Debugging Interface for Asking Questions about Program Behavior. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '04). Association for Computing Machinery, New York, NY, USA, 151--158. https://doi.org/Ko2004
[54]
Abhishek Kumar, Tristan Braud, Young D Kwon, and Pan Hui. 2020. Aquilis: Using contextual integrity for privacy protection on mobile devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4, 4 (2020), 1--28.
[55]
Sachin Kumar, Prayag Tiwari, and Mikhail Zymbler. 2019. Internet of Things is a revolutionary approach for future technology enhancement: a review. Journal of Big Data 6, 1 (2019). https://doi.org/10.1186/s40537-019-0268-2
[56]
Germán Leiva, Nolwenn Maudet, Wendy Mackay, and Michel Beaudouin-Lafon. 2019. Enact: Reducing designer-developer breakdowns when prototyping custom interactions. ACM Transactions on Computer-Human Interaction (TOCHI) 26, 3 (2019), 1--48.
[57]
Tianshi Li, Yuvraj Agarwal, and Jason I. Hong. 2018. Coconut: An IDE Plugin for Developing Privacy-Friendly Apps. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 4, Article 178 (Dec 2018), 35 pages. https://doi.org/10.1145/3287056
[58]
Tianshi Li, Elizabeth Louie, Laura Dabbish, and Jason I. Hong. 2021. How Developers Talk About Personal Data and What It Means for User Privacy. Proceedings of the ACM on Human-Computer Interaction 4, CSCW3 (2021), 1--28. https://doi.org/10.1145/3432919
[59]
Diego Martin, Ramon Alcarria, Tomas Robles, and Augusto Morales. 2013. A systematic approach for service prosumerization in IoT scenarios. Proceedings - 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013 (2013), 494--499. https://doi.org/10.1109/IMIS.2013.89
[60]
Yod Samuel Martín García and José María del Álamo Ramiro. 2017. A metamodel for privacy engineering methods. CEUR Workshop Proceedings.
[61]
Roberto Martinez-Maldonado, Andrew Clayphan, Kalina Yacef, and Judy Kay. 2014. MTFeedback: providing notifications to enhance teacher awareness of small group work in the classroom. IEEE Transactions on Learning Technologies 8, 2 (2014), 187--200.
[62]
Ben Mathews and Delphine Collin-Vézina. 2016. Data for life: Wearable technology and the design of self-care. Journal of Public Health Policy 37, 3 (2016), 304--314. https://doi.org/10.1057/jphp.2016.21
[63]
Matthew B Miles, A Michael Huberman, and Johnny Saldaña. 2018. Qualitative data analysis: A methods sourcebook. Sage publications.
[64]
Daniel L. Moody, Patrick Heymans, and Raimundas Matulevičius. 2010. Visual syntax does matter: Improving the cognitive effectiveness of the i visual notation. Requirements Engineering 15, 2 (2010), 141--175. https://doi.org/10.1007/s00766-010-0100-1
[65]
Duc Cuong Nguyen, Dominik Wermke, Yasemin Acar, Michael Backes, Security Lancaster, and Sascha Fahl. 2017. A Stitch in Time: Supporting Android Developers in Writing Secure Code Charles Weir. (2017). https://doi.org/10.1145/3133956.3133977
[66]
Marie Caroline Oetzel and Sarah Spiekermann. 2014. A systematic methodology for privacy impact assessments: a design science approach. European Journal of Information Systems 23, 2 (2014), 126--150.
[67]
Avi Parush. 2015. Conceptual Design for Interactive Systems Designing for Performance and User Experience. Morgan Kaufmann, Boston, 164. https://doi.org/10.1016/B978-0-12-419969-9.09992-7
[68]
Charith Perera. 2017. Privacy Guidelines for Internet of Things: A Cheat Sheet. (2017), 1--9. http://arxiv.org/abs/1708.05261
[69]
Charith Perera, Mahmoud Barhamgi, Arosha K Bandara, Muhammad Ajmal, Blaine Price, and Bashar Nuseibeh. 2020. Designing privacy-aware internet of things applications. Information Sciences 512 (2020), 238--257. https://doi.org/10.1016/j.ins.2019.09.061
[70]
Charith Perera, Ciaran McCormick, Arosha K. Bandara, Blaine A. Price, and Bashar Nuseibeh. 2016. Privacy-by-design framework for assessing internet of things applications and platforms. ACM International Conference Proceeding Series 07-09-Nove (2016), 83--92. https://doi.org/10.1145/2991561.2991566
[71]
Ferry Pramudianto, Carlos Alberto Kamienski, Eduardo Souto, Fabrizio Borelli, Lucas L. Gomes, Djamel Sadok, and Matthias Jarke. 2014. IoT Link: An Internet of Things Prototyping Toolkit. In 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops. 1--9. https://doi.org/10.1109/UIC-ATC-ScalCom.2014.95
[72]
Insan Laksana Pribadi and Muhammad Suryanegara. 2017. Regulatory recommendations for IoT smart-health care services by using privacy impact assessment (PIA). In 2017 15th International Conference on Quality in Research (QiR): International Symposium on Electrical and Computer Engineering. IEEE, 491--496.
[73]
Keith F Punch. 2013. Introduction to social research: Quantitative and qualitative approaches. Sage publications.
[74]
Shirley Radack. 2009. The system development life cycle (sdlc). Technical Report. National Institute of Standards and Technology.
[75]
Lyn Richards. 2020. Handling qualitative data: A practical guide. Sage publications.
[76]
Simone Romano, Davide Fucci, Giuseppe Scanniello, Maria Teresa Baldassarre, Burak Turhan, and Natalia Juristo. 2021. On researcher bias in Software Engineering experiments. Journal of Systems and Software 182 (2021), 111068. https://doi.org/10.1016/j.jss.2021.111068
[77]
Nayan B Ruparelia. 2010. Software development lifecycle models. ACM SIGSOFT Software Engineering Notes 35, 3 (2010), 8--13.
[78]
Iflaah Salman, Ayse Tosun Misirli, and Natalia Juristo. 2015. Are students representatives of professionals in software engineering experiments? Proceedings - International Conference on Software Engineering 1 (2015), 666--676. https://doi.org/10.1109/ICSE.2015.82
[79]
Panagiotis Sarigiannidis, Eirini Karapistoli, and Anastasios A. Economides. 2015. VisIoT: A threat visualisation tool for IoT systems security. 2015 IEEE International Conference on Communication Workshop, ICCW 2015 (2015), 2633--2638. https://doi.org/10.1109/ICCW.2015.7247576
[80]
Awanthika Senarath and Nalin A.G. Arachchilage. 2018. Why developers cannot embed privacy into software systems? An empirical investigation. ACM International Conference Proceeding Series Part F1377 (2018). https://doi.org/10.1145/3210459.3210484
[81]
Awanthika Senarath, Marthie Grobler, and Nalin Asanka Gamagedara Arachchilage. 2019. Will they use it or not? Investigating software developers' intention to follow privacy engineering methodologies. ACM Transactions on Privacy and Security 22, 4 (2019). https://doi.org/10.1145/336422
[82]
Laurens Sion, Pierre Dewitte, Dimitri Van Landuyt, Kim Wuyts, Ivo Emanuilov, Peggy Valcke, and Wouter Joosen. 2019. An architectural view for data protection by design. Proceedings - 2019 IEEE International Conference on Software Architecture, ICSA 2019 i (2019), 11--20. https://doi.org/10.1109/ICSA.2019.00010
[83]
Spanish Data Protection Agency. 2019. A Guide to Privacy by Design. Number october. https://www.aepd.es/sites/default/files/2019-12/guia-privacidad-desde-diseno_en.pdf
[84]
S Steffee. 2017. IOT HELP WANTED: A lack of Internet of Things knowledge-and skills-leaves businesses struggling to recruit talent. Internal Auditor 74, 5 (2017), 11--13.
[85]
Mohammad Tahaei, Alisa Frik, and Kami Vaniea. 2021. Privacy champions in sofware teams: Understanding their motivations, strategies, and challenges. Conference on Human Factors in Computing Systems - Proceedings (2021). https://doi.org/10.1145/3411764.3445768
[86]
Mohammad Tahaei, Li Tianshi, and Vaniea. Kami. 2022. Understanding Privacy-Related Advice on Stack Overflow. Proceedings on Privacy Enhancing Technologies 2022, 2 (2022), 1--5. https://doi.org/10.2478/popets-2022-0032
[87]
The Court of Justice and of the European Union. 2020. C-311/18 - Facebook Ireland and Schrems. https://curia.europa.eu/juris/liste.jsf?num=C-311/18
[88]
The Members and staff of the European Parliament. 2020. The CJEU judgment in the Schrems II case. https://www.europarl.europa.eu/RegData/etudes/ATAG/2020/652073/EPRS_ATA(2020)652073_EN.pdf
[89]
Soe Ye Yint Tun, Samaneh Madanian, and Farhaan Mirza. 2021. Internet of things (IoT) applications for elderly care: a reflective review. Aging Clinical and Experimental Research 33, 4 (2021), 855--867. https://doi.org/10.1007/s40520-020-01545-9
[90]
Council of the European Union and European Parliament. 2016. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (Text with EEA relevance). https://op.europa.eu/en/publication-detail/-/publication/3e485e15-11bd-11e6-ba9a-01aa75ed71a1
[91]
Onoriode Uviase and Gerald Kotonya. 2018. IoT architectural framework: Connection and integration framework for IoT systems. Electronic Proceedings in Theoretical Computer Science, EPTCS 264 (2018), 1--17. https://doi.org/10.4204/EPTCS.264.1
[92]
Ovidiu Vermesan and Peter Friess. 2013. Internet of things: converging technologies for smart environments and integrated ecosystems. River publishers.
[93]
Ovidiu Vermesan, Peter Friess, Patrick Guillemin, Sergio Gusmeroli, Harald Sundmaeker, Alessandro Bassi, Ignacio Soler Jubert, Margaretha Mazura, Mark Harrison, Markus Eisenhauer, et al. 2011. Internet of things strategic research roadmap. Internet of things-global technological and societal trends 1, 2011 (2011), 9--52.
[94]
Sandra Wachter. 2018. Normative challenges of identification in the Internet of Things: Privacy, profiling, discrimination, and the GDPR. Computer law & security review& security review 34, 3 (2018), 436--449.
[95]
Wirewheel. 2021. Data Privacy Laws in 2021: What You Need to Know. https://wirewheel.io/data-privacy-laws-guide/
[96]
Steven A. Wright. 2019. Privacy in IoT Blockchains: With Big Data comes Big Responsibility. Proceedings - 2019 IEEE International Conference on Big Data, Big Data 2019 (2019), 5282--5291. https://doi.org/10.1109/BigData47090.2019.9006341
[97]
Kim Wuyts. 2015. Privacy Threats in Software Architectures. Ph.D. Dissertation. https://lirias.kuleuven.be/retrieve/295669
[98]
Shea Tinn Yeh and Cathalina Fontenelle. 2012. Usability study of a mobile website: The Health Sciences Library, University of Colorado Anschutz Medical Campus, experience. Journal of the Medical Library Association 100, 1 (2012), 64--68. https://doi.org/10.3163/1536-5050.100.1.012
[99]
Gail A. Zieman. 2012. Participant observation. Action Research Methods: Plain and Simple (2012), 49--67. https://doi.org/10.1057/9781137046635

Cited By

View all
  • (2024)Empowering IoT Developers with Privacy-Preserving End-User Development ToolsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36785888:3(1-47)Online publication date: 9-Sep-2024
  • (2024)Designing Privacy-Aware IoT Applications for Unregulated DomainsACM Transactions on Internet of Things10.1145/36484805:2(1-32)Online publication date: 23-Apr-2024
  • (2024)Safeguarding Privacy in Government Integrated Systems: Secure Architectural Solutions2024 IEEE 7th International Conference on Computer and Communication Engineering Technology (CCET)10.1109/CCET62233.2024.10837740(86-91)Online publication date: 16-Aug-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 7, Issue 1
March 2023
1243 pages
EISSN:2474-9567
DOI:10.1145/3589760
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 March 2023
Published in IMWUT Volume 7, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Data Protection
  2. Human-centered Methods
  3. Interactive Tools
  4. Internet of Things
  5. IoT Design
  6. IoT Privacy
  7. Privacy Laws
  8. Privacy by Design
  9. Software Design
  10. Software Developers

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • EPSRC
  • PACE
  • King Saud University

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)265
  • Downloads (Last 6 weeks)14
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Empowering IoT Developers with Privacy-Preserving End-User Development ToolsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36785888:3(1-47)Online publication date: 9-Sep-2024
  • (2024)Designing Privacy-Aware IoT Applications for Unregulated DomainsACM Transactions on Internet of Things10.1145/36484805:2(1-32)Online publication date: 23-Apr-2024
  • (2024)Safeguarding Privacy in Government Integrated Systems: Secure Architectural Solutions2024 IEEE 7th International Conference on Computer and Communication Engineering Technology (CCET)10.1109/CCET62233.2024.10837740(86-91)Online publication date: 16-Aug-2024

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media