skip to main content
10.1145/3313831.3376585acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

I'm All Eyes and Ears: Exploring Effective Locators for Privacy Awareness in IoT Scenarios

Published: 23 April 2020 Publication History

Abstract

With the proliferation of IoT devices, there are growing concerns about being sensed or monitored by these devices unawares, especially in places perceived as private. We explore the design space of IoT locators to help people physically find nearby IoT devices. We first conducted a survey to understand people's willingness, current practices, and challenges in finding IoT devices. Our survey findings motivated us to design and implement low-cost locators (visual, auditory, and contextualized pictures) to help people find nearby devices. Through an iterative design process and two rounds of experiments, we found that these locators greatly reduced people's search time over a baseline of no locators. Many participants found the visual and auditory locators enjoyable. Some participants also appropriated the use of our system for other purposes, e.g., to learn about new IoT devices, instead of for privacy awareness.

References

[1]
2017. Signifiers.io. (2017). http://signifiers.io/
[2]
2018. Reddit | Found Hidden Camera in AirBnb. (2018). https://www.reddit.com/r/legaladvice/comments/8f33z1/found_hidden_camera_in_airbnb_seattle_wa/
[3]
2019. Hacker News | How to increase your chances of finding a hidden camera. (2019). https://news.ycombinator.com/item?id=19600135
[4]
2019. Reddit | An Airbnb I recently stayed at had hidden cameras in the bedrooms, my friends and I were recorded having sex. (2019). https://old.reddit.com/r/legaladvice/comments/cx5uzr/an_airbnb_i_recently_stayed_at_had_hidden_cameras/
[5]
Noah Apthorpe, Yan Shvartzshnaider, Arunesh Mathur, Dillon Reisman, and Nick Feamster. 2018. Discovering smart home internet of things privacy norms using contextual integrity. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 2 (2018), 59.
[6]
Till Ballendat, Nicolai Marquardt, and Saul Greenberg. 2010. Proxemic interaction: designing for a proximity and orientation-aware environment. In ACM International Conference on Interactive Tabletops and Surfaces. ACM, 121--130.
[7]
Lyn Bartram, Abhisekh Patra, and Maureen Stone. 2017. Affective color in visualization. In Proceedings of the 2017 CHI conference on human factors in computing systems. ACM, 1364--1374.
[8]
Victoria Bellotti and Abigail Sellen. 1993. Design for privacy in ubiquitous computing environments. In Proceedings of the Third European Conference on Computer-Supported Cooperative Work 13--17 September 1993, Milan, Italy ECSCW'93. Springer, 77--92.
[9]
Cheng Bo, Guobin Shen, Jie Liu, Xiang-Yang Li, YongGuang Zhang, and Feng Zhao. 2014. Privacy. tag: Privacy concern expressed and respected. In Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems. ACM, 163--176.
[10]
Andreas Butz, Michael Schneider, and Mira Spassova. 2004. Searchlight--a lightweight search function for pervasive environments. In International Conference on Pervasive Computing. Springer, 351--356.
[11]
Sam Byford. 2019. Apple stops letting contractors listen to Siri voice recordings and will offer opt-out later. (2019). https://www.theverge.com/2019/8/2/20751270/apple-stopscontractors-siri-voice-recordings-privacy-opt-out
[12]
Anadi Chaman, Jiaming Wang, Jiachen Sun, Haitham Hassanieh, and Romit Roy Choudhury. 2018. Ghostbuster: Detecting the Presence of Hidden Eavesdroppers. In MobiCom. 337--351.
[13]
Eun Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly Harrison, and Julie A Kientz. 2011. Living in a glass house: a survey of private moments in the home. In Proceedings of the 13th international conference on Ubiquitous computing. ACM, 41--44.
[14]
Eun Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly Harrison, Shwetak N Patel, and Julie A Kientz. 2012. Investigating receptiveness to sensing and inference in the home using sensor proxies. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing. ACM, 61--70.
[15]
Federal Trade Commission and others. 2015. Careful Connections: Building Security in the Internet of Things. (2015).
[16]
Dianne Cyr, Milena Head, and Hector Larios. 2010. Colour appeal in website design within and across cultures: A multi-method evaluation. International journal of human-computer studies 68, 1--2 (2010), 1--21.
[17]
Serge Egelman, Raghudeep Kannavara, and Richard Chow. 2015. Is this thing on?: Crowdsourcing privacy indicators for ubiquitous sensing platforms. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 1669--1678.
[18]
Pardis Emami Naeini, Martin Degeling, Lujo Bauer, Richard Chow, Lorrie Faith Cranor, Mohammad Reza Haghighat, and Heather Patterson. 2018. The Influence of Friends and Experts on Privacy Decision Making in IoT Scenarios. Proceedings of the ACM on Human-Computer Interaction 2, CSCW (2018), 48.
[19]
Michael Fagan, Katerina Megas, Karen Scarfone, and Matthew Smith. 2019. Core Cybersecurity Feature Baseline for Securable IoT Devices: A Starting Point for IoT Device Manufacturers. Technical Report. National Institute of Standards and Technology.
[20]
Markus Funk, Robin Boldt, Bastian Pfleging, Max Pfeiffer, Niels Henze, and Albrecht Schmidt. 2014. Representing indoor location of objects on wearable computers with head-mounted displays. In Proceedings of the 5th Augmented Human International Conference. ACM, 18.
[21]
Chris Harrison, John Horstman, Gary Hsieh, and Scott Hudson. 2012. Unlocking the expressivity of point lights. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1683--1692.
[22]
Sandra G Hart and Lowell E Staveland. 1988. Development of NASA-TLX (Task Load Index): Results of empirical and theoretical research. In Advances in psychology. Vol. 52. Elsevier, 139--183.
[23]
Jason Hong. 2017. The privacy landscape of pervasive computing. IEEE Pervasive Computing 16, 3 (2017), 40--48.
[24]
Roberto Hoyle, Robert Templeman, Steven Armes, Denise Anthony, David Crandall, and Apu Kapadia. 2014. Privacy behaviors of lifeloggers using wearable cameras. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 571--582.
[25]
Gavin Jancke, Gina Danielle Venolia, Jonathan Grudin, Jonathan J Cadiz, and Anoop Gupta. 2001. Linking public spaces: technical and social issues. In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, 530--537.
[26]
Shigenobu Kobayashi. 1981. The aim and method of the color image scale. Color research & application 6, 2 (1981), 93--107.
[27]
Mizuho Komatsuzaki, Koji Tsukada, Itiro Siio, Pertti Verronen, Mika Luimula, and Sakari Pieskä. 2011. IteMinder: finding items in a room using passive RFID tags and an autonomous robot (poster). In Proceedings of the 13th international conference on Ubiquitous computing. ACM, 599--600.
[28]
Marc Langheinrich. 2002. A privacy awareness system for ubiquitous computing environments. In international conference on Ubiquitous Computing. Springer, 237--245.
[29]
Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, are you listening?: Privacy perceptions, concerns and privacy-seeking behaviors with smart speakers. Proceedings of the ACM on Human-Computer Interaction 2, CSCW (2018), 102.
[30]
Scott Lederer, Jason I Hong, Anind K Dey, and James A Landay. 2004. Personal privacy through understanding and action: five pitfalls for designers. Personal and ubiquitous computing 8, 6 (2004), 440--454.
[31]
Scott Lederer, Jennifer Mankoff, and Anind K Dey. 2003. Who wants to know what when? privacy preference determinants in ubiquitous computing. In CHI'03 extended abstracts on Human factors in computing systems. ACM, 724--725.
[32]
Hosub Lee and Alfred Kobsa. 2016. Understanding user privacy in Internet of Things environments. In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, 407--412.
[33]
Chunyuan Liao, François Guimbretière, and Corinna E Loeckenhoff. 2006. Pen-top feedback for paper-based interfaces. In Proceedings of the 19th annual ACM symposium on User interface software and technology. ACM, 201--210.
[34]
Nicole Lindsey. 2019. Consumers Still Concerned About IoT Security and Privacy Issues. (2019). https://www.cpomagazine.com/data-privacy/consumers-stillconcerned-about-iot-security-and-privacy-issues/
[35]
Tian Liu, Ziyu Liu, Jun Huang, Rui Tan, and Zhen Tan. 2018. Detecting Wireless Spy Cameras Via Stimulating and Probing. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services. ACM, 243--255.
[36]
Ying Luo, Shuiming Ye, and S Cheung Sen-Ching. 2010. Anonymous subject identification in privacy-aware video surveillance. In 2010 IEEE International Conference on Multimedia and Expo. IEEE, 83--88.
[37]
Thomas J Madden, Kelly Hewett, and Martin S Roth. 2000. Managing images in different cultures: A cross-national study of color meanings and preferences. Journal of international marketing 8, 4 (2000), 90--107.
[38]
Mike Masnick. 2003. Korea Requires Camera Phone To Add Shutter Sound. (2003). https://www.techdirt.com/articles/20031111/099242.shtml
[39]
Simon Moncrieff, Svetha Venkatesh, and Geoff West. 2007. Dynamic privacy in a smart house environment. In 2007 IEEE International Conference on Multimedia and Expo. IEEE, 2034--2037.
[40]
Mariella Moon. 2019. Google Nest camera users can no longer disable the status light. (2019). https://www.engadget.com/2019/08/15/google-disablesnest-camera-status-light/
[41]
Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman Sadeh. 2017. Privacy expectations and preferences in an IoT world. In Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017). 399--412.
[42]
Carman Neustaedter and Saul Greenberg. 2003. The design of a context-aware home media space for balancing privacy and awareness. In International Conference on Ubiquitous Computing. Springer, 297--314.
[43]
Alfred Ng. 2019. Apple won't listen to Siri recordings without your permission anymore. (2019). https://www.cnet.com/news/apple-will-no-longer-keepsiri-recordings-for-people-to-listen/
[44]
Jens Nickels, Pascal Knierim, Bastian Könings, Florian Schaub, Björn Wiedersheim, Steffen Musiol, and Michael Weber. 2013. Find my stuff: supporting physical objects search with relative positioning. In Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing. ACM, 325--334.
[45]
Antti Oulasvirta, Aurora Pihlajamaa, Jukka Perkiö, Debarshi Ray, Taneli Vähäkangas, Tero Hasu, Niklas Vainio, and Petri Myllymäki. 2012. Long-term effects of ubiquitous surveillance in the home. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing. ACM, 41--50.
[46]
Shwetak N Patel, Jay W Summet, and Khai N Truong. 2009. Blindspot: Creating capture-resistant spaces. In Protecting Privacy in Video Surveillance. Springer, 185--201.
[47]
Rebecca S Portnoff, Linda N Lee, Serge Egelman, Pratyush Mishra, Derek Leung, and David Wagner. 2015. Somebody's watching me?: Assessing the effectiveness of webcam indicator lights. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 1649--1658.
[48]
Alisha Pradhan, Kanika Mehta, and Leah Findlater. 2018. Accessibility came by accident: use of voice-controlled intelligent personal assistants by people with disabilities. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, 459.
[49]
Stefan Saroiu and Alec Wolman. 2009. Enabling new mobile applications with location proofs. In Proceedings of the 10th workshop on Mobile Computing Systems and Applications. ACM, 3.
[50]
Jeremy Schiff, Marci Meingast, Deirdre K Mulligan, Shankar Sastry, and Ken Goldberg. 2009. Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In Protecting Privacy in Video Surveillance. Springer, 65--89.
[51]
Hamza Shaban. 2019. Airbnb refunds guest who found indoor cameras during his family's stay. (2019). https://www.washingtonpost.com/technology/2019/01/17/airbnb-refunds-guest-who-found-indoor-camerasduring-his-familys-stay/?noredirect=on
[52]
Ladan Shams, Yukiyasu Kamitani, and Shinsuke Shimojo. 2002. Visual illusion induced by sound. Cognitive Brain Research 14, 1 (2002), 147--152.
[53]
Suriyon Tansuriyavong and Shin-ichi Hanaki. 2001. Privacy protection by concealing persons in circumstantial video image. In Proceedings of the 2001 workshop on Perceptive user interfaces. ACM, 1--4.
[54]
Khai N Truong, Shwetak N Patel, Jay W Summet, and Gregory D Abowd. 2005. Preventing camera recording by designing a capture-resistant environment. In International conference on ubiquitous computing. Springer, 73--86.
[55]
Edna Ullmann-Margalit. 2008. The case of the camera in the kitchen: Surveillance, privacy, sanctions, and governance. Regulation & Governance 2, 4 (2008), 425--444.
[56]
Jehan Wickramasuriya, Mahesh Datt, Sharad Mehrotra, and Nalini Venkatasubramanian. 2004. Privacy protecting data collection in media spaces. In Proceedings of the 12th annual ACM international conference on Multimedia. ACM, 48--55.
[57]
Thomas Winkler and Bernhard Rinner. 2012. User-centric privacy awareness in video surveillance. Multimedia systems 18, 2 (2012), 99--121.
[58]
Jackie Junrui Yang and James A Landay. 2019. InfoLED: Augmenting LED Indicator Lights for Device Positioning and Communication. In Proceedings of the 32nd Annual ACM Symposium on User Interface Software and Technology. ACM, 175--187.
[59]
Eric Zeng and Franziska Roesner. 2019. Understanding and improving security and privacy in multi-user smart homes: a design exploration and in-home user study. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 159--176.
[60]
Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. 2018. User perceptions of smart home IoT privacy. Proceedings of the ACM on Human-Computer Interaction 2, CSCW (2018), 200.
[61]
Xia Zhou and Andrew T Campbell. 2014. Visible light networking and sensing. In Proceedings of the 1st ACM workshop on Hot topics in wireless. ACM, 55--60.

Cited By

View all

Index Terms

  1. I'm All Eyes and Ears: Exploring Effective Locators for Privacy Awareness in IoT Scenarios

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems
      April 2020
      10688 pages
      ISBN:9781450367080
      DOI:10.1145/3313831
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 23 April 2020

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. internet of things
      2. locator
      3. privacy awareness

      Qualifiers

      • Research-article

      Conference

      CHI '20
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

      Upcoming Conference

      CHI 2025
      ACM CHI Conference on Human Factors in Computing Systems
      April 26 - May 1, 2025
      Yokohama , Japan

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)156
      • Downloads (Last 6 weeks)9
      Reflects downloads up to 05 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media