Start Date

16-8-2018 12:00 AM

Description

The Internet of Things (IoT) has entered public awareness due mostly to using IoT devices for creating smart homes. Although IoT provides numerous benefits due to increased information and control, the technology also introduces various vulnerabilities. IoT vendors have rushed products to market with little concern for security or privacy implications. Humans are the weakest link, but there are few opportunities to introduce preventative interventions for mitigating potential security breaches in home contexts. Part of the solution is identifying users' concerns related to the privacy of their IoT-managed information and examining how those concerns are weighed in IoT adoption decisions. In this research, we aim to examine the privacy concerns of IoT users in light of the increased data disclosure that is often central to the utility of IoT devices. We propose an experimental design capturing users' privacy perceptions as well as the actual privacy allowances on their mobile devices.

Share

COinS
 
Aug 16th, 12:00 AM

Investigating Privacy Concerns of Internet of Things (IoT) Users

The Internet of Things (IoT) has entered public awareness due mostly to using IoT devices for creating smart homes. Although IoT provides numerous benefits due to increased information and control, the technology also introduces various vulnerabilities. IoT vendors have rushed products to market with little concern for security or privacy implications. Humans are the weakest link, but there are few opportunities to introduce preventative interventions for mitigating potential security breaches in home contexts. Part of the solution is identifying users' concerns related to the privacy of their IoT-managed information and examining how those concerns are weighed in IoT adoption decisions. In this research, we aim to examine the privacy concerns of IoT users in light of the increased data disclosure that is often central to the utility of IoT devices. We propose an experimental design capturing users' privacy perceptions as well as the actual privacy allowances on their mobile devices.