“Most Companies Share Whatever They Can to Make Money!”: Comparing User’s Perceptions with the Data Practices of IoT Devices

Author(s):  
Mahdi Nasrullah Al-Ameen ◽  
Apoorva Chauhan ◽  
M. A. Manazir Ahsan ◽  
Huzeyfe Kocabas
Keyword(s):  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Mahdi Nasrullah Al-Ameen ◽  
Apoorva Chauhan ◽  
M.A. Manazir Ahsan ◽  
Huzeyfe Kocabas

Purpose With the rapid deployment of internet of things (IoT) technologies, it has been essential to address the security and privacy issues through maintaining transparency in data practices. The prior research focused on identifying people's privacy preferences in different contexts of IoT usage and their mental models of security threats. However, there is a dearth in existing literature to understand the mismatch between user's perceptions and the actual data practices of IoT devices. Such mismatches could lead users unknowingly sharing their private information, exposing themselves to unanticipated privacy risks. The paper aims to identify these mismatched privacy perceptions in this work. Design/methodology/approach The authors conducted a lab study with 42 participants, where they compared participants’ perceptions with the data practices stated in the privacy policy of 28 IoT devices from different categories, including health and exercise, entertainment, smart homes, toys and games and pets. Findings The authors identified the mismatched privacy perceptions of users in terms of data collection, sharing, protection and storage period. The findings revealed the mismatches between user's perceptions and the data practices of IoT devices for various types of information, including personal, contact, financial, heath, location, media, connected device, online social media and IoT device usage. Originality/value The findings from this study lead to the recommendations on designing simplified privacy notice by highlighting the unexpected data practices, which in turn, would contribute to the secure and privacy-preserving use of IoT devices.


2020 ◽  
Vol 1 (1) ◽  
Author(s):  
Kaarina Nikunen ◽  
Jenni Hokka

Welfare states have historically been built on values of egalitarianism and universalism and through high taxation that provides free education, health care, and social security for all. Ideally, this encourages participation of all citizens and formation of inclusive public sphere. In this welfare model, the public service media are also considered some of the main institutions that serve the well-being of an entire society. That is, independent, publicly funded media companies are perceived to enhance equality, citizenship, and social solidarity by providing information and programming that is driven by public rather than commercial interest. This article explores how the public service media and their values of universality, equality, diversity, and quality are affected by datafication and a platformed media environment. It argues that the embeddedness of public service media in a platformed media environment produces complex and contradictory dependencies between public service media and commercial platforms. The embeddedness has resulted in simultaneous processes of adapting to social media logics and datafication within public service media as well as in attempts to create alternative public media value-driven data practices and new public media spaces.


Author(s):  
Guruh Fajar Shidik ◽  
Edi Jaya Kusuma ◽  
Safira Nuraisha ◽  
Pulung Nurtantio Andono

2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


Nowadays, Thailand is stepping into an aging society. This research purposes developing the intelligence walking stick for the elderly in terms of the health care system by applied the IoT devices and biometric sensors in a real-time system. The heart rate, blood pressure, oxygen saturation, and temperature were measured at the finger of the elderly that holding the intelligence walking stick. All data can monitor and display on mobile devices. The intelligence walking stick system was evaluated by twenty users who are five experts and fifteen elderly in Ratchaburi province. As a result of the mean value at 4.88 and 4.85 by experts and elderly, respectively. It could be said that the development of intelligence walking stick by using IoT can help and improve the daily living of the elderly at the highest level.


2020 ◽  
Vol 24 (5) ◽  
pp. 1683-1689
Author(s):  
Umamaheswari K.M.

Author(s):  
Mais Sami Ali ◽  
Abdulkareem Abdulrahman Kadhim

2020 ◽  
Vol 14 ◽  
Author(s):  
M. Sivaram ◽  
V. Porkodi ◽  
Amin Salih Mohammed ◽  
S. Anbu Karuppusamy

Background: With the advent of IoT, the deployment of batteries with a limited lifetime in remote areas is a major concern. In certain conditions, the network lifetime gets restricted due to limited battery constraints. Subsequently, the collaborative approaches for key facilities help to reduce the constraint demands of the current security protocols. Aim: This work covers and combines a wide range of concepts linked by IoT based on security and energy efficiency. Specifically, this study examines the WSN energy efficiency problem in IoT and security for the management of threats in IoT through collaborative approaches and finally outlines the future. The concept of energy-efficient key protocols which clearly cover heterogeneous IoT communications among peers with different resources has been developed. Because of the low capacity of sensor nodes, energy efficiency in WSNs has been an important concern. Methods: Hence, in this paper, we present an algorithm for Artificial Bee Colony (ABC) which reviews security and energy consumption to discuss their constraints in the IoT scenarios. Results: The results of a detailed experimental assessment are analyzed in terms of communication cost, energy consumption and security, which prove the relevance of a proposed ABC approach and a key establishment. Conclusion: The validation of DTLS-ABC consists of designing an inter-node cooperation trust model for the creation of a trusted community of elements that are mutually supportive. Initial attempts to design the key methods for management are appropriate individual IoT devices. This gives the system designers, an option that considers the question of scalability.


Sign in / Sign up

Export Citation Format

Share Document