4.7 Article

A Survey of User Perspectives on Security and Privacy in a Home Networking Environment

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Ecology

TEACHERS' BELIEFS AND THE FORMATION OF ENTREPRENEURIAL POTENTIAL IN STUDENTS

Tamara de la Torre Cruz et al.

Summary: The aim of this research is to investigate teachers' beliefs about entrepreneurial potential as a basis for building an entrepreneurial culture in the classroom. The results show the recognition and value given by teachers to the involvement of families in educational work and business interests, emphasizing the need to include entrepreneurial skills in teacher training.

INTERCIENCIA (2023)

Article Telecommunications

Survey on recent smart gateways for smart home: Systems, technologies, and challenges

Wenyao Yan et al.

Summary: Smart gateways play a crucial role in connecting and managing IoT devices in a smart home. This survey provides an overview of the smart home research area and categorizes the evolution of smart gateways into three generations based on various metrics. It also discusses the key technologies, such as operating systems and wireless communication protocols, and highlights the challenges and trends of smart gateways.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2022)

Article Communication

Household intelligent personal assistants in the Netherlands: Exploring privacy concerns around surveillance, security, and platforms

Anouk Mols et al.

Summary: Intelligent personal assistants, also known as smart speakers, are becoming a common part of households worldwide, allowing users to control their homes with voice-activated commands while raising privacy and surveillance concerns.

CONVERGENCE-THE INTERNATIONAL JOURNAL OF RESEARCH INTO NEW MEDIA TECHNOLOGIES (2022)

Article Computer Science, Hardware & Architecture

Secure and Resilient Artificial Intelligence of Things: A HoneyNet Approach for Threat Detection and Situational Awareness

Liang Tan et al.

Summary: This article proposes a HoneyNet approach for enhancing the security of AIoT by combining threat detection and situational awareness. Experimental results demonstrate the feasibility and effectiveness of the proposed solution.

IEEE CONSUMER ELECTRONICS MAGAZINE (2022)

Article Social Issues

Prohibitive factors to the acceptance of Internet of Things (IoT) technology in society: A smart-home context using a resistive modelling approach

Debajyoti Pal et al.

Summary: With the development of IoT technologies, smart-homes have become important, but user resistance towards home IoT and smart-home solutions is mainly due to privacy concerns. The study considers multiple antecedents of privacy concern, from user skill to technological and environmental factors, and categorizes privacy concern into informational, physical, and psychological aspects.

TECHNOLOGY IN SOCIETY (2021)

Article Computer Science, Information Systems

A trust model for popular smart home devices

Davide Ferraris et al.

Summary: Smart home devices like Amazon Echo and Google Home have raised concerns about privacy invasion due to their intrusive nature, but studies show that perceived benefits outweigh risks for consumers. Users place a high level of trust in these devices, sometimes overlooking the importance of security controls, which may lead to potential security issues.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2021)

Article Computer Science, Information Systems

A look into user's privacy perceptions and data practices of IoT devices

Mandi Nasrullah Al-Ameen et al.

Summary: This study identified mismatched privacy perceptions among users regarding data practices of IoT devices. It recommends designing simplified privacy notices to highlight unexpected data practices for secure and privacy-preserving use of IoT devices.

INFORMATION AND COMPUTER SECURITY (2021)

Review Computer Science, Theory & Methods

Smart Home Personal Assistants: A Security and Privacy Review

Jide S. Edu et al.

Summary: Smart Home Personal Assistants (SPA) are an emerging innovation that is changing the way home users interact with technology, but they are exposed to various risks. The article provides an in-depth review of the security and privacy issues of SPA, categorizing important attack vectors and discussing open research challenges to address these issues in the future.

ACM COMPUTING SURVEYS (2021)

Article Computer Science, Information Systems

Developing a cyber security culture: Current practices and future needs

Betsy Uchendu et al.

Summary: This article delves into the key factors and models for establishing and maintaining cyber security culture, highlighting the critical roles of top management support, policies and procedures, and awareness in fostering a security culture. While terms have changed, many influential factors remain consistent, with questionnaires and surveys being the most used tool for measuring cyber security culture, but also raising concerns about the need for more dynamic measures.

COMPUTERS & SECURITY (2021)

Article Engineering, Electrical & Electronic

Internet of Things for In-Home Health Monitoring Systems: Current Advances, Challenges and Future Directions

Nada Y. Philip et al.

Summary: The Internet of Things has revolutionized conventional healthcare services, especially in the field of in-home health monitoring. Despite challenges, these systems have brought many benefits including improved quality of life for patients and reduction in hospitalization and cost.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2021)

Article Business

The perceived surveillance of conversations through smart devices

Nicholas R. J. Frick et al.

Summary: This article examines the collection of data from Internet-connected devices in people's homes, focusing on the implications for online privacy and data security. Through an online survey, three predictors affecting perceived surveillance of conversations were identified: trust in smart devices, computer anxiety, and prior negative experiences. The developed surveillance effect model is discussed to understand the factors influencing this concern and support organizations in optimizing customer relations.

ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS (2021)

Article Computer Science, Information Systems

Access Control and Authorization in Smart Homes: A Survey

Ziarmal Nazar Mohammad et al.

Summary: With the rapid development of cyberspace and smart home technology, access control has become a crucial solution for addressing privacy and security challenges in smart homes, protecting against unauthorized access and trust issues.

TSINGHUA SCIENCE AND TECHNOLOGY (2021)

Review Environmental Studies

Motivations, barriers and risks of smart home adoption: From systematic literature review to conceptual framework

Wenda Li et al.

Summary: Smart home technology has the potential to shape future living, but factors influencing households' adoption of these services are still understudied. Primary motivations for adoption include energy management and quality of life improvements, while main barriers involve security concerns and technology anxiety.

ENERGY RESEARCH & SOCIAL SCIENCE (2021)

Article Chemistry, Analytical

On the Security and Privacy Challenges of Virtual Assistants

Tom Bolton et al.

Summary: Since the introduction of Siri by Apple, virtual assistants have become increasingly popular. Concerns over security and privacy issues have motivated research in this area, highlighting the need for advancements in voice authentication and compliance with privacy regulations.

SENSORS (2021)

Review Chemistry, Analytical

Towards Privacy-Preserved Aging in Place: A Systematic Review

Munkhjargal Gochoo et al.

Summary: Due to progressive population aging, elderly individuals face challenges in daily activities, leading to the need for smart homes with privacy-preserving technologies. Various sensor-based, wearable, camera-based, robot, and machine learning approaches have been adopted to ensure safety and comfort for the elderly. Recent innovations have focused on environmental sensors over cameras to enhance privacy while integrating robots with sensor platforms for daily assistance.

SENSORS (2021)

Article Information Science & Library Science

Users' Preferences for Smart Home Automation-Investigating Aspects of Privacy and Trust

Eva-Maria Schomakers et al.

Summary: Smart home automation offers convenience in daily life but faces user concerns about privacy and trust. A study found that semi-automated systems are preferred over fully automated ones, with reliability of automation being the key determinant of acceptance. Awareness, data type, and application field are less important factors for user willingness to use smart homes.

TELEMATICS AND INFORMATICS (2021)

Review Telecommunications

A systematic review of the research framework and evolution of smart homes based on the internet of things

Yi Sun et al.

Summary: The study analyzed the development trends, country distribution, and journal categories in the field of smart homes based on the Internet of Things, proposed an integrated research framework across different layers, discussed the evolution of hot spots in this field, and identified potential future research directions.

TELECOMMUNICATION SYSTEMS (2021)

Review Medicine, General & Internal

PRISMA 2020 explanation and elaboration: updated guidance and exemplars for reporting systematic reviews

Matthew J. Page et al.

Summary: The methods and results of systematic reviews should be reported in sufficient detail to allow users to assess trustworthiness. PRISMA 2020 aims to improve the transparency and completeness of systematic review reporting, in hopes of guiding more accurate and transparent reporting.

BMJ-BRITISH MEDICAL JOURNAL (2021)

Article Geriatrics & Gerontology

Attitudes and perspectives of older adults on technologies for assessing frailty in home settings: a focus group study

Chao Bian et al.

Summary: This study collected qualitative data through focus group meetings with older adults to understand their attitudes and preferences towards technologies for assessing frailty at home. Participants generally had positive attitudes towards the technologies, but raised concerns about privacy, functionality, and aesthetics. Valuable suggestions were made by participants to improve the design and adoption of home-based frailty assessment technologies.

BMC GERIATRICS (2021)

Article Multidisciplinary Sciences

Intent to purchase IoT home security devices: Fear vs privacy

Joey F. George et al.

Summary: The study found that fear has a positive impact on consumer attitudes towards purchasing smart home security devices, while concerns about privacy have a negative impact on attitudes. Attitudes towards purchase, opinions of others, and experience with burglaries all affect purchase intent. Privacy concerns' relationship to purchase intent is completely mediated by attitudes, while fear has both direct and indirect effects on intent.

PLOS ONE (2021)

Article Computer Science, Information Systems

I still need my privacy: Exploring the level of comfort and privacy preferences of German-speaking older adults in the case of mobile assistant robots

Delphine Reinhardt et al.

Summary: With an ageing population, the market for mobile robots is expected to grow. A study found that females and non-owners of robots tend to express more concerns about privacy.

PERVASIVE AND MOBILE COMPUTING (2021)

Proceedings Paper Computer Science, Cybernetics

Understanding People's Attitude and Concerns towards Adopting IoT Devices

Evan Lafontaine et al.

Summary: This paper investigates people's attitudes and concerns towards adopting IoT devices, finding similarities and differences between adopters and non-adopters through an online survey of 232 participants from the US, Europe, and India. It also highlights contrasting behaviors between participants from different geographic regions, such as greater trust in government protection of consumer data among Indian participants. The study provides recommendations to address users' concerns and enhance trust in adopting IoT devices.

EXTENDED ABSTRACTS OF THE 2021 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'21) (2021)

Proceedings Paper Computer Science, Artificial Intelligence

Exploring Augmented Reality Privacy Icons for Smart Home Devices and their Effect on Users' Privacy Awareness

Kathrin Knutzen et al.

Summary: This study examined how privacy icons displayed by AR-HMD affect users' privacy awareness, with participants showing high potential and excitement but also some negative attitudes. Displaying privacy icons in AR helps raise users' awareness of privacy but may also lead to a false sense of security.

2021 IEEE INTERNATIONAL SYMPOSIUM ON MIXED AND AUGMENTED REALITY ADJUNCT PROCEEDINGS (ISMAR-ADJUNCT 2021) (2021)

Proceedings Paper Computer Science, Information Systems

Authentication Management of Home IoT Devices

Aniqa Alam et al.

Summary: The research found that home IoT device users are very concerned about security and privacy issues, but tend to use insecure security measures in practice. They showed a welcoming attitude towards a new security tool for password management.

HCI FOR CYBERSECURITY, PRIVACY AND TRUST (HCI-CPT 2021) (2021)

Article Computer Science, Information Systems

A Survey on Smart Home Authentication: Toward Secure, Multi-Level and Interaction-Based Identification

Salem AlJanah et al.

Summary: This paper critically analyzes existing authentication solutions for IoT environments, presenting a generic model derived from an SHome use-case scenario and conducting a threat analysis to identify possible means of attacks. Based on the requirements specified from the analysis, ideas for achieving effective and efficient authentication in IoT environments are proposed.

IEEE ACCESS (2021)

Proceedings Paper Computer Science, Artificial Intelligence

Smart Home Research Themes: An Analysis and Taxonomy

Joanna F. DeFranco et al.

Summary: The smart home concept focuses on increasing comfort, energy efficiency, privacy, and safety through systems and devices, and is a complex multidimensional system. Lack of consensus exists on existing research avenues around smart home concept, which can be addressed by systematic literature review and construction of a research taxonomy for future researchers to position and expand research areas.

BIG DATA, IOT, AND AI FOR A SMARTER FUTURE (2021)

Article Communication

Privacy and smart speakers: A multi-dimensional approach

Christoph Lutz et al.

Summary: Smart speakers like Amazon Echo and Google Home have become increasingly popular in British households, but privacy concerns, especially regarding third parties accessing recordings, remain prominent. Users exhibit rare privacy protection behaviors, influenced partly by concerns about privacy and motives such as social presence and utilitarian benefits, reflecting a sense of privacy pragmatism or cynicism.

INFORMATION SOCIETY (2021)

Article Computer Science, Cybernetics

Users' Cognitive and Affective Response to the Risk to Privacy from a Smart Speaker

Jonghwa Park et al.

Summary: Smart speakers, while providing real-time information and services, raise privacy concerns by continuously listening to users, leading to negative emotions and coping behaviors. Previous studies mainly focus on cognitive frameworks, neglecting the impact of emotions on users' responses to privacy threats.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION (2021)

Article Health Care Sciences & Services

Older women's perceptions of wearable and smart home activity sensors

Blaine Reeder et al.

INFORMATICS FOR HEALTH & SOCIAL CARE (2020)

Review Computer Science, Hardware & Architecture

Fog-based smart homes: A systematic review

Morteza Rahimi et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Review Computer Science, Information Systems

Sensors for internet of medical things: State-of-the-art, security and privacy issues, challenges and future directions

Partha Pratim Ray et al.

COMPUTER COMMUNICATIONS (2020)

Review Computer Science, Hardware & Architecture

Blockchain for smart homes: Review of current trends and research challenges

Md Moniruzzaman et al.

COMPUTERS & ELECTRICAL ENGINEERING (2020)

Article Multidisciplinary Sciences

Trust in the smart home: Findings from a nationally representative survey in the UK

Sara Cannizzaro et al.

PLOS ONE (2020)

Proceedings Paper Computer Science, Cybernetics

Investigating User Expectations on the Roles of Family-shared AI Speakers

Sunjeong Park et al.

PROCEEDINGS OF THE 2020 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'20) (2020)

Proceedings Paper Computer Science, Cybernetics

Amazon vs. My Brother: How Users of Shared Smart Speakers Perceive and Cope with Privacy Risks

Yue Huang et al.

PROCEEDINGS OF THE 2020 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'20) (2020)

Proceedings Paper Computer Science, Cybernetics

All in One! User Perceptions on Centralized IoT Privacy Settings

Karola Marky et al.

CHI'20: EXTENDED ABSTRACTS OF THE 2020 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (2020)

Proceedings Paper Computer Science, Hardware & Architecture

Your Privilege Gives Your Privacy Away: An Analysis of a Home Security Camera Service

Jinyang Li et al.

IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (2020)

Article Environmental Studies

The trust gap: Social perceptions of privacy data for energy services in the United Kingdom

Phil Grunewald et al.

ENERGY RESEARCH & SOCIAL SCIENCE (2020)

Article Geography

Please Enter Your Home Location: Geoprivacy Attitudes and Personal Location Masking Strategies of Internet Users

Dara E. Seidl et al.

ANNALS OF THE AMERICAN ASSOCIATION OF GEOGRAPHERS (2020)

Review Computer Science, Information Systems

Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review

Bin Liao et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Systematic Survey on Smart Home Safety and Security Systems Using the Arduino Platform

Qusay I. Sarhan

IEEE ACCESS (2020)

Review Psychology, Multidisciplinary

Where You Are Is Who You Are? The Geographical Account of Psychological Phenomena

Hao Chen et al.

FRONTIERS IN PSYCHOLOGY (2020)

Article Information Science & Library Science

Home IoT resistance: Extended privacy and vulnerability perspective

Hwansoo Lee

TELEMATICS AND INFORMATICS (2020)

Article Multidisciplinary Sciences

Privacy concerns in the smart home context

Nadine Guhr et al.

SN APPLIED SCIENCES (2020)

Article Computer Science, Information Systems

Vulnerability Studies and Security Postures of IoT Devices: A Smart Home Case Study

Brittany D. Davis et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Review Computer Science, Information Systems

A review on smart home present state and challenges: linked to context-awareness internet of things (IoT)

Zahrah A. Almusaylim et al.

WIRELESS NETWORKS (2019)

Review Computer Science, Theory & Methods

A Systematic Review on Imbalanced Data Challenges in Machine Learning: Applications and Solutions

Harsurinder Kaur et al.

ACM COMPUTING SURVEYS (2019)

Article Computer Science, Information Systems

How perceived security risk affects intention to use smart home devices: A reasoned action explanation

Jane E. Klobas et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Interdisciplinary Applications

Evaluating Awareness and Perception of Botnet Activity within Consumer Internet-of-Things (IoT) Networks

Christopher D. McDermott et al.

INFORMATICS-BASEL (2019)

Article Psychology, Multidisciplinary

Willingness to provide personal information: Perspective of privacy calculus in IoT services

Dongyeon Kim et al.

COMPUTERS IN HUMAN BEHAVIOR (2019)

Proceedings Paper Computer Science, Information Systems

Alexa's Voice Recording Behavior: A Survey of User Understanding and Awareness

Yousra Javed et al.

14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019) (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Survey on Internet of Things based Smart Home

Vasanth Williams et al.

PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2019) (2019)

Proceedings Paper Computer Science, Information Systems

Information Exposure From Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach

Jingjing Ren et al.

IMC'19: PROCEEDINGS OF THE 2019 ACM INTERNET MEASUREMENT CONFERENCE (2019)

Proceedings Paper Computer Science, Theory & Methods

SoK: Security Evaluation of Home-Based IoT Deployments

Omar Alrawi et al.

2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019) (2019)

Proceedings Paper Computer Science, Cybernetics

Online Privacy in Public Places: How do Location, Terms and Conditions and VPN Influence Disclosure?

Maria D. Molina et al.

CHI EA '19 EXTENDED ABSTRACTS: EXTENDED ABSTRACTS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (2019)

Article Computer Science, Information Systems

Embracing the Smart-Home Revolution in Asia by the Elderly: An End-User Negative Perception Modeling

Debajyoti Pal et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Cybernetics

Defending My Castle: A Co-Design Study of Privacy Mechanisms for Smart Homes

Yaxing Yao et al.

CHI 2019: PROCEEDINGS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (2019)

Proceedings Paper Computer Science, Cybernetics

Who's In Control?: Interactions In Multi-User Smart Homes

Christine Geeng et al.

CHI 2019: PROCEEDINGS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (2019)

Article Computer Science, Information Systems

A taxonomy of cyber-physical threats and impact in the smart home

Ryan Heartfield et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Information Systems

Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective

Huigang Liang et al.

Journal of the Association for Information Systems (2018)

Review Health Care Sciences & Services

Systematic review or scoping review? Guidance for authors when choosing between a systematic or scoping review approach

Zachary Munn et al.

BMC MEDICAL RESEARCH METHODOLOGY (2018)

Review Engineering, Multidisciplinary

SDN in the home: A survey of home network solutions using Software Defined Networking

Abdalkrim M. Alshnta et al.

COGENT ENGINEERING (2018)

Proceedings Paper Computer Science, Information Systems

An overview of potential authentication threats and attacks on Internet of Things(IoT): A focus on Smart home applications.

Attlee M. Gamundani et al.

IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY (2018)

Proceedings Paper Computer Science, Theory & Methods

Users' Privacy Concerns in IoT based Applications

Ismini Psychoula et al.

2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI) (2018)

Proceedings Paper Computer Science, Interdisciplinary Applications

Help Wanted: Consumer Privacy Behavior and Smart Home Internet of Things (IoT) Devices

Marc Dupuis et al.

SIGITE'18: PROCEEDINGS OF THE 19TH ANNUAL SIG CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION (2018)

Article Computer Science, Information Systems

Analysis of Protective Behavior and Security Incidents for Home Computers

Garry White et al.

JOURNAL OF COMPUTER INFORMATION SYSTEMS (2017)

Article Computer Science, Interdisciplinary Applications

User acceptance of smart home services: an extension of the theory of planned behavior

Heetae Yang et al.

INDUSTRIAL MANAGEMENT & DATA SYSTEMS (2017)

Proceedings Paper Computer Science, Theory & Methods

Exploring Consumers' Attitudes of Smart TV Related Privacy Risks

Marco Ghiglieri et al.

HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017) (2017)

Proceedings Paper Computer Science, Theory & Methods

If It's Urgent or It Is Stopping Me from Doing Something, Then I Might Just Go Straight at It: A Study into Home Data Security Decisions

Norbert Nthala et al.

HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017) (2017)

Article Computer Science, Theory & Methods

Secure Smart Homes: Opportunities and Challenges

Jordi Mongay Batalla et al.

ACM COMPUTING SURVEYS (2017)

Article Computer Science, Cybernetics

Old risks, new challenges: exploring differences in security between home computer and mobile device use

Tanya McGill et al.

BEHAVIOUR & INFORMATION TECHNOLOGY (2017)

Article Computer Science, Interdisciplinary Applications

Repacking 'Privacy' for a Networked World

Andy Crabtree et al.

COMPUTER SUPPORTED COOPERATIVE WORK-THE JOURNAL OF COLLABORATIVE COMPUTING AND WORK PRACTICES (2017)

Article Computer Science, Information Systems

Security begins at home: Determinants of home computer and mobile device security behavior

Nik Thompson et al.

COMPUTERS & SECURITY (2017)

Proceedings Paper Computer Science, Theory & Methods

Enabling Multi-user Controls in Smart Home Devices

William Jang et al.

PROCEEDINGS OF THE 2017 WORKSHOP ON INTERNET OF THINGS SECURITY AND PRIVACY (IOT S&P'17) (2017)

Article Computer Science, Information Systems

Understanding online safety behaviors: A protection motivation theory perspective

Hsin-yi Sandy Tsai et al.

COMPUTERS & SECURITY (2016)

Article Computer Science, Artificial Intelligence

ORACON: An adaptive model for context prediction

Joao H. da Rosa et al.

EXPERT SYSTEMS WITH APPLICATIONS (2016)

Review Computer Science, Information Systems

Older people, assistive technologies, and the barriers to adoption: A systematic review

Salifu Yusif et al.

INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS (2016)

Proceedings Paper Computer Science, Information Systems

The Contextual Complexity of Privacy in Smart Homes and Smart Buildings

Faith McCreary et al.

HCI IN BUSINESS, GOVERNMENT, AND ORGANIZATIONS: INFORMATION SYSTEMS, HCIBGO 2016, PT II (2016)

Proceedings Paper Computer Science, Cybernetics

Trust Me: Doubts and Concerns Living with the Internet of Things

Peter Worthy et al.

DIS 2016: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON DESIGNING INTERACTIVE SYSTEMS (2016)

Article Computer Science, Information Systems

Smart homes and their users: a systematic analysis and key challenges

Charlie Wilson et al.

PERSONAL AND UBIQUITOUS COMPUTING (2015)

Proceedings Paper Computer Science, Interdisciplinary Applications

Smart Home Definition and Security Threats

Michael Schiefer

2015 NINTH INTERNATIONAL CONFERENCE ON IT SECURITY INCIDENT MANAGEMENT & IT FORENSICS (IMF) (2015)

Article Computer Science, Interdisciplinary Applications

A Multi-Temporal Context-aware System for Competences Management

Joao H. Rosa et al.

INTERNATIONAL JOURNAL OF ARTIFICIAL INTELLIGENCE IN EDUCATION (2015)

Proceedings Paper Computer Science, Information Systems

Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes

Abdulwahid Al Abdulwahid et al.

TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS (2015)

Proceedings Paper Automation & Control Systems

A Review on Vision Surveillance Techniques in Smart Home Environments

Marius Brezovan et al.

19TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS 2013) (2013)

Article Engineering, Electrical & Electronic

IGNORANCE TO AWARENESS: TOWARDS AN INFORMATION SECURITY AWARENESS PROCESS

T. Gundu et al.

SAIEE AFRICA RESEARCH JOURNAL (2013)

Article Health Care Sciences & Services

Privacy and data security in E-health: Requirements from the user's perspective

Wiktoria Wilkowska et al.

HEALTH INFORMATICS JOURNAL (2012)

Proceedings Paper Computer Science, Theory & Methods

The Psychology of Security for the Home Computer User

Adele E. Howe et al.

2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2012)

Article Computer Science, Information Systems

Cyber security for home users: A new way of protection through awareness enforcement

E. Kritzinger et al.

COMPUTERS & SECURITY (2010)

Review Medicine, General & Internal

Preferred Reporting Items for Systematic Reviews and Meta-Analyses: The PRISMA Statement

David Moher et al.

PLOS MEDICINE (2009)

Article Law

A taxonomy of privacy

DJ Solove

UNIVERSITY OF PENNSYLVANIA LAW REVIEW (2006)