-
Notifications
You must be signed in to change notification settings - Fork 11
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #203 from Fingerling42/main
Added Robonomics School 2024 Privacy Insights for Smart Homes
- Loading branch information
Showing
5 changed files
with
236 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,51 @@ | ||
--- | ||
title: Robonomics School 2024 / Privacy Insights for Smart Homes | ||
lastUpdate: | ||
description: Privacy Insights for Smart Homes | ||
metaOptions: [Learn, Robonomics School 2024 / Privacy Insights for Smart Homes] | ||
defaultName: Robonomics School 2024 / Privacy Insights for Smart Homes | ||
--- | ||
|
||
## Welcome to theoretical track of Robonomics School 2024! | ||
|
||
This track is dedicated to the main topic of our school — privacy. Our Johnny B will tell you freshest insights about privacy in relation to smart homes and Internet of Things: current research state of privacy, how it is often underestimated, how to protect it, and what users think about its importance. | ||
|
||
This small study was based on a dozen recent scientific publications and reports on the topic of privacy. Be sure to check out the cited sources listed below. We can provide publications if you require, just contact the team in any way convenient for you. | ||
|
||
And remember, protecting your devices' data is an important aspect of digital life. | ||
|
||
### Video lecture | ||
|
||
https://www.youtube.com/watch?v=_l3_heV5JlI | ||
|
||
### Used sources: | ||
|
||
- Cohen, J. E. (2013). **[What Privacy is For](https://harvardlawreview.org/print/vol-126/what-privacy-is-for)**. Harv. L. Rev., 126, 1904. | ||
|
||
- Zuboff, S. (2015). **[Big Other: Surveillance Capitalism and the Prospects of an Information Civilization](https://journals.sagepub.com/doi/10.1057/jit.2015.5)**. Journal of Information Technology, 30(1), 75-89. | ||
|
||
- Birnhack, M., Toch, E., & Hadar, I. (2014). **[Privacy Mindset, Technological Mindset](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2471415)**. Jurimetrics, 55, 55. | ||
|
||
- Wong, R. Y., & Mulligan, D. K. (2019, May). **[Bringing Design to the Privacy Table: Broadening “Design” in “Privacy by Design” Through the Lens of HCI](https://dl.acm.org/doi/10.1145/3290605.3300492)**. In Proceedings of the 2019 CHI conference on human factors in computing systems (pp. 1-17). | ||
|
||
- Spiekermann, S., & Cranor, L. F. (2008). **[Engineering Privacy](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1085333)**. IEEE Transactions on Software Engineering, 35(1), 67-82. | ||
|
||
- Office of the Victorian Information Commissioner (2017). **[Internet of Things and Privacy – Issues and Challenges](https://ovic.vic.gov.au/privacy/resources-for-organisations/internet-of-things-and-privacy-issues-and-challenges)** | ||
|
||
- Liu, D., Wu, C., Yang, L., Zhao, X., & Sun, Q. (2022). **[The Development of Privacy Protection Standards for Smart Home](https://www.hindawi.com/journals/wcmc/2022/9641143/)**. Wireless Communications and Mobile Computing, 2022. | ||
|
||
- Apthorpe, N., Reisman, D., & Feamster, N. (2017). **[A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic](https://arxiv.org/abs/1705.06805)**. arXiv preprint arXiv:1705.06805. | ||
|
||
- Schomakers, E. M., Biermann, H., & Ziefle, M. (2021). **[Users’ Preferences for Smart Home Automation – Investigating Aspects of Privacy and Trust](https://www.sciencedirect.com/science/article/abs/pii/S0736585321001283)**. Telematics and Informatics, 64, 101689. | ||
|
||
- Zeng, E., Mare, S., & Roesner, F. (2017). **[End User Security and Privacy Concerns with Smart Homes](https://www.usenix.org/conference/soups2017/technical-sessions/presentation/zeng)**. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017) (pp. 65-80). | ||
|
||
- Haney, J. M., Furman, S. M., & Acar, Y. (2020). **[Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges](https://link.springer.com/chapter/10.1007/978-3-030-50309-3_26)**. In HCI for Cybersecurity, Privacy and Trust: Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings 22 (pp. 393-411). Springer International Publishing. | ||
|
||
- Barbosa, N. M., Zhang, Z., & Wang, Y. (2020). **[Do Privacy and Security Matter to Everyone? Quantifying and Clustering User-Centric Considerations About Smart Home Device Adoption](https://www.usenix.org/conference/soups2020/presentation/barbosa)**. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020) (pp. 417-435). | ||
|
||
- Edwards, L. (2016). **[Privacy, Security and Data Protection in Smart Cities: a Critical EU Law Perspective](https://www.create.ac.uk/publications/privacy-security-and-data-protection-in-smart-cities-a-critical-eu-law-perspective/)**. Eur. Data Prot. L. Rev., 2, 28. | ||
|
||
- Allifah, N. M., & Zualkernan, I. A. (2022). **[Ranking Security of IoT-Based Smart Home Consumer Devices](https://ieeexplore.ieee.org/abstract/document/9698229)**. IEEE Access, 10, 18352-18369 | ||
|
||
- Biocco, P., Keshavarz, M., Hines, P., & Anwar, M. (2018). **[A Study of Privacy Policies across Smart Home Companies](https://spice.luddy.indiana.edu/files/2018/07/wssp2018-paper1.pdf)**. In An Interactive Workshop on the Human aspects of Smarthome Security and Privacy (WSSP 2018), Symposium on Usable Privacy and Security (SOUPS). |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.