Mobile security: Threats and best practices

P Weichbroth, Ł Łysik - Mobile Information Systems, 2020 - Wiley Online Library
Communicating mobile security threats and best practices has become a central objective
due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this …

Smart home privacy protection methods against a passive wireless snooping side-channel attack

MA Nassiri Abrishamchi, A Zainal, FA Ghaleb… - Sensors, 2022 - mdpi.com
Smart home technologies have attracted more users in recent years due to significant
advancements in their underlying enabler components, such as sensors, actuators, and …

Tangible privacy: Towards user-centric sensor designs for bystander privacy

I Ahmad, R Farzan, A Kapadia, AJ Lee - Proceedings of the ACM on …, 2020 - dl.acm.org
Sensor-enabled computers in the form of'IoT'devices such as home security cameras and
voice assistants are increasingly becoming pervasive in our environment. With the …

” I don't know how to protect myself”: Understanding Privacy Perceptions Resulting from the Presence of Bystanders in Smart Environments

K Marky, A Voit, A Stöver, K Kunze, S Schröder… - Proceedings of the 11th …, 2020 - dl.acm.org
IoT devices no longer affect single users only because others like visitors or family members-
denoted as bystanders-might be in the device's vicinity. Thus, data about bystanders can be …

Investigating people's privacy risk perception

N Gerber, B Reinheimer… - Proceedings on Privacy …, 2019 - petsymposium.org
Although media reports often warn about risks associated with using privacy-threatening
technologies, most lay users lack awareness of particular adverse consequences that could …

Investigating tangible privacy-preserving mechanisms for future smart homes

M Windl, A Schmidt, SS Feger - … of the 2023 CHI Conference on Human …, 2023 - dl.acm.org
Most smart home devices have multiple sensors, such as cameras and microphones;
however, most cannot be controlled individually. Tangible privacy mechanisms provide …

[PDF][PDF] Privacy and the Internet of Things.

HR Lipford, M Tabassum, P Bahirat, Y Yao… - Modern Socio …, 2022 - library.oapen.org
Using networks of Internet-connected sensors, the Internet of Things (IoT) makes
technologies “smart” by enabling automation, personalization, and remote control. At the …

Towards the creation of a profile of the information privacy aware user through a systematic literature review of information privacy awareness

A Soumelidou, A Tsohou - Telematics and Informatics, 2021 - Elsevier
In today's Internet reliant services, the issue of users' information privacy awareness is being
raised. Despite the fact that in many cases internet users claim to be cognizant of privacy …

The skewed privacy concerns of bystanders in smart environments

M Windl, S Mayer - Proceedings of the ACM on Human-Computer …, 2022 - dl.acm.org
As ubiquitous computing brings sensors and actuators directly into our homes, they
introduce privacy concerns for the owners and bystanders. However, privacy concerns may …

From internet of threats to internet of things: A cyber security architecture for smart homes

J Augusto-Gonzalez, A Collen… - 2019 ieee 24th …, 2019 - ieeexplore.ieee.org
The H2020 European research project GHOST-Safe-Guarding Home IoT Environments with
Personalised Real-time Risk Control-aims to deploy a highly effective security framework for …