{"title":"Data protection by design and default: IoT app development","authors":"Andy Crabtree, T. Lodge","doi":"10.1049/pbse014e_ch7","DOIUrl":"https://doi.org/10.1049/pbse014e_ch7","url":null,"abstract":"","PeriodicalId":179291,"journal":{"name":"Privacy by Design for the Internet of Things: Building accountability and security","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123289912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Kilic, Lewis. Cameron, Glenn McGarry, M. Goulden, Andy Crabtree
{"title":"The socially negotiated management of personal data in everyday life","authors":"D. Kilic, Lewis. Cameron, Glenn McGarry, M. Goulden, Andy Crabtree","doi":"10.1049/pbse014e_ch4","DOIUrl":"https://doi.org/10.1049/pbse014e_ch4","url":null,"abstract":"","PeriodicalId":179291,"journal":{"name":"Privacy by Design for the Internet of Things: Building accountability and security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129778953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accountability in ordinary action","authors":"P. Tolmie, Andy Crabtree","doi":"10.1049/pbse014e_ch3","DOIUrl":"https://doi.org/10.1049/pbse014e_ch3","url":null,"abstract":"ly, various concepts of privacy posit axioms that essentially revolve around the disclosure of personal information or ‘data’. Often cited definitions thus inform us that privacy is the ability to control the disclosure of personal information [27], to create and manage interpersonal boundaries [28] and to employ contextual norms to regulate the ad hoc flow of personal information between people [29]. Concretely, the studies make it visible that privacy ordinarily and accountably revolves around managing a polymorphous array of mundane activities in which the digital is embedded in the ongoing conduct of manifold human relationships. Within this lively context, the disclosure or sharing of personal data is accountably organised in terms of managing members’ access to devices, applications and content through situated practices, procedures or methods that exploit the local ecology, device visibility and recipient design. The studies make it perspicuous that members’ concern with privacy is a concern to manage their accountability in the digital world and that manifest in data sharing practices is an evolving calculus of accountability employed to manage the potential attack surface the digital creates in everyday life. That the digital poses a threat to privacy and therefore undermines societal trust in the digital is broadly acknowledged. Much less wellknown and understood is how and why this happens and what kinds of steps beyond demonstrable compliance with the law might need to be taken to remedy the situation. 4 Privacy by design for the internet of things 3.2 The naturally accountable organisation of digital privacy in the home Managing digital privacy is intimately bound up with the observability and reportability of one’s digital activities and how other people might be able to see them in the first place. Developers and security analysts alike recommend passwords as the first line of defense to protect oneself from prying eyes. Yet there is a more fundamental naturally accountable organisation to privacy in the real world, as one of our participants, Paul (not his real name), tells us: Paul: I’m not particularly fussed about setting up passwords and things. I mean there’s no threat of network hijacking here. We live in the middle of the countryside, miles away from another house, it’s just not an issue. So as Paul makes accountable, one of the simplest and most ubiquitous ways to constrain access and protect privacy is by controlling access to the environments in which our digital activities occur, i.e., controlling access to the places in which digital devices are kept. Paul’s was not the only example of password suspension for devices considered inaccessible that we encountered in our studies. It was commonplace for devices that always stayed in the home, such as desktop PCs, tablets and media servers. The reasoning generally bound up with this is that the people who have rights of access to the network and the devices on it are the peo","PeriodicalId":179291,"journal":{"name":"Privacy by Design for the Internet of Things: Building accountability and security","volume":"561-565 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121824047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrew Crabtree, T. Lodge, Derek McAuley, Lachlan D. Urquhart, Hamed Haddadi, R. Mortier
{"title":"Building accountability into the Internet of Things","authors":"Andrew Crabtree, T. Lodge, Derek McAuley, Lachlan D. Urquhart, Hamed Haddadi, R. Mortier","doi":"10.1049/pbse014e_ch6","DOIUrl":"https://doi.org/10.1049/pbse014e_ch6","url":null,"abstract":"","PeriodicalId":179291,"journal":{"name":"Privacy by Design for the Internet of Things: Building accountability and security","volume":"288 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116566672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anticipating the adoption of IoT in everyday life","authors":"P. Coulton, Adrian Ioan Gradinar, Joseph Lindley","doi":"10.1049/pbse014e_ch10","DOIUrl":"https://doi.org/10.1049/pbse014e_ch10","url":null,"abstract":". Realising the potential economic and societal benefits of emerging and future technologies such as the Internet of Things (IoT) is dependent on a critical mass of potential users adopting them, this is often driven by whether users consider them to be acceptable. However, the processes that drive adoption and acceptability are rarely taken into consideration when researching emerging and future technologies. More often than not, either adoption is regarded as something that will naturally occur once technology is made available to the market, or the process of adoption is considered to be someone else’s future work. The result is that the discovery of challenges and barriers to adoption and acceptability occur only after potentially problematic design patterns have become established and concretised at the core of devices and services. This, in turn, can result in even the most mundane designs having unintended consequences or compromised impact. In this chapter we focus on IoT connected products which are often referred to as ‘smart’ in our IoT-enabled ‘smart homes’. The espoused promise of the smart home is that it will make our lives easier by giving us more free time, improving our energy consumption, and saving money. However, one factor which is frequently absent from these discussions is the tsunami of data which is generated and collected as we add millions of IoT products and services to our home networks. While the nuance of the emergent Human-Data relationships may not be of immediate concern to the majority of their users, when this significant activity is unexpectedly brought to the fore it can challenge our expectations and perceptions of personal privacy in our homes. Such disruptions to notions of privacy then unbalance our perception of IoT devices’ acceptability, causing users to either resist the adoption of new devices or potentially reject devices which had previously been adopted. IoT futures before","PeriodicalId":179291,"journal":{"name":"Privacy by Design for the Internet of Things: Building accountability and security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128746717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}