{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:48:05Z","timestamp":1776102485349,"version":"3.50.1"},"reference-count":45,"publisher":"Association for Computing Machinery (ACM)","issue":"ISS","license":[{"start":{"date-parts":[[2022,11,14]],"date-time":"2022-11-14T00:00:00Z","timestamp":1668384000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2022,11,14]]},"abstract":"<jats:p>Private homes are increasingly becoming smart spaces. While smart homes promise comfort, they expose most intimate spaces to security and privacy risks. Unfortunately, most users today are not equipped with the right tools to assess the vulnerabilities or privacy practices of smart devices. Further, users might lose track of the devices installed in their homes or are unaware of devices placed by a partner or host. We developed SaferHome, an interactive digital-physical privacy framework, to provide smart home users with security and privacy assessments and a sense of device location. SaferHome includes a digital list view and physical and digital dashboards that map real floor plans. We evaluated SaferHome with eight households in the wild. We find that users adopted various strategies to integrate the dashboards into their understanding and interpretation of smart home privacy. We present implications for the design of future smart home privacy frameworks that are impacted by technical affinity, device types, device ownership, and tangibility of assessments.<\/jats:p>","DOI":"10.1145\/3567739","type":"journal-article","created":{"date-parts":[[2022,11,14]],"date-time":"2022-11-14T21:31:51Z","timestamp":1668461511000},"page":"680-699","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["SaferHome: Interactive Physical and Digital Smart Home Dashboards for Communicating Privacy Assessments to Owners and Bystanders"],"prefix":"10.1145","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9743-3819","authenticated-orcid":false,"given":"Maximiliane","family":"Windl","sequence":"first","affiliation":[{"name":"LMU Munich, Munich, Germany \/ Munich Center for Machine Learning, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5397-711X","authenticated-orcid":false,"given":"Alexander","family":"Hiesinger","sequence":"additional","affiliation":[{"name":"LMU Munich, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7255-7890","authenticated-orcid":false,"given":"Robin","family":"Welsch","sequence":"additional","affiliation":[{"name":"Aalto University, Espoo, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3890-1990","authenticated-orcid":false,"given":"Albrecht","family":"Schmidt","sequence":"additional","affiliation":[{"name":"LMU Munich, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0287-0945","authenticated-orcid":false,"given":"Sebastian S.","family":"Feger","sequence":"additional","affiliation":[{"name":"LMU Munich, Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,11,14]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019","author":"Abdi Noura","year":"2019","unstructured":"Noura Abdi , Kopo M. Ramokapane , and Jose M. Such . 2019. More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants . In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019 ). USENIX Association, Santa Clara, CA. 451\u2013466. isbn:978-1-939133-05-2 https:\/\/www.usenix.org\/conference\/soups 2019 \/presentation\/abdi Noura Abdi, Kopo M. Ramokapane, and Jose M. Such. 2019. More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA. 451\u2013466. isbn:978-1-939133-05-2 https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/abdi"},{"key":"e_1_2_1_2_1","unstructured":"Abdulaziz Abdugani. 2020. Privacy Analysis of Smart TV Communication: A case study of privacy threats in Smart TVs. \t\t\t\t  Abdulaziz Abdugani. 2020. Privacy Analysis of Smart TV Communication: A case study of privacy threats in Smart TVs."},{"key":"e_1_2_1_3_1","volume-title":"Your Roomba may be mapping your home, collecting data that could be shared. The New York Times, 25","author":"Astor Maggie","year":"2017","unstructured":"Maggie Astor . 2017. Your Roomba may be mapping your home, collecting data that could be shared. The New York Times, 25 ( 2017 ). Maggie Astor. 2017. Your Roomba may be mapping your home, collecting data that could be shared. The New York Times, 25 (2017)."},{"key":"e_1_2_1_4_1","volume-title":"An empirical evaluation of the system usability scale. Intl. Journal of Human\u2013Computer Interaction, 24, 6","author":"Bangor Aaron","year":"2008","unstructured":"Aaron Bangor , Philip T Kortum , and James T Miller . 2008. An empirical evaluation of the system usability scale. Intl. Journal of Human\u2013Computer Interaction, 24, 6 ( 2008 ), 574\u2013594. Aaron Bangor, Philip T Kortum, and James T Miller. 2008. An empirical evaluation of the system usability scale. Intl. Journal of Human\u2013Computer Interaction, 24, 6 (2008), 574\u2013594."},{"key":"e_1_2_1_5_1","unstructured":"The BBC. 2019. Smart speaker recordings reviewed by humans. https:\/\/www.bbc.com\/news\/technology-47893082 \t\t\t\t  The BBC. 2019. Smart speaker recordings reviewed by humans. https:\/\/www.bbc.com\/news\/technology-47893082"},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","unstructured":"France B\u00e9langer and Robert E Crossler. 2011. Privacy in the digital age: a review of information privacy research in information systems. MIS quarterly 1017\u20131041. \t\t\t\t  France B\u00e9langer and Robert E Crossler. 2011. Privacy in the digital age: a review of information privacy research in information systems. MIS quarterly 1017\u20131041.","DOI":"10.2307\/41409971"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30436-1_23"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00706ED1V01Y201602HCI034"},{"key":"e_1_2_1_9_1","volume-title":"SUS-A quick and dirty usability scale. Usability evaluation in industry, 189, 194","author":"Brooke John","year":"1996","unstructured":"John Brooke . 1996. SUS-A quick and dirty usability scale. Usability evaluation in industry, 189, 194 ( 1996 ), 4\u20137. John Brooke. 1996. SUS-A quick and dirty usability scale. Usability evaluation in industry, 189, 194 (1996), 4\u20137."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445691"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376389"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00043"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_2_1_14_1","unstructured":"ENISA. 2017. ENISA Baseline Security Recommendations for IoT. https:\/\/www.enisa.europa.eu\/publications\/baseline-security-recommendations-for-iot \t\t\t\t  ENISA. 2017. ENISA Baseline Security Recommendations for IoT. https:\/\/www.enisa.europa.eu\/publications\/baseline-security-recommendations-for-iot"},{"key":"e_1_2_1_15_1","unstructured":"ENISA. 2019. ENISA IoT Security Standards Gap Analysis. https:\/\/www.enisa.europa.eu\/publications\/iot-security-standards-gap-analysis \t\t\t\t  ENISA. 2019. ENISA IoT Security Standards Gap Analysis. https:\/\/www.enisa.europa.eu\/publications\/iot-security-standards-gap-analysis"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-018-1174-x"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2018.1456150"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173876"},{"key":"e_1_2_1_19_1","unstructured":"Gartner. 2019. Gartner Says 5.8 Billion Enterprise and Automotive IoT Endpoints Will Be in Use in 2020. https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2019-08-29-gartner-says-5-8-billion-enterprise-and-automotive-io \t\t\t\t  Gartner. 2019. Gartner Says 5.8 Billion Enterprise and Automotive IoT Endpoints Will Be in Use in 2020. https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2019-08-29-gartner-says-5-8-billion-enterprise-and-automotive-io"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300498"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2014.6866595"},{"key":"e_1_2_1_22_1","volume-title":"The connected home: The future of domestic life","author":"Harper Richard","unstructured":"Richard Harper . 2011. The connected home: The future of domestic life . Springer . Richard Harper. 2011. The connected home: The future of domestic life. Springer."},{"key":"e_1_2_1_23_1","volume-title":"SecIoT: a security framework for the Internet of Things. Security and communication networks, 9, 16","author":"Huang Xin","year":"2016","unstructured":"Xin Huang , Paul Craig , Hangyu Lin , and Zheng Yan . 2016. SecIoT: a security framework for the Internet of Things. Security and communication networks, 9, 16 ( 2016 ), 3083\u20133094. Xin Huang, Paul Craig, Hangyu Lin, and Zheng Yan. 2016. SecIoT: a security framework for the Internet of Things. Security and communication networks, 9, 16 (2016), 3083\u20133094."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445598"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287054"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89350-9_6"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322366"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139938"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0035"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428361.3428464"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420164"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985347.1985353"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409661"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3414173"},{"key":"e_1_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Pascal Oser Frank Kargl and Stefan L\u00fcders. 2018. Identifying Devices of the Internet of Things Using Machine Learning on Clock Characteristics. In International Conference on Security Privacy and Anonymity in Computation Communication and Storage. 417\u2013427. \t\t\t\t  Pascal Oser Frank Kargl and Stefan L\u00fcders. 2018. Identifying Devices of the Internet of Things Using Machine Learning on Clock Characteristics. In International Conference on Security Privacy and Anonymity in Computation Communication and Storage. 417\u2013427.","DOI":"10.1007\/978-3-030-05345-1_36"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702165"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523501.2523503"},{"key":"e_1_2_1_38_1","first-page":"8","article-title":"Towards a more representative definition of cyber security","volume":"12","author":"Schatz Daniel","year":"2017","unstructured":"Daniel Schatz , Rabih Bashroush , and Julie Wall . 2017 . Towards a more representative definition of cyber security . Journal of Digital Forensics, Security and Law , 12 , 2 (2017), 8 . Daniel Schatz, Rabih Bashroush, and Julie Wall. 2017. Towards a more representative definition of cyber security. Journal of Digital Forensics, Security and Law, 12, 2 (2017), 8.","journal-title":"Journal of Digital Forensics, Security and Law"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.9781\/ijimai.2017.445"},{"key":"e_1_2_1_40_1","unstructured":"Los Angeles Times. 2016. Our privacy is losing out to Internet-connected household devices. https:\/\/www.latimes.com\/business\/la-fi-lazarus-20160115-column.html \t\t\t\t  Los Angeles Times. 2016. Our privacy is losing out to Internet-connected household devices. https:\/\/www.latimes.com\/business\/la-fi-lazarus-20160115-column.html"},{"key":"e_1_2_1_41_1","volume-title":"Security Beliefs and Protective Behaviors Among United States Internet Users. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015","author":"Wash Rick","year":"2015","unstructured":"Rick Wash and Emilee Rader . 2015 . Too Much Knowledge? Security Beliefs and Protective Behaviors Among United States Internet Users. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015 ). USENIX Association, Ottawa. 309\u2013325. isbn:978-1-93 1971-249 https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/wash Rick Wash and Emilee Rader. 2015. Too Much Knowledge? Security Beliefs and Protective Behaviors Among United States Internet Users. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa. 309\u2013325. isbn:978-1-931971-249 https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/wash"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546719"},{"key":"e_1_2_1_43_1","unstructured":"WIRED. 2019. Don\u2019t Get Your Valentine an Internet-Connected Sex Toy. https:\/\/www.wired.com\/story\/internet-connected-sex-toys-security\/ \t\t\t\t  WIRED. 2019. Don\u2019t Get Your Valentine an Internet-Connected Sex Toy. https:\/\/www.wired.com\/story\/internet-connected-sex-toys-security\/"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"},{"key":"e_1_2_1_45_1","volume-title":"Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Zeng Eric","year":"2019","unstructured":"Eric Zeng and Franziska Roesner . 2019 . Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study. In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, Santa Clara, CA. 159\u2013176. isbn:978-1-939133-06-9 https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/zeng Eric Zeng and Franziska Roesner. 2019. Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA. 159\u2013176. isbn:978-1-939133-06-9 https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/zeng"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3567739","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3567739","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:12Z","timestamp":1750182672000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3567739"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,14]]},"references-count":45,"journal-issue":{"issue":"ISS","published-print":{"date-parts":[[2022,11,14]]}},"alternative-id":["10.1145\/3567739"],"URL":"https:\/\/doi.org\/10.1145\/3567739","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,14]]},"assertion":[{"value":"2022-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}