Filters








1,657 Hits in 8.9 sec

Ask the Experts: What Should Be on an IoT Privacy and Security Label? [article]

Pardis Emami-Naeini, Yuvraj Agarwal, Lorrie Faith Cranor, Hanan Hibshi
2020 arXiv   pre-print
on an IoT privacy and security label.  ...  Based on the results of our expert elicitation and consumer studies, we propose a prototype privacy and security label to help consumers make more informed IoT-related purchase decisions.  ...  Additional support has also been provided by Google and by the Carnegie Mellon CyLab Security and Privacy Institute.  ... 
arXiv:2002.04631v1 fatcat:ypdh2rnmsnhnhkrpum3tjhueiu

Ask the Experts: What Should Be on an IoT Privacy and Security Label?

Pardis Emami-Naeini, Yuvraj Agarwal, Lorrie Faith Cranor, Hanan Hibshi
2020 2020 IEEE Symposium on Security and Privacy (SP)  
Additional support has also been provided by Google and by the Carnegie Mellon CyLab Security and Privacy Institute.  ...  The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of DARPA  ...  on an IoT privacy and security label.  ... 
doi:10.1109/sp40000.2020.00043 dblp:conf/sp/NaeiniACH20 fatcat:wkayjxhakrbtfn3aahopaa73um

IoT Middleware Platforms for Smart Energy Systems: An Empirical Expert Survey

Qamar Alfalouji, Thomas Schranz, Alexander Kümpel, Markus Schraven, Thomas Storek, Stephan Gross, Antonello Monti, Dirk Müller, Gerald Schweiger
2022 Buildings  
Hence, this paper presents a literature review and an expert survey on IoT middleware platforms in energy systems, in order to provide a set of tools and functionalities to be supported by any future efficient  ...  Likewise, non-functional requirements, such as security and privacy, play vital roles in the IoT platforms' performances.  ...  Acknowledgments: Open Access Funding by the Graz University of Technology. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/buildings12050526 fatcat:c4e7e4lhandppp7b7rweefzya4

IoT Middleware Platforms for Smart Energy Systems : An Empirical Expert Survey

Qamar Alfalouji, Thomas Schranz, Alexander Kümpel, Markus Hans Schraven, Thomas Storek, Stephan Gross, Antonello Monti, Dirk Müller, Gerald Schweiger
2022 Buildings : open access journal 12(5)  
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY  ...  Acknowledgments: Open Access Funding by the Graz University of Technology. Conflicts of Interest: The authors declare no conflict of interest.  ...  Threats to Validity and Limitations of the Study There is no universal criterion that allows for an unbiased assessment of what it means to be an expert in a certain field.  ... 
doi:10.18154/rwth-2022-04034 fatcat:uqahmxsf2rczfkx6ktqqfhozim

Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products

Philipp Morgner, Christoph Mai, Nicole Koschate-Fischer, Felix Freiling, Zinaida Benenson
2020 2020 IEEE Symposium on Security and Privacy (SP)  
With the expansion of the Internet of Things (IoT), the number of security incidents due to insecure and misconfigured IoT devices is increasing.  ...  Especially on the consumer market, manufacturers focus on new features and early releases at the expense of a comprehensive security strategy.  ...  ACKNOWLEDGMENTS We thank Freya Gassmann and Andrea Schankin for consulting regarding the statistical evaluation of the user study.  ... 
doi:10.1109/sp40000.2020.00021 dblp:conf/sp/MorgnerMKFB20 fatcat:c37z3junlrhota7oy4iyjlm5ye

A Multidisciplinary Definition of Privacy Labels: The Story of Princess Privacy and the Seven Helpers [article]

Johanna Johansen, Tore Pedersen, Simone Fischer-Hübner, Christian Johansen, Gerardo Schneider, Arnold Roosendaal, Harald Zwingelberg, Anders Jakob Sivesind, Josef Noll
2021 arXiv   pre-print
More specifically, this position paper identifies the stakeholders of the PL and their needs with regard to privacy, describing how PL should be and look like in order to address these needs.  ...  Throughout the paper, we highlight goals, characteristics, open problems, and starting points for creating, what we consider to be, the ideal PL.  ...  that half of the 613 participants have named privacy or security concerns/risks as being a blocker for them acquiring an IoT device.  ... 
arXiv:2012.01813v3 fatcat:7z2z7y6iffhxrlordza7u7bjrm

Challenges of Vehicle-to-Everything Communication. Interviews among Industry Experts [chapter]

Maximilian Renner, Karlsruhe Institute of Technology, Institute of Applied Informatics and Formal Description Methods (AIFB), Karlsruhe, Germany, Niels Münzenberger, Johanna von Hammerstein, Sebastian Lins, Ali Sunyaev
2020 WI2020 Zentrale Tracks  
Our findings reveal that V2X is perceived as a critical information infrastructure coming with several challenges that must be tackled, such as security and privacy issues, lacking trust and acceptance  ...  We conducted 19 semistructured interviews with experts from multiple market players to achieve a more holistic overview of what challenges implementation and diffusion of V2X are facing.  ...  With an increasing amount of data being collected data privacy gains in importance.  ... 
doi:10.30844/wi_2020_r12-renner dblp:conf/wirtschaftsinformatik/RennerMHLS20 fatcat:x3cjvkn6fnccpoyoqvm52slftq

IoT Inspector: Crowdsourcing Labeled Network Traffic from Smart Home Devices at Scale [article]

Danny Yuxing Huang, Noah Apthorpe, Gunes Acar, Frank Li, Nick Feamster
2019 arXiv   pre-print
To do so, we developed and released IoT Inspector, an open-source tool that allows users to observe the traffic from smart home devices on their own home networks.  ...  We demonstrate how this data enables new research into smart homes through two case studies focused on security and privacy.  ...  What trackers do devices communicate with? Whereas Section 6.1 looks at the security of smart home devices, this section focuses on privacy.  ... 
arXiv:1909.09848v1 fatcat:sur7g2ypizhvhcvovfyyd3fz3u

Applying Distributed Ledger Concepts to a Swiss Regional Label Ecosystem

Saša Malešević, Michael Lustenberger, Florian Spychiger
2020 Logistics  
still providing security and privacy for sensitive data.  ...  Additionally, data capturing should be simple.  ...  The last two requirements of privacy (R7) and security (R8) were assessed only by the concept creators and the DLT experts.  ... 
doi:10.3390/logistics4040032 fatcat:qe7nyr6shbfidmocol2plzrk7a

Internet of Things based Expert System for Smart Agriculture

Raheela Shahzadi, Javed Ferzund, Muhammad Tausif, Muhammad Asif
2016 International Journal of Advanced Computer Science and Applications  
However, these expert systems rely on the stored knowledge base. We propose an expert system based on the Internet of Things (IoT) that will use the input data collected in real time.  ...  Efforts are being made to enhance the productivity and reduce losses by using the state of the art technology and equipment.  ...  The ES can provide output whenever it has given input. It means it should be easily available to the farmers. In this paper, we present an Expert System based on the concept of Internet of Things.  ... 
doi:10.14569/ijacsa.2016.070947 fatcat:wtp5y3vbe5d77ov4jk2h7rn65q

Goodbye Tracking? Impact of iOS App Tracking Transparency and Privacy Labels [article]

Konrad Kollnig, Anastasia Shuba, Max Van Kleek, Reuben Binns, Nigel Shadbolt
2022 arXiv   pre-print
In defence of user privacy, Apple introduced two significant changes with iOS 14: App Tracking Transparency (ATT), a mandatory opt-in system for enabling tracking on iOS, and Privacy Nutrition Labels,  ...  We find real-world evidence of apps computing and agreeing on a fingerprinting-derived identifier through the use of server-side code, thereby violating Apple's policies and exposing the limits of what  ...  Max Van Kleek has been supported by the PETRAS National Centre of Excellence for IoT Systems Cybersecurity, which has been funded by the UK EPSRC under grant number EP/S035362/1.  ... 
arXiv:2204.03556v3 fatcat:dkerhjziufgivaz4uysptsw3uq

Unintended Side Effects of the Digital Transition: European Scientists' Messages from a Proposition-Based Expert Round Table

Roland Scholz, Eric Bartelsman, Sarah Diefenbach, Lude Franke, Arnim Grunwald, Dirk Helbing, Richard Hill, Lorenz Hilty, Mattias Höjer, Stefan Klauser, Christian Montag, Peter Parycek (+6 others)
2018 Sustainability  
subject of overarching research; and (iii) what unseens should become subjects of transdisciplinary theory and practice processes for developing socially robust orientations.  ...  We present the main messages of a European Expert Round Table ( ERT) on the unintended side effects (unseens) of the digital transition.  ...  Like in biology where high security labs (labeled P1-P4) have been created and monitored, high-cybersecurity labs should be developed in the academic world and not only in the military, police or governmental  ... 
doi:10.3390/su10062001 fatcat:4tdrfc55cnhobfl2vvsxl42xwy

PRIVACY NUTRITION LABELS VS. PRIVACY DYNAMIC TARGETING - Ex-ante and ex-post models for the administration of privacy information and the exercise of data subject rights

Luca Bolognini, Marco Emanuele Carpenelli
2021 Zenodo  
While the static ex-ante model, like the one developed by Apple with the Privacy Nutrition Labels, is still anchored to traditional information administration criteria (even if in innovative and creative  ...  The effect in these cases would be that of systematically and coherently personalising the privacy-information experience to the advantage of the data subjects.  ...  Faith Cranor and H. Hibshi, "Ask the Experts: What Should Be on an IoT Privacy and Security Label?"  ... 
doi:10.5281/zenodo.4836088 fatcat:npldf5t6jfd3xofefbi3hfhp4m

Security should be there by default: Investigating how journalists perceive and respond to risks from the Internet of Things [article]

Anjuli R. K. Shere and Jason R. C. Nurse and Ivan Flechais
2020 arXiv   pre-print
Second, we surveyed 34 cyber security experts to establish if and how lay-people can combat IoT threats.  ...  However, all proposed individual mitigation methods are likely to be short-term solutions, with 26 of 34 (76.5%) of cyber security experts responding that within the next five years it will not be possible  ...  Acknowledgment We thank all of the participants of this study for their time and contribution.  ... 
arXiv:2008.04698v1 fatcat:bjt2kkvpkbh4hkkj7txpvddfs4

Designing Privacy-aware Internet of Things Applications [article]

Charith Perera, Mahmoud Barhamgi, Arosha K. Bandara, Muhammad Ajmal, Blaine Price, Bashar Nuseibeh
2019 arXiv   pre-print
A key finding of our research is that the PbD framework significantly increases both novice and expert software engineers' ability to design privacy into IoT applications.  ...  The advent of behaviour driven security mechanisms, failing to address privacy concerns in the design of IoT applications can have security implications.  ...  Acknowledgement We acknowledge the financial support of European Research Council Advanced Grant 291652 (ASAP) and the EPSRC PETRAS 2 (EP/S035362/1) .  ... 
arXiv:1703.03892v5 fatcat:4tf2awgekncztef5v7o2crlupm
« Previous Showing results 1 — 15 out of 1,657 results