

Overall, all participants were satisfied with the proposed website prototype and their actual usability evaluation demonstrated a good understanding of the website features.

convenience importance, participants with low privacy and low convenience significantly reported less privacy control and convenience preferences than participants with high privacy and high convenience. Based on their average scores on the privacy Participants perceived privacy as more important than the convenienceĪfforded by the IoT devices.

Prototype for smart home IoT device management. We conducted a web-based survey and usability study with 43 participants who use IoT devices frequently to 1) examine their smart home IoT usage patterns and privacy preferences, and 2) evaluate a web-based With the growing advances in the Internet of Things (IoT) technology, IoT device management platforms are becoming increasingly important. Further, our findings show that nudging the participants to think about different usage contexts led them to think deeper about the associated risks and raise their concern scores. Through a Mechanical Turk survey of 386 participants on 49 smart-home IFTTT applets, we found that participants have a nuanced view of contextual factors and that different values for contextual factors impact end-users’ risk perception differently. Our work complements prior work that has identified the impact of usage context on expert evaluation of risks in IFTTT by focusing the impact of usage context on end-users’ risk perception. More importantly we explore whether usage context makes a difference in end-users’ perception of such risks. This work aims to understand to what extent end users can assess this implicit risk. However, there are inherent implicit risks in using such applets-even non-malicious ones-as sensitive information may leak through their use in certain contexts ( e.g., where the device is located, who can observe the resultant action). End users are increasingly using trigger-action platforms like If-This-Then-That (IFTTT) to create applets to connect smart-home devices and services.
