Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Reducing risk to security and privacy in the selection of trigger-action rules: Implicit vs. explicit priming for domestic smart devices
Luleå University of Technology, Department of Health, Learning and Technology, Health, Medicine and Rehabilitation. Centre for Artificial Intelligence, Robotics and Human-Machine Systems (IROHMS), Human Factors Excellence Research Group (HuFEx): School of Psychology, Cardiff University, 70 Park Place, Cardiff, CF10 3AT, UK.
Centre for Artificial Intelligence, Robotics and Human-Machine Systems (IROHMS), Human Factors Excellence Research Group (HuFEx): School of Psychology, Cardiff University, 70 Park Place, Cardiff, CF10 3AT, UK.
Newcastle University Business School, 5 Barrack Road, Newcastle upon Tyne, NE1 4SE, UK.
Centre for Artificial Intelligence, Robotics and Human-Machine Systems (IROHMS), Human Factors Excellence Research Group (HuFEx): School of Psychology, Cardiff University, 70 Park Place, Cardiff, CF10 3AT, UK; School of Psychology, Cardiff University, 70 Park Place, Cardiff, CF10 3AT, UK.
Show others and affiliations
2022 (English)In: International journal of human-computer studies, ISSN 1071-5819, E-ISSN 1095-9300, Vol. 168, article id 102902Article in journal (Refereed) Published
Abstract [en]

Smart home device usage is increasing, as is the diversity of users and range of devices. Additionally, it is becoming increasingly common to interconnect devices (e.g., via trigger-action rules) which, while bringing benefits, can bring unforeseen security and privacy risks. Developing strategies to protect users as well as understanding what biographical or attitudinal characteristics contribute to these risks is a critical step for ensuring empowered, but safe, interconnected smart device usage. Using narrative descriptions of domestic smart devices, two experiments explored how the prevailing security/privacy contexts—priming conditions—in which 20 trigger-action rules (developed via a Delphi Study) were presented influenced the adoption of rules favoring either security or privacy. Both experiments contrasted three priming conditions: no prime, security prime, privacy prime. Experiment 1 (n=254) used explicit priming, giving direct instruction to maximize a security or privacy outcome while Experiment 2 (n=325) used implicit priming, with an apparently unrelated security or privacy problem-solving puzzle. Across both experiments, priming promoted safer rule adoption, markedly so when explicit. Explicit priming produced an asymmetry however: privacy priming improved privacy scores with security scores unchanged and security primes improved security scores while worsening privacy scores. Across experiments, two dimensions of user attitudes shaped riskier rule choice: perceived benefits of technology and pre-existing trusting beliefs in online companies. Our novel findings reveal that implicit and explicit priming shape safe use of trigger-action rules in domestic settings and that age, perceived trust and perceived benefits should be considered when designing safety messaging.

Place, publisher, year, edition, pages
Elsevier, 2022. Vol. 168, article id 102902
Keywords [en]
Cyber Security, Susceptibility, Priming, Individual Differences, Trigger-action Rules
National Category
Computer Engineering
Research subject
Engineering Psychology
Identifiers
URN: urn:nbn:se:ltu:diva-92416DOI: 10.1016/j.ijhcs.2022.102902Scopus ID: 2-s2.0-85136039775OAI: oai:DiVA.org:ltu-92416DiVA, id: diva2:1688214
Projects
Understanding the role of individual differences in the adoption, use and exploitation of smart home technology
Note

Validerad;2022;Nivå 2;2022-09-29 (hanlid);

Funder: CREST

Available from: 2022-08-18 Created: 2022-08-18 Last updated: 2022-09-29Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus
By organisation
Health, Medicine and Rehabilitation
In the same journal
International journal of human-computer studies
Computer Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 69 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf