Skip to main content

An End-User Development Approach to Secure Smart Environments

  • Conference paper
  • First Online:
End-User Development (IS-EUD 2021)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 12724))

Included in the following conference series:

Abstract

Given the spread of the Internet of Things (IoT) technology, in several contexts there is a growing need for laypeople to configure their smart devices. Task Automation Systems (TASs) have emerged as tools to simplify the definition of rules for personalizing the behavior of such devices. However, one aspect often neglected by current TASs, which is instead typical of IoT technologies, relates to the security and privacy threats exposed by the “connected” devices. This paper tries to address this problem and illustrates a user-centered design that eventually led to identify a visual paradigm that facilitates the end users in understanding and controlling security and privacy threats.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The complete list of the 35 original ID events and their extended descriptions (expressed in Italian) is reported in the Appendix at this link https://tinyurl.com/Q-EFESTO-ID.

References

  1. Alqhatani, A., Lipford, H.R.: There is nothing that i need to keep secret: sharing practices and concerns of wearable fitness data. In: Proceedings of the Conference on Usable Privacy and Security (USENIX 2019), pp. 421–434. USENIX Association (2019)

    Google Scholar 

  2. Ardito, C., Buono, P., Desolda, G., Matera, M.: From smart objects to smart experiences: an end-user development approach. Int. J. Hum. Comput. Stud. 114, 51–68 (2017)

    Article  Google Scholar 

  3. Ardito, C., Desolda, G., Lanzilotti, R., Malizia, A., Matera, M.: Analysing trade-offs in frameworks for the design of smart environments. Behav. Inf. Technol. 39(1), 47–71 (2019)

    Article  Google Scholar 

  4. Ardito, C., et al.: User-defined semantics for the design of IoT systems enabling smart interactive experiences. Pers. Ubiquit. Comput. 24(6), 781–796 (2020). https://doi.org/10.1007/s00779-020-01457-5

    Article  Google Scholar 

  5. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Int. J. Comput. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  Google Scholar 

  6. Balachandran, K.: kardSort. Retrieved from https://kardsort.com/ Accessed 14 Mar 2021

  7. Balducci, F., Buono, P., Desolda, G., Impedovo, D., Piccinno, A.: Improving smart interactive experiences in cultural heritage through pattern recognition techniques. Pattern Recogn. Lett. 131, 142–149 (2020)

    Article  Google Scholar 

  8. Bangor, A., Kortum, P., Miller, J.: The system usability scale (SUS): an empirical evaluation. Int. J. Hum.-Comput. Interact. 24(6), 574–594 (2008)

    Article  Google Scholar 

  9. Breve, B., Deufemia, V.: Empowering end-users in the specification of security rules. In: Proceedings of the 1st International Workshop on Empowering People in Dealing with Internet of Things Ecosystems - co-located with International Conference on Advanced Visual Interfaces (AVI 2020) (EMPATHY 2020). CEUR-WS (2020)

    Google Scholar 

  10. Brooke, J.: SUS-A quick and dirty usability scale. Usability Eval. Ind. 189(194), 4–7 (1996)

    Google Scholar 

  11. Corno, F., Russis, L.D., Roffarello, A.M.: Empowering end users in debugging trigger-action rules. In: Proceedings of the Conference on Human Factors in Computing Systems (CHI 2019), p. 388. Association for Computing Machinery (2019)

    Google Scholar 

  12. Costabile, M.F., Fogli, D., Lanzilotti, R., Mussio, P., Piccinno, A.: Supporting work practice through end-user development environments. J. Organ. End User Comput. 18(4), 43–65 (2006)

    Article  Google Scholar 

  13. Dale, E., Chall, J.S.: The concept of readability. Elementary Engl. 26(1), 19–26 (1949)

    Google Scholar 

  14. Desolda, G., Ardito, C., Matera, M.: Empowering end users to customize their smart environments: model, composition paradigms and domain-specific tools. ACM Trans. Comput.-Hum. Interact. 24(2), 1–52 (2017)

    Google Scholar 

  15. DuBay, W.H.: The Principles of Readability. Online Submission (2004)

    Google Scholar 

  16. Fagan, M., Khan, M.M.H.: Why do they do what they do?: A study of what motivates users to (not) follow computer security advice. In: Proceedings of the Symposium on Usable Privacy and Security (SOUPS 2016), pp. 59–75 (2016)

    Google Scholar 

  17. Federici, S., et al.: UTASSISTANT: a new semi-automatic usability evaluation tool for Italian public administrations. In: Proceedings of the International Conference on Advanced Visual Interfaces - ECONA Workshop (AVI 2018), pp. 1–3 (2018)

    Google Scholar 

  18. Flesch, R.: A new readability yardstick. J. Appl. Psychol. 32(3), 221 (1948)

    Article  Google Scholar 

  19. Flesch, R.: Flesch-Kincaid readability test. Retrieved October 26(2007), 3 (2007)

    Google Scholar 

  20. Hart, S.G.: Nasa-task load index (NASA-TLX); 20 years later. Hum. Factors Ergon. Soc. Annu. Meet. 50(9), 904–908 (2006)

    Article  Google Scholar 

  21. Hart, S.G., Staveland, L.E.: Development of NASA-TLX (Task Load Index): results of empirical and theoretical research. Adv. Psychol. 52, 139–183 (1988)

    Article  Google Scholar 

  22. He, W., et al.: Rethinking access control and authentication for the home internet of things (IoT). In: Proceedings of the Conference on Security Symposium (USENIX 2018), pp. 255–272. USENIX Association (2018)

    Google Scholar 

  23. Herzberg, A.: Why Johnny can’t surf (safely)? Attacks and defenses for web users. Comput. Secur. 28(1–2), 63–71 (2009)

    Article  Google Scholar 

  24. Ion, I., Reeder, R., Consolvo, S.: No one can hack my mind: comparing expert and non-expert security practices. In: Proceedings of the Conference on Usable Privacy and Security (USENIX 2015), pp. 327–346. USENIX Association (2015)

    Google Scholar 

  25. Knieriem, B., Zhang, X., Levine, P., Breitinger, F., Baggili, I.: An Overview of the Usage of Default Passwords. In: Matoušek, P., Schmiedecker, M. (eds.) Digital Forensics and Cyber Crime. LNICSSITE, vol. 216, pp. 195–203. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-73697-6_15

    Chapter  Google Scholar 

  26. Lewis, J.R., Sauro, J.: The factor structure of the system usability scale. In: Kurosu, M. (ed.) Human Centered Design. LNCS, vol. 5619, pp. 94–103. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02806-9_12

    Chapter  Google Scholar 

  27. Lieberman, H., Paternò, F., Klann, M., Wulf, V.: End-user development: an emerging paradigm. In: Lieberman, H., Paternò, F., Wulf, V. (eds.) End User Development. Human-Computer Interaction Series, vol. 9. Springer, Dordrecht (2006). https://doi.org/10.1007/1-4020-5386-X_1

  28. Ling, Z., Liu, K., Xu, Y., Jin, Y., Fu, X.: An end-to-end view of IoT security and privacy. In: Proceedings of the IEEE Global Communications Conference (GLOBECOM 2017 ), pp. 1–7 (2017)

    Google Scholar 

  29. Loop11. Loop11 User Testing. Retrieved from https://www.loop11.com/ Accessed 14 Sept 2020

  30. Manca, M., Fabio, P., Santoro, C., Corcella, L.: Supporting end-user debugging of trigger-action rules for IoT applications. Int. J. Hum. Comput. Stud. 123, 56–69 (2019)

    Article  Google Scholar 

  31. Markopoulos, P., Nichols, J., Paternò, F., Pipek, V.: Editorial: end-user development for the internet of things. ACM Trans. Comput.-Hum. Interact. 24(2), 1–3 (2017)

    Article  Google Scholar 

  32. Mc Laughlin, G.H.: SMOG grading-a new readability formula. J. Read. 12(8), 639–646 (1969)

    Google Scholar 

  33. Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum, G., Ghani, N.: Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Commun. Surv. Tutorials 21(3), 2702–2733 (2019)

    Article  Google Scholar 

  34. Nielsen, J.: Card Sorting: How Many Users to Test. Retrieved from https://www.nngroup.com/articles/card-sorting-how-many-users-to-test/ Accessed 14 Mar 2021

  35. Readable. readable app. Retrieved from https://app.readable.com/text/ Accessed 14 Mar 2021

  36. Scranton, M.A.: SMOG grading: a readability formula by G. Harry McLaughlin Kansas State University (1970)

    Google Scholar 

  37. Shinde, P.: Application of existing k-means algorithms for the evaluation of card sorting experiments (2017)

    Google Scholar 

  38. Spencer, D.: Card Sorting: Designing Usable Categories. Rosenfeld Media (2009)

    Google Scholar 

  39. Surbatovich, M., Aljuraidan, J., Bauer, L., Das, A., Jia, L.: Some recipes can do more than spoil your appetite: analyzing the security and privacy risks of IFTTT Recipes. In: Proceedings of the International Conference on World Wide Web (WWW 2017), pp. 1501–1510. International World Wide Web Conferences Steering Committee (2017)

    Google Scholar 

  40. Szwillus, G., Hülsmann, A., Mexin, Y., Wawilow, A.: Casolysis 2.0 - Flexible Auswertung von Card Sorting Experimenten. In: Proceedings of the Usability Professionals (Casolysis 2.0 - Flexible Auswertung von Card Sorting Experimenten) (2015)

    Google Scholar 

  41. Tetteroo, D., Soute, I., Markopoulos, P.: Five key challenges in end-user development for tangible and embodied interaction. In: Proceedings of the ACM International conference on multimodal interaction (ICMI 2013), 247–254. ACM, New York (2013)

    Google Scholar 

  42. Thelwall, M.: The heart and soul of the web? Sentiment strength detection in the social web with SentiStrength. In: Hołyst, J.A. (ed.) Cyberemotions. UCS, pp. 119–134. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-43639-5_7

    Chapter  Google Scholar 

  43. Ur, B., McManus, E., Ho, M.P.Y., Littman, M.L.: Practical trigger-action programming in the smart home. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2014), pp. 803–812. ACM, New York (2014)

    Google Scholar 

  44. Wajid, U., Namoun, A., Mehandjiev, N.: Alternative representations for end user composition of service-based systems. In: Costabile, M.F., Dittrich, Y., Fischer, G., Piccinno, A. (eds.) End-User Development. LNCS, vol. 6654, pp. 53–66. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21530-8_6

    Chapter  Google Scholar 

  45. Watson, I.: Natural Language Understanding. Retrieved from https://natural-language-understanding-demo.ng.bluemix.net/ Accessed 14 Mar 2021

  46. Wogalter, M.S., DeJoy, D., Laughery, K.R.: Warnings and Risk Communication. CRC Press (1999)

    Book  Google Scholar 

  47. Zeng, E., Mare, S., Roesner, F.: End user security & privacy concerns with smart homes. In: Proceedings of the Conference on Usable Privacy and Security (USENIX 2017), pp. 65–80. USENIX Association (2017)

    Google Scholar 

Download references

Acknowledgment

This work is partially supported by the Italian Ministry of University and Research (MIUR) under grant PRIN 2017 “EMPATHY: EMpowering People in deAling with internet of THings ecosYstems”. We also acknowledge the financial support of MIUR through the PON project TALIsMAn - Tecnologie di Assistenza personALizzata per il Miglioramento della quAlità della vitA (Grant No. ARS01_ 01116).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Giuseppe Desolda .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Breve, B., Desolda, G., Deufemia, V., Greco, F., Matera, M. (2021). An End-User Development Approach to Secure Smart Environments. In: Fogli, D., Tetteroo, D., Barricelli, B.R., Borsci, S., Markopoulos, P., Papadopoulos, G.A. (eds) End-User Development. IS-EUD 2021. Lecture Notes in Computer Science(), vol 12724. Springer, Cham. https://doi.org/10.1007/978-3-030-79840-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-79840-6_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-79839-0

  • Online ISBN: 978-3-030-79840-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics