Abstract
Given the spread of the Internet of Things (IoT) technology, in several contexts there is a growing need for laypeople to configure their smart devices. Task Automation Systems (TASs) have emerged as tools to simplify the definition of rules for personalizing the behavior of such devices. However, one aspect often neglected by current TASs, which is instead typical of IoT technologies, relates to the security and privacy threats exposed by the “connected” devices. This paper tries to address this problem and illustrates a user-centered design that eventually led to identify a visual paradigm that facilitates the end users in understanding and controlling security and privacy threats.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The complete list of the 35 original ID events and their extended descriptions (expressed in Italian) is reported in the Appendix at this link https://tinyurl.com/Q-EFESTO-ID.
References
Alqhatani, A., Lipford, H.R.: There is nothing that i need to keep secret: sharing practices and concerns of wearable fitness data. In: Proceedings of the Conference on Usable Privacy and Security (USENIX 2019), pp. 421–434. USENIX Association (2019)
Ardito, C., Buono, P., Desolda, G., Matera, M.: From smart objects to smart experiences: an end-user development approach. Int. J. Hum. Comput. Stud. 114, 51–68 (2017)
Ardito, C., Desolda, G., Lanzilotti, R., Malizia, A., Matera, M.: Analysing trade-offs in frameworks for the design of smart environments. Behav. Inf. Technol. 39(1), 47–71 (2019)
Ardito, C., et al.: User-defined semantics for the design of IoT systems enabling smart interactive experiences. Pers. Ubiquit. Comput. 24(6), 781–796 (2020). https://doi.org/10.1007/s00779-020-01457-5
Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Int. J. Comput. Comput. Netw. 54(15), 2787–2805 (2010)
Balachandran, K.: kardSort. Retrieved from https://kardsort.com/ Accessed 14 Mar 2021
Balducci, F., Buono, P., Desolda, G., Impedovo, D., Piccinno, A.: Improving smart interactive experiences in cultural heritage through pattern recognition techniques. Pattern Recogn. Lett. 131, 142–149 (2020)
Bangor, A., Kortum, P., Miller, J.: The system usability scale (SUS): an empirical evaluation. Int. J. Hum.-Comput. Interact. 24(6), 574–594 (2008)
Breve, B., Deufemia, V.: Empowering end-users in the specification of security rules. In: Proceedings of the 1st International Workshop on Empowering People in Dealing with Internet of Things Ecosystems - co-located with International Conference on Advanced Visual Interfaces (AVI 2020) (EMPATHY 2020). CEUR-WS (2020)
Brooke, J.: SUS-A quick and dirty usability scale. Usability Eval. Ind. 189(194), 4–7 (1996)
Corno, F., Russis, L.D., Roffarello, A.M.: Empowering end users in debugging trigger-action rules. In: Proceedings of the Conference on Human Factors in Computing Systems (CHI 2019), p. 388. Association for Computing Machinery (2019)
Costabile, M.F., Fogli, D., Lanzilotti, R., Mussio, P., Piccinno, A.: Supporting work practice through end-user development environments. J. Organ. End User Comput. 18(4), 43–65 (2006)
Dale, E., Chall, J.S.: The concept of readability. Elementary Engl. 26(1), 19–26 (1949)
Desolda, G., Ardito, C., Matera, M.: Empowering end users to customize their smart environments: model, composition paradigms and domain-specific tools. ACM Trans. Comput.-Hum. Interact. 24(2), 1–52 (2017)
DuBay, W.H.: The Principles of Readability. Online Submission (2004)
Fagan, M., Khan, M.M.H.: Why do they do what they do?: A study of what motivates users to (not) follow computer security advice. In: Proceedings of the Symposium on Usable Privacy and Security (SOUPS 2016), pp. 59–75 (2016)
Federici, S., et al.: UTASSISTANT: a new semi-automatic usability evaluation tool for Italian public administrations. In: Proceedings of the International Conference on Advanced Visual Interfaces - ECONA Workshop (AVI 2018), pp. 1–3 (2018)
Flesch, R.: A new readability yardstick. J. Appl. Psychol. 32(3), 221 (1948)
Flesch, R.: Flesch-Kincaid readability test. Retrieved October 26(2007), 3 (2007)
Hart, S.G.: Nasa-task load index (NASA-TLX); 20 years later. Hum. Factors Ergon. Soc. Annu. Meet. 50(9), 904–908 (2006)
Hart, S.G., Staveland, L.E.: Development of NASA-TLX (Task Load Index): results of empirical and theoretical research. Adv. Psychol. 52, 139–183 (1988)
He, W., et al.: Rethinking access control and authentication for the home internet of things (IoT). In: Proceedings of the Conference on Security Symposium (USENIX 2018), pp. 255–272. USENIX Association (2018)
Herzberg, A.: Why Johnny can’t surf (safely)? Attacks and defenses for web users. Comput. Secur. 28(1–2), 63–71 (2009)
Ion, I., Reeder, R., Consolvo, S.: No one can hack my mind: comparing expert and non-expert security practices. In: Proceedings of the Conference on Usable Privacy and Security (USENIX 2015), pp. 327–346. USENIX Association (2015)
Knieriem, B., Zhang, X., Levine, P., Breitinger, F., Baggili, I.: An Overview of the Usage of Default Passwords. In: Matoušek, P., Schmiedecker, M. (eds.) Digital Forensics and Cyber Crime. LNICSSITE, vol. 216, pp. 195–203. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-73697-6_15
Lewis, J.R., Sauro, J.: The factor structure of the system usability scale. In: Kurosu, M. (ed.) Human Centered Design. LNCS, vol. 5619, pp. 94–103. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02806-9_12
Lieberman, H., Paternò, F., Klann, M., Wulf, V.: End-user development: an emerging paradigm. In: Lieberman, H., Paternò, F., Wulf, V. (eds.) End User Development. Human-Computer Interaction Series, vol. 9. Springer, Dordrecht (2006). https://doi.org/10.1007/1-4020-5386-X_1
Ling, Z., Liu, K., Xu, Y., Jin, Y., Fu, X.: An end-to-end view of IoT security and privacy. In: Proceedings of the IEEE Global Communications Conference (GLOBECOM 2017 ), pp. 1–7 (2017)
Loop11. Loop11 User Testing. Retrieved from https://www.loop11.com/ Accessed 14 Sept 2020
Manca, M., Fabio, P., Santoro, C., Corcella, L.: Supporting end-user debugging of trigger-action rules for IoT applications. Int. J. Hum. Comput. Stud. 123, 56–69 (2019)
Markopoulos, P., Nichols, J., Paternò, F., Pipek, V.: Editorial: end-user development for the internet of things. ACM Trans. Comput.-Hum. Interact. 24(2), 1–3 (2017)
Mc Laughlin, G.H.: SMOG grading-a new readability formula. J. Read. 12(8), 639–646 (1969)
Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum, G., Ghani, N.: Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Commun. Surv. Tutorials 21(3), 2702–2733 (2019)
Nielsen, J.: Card Sorting: How Many Users to Test. Retrieved from https://www.nngroup.com/articles/card-sorting-how-many-users-to-test/ Accessed 14 Mar 2021
Readable. readable app. Retrieved from https://app.readable.com/text/ Accessed 14 Mar 2021
Scranton, M.A.: SMOG grading: a readability formula by G. Harry McLaughlin Kansas State University (1970)
Shinde, P.: Application of existing k-means algorithms for the evaluation of card sorting experiments (2017)
Spencer, D.: Card Sorting: Designing Usable Categories. Rosenfeld Media (2009)
Surbatovich, M., Aljuraidan, J., Bauer, L., Das, A., Jia, L.: Some recipes can do more than spoil your appetite: analyzing the security and privacy risks of IFTTT Recipes. In: Proceedings of the International Conference on World Wide Web (WWW 2017), pp. 1501–1510. International World Wide Web Conferences Steering Committee (2017)
Szwillus, G., Hülsmann, A., Mexin, Y., Wawilow, A.: Casolysis 2.0 - Flexible Auswertung von Card Sorting Experimenten. In: Proceedings of the Usability Professionals (Casolysis 2.0 - Flexible Auswertung von Card Sorting Experimenten) (2015)
Tetteroo, D., Soute, I., Markopoulos, P.: Five key challenges in end-user development for tangible and embodied interaction. In: Proceedings of the ACM International conference on multimodal interaction (ICMI 2013), 247–254. ACM, New York (2013)
Thelwall, M.: The heart and soul of the web? Sentiment strength detection in the social web with SentiStrength. In: Hołyst, J.A. (ed.) Cyberemotions. UCS, pp. 119–134. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-43639-5_7
Ur, B., McManus, E., Ho, M.P.Y., Littman, M.L.: Practical trigger-action programming in the smart home. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2014), pp. 803–812. ACM, New York (2014)
Wajid, U., Namoun, A., Mehandjiev, N.: Alternative representations for end user composition of service-based systems. In: Costabile, M.F., Dittrich, Y., Fischer, G., Piccinno, A. (eds.) End-User Development. LNCS, vol. 6654, pp. 53–66. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21530-8_6
Watson, I.: Natural Language Understanding. Retrieved from https://natural-language-understanding-demo.ng.bluemix.net/ Accessed 14 Mar 2021
Wogalter, M.S., DeJoy, D., Laughery, K.R.: Warnings and Risk Communication. CRC Press (1999)
Zeng, E., Mare, S., Roesner, F.: End user security & privacy concerns with smart homes. In: Proceedings of the Conference on Usable Privacy and Security (USENIX 2017), pp. 65–80. USENIX Association (2017)
Acknowledgment
This work is partially supported by the Italian Ministry of University and Research (MIUR) under grant PRIN 2017 “EMPATHY: EMpowering People in deAling with internet of THings ecosYstems”. We also acknowledge the financial support of MIUR through the PON project TALIsMAn - Tecnologie di Assistenza personALizzata per il Miglioramento della quAlità della vitA (Grant No. ARS01_ 01116).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Breve, B., Desolda, G., Deufemia, V., Greco, F., Matera, M. (2021). An End-User Development Approach to Secure Smart Environments. In: Fogli, D., Tetteroo, D., Barricelli, B.R., Borsci, S., Markopoulos, P., Papadopoulos, G.A. (eds) End-User Development. IS-EUD 2021. Lecture Notes in Computer Science(), vol 12724. Springer, Cham. https://doi.org/10.1007/978-3-030-79840-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-79840-6_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-79839-0
Online ISBN: 978-3-030-79840-6
eBook Packages: Computer ScienceComputer Science (R0)