Главная
Study mode:
on
1
Intro
2
Smart devices are getting hacked
3
Positive attitude toward labels
4
Three-round Delphi method with 22 experts
5
Expert recruitment criteria
6
One interview and two survey rounds
7
Labels to inform consumers' purchase behavior
8
Other perceived values of the label
9
We designed a layered label
10
Factors to include on the primary layer
11
Factors to include on the secondary layer
12
Non-comparative and comparative purchase
13
Attitudes toward the design of the label
14
Label should work for both consumers and experts
15
Specification document details
16
We designed a tool to generate the label
17
lot labels to provide transparency
Description:
Explore the critical aspects of IoT privacy and security labeling in this IEEE conference talk. Delve into the findings of a comprehensive study involving privacy and security experts and consumers to determine essential information for IoT device labels. Learn about the three-round Delphi process used to identify key factors, the distribution of these factors across primary and secondary label layers, and the rationale behind expert choices. Discover insights from consumer interviews and their perceptions of the proposed label information. Examine the prototype privacy and security label designed to empower consumers in making informed IoT purchase decisions, and understand the potential impact of such labels on transparency in the IoT market.

What Should Be on an IoT Privacy and Security Label?

IEEE
Add to list
0:00 / 0:00