IEEE Technology and Society Magazine - March 2020 - 27
rate than individuals have previously
been used to when it comes to personal security. As the threats are not
about physical well-being, there may
be a temptation to take them less
seriously as they may not be a direct
danger to an individual's personal
physical safety. There may also be
a misunderstanding about what
exactly the threat is. This is in part
because individuals may carry over
the mental models for physical security to digital security, which lead
them to have incorrect expectations
about the nature and consequences
of the threats they may face.
However, it is important to take
digital security just as seriously as
one would physical security. This is
particularly relevant in the context
of the smart home. There are two
primary issues with the introduction of smart devices into the home.
The first issue is that the device has
ineffective security, for example the
device is easily hackable. The second, more concerning, issue is that
the device be sufficiently secure, but
users are manipulated into allowing
manufacturers access to more data
than they really want to share.
tants like Amazon's Alexa or Google
be used to access information held
Assistant, data may be sent to proin other parts of the system. This is
cessing centers or may even be
particularly a problem when users
inadvertently sent to contacts [4], [5].
introduce smart appliances such as
When such breaches occur users
vacuum cleaners that have not premay feel betrayed by these devices
viously been considered a security
and reluctant to use them because
threat. These devices are new to
they have built an incorrect mental
the market, readily available, and
model of how the device functions.
cheap. As a result they may not necWhile users are familiar with
essarily be secure [8].
ensuring the physical security of
The most obvious way to address
their homes to protect themselves,
this is to ensure that Internet serdigital security is a relatively new
vice providers have sufficient secuconcept. Despite education on the
rity on the server side. However, the
topic, users may assume a device is
end user and purchaser of smart
more secure than it is because they
home devices has no control over
may not consider how each indithis. What they do have control over
vidual device connected is in their
is ensuring that each device introhome, just that the devices within
duced into the home has sufficient
the home itself are secure (that they
security protocols in place. Howevcannot be easily stolen).
er, this may not always be possible.
Physical security is easier to conIn cases where users want, or need,
template than digital security for
to introduce a new device for which
the majority of users. It is
engrained in society that to
prevent break-ins, homeowners need to lock their
doors a nd w indows. To
Security threats to smart devices
do this, they can purchase
locks and alarms, which
are not just from hacking, but
once in stalled they only
need to maintain. The menalso from a lack of control over
tal model of home security is
data access.
that once purchased, a lock
or an alarm system functions primarily on its own. It
does not need to be regularly reviewed
they are unable to determine the
or updated and its working condition
security level, one potential solution
can be easily checked by sight or
is to introduce a surveillance system
touch. This model can be incorfor the smart devices that will monirectly carried over to digital security.
tor their security status on behalf of
Digital security requires constant
the user.
vigilance. The technology is newer
One such example is the GHOST
and is constantly changing, so users
system which is currently being
of smart devices need to regularly
developed as part of the EU Framecheck for security breaches and
work Program for Research and
updates. Each device provides a
Innovation Horizon 2020 [9]. While
potential entry point into a user's
users cannot guarantee the secuhome network, and the fact that all
rity of individual smart devices, they
devices are interconnected means
can use the GHOST system to conthat without sufficient security for
tinuously monitor and provide feedeach device, any one of them can
back on the security status of their
Case One: A Smart Device is
Safe, but Not Secure
In cases where there the security
provided is insufficient, an issue
occurs because there is a difference
between the mental models of the
user, and the designer of the device.
Users may trust these devices
because they trust the company that
produces them, the designer of the
device, or because they are unaware
of what data may be collected. This
is often complicated by the fact that
many users assume privacy and
security are synonymous. Because
data may be encrypted and safe
from hackers, users may assume
that it is confidential as well. This
isn't necessarily the case. Particularly with voice activated virtual assisMARCH 2020
∕
IEEE TECHNOLOGY AND SOCIETY MAGAZINE
27
IEEE Technology and Society Magazine - March 2020
Table of Contents for the Digital Edition of IEEE Technology and Society Magazine - March 2020
Contents
IEEE Technology and Society Magazine - March 2020 - Cover1
IEEE Technology and Society Magazine - March 2020 - Cover2
IEEE Technology and Society Magazine - March 2020 - 1
IEEE Technology and Society Magazine - March 2020 - Contents
IEEE Technology and Society Magazine - March 2020 - 3
IEEE Technology and Society Magazine - March 2020 - 4
IEEE Technology and Society Magazine - March 2020 - 5
IEEE Technology and Society Magazine - March 2020 - 6
IEEE Technology and Society Magazine - March 2020 - 7
IEEE Technology and Society Magazine - March 2020 - 8
IEEE Technology and Society Magazine - March 2020 - 9
IEEE Technology and Society Magazine - March 2020 - 10
IEEE Technology and Society Magazine - March 2020 - 11
IEEE Technology and Society Magazine - March 2020 - 12
IEEE Technology and Society Magazine - March 2020 - 13
IEEE Technology and Society Magazine - March 2020 - 14
IEEE Technology and Society Magazine - March 2020 - 15
IEEE Technology and Society Magazine - March 2020 - 16
IEEE Technology and Society Magazine - March 2020 - 17
IEEE Technology and Society Magazine - March 2020 - 18
IEEE Technology and Society Magazine - March 2020 - 19
IEEE Technology and Society Magazine - March 2020 - 20
IEEE Technology and Society Magazine - March 2020 - 21
IEEE Technology and Society Magazine - March 2020 - 22
IEEE Technology and Society Magazine - March 2020 - 23
IEEE Technology and Society Magazine - March 2020 - 24
IEEE Technology and Society Magazine - March 2020 - 25
IEEE Technology and Society Magazine - March 2020 - 26
IEEE Technology and Society Magazine - March 2020 - 27
IEEE Technology and Society Magazine - March 2020 - 28
IEEE Technology and Society Magazine - March 2020 - 29
IEEE Technology and Society Magazine - March 2020 - 30
IEEE Technology and Society Magazine - March 2020 - 31
IEEE Technology and Society Magazine - March 2020 - 32
IEEE Technology and Society Magazine - March 2020 - 33
IEEE Technology and Society Magazine - March 2020 - 34
IEEE Technology and Society Magazine - March 2020 - 35
IEEE Technology and Society Magazine - March 2020 - 36
IEEE Technology and Society Magazine - March 2020 - 37
IEEE Technology and Society Magazine - March 2020 - 38
IEEE Technology and Society Magazine - March 2020 - 39
IEEE Technology and Society Magazine - March 2020 - 40
IEEE Technology and Society Magazine - March 2020 - 41
IEEE Technology and Society Magazine - March 2020 - 42
IEEE Technology and Society Magazine - March 2020 - 43
IEEE Technology and Society Magazine - March 2020 - 44
IEEE Technology and Society Magazine - March 2020 - 45
IEEE Technology and Society Magazine - March 2020 - 46
IEEE Technology and Society Magazine - March 2020 - 47
IEEE Technology and Society Magazine - March 2020 - 48
IEEE Technology and Society Magazine - March 2020 - 49
IEEE Technology and Society Magazine - March 2020 - 50
IEEE Technology and Society Magazine - March 2020 - 51
IEEE Technology and Society Magazine - March 2020 - 52
IEEE Technology and Society Magazine - March 2020 - 53
IEEE Technology and Society Magazine - March 2020 - 54
IEEE Technology and Society Magazine - March 2020 - 55
IEEE Technology and Society Magazine - March 2020 - 56
IEEE Technology and Society Magazine - March 2020 - 57
IEEE Technology and Society Magazine - March 2020 - 58
IEEE Technology and Society Magazine - March 2020 - 59
IEEE Technology and Society Magazine - March 2020 - 60
IEEE Technology and Society Magazine - March 2020 - 61
IEEE Technology and Society Magazine - March 2020 - 62
IEEE Technology and Society Magazine - March 2020 - 63
IEEE Technology and Society Magazine - March 2020 - 64
IEEE Technology and Society Magazine - March 2020 - 65
IEEE Technology and Society Magazine - March 2020 - 66
IEEE Technology and Society Magazine - March 2020 - 67
IEEE Technology and Society Magazine - March 2020 - 68
IEEE Technology and Society Magazine - March 2020 - 69
IEEE Technology and Society Magazine - March 2020 - 70
IEEE Technology and Society Magazine - March 2020 - 71
IEEE Technology and Society Magazine - March 2020 - 72
IEEE Technology and Society Magazine - March 2020 - 73
IEEE Technology and Society Magazine - March 2020 - 74
IEEE Technology and Society Magazine - March 2020 - 75
IEEE Technology and Society Magazine - March 2020 - 76
IEEE Technology and Society Magazine - March 2020 - 77
IEEE Technology and Society Magazine - March 2020 - 78
IEEE Technology and Society Magazine - March 2020 - 79
IEEE Technology and Society Magazine - March 2020 - 80
IEEE Technology and Society Magazine - March 2020 - 81
IEEE Technology and Society Magazine - March 2020 - 82
IEEE Technology and Society Magazine - March 2020 - 83
IEEE Technology and Society Magazine - March 2020 - 84
IEEE Technology and Society Magazine - March 2020 - 85
IEEE Technology and Society Magazine - March 2020 - 86
IEEE Technology and Society Magazine - March 2020 - 87
IEEE Technology and Society Magazine - March 2020 - 88
IEEE Technology and Society Magazine - March 2020 - Cover3
IEEE Technology and Society Magazine - March 2020 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2013
https://www.nxtbookmedia.com