A survey of compiler testing
Virtually any software running on a computer has been processed by a compiler or a
compiler-like tool. Because compilers are such a crucial piece of infrastructure for building …
compiler-like tool. Because compilers are such a crucial piece of infrastructure for building …
[HTML][HTML] Setting privacy “by default” in social IoT: Theorizing the challenges and directions in Big Data Research
Abstract The social Internet of Things (SIoT) shares large amounts of data that are then
processed by other Internet of Thing (IoT) devices, which results in the generation …
processed by other Internet of Thing (IoT) devices, which results in the generation …
Alexa, are you listening? Privacy perceptions, concerns and privacy-seeking behaviors with smart speakers
J Lau, B Zimmerman, F Schaub - Proceedings of the ACM on human …, 2018 - dl.acm.org
Smart speakers with voice assistants, like Amazon Echo and Google Home, provide benefits
and convenience but also raise privacy concerns due to their continuously listening …
and convenience but also raise privacy concerns due to their continuously listening …
Music, search, and IoT: How people (really) use voice assistants
Voice has become a widespread and commercially viable interaction mechanism with the
introduction of voice assistants (VAs), such as Amazon's Alexa, Apple's Siri, Google …
introduction of voice assistants (VAs), such as Amazon's Alexa, Apple's Siri, Google …
User perceptions of smart home IoT privacy
Smart home Internet of Things (IoT) devices are rapidly increasing in popularity, with more
households including Internet-connected devices that continuously monitor user activities. In …
households including Internet-connected devices that continuously monitor user activities. In …
{BlackIoT}:{IoT} botnet of high wattage devices can disrupt the power grid
We demonstrate that an Internet of Things (IoT) botnet of high wattage devices–such as air
conditioners and heaters–gives a unique ability to adversaries to launch large-scale …
conditioners and heaters–gives a unique ability to adversaries to launch large-scale …
Exploring how privacy and security factor into IoT device purchase behavior
Despite growing concerns about security and privacy of Internet of Things (IoT) devices,
consumers generally do not have access to security and privacy information when …
consumers generally do not have access to security and privacy information when …
Rethinking access control and authentication for the home internet of things ({{{{{IoT}}}}})
Computing is transitioning from single-user devices to the Internet of Things (IoT), in which
multiple users with complex social relationships interact with a single device. Currently …
multiple users with complex social relationships interact with a single device. Currently …
Privacy attitudes of smart speaker users
As devices with always-on microphones located in people's homes, smart speakers have
significant privacy implications. We surveyed smart speaker owners about their beliefs …
significant privacy implications. We surveyed smart speaker owners about their beliefs …
Tangible privacy: Towards user-centric sensor designs for bystander privacy
Sensor-enabled computers in the form of'IoT'devices such as home security cameras and
voice assistants are increasingly becoming pervasive in our environment. With the …
voice assistants are increasingly becoming pervasive in our environment. With the …