R. BalebakoJ. JungW. LuL. F. CranorC. Nguyen 2013 Little brothers watching you: Raising awareness of data leaks on smartphones Proceedings of the 9th Symposium on Usable Privacy and Security. ACM
V. BellottiA. Sellen 1993 Design for privacy in ubiquitous computing environments Proceedings of the Third European Conference on Computer-Supported Cooperative Work 13–17 September 1993, Milan, Italy ECSCW?93 pp. 77 92 Springer
S. ConsolvoJ. JungB. GreensteinP. PowledgeG. MaganisD. Avrahami 2010 The wi-fi privacy ticker: improving awareness & control of personal information exposure on wi-fi Proceedings of the 12th ACM international conference on Ubiquitous computing. ACM
J. CorbinA. Strauss 2014 Basics of qualitative research: Techniques and procedures for developing grounded theory. Sage publications
L. F. CranorP. GuduruM. Arjula 2006 User interfaces for privacy agents ACM Transactions on Computer-Human Interaction (TOCHI) 13 2 135 178
M. J. CulnanG. R. Milne 2001 The culnanmilne survey on consumers & online privacy notices: Summary of responses Washington DC: FTC
M. EgeleC. KruegelE. KirdaG. Vigna 2011 PiOS: Detecting Privacy Leaks in iOS Applications Proceedings of 18th Annual Network and Distributed System Security Symposium
S. EgelmanR. KannavaraR. Chow 2015 Is this thing on?: Crowdsourcing privacy indicators for ubiquitous sensing platforms Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems pp. 1669 1678 ACM
S. EgelmanA. OatesS. Krishnamurthi 2011 Oops, i did it again: Mitigating repeated access control errors on facebook Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM
S. EgelmanJ. TsaiL. F. CranorA. Acquisti 2009 Timing is everything?: the effects of timing and placement of online privacy indicators In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM
Federal Trade Commission 2015 Internet of Things: Privacy & security in a connected world https://www.ftc.gov/system/files/documents/reports/\federal-trade-commission-staff-\report-november-2013-workshop-\entitled-internet-things-privacy/150127iotrpt.pdf 25/05/2016.
A. P. FeltE. HaS. EgelmanA. HaneyE. ChinD. Wagner 2012 Android permissions: User attention, comprehension, and behavior Proceedings of the Eighth Symposium on Usable Privacy and Security. ACM
H. HaddadiH. HowardA. ChaudhryJ. CrowcroftA. MadhavapeddyR. Mortier 2015 Personal data: Thinking inside the box arXiv preprint arXiv:1501.04737
J. I. HongJ. A. Landay 2004 An architecture for privacy-sensitive ubiquitous computing Proceedings of the 2nd international conference on Mobile systems, applications, and services ACM
J. I. HongJ. D. NgS. LedererJ. A. Landay 2004 Privacy risk models for designing privacy-sensitive ubiquitous computing systems Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques pp. 91 100 ACM
G. IachelloK. N. TruongG. D. AbowdG. R. HayesM. Stevens 2006 Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world Proceedings of the SIGCHI conference on Human Factors in computing systems pp. 1009 1018 ACM
C. JensenC. Potts 2004 Privacy policies as decision-making tools: an evaluation of online privacy notices Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM
F. KawsarE. RukzioG. Kortuem 2010 An explorative comparison of magic lens and personal projection for interacting with smart objects Proceedings of the 12th international conference on Human computer interaction with mobile devices and services. ACM
P G. KelleyJ. BreseeL. F. CranorR. W. Reeder 2009 A nutrition label for privacy Proceedings of the 5th Symposium on Usable Privacy and Security. ACM
P. G. KelleyS. ConsolvoL. F. CranorJ. JungN. SadehD. Wetherall 2012 A conundrum of permissions: installing applications on an android smartphone Financial Cryptography and Data Security. Springer
L. Kugler 2015 January Online privacy: Regional differences Commun. ACM 58 2 18 20
M. Langheinrich 2001 Privacy by design-principles of privacy-aware ubiquitous systems Proceedings of Ubicomp 2001: Ubiquitous Computing Springer
S. LedererJ. I. HongA. K. DeyJ. A. Landay 2004 Personal privacy through understanding and action: five pitfalls for designers Personal and Ubiquitous Computing 8 6 440 454
J. LinS. AminiJ. I. HongN. SadehJ. LindqvistJ. Zhang 2012 Expectation and purpose: understanding users’ mental models of mobile app privacy through crowdsourcing Proceedings of the 2012 ACM International Conference on Pervasive and Ubiquitous Computing UbiComp ’12 ACM
C. P. Mayer 2009 Security and privacy challenges in the internet of things Electronic Communications of the EASST 17.
D. H. NguyenA. KobsaG. R. Hayes 2008 An empirical investigation of concerns of everyday tracking and recording technologies Proceedings of the 10th international conference on Ubiquitous computing pp. 182 191 ACM
D. H. NguyenG. MarcuG. R. HayesK. N. TruongJ. ScottM. LangheinrichC. Roduner 2009 Encountering sensecam: personal recording technologies in everyday life Proceedings of the 11th international conference on Ubiquitous computing pp. 165 174 ACM
D. A. Norman 1983a apr Design rules based on analyses of human error Communications of the ACM 26 4
D. A. Norman 1983b Some observations on mental models Mental models.
D. A. Norman 2013 The Design of Everyday Things. Perseus Books
E. Parliament 2002 Directive 2002/58/ec of the european parliament and of the council of 12 july 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector, off JL 201, 31.7. 2002, at 37.(Directive on Privacy and Electronic Communications)
Pew Research Study (2014). Privacy In All Things Includes the Internet of Things. http://www.abine.com/blog/2014/the-internet-of-things/ 28/02/2015.
Privacy Leadership Initiative 2001 Privacy notices research final results Conducted by Harris Interactive.
A. Raskin 2010 Privacy Icons: Alpha Release http://www.azarask.in/blog/post/privacy-icons/ 28/02/2015.
F. SchaubR. BalebakoA. L. DurityL. F. Cranor 2015 A design space for effective privacy notices To appear in the.
A. ShakimovH. LimR. CaceresL. P. CoxK. LiD. LiuA. Varshavsky 2011 Visa-vis: Privacy-preserving online social networking via virtual individual servers Communication Systems and Networks (COMSNETS), 2011 Third International Conference on pp. 1 10 IEEE
Simon Sharwood The Register 2015 WATCH IT: It’s watching you as you WATCH IT (Your Samsung telly is) http://www.theregister.co.u k/2015/02/09/samsung_listens_in_to_everything_you_say_to_your_smart_tellie/ 28/02/2015.
J. TamR. W. ReederS. Schechter 2010 May I’m Allowing What? Disclosing the authority applications demand of users as a condition of installation. Technical Report MSR-TR-2010-54 28/02/2015.
S. ThurmY. I. Kane The Wall Street Journal 2010 Your Apps Are Watching You http://online.wsj.com/news/articles/SB10001424052748704694004576020083\703574602 28/02/2015.
TRUSTe 2014 Internet of Things Industry Brings Data Explosion but Growth Could be Impacted by Consumer Privacy Concerns http://www.truste.com/blog/2014/05/29/internet-of-things-industry-brings-\data-explosion-but-growth-could-be-\impacted-by-consumer-privacy-concerns 28/02/2015.
B. UrJ. JungS. Schechter 2013 The current state of access control for smart devices in homes Workshop on Home Usable Privacy and Security (HUPS)
O. VermesanP. FriessP. GuilleminS. GusmeroliH. SundmaekerA. BassiI. S. JubertM. MazuraM. HarrisonM. Eisenhauer et al 2011 Internet of things strategic research roadmap Internet of Things-Global Technological and Societal Trends.
J. VilkD. MolnarE. OfekC. RossbachB. LivshitsA. MoshchukH. J. WangR. Gal 2014 February Surroundweb: Least privilege for immersive “web rooms”. Technical Report MSR-TR-2014-25 28/02/2015.
J. H. ZiegeldorfO. G. MorchonK. Wehrle 2014 Privacy in the Internet of Things: threats and challenges Security and Communication Networks.