Smart Devices & Personal Privacy: Literature Review
VerifiedAdded on 2023/06/10
|8
|2475
|470
Report
AI Summary
This report presents a literature review on smart devices and personal privacy, examining the current state of research on the topic. It explores the functionalities of smart devices and their connections, highlighting the potential risks to personal privacy due to data collection and sharing through various wireless protocols. The review delves into the concerns of privacy violations, including online tracking, inadequate password protection, and vulnerabilities in smart home systems. It analyzes the perspectives of various authors and researchers, identifying potential security risks, such as hacking, data breaches, and misuse of personal information. The report also discusses the implications of smart devices on personal data, emphasizing the importance of security measures, such as encryption and authentication mechanisms, and the role of privacy regulations like the Privacy Act 1988. The conclusion summarizes the key findings and emphasizes the need for proactive measures to protect individual privacy in the era of smart devices. The research also identifies gaps in the current literature, supporting the need for more research in this area.

SMART DEVICES &
PERSONAL PRIVACY
PERSONAL PRIVACY
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
ABSTRACT.....................................................................................................................................3
INTRODUCTION...........................................................................................................................4
Smart devices and personal privacy.............................................................................................4
RESEARCH GAP............................................................................................................................7
CONCLUSION................................................................................................................................7
REFERENCES................................................................................................................................8
ABSTRACT.....................................................................................................................................3
INTRODUCTION...........................................................................................................................4
Smart devices and personal privacy.............................................................................................4
RESEARCH GAP............................................................................................................................7
CONCLUSION................................................................................................................................7
REFERENCES................................................................................................................................8

ABSTRACT
Smart device are related to electronic device which is generally connected by any device
or network by various protocols. The aim, of the report is to deep understanding on the topic of
smart devices and privacy with the support of literature review.
Smart device are related to electronic device which is generally connected by any device
or network by various protocols. The aim, of the report is to deep understanding on the topic of
smart devices and privacy with the support of literature review.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

INTRODUCTION
This research is based on scientific literature review on the topic smart devices and
privacy policy A smart device an electronic device that is generally connected to other devices
in order to connect with network via different wireless protocols such as Zigbee, Bluetooth, Wi-
Fi, 5G etc. which can be operated in order to interactively and autonomously Zheng & Feamster,
(2018) . Also, study will focus on literature review in order to more focus on authentic sources
on the given topic smart devices. The aim and scope of literature review is to expand my
knowledge and analyse the connections and relationship between different authors.
Smart devices and personal privacy
According to Al‐Turjman, Zahmatkesh & Shahroze, (2022) smart devices are designed in
order to support the variety of form factors, as range of properties pertaining to ubiquitous
computing and can be used in three main system environment human centred, physical world
and distributed computing environment. Smart devices are composed of hardware layer which is
related to transmit signals that is related to network of layer through which devices communicate
with each other and the application layer. There are feature of smart devices are a system
hardware and software that are belonged to IT resources and usually statically fixed on the absis
of designed time. Also, this is relates to the dynamic component which is oriented resource
extensions & plug in of hardware resources. Then it is including with remote external services
that is work as execution and access to local and internal autonomous service execution. Further,
it is accessable to specific external environment that is related to interaction with human and
physical world that can be in context of virtual computing properties.
According to Tommy Arngren, (2021) it can be said that all the device collected and
forward the information to all sorts of external parties, in context to home security alarm
provider, fitness watch vendor, electricity supplier etc. Then smart assistants help for listening
the voice commands that help for taking internet execution. That type of devices are help for
doing anything in order to connect with toaster and with washing machine, toothbrush and
sewing machine, Every thing is related to smart appliances. It can be said that to one connect
wits one device is not creating the problems of privacy, but when data connected to several
devices it can be created big pro2021202120212021202120212021blem. Another view of author
is, smart devices can be affected in such a way where it impacted by managing the data typically.
As the use of smart devices are increases as need of data privacy is high. For example, devices
This research is based on scientific literature review on the topic smart devices and
privacy policy A smart device an electronic device that is generally connected to other devices
in order to connect with network via different wireless protocols such as Zigbee, Bluetooth, Wi-
Fi, 5G etc. which can be operated in order to interactively and autonomously Zheng & Feamster,
(2018) . Also, study will focus on literature review in order to more focus on authentic sources
on the given topic smart devices. The aim and scope of literature review is to expand my
knowledge and analyse the connections and relationship between different authors.
Smart devices and personal privacy
According to Al‐Turjman, Zahmatkesh & Shahroze, (2022) smart devices are designed in
order to support the variety of form factors, as range of properties pertaining to ubiquitous
computing and can be used in three main system environment human centred, physical world
and distributed computing environment. Smart devices are composed of hardware layer which is
related to transmit signals that is related to network of layer through which devices communicate
with each other and the application layer. There are feature of smart devices are a system
hardware and software that are belonged to IT resources and usually statically fixed on the absis
of designed time. Also, this is relates to the dynamic component which is oriented resource
extensions & plug in of hardware resources. Then it is including with remote external services
that is work as execution and access to local and internal autonomous service execution. Further,
it is accessable to specific external environment that is related to interaction with human and
physical world that can be in context of virtual computing properties.
According to Tommy Arngren, (2021) it can be said that all the device collected and
forward the information to all sorts of external parties, in context to home security alarm
provider, fitness watch vendor, electricity supplier etc. Then smart assistants help for listening
the voice commands that help for taking internet execution. That type of devices are help for
doing anything in order to connect with toaster and with washing machine, toothbrush and
sewing machine, Every thing is related to smart appliances. It can be said that to one connect
wits one device is not creating the problems of privacy, but when data connected to several
devices it can be created big pro2021202120212021202120212021blem. Another view of author
is, smart devices can be affected in such a way where it impacted by managing the data typically.
As the use of smart devices are increases as need of data privacy is high. For example, devices
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

like amazon Alexa have all the information which can be affected the privacy of the individual
by getting all the information from software. In addition, each of the new device are introduced
by considering new security risk that is need to managed by properly on the basis of life cycle.
Apthorpe, Shvartzshnaider & Feamster, (2018) The risk for security may be handled by
considering the value chain that can be used in smart cities, industries and consumers. As per
Bugeja, Jacobsson & Davidsson (2018), June for today this is the biggest concern of smart
device are data privacy, major devices for daily uses are smartphone, smart watch, tablet, work
PC or laptop and smart television. In opinion of author it has been analysed that in the year 2030
each of the person will connect to 15 devices on daily basis. The other devices are related to
smart meter in the car which can be connected by default and it is typically managed by the
organization or user that is customer. Also, human being are depended more on cellular
connectivity that is impacted on privacy policy as well as network infrastructure which need to
be secure.
The infrastructure and devices are used need to secure in order to handle the data, it is
important for users to operate the device security on the basis of health of device. The status of
the person is affected by large number of smart device are from different brands. However, this
is the key requirement that is enabled for securing an trust worthy IoT environment. According
to de Lima Salgado, Dias & Hung, (2019) smart devices are work as paparazzi or stalker in order
to deal with all the information available in the device. Also, '' all public is good public'' in order
to control all the data by sharing it on the basis of relevant public image that is avoided for
revealing private relations, personal habits etc. A smart home are not allowed for access but
unbuild software are help to get all the information which is generated by their own that can
attack by cyber attacker. Also, information from various appliances are like open doors whether
it is on or off.
Potential attacker have the trick for how to get access in order to work on unlock the
security. For example, in smart home access for internal network are related to generating the
data by store or protect by monitoring and reactive security measures such as logging and
blocking that is the breach of detected. On the other hand, Fitwi, Chen, & Zhu, (2019) said that
power consumption data is recorded by smart meter can be provided in such a way where it is
related to power consumption and data recording by smart meter with lots of information. Also,
any competent smart lock are manufactured for making sure about the communication lock that
by getting all the information from software. In addition, each of the new device are introduced
by considering new security risk that is need to managed by properly on the basis of life cycle.
Apthorpe, Shvartzshnaider & Feamster, (2018) The risk for security may be handled by
considering the value chain that can be used in smart cities, industries and consumers. As per
Bugeja, Jacobsson & Davidsson (2018), June for today this is the biggest concern of smart
device are data privacy, major devices for daily uses are smartphone, smart watch, tablet, work
PC or laptop and smart television. In opinion of author it has been analysed that in the year 2030
each of the person will connect to 15 devices on daily basis. The other devices are related to
smart meter in the car which can be connected by default and it is typically managed by the
organization or user that is customer. Also, human being are depended more on cellular
connectivity that is impacted on privacy policy as well as network infrastructure which need to
be secure.
The infrastructure and devices are used need to secure in order to handle the data, it is
important for users to operate the device security on the basis of health of device. The status of
the person is affected by large number of smart device are from different brands. However, this
is the key requirement that is enabled for securing an trust worthy IoT environment. According
to de Lima Salgado, Dias & Hung, (2019) smart devices are work as paparazzi or stalker in order
to deal with all the information available in the device. Also, '' all public is good public'' in order
to control all the data by sharing it on the basis of relevant public image that is avoided for
revealing private relations, personal habits etc. A smart home are not allowed for access but
unbuild software are help to get all the information which is generated by their own that can
attack by cyber attacker. Also, information from various appliances are like open doors whether
it is on or off.
Potential attacker have the trick for how to get access in order to work on unlock the
security. For example, in smart home access for internal network are related to generating the
data by store or protect by monitoring and reactive security measures such as logging and
blocking that is the breach of detected. On the other hand, Fitwi, Chen, & Zhu, (2019) said that
power consumption data is recorded by smart meter can be provided in such a way where it is
related to power consumption and data recording by smart meter with lots of information. Also,
any competent smart lock are manufactured for making sure about the communication lock that

is encrypted by integrity protected. Moreover, it is not enough to observe the traffic which is
generated by smart lock that has been opened from inside or outside. All the other data is
generated by smart home that include power consumption and light switch data which need to be
predicted.
According to Habibzadeh, (2019) smart devices are impacted the issues which are arises
due to internet in order to lack of authentication and authorization mechanism and no encryption
mechanism. The technology of blocks chain are undoubtedly by considering cryptographic
security which can create several issues. Some issues related to privacy are public perception, In
the year 2015 state of smart device study which is found by 45% for Americans in order to
concern with possibility of the information that is stolen from the other device. Then, 28 %
people are worry, where consumer would hesitate to connect devices. The vulnerability of
hacking is also one of major problem that can be faced due to hack in real, on the market
devices with energy and time. For example, according to research at Microsoft the University of
Michigam found a plethora of holes in the security of Samsung's smart thing, Smart home
platform and other method that is more complex. There are many companies which are not ready
tos accept the data that is impacted by security issue related to intelligence and actual devices.
Mare, Roesne, & Kohno, (2020) stated that privacy issue related to smart devices are
faced by user such as inadequate password protection that is related to hard credentials in IOT
devices which are providing normal target for those hackers who can operate device anytime.
Then password are impacted by hacking and leak the data at the time. For example, Mirai
Malware impacted smart devices like, router video cameras & video recorders. This was
successful for logging by operating 61 general hard coded password and username. Sometimes it
can be possible that there is limited compliance from manufactures in order to track the details of
hacker that is why it is easy to hack data by login credentials. The other issues are related to
hardware issues, lack of security in storage and data transfer, hard coded , weak or guessable
usernames a password. Then device update management is related to the concern for the privacy
of insure firmware or software that is generally leads by risk. The update of security is impacted
by not understanding the new vulnerabilities so that at that time it is highs possibility of theft the
data by update the software in cell phone or other smart devices.
According to privacy act 1988, is principal piece of Australian legislation that protecting
and handling of personal information about individual. This is also related to the collecting,
generated by smart lock that has been opened from inside or outside. All the other data is
generated by smart home that include power consumption and light switch data which need to be
predicted.
According to Habibzadeh, (2019) smart devices are impacted the issues which are arises
due to internet in order to lack of authentication and authorization mechanism and no encryption
mechanism. The technology of blocks chain are undoubtedly by considering cryptographic
security which can create several issues. Some issues related to privacy are public perception, In
the year 2015 state of smart device study which is found by 45% for Americans in order to
concern with possibility of the information that is stolen from the other device. Then, 28 %
people are worry, where consumer would hesitate to connect devices. The vulnerability of
hacking is also one of major problem that can be faced due to hack in real, on the market
devices with energy and time. For example, according to research at Microsoft the University of
Michigam found a plethora of holes in the security of Samsung's smart thing, Smart home
platform and other method that is more complex. There are many companies which are not ready
tos accept the data that is impacted by security issue related to intelligence and actual devices.
Mare, Roesne, & Kohno, (2020) stated that privacy issue related to smart devices are
faced by user such as inadequate password protection that is related to hard credentials in IOT
devices which are providing normal target for those hackers who can operate device anytime.
Then password are impacted by hacking and leak the data at the time. For example, Mirai
Malware impacted smart devices like, router video cameras & video recorders. This was
successful for logging by operating 61 general hard coded password and username. Sometimes it
can be possible that there is limited compliance from manufactures in order to track the details of
hacker that is why it is easy to hack data by login credentials. The other issues are related to
hardware issues, lack of security in storage and data transfer, hard coded , weak or guessable
usernames a password. Then device update management is related to the concern for the privacy
of insure firmware or software that is generally leads by risk. The update of security is impacted
by not understanding the new vulnerabilities so that at that time it is highs possibility of theft the
data by update the software in cell phone or other smart devices.
According to privacy act 1988, is principal piece of Australian legislation that protecting
and handling of personal information about individual. This is also related to the collecting,
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

storing and using of personal data that is related to public as well as private sector. According to
Sharma & Saini, (2021) personal information can be misused in any manner that need to kept
private and also have the ability of control the information. There are many criminals who can
use the personal data harass users or defraud. There are many entities that sell personal data in
order to advertise outside parties without user consent and receiving unwanted marketing and
advertising. The personal activities are need to monitored and tracked which help to restricted
their ability for express themselves in orders to restrict the ability of success. For an individual it
can be possibles that it has harm the reputation by resulting in fines, sanction and legal
consequences. Also, there are real world implication which is related to infringement, then
country hold the privacy which is intrinsic value and human right fundamental to free society.
Zavalyshyn, Duarte & Santos, (2018) stated that some online privacy by smart devices
are related to online tracking that is regularly tracked online by user activities and requires
websites in such as way where there are different type of cookie permission asked in order to get
access for the website, that kind of activities are threat of data. The losing control of data by
online service for people may not be aware of their data and there are lack of transparency are
used by using personal information such as website, phone number, location, email etc. are
difficult to understand.
RESEARCH GAP
Present research is supported by googles scholar and evidence which help to make it
different from other research. Also, there are real life examples are attached in context to smart
devices and their privacy concern. It is also full fill the gap for earlier research in which there is
not much clarity shows. All the data is used in the research is related to the latest version of the
year 2021. Then also supported by privacy act which define it more clear.
CONCLUSION
From the above study it has been summarized that smart devices are becomes important
part of our daily life whether individual at home or office. On the other hand, smart devices are
expose privacy of individual by spying and third party apps. Further, it has been summarized that
report concluded on the basis of view of various author on smart devices and privacy.
Sharma & Saini, (2021) personal information can be misused in any manner that need to kept
private and also have the ability of control the information. There are many criminals who can
use the personal data harass users or defraud. There are many entities that sell personal data in
order to advertise outside parties without user consent and receiving unwanted marketing and
advertising. The personal activities are need to monitored and tracked which help to restricted
their ability for express themselves in orders to restrict the ability of success. For an individual it
can be possibles that it has harm the reputation by resulting in fines, sanction and legal
consequences. Also, there are real world implication which is related to infringement, then
country hold the privacy which is intrinsic value and human right fundamental to free society.
Zavalyshyn, Duarte & Santos, (2018) stated that some online privacy by smart devices
are related to online tracking that is regularly tracked online by user activities and requires
websites in such as way where there are different type of cookie permission asked in order to get
access for the website, that kind of activities are threat of data. The losing control of data by
online service for people may not be aware of their data and there are lack of transparency are
used by using personal information such as website, phone number, location, email etc. are
difficult to understand.
RESEARCH GAP
Present research is supported by googles scholar and evidence which help to make it
different from other research. Also, there are real life examples are attached in context to smart
devices and their privacy concern. It is also full fill the gap for earlier research in which there is
not much clarity shows. All the data is used in the research is related to the latest version of the
year 2021. Then also supported by privacy act which define it more clear.
CONCLUSION
From the above study it has been summarized that smart devices are becomes important
part of our daily life whether individual at home or office. On the other hand, smart devices are
expose privacy of individual by spying and third party apps. Further, it has been summarized that
report concluded on the basis of view of various author on smart devices and privacy.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

REFERENCES
Al‐Turjman, F., Zahmatkesh, H., & Shahroze, R. (2022). An overview of security and privacy in
smart cities' IoT communications. Transactions on Emerging Telecommunications
Technologies, 33(3). e3677.
Apthorpe, N., Shvartzshnaider, Y. & Feamster, N. (2018). Discovering smart home internet of
things privacy norms using contextual integrity. Proceedings of the ACM on Interactive,
Mobile, Wearable and Ubiquitous Technologies, 2(2). 1-23.
Bugeja, J., Jacobsson, A., & Davidsson, P. (2018, June). An empirical analysis of smart
connected home data. In International Conference on Internet of Things (pp. 134-149).
Springer, Cham.
de Lima Salgado, A., Dias, F. S. & Hung, P. C. (2019, October). Smart toys and children's
privacy: usable privacy policy insights from a card sorting experiment. In Proceedings
of the 37th ACM International Conference on the Design of Communication (pp. 1-8).
Fitwi, A., Chen, Y., & Zhu, S. (2019, July). A lightweight blockchain-based privacy protection
for smart surveillance at the edge. In 2019 IEEE International Conference on
Blockchain (Blockchain) (pp. 552-555). IEEE.
Habibzadeh, H., (2019). A survey on cybersecurity, data privacy, and policy issues in cyber-
physical system deployments in smart cities. Sustainable Cities and Society, 50.101660.
Mare, S., Roesner, F., & Kohno, T. (2020). Smart Devices in Airbnbs: Considering Privacy and
Security for both Guests and Hosts. Proc. Priv. Enhancing Technol., 2020(2), 436-458.
Sharma, & Saini, K. S. (2021). Secure Protocols for Biomedical Smart Devices.
In Cybersecurity (pp. 131-148). CRC Press.
Zavalyshyn, I., Duarte, N. O., & Santos, N. (2018, October). HomePad: A privacy-aware smart
hub for home environments. In 2018 IEEE/ACM Symposium on Edge Computing
(SEC) (pp. 58-73). IEEE.
Zheng, S., Chetty, M., & Feamster, N. (2018). User perceptions of smart home IoT
privacy. Proceedings of the ACM on human-computer interaction, 2(CSCW) 1-20.
Online references
Smart devices and privacy., 2021. [Online]. Available through
<https://www.ericsson.com/en/blog/2021/1/smart-devices-and-privacy>.
Al‐Turjman, F., Zahmatkesh, H., & Shahroze, R. (2022). An overview of security and privacy in
smart cities' IoT communications. Transactions on Emerging Telecommunications
Technologies, 33(3). e3677.
Apthorpe, N., Shvartzshnaider, Y. & Feamster, N. (2018). Discovering smart home internet of
things privacy norms using contextual integrity. Proceedings of the ACM on Interactive,
Mobile, Wearable and Ubiquitous Technologies, 2(2). 1-23.
Bugeja, J., Jacobsson, A., & Davidsson, P. (2018, June). An empirical analysis of smart
connected home data. In International Conference on Internet of Things (pp. 134-149).
Springer, Cham.
de Lima Salgado, A., Dias, F. S. & Hung, P. C. (2019, October). Smart toys and children's
privacy: usable privacy policy insights from a card sorting experiment. In Proceedings
of the 37th ACM International Conference on the Design of Communication (pp. 1-8).
Fitwi, A., Chen, Y., & Zhu, S. (2019, July). A lightweight blockchain-based privacy protection
for smart surveillance at the edge. In 2019 IEEE International Conference on
Blockchain (Blockchain) (pp. 552-555). IEEE.
Habibzadeh, H., (2019). A survey on cybersecurity, data privacy, and policy issues in cyber-
physical system deployments in smart cities. Sustainable Cities and Society, 50.101660.
Mare, S., Roesner, F., & Kohno, T. (2020). Smart Devices in Airbnbs: Considering Privacy and
Security for both Guests and Hosts. Proc. Priv. Enhancing Technol., 2020(2), 436-458.
Sharma, & Saini, K. S. (2021). Secure Protocols for Biomedical Smart Devices.
In Cybersecurity (pp. 131-148). CRC Press.
Zavalyshyn, I., Duarte, N. O., & Santos, N. (2018, October). HomePad: A privacy-aware smart
hub for home environments. In 2018 IEEE/ACM Symposium on Edge Computing
(SEC) (pp. 58-73). IEEE.
Zheng, S., Chetty, M., & Feamster, N. (2018). User perceptions of smart home IoT
privacy. Proceedings of the ACM on human-computer interaction, 2(CSCW) 1-20.
Online references
Smart devices and privacy., 2021. [Online]. Available through
<https://www.ericsson.com/en/blog/2021/1/smart-devices-and-privacy>.
1 out of 8
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




