[Talk] Factors of Trust in IoT App Interfaces

Talk presented at UX Camp Brighton on 19/03/16
http://www.uxcampbrighton.org/sessions/


FACTORS OF TRUST IN IOT APP INTERFACES from Fiona MacNeill on Vimeo. Trust definitions used in this video are from Pavlidis, Islam, Mouratidis, and Kearney (2014).

Session description:
Does your app rely on OAuth to offer connection to other apps and services? Based on my research studying app-to-device relationships in Internet of Things systems (e.g. Fitbit, Jawbone UP, Nest, SmartThings, Glooko), I have uncovered some best practice recommendations when it comes to inspiring trust within your interface.

Aliph, Inc. (2016). Jawbone UP (Version 4.13) [Mobile application software]. Retrieved from https://itunes.apple.com/gb/app/up-by-jawbone-track-up-move/id461125277?mt=8

Barcena, M. B., Wueest, C., & Lau, H. (2014). How safe is your quantified self? (1.1). Retrieved from http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/how-safe-is-your-quanti fied-self.pdf

Bilton, N. (2016, January 18). Nest thermostat glitch leaves users in the cold. The New York Times. Retrieved from http://www.nytimes.com/2016/01/14/fashion/nest-thermostat-glitch-battery-dies-software-freeze.html

Brooks, J. (2016, January 8). Fitbit hit with class action lawsuit over alleged misreading of heart rates [Blog post]. Retrieved from http://ww2.kqed.org/futureofyou/2016/01/08/fitbit-hit-with-class-action-lawsuit-over-alleged-misreading-of-heart-rates/

Brignull, H. (2013, March). Ramp Up. Personalising the experience, Brighton. Retrieved from http://uxbrighton.org.uk/Personalisation-the-Experience/

BS ISO/IEC. (2011). Systems and software engineering — Systems and software quality requirement and evalua- tion (SQuaRE) — System and software quality models (ISO/IEC 25010:2011(E)) Switzerland: ISO/IEC

Catalyst IT. (2016). Mahara (Version 1.10.5) [Computer software]. Retrieved from http://mahara.org

Cluley, G. (2013, February 13). Jawbone accounts compromised by hackers – personal info accessed, passwords disabled [Blog post]. Retrieved from https://nakedsecurity.sophos.com/2013/02/13/jawbone-hack/

Cycling’74. Max is a visual programming language for media. Retrieved March 19, 2016, from https://cycling74.com/products/max/

Faily, S. (2014). Engaging stakeholders in security design: An assumption-driven approach. Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014), Plymouth, 21-29. doi:10.13140/2.1.3997.2647

Feamster, N. (2016, January 19). Who will secure the Internet of things? [Blog post]. Retrieved from https://freedom-to-tinker.com/blog/feamster/who-will-secure-the-internet-of-things/

Fitbit, inc. (2016). Fitbit (Version 2.18) [Mobile application software]. Retrieved from https://itunes.apple.com/gb/app/fitbit/id462638897?mt=8

Glooko, Inc. (2015). Glooko (Version 3.2) [Mobile application software]. Retrieved from https://itunes.apple.com/gb/app/glooko/id471942748?mt=8

Harrison, D., Marshall, P., Bianchi-Berthouze, N., & Bird, J. (2015). Activity tracking: Barriets, workarounds and customisation. Proceedings of UBICOMP ‘15, Osaka, Japan. doi:10.1145/2750858.2805832

Hess, W. (2015, May 7). Onboarding: Designing Welcoming First Experiences. Retrieved March 19, 2016, from http://uxmag.com/articles/onboarding-designing-welcoming-first-experiences

Higginbotham, S. (2016, January 22). Episode 42: These are the two biggest challenges facing the smart home Retrieved from http://iotpodcast.com/2016/01/episode-42-these-are-the-two-biggest-challenges-facing-the-smart-home/

Higginbotham, S. (2016, March 17). Episode 50: Are your devices being held hostage?. Retrieved March 28, 2016, from http://iotpodcast.com/2016/03/nest-hostage/

Kalloniatis, C., Mouratidis, H., Vassilis, M., Islam, S., Gritzalis, S., & Kavakli, E. (2014). Towards the design of secure and privacy-oriented Information Systems in the Cloud: Identifying the major concepts. Computer Stan- dards & Interfaces, 36(4), 759–775. doi:10.1016/j.csi.2013.12.010

Malik, O. (2015, December 30). In Silicon valley now, it’s almost always winner takes all. The New Yorker. Retrieved from http://www.newyorker.com/tech/elements/in-silicon-valley-now-its-almost-always-winner-takes-all

myDevices. (2016). First IoT project builder – myDevices cayenne. Retrieved March 19, 2016, from https://www.cayenne-mydevices.com/

Nest Labs, Inc. (2016). Nest app (Version 5.2.2) [Mobile application software]. Retrieved from https://itunes.apple.com/gb/app/nest-app/id464988855?mt=8

O’Neill, O. (2002). A question of trust: The BBC Reith lectures 2002 (4th ed.). United Kingdom: Cambridge University Press.

O’Neill, O. (2013, September 25). How to trust intelligently [Blog post]. Retrieved from http://blog.ted.com/ how-to-trust-intelligently/

Pavlidis, M., Islam, S., Mouratidis, H., & Kearney, P. (2014). Modeling trust relationships for developing trust- worthy Information systems. International Journal of Information System Modelling and Design, 5(1), 25–48. doi:10.4018/2014010102

Sasse, A. (2015). Scaring and bullying people into security won’t work. IEEE Security & Privacy 13(3), 80-83. doi:10.1109/MSP.2015.65

Scoseria, I. (2016). MyDevices launches cayenne, the world’s First drag-and-drop IoT project builder. Retrieved 19 March 2016, from http://press.mydevices.com/2016/01/26/mydevices-launches-cayenne-the-worlds-first-drag-and-drop-iot-project-builder/

Secure Tropos. (2013). SecTro2 (Version 2.1) [Computer software]. Retrieved from http://www.omilab.org/web/secure-tropos/environment

Sempers, P. (2015, October 19). Samsung Smartthings app tour on galaxy s6 – #ThinkSmartThings Retrieved from https://www.youtube.com/watch?v=UmqmpJg_xFA

Seuss (1999). The cat in the hat (5th ed.). New York: Random House USA Children’s Books.

Spary, S. (2016, January 6). Online criminals are tageting Fitbit user accounts. BuzzFeed News. Retrieved from http://www.buzzfeed.com/saraspary/online-criminals-are-targeting-fitbit-user-accounts

SmartThings, Inc. (2016). SmartThings Mobile (Version 2.0.7) [Mobile application software]. Retrieved from https://itunes.apple.com/gb/app/smartthings-mobile/id590800740?mt=8

Print Friendly, PDF & Email

Leave a Reply

Your email address will not be published. Required fields are marked *