It was hard to find the words: Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices

12/16/2021
by   Sarah Turner, et al.
0

This study considers how well an autoethnographic diary study helps as a method to explore why families might struggle in the application of strong and cohesive cyber security measures within the smart home. Combining two human-computer interaction (HCI) research methods - the relatively unstructured process of autoethnography and the more structured diary study - allowed the first author to reflect on the differences between researchers or experts, and everyday users. Having a physical set of structured diary prompts allowed for a period of 'thinking as writing', enabling reflection upon how having expert knowledge may or may not translate into useful knowledge when dealing with everyday life. This is particularly beneficial in the context of home cyber security use, where first-person narratives have not made up part of the research corpus to date, despite a consistent recognition that users struggle to apply strong cyber security methods in personal contexts. The framing of the autoethnographic diary study contributes a very simple, but extremely powerful, tool for anyone with more knowledge than the average user of any technology, enabling the expert to reflect upon how they themselves have fared when using, understanding and discussing the technology in daily life.

READ FULL TEXT
research
08/06/2021

When Googling it doesn't work: The challenge of finding security advice for smart home devices

As users increasingly introduce Internet-connected devices into their ho...
research
06/08/2022

"You Just Assume It Is In There, I Guess": UK Families' Application And Knowledge Of Smart Home Cyber Security

The Internet of Things (IoT) is increasingly present in many family home...
research
06/05/2022

Perspectives of Non-Expert Users on Cyber Security and Privacy: An Analysis of Online Discussions on Twitter

Current research on users` perspectives of cyber security and privacy re...
research
03/10/2022

Cyber security and the Leviathan

Dedicated cyber-security functions are common in commercial businesses, ...
research
11/26/2020

Investigation on Research Ethics and Building a Benchmark

When dealing with leading edge cyber security research, especially when ...
research
09/07/2020

Cyber-Human System for Remote Collaborators

With the increasing ubiquity of technology in our daily lives, the compl...
research
11/05/2020

Knowledge-Base Practicality for Cybersecurity Research Ethics Evaluation

Research ethics in Information and Communications Technology has seen a ...

Please sign up or login with your details

Forgot password? Click here to reset