Making IOT security policies relevant, inclusive and practical for people: A multi-dimensional method

Kruakae Pothong, Larissa Pschetz, Jeremy Watson, Raimi Gbadamosi, Andre Asaturyan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract / Description of output

Growing amounts of research on IoT and its implications for security, privacy, economy and society has been carried out to inform policies and design. However, ordinary people who are citizens and users of these emerging technologies have rarely been involved in the processes that inform these policies, governance mechanisms and design due to the institutionalised processes that prioritise objective knowledge over subjective ones. People's subjective experiences are often discarded. This priority is likely to further widen the gap between people, technology policies and design as technologies advance towards delegated human agencies, which decreases human interfaces in technology-mediated relationships with objects, systems, services, trade and other (often) unknown third-party beneficiaries. Such a disconnection can have serious implications for policy implementation, especially when it involves human limitations. To address this disconnection, we argue that a space for people to meaningfully contribute their subjective knowledge - experienceto complex technology policies that, in turn, shape their experience and well-being needs to be constructed. To this end, our paper contributes the design and pilot implementation of a method to reconnect and involve people in IoT security policymaking and development.
Original languageEnglish
Title of host publicationProceedings of Living in the Internet of Things Conference (IoT 2019)
ISBN (Print)9781839530890
Publication statusPublished - 1 May 2019

Keywords / Materials (for Non-textual outputs)

  • data privacy
  • security of data
  • Internet of Things


Dive into the research topics of 'Making IOT security policies relevant, inclusive and practical for people: A multi-dimensional method'. Together they form a unique fingerprint.

Cite this