Skip to page content

[Talk] Factors of Trust in IoT App Interfaces

Talk presented at UX Camp Brighton on 19/03/16

FACTORS OF TRUST IN IOT APP INTERFACES from Fiona MacNeill on Vimeo. Trust definitions used in this video are from Pavlidis, Islam, Mouratidis, and Kearney (2014).

Session description: Does your app rely on OAuth to offer connection to other apps and services? Based on my research studying app-to-device relationships in Internet of Things systems (e.g. Fitbit, Jawbone UP, Nest, SmartThings, Glooko), I have uncovered some best practice recommendations when it comes to inspiring trust within your interface. Aliph, Inc. (2016). Jawbone UP (Version 4.13) [Mobile application software]. Retrieved from Barcena, M. B., Wueest, C., & Lau, H. (2014). How safe is your quantified self? (1.1). Retrieved from fied-self.pdf Bilton, N. (2016, January 18). Nest thermostat glitch leaves users in the cold. The New York Times. Retrieved from Brooks, J. (2016, January 8). Fitbit hit with class action lawsuit over alleged misreading of heart rates [Blog post]. Retrieved from Brignull, H. (2013, March). Ramp Up. Personalising the experience, Brighton. Retrieved from BS ISO/IEC. (2011). Systems and software engineering — Systems and software quality requirement and evalua- tion (SQuaRE) — System and software quality models (ISO/IEC 25010:2011(E)) Switzerland: ISO/IEC Catalyst IT. (2016). Mahara (Version 1.10.5) [Computer software]. Retrieved from Cluley, G. (2013, February 13). Jawbone accounts compromised by hackers - personal info accessed, passwords disabled [Blog post]. Retrieved from Cycling’74. Max is a visual programming language for media. Retrieved March 19, 2016, from Faily, S. (2014). Engaging stakeholders in security design: An assumption-driven approach. Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014), Plymouth, 21-29. doi:10.13140/2.1.3997.2647 Feamster, N. (2016, January 19). Who will secure the Internet of things? [Blog post]. Retrieved from Fitbit, inc. (2016). Fitbit (Version 2.18) [Mobile application software]. Retrieved from Glooko, Inc. (2015). Glooko (Version 3.2) [Mobile application software]. Retrieved from Harrison, D., Marshall, P., Bianchi-Berthouze, N., & Bird, J. (2015). Activity tracking: Barriets, workarounds and customisation. Proceedings of UBICOMP ‘15, Osaka, Japan. doi:10.1145/2750858.2805832 Hess, W. (2015, May 7). Onboarding: Designing Welcoming First Experiences. Retrieved March 19, 2016, from Higginbotham, S. (2016, January 22). Episode 42: These are the two biggest challenges facing the smart home Retrieved from Higginbotham, S. (2016, March 17). Episode 50: Are your devices being held hostage?. Retrieved March 28, 2016, from Kalloniatis, C., Mouratidis, H., Vassilis, M., Islam, S., Gritzalis, S., & Kavakli, E. (2014). Towards the design of secure and privacy-oriented Information Systems in the Cloud: Identifying the major concepts. Computer Stan- dards & Interfaces, 36(4), 759–775. doi:10.1016/j.csi.2013.12.010 Malik, O. (2015, December 30). In Silicon valley now, it’s almost always winner takes all. The New Yorker. Retrieved from myDevices. (2016). First IoT project builder - myDevices cayenne. Retrieved March 19, 2016, from Nest Labs, Inc. (2016). Nest app (Version 5.2.2) [Mobile application software]. Retrieved from O’Neill, O. (2002). A question of trust: The BBC Reith lectures 2002 (4th ed.). United Kingdom: Cambridge University Press. O’Neill, O. (2013, September 25). How to trust intelligently [Blog post]. Retrieved from [ how-to-trust-intelligently/]( how-to-trust-intelligently/)

Pavlidis, M., Islam, S., Mouratidis, H., & Kearney, P. (2014). Modeling trust relationships for developing trust- worthy Information systems. International Journal of Information System Modelling and Design, 5(1), 25–48. doi:10.4018/2014010102 Sasse, A. (2015). Scaring and bullying people into security won’t work. IEEE Security & Privacy 13(3), 80-83. doi:10.1109/MSP.2015.65 Scoseria, I. (2016). MyDevices launches cayenne, the world’s First drag-and-drop IoT project builder. Retrieved 19 March 2016, from Secure Tropos. (2013). SecTro2 (Version 2.1) [Computer software]. Retrieved from Sempers, P. (2015, October 19). Samsung Smartthings app tour on galaxy s6 - #ThinkSmartThings Retrieved from Seuss (1999). The cat in the hat (5th ed.). New York: Random House USA Children’s Books. Spary, S. (2016, January 6). Online criminals are tageting Fitbit user accounts. BuzzFeed News. Retrieved from SmartThings, Inc. (2016). SmartThings Mobile (Version 2.0.7) [Mobile application software]. Retrieved from

Fiona MacNeill

Fiona MacNeill

UX and Learning Experience (LX)

Passionate about creating inclusive and accessible experiences, tools, and services for learning and doing.