What Should Be on an IoT Privacy and Security Label?

What Should Be on an IoT Privacy and Security Label?

IEEE Symposium on Security and Privacy via YouTube Direct link

Expert recruitment criteria

5 of 17

5 of 17

Expert recruitment criteria

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

What Should Be on an IoT Privacy and Security Label?

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Smart devices are getting hacked
  3. 3 Positive attitude toward labels
  4. 4 Three-round Delphi method with 22 experts
  5. 5 Expert recruitment criteria
  6. 6 One interview and two survey rounds
  7. 7 Labels to inform consumers' purchase behavior
  8. 8 Other perceived values of the label
  9. 9 We designed a layered label
  10. 10 Factors to include on the primary layer
  11. 11 Factors to include on the secondary layer
  12. 12 Non-comparative and comparative purchase
  13. 13 Attitudes toward the design of the label
  14. 14 Label should work for both consumers and experts
  15. 15 Specification document details
  16. 16 We designed a tool to generate the label
  17. 17 lot labels to provide transparency

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.