1. bookVolume 2020 (2020): Issue 2 (April 2020)
Journal Details
First Published
16 Apr 2015
Publication timeframe
4 times per year
access type Open Access

Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts

Published Online: 08 May 2020
Page range: 436 - 458
Received: 31 Aug 2019
Accepted: 16 Dec 2019
Journal Details
First Published
16 Apr 2015
Publication timeframe
4 times per year

Consumer smart home devices are becoming increasingly pervasive. As Airbnb hosts deploy smart devices in spaces shared with guests, we seek to understand the security and privacy implications of these devices for both hosts and guests. We conducted a large-scale survey of 82 hosts and 554 guests to explore their current technology practices, their preferences for smart devices and data collection/sharing, and their privacy and security concerns in the context of Airbnbs. We found that guests preferred smart devices, even viewed them as a luxury, but some guests were concerned that smart devices enable excessive monitoring and control, which could lead to repercussions from hosts (e.g., locked thermostat). On average, the views of guests and hosts on data collection in Airbnb were aligned, but for the data types where differences occur, serious privacy violations might happen. For example, 90% of our guest participants did not want to share their Internet history with hosts, but one in five hosts wanted access to that information. Overall, our findings surface tensions between hosts and guests around the use of smart devices and in-home data collection. We synthesize recommendations to address the surfaced tensions and identify broader research challenges.


[1] Wi-Fi security with RADIUS. Last accessed November 2019, Online at https://networkradius.com/blog/security/wifi-security-with-radius/index.html.Search in Google Scholar

[2] Handbook of Survey Research. Elsevier, 1983. DOI 10.1016/C2013-0-11411-0.Search in Google Scholar

[3] Airbnb hosting safety. Last accessed May 2019, Online at https://www.airbnb.com/help/article/887/what-areairbnb-s-rules-about-electronic-surveillance-devices-in-listings.Search in Google Scholar

[4] Omar Alrawi, Chaz Lever, Manos Antonakakis, and Fabian Monrose. SoK: Security evaluation of home-based IoT deployments. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2019. DOI 10.1109/SP.2019. 00013.Search in Google Scholar

[5] Virginia Braun and Victoria Clarke. Using thematic analysis in psychology. Qualitative Research in Psychology, 3, January 2006. DOI 10.1191/1478088706qp063oa.Search in Google Scholar

[6] L. Jean Camp. Mental models of privacy and security. IEEE Technology and Society Magazine, 2009. DOI 10.1109/MTS. 2009.934142.Search in Google Scholar

[7] Filippo Celata, Cary Yungmee Hendrickson, and Venere Stefania Sanna. The sharing economy as community marketplace? Trust, reciprocity and belonging in peer-to-peer accommodation platforms. Cambridge Journal of Regions, Economy and Society, 10(2), 2017. DOI 10.1093/cjres/rsw044.Search in Google Scholar

[8] Mingming Cheng and Xin Jin. What do Airbnb users care about? An analysis of online review comments. International Journal of Hospitality Management, 76, January 2019. DOI 10.1016/j.ijhm.2018.04.004.Search in Google Scholar

[9] Yushi Cheng, Xiaoyu Ji, Tianyang Lu, and Wenyuan Xu. On detecting hidden wireless cameras: A traffic pattern-based approach. IEEE Transactions on Mobile Computing, 2019. DOI 10.1109/TMC.2019.2900919.Search in Google Scholar

[10] Eun Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly Harrison, and Julie A. Kientz. Living in a glass house: A survey of private moments in the home. In Proceedings of the International Conference on Ubiquitous Computing (UbiComp). ACM, 2011. DOI 10.1145/2030112.2030118.Search in Google Scholar

[11] Douglas P. Crowne and David Marlowe. A new scale of social desirability independent of psychopathology. Journal of Consulting Psychology, 24(4), 1960. DOI 10.1037/h0047358.Search in Google Scholar

[12] Edward E. Cureton. Rank-biserial correlation. Psychometrika, 21(3), September 1956. DOI 10.1007/BF02289138.Search in Google Scholar

[13] Tamara Denning, Tadayoshi Kohno, and Henry M. Levy. Computer security and the modern home. Commununications of the ACM, 56(1), January 2013. DOI 10.1145/2398356. 2398377.Search in Google Scholar

[14] Earlence Fernandes, Jaeyeon Jung, and Atul Prakash. Security analysis of emerging smart home applications. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2016. DOI 10.1109/SP.2016.44.Search in Google Scholar

[15] Andrey Fradkin, Elena Grewal, and David Holtz. The determinants of online review informativeness: Evidence from field experiments on Airbnb. SSRN Scholarly Paper ID 2939064, April 2018. Online at https://papers.ssrn.com/abstract=2939064.Search in Google Scholar

[16] Christine Geeng and Franziska Roesner. Who’s in control?: Interactions in multi-user smart homes. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI), 2019. DOI 10.1145/3290605.3300498.Search in Google Scholar

[17] Eric A. Greenleaf. Measuring extreme response style. The Public Opinion Quarterly, 56(3), 1992. Online at https://www.jstor.org/stable/2749156.Search in Google Scholar

[18] Airbnb: Vacation rentals, homes, experiences & places. Online at https://www.airbnb.com/.Search in Google Scholar

[19] HomeExchange – #1 home exchange community. Online at https://www.homeexchange.com/.Search in Google Scholar

[20] Homestay accommodation worldwide for short and long term stays. Online at https://www.homestay.com/.Search in Google Scholar

[21] Utility smart meter installations worry Rockland and Westchester homeowners on privacy. Last accessed May 2019, Online at https://www.lohud.com/story/news/2018/11/14/smart-meters-pose-privacy-worries-homeowners-o-andr-con-ed/1823505002/.Search in Google Scholar

[22] Suman Jana, Arvind Narayanan, and Vitaly Shmatikov. A scanner darkly: Protecting user privacy from perceptual applications. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2013. DOI 10.1109/SP. 2013.31.Search in Google Scholar

[23] Airi Lampinen and Coye Cheshire. Hosting via Airbnb: Motivations and financial assurances in monetized network hospitality. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI). ACM, 2016. DOI 10.1145/2858036.2858092.Search in Google Scholar

[24] Josephine Lau, Benjamin J Zimmerman, and Florian Schaub. Alexa, are you listening? Privacy perceptions, concerns and privacy-seeking behaviors with smart speakers. Proceedings of the ACM on Human-Computer Interaction (PACM HCI), 2(CSCW), 2018. DOI 10.1145/3274371.Search in Google Scholar

[25] Paul Lavrakas. Encyclopedia of Survey Research Methods. Sage Publications, Inc., 2008. DOI 10.4135/9781412963947.Search in Google Scholar

[26] Xiao Ma, Jeffrey T. Hancock, Kenneth Lim Mingjie, and Mor Naaman. Self-disclosure and perceived trustworthiness of Airbnb host profiles. In Proceedings of the Conference on Computer Supported Cooperative Work (CSCW), 2017. DOI 10.1145/2998181.2998269.Search in Google Scholar

[27] Nathan Malkin, Julia Bernd, Maritza Johnson, and Serge Egelman. “What can’t data be used for?” Privacy expectations about smart TVs in the U.S. In Proceedings of the European Workshop on Usable Security (EuroSEC, 2018. DOI 10.14722/eurousec.2018.23016.Search in Google Scholar

[28] Kirsten E. Martin and Helen Nissenbaum. Measuring privacy: An empirical test using context to expose confounding variables. SSRN Scholarly Paper ID 2709584, Social Science Research Network, December 2015. Online at https://papers.ssrn.com/abstract=2709584.Search in Google Scholar

[29] Airbnb statistics for demographics and growth. Last accessed February 2019, Online at https://ipropertymanagement.com/airbnb-statistics/.Search in Google Scholar

[30] Airbnb’s impact on hotels, 2015. Last accessed November 2019, Online at http://res.cloudinary.com/yumyoshojin/image/upload/v1/pdf/future-of-hospitality.pdf.Search in Google Scholar

[31] Important reasons why people use Airbnb in the United States and Europe from 2015 to 2017, 2017. Last accessed November 2019, Online at https://www.statista.com/statistics/796866/reasons-people-use-airbnb/.Search in Google Scholar

[32] Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman M. Sadeh. Privacy expectations and preferences in an IoT world. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), 2017. Online at https://www.usenix.org/conference/soups2017/technical-sessions/presentation/naeini.Search in Google Scholar

[33] Pardis Emami Naeini, Henry Dixon, Yuvraj Agarwal, and Lorrie Faith Cranor. Exploring how privacy and security factor into IoT device purchase behavior. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI), 2019. DOI 10.1145/3290605.3300764.Search in Google Scholar

[34] Will Qiu, Paolo Parigi, and Bruno D. Abrahao. More stars or more reviews? Differential effects of reputation on trust in the sharing economy. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI), 2018. DOI 10.1145/3173574.3173727.Search in Google Scholar

[35] Elissa M. Redmiles, Yasemin Acar, Sascha Fahl, and Michelle L. Mazurek. A summary of survey methodology best practices for security and privacy researchers, 2017. DOI 10.13016/M22K2W.Search in Google Scholar

[36] Fred B Schneider. Least privilege and more. IEEE Security & Privacy, 99(5), 2003. DOI 10.1109/MSECP.2003.1236236.Search in Google Scholar

[37] Richard E Smith. A contemporary look at Saltzer and Schroeder’s 1975 design principles. IEEE Security & Privacy, 10(6), 2012. DOI 10.1109/MSP.2012.85.Search in Google Scholar

[38] Sara Sorcher. The Technology 202: Alexa, are you spying on me? Here’s why smart speakers raise serious privacy concerns. The Washington Post, May 2019. Online at https://www.washingtonpost.com/news/powerpost/paloma/the-technology-202/2019/05/06/the-technology-202-alexaare-you-spying-on-me-here-s-why-smart-speakers-raise-serious-privacy-concerns/5ccf46a9a7a0a46cfe152c3c/.Search in Google Scholar

[39] Aron Szanto and Neel Mehta. A host of troubles: Re-identifying Airbnb hosts using public data. Technology Science, October 2018. Online at https://techscience.org/a/2018100902.Search in Google Scholar

[40] Rick Wash. Folk models of home computer security. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS). ACM, 2010. DOI 10.1145/1837110.1837125.Search in Google Scholar

[41] Molly Wood. CES: Security risks from the smart home. The New York Times, January 2018. Online at https://www.nytimes.com/2015/01/08/technology/personaltech/ces-security-risks-from-the-smart-home.html.Search in Google Scholar

[42] Kevin Wu and Brent Lagesse. Do you see what I see? Detecting hidden streaming cameras through similarity of simultaneous observation. CoRR, abs/1901.02818, 2019. Online at http://arxiv.org/abs/1901.02818.Search in Google Scholar

[43] Eric Zeng, Shrirang Mare, and Franziska Roesner. End user security and privacy concerns with smart homes. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), 2017. Online at https://www.usenix.org/conference/soups2017/technical-sessions/presentation/zeng.Search in Google Scholar

[44] Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. User perceptions of smart home IoT privacy. Proceedings of the ACM on Human-Computer Interaction (PACM HCI), 2(CSCW), November 2018. DOI 10.1145/3274469.Search in Google Scholar

[45] Verena Zimmermann, Merve Bennighof, Miriam Edel, Oliver Hofmann, Judith Jung, and Melina von Wick. Home, smart home – Exploring end users’ mental models of smart homes. In Raimund Dachselt and Gerhard Weber, editors, Mensch und Computer 2018 - Workshopand. Gesellschaft für Informatik e.V., 2018. DOI 10.18420/muc2018-ws08-0539.Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo