Change search
Link to record
Permanent link

Direct link
BETA
Pettersson, John SörenORCID iD iconorcid.org/0000-0001-6826-3358
Alternative names
Publications (10 of 92) Show all publications
Karegar, F., Pettersson, J. S. & Fischer-Hübner, S. (2020). The Dilemma of User Engagement in Privacy Notices: Effects of Interaction Modes and Habituation on User Attention. ACM Transactions and Security, 23(1), 1-38, Article ID 5.
Open this publication in new window or tab >>The Dilemma of User Engagement in Privacy Notices: Effects of Interaction Modes and Habituation on User Attention
2020 (English)In: ACM Transactions and Security, ISSN 2471-2566, Vol. 23, no 1, p. 1-38, article id 5Article in journal (Refereed) Published
Abstract [en]

Privacy notices and consent forms are the means of conveying privacy policy information to users. In Europe, a valid consent needs to be confirmed by a clear affirmative action. Despite previous research, it is not yet clear whether user engagement with consent forms via different types of interactions for confirming consent may play a significant role in effectively drawing user attention to the content, even after repeated exposure. We investigate, in a laboratory study, how different types of interactions that engage users with consent forms differ in terms of their effectiveness, efficiency, and user satisfaction. In addition, we examine if and how habituation affects user attention and satisfaction, and the time they spend on giving their consent. We conducted a controlled experiment with 80 participants in four different groups where people either were engaged actively with the policy content via Drag and Drop (DAD), Swipe, or Checkboxes, or were not actively engaged with the content (as the control condition) in a first-exposure phase and in a habituation phase. We measured user attention to consent forms along multiple dimensions, including direct, objective measurements and indirect, self-reported measures. Our results show that the different types of interactions

may affect user attention to certain parts of policy information. In particular, the DAD action results in significantly more user attention to the data items compared to other groups. However, with repeated exposure to consent forms, the difference disappears. We conclude that user engagement with policy content needs to be designed with care, so that attention to substantial policy information is increased and not negatively affected.

Place, publisher, year, edition, pages
ACM Digital Library, 2020
Keywords
Affirmative actions, attention to policy information, habituation, informed consent, privacy notices
National Category
Computer Engineering
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-76844 (URN)10.1145/3372296 (DOI)
Projects
Credential, 4896
Funder
EU, Horizon 2020
Available from: 2020-02-19 Created: 2020-02-19 Last updated: 2020-02-27Bibliographically approved
Pettersson, J. S. (2019). A conceptual win‐win struggle between swiftness and formal constraints (1ed.). In: E. Cancik-Kirschbaum, J.C. Johnson (Ed.), Encoding metalinguistic awareness: Ancient Mesopotamia and beyond (pp. 177-194). Gladbeck: PeWe-Verlag
Open this publication in new window or tab >>A conceptual win‐win struggle between swiftness and formal constraints
2019 (English)In: Encoding metalinguistic awareness: Ancient Mesopotamia and beyond / [ed] E. Cancik-Kirschbaum, J.C. Johnson, Gladbeck: PeWe-Verlag , 2019, 1, p. 177-194Chapter in book (Refereed)
Abstract [en]

In the concert of human expressions - including an individual  human’s expression - the ability to use different modalities, be they bodily based means or artefact-based expressions such as pictures, computer icons, logograms and syllabograms, there will arise needs for cross-referential expressions where one modality is used to ‘tell’ something about expressions in other modalities.

   Intentionally or unintentionally, norms for such translations will appear in the practical work of communicating  due to a need to bridge the tension inherent in paralleling different forms of expression. Metalinguistic awareness could be ascribed both to unintentional practices and to intentionally designed norms. The latter probably also rest on some unconscious presumptions (perhaps simply actions) why the concept of ‘metalinguistic awareness’ itself has to be chiseled out in the individual cases where it is used to constitute a proper characterization and a useful conceptual tool to describe advances (or changes) in metalinguistic awareness.

Place, publisher, year, edition, pages
Gladbeck: PeWe-Verlag, 2019 Edition: 1
Series
Berliner Beiträge zum Vorderen Orient (BBVO) ; 29
Keywords
linguistic awareness, metalinguistic genesis, experimental semiotics, inscriptional practice, non-phonological metalanguage, metapragmatics, medium-independency, medium-dependency
National Category
General Language Studies and Linguistics History of Ideas
Research subject
Information Systems
Identifiers
urn:nbn:se:kau:diva-73282 (URN)978-3-935012-40-9 (ISBN)
Available from: 2020-02-04 Created: 2020-02-04 Last updated: 2020-02-06Bibliographically approved
Lindegren, D., Karegar, F., Kane, B. & Pettersson, J. S. (2019). An evaluation of three designs to engage users when providing their consent on smartphones. Behavior and Information Technology
Open this publication in new window or tab >>An evaluation of three designs to engage users when providing their consent on smartphones
2019 (English)In: Behavior and Information Technology, ISSN 0144-929X, E-ISSN 1362-3001Article in journal (Refereed) Epub ahead of print
Abstract [en]

The graphical and interactive design of a consent form helps individuals to keep control and pay attention to the information that they are disclosing. In the context of mobile apps we propose and test alternative interaction design solutions for selecting personal information on permission dialogues, namely using checkboxes, a drag-and-drop selection, and a swiping action. We test each proposed design and compare the results in terms of their usability and effectiveness in helping users to be more attentive and aware of their data flow, in other words, to provide their informed consent. This study demonstrates that checkboxes while speedy do not engage the user as much as drag-and-drop or swiping. User satisfaction is positively impacted by these newer ways of giving consent.

Place, publisher, year, edition, pages
Oxon, UK: Taylor & Francis, 2019
Keywords
Consent form, usable privacy, user awareness, permission dialogues, user interfaces, personal data
National Category
Computer and Information Sciences
Research subject
Computer Science; Information Systems
Identifiers
urn:nbn:se:kau:diva-76241 (URN)10.1080/0144929X.2019.1697898 (DOI)000503509000001 ()
Available from: 2020-01-09 Created: 2020-01-09 Last updated: 2020-05-13Bibliographically approved
Magnusson, M., Pettersson, J. S., Bellström, P. & Andersson, H. (2019). Developing crisis training software for local governments: From user needs to generic requirements.. In: Andersson B., Johansson B., Barry C., Lang M., Linger H., Schneider C (Ed.), Advances in information systems development: Lecture Notes in Information Systems and Organisation (pp. 79-96). Cham: Springer
Open this publication in new window or tab >>Developing crisis training software for local governments: From user needs to generic requirements.
2019 (English)In: Advances in information systems development: Lecture Notes in Information Systems and Organisation / [ed] Andersson B., Johansson B., Barry C., Lang M., Linger H., Schneider C, Cham: Springer, 2019, p. 79-96Chapter in book (Refereed)
Abstract [en]

In this paper, we identify, analyze and propose generic requirements for software aiming at supporting crisis management training in local governments. The study builds on a Swedish-Norwegian R&D project based on a quadruple helix model. A design science approach was applied and the artifact presented in this paper is a list of generic requirements. The generic requirements are divided into overall requirements, requirements connected to the trainer’s role and requirements connected to the trainee’s role. The requirements are also mapped to the problems and opportunities identified in the project. Finally, we present examples of elaborations of the addressed requirements based on software design considerations. The presented requirements and the systems development process that was used provide guidelines for systems analysts and developers in future systems development projects aiming at constructing new software for crisis management training.

Place, publisher, year, edition, pages
Cham: Springer, 2019
Series
Lecture Notes in Information Systems and Organisation, ISSN 2195-4976
Keywords
Crisis Management Training · Crisis Exercises · Design Science Research · Re-quirements Engineering · User Needs Analysis
National Category
Information Systems, Social aspects
Research subject
Computer Science; Information Systems
Identifiers
urn:nbn:se:kau:diva-74875 (URN)10.1007/978-3-030-22993-1_5 (DOI)9783030229924 (ISBN)
Funder
Interreg Sweden-Norway, 20200721
Available from: 2019-09-27 Created: 2019-09-27 Last updated: 2020-01-09Bibliographically approved
Wik, M. & Pettersson, J. S. (2019). Lack of multimedia tools in intervention support for running system. International Journal of Web Science, 3(2), 148-173
Open this publication in new window or tab >>Lack of multimedia tools in intervention support for running system
2019 (English)In: International Journal of Web Science, ISSN 1757-8795, Vol. 3, no 2, p. 148-173Article in journal (Refereed) Published
Abstract [en]

Engrafting support staff into dialogues between users and customer support systems can compensate for system design flaws. Further, such dialogues can give grounds for system development. This article surveys the levels of interactivity of user support systems, where overt or covert support agents take an active part in the communication between a customer and a system. The main purpose is to demonstrate the prevailing lack of multimedia outputs in the tools supporting human intervention in systems with a graphical user interface (GUI). This is followed by an account of experimentation with human support engrafted in a web system that has a fuller range of GUI expression. The experiment explores the possibility of using multimedia in intervention in human-computer interaction and how such intervention can be built when it is not yet part of the augmented system.

Place, publisher, year, edition, pages
InderScience Publishers, 2019
Keywords
multimedia tools; intervention support; running systems; engrafting support; customer support; user support systems; multimedia output; graphical user interface; GUI; web services; human-computer interaction; web science; interactive systems; Wizard-of-Oz; WOz; user involvement
National Category
Information Systems Business Administration
Research subject
Information Systems
Identifiers
urn:nbn:se:kau:diva-74617 (URN)10.1504/IJWS.2019.10023834 (DOI)
Available from: 2019-09-03 Created: 2019-09-03 Last updated: 2019-09-10Bibliographically approved
Framner, E., Fischer-Hübner, S., Lorünser, T., Alaqra, A. & Pettersson, J. S. (2019). Making secret sharing based cloud storage usable. Information and Computer Security, 27(5), 647-667
Open this publication in new window or tab >>Making secret sharing based cloud storage usable
Show others...
2019 (English)In: Information and Computer Security, E-ISSN 2056-4961, Vol. 27, no 5, p. 647-667Article in journal (Refereed) Published
Abstract [en]

The purpose of this paper is to develop a usable configuration management for Archistar, whichutilizes secret sharing for redundantly storing data over multiple independent storage clouds in a secure andprivacy-friendly manner. Selecting the optimal secret sharing parameters, cloud storage servers and othersettings for securely storing the secret data shares, while meeting all of end user’s requirements and otherrestrictions, is a complex task. In particular, complex trade-offs between different protection goals and legalprivacy requirements need to be made.

Place, publisher, year, edition, pages
Emerald Group Publishing Limited, 2019
Keywords
Privacy, Decision support systems, Usability, Security, Cloud computing, Secret sharing
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-75182 (URN)10.1108/ICS-01-2019-0016 (DOI)
Projects
Prismacloud (4805)
Funder
EU, Horizon 2020
Available from: 2019-10-09 Created: 2019-10-09 Last updated: 2019-12-16Bibliographically approved
Eilu, E. & Pettersson, J. S. (2019). Mobile Social Media for Preventing the Ebola Virus Disease Spread in Liberia and Nigeria: A Comparative Analysis (1ed.). In: Sara Paiva (Ed.), Mobile Solutions and Their Usefulness in Everyday Life: (pp. 173-188). Cham: Springer
Open this publication in new window or tab >>Mobile Social Media for Preventing the Ebola Virus Disease Spread in Liberia and Nigeria: A Comparative Analysis
2019 (English)In: Mobile Solutions and Their Usefulness in Everyday Life / [ed] Sara Paiva, Cham: Springer, 2019, 1, p. 173-188Chapter in book (Refereed)
Abstract [en]

The aftermath of the Ebola Virus Disease (EVD) crisis in West Africa in 2014 was horrific. The EVD epidemic claimed 11,315 lives and had almost a 40 per cent killing rate. The EVD had huge negative effects on social, economic and political fronts of the four most affected countries Guinea, Liberia, Sierra Leone and Nigeria. Liberia was the country worst hit and Nigeria was the least affected among them. In both countries, social media was widely used to provide public health messaging and behavioural change guidance to the population on how to avoid getting infected with the deadly EVD. However, while the use of social media significantly reduced the spread of Ebola in Nigeria by 75 per cent, it was not effective in reducing the spread of the EVD in Liberia. In this paper, we reflect factors responsible for the ineffective use of mobile social media in aiding social behavioural change guidance towards the prevention of EVD spread in Liberia and the successful use of mobile social media in doing the same in Nigeria. We further reflect on the definition of ‘mobile social media’.

Place, publisher, year, edition, pages
Cham: Springer, 2019 Edition: 1
Series
EAI/Springer Innovations in Communication and Computing, ISSN 2522-8595
Keywords
Behavioural change, Disease, Mobile communication technologies, FM radio
National Category
Information Systems, Social aspects
Research subject
Information Systems
Identifiers
urn:nbn:se:kau:diva-71873 (URN)10.1007/978-3-319-93491-4_9 (DOI)978-3-319-93491-4 (ISBN)978-3-319-93490-7 (ISBN)
Available from: 2019-04-18 Created: 2019-04-18 Last updated: 2019-05-02Bibliographically approved
Hamm, P., Krenn, S. & Pettersson, J. S. (2019). Secure and privacy-preserving identity and access management in CREDENTIAL. In: J.B. Bernabe & A. Skarmeta (Ed.), Challenges in Cybersecurity and Privacy: the European Research Landscape (pp. 271-284). Delft: River Publishers
Open this publication in new window or tab >>Secure and privacy-preserving identity and access management in CREDENTIAL
2019 (English)In: Challenges in Cybersecurity and Privacy: the European Research Landscape / [ed] J.B. Bernabe & A. Skarmeta, Delft: River Publishers, 2019, p. 271-284Chapter in book (Refereed)
Abstract [en]

In an increasingly interconnected world, establishing trust between endusers and service providers with regards to privacy and data protectionis becoming increasingly important. Consequently, CREDENTIAL, fundedunder the European Union’s H2020 framework programme, was dedicated tothe development of a cloud-based service for identity provisioning and datasharing. The system aimed at offering both high confidentiality and privacyguarantees to the data owner, and high authenticity guarantees to the receiver. This was achieved by integrating advanced cryptographic mechanisms intostandardized authentication protocols. The developed solutions were testedin pilots from three critical sectors, which proved that high user convenience,strong security, and practical efficiency can be achieved at the same timethrough a single system.

Place, publisher, year, edition, pages
Delft: River Publishers, 2019
Series
River Publishers Series in Security and Digital Forensics
National Category
Computer Sciences Information Systems Information Systems, Social aspects
Research subject
Information Systems; Computer Science
Identifiers
urn:nbn:se:kau:diva-73283 (URN)10.13052/rp-9788770220873 (DOI)9788770220880 (ISBN)9788770220873 (ISBN)
Projects
CREDENTIAL
Funder
EU, Horizon 2020, 653454
Available from: 2019-09-02 Created: 2019-09-02 Last updated: 2019-09-10Bibliographically approved
Magnusson, M., Pettersson, J. S., Bellström, P. & Andersson, H. (2018). Developing crisis training software for local governments: From user needs to generic requirements. In: B. Andersson, B. Johansson, S. Carlsson, C. Barry, M. Lang, H. Linger, & C. Schneider (Ed.), Information Systems Development: Designing Digitalization (ISD2018 Proceedings). Paper presented at The 27th International Conference on Information Systems Development (ISD2018)Lund 22-24 Augusti. Lunds universiet
Open this publication in new window or tab >>Developing crisis training software for local governments: From user needs to generic requirements
2018 (English)In: Information Systems Development: Designing Digitalization (ISD2018 Proceedings) / [ed] B. Andersson, B. Johansson, S. Carlsson, C. Barry, M. Lang, H. Linger, & C. Schneider, Lunds universiet , 2018, p. -12Conference paper, Published paper (Refereed)
Abstract [en]

In this paper we analyze and present the generic requirements identified for a software aiming at supporting crisis management training in local governments. The generic requirements are divided into overall requirements, requirements connected to the trainer’s role and requirements connected to the trainee’s role. Moreover, the requirements are mapped to problems as well as opportunities. Finally, we present examples of elaborations of the addressed requirements based on software design considerations. In our work we applied a design science approach and the artifact presented in this paper is a list of generic requirement. The presented requirements and the systems development process used, provide guidelines for systems analysts and developers in future systems development projects aiming at constructing new software for crisis management training

Place, publisher, year, edition, pages
Lunds universiet, 2018
Keywords
Crisis Training, Crisis Exercises, Design Science Research, Requirements Engineering, Needs Analysis
National Category
Information Systems, Social aspects
Research subject
Information Systems
Identifiers
urn:nbn:se:kau:diva-69314 (URN)978-91-7753-876-9 (ISBN)
Conference
The 27th International Conference on Information Systems Development (ISD2018)Lund 22-24 Augusti
Funder
Interreg Sweden-Norway, 20200721
Available from: 2018-09-19 Created: 2018-09-19 Last updated: 2019-07-12Bibliographically approved
Karegar, F., Pettersson, J. S. & Fischer-Hübner, S. (2018). Fingerprint Recognition on Mobile Devices: Widely Deployed, Rarely Understood. In: ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018).: . Paper presented at The 3rd SECPID Workshop in the 13th International Conference on Availability, Reliability and Security (ARES 2018), August 27-30, 2018, Hamburg, Germany.. New York, NY, USA: Association for Computing Machinery (ACM), Article ID 39.
Open this publication in new window or tab >>Fingerprint Recognition on Mobile Devices: Widely Deployed, Rarely Understood
2018 (English)In: ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018)., New York, NY, USA: Association for Computing Machinery (ACM), 2018, article id 39Conference paper, Published paper (Refereed)
Abstract [en]

Only a few studies have addressed the users' conception of how fingerprint recognition used for different purposes on mobile devices works. This study contributes by investigating how different groups of individuals think that the fingerprint recognition works, why they think so, and also by pointing out differences in pin code and fingerprint issues. The study furthermore yields some results concerning individuals' attitudes towards how sensitive the use of fingerprint sensors is: non-users tended to be more afraid of third-party access than users. On the other hand, users tended to regard the fingerprint pattern as more sensitive than non-users.

This study also manages to give some methodological contributions, namely that mockup user interfaces do not bias the parameters studied in this paper (e.g. understanding of access to fingerprint data), and that self-estimation of knowledge in Computer Security is not a good indicator of respondents' understanding of fingerprint security and privacy. Moreover, people who connected a low degree of sensitivity to fingerprint patterns gave very different reasons for their estimation of sensitivity. This prompts for more research, as it is unclear if different groups would benefit from different information and modes of visualisation to understand what are the issues involved in fingerprint recognition on mobile devices.

Place, publisher, year, edition, pages
New York, NY, USA: Association for Computing Machinery (ACM), 2018
Keywords
Fingerprint Pattern, User Perception, Sensitive Information, Data Privacy
National Category
Computer Sciences Human Computer Interaction
Identifiers
urn:nbn:se:kau:diva-70227 (URN)10.1145/3230833.3234514 (DOI)000477981800077 ()978-1-4503-6448-5 (ISBN)
Conference
The 3rd SECPID Workshop in the 13th International Conference on Availability, Reliability and Security (ARES 2018), August 27-30, 2018, Hamburg, Germany.
Projects
CREDENTIAL
Funder
EU, Horizon 2020, 653454
Available from: 2018-11-21 Created: 2018-11-21 Last updated: 2019-11-01Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-6826-3358

Search in DiVA

Show all publications