Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Evoking Comprehensive Mental Models of Anonymous Credentials
Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Psychology. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. Karlstad University, Faculty of Economic Sciences, Communication and IT, Service Research Center. (Centrum för HumanIT)ORCID iD: 0000-0001-8102-8168
Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. (Datavetenskap)ORCID iD: 0000-0002-0101-2498
Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. (PriSec)ORCID iD: 0000-0002-6938-4466
2012 (English)In: Proceedings of the 2011 IFIP WG 11.4 international conference on Open Problems in Network Security / [ed] Camenisch J., Kesdogan, D., Berlin: Springer Berlin/Heidelberg, 2012, Vol. 7039, p. 1-14Conference paper, Published paper (Refereed)
Abstract [en]

Anonymous credentials are a fundamental technology for preserving end users' privacy by enforcing data minimization for online applications. However, the design of user-friendly interfaces that convey their privacy benefits to users is still a major challenge. Users are still unfamiliar with the new and rather complex concept of anonymous credentials, since no obvious real-world analogies exists that can help them create the correct mental models. In this paper we explore different ways in which suitable mental models of the data minimization property of anonymous credentials can be evoked on end users. To achieve this, we investigate three different approaches in the context of an e-shopping scenario: a card-based approach, an attribute-based approach and an adapted card-based approach. Results show that the adapted card-based approach is a good approach towards evoking the right mental models for anonymous credential applications. However, better design paradigms are still needed to make users understand that attributes can be used to satisfy conditions without revealing the value of the attributes themselves.

Place, publisher, year, edition, pages
Berlin: Springer Berlin/Heidelberg, 2012. Vol. 7039, p. 1-14
Series
LNCS, ISSN 0302-9743 ; 7039
National Category
Computer Systems Software Engineering Applied Psychology Computer Sciences
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kau:diva-12118DOI: 10.1007/978-3-642-27585-2_1ISI: 000306351500001ISBN: 978-3-642-27584-5 (print)OAI: oai:DiVA.org:kau-12118DiVA, id: diva2:508851
Conference
IFIP WG 11.4 international conference on Open Problems in Network Security, Lucerne
Available from: 2012-03-09 Created: 2012-03-09 Last updated: 2018-07-16Bibliographically approved
In thesis
1. Usable privacy for digital transactions: Exploring the usability aspects of three privacy enhancing mechanisms
Open this publication in new window or tab >>Usable privacy for digital transactions: Exploring the usability aspects of three privacy enhancing mechanisms
2012 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

The amount of personal identifiable information that people distribute over different online services has grown rapidly and considerably over the last decades. This has led to increased probabilities for identity theft, profiling and linkability attacks, which can in turn not only result in a threat to people’s personal dignity, finances, and many other aspects of their lives, but also to societies in general. Methods and tools for securing people’s online activities and protecting their privacy on the Internet, so called Privacy Enhancing Technologies (PETs), are being designed and developed. However, these technologies are often seen by ordinary users as complicated and disruptive of their primary tasks.

 

In this licentiate thesis, I investigate the usability aspects of three main privacy and security enhancing mechanisms. These mechanisms have the goal of helping and encouraging users to protect their privacy on the Internet as they engage in some of the steps necessary to complete a digital transaction. The three mechanisms, which have been investigated within the scope of different research projects, comprise of (1) graphical visualizations of service providers’ privacy policies and user-friendly management and matching of users’ privacy preferences “on the fly”, (2) methods for helping users create appropriate mental models of the data minimization property of anonymous credentials, and (3) employing touch-screen biometrics as a method to authenticate users into mobile devices and verify their identities during a digital transaction.

 

Results from these investigations suggest that these mechanisms can make digital transactions privacy-friendly and secure while at the same time delivering convenience and usability for ordinary users.

Place, publisher, year, edition, pages
Karlstad: Karlstads universitet, 2012. p. 57
Series
Karlstad University Studies, ISSN 1403-8099 ; 2012:45
Keywords
Privacy-Enhancing Technologies, usability, usable privacy, mental models, mobile devices, security, digital transactions, e-commerce, User Interfaces
National Category
Information Systems Human Computer Interaction Computer Sciences
Research subject
Information Systems
Identifiers
urn:nbn:se:kau:diva-14832 (URN)978-91-7063-452-9 (ISBN)
Supervisors
Available from: 2012-11-14 Created: 2012-09-18 Last updated: 2018-06-04Bibliographically approved
2. Designing for Usable Privacy and Transparency in Digital Transactions
Open this publication in new window or tab >>Designing for Usable Privacy and Transparency in Digital Transactions
2015 (English)Doctoral thesis, comprehensive summary (Other academic)
Alternative title[en]
Designing for Usable Privacy and Transparency in Digital Transactions : Exploring and enhancing the usability and user experience aspects of selected privacy and transparency technologies
Abstract [en]

People engage with multiple online services and carry out a range of different digital transactions with these services. Registering an account, sharing content in social networks, or requesting products or services online are a few examples of such digital transactions. With every transaction, people take decisions and make disclosures of personal data. Despite the possible benefits of collecting data about a person or a group of people, massive collection and aggregation of personal data carries a series of privacy and security implications which can ultimately result in a threat to people's dignity, their finances, and many other aspects of their lives. For this reason, privacy and transparency enhancing technologies are being developed to help people protect their privacy and personal data online. However, some of these technologies are usually hard to understand, difficult to use, and get in the way of people's momentary goals.

The objective of this thesis is to explore, and iteratively improve, the usability and user experience provided by novel privacy and transparency technologies. To this end, it compiles a series of case studies that address identified issues of usable privacy and transparency at four stages of a digital transaction, namely the information, agreement, fulfilment and after-sales stages. These studies contribute with a better understanding of the human-factors and design requirements that are necessary for creating user-friendly tools that can help people to protect their privacy and to control their personal information on the Internet.

Abstract [en]

People engage with multiple online services and carry out a range of different digital transactions with these services. Registering an account, sharing content in social networks, or requesting products or services online are a few examples of such digital transactions. With every transaction, people take decisions and make disclosures of personal data. Despite the possible benefits of collecting data about a person or a group of people, massive collection and aggregation of personal data carries a series of privacy and security implications which can ultimately result in a threat to people's dignity, their finances, and many other aspects of their lives. For this reason, privacy and transparency enhancing technologies are being developed to help people protect their privacy and personal data online. However, some of these technologies are usually hard to understand, difficult to use, and get in the way of people's momentary goals.

The objective of this thesis is to explore, and iteratively improve, the usability and user experience provided by novel privacy and transparency technologies. To this end, it compiles a series of case studies that address identified issues of usable privacy and transparency at four stages of a digital transaction, namely the informationagreementfulfilment and after-sales stages. These studies contribute with a better understanding of the human-factors and design requirements that are necessary for creating user-friendly tools that can help people to protect their privacy and to control their personal information on the Internet.

Place, publisher, year, edition, pages
Karlstad: Karlstads universitet, 2015. p. 96
Series
Karlstad University Studies, ISSN 1403-8099 ; 2015:30
Keywords
Usable privacy, usable transparency, usability, user experience, mental models, mobile devices, digital transactions, e-commerce, user interfaces
National Category
Computer Systems Human Aspects of ICT
Research subject
Information Systems; Computer Science
Identifiers
urn:nbn:se:kau:diva-35921 (URN)978-91-7063-646-2 (ISBN)
Public defence
2015-06-10, 1 B364, Karlstads universitet, Karlstad, 09:00 (English)
Opponent
Supervisors
Note

Paper 8 ingick som manuskript i avhandlingen, nu publicerad.

Available from: 2015-05-21 Created: 2015-04-27 Last updated: 2019-12-13Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full text

Authority records BETA

Wästlund, ErikAngulo, JulioFischer-Hübner, Simone

Search in DiVA

By author/editor
Wästlund, ErikAngulo, JulioFischer-Hübner, Simone
By organisation
Department of PsychologyCentre for HumanITService Research CenterDepartment of Computer Science
Computer SystemsSoftware EngineeringApplied PsychologyComputer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 520 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf