Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Reciprocities or Incentives?: Understanding Privacy Intrusion Perspectives and Sharing Behaviors
Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).ORCID iD: 0000-0002-6509-3792
Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Service Research Center (from 2013). Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Department of Social and Psychological Studies (from 2013).ORCID iD: 0000-0001-8102-8168
2019 (English)In: HCI for Cybersecurity, Privacy and Trust: First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings / [ed] Abbas Moallem, Cham, Switzerland: Springer, 2019, p. 355-370Conference paper, Published paper (Refereed)
Abstract [en]

The importance and perception of privacy varies from one context to the other. However, everyone values his or her privacy to a certain extent. The subjectivity of that value, attitudes, and behaviors would depend on different entangling factors. It is important to understand the motivation that influences human behavior, whether to protect or share their information. In this paper, we aim at understanding the boundaries of privacy, factors influencing information sharing behavior including experiences (reciprocities of privacy), and efforts taken to protect one’s data. We collected data using quantitative (survey/quiz) and qualitative means (focus groups). In the survey/quiz, our results showed that intrusion experience and awareness have a significant correlation between sharing of data. Furthermore, our focus groups results yielded details on influencing factors for privacy reciprocities and tradeoffs. We discuss our results in terms of privacy incentives and factors influencing the sharing behavior of their information. Finally, we highlight the complexity of behavior where intrinsic and extrinsic motivations could clash and result in a dilemma such as the privacy paradox phenomenon. © 2019, Springer Nature Switzerland AG.

Place, publisher, year, edition, pages
Cham, Switzerland: Springer, 2019. p. 355-370
Series
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 11594
Keywords [en]
Behavior, Incentive, Motivation, Privacy, Privacy paradox, Reciprocity, Behavioral research, Data privacy, Human computer interaction, Information dissemination, Surveys, Extrinsic motivation, Focus groups, Human behaviors, Information sharing, Privacy intrusion, Computer privacy
National Category
Human Computer Interaction
Research subject
Computer Science; Psychology
Identifiers
URN: urn:nbn:se:kau:diva-75636DOI: 10.1007/978-3-030-22351-9_24Scopus ID: 2-s2.0-85069853461ISBN: 9783030223502 (print)OAI: oai:DiVA.org:kau-75636DiVA, id: diva2:1369655
Conference
21st HCI International Conference, HCII 2019, July 26–31, 2019, Orlando, FL, USA,
Available from: 2019-11-12 Created: 2019-11-12 Last updated: 2019-12-16Bibliographically approved
In thesis
1. Tinkering the Wicked Problem of Privacy: Design Challenges and Opportunities for Crypto-based Services
Open this publication in new window or tab >>Tinkering the Wicked Problem of Privacy: Design Challenges and Opportunities for Crypto-based Services
2020 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

Data privacy has been growing in importance in recent years, especially with the constant increase of online activity. Consequently, researchers study, design, and develop solutions aimed at enhancing users' data privacy. The wicked problem of data privacy is a dynamic challenge that defies straightforward solutions. Since there are many factors involved in data privacy, such as technological, legal, and human aspects, we can only aim at mitigating rather than solving this wicked problem.

Our aim was to explore challenges and opportunities with a focus on human aspects for designing usable crypto-based privacy-enhancing technologies (PETs). Mainly, there were three PETs in the cloud context included in our studies: malleable signatures, secret sharing, and homomorphic encryption. Based on the three PETs, services were developed within European research projects that were the scope of our user studies. We followed a user-centered design approach by using empirical qualitative and quantitative means for collecting study data. Our results and tinkering conveyed (i) analysis of different categories of user's perspectives, mental models, and trade-offs, (ii) user requirements for PET services, and (iii) user interface design guidelines for PET services. In our contributions, we highlight considerations and guidelines for supporting the design of future solutions.

Abstract [en]

Data privacy has been growing in importance in recent years, especially with the constant increase of online activity. Consequently, researchers study, design, and develop solutions aimed at enhancing users' data privacy. The wicked problem of data privacy is a dynamic challenge that defies straightforward solutions. Since there are many factors involved in data privacy, such as technological, legal, and human aspects, we can only aim at mitigating rather than solving this wicked problem.

Our aim was to explore challenges and opportunities with a focus on human aspects for designing usable crypto-based privacy-enhancing technologies (PETs). Our results and tinkering conveyed (i) analysis of different categories of user's perspectives, mental models, and trade-offs, (ii) user requirements for PET services, and (iii) user interface design guidelines for PET services. In our contributions, we highlight considerations and guidelines for supporting the design of future solutions.

Place, publisher, year, edition, pages
Karlstads universitet, 2020. p. 22
Series
Karlstad University Studies, ISSN 1403-8099 ; 2020:5
Keywords
Data privacy, wicked problems, user-centered design, privacy enhancing technologies, human factors, malleable signatures, secret sharing, homomorphic encryption
National Category
Computer Sciences Human Computer Interaction
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-75992 (URN)978-91-7867-077-2 (ISBN)978-91-7867-087-1 (ISBN)
Public defence
2020-01-30, 21A342, Eva Eriksson, 10:15 (English)
Opponent
Supervisors
Available from: 2020-01-09 Created: 2019-12-16 Last updated: 2022-04-04Bibliographically approved

Open Access in DiVA

fulltext(558 kB)261 downloads
File information
File name FULLTEXT01.pdfFile size 558 kBChecksum SHA-512
d4942a79addfa2739c3e6e0034d246ba1c27bc282a794c13d0021b4dd3e43d9a2f36ecc4b1d16fd9be5cbf555ffc0a365774b7cee8c4661bfc1ea2f10d470975
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Alaqra, Ala SarahWästlund, Erik

Search in DiVA

By author/editor
Alaqra, Ala SarahWästlund, Erik
By organisation
Department of Mathematics and Computer Science (from 2013)Service Research Center (from 2013)Department of Social and Psychological Studies (from 2013)
Human Computer Interaction

Search outside of DiVA

GoogleGoogle Scholar
Total: 261 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 958 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf