scholarly journals Privacy Care

2021 ◽  
Vol 21 (1) ◽  
pp. 1-32
Author(s):  
Vikram Mehta ◽  
Daniel Gooch ◽  
Arosha Bandara ◽  
Blaine Price ◽  
Bashar Nuseibeh

The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired access to individuals’ physical space or their information, anytime and anywhere, raising potentially serious privacy concerns. Individuals lack awareness and control of the vulnerabilities in everyday contexts and need support and care in regulating disclosures to their physical and digital selves. Existing GUI-based solutions, however, often feel physically interruptive, socially disruptive, time-consuming and cumbersome. To address such challenges, we investigate the user interaction experience and discuss the need for more tangible and embodied interactions for effective and seamless natural privacy management in everyday UbiComp settings. We propose the Privacy Care interaction framework, which is rooted in the literature of privacy management and tangible computing. Keeping users at the center, Awareness and Control are established as the core parts of our framework. This is supported with three interrelated interaction tenets: Direct, Ready-to-Hand, and Contextual . Direct refers to intuitiveness through metaphor usage. Ready-to-Hand supports granularity, non-intrusiveness, and ad hoc management, through periphery-to-center style attention transitions. Contextual supports customization through modularity and configurability. Together, they aim to provide experience of an embodied privacy care with varied interactions that are calming and yet actively empowering. The framework provides designers of such care with a basis to refer to, to generate effective tangible tools for privacy management in everyday settings. Through five semi-structured focus groups, we explore the privacy challenges faced by a sample set of 15 older adults (aged 60+) across their cyber-physical-social spaces. The results show conformity to our framework, demonstrating the relevance of the facets of the framework to the design of privacy management tools in everyday UbiComp contexts.

2020 ◽  
Author(s):  
Reham AlTamime ◽  
Vincent Marmion ◽  
Wendy Hall

BACKGROUND Mobile apps and IoT-enabled smartphones technologies facilitate collecting, sharing, and inferring from a vast amount of data about individuals’ location, health conditions, mobility status, and other factors. The use of such technology highlights the importance of understanding individuals’ privacy concerns to design applications that integrate their privacy expectations and requirements. OBJECTIVE This paper explores, assesses, and predicts individuals’ privacy concerns in relation to collecting and disclosing data on mobile health apps. METHODS We designed a questionnaire to identify participants’ privacy concerns pertaining to a set of 432 mobile apps’ data collection and sharing scenarios. Participants were presented with 27 scenarios that varied across three categorical factors: (1) type of data collected (e.g. health, demographic, behavioral, and location); (2) data sharing (e.g., whether it is shared, and for what purpose); and, (3) retention rate (e.g., forever, until the purpose is satisfied, unspecified, week, or year). RESULTS Our findings show that type of data, data sharing, and retention rate are all factors that affect individuals’ privacy concerns. However, specific factors such as collecting and disclosing health data to a third-party tracker play a larger role than other factors in triggering privacy concerns. CONCLUSIONS Our findings suggest that it is possible to predict privacy concerns based on these three factors. We propose design approaches that can improve users’ awareness and control of their data on mobile applications


2020 ◽  
Vol 4 (Supplement_1) ◽  
pp. 600-600
Author(s):  
Lyndsie Koon ◽  
Megan Bayles ◽  
Elena Remillard ◽  
Wendy Rogers

Abstract Technology designed to support aging-in-place for people with long-term disabilities begins with understanding the specific tasks that need support, and individual abilities, preferences, cultural practices, and privacy concerns. Such understanding is best achieved through a multi-method approach that includes direct, detailed assessments of representative users as well as individuals who work with or care for them. Our target users are people who identify as having a sensory or mobility impairment prior to the age of 50, including individuals aging with multiple sclerosis, late-onset hearing loss, and late-onset vision loss. In the present study, we are interviewing Subject Matter Experts (SMEs) to identify the scope of the challenges that should be explored in more depth. The SMEs include caregivers and medical professionals to identify challenges that the target populations experience in their everyday activities, advice about research adaptations, and recruitment ideas.


2021 ◽  
pp. 232948842110370
Author(s):  
Peter W. Cardon ◽  
Haibing Ma ◽  
Carolin Fleischmann

Artificial intelligence (AI) algorithmic tools that analyze and evaluate recorded meeting data may provide many new opportunities for employees, teams, and organizations. Yet, these new and emerging AI tools raise a variety of issues related to privacy, psychological safety, and control. Based on in-depth interviews with 50 American, Chinese, and German employees, this research identified five key tensions related to algorithmic analysis of recorded meetings: employee control of data versus management control of data, privacy versus transparency, reduced psychological safety versus enhanced psychological safety, learning versus evaluation, and trust in AI versus trust in people. More broadly, these tensions reflect two dimensions to inform organizational policymaking and guidelines: safety versus risk and employee control versus management control. Based on a quadrant configuration of these dimensions, we propose the following approaches to managing algorithmic applications to recording meeting data: the surveillance, benevolent control, meritocratic, and social contract approaches. We suggest the social contract approach facilitates the most robust dialog about the application of algorithmic tools to recorded meeting data, potentially leading to higher employee control and sense of safety.


Author(s):  
Natã M. Barbosa ◽  
Gang Wang ◽  
Blase Ur ◽  
Yang Wang

To enable targeted ads, companies profile Internet users, automatically inferring potential interests and demographics. While current profiling centers on users' web browsing data, smartphones and other devices with rich sensing capabilities portend profiling techniques that draw on methods from ubiquitous computing. Unfortunately, even existing profiling and ad-targeting practices remain opaque to users, engendering distrust, resignation, and privacy concerns. We hypothesized that making profiling visible at the time and place it occurs might help users better understand and engage with automatically constructed profiles. To this end, we built a technology probe that surfaces the incremental construction of user profiles from both web browsing and activities in the physical world. The probe explores transparency and control of profile construction in real time. We conducted a two-week field deployment of this probe with 25 participants. We found that increasing the visibility of profiling helped participants anticipate how certain actions can trigger specific ads. Participants' desired engagement with their profile differed in part based on their overall attitudes toward ads. Furthermore, participants expected algorithms would automatically determine when an inference was inaccurate, no longer relevant, or off-limits. Current techniques typically do not do this. Overall, our findings suggest that leveraging opportunistic moments within pervasive computing to engage users with their own inferred profiles can create more trustworthy and positive experiences with targeted ads.


2021 ◽  
Vol 13 (04) ◽  
pp. 21-37
Author(s):  
Priyanka Pandey ◽  
Raghuraj Singh

Mobile Ad hoc Network (MANET) is mainly designed to set up communication among devices in infrastructure-less wireless communication network. Routing in this kind of communication network is highly affected by its restricted characteristics such as frequent topological changes and limited battery power. Several research works have been carried out to improve routing performance in MANET. However, the overall performance enhancement in terms of packet delivery, delay and control message overhead is still not come into the wrapping up. In order to overcome the addressed issues, an Efficient and Stable-AODV (EFST-AODV) routing scheme has been proposed which is an improvement over AODV to establish a better quality route between source and destination. In this method, we have modified the route request and route reply phase. During the route request phase, cost metric of a route is calculated on the basis of parameters such as residual energy, delay and distance. In a route reply phase, average residual energy and average delay of overall path is calculated and the data forwarding decision is taken at the source node accordingly. Simulation outcomes reveal that the proposed approach gives better results in terms of packet delivery ratio, delay, throughput, normalized routing load and control message overhead as compared to AODV.


2012 ◽  
Vol 25 (3) ◽  
pp. 30-60 ◽  
Author(s):  
Mahmud A. Shareef ◽  
Vinod Kumar

This study provides an application framework toward measures to prevent/control identity theft in conjunction with sources. It also identifies the impact of overall protection of identity theft on consumer trust, the cost of products/services, and operational performance, all of which in turn contribute to a purchase intention using E-commerce (EC). For the first objective, this study proposes a matrix of sources and measures to prevent and control identity theft. From this matrix, using knowledge from a literature review and judgment based on plausibility, the authors identify global laws, controls placed on organizations, publications to develop awareness, technical management, managerial policy, risk management tools, data management, and control over employees are the potential measuring items to prevent identity theft related to EC. A case study in banking sector through a qualitative approach was conducted to verify the proposed relations, constructs, and measuring items. For the second objective, this research paper conceptualizes a model based on literature review and validates that based on the case study in the financial sector. The model reflects the effects of preventing and controlling identity theft on the costs of products/services, operational performance, and customers’ perception of trust, which would lead to purchase intention in EC.


Author(s):  
E. Georgiou ◽  
J. Dai

The motivation for this work is to develop a platform for a self-localization device. Such a platform has many applications for the autonomous maneuverable non-holonomic mobile robot classification, which can be used for search and rescue or for inspection devices where the robot has a desired path to follow but because of an unknown terrain, the device requires the ability to make ad-hoc corrections to its movement to reach its desire path. The mobile robot is modeled using Lagrangian d’Alembert’s principle considering all the possible inertias and forces generated, and are controlled by restraining movement based on the holonomic and non-holonomic constraints of the modeled vehicle. The device is controlled by a PD controller based on the vehicle’s holonomic and non-holonomic constraints. An experiment was setup to verify the modeling and control structure’s functionality and the initial results are promising.


Comunicar ◽  
2019 ◽  
Vol 27 (60) ◽  
pp. 61-70
Author(s):  
Yi-Ning Katherine-Chen ◽  
Chia-Ho Ryan-Wen

With the prevalence of smart devices and wireless Internet, privacy has become a pivotal matter in governmental, academic, and technological fields. Our study aims to understand Taiwanese university students’ privacy concerns and protective behaviours in relation to online targeting ads and their habitual smartphone usage. Surveying 810 valid subjects, our results first propose that ad relevance has direct bearing on attention to ads. Second, ad relevance inversely correlates with privacy concerns (i.e. descending personal control and surging corporate power) and protective behaviours (self-filtering and ad evasion). Third and finally, neither privacy concerns nor protective behaviours have a negative bearing on habitual smartphone usage. Opposite to previous research, our study concludes that Taiwanese college students exhibit zero privacy paradox, owing to no signs of privacy concern incited by mobile targeting ads, no evidence of significant protective behaviours, and no decreasing habitual smartphone usage out of privacy concern and protection. Our findings indicate Taiwanese university students’ shaky awareness of potential risks and crises from exposure to vulnerable online privacy management. To deal with this, we suggest educating youths’ understandings of digital jeopardy by experts is urgently needed more so than just technical tutorials of privacy settings. Con la prevalencia de dispositivos inteligentes e Internet inalámbrico, la privacidad se ha convertido en un tema esencial en materias gubernamentales, académicas y tecnológicas. Nuestro estudio se dedica específicamente a entender las preocupaciones de los estudiantes universitarios taiwaneses en privacidad y comportamientos protectores en relación con la publicidad online y el uso habitual de teléfonos inteligentes. Con 810 muestras válidas encuestadas, nuestros resultados revelan que: 1) La relevancia de la publicidad tiene un efecto directo en su atención; 2) Está asociada inversamente a las preocupaciones de privacidad (por ejemplo, control personal descendiente y poder corporativo ascendiente) y comportamientos protectores (evasión de anuncios y autocensura); 3) La preocupación por ña privacidad ni los comportamientos protectores tuvieron efecto negativo en el uso habitual de los smartphones. Nuestro estudio concluye que no hay paradojas de la privacidad halladas en estos jóvenes taiwaneses debido a cambios en su preocupación por la privacidad, generada por la publicidad personalizada en su móvil. Ello evidencia un cambio significativo en los comportamientos protectores. En suma, estos universitarios taiwaneses tienen una débil apreciación de los riesgos potenciales y crisis a los que una vulnerable gestión de la privacidad online les podría exponer. Para abordarlo, una educación que cultive la comprensión de los peligros digitales para los jóvenes es muy recomendable y requiere urgentemente tutoriales técnicos sobre privacidad.


2016 ◽  
Vol 7 (2) ◽  
pp. 19-36 ◽  
Author(s):  
Inah Omoronyia

Privacy awareness is a core determinant of the success or failure of privacy infrastructures: if systems and users are not aware of potential privacy concerns, they cannot effectively discover, use or judge the effectiveness of privacy management capabilities. Yet, privacy awareness is only implicitly described or implemented during the privacy engineering of software systems. In this paper, the author advocates a systematic approach to considering privacy awareness. He characterizes privacy awareness and illustrate its benefits to preserving privacy in a smart mobile environment. The author proposes privacy awareness requirements to anchor the consideration of privacy awareness needs of software systems. Based on these needs, an initial process framework for the identification of privacy awareness issues is proposed. He also argues that a systematic route to privacy awareness necessitates the investigation of an appropriate representation language, analysis mechanisms and understanding the socio-technical factors that impact the manner in which we regulate our privacy.


Sign in / Sign up

Export Citation Format

Share Document