scholarly journals The Case for Privacy Awareness Requirements

2016 ◽  
Vol 7 (2) ◽  
pp. 19-36 ◽  
Author(s):  
Inah Omoronyia

Privacy awareness is a core determinant of the success or failure of privacy infrastructures: if systems and users are not aware of potential privacy concerns, they cannot effectively discover, use or judge the effectiveness of privacy management capabilities. Yet, privacy awareness is only implicitly described or implemented during the privacy engineering of software systems. In this paper, the author advocates a systematic approach to considering privacy awareness. He characterizes privacy awareness and illustrate its benefits to preserving privacy in a smart mobile environment. The author proposes privacy awareness requirements to anchor the consideration of privacy awareness needs of software systems. Based on these needs, an initial process framework for the identification of privacy awareness issues is proposed. He also argues that a systematic route to privacy awareness necessitates the investigation of an appropriate representation language, analysis mechanisms and understanding the socio-technical factors that impact the manner in which we regulate our privacy.

Author(s):  
Inah Omoronyia

Privacy awareness is a core determinant of the success or failure of privacy infrastructures: if systems and users are not aware of potential privacy concerns, they cannot effectively discover, use or judge the effectiveness of privacy management capabilities. Yet, privacy awareness is only implicitly described or implemented during the privacy engineering of software systems. In this paper, the author advocates a systematic approach to considering privacy awareness. He characterizes privacy awareness and illustrate its benefits to preserving privacy in a smart mobile environment. The author proposes privacy awareness requirements to anchor the consideration of privacy awareness needs of software systems. Based on these needs, an initial process framework for the identification of privacy awareness issues is proposed. He also argues that a systematic route to privacy awareness necessitates the investigation of an appropriate representation language, analysis mechanisms and understanding the socio-technical factors that impact the manner in which we regulate our privacy.


Author(s):  
Inah Omoronyia

Privacy awareness is a core determinant of the success or failure of privacy infrastructures: if systems and users are not aware of potential privacy concerns, they cannot effectively discover, use or judge the effectiveness of privacy management capabilities. Yet, privacy awareness is only implicitly described or implemented during the privacy engineering of software systems. In this paper, the author advocates a systematic approach to considering privacy awareness. He characterizes privacy awareness and illustrate its benefits to preserving privacy in a smart mobile environment. The author proposes privacy awareness requirements to anchor the consideration of privacy awareness needs of software systems. Based on these needs, an initial process framework for the identification of privacy awareness issues is proposed. He also argues that a systematic route to privacy awareness necessitates the investigation of an appropriate representation language, analysis mechanisms and understanding the socio-technical factors that impact the manner in which we regulate our privacy.


2021 ◽  
Vol 21 (1) ◽  
pp. 1-32
Author(s):  
Vikram Mehta ◽  
Daniel Gooch ◽  
Arosha Bandara ◽  
Blaine Price ◽  
Bashar Nuseibeh

The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired access to individuals’ physical space or their information, anytime and anywhere, raising potentially serious privacy concerns. Individuals lack awareness and control of the vulnerabilities in everyday contexts and need support and care in regulating disclosures to their physical and digital selves. Existing GUI-based solutions, however, often feel physically interruptive, socially disruptive, time-consuming and cumbersome. To address such challenges, we investigate the user interaction experience and discuss the need for more tangible and embodied interactions for effective and seamless natural privacy management in everyday UbiComp settings. We propose the Privacy Care interaction framework, which is rooted in the literature of privacy management and tangible computing. Keeping users at the center, Awareness and Control are established as the core parts of our framework. This is supported with three interrelated interaction tenets: Direct, Ready-to-Hand, and Contextual . Direct refers to intuitiveness through metaphor usage. Ready-to-Hand supports granularity, non-intrusiveness, and ad hoc management, through periphery-to-center style attention transitions. Contextual supports customization through modularity and configurability. Together, they aim to provide experience of an embodied privacy care with varied interactions that are calming and yet actively empowering. The framework provides designers of such care with a basis to refer to, to generate effective tangible tools for privacy management in everyday settings. Through five semi-structured focus groups, we explore the privacy challenges faced by a sample set of 15 older adults (aged 60+) across their cyber-physical-social spaces. The results show conformity to our framework, demonstrating the relevance of the facets of the framework to the design of privacy management tools in everyday UbiComp contexts.


2020 ◽  
Author(s):  
Yong Weixiong ◽  
Kohei Dozono ◽  
Robin Lee ◽  
Alvin Kon Soon Seng ◽  
Fatima tuz Zahra

This paper aims to discuss the standard guidelines of the development process of secure software and will give justification on different types and ways of the software development processes. Additionally, a survey is conducted, the aim of which is to observe user behavior towards software system usage, user attitude in terms of privacy and policy awareness, security and privacy concerns. This is followed by discussion on how to secure software systems in development stage.


Comunicar ◽  
2019 ◽  
Vol 27 (60) ◽  
pp. 61-70
Author(s):  
Yi-Ning Katherine-Chen ◽  
Chia-Ho Ryan-Wen

With the prevalence of smart devices and wireless Internet, privacy has become a pivotal matter in governmental, academic, and technological fields. Our study aims to understand Taiwanese university students’ privacy concerns and protective behaviours in relation to online targeting ads and their habitual smartphone usage. Surveying 810 valid subjects, our results first propose that ad relevance has direct bearing on attention to ads. Second, ad relevance inversely correlates with privacy concerns (i.e. descending personal control and surging corporate power) and protective behaviours (self-filtering and ad evasion). Third and finally, neither privacy concerns nor protective behaviours have a negative bearing on habitual smartphone usage. Opposite to previous research, our study concludes that Taiwanese college students exhibit zero privacy paradox, owing to no signs of privacy concern incited by mobile targeting ads, no evidence of significant protective behaviours, and no decreasing habitual smartphone usage out of privacy concern and protection. Our findings indicate Taiwanese university students’ shaky awareness of potential risks and crises from exposure to vulnerable online privacy management. To deal with this, we suggest educating youths’ understandings of digital jeopardy by experts is urgently needed more so than just technical tutorials of privacy settings. Con la prevalencia de dispositivos inteligentes e Internet inalámbrico, la privacidad se ha convertido en un tema esencial en materias gubernamentales, académicas y tecnológicas. Nuestro estudio se dedica específicamente a entender las preocupaciones de los estudiantes universitarios taiwaneses en privacidad y comportamientos protectores en relación con la publicidad online y el uso habitual de teléfonos inteligentes. Con 810 muestras válidas encuestadas, nuestros resultados revelan que: 1) La relevancia de la publicidad tiene un efecto directo en su atención; 2) Está asociada inversamente a las preocupaciones de privacidad (por ejemplo, control personal descendiente y poder corporativo ascendiente) y comportamientos protectores (evasión de anuncios y autocensura); 3) La preocupación por ña privacidad ni los comportamientos protectores tuvieron efecto negativo en el uso habitual de los smartphones. Nuestro estudio concluye que no hay paradojas de la privacidad halladas en estos jóvenes taiwaneses debido a cambios en su preocupación por la privacidad, generada por la publicidad personalizada en su móvil. Ello evidencia un cambio significativo en los comportamientos protectores. En suma, estos universitarios taiwaneses tienen una débil apreciación de los riesgos potenciales y crisis a los que una vulnerable gestión de la privacidad online les podría exponer. Para abordarlo, una educación que cultive la comprensión de los peligros digitales para los jóvenes es muy recomendable y requiere urgentemente tutoriales técnicos sobre privacidad.


2018 ◽  
Vol 62 (10) ◽  
pp. 1392-1412 ◽  
Author(s):  
Hsuan-Ting Chen

This study builds on the privacy calculus model to revisit the privacy paradox on social media. A two-wave panel data set from Hong Kong and a cross-sectional data set from the United States are used. This study extends the model by incorporating privacy self-efficacy as another privacy-related factor in addition to privacy concerns (i.e., costs) and examines how these factors interact with social capital (i.e., the expected benefit) in influencing different privacy management strategies, including limiting profile visibility, self-disclosure, and friending. This study proposed and found a two-step privacy management strategy in which privacy concerns and privacy self-efficacy prompt users to limit their profile visibility, which in turn enhances their self-disclosing and friending behaviors in both Hong Kong and the United States. Results from the moderated mediation analyses further demonstrate that social capital strengthens the positive–direct effect of privacy self-efficacy on self-disclosure in both places, and it can mitigate the direct effect of privacy concerns on restricting self-disclosure in Hong Kong (the conditional direct effects). Social capital also enhances the indirect effect of privacy self-efficacy on both self-disclosure and friending through limiting profile visibility in Hong Kong (the conditional indirect effects). Implications of the findings are discussed.


2021 ◽  
pp. 1-11
Author(s):  
Rudolf Siegel ◽  
Cornelius J. König ◽  
Leon Porsch

Abstract. Applicants often take great care in deciding where to apply and may refrain from applying or accepting a job offer if they hear about privacy-invading practices at a future workplace. Based on communication privacy management theory, the present work examines how applicants react to different purposes of electronic monitoring. In a scenario study, we found higher privacy concerns and lower organizational attractiveness in a situation with controlling monitoring procedures as compared to supportive monitoring procedures. Furthermore, competitive participants evaluated only noncontrolling monitoring procedures more positively. This demonstrates that organizational attractiveness is harmed by controlling monitoring procedures, and decision makers should keep in mind how electronic monitoring is implemented, used, and may be perceived within and outside the organization.


2018 ◽  
Vol 20 (6) ◽  
pp. 528-544 ◽  
Author(s):  
Ali Padyab ◽  
Anna Ståhlbröst

PurposeThe integration of internet of things (IoT) devices into daily life introduces challenges for the privacy of their users and those who are affected by these devices. This paper explores the factors that affect individual concerns regarding IoT use and how those factors affect the dynamics of privacy management with the presence of an IoT device.Design/methodology/approachFour focus groups of individuals and IoT experts were studied to understand the groups’ privacy concerns. The authors adopted a qualitative research method based on grounded theory to find relevant dimensions of situational privacy concerns in IoT use situations.FindingsThe results revealed that fourteen dimensions of individuals’ privacy concerns regarding the IoT are relevant and can be categorized under four key influential factors: collection, IoT device, collected data storage and use of collected data. The authors also analyzed the focus groups using genres of disclosure theory and explored how privacy concerns affect individual privacy management regulations.Research limitations/implicationsThis paper contributes to how future research can employ genres of disclosure as a theoretical framework to identify situations where privacy violations occur.Practical implicationsThis study can assist service providers and IoT manufacturers in deriving design principles and decreasing concerns by addressing the information that must be communicated to their users.Originality/valueAs opposed to the previous research, which was more inclined to dispositional privacy concerns, this study provides insights into situational privacy concerns when individuals are confronted with the IoT. This study represents the first attempt to investigate the process individuals experience in managing their privacy.


2020 ◽  
Vol 6 (2) ◽  
pp. 205630512092847
Author(s):  
Yu-Hao Lee ◽  
Chien Wen Yuan

Relationship building through social network sites (SNSs) requires privacy disclosure that involves a calculus of potential benefits against privacy risks. Tie formation (e.g., friending, following, or connecting) on SNSs is one of the most significant forms of privacy disclosure that not only communicate one’s willingness to disclose but can also reveal past activity history and invite future interactions. Based on the communication privacy management theory, the current study examines how users consider the privacy calculus and tie-formation affordances of the SNSs to manage ties across multiple SNSs. Using an online survey of 630 Facebook and/or Instagram users, the study revealed that individuals with higher privacy concerns strategically manage their privacy by connecting with different relationship ties through different SNSs as a way to construct sociotechnical boundaries between networks. The findings have implications for understanding privacy management online and provide a potential explanation for the privacy paradox.


Sign in / Sign up

Export Citation Format

Share Document