Skip to main content

Privacy and User Trust in Context-Aware Systems

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8538))

Abstract

Context-aware systems (CAS) that collect personal information are a general trend. This leads to several privacy considerations, which we outline in this paper. We present as use-case the SWELL system, which collects information from various contextual sensors to provide support for well-being at work. We address privacy from two perspectives: 1) the development point of view, in which we describe how to apply ‘privacy by design’, and 2) a user study, in which we found that providing detailed information on data collection and privacy by design had a positive effect on trust in our CAS. We also found that the attitude towards using our CAS was related to personal motivation, and not related to perceived privacy and trust in our system. This may stress the importance of implementing privacy by design to protect the privacy of the user.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abowd, G.D., Dey, A.K.: Towards a better understanding of context and context-awareness. In: Gellersen, H.-W. (ed.) HUC 1999. LNCS, vol. 1707, pp. 304–307. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  2. Van De Garde-Perik, E., Markopoulos, P., De Ruyter, B., Eggen, B., Ijsselsteijn, W.: Investigating privacy attitudes and behavior in relation to personalization. Social Science Computer Review 26(1), 20–43 (2008)

    Article  Google Scholar 

  3. Rubinstein, I.: Big Data: The End of Privacy or a New Beginning? NYU School of Law, Public Law Research Paper (12-56) (2012)

    Google Scholar 

  4. Jiang, X., Hong, J.I., Landay, J.A.: Approximate information flows: Socially-based modeling of privacy in ubiquitous computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 176–193. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  5. Shin, D.H.: The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers 22(5) (2010)

    Google Scholar 

  6. Smith, H.J., Dinev, T., Xu, H.: Information privacy research: an interdisciplinary review. . MIS Quarterly 35(4), 989–1016 (2011)

    Google Scholar 

  7. Barkhuus, L., Dey, A.K.: Location-Based Services for Mobile Telephony: a Study of Users’ Privacy Concerns. In: INTERACT, vol. 3, pp. 702–712 (2003)

    Google Scholar 

  8. Koldijk, S.: Automatic recognition of context and stress to support knowledge workers. In: Proceedings of ECCE 2012, Edinburgh, Scotland, August 28-31 (2012)

    Google Scholar 

  9. Wright, D.: The state of the art in privacy impact assessment. . Computer Law & Security Review 28(1), 54–61 (2012)

    Article  Google Scholar 

  10. Cavoukian, A.: Operationalizing Privacy by Design: A Guide to Implementing Strong Privacy Practices. Ontario: Information and Privacy Commissioner of Ontario (2012)

    Google Scholar 

  11. Hoepman, J.H.: Privacy Design Strategies. arXiv preprint arXiv:1210.6621 (2012)

    Google Scholar 

  12. Bodea, G., Huijboom, N., Kazemier, J., Koldijk, S., Koot, G., de Munck, S., Siljee, J.: Context-aware services: privacy concerns and strategies. TNO report (2013)

    Google Scholar 

  13. Compañó, R., Lusoli, W.: The Policy Maker’s Anguish: Regulating Personal Data Behavior Between Paradoxes and Dilemmas. In: Economics of Information Security and Privacy, pp. 169–185. Springer US (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Koldijk, S., Koot, G., Neerincx, M., Kraaij, W. (2014). Privacy and User Trust in Context-Aware Systems. In: Dimitrova, V., Kuflik, T., Chin, D., Ricci, F., Dolog, P., Houben, GJ. (eds) User Modeling, Adaptation, and Personalization. UMAP 2014. Lecture Notes in Computer Science, vol 8538. Springer, Cham. https://doi.org/10.1007/978-3-319-08786-3_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08786-3_12

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08785-6

  • Online ISBN: 978-3-319-08786-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics