ABSTRACT
We have witnessed an alarming growth in collecting citizens’ information by businesses and organizations. The more citizens’ information they collect, the greater their ability to utilize this knowledge for their own interests, often at the expense of society members. Despite the efforts made by privacy ecosystem members (such as researchers and regulatory entities) to protect citizens’ privacy against data collectors, the low adoption of Privacy Enhancing Technologies (PETs) by citizens remains concerning. To address these concerns, this vision paper proposes a user-centred approach to develop a tool that assists citizens in adopting PETs effectively. To this end, we plan to (1) understand the factors contributing to low PETs adoption via methods such as focus groups and in-depth interviews, (2) design an interactive tool to support citizens in adopting PETs in a user-friendly manner, and (3) evaluate the tool’s effectiveness through usability testing. The outcome will serve as an interactive tool which first receives the privacy concerns and needs of each user and then provides personalised PET recommendations accordingly.
- Ruba Abu-Salma, M Angela Sasse, Joseph Bonneau, Anastasia Danilova, Alena Naiakshina, and Matthew Smith. 2017. Obstacles to the Adoption of Secure Communication Tools. In Proc. IEEE Symposium on Security and Privacy.Google ScholarCross Ref
- Hala Assal, Stephanie Hurtado, Ahsan Imran, and Sonia Chiasson. 2015. What’s the Deal With Privacy Apps? A Comprehensive Exploration of User Perception and Usability. In Proc. 14th International Conference on Mobile and Ubiquitous Multimedia.Google ScholarDigital Library
- Aura.Com. 2023. How to Protect Your Privacy Online. Retrieved May 20, 2023 from https://www.aura.com/learn/how-to-protect-your-privacy-onlineGoogle Scholar
- Zinaida Benenson, Anna Girard, and Ioannis Krontiris. 2015. User Acceptance Factors for Anonymous Credentials: An Empirical Investigation. In Proc. Workshop on the Economics of Information Security (WEIS).Google Scholar
- Zinaida Benenson, Anna Girard, Ioannis Krontiris, Vassia Liagkou, Kai Rannenberg, and Yannis Stamatiou. 2014. User Acceptance of Privacy-Abcs: An Exploratory Study. In Proc. 2nd Human Aspects of Information Security, Privacy, and Trust.Google ScholarDigital Library
- Vanessa Bracamonte, Sebastian Pape, and Shinsaku Kiyomoto. 2021. Investigating User Intention to Use a Privacy Sensitive Information Detection Tool. Proc. Symposium on Cryptography and Information Security.Google Scholar
- Franziska Brecht, Benjamin Fabian, Steffen Kunz, and Sebastian Mueller. 2011. Are You Willing to Wait Longer for Internet Privacy?Proc. European Conference on Information Systems(ECIS).Google Scholar
- Johana Cabinakova, Christian Zimmermann, and Guenter Mueller. 2016. An Empirical Analysis of Privacy Dashboard Acceptance: The Google Case. Proc. European Conference on Information Systems(ECIS).Google Scholar
- Gregory Conti and Edward Sobiesk. 2007. An Honest Man Has Nothing to Fear: User Perceptions on Web-Based Information Disclosure. In Proc. 3rd Symposium on Usable Privacy and Security.Google ScholarDigital Library
- Kovila PL Coopamootoo. 2020. Usage Patterns of Privacy-Enhancing Technologies. In Proc. ACM SIGSAC Conference on Computer and Communications Security.Google ScholarDigital Library
- Sauvik Das, Cori Faklaris, Jason I Hong, Laura A Dabbish, 2022. The Security & Privacy Acceptance Framework (SPAF). Proc. Foundations and Trends in Privacy and Security.Google ScholarCross Ref
- DataReportal.Com. 2023. Digital Around the World. Retrieved May 25, 2023 from https://datareportal.com/global-digital-overview#: :text=There%20are%205.18%20billion%20internet,higher%20in%20many%20developing%20economies.Google Scholar
- Alexander De Luca, Sauvik Das, Martin Ortlieb, Iulia Ion, and Ben Laurie. 2016. Expert and Non-expert Attitudes Towards (Secure) Instant Messaging.Google Scholar
- Paul Dourish, Rebecca E Grinter, Jessica Delgado De La Flor, and Melissa Joseph. 2004. Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem. Proc. Personal and Ubiquitous Computing.Google Scholar
- ExpressVPN.Com. 2023. Express Virtual Private Network Product. Retrieved May 20, 2023 from https://www.expressvpn.com/Google Scholar
- Brian J Fogg. 2009. A Behavior Model for Persuasive Design. In Proc. 4th International Conference on Persuasive Technology.Google ScholarDigital Library
- Google.Com. 2023. Google Search Engine. Retrieved May 20, 2023 from https://www.google.com/Google Scholar
- David Harborth and Sebastian Pape. 2018. Examining Technology Use Factors of Privacy-Enhancing Technologies: The Role of Perceived Anonymity and Trust. Proc. 24th Americas Conference on Information Systems.Google Scholar
- David Harborth and Sebastian Pape. 2019. How Privacy Concerns and Trust and Risk Beliefs Influence Users’ Intentions to Use Privacy-Enhancing Technologies-the Case of Tor. Proc. 52nd Hawaii International Conference on System Sciences.Google ScholarCross Ref
- David Harborth, Sebastian Pape, and Kai Rannenberg. 2020. Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and Jondonym. Proc. Privacy Enhancing Technologies.Google ScholarCross Ref
- HelpDeskGeek.Com. 2020. How to Improve Your Online Privacy and Security. Retrieved May 20, 2023 from https://helpdeskgeek.com/how-to/how-to-improve-your-online-privacy-and-security/Google Scholar
- HP.Com. 2021. 10 Simple Steps to Take Right Now to Protect Your Privacy Online. Retrieved May 20, 2023 from https://www.hp.com/us-en/shop/tech-takes/how-to-protect-your-privacy-onlineGoogle Scholar
- Predrag Klasnja, Sunny Consolvo, Tanzeem Choudhury, Richard Beckwith, and Jeffrey Hightower. 2009. Exploring Privacy Concerns About Personal Sensing. In Proc. 7th Pervasive Computing.Google ScholarDigital Library
- Spyros Kokolakis. 2017. Privacy Attitudes and Privacy Behaviour: A Review of Current Research on the Privacy Paradox Phenomenon. Proc. Computers & Security.Google ScholarDigital Library
- Ioannis Krontiris, Zinaida Benenson, Anna Girard, Ahmad Sabouri, Kai Rannenberg, and Peter Schoo. 2016. Privacy-Abcs as a Case for Studying the Adoption of Pets by Users and Service Providers. In Proc. 3rd Privacy Technologies and Policy.Google ScholarCross Ref
- Bin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Zhang, Norman Sadeh, Alessandro Acquisti, and Yuvraj Agarwal. 2016. Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. In Proc. 12th Symposium on Usable Privacy and Security (SOUPS).Google Scholar
- M2.Material.Io. 2022. Material Design. Retrieved May 20, 2023 from https://m2.material.io/componentsGoogle Scholar
- Christian Matt and Philipp Peckelsen. 2016. Sweet Idleness, but Why? How Cognitive Factors and Personality Traits Affect Privacy-Protective Behavior. In Proc. 49th Hawaii International Conference on System Sciences (HICSS).Google ScholarDigital Library
- Maryam Mehrnezhad, Kovila Coopamootoo, and Ehsan Toreini. 2022. How Can and Would People Protect From Online Tracking?Proc. Privacy Enhancing Technologies.Google Scholar
- Caroline Lancelot Miltgen and Dominique Peyrat-Guillard. 2014. Cultural and Generational Influences on Privacy Concerns: A Qualitative Study in Seven European Countries. Proc. European Journal of Information Systems.Google ScholarCross Ref
- Moses Namara, Daricia Wilkinson, Kelly Caine, and Bart P Knijnenburg. 2020. Emotional and Practical Considerations Towards the Adoption and Abandonment of VPNs as a Privacy-Enhancing Technology. Proc. Privacy Enhancing Technologies.Google ScholarCross Ref
- NordVPN.Com. 2023. Nord Virtual Private Network Product. Retrieved May 20, 2023 from https://nordvpn.com/Google Scholar
- NPR.Org. 2020. Your Technology Is Tracking You. Take These Steps for Better Online Privacy. Retrieved May 20, 2023 from https://www.npr.org/2020/10/09/922262686/your-technology-is-tracking-you-take-these-steps-for-better-online-privacyGoogle Scholar
- OpenAI.Com. 2023. GhatGPT Chat Bot. Retrieved May 20, 2023 from https://openai.com/blog/chatgptGoogle Scholar
- PCMag.Com. 2023. the Best VPN Services for 2023. Retrieved May 20, 2023 from https://uk.pcmag.com/vpn/138/the-best-vpn-servicesGoogle Scholar
- Joseph Phelps, Glen Nowak, and Elizabeth Ferrell. 2000. Privacy Concerns and Consumer Willingness to Provide Personal Information. Proc. Public Policy & Marketing.Google ScholarCross Ref
- ProtonVPN.Com. 2023. Proton Virtual Private Network Product. Retrieved May 20, 2023 from https://protonvpn.com/Google Scholar
- Erica Racine, Patrick Skeba, Eric PS Baumer, and Andrea Forte. 2020. What Are Pets for Privacy Experts and Non-experts. In Proc. Symposium on Usable Privacy and Security.Google Scholar
- Joseph Reagle and Lorrie Faith Cranor. 1999. The Platform for Privacy Preferences. Proc. ACM Communications.Google ScholarDigital Library
- Elissa M Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, and Michelle L Mazurek. 2020. A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web. Proc. 29th USENIX Security Symposium.Google ScholarDigital Library
- Delphine Reinhardt, Franziska Engelmann, and Matthias Hollick. 2015. Can I Help You Setting Your Privacy? A Survey-Based Exploration of Users’ Attitudes Towards Privacy Suggestions. In Proc. 13th International Conference on Advances in Mobile Computing and Multimedia.Google ScholarDigital Library
- Karen Renaud, Melanie Volkamer, and Arne Renkema-Padmos. 2014. Why Doesn’t Jane Protect Her Privacy?. In Proc. 14th International Symposium om Privacy Enhancing Technologies.Google ScholarCross Ref
- Statista.Com. 2023. Number of Internet and Social Media Users Worldwide as of April 2023. Retrieved May 24, 2023 from https://www.statista.com/statistics/617136/digital-population-worldwide/Google Scholar
- Chrome Web Store. 2023. Extensions. Retrieved May 20, 2023 from https://chrome.google.com/webstore/search/vpnGoogle Scholar
- Peter Story, Daniel Smullen, Yaxing Yao, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, and Florian Schaub. 2021. Awareness, Adoption, and Misconceptions of Web Privacy Tools. Proc. Privacy Enhancing Technologies.Google ScholarCross Ref
- Thorin Klosowski The New York Times. 2023. How to Protect Your Digital Privacy. Retrieved May 20, 2023 from https://www.nytimes.com/guides/privacy-project/how-to-protect-your-digital-privacyGoogle Scholar
- Godwin J Udo. 2001. Privacy and Security Concerns as Major Barriers for E-commerce: A Survey Study. Proc. Information Management & Computer Security.Google Scholar
- Blase Ur, Pedro Giovanni Leon, Lorrie Faith Cranor, Richard Shay, and Yang Wang. 2012. Privacy-Abcs as a Case for Studying the Adoption of Pets by Users and Service Providers. In Proc. 8th Symposium on Usable Privacy and Security (SOUPS).Google Scholar
Index Terms
- Vision: Supporting Citizens in Adopting Privacy Enhancing Technologies
Recommendations
What Makes a Technology Privacy Enhancing? Laypersons’ and Experts’ Descriptions, Uses, and Perceptions of Privacy Enhancing Technologies
Information for a Better World: Normality, Virtuality, Physicality, InclusivityAbstractWhat makes a technology privacy-enhancing? In this study, we construct an explanation grounded in the technologies and practices that people report using to enhance their privacy. We conducted an online survey of privacy experts (i.e., privacy ...
Engaging Citizens and Delivering Services: The Housing Corporation in Trinidad and Tobago
Globally, governments are attempting to transform their societies with the widespread use of information and communication technologies (ICTs). Public agencies consider ICTs as powerful tools to deliver services to citizens and encourage engagement. ...
Privacy-enhancing technologies: approaches and development
In this paper, we discuss privacy threats on the Internet and possible solutions to this problem. Examples of privacy threats in the communication networks are identity disclosure, linking data traffic with identity, location disclosure in connection ...
Comments