skip to main content
10.1145/3617072.3617105acmotherconferencesArticle/Chapter ViewAbstractPublication PageseurousecConference Proceedingsconference-collections
research-article

Vision: Supporting Citizens in Adopting Privacy Enhancing Technologies

Published:16 October 2023Publication History

ABSTRACT

We have witnessed an alarming growth in collecting citizens’ information by businesses and organizations. The more citizens’ information they collect, the greater their ability to utilize this knowledge for their own interests, often at the expense of society members. Despite the efforts made by privacy ecosystem members (such as researchers and regulatory entities) to protect citizens’ privacy against data collectors, the low adoption of Privacy Enhancing Technologies (PETs) by citizens remains concerning. To address these concerns, this vision paper proposes a user-centred approach to develop a tool that assists citizens in adopting PETs effectively. To this end, we plan to (1) understand the factors contributing to low PETs adoption via methods such as focus groups and in-depth interviews, (2) design an interactive tool to support citizens in adopting PETs in a user-friendly manner, and (3) evaluate the tool’s effectiveness through usability testing. The outcome will serve as an interactive tool which first receives the privacy concerns and needs of each user and then provides personalised PET recommendations accordingly.

References

  1. Ruba Abu-Salma, M Angela Sasse, Joseph Bonneau, Anastasia Danilova, Alena Naiakshina, and Matthew Smith. 2017. Obstacles to the Adoption of Secure Communication Tools. In Proc. IEEE Symposium on Security and Privacy.Google ScholarGoogle ScholarCross RefCross Ref
  2. Hala Assal, Stephanie Hurtado, Ahsan Imran, and Sonia Chiasson. 2015. What’s the Deal With Privacy Apps? A Comprehensive Exploration of User Perception and Usability. In Proc. 14th International Conference on Mobile and Ubiquitous Multimedia.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Aura.Com. 2023. How to Protect Your Privacy Online. Retrieved May 20, 2023 from https://www.aura.com/learn/how-to-protect-your-privacy-onlineGoogle ScholarGoogle Scholar
  4. Zinaida Benenson, Anna Girard, and Ioannis Krontiris. 2015. User Acceptance Factors for Anonymous Credentials: An Empirical Investigation. In Proc. Workshop on the Economics of Information Security (WEIS).Google ScholarGoogle Scholar
  5. Zinaida Benenson, Anna Girard, Ioannis Krontiris, Vassia Liagkou, Kai Rannenberg, and Yannis Stamatiou. 2014. User Acceptance of Privacy-Abcs: An Exploratory Study. In Proc. 2nd Human Aspects of Information Security, Privacy, and Trust.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Vanessa Bracamonte, Sebastian Pape, and Shinsaku Kiyomoto. 2021. Investigating User Intention to Use a Privacy Sensitive Information Detection Tool. Proc. Symposium on Cryptography and Information Security.Google ScholarGoogle Scholar
  7. Franziska Brecht, Benjamin Fabian, Steffen Kunz, and Sebastian Mueller. 2011. Are You Willing to Wait Longer for Internet Privacy?Proc. European Conference on Information Systems(ECIS).Google ScholarGoogle Scholar
  8. Johana Cabinakova, Christian Zimmermann, and Guenter Mueller. 2016. An Empirical Analysis of Privacy Dashboard Acceptance: The Google Case. Proc. European Conference on Information Systems(ECIS).Google ScholarGoogle Scholar
  9. Gregory Conti and Edward Sobiesk. 2007. An Honest Man Has Nothing to Fear: User Perceptions on Web-Based Information Disclosure. In Proc. 3rd Symposium on Usable Privacy and Security.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Kovila PL Coopamootoo. 2020. Usage Patterns of Privacy-Enhancing Technologies. In Proc. ACM SIGSAC Conference on Computer and Communications Security.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Sauvik Das, Cori Faklaris, Jason I Hong, Laura A Dabbish, 2022. The Security & Privacy Acceptance Framework (SPAF). Proc. Foundations and Trends in Privacy and Security.Google ScholarGoogle ScholarCross RefCross Ref
  12. DataReportal.Com. 2023. Digital Around the World. Retrieved May 25, 2023 from https://datareportal.com/global-digital-overview#: :text=There%20are%205.18%20billion%20internet,higher%20in%20many%20developing%20economies.Google ScholarGoogle Scholar
  13. Alexander De Luca, Sauvik Das, Martin Ortlieb, Iulia Ion, and Ben Laurie. 2016. Expert and Non-expert Attitudes Towards (Secure) Instant Messaging.Google ScholarGoogle Scholar
  14. Paul Dourish, Rebecca E Grinter, Jessica Delgado De La Flor, and Melissa Joseph. 2004. Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem. Proc. Personal and Ubiquitous Computing.Google ScholarGoogle Scholar
  15. ExpressVPN.Com. 2023. Express Virtual Private Network Product. Retrieved May 20, 2023 from https://www.expressvpn.com/Google ScholarGoogle Scholar
  16. Brian J Fogg. 2009. A Behavior Model for Persuasive Design. In Proc. 4th International Conference on Persuasive Technology.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Google.Com. 2023. Google Search Engine. Retrieved May 20, 2023 from https://www.google.com/Google ScholarGoogle Scholar
  18. David Harborth and Sebastian Pape. 2018. Examining Technology Use Factors of Privacy-Enhancing Technologies: The Role of Perceived Anonymity and Trust. Proc. 24th Americas Conference on Information Systems.Google ScholarGoogle Scholar
  19. David Harborth and Sebastian Pape. 2019. How Privacy Concerns and Trust and Risk Beliefs Influence Users’ Intentions to Use Privacy-Enhancing Technologies-the Case of Tor. Proc. 52nd Hawaii International Conference on System Sciences.Google ScholarGoogle ScholarCross RefCross Ref
  20. David Harborth, Sebastian Pape, and Kai Rannenberg. 2020. Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and Jondonym. Proc. Privacy Enhancing Technologies.Google ScholarGoogle ScholarCross RefCross Ref
  21. HelpDeskGeek.Com. 2020. How to Improve Your Online Privacy and Security. Retrieved May 20, 2023 from https://helpdeskgeek.com/how-to/how-to-improve-your-online-privacy-and-security/Google ScholarGoogle Scholar
  22. HP.Com. 2021. 10 Simple Steps to Take Right Now to Protect Your Privacy Online. Retrieved May 20, 2023 from https://www.hp.com/us-en/shop/tech-takes/how-to-protect-your-privacy-onlineGoogle ScholarGoogle Scholar
  23. Predrag Klasnja, Sunny Consolvo, Tanzeem Choudhury, Richard Beckwith, and Jeffrey Hightower. 2009. Exploring Privacy Concerns About Personal Sensing. In Proc. 7th Pervasive Computing.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Spyros Kokolakis. 2017. Privacy Attitudes and Privacy Behaviour: A Review of Current Research on the Privacy Paradox Phenomenon. Proc. Computers & Security.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Ioannis Krontiris, Zinaida Benenson, Anna Girard, Ahmad Sabouri, Kai Rannenberg, and Peter Schoo. 2016. Privacy-Abcs as a Case for Studying the Adoption of Pets by Users and Service Providers. In Proc. 3rd Privacy Technologies and Policy.Google ScholarGoogle ScholarCross RefCross Ref
  26. Bin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Zhang, Norman Sadeh, Alessandro Acquisti, and Yuvraj Agarwal. 2016. Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. In Proc. 12th Symposium on Usable Privacy and Security (SOUPS).Google ScholarGoogle Scholar
  27. M2.Material.Io. 2022. Material Design. Retrieved May 20, 2023 from https://m2.material.io/componentsGoogle ScholarGoogle Scholar
  28. Christian Matt and Philipp Peckelsen. 2016. Sweet Idleness, but Why? How Cognitive Factors and Personality Traits Affect Privacy-Protective Behavior. In Proc. 49th Hawaii International Conference on System Sciences (HICSS).Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Maryam Mehrnezhad, Kovila Coopamootoo, and Ehsan Toreini. 2022. How Can and Would People Protect From Online Tracking?Proc. Privacy Enhancing Technologies.Google ScholarGoogle Scholar
  30. Caroline Lancelot Miltgen and Dominique Peyrat-Guillard. 2014. Cultural and Generational Influences on Privacy Concerns: A Qualitative Study in Seven European Countries. Proc. European Journal of Information Systems.Google ScholarGoogle ScholarCross RefCross Ref
  31. Moses Namara, Daricia Wilkinson, Kelly Caine, and Bart P Knijnenburg. 2020. Emotional and Practical Considerations Towards the Adoption and Abandonment of VPNs as a Privacy-Enhancing Technology. Proc. Privacy Enhancing Technologies.Google ScholarGoogle ScholarCross RefCross Ref
  32. NordVPN.Com. 2023. Nord Virtual Private Network Product. Retrieved May 20, 2023 from https://nordvpn.com/Google ScholarGoogle Scholar
  33. NPR.Org. 2020. Your Technology Is Tracking You. Take These Steps for Better Online Privacy. Retrieved May 20, 2023 from https://www.npr.org/2020/10/09/922262686/your-technology-is-tracking-you-take-these-steps-for-better-online-privacyGoogle ScholarGoogle Scholar
  34. OpenAI.Com. 2023. GhatGPT Chat Bot. Retrieved May 20, 2023 from https://openai.com/blog/chatgptGoogle ScholarGoogle Scholar
  35. PCMag.Com. 2023. the Best VPN Services for 2023. Retrieved May 20, 2023 from https://uk.pcmag.com/vpn/138/the-best-vpn-servicesGoogle ScholarGoogle Scholar
  36. Joseph Phelps, Glen Nowak, and Elizabeth Ferrell. 2000. Privacy Concerns and Consumer Willingness to Provide Personal Information. Proc. Public Policy & Marketing.Google ScholarGoogle ScholarCross RefCross Ref
  37. ProtonVPN.Com. 2023. Proton Virtual Private Network Product. Retrieved May 20, 2023 from https://protonvpn.com/Google ScholarGoogle Scholar
  38. Erica Racine, Patrick Skeba, Eric PS Baumer, and Andrea Forte. 2020. What Are Pets for Privacy Experts and Non-experts. In Proc. Symposium on Usable Privacy and Security.Google ScholarGoogle Scholar
  39. Joseph Reagle and Lorrie Faith Cranor. 1999. The Platform for Privacy Preferences. Proc. ACM Communications.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Elissa M Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, and Michelle L Mazurek. 2020. A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web. Proc. 29th USENIX Security Symposium.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Delphine Reinhardt, Franziska Engelmann, and Matthias Hollick. 2015. Can I Help You Setting Your Privacy? A Survey-Based Exploration of Users’ Attitudes Towards Privacy Suggestions. In Proc. 13th International Conference on Advances in Mobile Computing and Multimedia.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Karen Renaud, Melanie Volkamer, and Arne Renkema-Padmos. 2014. Why Doesn’t Jane Protect Her Privacy?. In Proc. 14th International Symposium om Privacy Enhancing Technologies.Google ScholarGoogle ScholarCross RefCross Ref
  43. Statista.Com. 2023. Number of Internet and Social Media Users Worldwide as of April 2023. Retrieved May 24, 2023 from https://www.statista.com/statistics/617136/digital-population-worldwide/Google ScholarGoogle Scholar
  44. Chrome Web Store. 2023. Extensions. Retrieved May 20, 2023 from https://chrome.google.com/webstore/search/vpnGoogle ScholarGoogle Scholar
  45. Peter Story, Daniel Smullen, Yaxing Yao, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, and Florian Schaub. 2021. Awareness, Adoption, and Misconceptions of Web Privacy Tools. Proc. Privacy Enhancing Technologies.Google ScholarGoogle ScholarCross RefCross Ref
  46. Thorin Klosowski The New York Times. 2023. How to Protect Your Digital Privacy. Retrieved May 20, 2023 from https://www.nytimes.com/guides/privacy-project/how-to-protect-your-digital-privacyGoogle ScholarGoogle Scholar
  47. Godwin J Udo. 2001. Privacy and Security Concerns as Major Barriers for E-commerce: A Survey Study. Proc. Information Management & Computer Security.Google ScholarGoogle Scholar
  48. Blase Ur, Pedro Giovanni Leon, Lorrie Faith Cranor, Richard Shay, and Yang Wang. 2012. Privacy-Abcs as a Case for Studying the Adoption of Pets by Users and Service Providers. In Proc. 8th Symposium on Usable Privacy and Security (SOUPS).Google ScholarGoogle Scholar

Index Terms

  1. Vision: Supporting Citizens in Adopting Privacy Enhancing Technologies

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        EuroUSEC '23: Proceedings of the 2023 European Symposium on Usable Security
        October 2023
        364 pages
        ISBN:9798400708145
        DOI:10.1145/3617072

        Copyright © 2023 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 16 October 2023

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited
      • Article Metrics

        • Downloads (Last 12 months)50
        • Downloads (Last 6 weeks)7

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format