A Captology Study on Behavior Model for Persuasive Ubiquitous Technology (original) (raw)

User Perception of Privacy with Ubiquitous Devices

2021

Privacy is important for all individuals in everyday life. With emerging technologies, smartphones with AR, various social networking applications and artificial intelligence driven modes of surveillance, they tend to intrude privacy. This study aimed to explore and discover various concerns related to perception of privacy in this era of ubiquitous technologies. It employed online survey questionnaire to study user perspectives of privacy. Purposive sampling was used to collect data from 60 participants. Inductive thematic analysis was used to analyze data. Our study discovered key themes like attitude towards privacy in public and private spaces, privacy awareness, consent seeking, dilemmas/confusions related to various technologies, impact of attitude and beliefs on individuals’ actions regarding how to protect oneself from invasion of privacy in both public and private spaces. These themes interacted amongst themselves and influenced formation of various actions. They were like ...

A privacy preference model for pervasive computing

Proceedings of the Euro mGov 2005, 2005

Abstract: Widespread acceptance of e-government and m-government (and for that matter pervasive-Government) services will only take place when citizens are satisfied that personal data is stored, transmitted and processed with respect to their privacy. We compare and contrast data protection regimes found around the World and suggest that these have directly influenced the uptake of existing private-sector mobile services. Citizen uptake of e-government services will be encouraged by strong regulatory regimes dedicated to the ...

Survey on Awareness of Privacy Issues in Ubiquitous Environment

It is in human nature to keep certain details intimate. This confidential information, if made public, can result in annoyance, humiliation, and even devastating loss. The latter one holds true for individuals as well as organizations. In the case of ubiquitous environment, system adapts to the context of user’s actions and intentions and the collection of data becomes pervasive. Thus, privacy turns out to be a vital aspect. This study aims to determine privacy awareness among people in ubiquitous environment. For this purpose, a survey was conducted. This survey was based on a questionnaire. The results show that people consider themselves quite aware, but, more concerned with privacy issues in ubiquitous environment. Also, a significant number of people admit to not taking privacy measures. The analysis was carried out on the basis of current status of participants in the university, namely, Undergraduate students, Graduate students, and Faculty members. https://sites.google.com/site/ijcsis/

Threat Awareness–Social Impacts of Privacy Aware Ubiquitous Computing

2007

For P3P (W3C 2002), a privacy description language for websites, there are various implementations available that try to protect the users' privacy based on P3P policies. Even the Internet Explorer provides a small implementation for P3P, hidden in the options menu: A small scale that can be used to edit the amount of privacy protection regarding cookies.

A Research Model for Studying Privacy Concerns Pertaining to Location-Based Services

Proceedings of the 38th Annual Hawaii International Conference on System Sciences, 2005

Location-based services (LBS) are services that take into account the geographic location of a user [1]. With the rapid growth of mobile devices, LBS are expected to spread rapidly. While LBS promise efficiency and effectiveness gains, their use also raises fundamental privacy issues. In a market survey, 24% of the respondents mentioned that they are seriously concerned about the privacy implications of disclosing their location [2]. Thus the focus of this paper is to understand what antecedents determine intentions to use LBS. A research model is developed that incorporates constructs, such as personality traits [3, 4], task and technology characteristics [5, 6], perceived privacy, trust and risk [7-9], and usefulness [10] as antecedents of LBS usage intentions.

Measuring the effect of Users' Privacy Concerns on the Use of Jakarta Smart City Mobile Application (JAKI)

Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)

Jakarta Kini (JAKI) is a super-app developed by Jakarta Smart City that offers a one-stop service to help citizens connect and communicate with the Government. It is undeniable that the use of mobile applications can indeed facilitate people's activities, but on the other hand, it also poses risks and raises concerns in terms of privacy. The purpose of this study is to assess the impact of users' privacy concerns on their tendency to use the JAKI mobile application. To measure the privacy concern, we conduct an online survey of the users of JAKI. The hypothesis and research model were formulated to assess the users' privacy concerns based on the Mobile Users' Information Privacy Concerns (MUIPC) theory, with additional factors, namely prior privacy experience and awareness, as the antecedents. As a result, we found that MUIPC had a significant effect on negatively influencing the intention to use the JAKI application. Our study contributes as a starting point in expl...

UNDERSTANDING THE USE OF LOCATION-BASED SERVICE APPLICATIONS: DO PRIVACY CONCERNS MATTER

The popularization of smartphones has brought about substantial changes in location-based services (LBS). Advances in wireless communication technology have allowed affordable data service fees, and current smartphones are equipped with GPS; as a consequence, LBS applications are emerging as next-generation 'killer apps.' However, the diffusion of LBS has raised privacy concerns due to the potential abuse of location information. This study aims to validate a research model focusing on privacy concerns as moderators of the post-adoptive behaviors associated with LBS applications. Based on risky shift phenomenon research, the study seeks to test the effects of the major variables of UTAUT on LBS usage intention and actual use, as well as examine how these relationships differ according to the level of an individual's privacy concerns. We test the hypotheses using a survey with 234 users of LBS applications. The research findings support the hypotheses regarding the effects of performance expectancy and effort expectancy on LBS usage intention but do not support the hypothesis regarding the effect of social influence. In addition, the causal path from usage intention to actual use was significant. Group comparisons showed that the moderating effect of privacy concerns on performance expectancy and continuous usage intension is stronger in conjunction with low-privacy concerns, as shown in previous LBS research; however, the moderating effect on social influence and usage intention is stronger in conjunction with high privacy concerns. This finding can be explained by the risky shift phenomenon. Implications are discussed regarding the dual roles of privacy concerns in the post-adoptive behaviors of LBS users.

Integrating Social and Economic Models of Responding to Privacy Messages in Mobile Computing: A Research Agenda

2015

Mobile computing has provided technology to an unprecedented user base and has created a market for applications that is expected to reach $77 billion by 2017, involving over 268 billion downloads. Nearly every download involves privacy messages that request permissions to access information such as contact, calendar, and location information. Recent cases have revealed that users are often surprised when they discover the permissions they have granted, which implies that not everyone reads them carefully. In this paper we propose a research agenda focusing on the decisions that users make about those permissions requests. Several theories provide promising antecedents to explain acceptance of privacy permissions. Nine propositions are presented, with three from each research bases from social, economic, and cognitive perspectives. The research agenda thus is a combination hybrid social/economic/cognitive approach. The agenda complements extant research that has focused on privacy c...

Keeping ubiquitous computing to yourself: A practical model for user control of privacy

International Journal of Human-Computer Studies, 2005

As with all the major advances in information and communication technology, ubiquitous computing (ubicomp) introduces new risks to individual privacy. Our analysis of privacy protection in ubicomp has identified four layers through which users must navigate: the regulatory regime they are currently in, the type of ubicomp service required, the type of data being disclosed, and their personal privacy policy. We illustrate and compare the protection afforded by regulation and by some major models for user control of privacy. We identify the shortcomings of each and propose a model which allows user control of privacy levels in a ubicomp environment. Our model balances the user's privacy preferences against the applicable privacy regulations and incorporates five types of user controlled "noise" to protect location privacy by introducing ambiguities. We also incorporate an economics-based approach to assist users in balancing the trade-offs between giving up privacy and receiving ubicomp services. We conclude with a scenario and heuristic evaluation which suggests that regulation can have both positive and negative influences on privacy interfaces in ubicomp and that social translucence is an important heuristic for ubicomp privacy interface functionality.