2,597
views
0
recommends
+1 Recommend
1 collections
    4
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Perspectives on privacy in the use of online systems

      proceedings-article
      1 , 1
      Proceedings of the 30th International BCS Human Computer Interaction Conference (HCI)
      Fusion
      11 - 15 July 2016
      Privacy, privacy paradox, user survey, online behaviour, mental models, human-computer interaction
      Bookmark

            Abstract

            Human-Computer Interaction looks to better understand the relationship between people and computers. Our work considers this relationship in the context of privacy and the privacy expectations users have when using online systems. While many surveys suggest the public care about this subject, users often act in a manner perceived contrary to their claims; a notion termed the ‘Privacy Paradox’. However, research suggests privacy is inherently subjective and contextual, leading us to question: do users actually define ‘ private online behaviour ’ in the samemanner as thosewho study the topic? Although our exploratory survey found a general intersection between participants’ perceptions and those in existing literature, opinions differed in several key areas. For example, we found users often conceptualise protection in less-technical terms and are prone to conflating privacy and security. We believe that when we expand our analyses to the general public, we will see an even greater disparity between privacy perceptions. Through this research we look to inform the development of systems and privacy-protective tools that users can actually appreciate.

            Content

            Author and article information

            Contributors
            Conference
            July 2016
            July 2016
            : 1-3
            Affiliations
            [0001]Department of Computer Science

            University of Oxford, Oxford, UK
            Article
            10.14236/ewic/HCI2016.87
            2d4a87f2-5e01-4858-9606-a3bc4b3d0760
            © Williams et al. Published by BCS Learning and Development Ltd. Proceedings of British HCI 2016 Conference Fusion, Bournemouth, UK

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of the 30th International BCS Human Computer Interaction Conference
            HCI
            30
            Bournemouth University, Poole, UK
            11 - 15 July 2016
            Electronic Workshops in Computing (eWiC)
            Fusion
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI2016.87
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Privacy,privacy paradox,user survey,online behaviour,mental models,human-computer interaction

            REFERENCES

            1. 2013 MultiNet: Reducing interaction overhead in domestic wireless networks. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 1569 1578

            2. 2007 Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology 58 2 157 165

            3. 2013 Your browsing behavior for a big mac: Economics of personal information online. In Proceedings of the 22nd International Conference on World Wide Web. 189 200

            4. 2009 Can cognitive science help us make information risk more tangible online? In Proceedings of the WebSci’09

            5. 2011 Computer security. 3rd ed. John Wiley & Sons

            6. 2016 The dangers of our digital lives. Technical report. https://www.hidemyass.com/documents/hma-survey-summary-2-5-16.pdf

            7. 2004 Privacy as contextual integrity. Washington Law Review 79 1 119 158

            8. 2008 Privacy risk perceptions and privacy protection strategies. Policies and Research in Identity Management in The International Federation for Information Processing 261 121 138

            9. 2013 Anonymity, privacy, and security online. Pew Internet & American Life Project

            10. 2008 Understanding privacy Harvard University Press

            11. 2003 The paradoxical value of privacy. In Proceedings of the 2nd Annual Workshop on Economics and Information Security

            12. 2015 The tradeoff fallacy. Technical report Annenberg School for Communication University of Pennsylvania https://www.asc.upenn.edu/sites/default/files/TradeoffFallacy_1.pdf

            Comments

            Comment on this article