17 research outputs found

    Privacy Issues in the Era of Ubiquitous Commerce

    Get PDF
    The vision of ubiquitous commerce (u-commerce) is realized through the convergence of electronic, mobile, television, voice and silent commerce applications. The ubiquity, universality, uniqueness, and unison of u-commerce will provide two principal benefits for individual users and companies: increased convenience as well as more personalized and customized services. However, u-commerce will also bring new issues such as a greater degree of privacy concerns that will impact individual users, companies, and the society at large. This paper proposes and elaborates on a conceptual framework for privacy in the u-commerce era. It combines Lessig’s macro-level perspective – the four-factor model of privacy – with Adam’s micro-level perspective – the perceived privacy factors model. Using this framework, privacy issues related to ucommerce are discussed and future research directions are presented

    Security and Online learning: to protect or prohibit

    Get PDF
    The rapid development of online learning is opening up many new learning opportunities. Yet, with this increased potential come a myriad of risks. Usable security systems are essential as poor usability in security can result in excluding intended users while allowing sensitive data to be released to unacceptable recipients. This chapter presents findings concerned with usability for two security issues: authentication mechanisms and privacy. Usability issues such as memorability, feedback, guidance, context of use and concepts of information ownership are reviewed within various environments. This chapter also reviews the roots of these usability difficulties in the culture clash between the non-user-oriented perspective of security and the information exchange culture of the education domain. Finally an account is provided of how future systems can be developed which maintain security and yet are still usable

    Distilling Privacy Requirements for Mobile Applications

    Get PDF
    As mobile computing applications have become commonplace, it is increasingly important for them to address end-users’ privacy requirements. Privacy requirements depend on a number of contextual socio-cultural factors to which mobility adds another level of contextual variation. However, traditional requirements elicitation methods do not sufficiently account for contextual factors and therefore cannot be used effectively to represent and analyse the privacy requirements of mobile end users. On the other hand, methods that do investigate contextual factors tend to produce data that does not lend itself to the process of requirements extraction. To address this problem we have developed a Privacy Requirements Distillation approach that employs a problem analysis framework to extract and refine privacy requirements for mobile applications from raw data gathered through empirical studies involving end users. Our approach introduces privacy facets that capture patterns of privacy concerns which are matched against the raw data. We demonstrate and evaluate our approach using qualitative data from an empirical study of a mobile social networking application

    Online privacy issues: Awareness, attitudes, and perceptions amongst internet users in Egypt

    Get PDF
    This study gauges the level of awareness, attitudes towards, and perceptions of online privacy policies for Internet users in Egypt. It examines how demographics as in age, gender, and education may affect the level of Internet users’awareness, attitudes, and perceptions of online privacy issues. Further, it surveys what personal information Internet users in Egypt perceive as private and accept to share with web providers, search engines or third parties. The theory of Communication Privacy Management (CPM), which was developed by Sandra Petronio, poised that Internet users choose and manage the usage of privacy policies and rules based on their cultural values, gender differences, motivations, risks and related impact. This proposition is very important for this research since it will assist in assessing the level of users’ awareness, attitudes towards, and perceptions of online privacy policies against different variables such as gender, age, and education differences

    Taming the wolf in sheep's clothing: Privacy in multimedia communications

    Get PDF
    When ubiquitous multimedia technology is introduced in an organization, the privacy implications of that technology are rarely addressed. Users usually extend the trust they have in an organization to the technology it employs. This paper reports results from interviews with 24 Internet Engineering Task Force (IETF) attendees whose presentations or contributions to IETF sessions were transmitted on the multicast backbone (Mbone). Due to a high level of trust in the organization, these users had few initial concerns about the privacy implications of this technology. However, interviewees' trust relied on inaccurate assumptions, since the interviews revealed a number of potential and actual invasions of privacy in transmission, recording and editing of multicast data. Previous research found that users who experience an unexpected invasion of their privacy are not only likely to reject the technology that afforded the invasion, but lose trust in the organization that introduced it [2,3]. We discuss a number of mechanisms and policies for protecting users' privacy in this particular application, and propose a strategy for introducing networked multimedia technology in general

    Awareness of Cellular E911 and its Relationship to Perceptions of Privacy Among University Students, Faculty and Staff

    Get PDF
    This study describes a survey of the students, faculty, and staff of the University of North Carolina at Chapel Hill regarding awareness of E911 and LBS technologies on cellular phones and how this awareness relates to perceptions of privacy. Responses to the survey showed generally low awareness of E911 and LBS technologies, but also revealed unexpected privacy distinctions. Some respondents viewed their cellular phones as private, but not the conversations or text messages. Other respondents were just the opposite, viewing their conversations and text message as private, but not the phones. Though LBS can broadcast a cellular phone's location anytime the phone is powered on, even those users that appear to control their privacy the most tend to leave their phones on for long periods of time, indicating either a lack of awareness regarding location privacy, or a lack of concern
    corecore