43 research outputs found

    User perceptions of privacy risks regarding location-based services

    Get PDF
    Location-based Services (LBS) are widespread nowadays and with the rise of smartphones and other mobile-devices they are expected to be used in ever more applications by ever more users. There are clear opportunities this technology provides, nevertheless there are always privacy concerns when it comes to the identification of an individual’s location. This paper provides an overview of user privacy risks regarding LBS. Based on a privacy taxonomy, it shows the gaps that exist in the literature, which could be of interest in further research to gain an even better understanding of privacy concerns of users and as a result their willingness to use LBS

    Using P3P in a web services-based context-aware application platform

    Get PDF
    This paper describes a proposal for a privacy control architecture to be applied in the WASP project. The WASP project aims to develop a context-aware service platform on top of 3G networks, using web services technology. The proposed privacy control architecture is based on the P3P privacy policy description standard defined by W3C. The paper identifies extensions to P3P and its associated preference expression language APPEL that are needed to operate in a context-aware environment

    Location tracking: views from the older adult population

    Get PDF
    Background: there has been a rise in the use of social media applications that allow people to see where friends, family and nearby services are located. Yet while uptake has been high for younger people, adoption by older adults is relatively slow, despite the potential health and social benefits. In this paper, we explore the barriers to acceptance of location-based services (LBS) in a community of older adults. Objective: to understand attitudes to LBS technologies in older adults. Methods: eighty-six older adults used LBS for 1-week and completed pre- and post-use questionnaires. Twenty available volunteers from the first study also completed in-depth interviews after their experience using the LBS technology. Results: the pre-use questionnaire identified perceptions of usefulness, individual privacy and visibility as predictive of intentions to use a location-tracking service. Post-use, perceived risk was the only factor to predict intention to use LBS. Interviews with participants revealed that LBS was primarily seen as an assistive technology and that issues of trust and privacy were important. Conclusion: the findings from this study suggest older adults struggle to see the benefits of LBS and have a number of privacy concerns likely to inhibit future uptake of location-tracking services and devices

    THE SELF-EXPRESSIVENESS OF FOOTPRINTS: UNDERSTANDING THE DRIVERS OF CHECK-IN

    Get PDF
    Drawing from the Dramaturgical theory (Goffman, 1959), present study contributes to propose a conceptual model that illuminate the underlying psychological mechanism which faciliate individual’s check-in behavior. Goffman (1959) posits that “impression management” impacts the self presentation of individuals, indicating that individuals adopt deliberate decisions to reveal particular aspects of the self. Past studies emphasize on the privacy issue that impacts location sharing (Barkhuus et al., 2008), while present study highlights that socially driven factors portrays a more comprehensive story that disclose the antecedenting drivers of check-in.This contributes in providing a framework to the previous sporadic studies concerning social motives in check-in literatures. Specifically, the findings support the view that individual’s public self-consciousness and peer influence, compelled by desirable self-presentation leads to involvment in check-in. This finding extends past researches in identifying two dimensions that drive check-in involvement. Furthermore, the results of this study confirm that driven by psychological proximity, a positive relationship is created between check-in involvement and place attachment, which in turn faciliates continual check-in behavioral intentions and the advocation of check-in

    Sharing, privacy and trust issues for photo collections

    Get PDF
    Digital libraries are quickly being adopted by the masses. Technological developments now allow community groups, clubs, and even ordinary individuals to create their own, publicly accessible collections. However, users may not be fully aware of the potential privacy implications of submitting their documents to a digital library, and may hold misconceptions of the technological support for preserving their privacy. We present results from 18 autoethnographic investigations and 19 observations / interviews into privacy issues that arise when people make their personal photo collections available online. The Adams' privacy model is used to discuss the findings according to information receiver, information sensitivity, and information usage. Further issues of trust and ad hoc poorly supported protection strategies are presented. Ultimately while photographic data is potentially highly sensitive, the privacy risks are often hidden and the protection mechanisms are limited

    Implanting Life-Cycle Privacy Policies in a Context Database

    Get PDF
    Ambient intelligence (AmI) environments continuously monitor surrounding individuals' context (e.g., location, activity, etc.) to make existing applications smarter, i.e., make decision without requiring user interaction. Such AmI smartness ability is tightly coupled to quantity and quality of the available (past and present) context. However, context is often linked to an individual (e.g., location of a given person) and as such falls under privacy directives. The goal of this paper is to enable the difficult wedding of privacy (automatically fulfilling users' privacy whishes) and smartness in the AmI. interestingly, privacy requirements in the AmI are different from traditional environments, where systems usually manage durable data (e.g., medical or banking information), collected and updated trustfully either by the donor herself, her doctor, or an employee of her bank. Therefore, proper information disclosure to third parties constitutes a major privacy concern in the traditional studies
    corecore