Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3290607.3312972acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
abstract

A/P(rivacy) Testing: Assessing Applications for Social and Institutional Privacy

Published: 02 May 2019 Publication History

Abstract

The way information systems are designed has a crucial effect on users' privacy, but users are rarely involved in Privacy-by-Design processes. To bridge this gap, we investigate how User-Centered Design (UCD) methods can be used to improve the privacy of systems' designs. We present the process of developing A/P(rivacy) Testing, a platform that allows designers to compare several privacy designs alternatives, eliciting end-users' privacy perceptions of a tested system or a feature (Figure 1). We describe three online experiments, with 959 participants, in which we created and validated the reliability of a scale for Users' Perceived Systems' Privacy (UPSP), and used it to compare between privacy designs alternatives by using scenarios and different variants. We show that A/B testing is applicable for privacy purposes and that our scale is differentiating between designs that perceived as legitimate and designs that may violate users' expectations.

References

[1]
Awad, N. and Krishnan, M. 2006. The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. Mis Quarterly. 30, 1 (2006), 13--28.
[2]
Ayalon, O. and Toch, E. 2018. Crowdsourcing Privacy Design Critique?: An Empirical Evaluation of Framing Effects. Hawaii International Conference on System Sciences 2018. (2018), 4752--4761.
[3]
Balebako, R., Cranor, L. and Mellon, C. 2014. Improving App Privacy?: Nudging App Developers to Protect User Privacy. (2014), 55--58.
[4]
Boyd, D. 2010. Making Sense of Privacy and Publicity. South by Southwest (SXSW 2010)--transcription of the talk.
[5]
Cavoukian, A. 2009. Privacy by design: The 7 foundational principles. Information and Privacy Commissioner of Ontario, Canada.
[6]
Dinev, T., Xu, H., Smith, J.H. and Hart, P. 2013. Information privacy and correlates: An empirical attempt to bridge and distinguish privacy related concepts. European Journal of Information Systems. 22, 3 (2013), 295--316.
[7]
Featherman, M.S. and Pavlou, P.A. 2003. Predicting e-services adoption: A perceived risk facets perspective. International Journal of Human Computer Studies. 59, 4 (2003), 451--474.
[8]
Felt, A.P., Egelman, S. and Wagner, D. 2012. I've got 99 problems, but vibration ain't one. Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '12. (2012), 33.
[9]
GDPR: https://gdpr-info.eu/art-25-gdpr/. Accessed: 2018-01--16.
[10]
Hadar, I., Hasson, T., Ayalon, O., Toch, E., Birnhack, M., Sherman, S. and Balissa, A. 2017. Privacy by designers: software developers' privacy mindset. Empirical Software Engineering. (2017), 1--31.
[11]
Hong, W. 2013. RESEARCH NOTE INTERNET PRIVACY CONCERNS?: AN INTEGRATED Example Items from Existing IPC Instruments. 37, 1 (2013), 1--3.
[12]
Koops, B.J. and Leenes, R. 2014. Privacy regulation cannot be hardcoded. A critical comment on the "privacy by design" provision in data-protection law. International Review of Law, Computers and Technology. 28, 2 (2014), 159--171.
[13]
Krasnova, H., Günther, O., Spiekermann, S. and Koroleva, K. 2009. Privacy concerns and identity in online social networks. Identity in the Information Society. 2, 1 (2009), 39--63.
[14]
Law, E.L.-C., Roto, V., Hassenzahl, M., Vermeeren, A.P.O.S. and Kort, J. 2009. Understanding, scoping and defining user experience. Proceedings of the 27th international conference on Human factors in computing systems - CHI 09. June 2014 (2009), 719.
[15]
Nissenbaum, H. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press.
[16]
Quinn, K. and Epstein, D. 2018. #MyPrivacy: How Users Think About Social Media Privacy. Proceedings of the 9th International Conference on Social Media and Society - SMSociety '18. (2018), 360--364.
[17]
Raynes-Goldie, K. 2010. Aliases, creeping, and wall cleaning: Understanding privacy in the age of Facebook. First Monday. 15, 1 (2010).
[18]
Steinbart, P., Keith, M.J. and Babb, J.S. Measuring Privacy Concerns and the Right to Be Forgotten.
[19]
Stutzman, F. 2006. An evaluation of identity-sharing behavior in social network communities. International Digital and Media Arts Journal. 3, 1 (2006), 10--18.
[20]
Xu, H. 2007. The Effects of Self-Construal and Perceived Control on Privacy Concerns. Twenty Eighth International Conference on Information Systems. 6, 1 (2007), 1--14.
[21]
Young, A.L. and Quan-Haase, A. 2013. PRIVACY PROTECTION STRATEGIES ON FACEBOOK: The Internet privacy paradox revisited. Information Communication and Society. 16, 4 (2013), 479--500.

Cited By

View all
  • (2023)Aligning Crowdworker Perspectives and Feedback Outcomes in Crowd-Feedback System DesignProceedings of the ACM on Human-Computer Interaction10.1145/35794567:CSCW1(1-28)Online publication date: 16-Apr-2023
  • (2023)Privacy by Design in Software Engineering: An update of a Systematic Mapping StudyProceedings of the 38th ACM/SIGAPP Symposium on Applied Computing10.1145/3555776.3577626(1362-1369)Online publication date: 27-Mar-2023
  • (2023)CrowdSurfer: Seamlessly Integrating Crowd-Feedback Tasks into Everyday Internet SurfingProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3580994(1-16)Online publication date: 19-Apr-2023
  • Show More Cited By

Index Terms

  1. A/P(rivacy) Testing: Assessing Applications for Social and Institutional Privacy

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI EA '19: Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems
    May 2019
    3673 pages
    ISBN:9781450359719
    DOI:10.1145/3290607
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 May 2019

    Check for updates

    Author Tags

    1. A/B testing
    2. controlled experiments
    3. privacy
    4. privacy-by-design
    5. user-centered design

    Qualifiers

    • Abstract

    Funding Sources

    • The Israeli Ministry of Science and Technology (international conference travel grant)
    • The Israeli Ministry of Science and Technology (Shulamit Aloni)
    • ICRC: Blavatnik Interdisciplinary Cyber Research Center

    Conference

    CHI '19
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 6,164 of 23,696 submissions, 26%

    Upcoming Conference

    CHI 2025
    ACM CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 27 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Aligning Crowdworker Perspectives and Feedback Outcomes in Crowd-Feedback System DesignProceedings of the ACM on Human-Computer Interaction10.1145/35794567:CSCW1(1-28)Online publication date: 16-Apr-2023
    • (2023)Privacy by Design in Software Engineering: An update of a Systematic Mapping StudyProceedings of the 38th ACM/SIGAPP Symposium on Applied Computing10.1145/3555776.3577626(1362-1369)Online publication date: 27-Mar-2023
    • (2023)CrowdSurfer: Seamlessly Integrating Crowd-Feedback Tasks into Everyday Internet SurfingProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3580994(1-16)Online publication date: 19-Apr-2023
    • (2023)Translating Privacy Design Principles Into Human-Centered Software Lifecycle: A Literature ReviewInternational Journal of Human–Computer Interaction10.1080/10447318.2023.221996440:17(4465-4483)Online publication date: 20-Jun-2023
    • (2020)Privacy by Design in Aged Care Monitoring Devices? Well, Not Quite Yet!Proceedings of the 32nd Australian Conference on Human-Computer Interaction10.1145/3441000.3441049(492-505)Online publication date: 2-Dec-2020
    • (2020)Privacy Engineering Methodologies: A survey2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT)10.1109/3ICT51146.2020.9311949(1-6)Online publication date: 20-Dec-2020

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media