Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3641399.3641414acmotherconferencesArticle/Chapter ViewAbstractPublication PagesisecConference Proceedingsconference-collections
short-paper

Embedding Privacy First Human Centric in User Experience for Mobile Applications.

Published: 22 February 2024 Publication History

Abstract

Mobile applications have changed the way we operate in our daily lives. With the onset of digital revolution and plethora of applications available for users to choose from, focus rapidly shifted to comfort of use and accessibility-based interfaces driven by user preferences. The right user experience design can guide user on completing certain actions faster and with ease, thus leading his/her to achieve goal. Social engineering frauds are on the rise, wherein users’ information/money is compromised through psychological manipulation into performing undesirable actions. These actions can be potentially due to lack of awareness but also could be resulting due to concealed information and complex and unclear steps to accomplish an action in applications. Ethical choices have become an integral and indivisible part of user preferences and experience, privacy being one of them. We believe privacy concerns are often limited to unauthorized disclosure of personal data and restricted access to resources but there is a need to integrate privacy into user experience design as well. In this paper, we have devised various parameters that can be used to assess the privacy needs of a user interface. Further, the realization of concept is depicted through framework design capable of automatically assessing the interface and categorizing them based on results. Finally, we demonstrate the utility of the proposed framework and concept by comparing financial mobile applications.

References

[1]
Hendy Mustiko Aji, Izra Berakon, and Maizaitulaidawati Md Husin. 2020. COVID-19 and e-wallet usage intention: A multigroup analysis between Indonesia and Malaysia. Cogent Business & Management 7, 1 (2020), 1804181.
[2]
A. Alshayban, I. Ahmed, and S. Malek. 2020. Accessibility Issues in Android Apps: State of Affairs, Sentiments, and Ways Forward. In 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE). 1323–1334.
[3]
N. Z. b. Ayob, A. R. C. Hussin, and H. M. Dahlan. 2009. Three Layers Design Guideline for Mobile Application. In 2009 International Conference on Information Management and Engineering. 427–431. https://doi.org/10.1109/ICIME.2009.99
[4]
Mindy Carner. 2019. A human-centred design approach to digital asset management: User experience as a foundation for system-configuration design. Journal of Digital Media Management 7, 4 (2019), 357–365.
[5]
Rainara Maia Carvalho, Rossana Maria de Castro Andrade, and Káthia Marçal de Oliveira. 2018. AQUArIUM - A suite of software measures for HCI quality evaluation of ubiquitous mobile applications. Journal of Systems and Software 136 (2018), 101–136. https://doi.org/10.1016/j.jss.2017.11.022
[6]
Jan Dekelver, Marina Kultsova, Olga Shabalina, Julia Borblik, Alexander Pidoprigora, Roman Romanenko, 2015. Design of mobile applications for people with intellectual disabilities. Communications in Computer and Information Science 535 (2015), 823–836.
[7]
José-Manuel Díaz-Bossini and Lourdes Moreno. 2014. Accessibility to Mobile Interfaces for Older People. Procedia Computer Science 27 (2014), 57–66. https://doi.org/10.1016/j.procs.2014.02.008 5th International Conference on Software Development and Technologies for Enhancing Accessibility and Fighting Info-exclusion, DSAI 2013.
[8]
Serge Egelman, Adrienne Porter Felt, and David Wagner. 2013. Choice Architecture and Smartphone Privacy: There’s a Price for That. Springer Berlin Heidelberg, Berlin, Heidelberg, 211–236. https://doi.org/10.1007/978-3-642-39498-0_10
[9]
Yasmine N. El-Glaly, Anthony Peruma, Daniel E. Krutz, and J. Scott Hawker. 2018. Apps for Everyone: Mobile Accessibility Learning Modules. ACM Inroads 9, 2 (April 2018), 30–33. https://doi.org/10.1145/3182184
[10]
Adrienne Porter Felt, Serge Egelman, and David Wagner. 2012. I’ve Got 99 Problems, but Vibration Ain’t One: A Survey of Smartphone Users’ Concerns. In Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (Raleigh, North Carolina, USA) (SPSM ’12). Association for Computing Machinery, New York, NY, USA, 33–44. https://doi.org/10.1145/2381934.2381943
[11]
Diksha Goel and Ankit Kumar Jain. 2018. Mobile phishing attacks and defence mechanisms: State of art and open research challenges. Computers and Security 73 (2018), 519–544. https://doi.org/10.1016/j.cose.2017.12.006
[12]
Marc Langheinrich. 2001. Privacy by Design — Principles of Privacy-Aware Ubiquitous Systems. In Ubicomp 2001: Ubiquitous Computing, Gregory D. Abowd, Barry Brumitt, and Steven Shafer (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 273–291.
[13]
Hee-Jin Lee, Joon-Sang Lee, Eunkyoung Jee, and Doo-Hwan Bae. 2017. A user experience evaluation framework for mobile usability. International Journal of Software Engineering and Knowledge Engineering 27, 02 (2017), 235–279.
[14]
Ilaria Liccardi, Joseph Pato, and Daniel J Weitzner. 2014. Improving user choice through better mobile apps transparency and permissions analysis. Journal of Privacy and Confidentiality 5, 2 (2014).
[15]
Esther Nampiina, Mandukhai Lkhagvasuren, and Arman Madjidian. 2020. Privacy by Design: A qualitative study to explore privacy by design adaptation in reducing privacy breaches. Student Paper.
[16]
Xiangang Qin, Chee-Wee Tan, and Torkil Clemmensen. 2017. Context-Awareness and Mobile HCI: Implications, Challenges and Opportunities. In HCI in Business, Government and Organizations. Interacting with Information Systems, Fiona Fui-Hoon Nah and Chuan-Hoo Tan (Eds.). Springer International Publishing, Cham, 112–127.
[17]
C Revathy and P Balaji. 2020. Determinants of Behavioural Intention on E-Wallet Usage: An Empirical Examination in Amid of Covid-19 Lockdown Period. International Journal of Management (IJM) 11, 6 (2020).
[18]
Tom Rodden, Keith Cheverst, K Davies, and Alan Dix. 1998. Exploiting context in HCI design for mobile systems. In Workshop on human computer interaction with mobile devices, Vol. 12. Citeseer.
[19]
Caspar Ryan and Atish Gonsalves. 2005. The effect of context and application type on mobile usability: an empirical study. In Proceedings of the Twenty-eighth Australasian conference on Computer Science-Volume 38. Citeseer, 115–124.
[20]
Fatima Salahdine and Naima Kaabouch. 2019. Social engineering attacks: a survey. Future Internet 11, 4 (2019), 89.
[21]
Markus Weinmann, Christoph Schneider, and Jan Vom Brocke. 2016. Digital nudging. Business & Information Systems Engineering 58, 6 (2016), 433–436.
[22]
Roel Wijland, Paul Hansen, and Fatima Gardezi. 2016. Mobile nudging: Youth engagement with banking apps. Journal of Financial Services Marketing 21, 1 (2016), 51–63.
[23]
Jacob O Wobbrock. 2006. The future of mobile device research in HCI. In CHI 2006 workshop proceedings: what is the next generation of human-computer interaction. Citeseer, 131–134.
[24]
Fatima Zahra, Azham Hussain, and Haslina Mohd. 2017. Usability evaluation of mobile applications; where do we stand?. In AIP Conference Proceedings, Vol. 1891. AIP Publishing LLC, 020056.

Index Terms

  1. Embedding Privacy First Human Centric in User Experience for Mobile Applications.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ISEC '24: Proceedings of the 17th Innovations in Software Engineering Conference
    February 2024
    144 pages
    ISBN:9798400717673
    DOI:10.1145/3641399
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 February 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Ethics
    2. Mobile Applications.
    3. Privacy
    4. User Experience

    Qualifiers

    • Short-paper
    • Research
    • Refereed limited

    Conference

    ISEC 2024

    Acceptance Rates

    Overall Acceptance Rate 76 of 315 submissions, 24%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 40
      Total Downloads
    • Downloads (Last 12 months)40
    • Downloads (Last 6 weeks)10
    Reflects downloads up to 15 Oct 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media