Privacy Is the Price: Player Views and Technical Evaluation of Data Practices in Online Games

被引:0
作者
Bourdoucen A. [1 ]
Nurgalieva L. [1 ]
Lindqvist J. [1 ]
机构
[1] Aalto University, Espoo
基金
芬兰科学院;
关键词
online games; privacy; security;
D O I
10.1145/3611064
中图分类号
学科分类号
摘要
Online games engage players in sharing their personal data with the games themselves and other players, which can pose security, privacy, and integrity risks to players. This paper presents an analysis of data practices in 21 online games and a qualitative interview study (N=20) that explores players' views on sharing their data in online games. Our results show that players' willingness to share personal information is contextual and related to game settings and game design elements. Our findings also highlight players' misconceptions and concerns surrounding data collection in games, and approaches to mitigate these concerns. Finally, this work identifies questionable design practices with online games and suggests design implications that will increase transparency and player control over data sharing. © 2023 Owner/Author.
引用
收藏
相关论文
共 143 条
[11]  
Balebako R., Jung J., Lu W., Faith Cranor L., Nguyen C., Little Brothers Watching You": Raising Awareness of Data Leaks on Smartphones, Proceedings of the Ninth Symposium on Usable Privacy and Security (Newcastle, United Kingdom) (SOUPS '13, (2013)
[12]  
Barth S., De Jong T.M.D., The privacy paradox-Investigating discrepancies between expressed privacy concerns and actual online behavior-A systematic literature review, Telematics and Informatics, 34, 7, pp. 1038-1058, (2017)
[13]  
Barth S., Ionita D., Hartel P., Understanding Online Privacy-A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines, Acm Comput. Surv, 55, 3, (2022)
[14]  
Privacy Policy. Battlegrounds, (2022)
[15]  
Behm-Morawitz E., Schipper S., Sexing the Avatar, Journal of Media Psychology, 28, 1, pp. 1-14, (2015)
[16]  
Bethea D., Cochran R.A., Reiter M.K., Server-Side Verification of Client Behavior in Online Games, Acm Trans. Inf. Syst. Secur, 14, 4, (2008)
[17]  
Birk M.V., Atkins C., Bowey J.T., Mandryk R.L., Fostering Intrinsic Motivation through Avatar Identification in Digital Games, Proceedings of the 2016 Chi Conference on Human Factors in Computing Systems (San Jose, California, USA) (CHI '16, pp. 2982-2995, (2016)
[18]  
5 Unfortunate Cyber Attacks Against Gaming Companies. Gaming Bolt, (2021)
[19]  
Braghin C., Del Vecchio M., Is Pokémon GO Watching You? A Survey on the Privacy-Awareness of Location-Based Apps' Users, 2017 Ieee 41st Annual Computer Software and Applications Conference COMPSAC, 2, pp. 164-169, (2017)
[20]  
Bruckner S., Sato Y., Kurabayashi S., Waragai I., The Handling of Personal Information in Mobile Games, Advances in Computer Entertainment Technology, Adrian David Cheok, Masahiko Inami, and Teresa Romão (Eds, pp. 415-429, (2018)