Communicating Privacy: User Priorities for Privacy Requirements in Home Energy Applications

被引:1
|
作者
Diamond, Lisa [1 ]
Froehlich, Peter [1 ]
机构
[1] AIT Austrian Inst Technol, Giefinggasse 2, A-1210 Vienna, Austria
来源
HUMAN-COMPUTER INTERACTION, INTERACT 2021, PT IV | 2021年 / 12935卷
关键词
Privacy requirements; Usable privacy; Smart grid; INFORMATION PRIVACY; SMART; CONSUMPTION;
D O I
10.1007/978-3-030-85610-6_38
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Perceived privacy plays a crucial role in the acceptance of technologies that rely on sensitive data. To mitigate concerns and build trust, privacy must not only be protected, but this protection should also be successfully communicated. Residential energy consumption data are at the center of applications that facilitate improved energy management and support a more sustainable future, but such data are privacy-sensitive since they have the potential to reveal a great number of details about the daily life of users. Our study contributes to an understanding of how to communicate energy data privacy via user interfaces by looking into the relevancy and accessibility priorities of potential privacy requirements in home energy monitoring, management, and production applications. All investigated requirements showed themselves to be of relevance to users, with control aspects (access, transfer, and deletion of data) being both perceived as most important and receiving the highest accessibility priority ratings, and control of data storage joining them as top access priority requirement. Our results indicate that placing the settings and information emphasized in our results prominently in the user interface, going through extra effort to ensure easy comprehensibility, and communicating them proactively, is likely to go a long way in successfully communicating privacy. Investigation of accessibility priority differences in relation to data storage location provided less clear answers but suggests a higher importance of access to general information on data collection if data are stored centrally and of the ability to view data if stored decentrally.
引用
收藏
页码:665 / 675
页数:11
相关论文
共 50 条
  • [21] PrivacyStory: Tool Support for Extracting Privacy Requirements from User Stories
    Herwanto, Guntur Budi
    Quirchmayr, Gerald
    Tjoa, A. Min
    2022 30TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2022), 2022, : 264 - 265
  • [22] Evaluating privacy - determining user privacy expectations on the web
    Pilton, Callum
    Faily, Shamal
    Henriksen-Bulmer, Jane
    Computers and Security, 2021, 105
  • [23] Extracting and Modeling The Privacy Requirements from HIPAA for Healthcare Applications
    Alshugran, Tariq
    Dichter, Julius
    2014 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2014,
  • [24] Identifying Privacy Functional Requirements for Crowdsourcing Applications in Smart Cities
    da Silva, Monica
    Viterbo, Jose
    Bernardini, Flavia
    Maciel, Cristiano
    2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2018, : 106 - 111
  • [25] The Importance of Communicating Workplace Privacy Policies
    Dillon, Thomas W.
    Hamilton, Arthur J.
    Thomas, Daphyne S.
    Usry, Mark L.
    EMPLOYEE RESPONSIBILITIES AND RIGHTS JOURNAL, 2008, 20 (02) : 119 - 139
  • [26] User-centred privacy inference detection for smart home devices
    Kounoudes, Alexia Dini
    Kapitsaki, Georgia M.
    Katakis, Ioannis
    Milis, Marios
    2021 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, INTERNET OF PEOPLE, AND SMART CITY INNOVATIONS (SMARTWORLD/SCALCOM/UIC/ATC/IOP/SCI 2021), 2021, : 210 - 218
  • [27] User's perspectives on privacy in web-based applications
    Zviran, Moshe
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2008, 48 (04) : 97 - 105
  • [28] A look into user privacy and third-party applications in Facebook
    Seng, Sovantharith
    Al-Ameen, Mahdi Nasrullah
    Wright, Matthew
    INFORMATION AND COMPUTER SECURITY, 2021, 29 (02) : 283 - 313
  • [29] User Privacy Leakages from Federated Learning in NILM Applications
    Shi, Yunchuan
    Li, Wei
    Chang, Xiaomin
    Zomaya, Albert Y.
    BUILDSYS'21: PROCEEDINGS OF THE 2021 ACM INTERNATIONAL CONFERENCE ON SYSTEMS FOR ENERGY-EFFICIENT BUILT ENVIRONMENTS, 2021, : 212 - 213
  • [30] UIPicker: User-Input Privacy Identification in Mobile Applications
    Nan, Yuhong
    Yang, Min
    Yang, Zhemin
    Zhou, Shunfan
    Gu, Guofei
    Wang, XiaoFeng
    PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 993 - 1008