Mensch Und Computer 2021 2021
DOI: 10.1145/3473856.3473879
|View full text |Cite
|
Sign up to set email alerts
|

Who Should Get My Private Data in Which Case? Evidence in the Wild

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(12 citation statements)
references
References 38 publications
1
1
0
Order By: Relevance
“…Data Disclosure to the PPA: In general, study participants are more willing to share data with their PPA if they see a direct benefit to it, which is in line with previous research [15,20]. In general, participants demand that their PPA be as data-sparse as possible so that it does not become a privacy threat itself.…”
Section: Rq 1: How Do Users Imagine Their Ppa?supporting
confidence: 65%
See 1 more Smart Citation
“…Data Disclosure to the PPA: In general, study participants are more willing to share data with their PPA if they see a direct benefit to it, which is in line with previous research [15,20]. In general, participants demand that their PPA be as data-sparse as possible so that it does not become a privacy threat itself.…”
Section: Rq 1: How Do Users Imagine Their Ppa?supporting
confidence: 65%
“…Research shows that certain user data, e. g., extracted from Facebook posts [44], can be helpful to build a user profile and thus creating a helpful PPA. However, users are not always willing to share their data and differentiate which data they share and with whom [20].…”
Section: Data Disclosure To the Ppamentioning
confidence: 99%
“…The reviewed literature suggests that the majority of the public will be oblivious to connected places [17], let alone desirable security behaviors within them [8,18]. At the same time, public perceptions and security behaviors in connected places are being influenced by different elements: the value offered by connected place technology [19]; the clarity of risks and security procedures communicated [20,21]; the ability to express concerns and participation in design and development [17,[21][22][23]; perceptions of privacy and risk [13,23,24]; trustworthiness [8,9,16,25]; and the type and purpose of data collection [18,23].…”
Section: Public Perceptions Influencing Public Security Behaviorsmentioning
confidence: 99%
“…However, the wide-ranging pre-existing levels of awareness amongst public users of connected places use a one-size-fits-all approach for the explanation of security and privacy issues, which is challenging. For example, many members of the public have a good understanding of network and data security processes but with low awareness of threats [26], or the information being shared by their devices in a connected place [8,18].…”
Section: Public Perceptions Influencing Public Security Behaviorsmentioning
confidence: 99%
See 1 more Smart Citation