2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 2019
DOI: 10.1109/eurospw.2019.00019
|View full text |Cite
|
Sign up to set email alerts
|

Why Johnny Fails to Protect his Privacy

Abstract: Albeit people worldwide cry out for the protection of their privacy, they often fail to successfully protect their private data. Possible reasons for this failure that have been identified in previous research include a lack of knowledge about possible privacy consequences, the negative outcome of a rational cost-benefit analysis, and insufficient ability for protection on the users' side. However, these findings mainly base on theoretical considerations or results from quantitative studies, and no comprehensi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 14 publications
(18 citation statements)
references
References 43 publications
0
18
0
Order By: Relevance
“…Moreover, it is questionable whether ex-ante control would allow employees to manage their privacy in a reasonable way, given that our results, similar to findings from online privacy research [23,54], suggest that privacy management is burdensome and that current intervention options are inadequate or complex. In fact, German legislation deliberately pursues a concept of privacy paternalism for employment relationships, limiting ex-ante control to relieve employees of the burden to protect their privacy.…”
Section: Discussionmentioning
confidence: 73%
See 1 more Smart Citation
“…Moreover, it is questionable whether ex-ante control would allow employees to manage their privacy in a reasonable way, given that our results, similar to findings from online privacy research [23,54], suggest that privacy management is burdensome and that current intervention options are inadequate or complex. In fact, German legislation deliberately pursues a concept of privacy paternalism for employment relationships, limiting ex-ante control to relieve employees of the burden to protect their privacy.…”
Section: Discussionmentioning
confidence: 73%
“…Irrespective of their accuracy, mental models guide people's decision making process in both familiar and unfamiliar situations [17,25]. In the context of HCI on topics of usable security and privacy, mental models are surveyed (1) to construct a system in which cognitive effort is optimised for usability [11,58,66], (2) to use them as a tool for effective communication between expert and ordinary users [31,52,67,70], or (3) to capture and explore concerns, expectations, and understandings of technology [20,23,27,38,54,71]. Previous research has elicited mental models of privacy in general [48] and in the context of specific technical solutions, with a particular emphasis on online services [13,19,33,37,51,58].…”
Section: Mental Models Of Privacy At Workmentioning
confidence: 99%
“…We provided a 5-option closed-ended question, with the options (1) 'friend/social contact recommendation' (2) 'work/school recommendation' (3) 'privacy/cookie policy of a website' (4) 'technology blog recommendation' (5) 'news', as well as, an 'other' box to write in other sources or that they 'don't know' of PETs for tracking protection. We chose these options with inputs from previous research findings, in particular, the channel of communication via which individuals would like to learn about PETs [68] as well as their perception of social influence and support from others as encouraging the use of PETs [11,26].…”
Section: Methodsmentioning
confidence: 99%
“…Designers also ought to be aware of gender and country differences in how individuals learn about PETs, and be able to cater for different groups. While more research into the accessible means of communicating PETs information to users is needed (so as not to rely solely on users to conduct their research, where the burden is on users), designers can already consider the use of social networks, since apart from this paper, other researchers have also pointed to the impact of social influence on the use of PETs [11,26]. It would also be helpful to establish PETs repositories, and make vetted recommendations more accessible to the lay user.…”
Section: Recommendationsmentioning
confidence: 99%
“…Even the Electronic Frontier Foundation (EFF) hesitates to recommend which IM to use from a privacy perspective [26]. Second, there is social pressure among individuals that push them to use the app their friends use, instead of the most secure app [28]. Third, building an IM service with metadata privacy is nontrivial.…”
Section: Introductionmentioning
confidence: 99%