Privacy enhancing technology awareness for mobile devices

Aziz Alshehri, Nathan Clarke, Fudong Li

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Users are often unaware of what information an app is collecting about them and with the increasing number of apps can also struggle to control and manage the large volumes of personal information. Current research into privacy often has a tendency to assume that users have uniform privacy requirements to control and manage personal information. The main problem with this approach is that research has also shown that users have different privacy attitudes and preferences. It is important to factor these requirements in a privacy-awareness model that can enhance the user’s awareness to make more informed decisions and to reduce their specific degree of exposure. As result, this paper proposed an approach that considers individual requirements in a centralised and usable manner to meet users’ needs. Through prioritization of privacy-related information, based on an individual user basis, is utilised to ensure relevant and timely notifications about privacy-related information that is important to the user. Accordingly, an evaluation was conducted to identify users' privacy preferences, how they wish to control different aspects of privacy and how this relates to good usability design to maximise adoption.
Original languageEnglish
Title of host publicationProceedings of the International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)
Publication statusAccepted for publication - 21 May 2019
EventInternational Symposium on Human Aspects of Information Security & Assurance (HAISA 2019) - Nicosia, Cyprus
Duration: 15 Jul 201917 Jul 2019

Conference

ConferenceInternational Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)
Country/TerritoryCyprus
CityNicosia
Period15/07/1917/07/19

Fingerprint

Dive into the research topics of 'Privacy enhancing technology awareness for mobile devices'. Together they form a unique fingerprint.

Cite this