Privacy in multimedia communications: Protecting users, not just data

被引:0
|
作者
Adams, A [1 ]
Sasse, MA [1 ]
机构
[1] Middlesex Univ, Dept Comp Sci, London N11 2NQ, England
关键词
privacy; multimedia communications; grounded theory; trust; user-centred design;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As the use of ubiquitous multimedia communication increases so do the privacy risks associated with widespread accessibility and utilisation of data generated by such applications. Most invasions of privacy are not Intentional but due to designers inability to anticipate how this data could be used, by whom, and how this might affect users. This paper addresses the problem by providing a model of user perceptions of privacy In multimedia environments. The model has been derived from an analysis of empirical studies conducted by the authors and other researchers and aids designers to determine which information users regard as private, and in which context. It also identifies trade-offs that users are willing to make rendering some privacy risks acceptable. To demonstrate how this model can be used to assess the privacy implications of multimedia communications in a specific context, an example of the models application for a specific usage scenario is provided.
引用
收藏
页码:49 / 64
页数:16
相关论文
共 50 条
  • [1] Carpe Data: Protecting online privacy with naive users
    Abrardi, Laura
    Cambini, Carlo
    [J]. INFORMATION ECONOMICS AND POLICY, 2022, 60
  • [2] MULTIMEDIA COMMUNICATIONS FOR USERS
    ROSENBERG, J
    KRAUT, RE
    GOMEZ, L
    BUZZARD, CA
    [J]. IEEE COMMUNICATIONS MAGAZINE, 1992, 30 (05) : 20 - &
  • [3] The Cost of Protecting Privacy in Multimedia Applications
    El-Khatib, Khalil
    [J]. Q2SWINET'08: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2008, : 51 - 54
  • [4] A Framework for Protecting Users' Privacy in Cloud
    Sodiya, Adesina S.
    Adegbuyi, B.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2016, 10 (04) : 33 - 43
  • [5] Protecting Privacy of BLE Device Users
    Fawaz, Kassem
    Kim, Kyu-Han
    Shin, Kang G.
    [J]. PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, 2016, : 1205 - 1221
  • [6] Lost in the Cloud: Cloud. Storage, Privacy, and Suggestions for Protecting Users' Data
    Johnson, Eric
    [J]. STANFORD LAW REVIEW, 2017, 69 (03) : 867 - 909
  • [7] Privacy Cyborg: Towards Protecting the Privacy of Social Media Users
    Georgiou, Theodore
    El Abbadi, Amr
    Yan, Xifeng
    [J]. 2017 IEEE 33RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2017), 2017, : 1395 - 1396
  • [8] Effective Techniques for Protecting the Privacy of Web Users
    Bubukayr, Maryam
    Frikha, Mounir
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (05):
  • [9] Protecting Multimedia Privacy from Both Humans and AI
    Liu, Bo
    Xiong, Jian
    Wu, Yiyan
    Ding, Ming
    Wu, Cynthia M.
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON BROADBAND MULTIMEDIA SYSTEMS AND BROADCASTING (BMSB), 2019,
  • [10] 'I just LOVE data': perceptions and practices of data sharing and privacy among users of the Lioness
    Middleweek, Belinda
    Klinger, Liz
    [J]. CULTURE HEALTH & SEXUALITY, 2024,