Communicating Privacy: User Priorities for Privacy Requirements in Home Energy Applications

被引:1
|
作者
Diamond, Lisa [1 ]
Froehlich, Peter [1 ]
机构
[1] AIT Austrian Inst Technol, Giefinggasse 2, A-1210 Vienna, Austria
关键词
Privacy requirements; Usable privacy; Smart grid; INFORMATION PRIVACY; SMART; CONSUMPTION;
D O I
10.1007/978-3-030-85610-6_38
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Perceived privacy plays a crucial role in the acceptance of technologies that rely on sensitive data. To mitigate concerns and build trust, privacy must not only be protected, but this protection should also be successfully communicated. Residential energy consumption data are at the center of applications that facilitate improved energy management and support a more sustainable future, but such data are privacy-sensitive since they have the potential to reveal a great number of details about the daily life of users. Our study contributes to an understanding of how to communicate energy data privacy via user interfaces by looking into the relevancy and accessibility priorities of potential privacy requirements in home energy monitoring, management, and production applications. All investigated requirements showed themselves to be of relevance to users, with control aspects (access, transfer, and deletion of data) being both perceived as most important and receiving the highest accessibility priority ratings, and control of data storage joining them as top access priority requirement. Our results indicate that placing the settings and information emphasized in our results prominently in the user interface, going through extra effort to ensure easy comprehensibility, and communicating them proactively, is likely to go a long way in successfully communicating privacy. Investigation of accessibility priority differences in relation to data storage location provided less clear answers but suggests a higher importance of access to general information on data collection if data are stored centrally and of the ability to view data if stored decentrally.
引用
收藏
页码:665 / 675
页数:11
相关论文
共 50 条
  • [1] Privacy Requirements in Cybersecurity Applications of Blockchain
    Axon, Louise
    Goldsmith, Michael
    Creese, Sadie
    BLOCKCHAIN TECHNOLOGY: PLATFORMS, TOOLS AND USE CASES, 2018, 111 : 229 - 278
  • [2] Distilling Privacy Requirements for Mobile Applications
    Thomas, Keerthi
    Bandara, Arosha K.
    Price, Blaine A.
    Nuseibeh, Bashar
    36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014), 2014, : 871 - 882
  • [3] On Privacy in User Tracking Mobile Applications
    Gasparovic, Marko
    Nicolau, Pedro
    Marques, Ana
    Silva, Catarina
    Marcelino, Luis
    2016 11TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2016,
  • [4] PrivacyGuard: Enhancing Smart Home User Privacy
    Yu, Keyang
    Li, Qi
    Chen, Dong
    Rahman, Mohammad
    Wang, Shiqiang
    IPSN'21: PROCEEDINGS OF THE 20TH ACM/IEEE CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, 2021, : 62 - 76
  • [5] Engineering privacy requirements in business intelligence applications
    Chiasera, Annamaria
    Casati, Fabio
    Daniel, Florian
    Velegrakis, Yannis
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2008, 5159 : 219 - 228
  • [6] User Privacy Enhancement in Modern Web Applications
    Bagai, Rajiv
    Chandrashekar, Kirankumar
    PROCEEDINGS 7TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS CICSYN 2015, 2015, : 127 - 132
  • [7] A greater understanding of social networks privacy requirements: The user perspective
    Islam, Mohammad Badiul
    Watson, Jason
    Iannella, Renato
    Geva, Shlomo
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 33 : 30 - 44
  • [8] Leveraging NLP Techniques for Privacy Requirements Engineering in User Stories
    Herwanto, Guntur Budi
    Quirchmayr, Gerald
    Tjoa, A. Min
    IEEE ACCESS, 2024, 12 : 22167 - 22189
  • [9] Going global: Comparing Chinese mobile applications' data and user privacy governance at home and abroad
    Jia, Lianrui
    Ruan, Lotus
    INTERNET POLICY REVIEW, 2020, 9 (03): : 1 - 22
  • [10] Security and Privacy Requirements for the Metaverse: A Metaverse Applications Perspective
    Kang, Giluk
    Koo, Jahoon
    Kim, Young-Gab
    IEEE COMMUNICATIONS MAGAZINE, 2024, 62 (01) : 148 - 154