Communicating Privacy: User Priorities for Privacy Requirements in Home Energy Applications

被引:1
|
作者
Diamond, Lisa [1 ]
Froehlich, Peter [1 ]
机构
[1] AIT Austrian Inst Technol, Giefinggasse 2, A-1210 Vienna, Austria
关键词
Privacy requirements; Usable privacy; Smart grid; INFORMATION PRIVACY; SMART; CONSUMPTION;
D O I
10.1007/978-3-030-85610-6_38
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Perceived privacy plays a crucial role in the acceptance of technologies that rely on sensitive data. To mitigate concerns and build trust, privacy must not only be protected, but this protection should also be successfully communicated. Residential energy consumption data are at the center of applications that facilitate improved energy management and support a more sustainable future, but such data are privacy-sensitive since they have the potential to reveal a great number of details about the daily life of users. Our study contributes to an understanding of how to communicate energy data privacy via user interfaces by looking into the relevancy and accessibility priorities of potential privacy requirements in home energy monitoring, management, and production applications. All investigated requirements showed themselves to be of relevance to users, with control aspects (access, transfer, and deletion of data) being both perceived as most important and receiving the highest accessibility priority ratings, and control of data storage joining them as top access priority requirement. Our results indicate that placing the settings and information emphasized in our results prominently in the user interface, going through extra effort to ensure easy comprehensibility, and communicating them proactively, is likely to go a long way in successfully communicating privacy. Investigation of accessibility priority differences in relation to data storage location provided less clear answers but suggests a higher importance of access to general information on data collection if data are stored centrally and of the ability to view data if stored decentrally.
引用
收藏
页码:665 / 675
页数:11
相关论文
共 50 条
  • [11] Privacy and DRM Requirements for Collaborative Development of AI Applications
    Mehri, Vida Ahmadi
    Ilie, Dragos
    Tutschku, Kurt
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [12] A Survey of User Perspectives on Security and Privacy in a Home Networking Environment
    Pattnaik, Nandita
    Li, Shujun
    Nurse, Jason R. C.
    ACM COMPUTING SURVEYS, 2023, 55 (09)
  • [13] Understanding user perceptions of privacy, and configuration challenges in home automation
    Kaaz, Kim J.
    Hoffer, Alex
    Saeidi, Mahsa
    Sarma, Anita
    Bobba, Rakesh B.
    2017 IEEE SYMPOSIUM ON VISUAL LANGUAGES AND HUMAN-CENTRIC COMPUTING (VL/HCC), 2017, : 297 - 301
  • [14] User-Centric Multiobjective Approach to Privacy Preservation and Energy Cost Minimization in Smart Home
    Chang, Hsuan-Hao
    Chiu, Wei-Yu
    Sun, Hongjian
    Chen, Chia-Ming
    IEEE SYSTEMS JOURNAL, 2019, 13 (01): : 1030 - 1041
  • [15] Violation of User Privacy by IPTV Packet Sniffing in Home Network
    Vukojevic, Sinisa
    2015 8TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2015, : 1338 - 1343
  • [16] A comprehensive investigation of user privacy leakage to Android applications
    Ge, Yuming
    Deng, Bo
    Sun, Yi
    Tang, Libo
    Sheng, Dajiang
    Zhao, Yantao
    Xie, Gaogang
    Salamatian, Kave
    2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [17] Enforcement of Privacy Requirements
    Krishnan, Padmanabhan
    Vorobyov, Kostyantyn
    SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2013, 405 : 272 - 285
  • [18] Enforcement of privacy requirements
    Krishnan, Padmanabhan
    Vorobyov, Kostyantyn
    COMPUTERS & SECURITY, 2015, 52 : 164 - 177
  • [19] Engineering Adaptive Privacy: On the Role of Privacy Awareness Requirements
    Omoronyia, Inah
    Cavallaro, Luca
    Salehie, Mazeiar
    Pasquale, Liliana
    Nuseibeh, Bashar
    PROCEEDINGS OF THE 35TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2013), 2013, : 632 - 641
  • [20] Privately Querying Privacy: Privacy Estimation with Guaranteed Privacy of User and Database Party
    Hildebrandt, Anna Katharina
    Althaus, Ernst
    Hildebrandt, Andreas
    ALGORITHMIC ASPECTS OF CLOUD COMPUTING, 2021, 13084 : 56 - 72