Privacy and User Trust in Context-Aware Systems

Context-aware systems (CAS) that collect personal information are a general trend. This leads to several privacy considerations, which we outline in this paper. We present as use-case the SWELL system, which collects information from various contextual sensors to provide support for well-being at work. We address privacy from two perspectives: 1) the development point of view, in which we describe how to apply ‘privacy by design’, and 2) a user study, in which we found that providing detailed information on data collection and privacy by design had a positive effect on trust in our CAS. We also found that the attitude towards using our CAS was related to personal motivation, and not related to perceived privacy and trust in our system. This may stress the importance of implementing privacy by design to protect the privacy of the user.

[1]  Dola Barua Location-Based Services for Mobile Telephony: a study of Users' privacy concerns , 2015 .

[2]  Gregory D. Abowd,et al.  Towards a Better Understanding of Context and Context-Awareness , 1999, HUC.

[3]  Jaap-Henk Hoepman,et al.  PDF hosted at the Radboud Repository of the Radboud University Nijmegen , 2022 .

[4]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[5]  Ira S. Rubinstein,et al.  Big Data: The End of Privacy or a New Beginning? , 2013 .

[6]  Dong-Hee Shin,et al.  The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption , 2010, Interact. Comput..

[7]  W. IJsselsteijn,et al.  Investigating Privacy Attitudes and Behavior in Relation to Personalization , 2008 .

[8]  David Wright,et al.  The state of the art in privacy impact assessment , 2012, Comput. Law Secur. Rev..

[9]  James A. Landay,et al.  Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.

[10]  A. Cavoukian Operationalizing Privacy by Design: A Guide to Implementing Strong Privacy Practices , 2012 .

[11]  Saskia Koldijk Automatic recognition of context and stress to support knowledge workers , 2012, ECCE.

[12]  Gaetano Borriello,et al.  UbiComp 2002: Ubiquitous Computing: 4th International Conference Göteborg, Sweden, September 29 – October 1, 2002 Proceedings , 2002, Lecture Notes in Computer Science.

[13]  Wainer Lusoli,et al.  The Policy Maker's Anguish: Regulating Personal Data Behaviour Between Paradoxes and Dilemmas , 2009, WEIS.

[14]  George Buchanan,et al.  An Evaluation of WebTwig - A Site Outliner for Handheld Web Access , 1999, HUC.