Method for privacy requirements elicitation in ubiquitous computing

In today's world, technology is an increasingly greater part of daily life, especially in terms of data collection and sharing practices that may pose a risk to privacy. Users may not understand their privacy completely because within system development there is a gap between users' and software designers' mental models. This paper discusses the main challenges and solutions for establishing privacy in ubiquitous contexts. To do so, we use a theoretical basis to propose a method for eliciting privacy requirements in ubiquitous computing, by involving software designers and users. Through an use example, we verified that the proposed method allowed the designer to recognize the need for privacy in the systems and design jointly with users solutions to inform and protect privacy.

[1]  John M. Carroll,et al.  Five reasons for scenario-based design , 2000, Interact. Comput..

[2]  Patricia Cristiane de Souza,et al.  Prominent issues for privacy establishment in privacy policies of mobile apps , 2016, IHC.

[3]  Lorrie Faith Cranor,et al.  A Design Space for Effective Privacy Notices , 2015, SOUPS.

[4]  Florian Schaub,et al.  Territorial privacy in ubiquitous computing , 2011, 2011 Eighth International Conference on Wireless On-Demand Network Systems and Services.

[5]  Simone D. J. Barbosa,et al.  Design da interação humano-computador com MoLIC , 2014, IHC.

[6]  Cristiano Maciel,et al.  Legal Issues and User Experience in Ubiquitous Systems from a Privacy Perspective , 2015, HCI.

[7]  Lorrie Faith Cranor,et al.  Disagreeable Privacy Policies: Mismatches between Meaning and Users’ Understanding , 2014 .

[8]  Yang Wang,et al.  Nudges for Privacy and Security , 2017, ACM Comput. Surv..

[9]  Mark Weiser,et al.  The computer for the 21st Century , 1991, IEEE Pervasive Computing.

[10]  Célia Ghedini Ralha,et al.  I GranDSI-BR , 2017 .

[11]  Norman M. Sadeh,et al.  Crowdsourcing privacy policy analysis: Potential, challenges and best practices , 2016, it Inf. Technol..

[12]  Jaeyoung Choi,et al.  Context-Aware Workflow Language Based on Web Services for Ubiquitous Computing , 2005, ICCSA.

[13]  Mark Weiser,et al.  Some computer science issues in ubiquitous computing , 1993, CACM.

[14]  Florian Schaub Dynamic privacy adaptation in ubiquitous computing , 2014 .

[15]  Gregory D. Abowd,et al.  Charting past, present, and future research in ubiquitous computing , 2000, TCHI.

[16]  Naseem Ahmadpour,et al.  Lights, Camera, Action: Using animations to co-evaluate user experience scenarios , 2015, OZCHI.

[17]  Lorrie Faith Cranor,et al.  Privacy as part of the app decision-making process , 2013, CHI.

[18]  Herbert A. Simon,et al.  The Decision-Making Schema@@@Administrative Behavior; A Study of Decision-Making Processes in Administrative Organization , 1957 .

[19]  Monika Taddicken,et al.  The 'Privacy Paradox' in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure1 , 2014, J. Comput. Mediat. Commun..

[20]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[21]  Lorrie Faith Cranor,et al.  Improving App Privacy: Nudging App Developers to Protect User Privacy , 2014, IEEE Security & Privacy.

[22]  Mikio Aoyama,et al.  Persona-and-scenario based requirements engineering for software embedded in digital consumer products , 2005, 13th IEEE International Conference on Requirements Engineering (RE'05).