论文标题

隐私增强技术的使用模式

Usage Patterns of Privacy-Enhancing Technologies

论文作者

Coopamootoo, Kovila P. L.

论文摘要

隐私入侵的稳定报道在线描绘了互联网成长为更危险的地方的图片。这是由在线技术和数据密集型网络大规模部署促进的在线危害潜在损害的潜在量表的报告所支持的。尽管互联网用户通常对隐私表示关注,但有些人报告采取行动以在线保护其隐私。我们研究个人在网上保护其隐私的方法和技术。我们进行了两项n = 180和n = 907的研究,以在美国,英国和德国在线使用隐私方法。我们发现非技术方法是三个国家中最常用的方法之一。我们在群集图中确定了隐私方法使用的不同分组。该地图显示,与非技术保护方法一起使用的非技术方法,即在服务中集成的简单宠物,形成最常用的群集,而更高级的宠物形成了不同的,最不使用的群集。我们进一步研究用户的看法和推理,主要在第三项研究中使用一组宠物,n = 183名参与者。我们没有发现在高级宠物和更简单的宠物用户之间在线保护隐私的感知能力的差异。我们比较高级和简单宠物之间的使用感知,并报告不使用高级宠物的用户推理以及潜在使用所需的支持。本文通过引起$ 43 $隐私方法的使用和感知使用的使用来促进隐私研究,其中包括三个国家 /地区的$ 26 $宠物,并提供了宠物使用的地图。群集图为跨宠物的未来以用户为中心的调查提供了一个系统可靠的参考点。总体而言,这项研究提供了对宠物集合中的使用和看法的广泛理解,并可能导致未来的宠物扩展研究研究。

The steady reports of privacy invasions online paints a picture of the Internet growing into a more dangerous place. This is supported by reports of the potential scale for online harms facilitated by the mass deployment of online technology and the data-intensive web. While Internet users often express concern about privacy, some report taking actions to protect their privacy online. We investigate the methods and technologies that individuals employ to protect their privacy online. We conduct two studies, of N=180 and N=907, to elicit individuals' use of privacy methods online, within the US, the UK and Germany. We find that non-technology methods are among the most used methods in the three countries. We identify distinct groupings of privacy methods usage in a cluster map. The map shows that together with non-technology methods of privacy protection, simple PETs that are integrated in services, form the most used cluster, whereas more advanced PETs form a different, least used cluster. We further investigate user perception and reasoning for mostly using one set of PETs in a third study with N=183 participants. We do not find a difference in perceived competency in protecting privacy online between advanced and simpler PETs users. We compare use perceptions between advanced and simpler PETs and report on user reasoning for not using advanced PETs, as well as support needed for potential use. This paper contributes to privacy research by eliciting use and perception of use across $43$ privacy methods, including $26$ PETs across three countries and provides a map of PETs usage. The cluster map provides a systematic and reliable point of reference for future user-centric investigations across PETs. Overall, this research provides a broad understanding of use and perceptions across a collection of PETs, and can lead to future research for scaling use of PETs.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源