Abstract
Context-aware systems (CAS) that collect personal information are a general trend. This leads to several privacy considerations, which we outline in this paper. We present as use-case the SWELL system, which collects information from various contextual sensors to provide support for well-being at work. We address privacy from two perspectives: 1) the development point of view, in which we describe how to apply ‘privacy by design’, and 2) a user study, in which we found that providing detailed information on data collection and privacy by design had a positive effect on trust in our CAS. We also found that the attitude towards using our CAS was related to personal motivation, and not related to perceived privacy and trust in our system. This may stress the importance of implementing privacy by design to protect the privacy of the user.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Abowd, G.D., Dey, A.K.: Towards a better understanding of context and context-awareness. In: Gellersen, H.-W. (ed.) HUC 1999. LNCS, vol. 1707, pp. 304–307. Springer, Heidelberg (1999)
Van De Garde-Perik, E., Markopoulos, P., De Ruyter, B., Eggen, B., Ijsselsteijn, W.: Investigating privacy attitudes and behavior in relation to personalization. Social Science Computer Review 26(1), 20–43 (2008)
Rubinstein, I.: Big Data: The End of Privacy or a New Beginning? NYU School of Law, Public Law Research Paper (12-56) (2012)
Jiang, X., Hong, J.I., Landay, J.A.: Approximate information flows: Socially-based modeling of privacy in ubiquitous computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 176–193. Springer, Heidelberg (2002)
Shin, D.H.: The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers 22(5) (2010)
Smith, H.J., Dinev, T., Xu, H.: Information privacy research: an interdisciplinary review. . MIS Quarterly 35(4), 989–1016 (2011)
Barkhuus, L., Dey, A.K.: Location-Based Services for Mobile Telephony: a Study of Users’ Privacy Concerns. In: INTERACT, vol. 3, pp. 702–712 (2003)
Koldijk, S.: Automatic recognition of context and stress to support knowledge workers. In: Proceedings of ECCE 2012, Edinburgh, Scotland, August 28-31 (2012)
Wright, D.: The state of the art in privacy impact assessment. . Computer Law & Security Review 28(1), 54–61 (2012)
Cavoukian, A.: Operationalizing Privacy by Design: A Guide to Implementing Strong Privacy Practices. Ontario: Information and Privacy Commissioner of Ontario (2012)
Hoepman, J.H.: Privacy Design Strategies. arXiv preprint arXiv:1210.6621 (2012)
Bodea, G., Huijboom, N., Kazemier, J., Koldijk, S., Koot, G., de Munck, S., Siljee, J.: Context-aware services: privacy concerns and strategies. TNO report (2013)
Compañó, R., Lusoli, W.: The Policy Maker’s Anguish: Regulating Personal Data Behavior Between Paradoxes and Dilemmas. In: Economics of Information Security and Privacy, pp. 169–185. Springer US (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Koldijk, S., Koot, G., Neerincx, M., Kraaij, W. (2014). Privacy and User Trust in Context-Aware Systems. In: Dimitrova, V., Kuflik, T., Chin, D., Ricci, F., Dolog, P., Houben, GJ. (eds) User Modeling, Adaptation, and Personalization. UMAP 2014. Lecture Notes in Computer Science, vol 8538. Springer, Cham. https://doi.org/10.1007/978-3-319-08786-3_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-08786-3_12
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-08785-6
Online ISBN: 978-3-319-08786-3
eBook Packages: Computer ScienceComputer Science (R0)