首页> 外文会议>Annual Conference on Privacy, Security and Trust >Desperately seeking assurances: Segmenting users by their information-seeking preferences
【24h】

Desperately seeking assurances: Segmenting users by their information-seeking preferences

机译:拼命寻求保证:通过他们寻求信息偏好进行分割用户

获取原文

摘要

Users of technology services try to evaluate the risks of disclosing personal information in light of the benefits they believe they will receive. However, because of cognitive, time or other constraints, users concentrate on minimizing the uncertainties of disclosure - reducing their level of privacy concern - by using a limited set of information cues. We suggest an individual's information-seeking behavior is focused on those cues which are important to them. Q methodology was used to determine if users of technology services can be segmented, based on the type of information cues they consider important - many of which are related to technology services' privacy behavior. The study consisted of 58 participants split into two cohorts, who rank-ordered 40 statements describing the attributes of a technology service. In our study, 69% of participants loaded significantly into only one of five groups: 1) Information Controllers; 2) Security Concerned; 3) Benefits Seekers; 4) Crowd Followers; and 5) Organizational Assurance Seekers. Only 12% of participants did not load significantly into any of the five groups. Our findings assist practitioners in understanding how their privacy behavior (e.g. repurposing information) and privacy-sensitive technology design (e.g. providing feedback and control mechanisms) could encourage or discourage the adoption of technology services by different types of users. We argue the user segmentation identified by this study can inform the construction of more holistic privacy personas.
机译:技术服务的用户试图根据他们认为他们会收到的好处评估披露个人信息的风险。然而,由于认知,时间或其他限制,用户专注于最小化披露的不确定性 - 通过使用有限的信息提示来降低其隐私问题的水平 - 降低他们的隐私问题。我们建议个人的寻求信息行为专注于对他们很重要的暗示。 Q方法用于确定技术服务的用户是否可以分割,根据他们认为重要的信息,其中许多与技术服务的隐私行为有关。该研究由58名参与者分成两位队列,他排序的40个陈述,描述了技术服务的属性。在我们的研究中,69%的参与者在五组中只加载到其中一个:1)信息控制器; 2)有关的安全; 3)救助者; 4)人群追随者; 5)组织保证求生者。只有12%的参与者没有大幅加载到五组中的任何一个中。我们的调查结果协助从业人员了解他们的隐私行为(例如,重新播放信息)和隐私敏感技术设计(例如提供反馈和控制机制)可以鼓励或阻止通过不同类型的用户采用技术服务。我们认为本研究确定的用户分割可以告知建设更全面的隐私人员。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号