首页> 外文会议>Annual Conference on Privacy, Security and Trust >Desperately seeking assurances: Segmenting users by their information-seeking preferences
【24h】

Desperately seeking assurances: Segmenting users by their information-seeking preferences

机译:拼命寻求保证:按用户的信息搜索偏好对其进行细分

获取原文

摘要

Users of technology services try to evaluate the risks of disclosing personal information in light of the benefits they believe they will receive. However, because of cognitive, time or other constraints, users concentrate on minimizing the uncertainties of disclosure - reducing their level of privacy concern - by using a limited set of information cues. We suggest an individual's information-seeking behavior is focused on those cues which are important to them. Q methodology was used to determine if users of technology services can be segmented, based on the type of information cues they consider important - many of which are related to technology services' privacy behavior. The study consisted of 58 participants split into two cohorts, who rank-ordered 40 statements describing the attributes of a technology service. In our study, 69% of participants loaded significantly into only one of five groups: 1) Information Controllers; 2) Security Concerned; 3) Benefits Seekers; 4) Crowd Followers; and 5) Organizational Assurance Seekers. Only 12% of participants did not load significantly into any of the five groups. Our findings assist practitioners in understanding how their privacy behavior (e.g. repurposing information) and privacy-sensitive technology design (e.g. providing feedback and control mechanisms) could encourage or discourage the adoption of technology services by different types of users. We argue the user segmentation identified by this study can inform the construction of more holistic privacy personas.
机译:技术服务的用户试图根据他们认为将获得的利益来评估披露个人信息的风险。但是,由于认知,时间或其他限制,用户会通过使用一组有限的信息提示,将披露的不确定性降至最低,从而降低他们对隐私的关注程度。我们建议个人的信息寻求行为应集中在对他们很重要的线索上。 Q方法用于根据技术线索的用户认为重要的信息提示的类型来确定是否可以对技术服务的用户进行细分-其中许多信息提示与技术服务的隐私行为有关。该研究由58名参与者组成,分为两组,他们对描述技术服务属性的40条陈述进行了排序。在我们的研究中,有69%的参与者仅将其大量地分为以下五个组之一:1)信息控制者; 2)信息控制者。 2)有关安全性; 3)利益寻求者; 4)人群追随者; 5)组织保证寻求者。只有12%的参与者没有明显地进入五个组中的任何一个。我们的发现有助于从业人员了解他们的隐私行为(例如重新使用信息)和对隐私敏感的技术设计(例如提供反馈和控制机制)如何鼓励或阻止不同类型的用户采用技术服务。我们认为,这项研究确定的用户细分可以为整体隐私角色的构建提供信息。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号