Stage-oe-small.jpg

Thema4151: Unterschied zwischen den Versionen

Aus Aifbportal
Wechseln zu:Navigation, Suche
Zeile 9: Zeile 9:
 
|Beginn=2018/06/04
 
|Beginn=2018/06/04
 
|Abgabe=2018/08/28
 
|Abgabe=2018/08/28
 +
|Beschreibung DE=In the age of information systems, privacy faces severe threats which can cause harms to the individual and to society. One way to respond to these threats is the use of privacy enhancing technologies (PETs). However, the link between perceived privacy risks and PET adoption remains mostly unanswered throughout literature.
 +
This study takes up a user-centric perspective to explain how individuals respond to privacy threats by using PETs. For this purpose, a grounded theory approach is adopted, and the framework of contextual integrity is applied as privacy conceptualization. Thereby, the relevant factors for users' PET adoption are identified and integrated into one unified
 +
framework.
 +
In conclusion, this study contributes to a better understanding of PETs in their sociotechnical context. In practice, the identified decision criteria in users' PET adoption can be used for a more user-centric technology development, thus advancing the overall
 +
adoption of PETs.
 
}}
 
}}

Version vom 10. April 2019, 07:47 Uhr



Use of Privacy Enhancing Technologies - A Qualitative Study


Philipp Danylak



Informationen zur Arbeit

Abschlussarbeitstyp: Bachelor
Betreuer: Ali Sunyaev, Tobias Dehling
Forschungsgruppe: Critical Information Infrastructures

Archivierungsnummer: 4151
Abschlussarbeitsstatus: Abgeschlossen
Beginn: 04. Juni 2018
Abgabe: 28. August 2018

Weitere Informationen

In the age of information systems, privacy faces severe threats which can cause harms to the individual and to society. One way to respond to these threats is the use of privacy enhancing technologies (PETs). However, the link between perceived privacy risks and PET adoption remains mostly unanswered throughout literature. This study takes up a user-centric perspective to explain how individuals respond to privacy threats by using PETs. For this purpose, a grounded theory approach is adopted, and the framework of contextual integrity is applied as privacy conceptualization. Thereby, the relevant factors for users' PET adoption are identified and integrated into one unified framework. In conclusion, this study contributes to a better understanding of PETs in their sociotechnical context. In practice, the identified decision criteria in users' PET adoption can be used for a more user-centric technology development, thus advancing the overall adoption of PETs.