Usage Patterns of Privacy-Enhancing Technologies
- URL: http://arxiv.org/abs/2009.10278v1
- Date: Tue, 22 Sep 2020 02:17:37 GMT
- Title: Usage Patterns of Privacy-Enhancing Technologies
- Authors: Kovila P.L. Coopamootoo
- Abstract summary: This paper contributes to privacy research by eliciting use and perception of use across $43$ privacy methods.
Non-technology methods are among the most used methods in the US, the UK and Germany.
This research provides a broad understanding of use and perceptions across a collection of PETs, and can lead to future research for scaling use of PETs.
- Score: 6.09170287691728
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The steady reports of privacy invasions online paints a picture of the
Internet growing into a more dangerous place. This is supported by reports of
the potential scale for online harms facilitated by the mass deployment of
online technology and the data-intensive web. While Internet users often
express concern about privacy, some report taking actions to protect their
privacy online. We investigate the methods and technologies that individuals
employ to protect their privacy online. We conduct two studies, of N=180 and
N=907, to elicit individuals' use of privacy methods online, within the US, the
UK and Germany. We find that non-technology methods are among the most used
methods in the three countries. We identify distinct groupings of privacy
methods usage in a cluster map. The map shows that together with non-technology
methods of privacy protection, simple PETs that are integrated in services,
form the most used cluster, whereas more advanced PETs form a different, least
used cluster. We further investigate user perception and reasoning for mostly
using one set of PETs in a third study with N=183 participants. We do not find
a difference in perceived competency in protecting privacy online between
advanced and simpler PETs users. We compare use perceptions between advanced
and simpler PETs and report on user reasoning for not using advanced PETs, as
well as support needed for potential use. This paper contributes to privacy
research by eliciting use and perception of use across $43$ privacy methods,
including $26$ PETs across three countries and provides a map of PETs usage.
The cluster map provides a systematic and reliable point of reference for
future user-centric investigations across PETs. Overall, this research provides
a broad understanding of use and perceptions across a collection of PETs, and
can lead to future research for scaling use of PETs.
Related papers
- Masked Differential Privacy [64.32494202656801]
We propose an effective approach called masked differential privacy (DP), which allows for controlling sensitive regions where differential privacy is applied.
Our method operates selectively on data and allows for defining non-sensitive-temporal regions without DP application or combining differential privacy with other privacy techniques within data samples.
arXiv Detail & Related papers (2024-10-22T15:22:53Z) - Collection, usage and privacy of mobility data in the enterprise and public administrations [55.2480439325792]
Security measures such as anonymization are needed to protect individuals' privacy.
Within our study, we conducted expert interviews to gain insights into practices in the field.
We survey privacy-enhancing methods in use, which generally do not comply with state-of-the-art standards of differential privacy.
arXiv Detail & Related papers (2024-07-04T08:29:27Z) - NAP^2: A Benchmark for Naturalness and Privacy-Preserving Text Rewriting by Learning from Human [55.20137833039499]
We suggest sanitizing sensitive text using two common strategies used by humans.
We curate the first corpus, coined NAP2, through both crowdsourcing and the use of large language models.
arXiv Detail & Related papers (2024-06-06T05:07:44Z) - When PETs misbehave: A Contextual Integrity analysis [0.7397067779113841]
We use the theory of Contextual Integrity to explain how privacy technologies may be misused to erode privacy.
We consider three PETs and scenarios: anonymous credentials for age verification, client-side scanning for illegal content detection, and homomorphic encryption for machine learning model training.
arXiv Detail & Related papers (2023-12-05T05:27:43Z) - The Key to Deobfuscation is Pattern of Life, not Overcoming Encryption [0.7124736158080939]
We present a novel methodology that is effective at deobfuscating sources by synthesizing measurements from key locations along protocol transaction paths.
Our approach links online personas with their origin IP addresses based on a Pattern of Life (PoL) analysis.
We show that, when monitoring in the correct places on the Internet, DNS over HTTPS (DoH) and DNS over TLS (DoT) can be deobfuscated with up to 100% accuracy.
arXiv Detail & Related papers (2023-10-04T02:34:29Z) - Protecting User Privacy in Online Settings via Supervised Learning [69.38374877559423]
We design an intelligent approach to online privacy protection that leverages supervised learning.
By detecting and blocking data collection that might infringe on a user's privacy, we can restore a degree of digital privacy to the user.
arXiv Detail & Related papers (2023-04-06T05:20:16Z) - FedBot: Enhancing Privacy in Chatbots with Federated Learning [0.0]
Federated Learning (FL) aims to protect data privacy through distributed learning methods that keep the data in its location.
The POC combines Deep Bidirectional Transformer models and federated learning algorithms to protect customer data privacy during collaborative model training.
The system is specifically designed to improve its performance and accuracy over time by leveraging its ability to learn from previous interactions.
arXiv Detail & Related papers (2023-04-04T23:13:52Z) - Mitigating Sovereign Data Exchange Challenges: A Mapping to Apply
Privacy- and Authenticity-Enhancing Technologies [67.34625604583208]
Authenticity Enhancing Technologies (AETs) and Privacy-Enhancing Technologies (PETs) are considered to engage in Sovereign Data Exchange (SDE)
PETs and AETs are technically complex, which impedes their adoption.
This study empirically constructs a challenge-oriented technology mapping.
arXiv Detail & Related papers (2022-06-20T08:16:42Z) - Equity and Privacy: More Than Just a Tradeoff [10.545898004301323]
Recent work has shown that privacy preserving data publishing can introduce different levels of utility across different population groups.
Will marginal populations see disproportionately less utility from privacy technology?
If there is an inequity how can we address it?
arXiv Detail & Related papers (2021-11-08T17:39:32Z) - Beyond privacy regulations: an ethical approach to data usage in
transportation [64.86110095869176]
We describe how Federated Machine Learning can be applied to the transportation sector.
We see Federated Learning as a method that enables us to process privacy-sensitive data, while respecting customer's privacy.
arXiv Detail & Related papers (2020-04-01T15:10:12Z) - Dis-Empowerment Online: An Investigation of Privacy-Sharing Perceptions
& Method Preferences [6.09170287691728]
We find that perception of privacy empowerment differs from that of sharing across dimensions of meaningfulness, competence and choice.
We find similarities and differences in privacy method preference between the US, UK and Germany.
By mapping the perception of privacy dis-empowerment into patterns of privacy behavior online, this paper provides an important foundation for future research.
arXiv Detail & Related papers (2020-03-19T19:17:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.