Skip to main content
Top

2024 | OriginalPaper | Chapter

Factors of Intention to Use a Photo Tool: Comparison Between Privacy-Enhancing and Non-privacy-enhancing Tools

Authors : Vanessa Bracamonte, Sebastian Pape, Sascha Löbner

Published in: ICT Systems Security and Privacy Protection

Publisher: Springer Nature Switzerland

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Tools that detect and transform privacy sensitive information in user content have been proposed to enhance privacy in contexts such as social media. However, previous research has found that privacy-related concerns can be higher in these types of tools compared to similar non-privacy tools. In this paper, we focus on adoption of these tools and investigate how the knowledge that a data-processing tool has a privacy purpose affects privacy-related factors of intention to use such a tool, when compared with a similar tool with a non-privacy-related purpose. We conducted a user study where we described a privacy-enhancing and a non-privacy-enhancing photo manipulation app to two groups of participants. The results show that general and context-specific privacy-related perception has different effects for the two types of apps. In particular, although participants perceived the same level of privacy risk towards both types of apps, this risk only had a significant negative effect on intention to use in the case of the privacy-enhancing app. Furthermore, disposition to value privacy increased both perceived risk and intention to use the privacy-enhancing app. We discuss these findings in the context of the diffusion of privacy-enhancing tools for user content.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bracamonte, V., Pape, S., Loebner, S.: “All apps do this”: comparing privacy concerns towards privacy tools and non-privacy tools for social media content. Proc. Priv. Enhancing Technol. 2022(3) (2022) Bracamonte, V., Pape, S., Loebner, S.: “All apps do this”: comparing privacy concerns towards privacy tools and non-privacy tools for social media content. Proc. Priv. Enhancing Technol. 2022(3) (2022)
2.
go back to reference Bracamonte, V., Tesfay, W.B., Kiyomoto, S.: Towards exploring user perception of a privacy sensitive information detection tool. In: 7th International Conference on Information Systems Security and Privacy (2021) Bracamonte, V., Tesfay, W.B., Kiyomoto, S.: Towards exploring user perception of a privacy sensitive information detection tool. In: 7th International Conference on Information Systems Security and Privacy (2021)
4.
go back to reference Dijkstra, T.K., Henseler, J.: Consistent partial least squares path modeling. MIS Q. 39(2), 297–316 (2015)CrossRef Dijkstra, T.K., Henseler, J.: Consistent partial least squares path modeling. MIS Q. 39(2), 297–316 (2015)CrossRef
7.
go back to reference Hair, J., Hult, G.T.M., Ringle, C., Sarstedt, M., Danks, N., Ray, S.: Partial Least Squares Structural Equation Modeling (PLS-SEM) Using R: A Workbook (2021) Hair, J., Hult, G.T.M., Ringle, C., Sarstedt, M., Danks, N., Ray, S.: Partial Least Squares Structural Equation Modeling (PLS-SEM) Using R: A Workbook (2021)
8.
go back to reference Hair, J.F., Risher, J.J., Sarstedt, M., Ringle, C.M.: When to use and how to report the results of PLS-SEM. Eur. Bus. Rev. (2019) Hair, J.F., Risher, J.J., Sarstedt, M., Ringle, C.M.: When to use and how to report the results of PLS-SEM. Eur. Bus. Rev. (2019)
13.
go back to reference Henseler, J.: PLS-MGA: a non-parametric approach to partial least squares-based multi-group analysis. In: Gaul, W., Geyer-Schulz, A., Schmidt-Thieme, L., Kunze, J. (eds.) Challenges at the Interface of Data Analysis, Computer Science, and Optimization. STUDIES CLASS, pp. 495–501. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-24466-7_50CrossRef Henseler, J.: PLS-MGA: a non-parametric approach to partial least squares-based multi-group analysis. In: Gaul, W., Geyer-Schulz, A., Schmidt-Thieme, L., Kunze, J. (eds.) Challenges at the Interface of Data Analysis, Computer Science, and Optimization. STUDIES CLASS, pp. 495–501. Springer, Heidelberg (2012). https://​doi.​org/​10.​1007/​978-3-642-24466-7_​50CrossRef
14.
go back to reference Henseler, J., Ringle, C.M., Sarstedt, M.: Testing measurement invariance of composites using partial least squares. Int. Mark. Rev. (2016) Henseler, J., Ringle, C.M., Sarstedt, M.: Testing measurement invariance of composites using partial least squares. Int. Mark. Rev. (2016)
16.
go back to reference Kang, R., Brown, S., Dabbish, L., Kiesler, S.: Privacy attitudes of mechanical Turk workers and the U.S. public. In: 10th Symposium on Usable Privacy and Security (SOUPS 2014), pp. 37–49 (2014) Kang, R., Brown, S., Dabbish, L., Kiesler, S.: Privacy attitudes of mechanical Turk workers and the U.S. public. In: 10th Symposium on Usable Privacy and Security (SOUPS 2014), pp. 37–49 (2014)
18.
go back to reference Kock, N., Hadaya, P.: Minimum sample size estimation in PLS-SEM: the inverse square root and gamma-exponential methods. Inf. Syst. J. 28(1), 227–261 (2018)CrossRef Kock, N., Hadaya, P.: Minimum sample size estimation in PLS-SEM: the inverse square root and gamma-exponential methods. Inf. Syst. J. 28(1), 227–261 (2018)CrossRef
19.
go back to reference Kokolakis, S.: Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122–134 (2017)CrossRef Kokolakis, S.: Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122–134 (2017)CrossRef
20.
go back to reference Korayem, M., Templeman, R., Chen, D., Crandall, D., Kapadia, A.: Enhancing lifelogging privacy by detecting screens. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI 2016, pp. 4309–4314. Association for Computing Machinery (2016). https://doi.org/10.1145/2858036.2858417 Korayem, M., Templeman, R., Chen, D., Crandall, D., Kapadia, A.: Enhancing lifelogging privacy by detecting screens. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI 2016, pp. 4309–4314. Association for Computing Machinery (2016). https://​doi.​org/​10.​1145/​2858036.​2858417
21.
go back to reference Li, Y., Vishwamitra, N., Knijnenburg, B.P., Hu, H., Caine, K.: Effectiveness and users’ experience of obfuscation as a privacy-enhancing technology for sharing photos. Proc. ACM Hum.-Comput. Interact. 1(CSCW), 67:1–67:24 (2017). https://doi.org/10.1145/3134702 Li, Y., Vishwamitra, N., Knijnenburg, B.P., Hu, H., Caine, K.: Effectiveness and users’ experience of obfuscation as a privacy-enhancing technology for sharing photos. Proc. ACM Hum.-Comput. Interact. 1(CSCW), 67:1–67:24 (2017). https://​doi.​org/​10.​1145/​3134702
24.
go back to reference Pavlou, P.A.: Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int. J. Electron. Commer. 7(3), 101–134 (2003)CrossRef Pavlou, P.A.: Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int. J. Electron. Commer. 7(3), 101–134 (2003)CrossRef
25.
go back to reference Ringle, C.M., Wende, S., Becker, J.M.: SmartPLS 3 (2015) Ringle, C.M., Wende, S., Becker, J.M.: SmartPLS 3 (2015)
26.
go back to reference Sarstedt, M., Hair, J.F., Ringle, C.M., Thiele, K.O., Gudergan, S.P.: Estimation issues with PLS and CBSEM: where the bias lies! J. Bus. Res. 69(10), 3998–4010 (2016)CrossRef Sarstedt, M., Hair, J.F., Ringle, C.M., Thiele, K.O., Gudergan, S.P.: Estimation issues with PLS and CBSEM: where the bias lies! J. Bus. Res. 69(10), 3998–4010 (2016)CrossRef
28.
go back to reference Sleeper, M., et al.: “I read my Twitter the next morning and was astonished”: a conversational perspective on Twitter regrets. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2013, pp. 3277–3286. Association for Computing Machinery (2013). https://doi.org/10.1145/2470654.2466448 Sleeper, M., et al.: “I read my Twitter the next morning and was astonished”: a conversational perspective on Twitter regrets. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2013, pp. 3277–3286. Association for Computing Machinery (2013). https://​doi.​org/​10.​1145/​2470654.​2466448
31.
go back to reference Venkatesh, V., Thong, J.Y., Xu, X.: Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Q. 157–178 (2012) Venkatesh, V., Thong, J.Y., Xu, X.: Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Q. 157–178 (2012)
32.
go back to reference Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P.G., Cranor, L.F.: “I regretted the minute I pressed share”: a qualitative study of regrets on Facebook. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS 2011, pp. 1–16. Association for Computing Machinery (2011). https://doi.org/10.1145/2078827.2078841 Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P.G., Cranor, L.F.: “I regretted the minute I pressed share”: a qualitative study of regrets on Facebook. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS 2011, pp. 1–16. Association for Computing Machinery (2011). https://​doi.​org/​10.​1145/​2078827.​2078841
Metadata
Title
Factors of Intention to Use a Photo Tool: Comparison Between Privacy-Enhancing and Non-privacy-enhancing Tools
Authors
Vanessa Bracamonte
Sebastian Pape
Sascha Löbner
Copyright Year
2024
DOI
https://doi.org/10.1007/978-3-031-56326-3_23

Premium Partner