UCL Discovery
UCL home » Library Services » Electronic resources » UCL Discovery

Desperately seeking assurances: segmenting users by their information-seeking preferences: A Q methodology study of users’ ranking of privacy, security & trust cues

Morton, AJ; Sasse, MA; (2014) Desperately seeking assurances: segmenting users by their information-seeking preferences: A Q methodology study of users’ ranking of privacy, security & trust cues. In: PST2014 International Conference on Privacy, Security and Trust Proceedings. IEEE Green open access

[thumbnail of Desperately Seeking Assurances - Segmenting Users by their Information-Seeking Preferences - A Q Methodology Study of Users’ Ranking of Privacy, Security & Trust Cues.pdf]
Preview
PDF
Desperately Seeking Assurances - Segmenting Users by their Information-Seeking Preferences - A Q Methodology Study of Users’ Ranking of Privacy, Security & Trust Cues.pdf
Available under License : See the attached licence file.

Download (494kB)

Abstract

Users of technology services try to evaluate the risks of disclosing personal information in light of the benefits they believe they will receive. However, because of cognitive, time or other constraints, users concentrate on minimizing the uncertainties of disclosure – reducing their level of privacy concern – by using a limited set of information cues. We suggest an individual’s information-seeking behavior is focused on those cues which are important to them. Q methodology was used to determine if users of technology services can be segmented, based on the type of information cues they consider important – many of which are related to technology services’ privacy behavior. The study consisted of 58 participants split into two cohorts, who rank-ordered 40 statements describing the attributes of a technology service. In our study, 69% of participants loaded significantly into only one of five groups: 1) Information Controllers; 2) Security Concerned; 3) Benefits Seekers; 4) Crowd Followers; and 5) Organizational Assurance Seekers. Only 12% of participants did not load significantly into any of the five groups. Our findings assist practitioners in understanding how their privacy behavior (e.g. repurposing information) and privacy-sensitive technology design (e.g. providing feedback and control mechanisms) could encourage or discourage the adoption of technology services by different types of users. We argue the user segmentation identified by this study can inform the construction of more holistic privacy personas

Type: Proceedings paper
Title: Desperately seeking assurances: segmenting users by their information-seeking preferences: A Q methodology study of users’ ranking of privacy, security & trust cues
Event: PST2014
Location: Toronto
Dates: 2014-07-23 - 2014-07-24
Open access status: An open access version is available from UCL Discovery
Publisher version: http://ieeexplore.ieee.org/Xplore/home.jsp
Language: English
Additional information: © 2014 IEEE. Personal use of this material (accepted version) is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Keywords: Information privacy, Q methodology, Information-seeking behaviors, Privacy concern, Trust
UCL classification: UCL
UCL > Provost and Vice Provost Offices > UCL BEAMS
UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science
UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science > Dept of Computer Science
URI: https://discovery.ucl.ac.uk/id/eprint/1443292
Downloads since deposit
345Downloads
Download activity - last month
Download activity - last 12 months
Downloads by country - last 12 months

Archive Staff Only

View Item View Item