aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
  • Tools
  • About
  • Big Data
  • Tech

The Privacy paradox: We Claim We Care About Our Data, So Why Don’t Our Actions Match?

  • root
  • August 20, 2020
  • 4 minute read

Imagine how you’d feel if you discovered footage from your private home security camera had been broadcast over the internet. This is exactly what happened to several unsuspecting Australians last month, when the website Insecam streamed their personal lives online.

According to an ABC report, Insecam broadcasts live streams of dozens of Australian businesses and homes at any given time. Some cameras can be accessed because owners don’t secure them. Some may be hacked into despite being “secured”.

When asked if they care about their personal information being shared online, most people say they do. A 2017 survey found 69% of Australians were more concerned about their online privacy than in 2012.

However, a much smaller percentage of people actually take the necessary actions to preserve their privacy. This is referred to as the “privacy paradox”, a concept first studied about two decades ago.

To investigate this phenomenon further, we conducted a research project and found that, despite being concerned about privacy, participants were willing to sacrifice some of it in exchange for the convenience afforded by an internet-connected device.

Unpacking the privacy paradox

Any “smart” device connected to the internet is called an Internet of Things (IoT) device. These can be remotely monitored and controlled by the owners.

The projected growth of IoT devices is staggering. By 2025, they’re expected to reach 75.44 billion – an increase of 146% from 2020.

The global IoT network is a collection of all the interconnected devices that can communicate online. This includes smart devices, appliances and wearable tech.
Shutterstock

Are device owners genuinely concerned about their privacy? Recent worldwide anxiety about personal information shared through COVID-19 tracing apps seems to suggest so.

Read More  New, Free Training Course Teaches Fundamentals Of Serverless On Kubernetes

But as the privacy paradox highlights, users expressing privacy concerns often fail to act in accordance with them. They freely divulge personal information in exchange for services and convenience.

Explanations for the privacy paradox abound. Some suggest:

  • people find it difficult to associate a specific value to their privacy and therefore, the value of protecting it
  • people do not consider their personal information to be their own and thus might not appreciate the need to secure it
  • people completely lack awareness of their right to privacy or privacy issues and believe their desired goals (such as a personalised experience) outweigh the potential risks (such as big tech companies using their data for profiling).

The likely explanation for the privacy paradox is a mix of all these factors.

What if we proved your device harvests data?

To understand whether and how the privacy paradox applies to IoT devices, we conducted an experiment involving 46 Saudi Arabian participants. This is because in Saudi Arabia the use of IoT is exploding and the country does not have strong privacy regulations.

We gave participants a smart plug that let them switch a table lamp on or off using an app on their smartphone. We then showed them the device’s privacy policy and measured participants’ privacy concerns and trust in the device.

None of the participants read the privacy policy. They simply agreed to commence with the study.

After two hours, we presented evidence of how much of their data the IoT-connected plug was harvesting, then remeasured their privacy concerns and trust.

Read More  Google Cloud Next 2019 | Personalized Customer Loyalty At Scale With DSW

After the participants saw evidence of privacy violation, their privacy concerns increased and trust in the device decreased. However their behaviour did not align with their concern, as shown by the fact that:

  • 15 participants continued to use the device regardless
  • 13 continued to use it with their personal information removed
  • only three opted to block all outbound traffic to unusual IP addresses.

The rest preferred “light-touch” responses, such as complaining on social media, complaining to the device’s manufacturer or falsifying their shared information.

After one month, we measured participants’ attitudes a third time and discovered their privacy concerns and trust in the device had reverted to pre-experiment levels.

How to prevent complacency

Two decades since the first privacy paradox studies were conducted and despite a great deal of research, there is still a mismatch between people’s stated privacy concerns and their protective behaviours. How can we improve this?

Every time you connect a new device to the internet, or opt-in to a new service, ask yourself: ‘do I really need this?’ Shutterstock

The first step is to simply be aware our judgement of IoT device risks and benefits may not be accurate. With that in mind, we should always take time to read the privacy policies of our devices.

Besides informing us of the risks, reading privacy policies can help us stop and think before connecting a new device to the internet. Ask yourself: “is this really going to benefit me?”

As citizen surveillance increases, it’s not wise to mindlessly scroll through privacy policies, tick a box and move on.

Read More  Qualcomm And Ericsson Complete World-First Interoperability Milestone To Drive 5G Carrier Aggregation

Second, we should not assume our personal information is trivial and would not interest anyone. Time after time we have witnessed how our digital traces can be valuable to malicious individuals or large corporations.

And finally, always change the default password on any new IoT device to a stronger one. Write down this password and secure it, perhaps with other physical valuables, so you don’t have to worry about forgetting it.The Conversation

 

This article is republished from The Conversation under a Creative Commons license.

root

Related Topics
  • Data Security
  • Data sharing
  • Digital privacy
  • Interconnectedness
  • Internet Of Things
  • Internet privacy
  • IoT
  • Personal data
  • Privacy
  • Privacy in practice
  • Privacy invasion
You May Also Like
View Post
  • Big Data
  • Data

The Benefits And Core Processes Of Data Wrangling

  • March 17, 2023
View Post
  • Software
  • Tech
  • Technology

A New Smartphone Operating System That Puts Privacy First

  • March 10, 2023
View Post
  • Big Data
  • Data
  • Engineering
  • Solutions

Built With BigQuery: How Tamr Delivers Master Data Management At Scale And What This Means For A Data Product Strategy

  • January 25, 2023
View Post
  • Tech

Using IPv6 Unique Local Addresses For Private Connectivity In Google Cloud

  • January 24, 2023
View Post
  • Tech

Get Migrating In 2023: Join Our Upcoming Fireside Chat Featuring Forrester

  • January 24, 2023
View Post
  • Tech

Built With BigQuery: How To Accelerate Data-Centric AI Development With Google Cloud And Snorkel AI

  • January 24, 2023
View Post
  • Insights
  • Tech

What To Expect From CES 2023

  • January 4, 2023
View Post
  • DevOps
  • People
  • Practices
  • Tech

A Better Way To Pass Technical Interviews

  • January 3, 2023

Stay Connected!
LATEST
  • 1
    Kubernetes K8s.gcr.io Redirect: What You Need To Know As An Anthos Or GKE User
    • March 30, 2023
  • 2
    Oracle Helidon Taps Virtual Threads For ‘Pure Performance’
    • March 29, 2023
  • 3
    2022 State Of DevOps Report Data Deep Dive: Good Team Culture
    • March 29, 2023
  • 4
    Google Data Cloud & AI Summit : In Less Than 12 Hours From Now
    • March 29, 2023
  • 5
    A 5-Minute Tour Of The Fediverse
    • March 28, 2023
  • 6
    Bringing Observability To Cloud Security
    • March 28, 2023
  • 7
    How AI Can Improve Digital Security
    • March 27, 2023
  • 8
    Docker’s Bad Week
    • March 27, 2023
  • 9
    My First Pull Request At Age 14
    • March 24, 2023
  • 10
    AWS Chatbot Now Integrated Into Microsoft Teams
    • March 24, 2023
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    Introducing GPT-4 In Azure OpenAI Service
    • March 21, 2023
  • 2
    IBM And Fundación Ikerbasque Partner To Launch Groundbreaking Quantum Computational Center
    • March 24, 2023
  • 3
    Cleveland Clinic And IBM Unveil First Quantum Computer Dedicated To Healthcare Research
    • March 20, 2023
  • 4
    Verify POST Endpoint Availability With Uptime Checks
    • March 24, 2023
  • 5
    Oracle Cloud Infrastructure to Increase the Reliability, Efficiency, and Simplicity of Large-Scale Kubernetes Environments at Reduced Costs
    • March 20, 2023
  • /
  • Platforms
  • Architecture
  • Engineering
  • Programming
  • Tools
  • About

Input your search keywords and press Enter.