Firms increasingly use social network sites to reach out to customers and proactively intervene with observed consumer messages. Despite intentions to enhance customer satisfaction by extending customer service, sometimes these interventions are received negatively by consumers. We draw on privacy regulation theory to theorize how proactive customer service interventions with consumer messages on social network sites may evoke feelings of privacy infringement. Subsequently we use privacy calculus theory to propose how these perceptions of privacy infringement, together with the perceived usefulness of the intervention, in turn drive customer satisfaction. In two experiments, we find that feelings of privacy infringement associated with proactive interventions may explain why only reactive interventions enhance customer satisfaction. Moreover, we find that customer satisfaction can be modeled through the calculus of the perceived usefulness and feelings of privacy infringement associated with an intervention. These findings contribute to a better understanding of the impact of privacy concerns on consumer behavior in the context of firm–consumer interactions on social network sites, extend the applicability of privacy calculus theory, and contribute to complaint and compliment management literature. To practitioners, our findings demonstrate that feelings of privacy are an element to consider when handling consumer messages on social media, but also that privacy concerns may be overcome if an intervention is perceived as useful enough.
MULTIFILE
Smart speakers are heralded to make everyday life more convenient in households around the world. These voice-activated devices have become part of intimate domestic contexts in which users interact with platforms.This chapter presents a dualstudy investigating the privacy perceptions of smart speaker users and non-users. Data collected in in-depth interviews and focus groups with Dutch users and non-users show that they make sense of privacy risks through imagined sociotechnical affordances. Imagined affordances emerge with the interplay between user expectations, technologies, and designer intentions. Affordances like controllability, assistance, conversation, linkability, recordability, and locatability are associated with privacy considerations. Viewing this observation in the light of privacy calculus theory, we provide insights into how users’ positive experiences of the control over and assistance in the home offered by smart speakers outweighs privacy concerns. On the contrary, non-users reject the devices because of fears that recordability and locatability would breach the privacy of their homes by tapping data to platform companies. Our findings emphasize the dynamic nature of privacy calculus considerations and how these interact with imagined affordances; establishing a contrast between rational and emotional responses relating to smart speaker use.Emotions play a pivotal role in adoption considerations whereby respondents balance fears of unknown malicious actors against trust in platform companies.This study paves the way for further research that examines how surveillance in the home is becoming increasingly normalized by smart technologies.
This investigation explores relations between 1) a theory of human cognition, called Embodied Cognition, 2) the design of interactive systems and 3) the practice of ‘creative group meetings’ (of which the so-called ‘brainstorm’ is perhaps the best-known example). The investigation is one of Research-through-Design (Overbeeke et al., 2006). This means that, together with students and external stakeholders, I designed two interactive prototypes. Both systems contain a ‘mix’ of both physical and digital forms. Both are designed to be tools in creative meeting sessions, or brainstorms. The tools are meant to form a natural, element in the physical meeting space. The function of these devices is to support the formation of shared insight: that is, the tools should support the process by which participants together, during the activity, get a better grip on the design challenge that they are faced with. Over a series of iterations I reflected on the design process and outcome, and investigated how users interacted with the prototypes.
'The Data Tales' is een langdurig samenwerkingsverband van onderzoekers en bedrijven die samen projecten uitvoeren en vragen beantwoorden als: hoe kan data ons helpen de relatie met klanten te verbeteren en hoe beschermen we privacy van de klant als we die klant ook beter van dienst zijn willen zijn met data technieken?Doel The Data Tales consortium wil bedrijven helpen om beter met hun klanten om te gaan. Want als bedrijven naar hun klanten luisteren, versterken ze hun band. Techniek biedt allerlei opties om sneller, gerichter en zinvoller te reageren op de behoeften van klanten. Daarbij moeten de toon, inhoud en presentatie van de boodschap aansluiten bij de geadresseerde. Het doel van The Data Tales is om samen met onderwijs, bedrijven en technologie-ontwikkelaars te werken aan technieken om direct inzicht te geven in hoe hun klanten de interactie met organisaties ervaren. Daarbij wordt altijd gewerkt volgens het principe 'ethics by design' Resultaten Consortium The Data Tales vormde de basis voor het KIEM-project, VERBIND. Dat staat voor verantwoorde, belevingsgerichte interactie op basis van data-analyse. VERBIND brengt meerdere invalshoeken samen. We kijken niet alleen naar wat technisch mogelijk is bij dataverzameling, maar ook naar ethische keuzes die bedrijven maken. Op thedatatales.org lees je meer over het project VERBIND. Looptijd 01 januari 2018 - 31 december 2020 Aanpak In het Data Tales consortium komen de volgende vakgebieden samen: Customer Journey & marketing Data Science, waaronder process mining, text mining en andere vormen van data mining Recht en Ethiek, waaronder AVG Gedragswetenschappen ICT
During the coronavirus pandemic, the use of eHealth tools became increasingly demanded by patients and encouraged by the Dutch government. Yet, HBO health professionals demand clarity on what they can do, must do, and cannot do with the patients’ data when using digital healthcare provision and support. They often perceive the EU GDPR and its national application as obstacles to the use of eHealth due to strict health data processing requirements. They highlight the difficulty of keeping up with the changing rules and understanding how to apply them. Dutch initiatives to clarify the eHealth rules include the 2021 proposal of the wet Elektronische Gegevensuitwisseling in de Zorg and the establishment of eHealth information and communication platforms for healthcare practitioners. The research explores whether these initiatives serve the needs of HBO health professionals. The following questions will be explored: - Do the currently applicable rules and the proposed wet Elektronische Gegevensuitwisseling in de Zorg clarify what HBO health practitioners can do, must do, and cannot do with patients’ data? - Does the proposed wet Elektronische Gegevensuitwisseling in de Zorg provide better clarity on the stakeholders who may access patients’ data? Does it ensure appropriate safeguards against the unauthorized use of such data? - Does the proposed wet Elektronische Gegevensuitwisseling in de Zorg clarify the EU GDPR requirements for HBO health professionals? - Do the eHealth information and communication platforms set up for healthcare professionals provide the information that HBO professionals need on data protection and privacy requirements stemming from the EU GDPR and from national law? How could such platforms be better adjusted to the HBO professionals’ information and communication needs? Methodology: Practice-oriented legal research, semi-structured interviews and focus group discussions will be conducted. Results will be translated to solutions for HBO health professionals.
This project addresses the fundamental societal problem that encryption as a technique is available since decades, but has never been widely adopted, mostly because it is too difficult or cumbersome to use for the public at large. PGP illustrates this point well: it is difficult to set-up and use, mainly because of challenges in cryptographic key management. At the same time, the need for encryption has only been growing over the years, and has become an urgent problem with stringent requirements – for instance for electronic communication between doctors and patients – in the General Data Protection Regulation (GDPR) and with systematic mass surveillance activities of internationally operating intelligence agencies. The interdisciplinary project "Encryption for all" addresses this fundamental problem via a combination of cryptographic design and user experience design. On the cryptographic side it develops identity-based and attribute-based encryption on top of the attribute-based infrastructure provided by the existing IRMA-identity platform. Identity-based encryption (IBE) is a scientifically well-established technique, which addresses the key management problem in an elegant manner, but IBE has found limited application so far. In this project it will be developed to a practically usable level, exploiting the existing IRMA platform for identification and retrieval of private keys. Attribute-based encryption (ABE) has not reached the same level of maturity yet as IBE, and will be a topic of further research in this project, since it opens up attractive new applications: like a teacher encrypting for her students only, or a company encrypting for all employees with a certain role in the company. On the user experience design side, efforts will be focused on making these encryption techniques really usable (i.e., easy to use, effective, efficient, error resistant) for everyone (e.g., also for people with disabilities or limited digital skills). To do so, an iterative, human-centred and inclusive design approach will be adopted. On a fundamental level, scientific questions will be addressed, such as how to promote the use of security and privacy-enhancing technologies through design, and whether and how usability and accessibility affect the acceptance and use of encryption tools. Here, theories of nudging and boosting and the unified theory of technology acceptance and use (known as UTAUT) will serve as a theoretical basis. On a more applied level, standards like ISO 9241-11 on usability and ISO 9241-220 on the human-centred design process will serve as a guideline. Amongst others, interface designs will be developed and focus groups, participatory design sessions, expert reviews and usability evaluations with potential users of various ages and backgrounds will be conducted, in a user experience and observation laboratory available at HAN University of Applied Sciences. In addition to meeting usability goals, ensuring that the developed encryption techniques also meet national and international accessibility standards will be a particular point of focus. With respect to usability and accessibility, the project will build on the (limited) usability design experiences with the mobile IRMA application.