User Diverse Privacy Requirements for V2X-Technology - Quantitative Research on Context-based Privacy Aspects

Teresa Schmidt, Ralf Philipsen, Martina Ziefle

2016

Abstract

The paper will show, how different types of users are evaluating privacy and data security differently according to contextual differentiating traffic situations. The focus is hereby on an analysis of user types to see, if general attributes towards data capture can be identified. User requirements are investigated in age, gender, experience with driver assistance systems and technical affinity. Several significant effects like the influence of prior experience increasing the willingness to share data in an traffic optimizing scenario could be revealed. But results show also an undeniable reluctance towards sharing private data with other traffic participants or companies. Traffic management such as police or the infrastructure itself are however entrusted with various personal information and data.

References

  1. Ardelt, M., Coester, C. and Kaempchen, N., 2012. Highly automated driving on freeways in real traffic using a probabilistic framework. In IEEE Transactions on Intelligent Transportation Systems. Vol. 13(4), pp. 1576-1585.
  2. Beier, G., 1999. Kontrollüberzeugungen im Umgang mit Technik [Locus of control when interacting with technology]. In Report Psychologie, Vol. 24(9), pp. 684-693.
  3. Breuer, J. J., Faulhaber, A., Frank, P. and Gleissner, S., 2007. Real world safety benefits of brake assistance systems. In 20th International Technical Conference on the Enhanced Safety of Vehicles (ESV).
  4. BMVI (Bundesministerium für Verkehr und digitale Infrastruktur), 2014. Verkehr in Zahlen 2014/2015. Hamburg: DVV Media Group GmbH. URL: http://www.bmvi.de/SharedDocs/DE/Artikel/K/verkeh r-in-zahlen.html [last visited on 09-11-2015].
  5. Destatis, 2015. Zahl der Verkehrstoten im August 2015 stark gestiegen. URL: https://www.destatis.de/DE/ PresseService/Presse/Pressemitteilungen/2015/10/PD1 5_392_46241.html [last visited on 09-11-2015].
  6. Dressler, F., Hartenstein, H., Altintas, O. and Tonguz, O., 2014. Inter-vehicle communication: quo vadis. In IEEE Communications Magazine, 52 (6), pp. 170-177.
  7. Endsley, M. R., and Garland, D. J. (Eds.)., 2000. Situation awareness analysis and measurement. CRC Press.
  8. Farmer, C. M., 2004. Effect of electronic stability control on automobile crash risk. In Traffic injury prevention, 5(4), pp. 317-325.
  9. Lefevre, S., Petit, J., Bajcsy, R., Laugier, C. and Kargl, F., 2013. Impact of v2x privacy strategies on intersection collision avoidance systems. In IEEE Vehicular Networking Conference, Boston, United States.
  10. Ma, Z., Kargl, F. and Weber, M., 2009. A location privacy metric for v2x communication systems. In Sarnoff Symposium, SARNOFF'09. IEEE, pp. 1-6.
  11. Picone, M., Busanelli, S., Amoretti, M., Zanichelli, F. and Ferrari, G., 2015. Advanced Technologies for Intelligent Transportation Systems. In Intelligent Systems Reference Library, Vol. 139, Springer International Publishing AG.
  12. Rakotonirainy, A., Schroeter, R. and Soro, A., 2014. Three social car visions to improve driver behaviour. In Pervasive and Mobile Computing, Vol. 14, pp.147-160.
  13. Schmidt, T., Philipsen, R. and Ziefle, M., 2015a. Safety first? V2X - Perceived benefits, barriers and trade-offs of automated driving. In: Proceedings of the 1st International Conference on Vehicle Technology and Intelligent Transport Systems (Vehits 2015). SCITEPRESS, pp. 39-46.
  14. Schmidt, T., Philipsen, R. and Ziefle, M., 2015b. From V2X to Control2Trust - Why trust and control are major attributes in Vehicle2X Technologies. In T. Tryfonas and I. Askoxylakis (Eds.): HAS 2015, LNCS 9190, pp. 570-581, Springer.
  15. simTD, 2013. „TP5-Abschlussbericht - Teil B-2 Nutzerakzeptanz, IT-Sicherheit, Datenschutz und Schutz der Privatsphäre“ URL: http://www.simtd.de/ index.dhtml/object.media/deDE/8127/CS/-/backup publications/ Projektergebnisse/simTD-TP5-Abschlussbericht_Teil_B-2_Nutzerakzeptanz_V10.pdf [last visited on 09-11-2015].
  16. Trivisonno, R., Guerzoni, R., Vaishnavi, I. and Soldani, D., 2015. SDN based 5G mobile networks: architecture, functions, procedures and backward compatibility. In Transactions on Emerging Telecommunications Technologies, Vol. 26(1), pp. 82-92.
  17. Wedel, J. W., Schuenemann, B. and Radusch, I., 2009. V2X-based traffic congestion recognition and avoidance. In Parallel Architectures, Algorithms, and Networks (ISPAN), 10th International Symposium on Pervasive Systems, Algorithms, and Networks. IEEE Computer Society, pp. 637-641.
  18. Yamashita, T., Izumi, K. and Kurumatani, K. 2004. Car navigation with route information sharing for improvement of traffic efficiency. In Intelligent Transportation Systems, 2004. Proceedings. The 7th International IEEE Conference on, pp. 465-470, IEEE.
  19. Ziefle, M., Beul-Leusmann, S., Kasugai, K. and Schwalm, M. 2014. Public perception and acceptance of electric vehicles. In A. Marcus (Ed.): DUXU 2014, PART III: Design, User Experience, and Usability. LNCS 8519, pp. 628-639, Springer.
Download


Paper Citation


in Harvard Style

Schmidt T., Philipsen R. and Ziefle M. (2016). User Diverse Privacy Requirements for V2X-Technology - Quantitative Research on Context-based Privacy Aspects . In Proceedings of the International Conference on Vehicle Technology and Intelligent Transport Systems - Volume 1: VEHITS, ISBN 978-989-758-185-4, pages 60-67. DOI: 10.5220/0005809000600067


in Bibtex Style

@conference{vehits16,
author={Teresa Schmidt and Ralf Philipsen and Martina Ziefle},
title={User Diverse Privacy Requirements for V2X-Technology - Quantitative Research on Context-based Privacy Aspects},
booktitle={Proceedings of the International Conference on Vehicle Technology and Intelligent Transport Systems - Volume 1: VEHITS,},
year={2016},
pages={60-67},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005809000600067},
isbn={978-989-758-185-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Vehicle Technology and Intelligent Transport Systems - Volume 1: VEHITS,
TI - User Diverse Privacy Requirements for V2X-Technology - Quantitative Research on Context-based Privacy Aspects
SN - 978-989-758-185-4
AU - Schmidt T.
AU - Philipsen R.
AU - Ziefle M.
PY - 2016
SP - 60
EP - 67
DO - 10.5220/0005809000600067