Zekun Cai (Penn State University), Aiping Xiong (Penn State University)

To enhance the acceptance of connected autonomous vehicles (CAVs) and facilitate designs to protect people’s privacy, it is essential to evaluate how people perceive the data collection and use inside and outside the CAVs and investigate effective ways to help them make informed privacy decisions. We conducted an online survey (N = 381) examining participants’ utility-privacy tradeoff and data-sharing decisions in different CAV scenarios. Interventions that may encourage safer data-sharing decisions were also evaluated relative to a control. Results showed that the feedback intervention was effective in enhancing participants’ knowledge of possible inferences of personal information in the CAV scenarios. Consequently, it helped participants make more conservative data-sharing decisions. We also measured participants’ prior experience with connectivity and driver-assistance technologies and obtained its influence on their privacy decisions. We discuss the implications of the results for usable privacy design for CAVs.

View More Papers

Context-Sensitive and Directional Concurrency Fuzzing for Data-Race Detection

Zu-Ming Jiang (Tsinghua University), Jia-Ju Bai (Tsinghua University), Kangjie Lu (University of Minnesota), Shi-Min Hu (Tsinghua University)

Read More

EMS: History-Driven Mutation for Coverage-based Fuzzing

Chenyang Lyu (Zhejiang University), Shouling Ji (Zhejiang University), Xuhong Zhang (Zhejiang University & Zhejiang University NGICS Platform), Hong Liang (Zhejiang University), Binbin Zhao (Georgia Institute of Technology), Kangjie Lu (University of Minnesota), Raheem Beyah (Georgia Institute of Technology)

Read More

Stop to Unlock: Improving the Security of Android Unlock...

Alexander Suchan (SBA Research); Emanuel von Zezschwitz (Usable Security Methods Group, University of Bonn, Bonn, Germany); Katharina Krombholz (CISPA Helmholtz Center for Information Security)

Read More

Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators

Shijia Li (College of Computer Science, NanKai University and the Tianjin Key Laboratory of Network and Data Security Technology), Chunfu Jia (College of Computer Science, NanKai University and the Tianjin Key Laboratory of Network and Data Security Technology), Pengda Qiu (College of Computer Science, NanKai University and the Tianjin Key Laboratory of Network and Data…

Read More