fullrecord |
[{"key": "dc.contributor.advisor", "value": "Koskelainen, Tiina", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Tuokkola, Noora", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-12-13T07:00:44Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-12-13T07:00:44Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/98994", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4 pro gradu -tutkielma vastasi kasvavaan tarpeeseen ymm\u00e4rt\u00e4\u00e4 ja suojella k\u00e4ytt\u00e4jien yksityisyytt\u00e4 harhaanjohtavien muotoilukeinojen (tunnetaan my\u00f6s nimill\u00e4 pime\u00e4t k\u00e4yt\u00e4nn\u00f6t ja synk\u00e4t suunnittelumallit) k\u00e4yt\u00f6n lis\u00e4\u00e4ntyess\u00e4 etenkin ev\u00e4stepyynn\u00f6iss\u00e4, joilla on merkitt\u00e4v\u00e4 rooli k\u00e4ytt\u00e4jien mahdollisuuksiin kontrolloida yksityisyytt\u00e4\u00e4n. Tutkimuksessa selvitettiin, millaiseksi k\u00e4ytt\u00e4j\u00e4t havaitsevat yksityisyytens\u00e4 sellaisissa ev\u00e4stepyynn\u00f6iss\u00e4, joissa on k\u00e4ytetty harhaanjohtavaa muotoilua. Lis\u00e4ksi tutkittiin, millainen vaikutus harhaanjohtavalla muotoilulla on n\u00e4ihin havaintoihin. Aiempien tutkimusmallien pohjalta tutkimusta varten luotiin teoreettinen viitekehys ymm\u00e4rt\u00e4m\u00e4\u00e4n k\u00e4ytt\u00e4jien yksityisyyden havaintoja. Viitekehys koostui nelj\u00e4st\u00e4 vaikuttavasta tekij\u00e4st\u00e4, jotka toimivat ohjaavina teemoina l\u00e4pi tutkimuksen: yksityisyyden huolet, kontrolli omasta yksityisyydest\u00e4, luottamus (ev\u00e4ste)tietojen ker\u00e4\u00e4j\u00e4\u00e4 kohtaan ja havaitut riskit yksityisyydelle. Tutkimus toteutettiin menetelm\u00e4triangulaationa yhdistelm\u00e4ll\u00e4 k\u00e4ytt\u00e4j\u00e4testausta, \u00e4\u00e4neenajattelua ja puolistrukturoitua teemahaastattelua, jotta saataisiin mahdollisimman kokonaisvaltainen ymm\u00e4rrys k\u00e4ytt\u00e4jien havainnoista. Tulokset osoittivat, ett\u00e4 harhaanjohtava muotoilu heikensi k\u00e4ytt\u00e4jien havaitsemaa kontrollia yksityisyydest\u00e4\u00e4n sek\u00e4 luottamusta ev\u00e4stetietojen ker\u00e4\u00e4j\u00e4\u00e4 kohtaan. Vaikutus havaittuihin yksityisyyden huoliin ja riskeihin oli v\u00e4h\u00e4isempi ja vaihtelevampi. Vaikka k\u00e4ytt\u00e4j\u00e4t ovat saattaneet tottua siet\u00e4m\u00e4\u00e4n ja sivuuttamaan harhaanjohtavaa muotoilua, niin p\u00e4\u00e4asiallisesti tulokset kuitenkin osoittivat harhaanjohtavan muotoilun negatiivisen vaikutuksen k\u00e4ytt\u00e4jien havaintoihin yksityisyydest\u00e4\u00e4n. Tulokset k\u00e4ytt\u00e4jien yksityisyyden kokonaishavainnoista harhaanjohtavissa ev\u00e4stepyynn\u00f6iss\u00e4 vaihtelivat riippuen muotoilukeinosta ja kontekstista sek\u00e4 k\u00e4ytt\u00e4jien tottumuksista ja kiinnostuksesta omaa yksityisyydensuojaa kohtaan. Siit\u00e4 huolimatta tulokset kuitenkin viittasivat eniten siihen, ett\u00e4 yksityisyys koettiin vaarantuneeksi, aliarvostetuksi ja suojattomaksi. Tulokset yhdess\u00e4 aiemman tutkimuksen ja lains\u00e4\u00e4d\u00e4nn\u00f6n kanssa korostavat tarvetta lopettaa harhaanjohtavan muotoilun k\u00e4ytt\u00f6 ja sitoutua sis\u00e4\u00e4nrakennetun yksityisyydensuojan muotoiluperiaatteisiin.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This master\u2019s thesis contributed to the growing need to understand and protect users\u2019 privacy as deceptive design practices (also known as dark patterns) have become more prevalent and are now commonly found in cookie consent requests, which have an important role in users\u2019 ability to control their privacy. To address this issue, and fill a gap in literature, the study looked at how users perceive their privacy in cookie consent requests that include deceptive patterns, and what the role of deceptive design is in this perception. A theoretical framework for understanding users\u2019 perceptions of privacy, as inspired by previous models of perceived privacy, was proposed, consisting of four influencing factors that were used as guiding themes throughout the study: privacy concerns, control over privacy, trust in the cookie data collector, and perceived privacy risks. The study was conducted with method triangulation, combining user testing, a think-aloud method, and thematic interviews to comprehensively capture users\u2019 perceptions. The study uniquely took a qualitative, user experience-oriented perspective on the topic, addressing deceptive design\u2019s role in the perception. The findings revealed that deceptive design diminishes users\u2019 perceived control over their privacy and their trust in the cookie data collector, while its influence on users\u2019 privacy concerns and perceived privacy risks is more subtle and varied. Although users may have learned to withstand or bypass deceptive design due to its ubiquity, the overarching theme was its negative influence on privacy perceptions. Users\u2019 overall perceptions of privacy in cookie consent requests were fluid, influenced by design, context, and users\u2019 habits and interest in privacy protection. Even though the findings cannot be concluded into one general perception, the findings lean toward users perceiving their privacy as compromised, undervalued, and unprotected. The findings of this study, combined with findings from previous research and legislative measures, all ultimately emphasize the need to discontinue using deceptive design and commit to privacy-protective design guidelines.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2024-12-13T07:00:44Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-12-13T07:00:44Z (GMT). No. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "121", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "CC BY-NC-ND 4.0", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Users' perceptions of privacy in cookie consent requests with deceptive design", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202412137816", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tieteen maisteriohjelma", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Master's Degree Programme in Information Systems", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://creativecommons.org/licenses/by-nc-nd/4.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|