Jacob Hopkins (Texas A&M University - Corpus Christi), Carlos Rubio-Medrano (Texas A&M University - Corpus Christi), Cori Faklaris (University of North Carolina at Charlotte)

Data is a critical resource for technologies such as Large Language Models (LLMs) that are driving significant economic gains. Due to its importance, many different organizations are collecting and analyzing as much data as possible to secure their growth and relevance, leading to non-trivial privacy risks. Among the areas with potential for increased privacy risks are voluntary data-sharing events, when individuals willingly exchange their personal data for some service or item. This often places them in positions where they have inadequate control over what data should be exchanged and how it should be used. To address this power imbalance, we aim to obtain, analyze, and dissect the many different behaviors and needs of both parties involved in such negotiations, namely, the data subjects, i.e., the individuals whose data is being exchanged, and the data requesters, i.e., those who want to acquire the data. As an initial step, we are developing a multi-stage user study to better understand the factors that govern the behavior of both data subjects and requesters while interacting in data exchange negotiations. In addition, we aim to identify the design elements that both parties require so that future privacy-enhancing technologies (PETs) prioritizing privacy negotiation algorithms can be further developed and deployed in practice.

View More Papers

Decoupling Permission Management from Cryptography for Privacy-Preserving Systems

Ruben De Smet (Department of Engineering Technology (INDI), Department of Electronics and Informatics (ETRO), Vrije Universiteit Brussel), Tom Godden (Department of Engineering Technology (INDI), Vrije Universiteit Brussel), Kris Steenhaut (Department of Engineering Technology (INDI), Department of Electronics and Informatics (ETRO), Vrije Universiteit Brussel), An Braeken (Department of Engineering Technology (INDI), Vrije Universiteit Brussel)

Read More

ReThink: Reveal the Threat of Electromagnetic Interference on Power...

Fengchen Yang (Zhejiang University; ZJU QI-ANXIN IoT Security Joint Labratory), Zihao Dan (Zhejiang University; ZJU QI-ANXIN IoT Security Joint Labratory), Kaikai Pan (Zhejiang University; ZJU QI-ANXIN IoT Security Joint Labratory), Chen Yan (Zhejiang University; ZJU QI-ANXIN IoT Security Joint Labratory), Xiaoyu Ji (Zhejiang University; ZJU QI-ANXIN IoT Security Joint Labratory), Wenyuan Xu (Zhejiang University; ZJU…

Read More

Towards Establishing a Systematic Security Framework for Next Generation...

Tolga O. Atalay (A2 Labs LLC), Tianyuan Yu (UCLA), Lixia Zhang (UCLA), Angelos Stavrou (A2 Labs LLC)

Read More

Privacy Starts with UI: Privacy Patterns and Designer Perspectives...

Anxhela Maloku (Technical University of Munich), Alexandra Klymenko (Technical University of Munich), Stephen Meisenbacher (Technical University of Munich), Florian Matthes (Technical University of Munich)

Read More