Abstract
In this chapter we describe one of the pilots of the ABC4Trust project that we developed in order to offer privacy-preserving course evaluations at universities. The distinctive feature of this application is that the pilot system can authenticate students, with respect to their eligibility to evaluate a course, without requiring from them any identifying information. Thus, it is impossible for the system to link participants with their evaluations and, therefore, participants’ privacy is protected while the system is certain to receive evaluations only from eligible participants. In this chapter we describe the pilot context, the high level architecture of the pilot system as well as a questionnaire-based evaluation process for user acceptance. Along with a usability evaluation of the pilot prototype, we considered possible user acceptance factors for Privacy-ABCs and developed a novel model of user acceptance in a privacy critical setting.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Joerg Abendroth, Vasiliki Liagkou, Apostolos Pyrgelis, Christoforos Raptopoulos, Ahmad Sabouri, Eva Schlehahn, Yannis Stamatiou, and Harald Zwingelberg. D7.1 application description for students, 2012. https://abc4trust.eu/download/ABC4Trust-D7.1-Application-Description-Students.pdf.
Anick Bosmans and Hans Baumgartner. Goal-relevant emotional information: When extraneous affect leads to persuasion and when it does not. Journal of Consumer Research, 32(3):424–434, 2005.
Zinaida Benenson, Anna Girard, Ioannis Krontiris, Vassia Liagkou, Kai Rannenberg, and Yannis Stamatiou. User acceptance of privacy-abcs: An exploratory study. In HCI International: Human Aspects of Information Security, Privacy and Trust, 2014. (to appear).
Souheil Bcheri, Norbert Götze, Vasiliki Liagkou, Apostolos Pyrgelis, Christoforos Raptopoulos, Yannis Stamatiou, Katalin Storf, Peder Wängmark, and Harald Zwingelberg. D5.1 scenario definition for both pilots, 2012. https://abc4trust.eu/download/ABC4Trust-D5.1-Scenario-Definition.pdf.
John Brooke. SUS - A quick and dirty usability scale. Usability evaluation in industry, 189:194, 1996.
Lorrie Faith Cranor and Simson Garfinkel. Security and Usability: Designing Secure Systems that People Can Use. O’Reilly, 2005.
Jacob Cohen. Statistical power analysis for the behavioral sciences. Lawrence Erlbaum Associates, Inc, 1988.
Fred D. Davis. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly, pages 319–340, 1989.
Fred D. Davis. User acceptance of information technology: system characteristics, user perceptions and behavioral impacts. International Journal of Man-Machine Studies, 38(3):475–487, 1993.
Daniel Deibler, Malte Engeler, Ioannis Krontiris, Vasiliki Liagkou, Apostolos Pyrgelis, Eva Schlehahn, Yannis Stamatiou, Welderufaelr Tesfay, and Harald Zwingelberg. D7.3 evaluation of the student pilot, 2014. https://abc4trust.eu/index.php/pub/deliverables.
Kasper Damgaard, Hamza Ghani, Norbert Götze, Anja Lehmann, Vasiliki Liagkou, Jesus Luna, Gert Læssøe Mikkelsen, Apostolos Pyrgelis, and Yannis Stamatiou. D7.2 necessary hardware and software package for the student pilot deployment, 2012. https://abc4trust.eu/download/ABC4Trust-D7.2.Hard-and-Software-Package-for-Student-Pilot.pdf.
Tamara Dinev and Paul Hart. Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10(2):7–29, 2006.
Andy Field. Discovering statistics using IBM SPSS statistics. Sage, 2013.
Chin-Lung Hsu and Hsi-Peng Lu. Why do people play on-line games? An extended tam with social influences and flow experience. Information & Management, 41(7):853–868, 2004.
ISO/IEC. 9241-11 Ergonomic requirements for office work with visual display terminals (VDT)s - Part 11 Guidance on usability. 1998:ISO/IEC 9241-11: 1998 (E).
James R. Lewis. IBM computer usability satisfaction questionnaires: psychometric evaluation and instructions for use. International Journal of Human-Computer Interaction, 7(1):57–78, 1995.
Rensis Likert. A technique for the measurement of attitudes. Archives of psychology, 1932.
James R. Lewis, Brian S. Utesch, and Deborah E. Maher. UMUXLITE: when there’s no time for the SUS. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 2099–2102. ACM, 2013.
D. Harrison McKnight, Michelle Carter, Jason Bennett Thatcher, and Paul F. Clay. Trust in a specific technology: An investigation of its components and measures. ACM Transactions on Management Information Systems (TMIS), 2(2):12, 2011.
Paul A. Pavlou. Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. International journal of electronic commerce, 7(3):101–134, 2003.
Georg Regal, Marc Busch, Stephanie Deutsch, Christina Hochleitner, Martin Lugmayr, and Manfred Tscheligi. Money on the move workload, usability and technology acceptance of second-screen atminteractions. In Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services, pages 281–284. ACM, 2013.
Sarah Spiekermann and Lorrie Faith Cranor. Engineering privacy. Software Engineering, IEEE Transactions on, 35(1), 2009.
Sarah Spiekermann. Privacy enhancing technologies for RFID in retail – an empirical investigation. In UbiComp 2007: Ubiquitous Computing, pages 56–72. Springer, 2007.
Sarah Spiekermann. User control in ubiquitous computing: design alternatives and user acceptance. Shaker, 2008.
San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, and Konstantin Beznosov. What makes users refuse web single sign-on?: an empirical investigation of OpenID. In Proceedings of the Seventh Symposium on Usable Privacy and Security, page 4. ACM, 2011.
Viswanath Venkatesh and Hillol Bala. Technology acceptance model 3 and a research agenda on interventions. Decision sciences, 39(2):273–315, 2008.
Viswanath Venkatesh and Fred D. Davis. A theoretical extension of the technology acceptance model: four longitudinal field studies. Management science, 46(2):186–204, 2000.
Erik Wästlund, Julio Angulo, and Simone Fischer-Hübner. Evoking comprehensive mental models of anonymous credentials. In Open Problems in Network Security, pages 1–14. Springer, 2012.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Stamatiou, Y. et al. (2015). Course Evaluation in Higher Education: the Patras Pilot of ABC4Trust. In: Rannenberg, K., Camenisch, J., Sabouri, A. (eds) Attribute-based Credentials for Trust. Springer, Cham. https://doi.org/10.1007/978-3-319-14439-9_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-14439-9_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-14438-2
Online ISBN: 978-3-319-14439-9
eBook Packages: Business and EconomicsBusiness and Management (R0)