Modern Socio-Technical Perspectives on Privacy.

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Place / Publishing House:Cham : : Springer International Publishing AG,, 2022.
Ã2022.
Year of Publication:2022
Edition:1st ed.
Language:English
Online Access:
Physical Description:1 online resource (459 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 11076nam a22004933i 4500
001 5006885922
003 MiAaPQ
005 20240229073845.0
006 m o d |
007 cr cnu||||||||
008 240229s2022 xx o ||||0 eng d
020 |a 9783030827861  |q (electronic bk.) 
020 |z 9783030827854 
035 |a (MiAaPQ)5006885922 
035 |a (Au-PeEL)EBL6885922 
035 |a (OCoLC)1298394549 
040 |a MiAaPQ  |b eng  |e rda  |e pn  |c MiAaPQ  |d MiAaPQ 
050 4 |a QA76.9.A25 
100 1 |a Knijnenburg, Bart P. 
245 1 0 |a Modern Socio-Technical Perspectives on Privacy. 
250 |a 1st ed. 
264 1 |a Cham :  |b Springer International Publishing AG,  |c 2022. 
264 4 |c Ã2022. 
300 |a 1 online resource (459 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Intro -- Foreword -- Acknowledgement -- Contents -- 1 Introduction and Overview -- 1.1 Introduction -- 1.2 What Is Privacy? -- 1.3 Privacy Theory and Methods -- 1.4 Domains -- 1.5 Audiences -- 1.6 Moving Forward -- 1.7 Conclusion -- References -- Part I Privacy Theory and Methods -- 2 Privacy Theories and Frameworks -- 2.1 Introduction -- 2.2 Privacy as Information Disclosure -- 2.2.1 Privacy Calculus: Assessing the Benefit vs. Cost of Information Disclosures -- 2.2.2 Privacy Paradox: The Discrepancy Between Users' Privacy Concerns and Information Disclosure Behavior -- 2.2.3 Westin's Privacy Taxonomy: The Classification of Consumers' Privacy Knowledge and Preferences -- 2.3 Privacy as an Interpersonal Boundary Regulation Process -- 2.3.1 Altman's Conceptualization of Privacy -- 2.3.2 Petronio's Communication Privacy Management Theory -- 2.4 Privacy as Social Context, Norms, and Values -- 2.4.1 Considering Social Contexts -- 2.4.2 Identifying Privacy Norms and Human Values in Design -- 2.4.3 Applying Contextual Integrity to Practice -- 2.5 A Privacy Affordance and Design Perspective -- 2.5.1 Privacy Affordances -- 2.5.2 Privacy by Design -- 2.6 The Future of Modern Privacy: Individual Differences and User-Centered Privacy -- 2.7 Guidelines for Applying Privacy Frameworks in Practice -- 2.8 Chapter Summary -- References -- 3 Revisiting APCO -- 3.1 Introduction -- 3.2 The APCO Model -- 3.2.1 The Antecedents of Privacy Concerns -- 3.2.2 Privacy Concerns -- 3.2.3 Measuring Privacy Concerns -- 3.2.4 Trust and Privacy Calculus -- 3.3 Enhanced APCO: An Expanded View on Privacy Research -- 3.4 The Research Landscape After APCO -- 3.4.1 Evolution of Technology and Personalization of Services -- 3.5 Conclusion and Avenues of Future Research -- References -- 4 Privacy and Behavioral Economics -- 4.1 Introduction -- 4.2 Uncertainty -- 4.3 Context-Dependence. 
505 8 |a 4.4 Malleability and Influence -- 4.5 Conclusions -- References -- 5 The Development of Privacy Norms -- 5.1 Introduction -- 5.2 Privacy and Challenges in Relation to Technology -- 5.3 Privacy as Contextual Integrity -- 5.4 Building Expectations -- 5.5 Negotiating Norms and Negotiating Technology -- 5.6 Conclusion -- References -- 6 Privacy Beyond the Individual Level -- 6.1 Introduction -- 6.2 Types of Groups and Types of Group Privacy -- 6.2.1 Types of Groups: Self-Constituted Groups and Algorithmically Determined Groups -- 6.2.2 Types of Group Privacy: "Their" Privacy and "Its" Privacy -- 6.2.3 Distinguishing Between Types and Levels of Privacy -- 6.3 Contemporary Practices That Influence the Privacy of Multiple Actors or Groups -- 6.4 Dynamics of Multi-stakeholder Privacy Decision-Making -- 6.5 Tensions Between Privacy Rights of Individuals Versus Groups -- 6.6 Recommendations for Tools and Mechanisms to Protect Privacy Beyond the Individual Level -- 6.7 Conclusion -- References -- Part II Domains -- 7 Social Media and Privacy -- 7.1 Introduction -- 7.2 A Brief History of Social Media -- 7.3 Privacy Challenges in Social Media -- 7.3.1 Information Disclosure/Control over Who Sees What -- 7.3.2 Unique Considerations for Managing Disclosures Within Social Media -- 7.3.3 Reputation Management Through Self-Presentation -- 7.3.4 Access to Oneself -- 7.3.5 Privacy Paradox -- 7.4 Reconceptualizing Social Media Privacy as Boundary Regulation -- 7.4.1 Boundary Regulation on Social Media -- 7.4.2 Coping with Social Media Privacy Violations -- 7.5 Addressing Privacy Challenges -- 7.5.1 Understanding People and Their Privacy Concerns -- 7.5.2 Measuring Privacy Concerns -- 7.5.3 Designing Privacy Features -- 7.5.4 Privacy Concerns and Social Disenfranchisement -- 7.5.5 Guidelines for Designing Privacy-Sensitive Social Media -- 7.6 Chapter Summary -- References. 
505 8 |a 8 Privacy-Enhancing Technologies -- 8.1 Introduction -- 8.2 Secure Messaging -- 8.3 Secure Email -- 8.4 HTTPS -- 8.4.1 HTTPS Warning Messages -- 8.4.2 HTTPS Development and Deployment -- 8.4.3 HTTPS Interception -- 8.5 Two-Factor Authentication -- 8.6 Anonymity -- 8.7 Summary -- References -- 9 Tracking and Personalization -- 9.1 Introduction -- 9.2 Aspects of Personalization -- 9.2.1 Goals of Personalization -- 9.2.2 Personalization Environments -- 9.2.2.1 Web Personalization -- 9.2.2.2 Mobile Personalization -- 9.3 Online Tracking -- 9.3.1 Tracking Contexts -- 9.3.2 Tracking Entities -- 9.3.2.1 First-Party Tracking -- 9.3.2.2 Third-Party Tracking -- 9.3.3 Tracking Techniques -- 9.3.3.1 Deployed Tracking Techniques -- 9.3.3.2 Potential Tracking Techniques -- 9.3.4 Behavioral Tracking: State of the Art -- 9.4 Personalization via Online Tracking -- 9.4.1 Relationship -- 9.4.2 Privacy Implications of Personalization -- 9.4.3 Balancing Privacy and Personalization -- 9.4.3.1 Privacy-by-Design -- 9.4.3.2 Privacy Tools -- 9.5 Conclusion -- References -- 10 Healthcare Privacy -- 10.1 Privacy in Healthcare -- 10.2 Risks -- 10.2.1 Data, Protected Health Information, and Applications -- 10.2.2 Sources and Stakeholders -- 10.2.3 Process and Services -- 10.2.4 Trade-Offs -- 10.3 Regulations -- 10.3.1 Acts -- 10.3.2 Legislation, Administrative Agencies, and Rules -- 10.3.3 Safeguards, Policies, Procedures, and Forms -- 10.4 Limitations and Challenges in Current Practices -- 10.5 Recommendations -- 10.5.1 Healthcare Practitioners -- 10.5.2 Patients and Caregivers -- 10.5.3 Insurance Companies -- 10.5.4 Technologists -- 10.5.5 Regulators -- 10.5.6 Third-Party Organizations -- 10.6 Conclusion -- References -- 11 Privacy and the Internet of Things -- 11.1 Defining IoT -- 11.1.1 Wearable IoT Domain -- 11.1.2 Household IoT Domain -- 11.1.3 Public IoT Domain. 
505 8 |a 11.1.4 Outline -- 11.2 Privacy Challenges -- 11.2.1 No Awareness/No Interface -- 11.2.2 Accumulation and Inference of Data -- 11.2.3 Multiple Users -- 11.2.4 Little Control -- 11.2.5 (In)Security of IoT Devices -- 11.3 Case Studies -- 11.3.1 Fitness Trackers -- 11.3.2 Smart Voice Assistants -- 11.3.3 Security Cameras -- 11.4 Solutions and Guidelines -- 11.4.1 Privacy Notices and Awareness Mechanisms -- 11.4.2 On Device Controls -- 11.4.3 Data Privacy -- 11.4.4 Community-Oriented Controls -- 11.4.5 Context-Adaptive and User-Tailored Privacy -- 11.5 Conclusion -- References -- Part III Audiences -- 12 Cross-Cultural Privacy Differences -- 12.1 Introduction -- 12.2 How to Study Culture -- 12.2.1 Cultural Dimensions -- 12.2.2 Cultural Differences in Behaviors -- 12.2.3 Cultural Differences in Perceptions -- 12.2.3.1 Step 1: Define a Factor Model Based on the Items in a Questionnaire -- 12.2.3.2 Step 2: Configural Invariance -- 12.2.3.3 Step 3: Metric Invariance -- 12.2.3.4 Step 4: Scalar Invariance -- 12.2.3.5 Step 5: Full Invariance -- 12.3 Cross-Cultural Privacy Differences in Social Media -- 12.3.1 Cultural Differences in Sharing with Different Social Relationships -- 12.3.2 Cultural Differences in Collective Privacy Management -- 12.3.2.1 Cultural Differences in Interpretations of Collective Privacy Management Strategies -- 12.3.2.2 Cultural Differences in Perceptions of Others' or Group Privacy -- 12.3.3 Design Implications -- 12.3.3.1 Invest More Effort to Support Collective Privacy Management in Collectivistic Countries -- 12.3.3.2 Differentiate Considerations in Audience Control in Different Cultures -- 12.3.3.3 Provide More Privacy Support to Protect Others' Privacy in Collectivistic Countries -- 12.3.3.4 Secure Individual Privacy in Individualistic Countries. 
505 8 |a 12.4 Cross-Cultural Privacy Differences in Users' Information Disclosure to Organizations -- 12.4.1 Cultural Differences in Data Collection Entities -- 12.4.2 Cultural Differences in Usage Purpose -- 12.4.3 Cultural Differences in Collection Methods -- 12.4.4 Cultural Differences in Value Exchange from Data Collection -- 12.4.5 Cultural Differences in Third-Party Accountability -- 12.4.6 Design Implications -- 12.4.6.1 Customize Data Collection Strategies in Different Countries -- 12.4.6.2 Enable Different Options in Different Countries to Control Personal Data Flow -- 12.4.6.3 Differentiate Relationships Between Privacy Perceptions and Privacy Decisions in Different Cultures -- 12.5 Conclusions -- References -- 13 Accessible Privacy -- 13.1 Introduction -- 13.2 Privacy and Underserved Populations -- 13.2.1 Models of Disability -- 13.2.2 People with Visual Impairments -- 13.2.3 Are Existing Privacy-Enhancing Technologies Sufficient? -- 13.2.4 Intersectional Privacy -- 13.2.5 People with Hidden Disabilities -- 13.2.6 People with Other Disabilities -- 13.3 Why Is Accessible Privacy Difficult? -- 13.4 Working Towards Accessible Privacy -- 13.5 Future Directions -- References -- 14 Privacy in Adolescence -- 14.1 Introduction -- 14.1.1 The Developmental Stage of Adolescence -- 14.1.2 Adolescence as a "Privacy Paradox" -- 14.2 Teens and Networked Privacy: Empirical Evidence -- 14.2.1 Privacy Turbulence Within Families -- 14.2.2 Risk as a Learning Process and the Suppressive Effect of Restrictive Parental Mediation During Adolescence -- 14.3 Designing Sociotechnical Systems to Support Adolescence -- 14.4 Design Guidelines for Privacy and Risk-Taking During Adolescence -- 14.5 Summary -- References -- 15 Privacy and Vulnerable Populations -- 15.1 Introduction -- 15.2 How Technology Reinforces and Promotes Inequality. 
505 8 |a 15.3 Who Is Vulnerable: Defining Unique Privacy Concerns. 
588 |a Description based on publisher supplied metadata and other sources. 
590 |a Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.  
655 4 |a Electronic books. 
700 1 |a Page, Xinru. 
700 1 |a Wisniewski, Pamela. 
700 1 |a Lipford, Heather Richter. 
700 1 |a Proferes, Nicholas. 
700 1 |a Romano, Jennifer. 
776 0 8 |i Print version:  |a Knijnenburg, Bart P.  |t Modern Socio-Technical Perspectives on Privacy  |d Cham : Springer International Publishing AG,c2022  |z 9783030827854 
797 2 |a ProQuest (Firm) 
856 4 0 |u https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6885922  |z Click to View