Human Factors in Privacy Research / edited by Nina Gerber, Alina Stöver, Karola Marky.
This book covers topics needed to be considered in research around usable privacy. The book starts from a psychological perspective and introduces readers to basic behavioral theories and models that can explain end-user privacy behavior (including the “privacy paradox”) on a theoretical level. Subs...
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Place / Publishing House: | Cham : : Springer International Publishing :, Imprint: Springer,, 2023. |
Year of Publication: | 2023 |
Edition: | 1st ed. 2023. |
Language: | English |
Physical Description: | 1 online resource (380 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993629740304498 |
---|---|
ctrlnum |
(CKB)5700000000428119 (MiAaPQ)EBC30702982 (Au-PeEL)EBL30702982 (DE-He213)978-3-031-28643-8 (OCoLC)1395077403 (EXLCZ)995700000000428119 |
collection |
bib_alma |
record_format |
marc |
spelling |
Gerber, Nina. Human Factors in Privacy Research [electronic resource] / edited by Nina Gerber, Alina Stöver, Karola Marky. 1st ed. 2023. Cham : Springer International Publishing : Imprint: Springer, 2023. 1 online resource (380 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Forward -- About this book -- Acknowledgements -- Part I Theory -- Chapter 1 Data Collection Isn't Mostly Harmless: An Introduction to Privacy Theories and Basics -- Chapter 2 From the Privacy Calculus to Crossing the Rubicon: An Introduction to Theoretical Models of User Privacy Behavior -- Part II Methodology -- Chapter 3 Empirical Research Methods in Usable Privacy and Security -- Chapter 4 Towards Valid and Reliable Privacy Concern Scales: The Example of IUIPC-8 -- Chapter 5 Achieving Usable Security and Privacy through Human-Centered Design -- Chapter 6 What HCI Can Do for (Data Protection) Law - Beyond Design -- Chapter 7 Expert Opinions as a Method of Validating Ideas: Applied to Making GDPR Usable -- Part III Applicable Areas -- Chapter 8 Privacy Nudges and Informed Consent? - Challenges for Privacy Nudge Design -- Chapter 9 The Hows and Whys of Dark Patterns: Categorizations and Privacy -- Chapter 10 "They see me scrolling" - Lessons Learned From Investigating Shoulder Surfing Behavior and Attack Mitigation Strategies -- Chapter 11 Privacy Research on the Pulse of Time: COVID-19 Contact Tracing Apps -- Chapter 12 Privacy Perception and Behavior in Safety-Critical Environments -- Part IV Solutions -- Chapter 13 Generic Consents in Digital Ecosystems: Legal, Psychological and Technical Perspectives -- Chapter 14 Human-Centered Design for Data-Sparse Tailored Privacy Information Provision -- Chapter 15 Acceptance Factors of Privacy Enhancing Technologies on the Basis of Tor and JonDonym -- Chapter 16 Increasing Users' Privacy Awareness in the Internet of Things: Design Space and Sample Scenarios -- Chapter 17 Challenges, Conflicts and Solution Strategies for the Introduction of Corporate Data Protection Measures -- Chapter 18 Data Cart - A Privacy Pattern for Personal Data Management in Organizations. This book covers topics needed to be considered in research around usable privacy. The book starts from a psychological perspective and introduces readers to basic behavioral theories and models that can explain end-user privacy behavior (including the “privacy paradox”) on a theoretical level. Subsequently, an introduction to different study methods (e.g., experiment, survey, interviews, co-creation) used in usable privacy research is given. Based on this, different methodological aspects, such as identifying appropriate questionnaires, and applying User-Centered Design, will be discussed. Finally, the book describes application areas for privacy research such as dark patterns and presents solutions for privacy protection, e.g., regarding consent-giving and PETs. The book aims to bring together the different research approaches to the topic of usable privacy, which often originate from computer science, psychology, and law, and provide a methodologically sound basis for researchers who want to delve deeper into this topic. This is an open access book. Open Access Psychology. Cognitive science. Computer science. Human-machine systems. Data protection Law and legislation. Artificial intelligence. Behavioral Sciences and Psychology. Cognitive Science. Computer Science. Human-Machine Interfaces. Privacy. Artificial Intelligence. Ciència cognitiva thub Sistemes persona-màquina thub Protecció de dades thub Intel·ligència artificial thub Llibres electrònics thub 3-031-28642-1 Stöver, Alina. Marky, Karola. |
language |
English |
format |
Electronic eBook |
author |
Gerber, Nina. |
spellingShingle |
Gerber, Nina. Human Factors in Privacy Research Forward -- About this book -- Acknowledgements -- Part I Theory -- Chapter 1 Data Collection Isn't Mostly Harmless: An Introduction to Privacy Theories and Basics -- Chapter 2 From the Privacy Calculus to Crossing the Rubicon: An Introduction to Theoretical Models of User Privacy Behavior -- Part II Methodology -- Chapter 3 Empirical Research Methods in Usable Privacy and Security -- Chapter 4 Towards Valid and Reliable Privacy Concern Scales: The Example of IUIPC-8 -- Chapter 5 Achieving Usable Security and Privacy through Human-Centered Design -- Chapter 6 What HCI Can Do for (Data Protection) Law - Beyond Design -- Chapter 7 Expert Opinions as a Method of Validating Ideas: Applied to Making GDPR Usable -- Part III Applicable Areas -- Chapter 8 Privacy Nudges and Informed Consent? - Challenges for Privacy Nudge Design -- Chapter 9 The Hows and Whys of Dark Patterns: Categorizations and Privacy -- Chapter 10 "They see me scrolling" - Lessons Learned From Investigating Shoulder Surfing Behavior and Attack Mitigation Strategies -- Chapter 11 Privacy Research on the Pulse of Time: COVID-19 Contact Tracing Apps -- Chapter 12 Privacy Perception and Behavior in Safety-Critical Environments -- Part IV Solutions -- Chapter 13 Generic Consents in Digital Ecosystems: Legal, Psychological and Technical Perspectives -- Chapter 14 Human-Centered Design for Data-Sparse Tailored Privacy Information Provision -- Chapter 15 Acceptance Factors of Privacy Enhancing Technologies on the Basis of Tor and JonDonym -- Chapter 16 Increasing Users' Privacy Awareness in the Internet of Things: Design Space and Sample Scenarios -- Chapter 17 Challenges, Conflicts and Solution Strategies for the Introduction of Corporate Data Protection Measures -- Chapter 18 Data Cart - A Privacy Pattern for Personal Data Management in Organizations. |
author_facet |
Gerber, Nina. Stöver, Alina. Marky, Karola. |
author_variant |
n g ng |
author2 |
Stöver, Alina. Marky, Karola. |
author2_variant |
a s as k m km |
author2_role |
TeilnehmendeR TeilnehmendeR |
author_sort |
Gerber, Nina. |
title |
Human Factors in Privacy Research |
title_full |
Human Factors in Privacy Research [electronic resource] / edited by Nina Gerber, Alina Stöver, Karola Marky. |
title_fullStr |
Human Factors in Privacy Research [electronic resource] / edited by Nina Gerber, Alina Stöver, Karola Marky. |
title_full_unstemmed |
Human Factors in Privacy Research [electronic resource] / edited by Nina Gerber, Alina Stöver, Karola Marky. |
title_auth |
Human Factors in Privacy Research |
title_new |
Human Factors in Privacy Research |
title_sort |
human factors in privacy research |
publisher |
Springer International Publishing : Imprint: Springer, |
publishDate |
2023 |
physical |
1 online resource (380 pages) |
edition |
1st ed. 2023. |
contents |
Forward -- About this book -- Acknowledgements -- Part I Theory -- Chapter 1 Data Collection Isn't Mostly Harmless: An Introduction to Privacy Theories and Basics -- Chapter 2 From the Privacy Calculus to Crossing the Rubicon: An Introduction to Theoretical Models of User Privacy Behavior -- Part II Methodology -- Chapter 3 Empirical Research Methods in Usable Privacy and Security -- Chapter 4 Towards Valid and Reliable Privacy Concern Scales: The Example of IUIPC-8 -- Chapter 5 Achieving Usable Security and Privacy through Human-Centered Design -- Chapter 6 What HCI Can Do for (Data Protection) Law - Beyond Design -- Chapter 7 Expert Opinions as a Method of Validating Ideas: Applied to Making GDPR Usable -- Part III Applicable Areas -- Chapter 8 Privacy Nudges and Informed Consent? - Challenges for Privacy Nudge Design -- Chapter 9 The Hows and Whys of Dark Patterns: Categorizations and Privacy -- Chapter 10 "They see me scrolling" - Lessons Learned From Investigating Shoulder Surfing Behavior and Attack Mitigation Strategies -- Chapter 11 Privacy Research on the Pulse of Time: COVID-19 Contact Tracing Apps -- Chapter 12 Privacy Perception and Behavior in Safety-Critical Environments -- Part IV Solutions -- Chapter 13 Generic Consents in Digital Ecosystems: Legal, Psychological and Technical Perspectives -- Chapter 14 Human-Centered Design for Data-Sparse Tailored Privacy Information Provision -- Chapter 15 Acceptance Factors of Privacy Enhancing Technologies on the Basis of Tor and JonDonym -- Chapter 16 Increasing Users' Privacy Awareness in the Internet of Things: Design Space and Sample Scenarios -- Chapter 17 Challenges, Conflicts and Solution Strategies for the Introduction of Corporate Data Protection Measures -- Chapter 18 Data Cart - A Privacy Pattern for Personal Data Management in Organizations. |
isbn |
3-031-28643-X 3-031-28642-1 |
callnumber-first |
B - Philosophy, Psychology, Religion |
callnumber-subject |
BF - Psychology |
callnumber-label |
BF1-990 |
callnumber-sort |
BF 11 3990 |
genre |
Llibres electrònics thub |
genre_facet |
Llibres electrònics |
illustrated |
Not Illustrated |
dewey-hundreds |
100 - Philosophy & psychology |
dewey-tens |
150 - Psychology |
dewey-ones |
150 - Psychology |
dewey-full |
150 |
dewey-sort |
3150 |
dewey-raw |
150 |
dewey-search |
150 |
oclc_num |
1395077403 |
work_keys_str_mv |
AT gerbernina humanfactorsinprivacyresearch AT stoveralina humanfactorsinprivacyresearch AT markykarola humanfactorsinprivacyresearch |
status_str |
n |
ids_txt_mv |
(CKB)5700000000428119 (MiAaPQ)EBC30702982 (Au-PeEL)EBL30702982 (DE-He213)978-3-031-28643-8 (OCoLC)1395077403 (EXLCZ)995700000000428119 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Human Factors in Privacy Research |
author2_original_writing_str_mv |
noLinkedField noLinkedField |
_version_ |
1796653702804668417 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04843nam a22006135i 4500</leader><controlfield tag="001">993629740304498</controlfield><controlfield tag="005">20240213212338.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr#cnu||||||||</controlfield><controlfield tag="008">230816s2023 sz | o |||| 0|eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3-031-28643-X</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-031-28643-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5700000000428119</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC30702982</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL30702982</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)978-3-031-28643-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1395077403</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995700000000428119</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">BF1-990</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">JM</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">PSY000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">JM</subfield><subfield code="2">thema</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">150</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gerber, Nina.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Human Factors in Privacy Research</subfield><subfield code="h">[electronic resource] /</subfield><subfield code="c">edited by Nina Gerber, Alina Stöver, Karola Marky.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2023.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham :</subfield><subfield code="b">Springer International Publishing :</subfield><subfield code="b">Imprint: Springer,</subfield><subfield code="c">2023.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (380 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Forward -- About this book -- Acknowledgements -- Part I Theory -- Chapter 1 Data Collection Isn't Mostly Harmless: An Introduction to Privacy Theories and Basics -- Chapter 2 From the Privacy Calculus to Crossing the Rubicon: An Introduction to Theoretical Models of User Privacy Behavior -- Part II Methodology -- Chapter 3 Empirical Research Methods in Usable Privacy and Security -- Chapter 4 Towards Valid and Reliable Privacy Concern Scales: The Example of IUIPC-8 -- Chapter 5 Achieving Usable Security and Privacy through Human-Centered Design -- Chapter 6 What HCI Can Do for (Data Protection) Law - Beyond Design -- Chapter 7 Expert Opinions as a Method of Validating Ideas: Applied to Making GDPR Usable -- Part III Applicable Areas -- Chapter 8 Privacy Nudges and Informed Consent? - Challenges for Privacy Nudge Design -- Chapter 9 The Hows and Whys of Dark Patterns: Categorizations and Privacy -- Chapter 10 "They see me scrolling" - Lessons Learned From Investigating Shoulder Surfing Behavior and Attack Mitigation Strategies -- Chapter 11 Privacy Research on the Pulse of Time: COVID-19 Contact Tracing Apps -- Chapter 12 Privacy Perception and Behavior in Safety-Critical Environments -- Part IV Solutions -- Chapter 13 Generic Consents in Digital Ecosystems: Legal, Psychological and Technical Perspectives -- Chapter 14 Human-Centered Design for Data-Sparse Tailored Privacy Information Provision -- Chapter 15 Acceptance Factors of Privacy Enhancing Technologies on the Basis of Tor and JonDonym -- Chapter 16 Increasing Users' Privacy Awareness in the Internet of Things: Design Space and Sample Scenarios -- Chapter 17 Challenges, Conflicts and Solution Strategies for the Introduction of Corporate Data Protection Measures -- Chapter 18 Data Cart - A Privacy Pattern for Personal Data Management in Organizations.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book covers topics needed to be considered in research around usable privacy. The book starts from a psychological perspective and introduces readers to basic behavioral theories and models that can explain end-user privacy behavior (including the “privacy paradox”) on a theoretical level. Subsequently, an introduction to different study methods (e.g., experiment, survey, interviews, co-creation) used in usable privacy research is given. Based on this, different methodological aspects, such as identifying appropriate questionnaires, and applying User-Centered Design, will be discussed. Finally, the book describes application areas for privacy research such as dark patterns and presents solutions for privacy protection, e.g., regarding consent-giving and PETs. The book aims to bring together the different research approaches to the topic of usable privacy, which often originate from computer science, psychology, and law, and provide a methodologically sound basis for researchers who want to delve deeper into this topic. This is an open access book.</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">Open Access</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Psychology.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cognitive science.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer science.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Human-machine systems.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield><subfield code="x">Law and legislation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Artificial intelligence.</subfield></datafield><datafield tag="650" ind1="1" ind2="4"><subfield code="a">Behavioral Sciences and Psychology.</subfield></datafield><datafield tag="650" ind1="2" ind2="4"><subfield code="a">Cognitive Science.</subfield></datafield><datafield tag="650" ind1="2" ind2="4"><subfield code="a">Computer Science.</subfield></datafield><datafield tag="650" ind1="2" ind2="4"><subfield code="a">Human-Machine Interfaces.</subfield></datafield><datafield tag="650" ind1="2" ind2="4"><subfield code="a">Privacy.</subfield></datafield><datafield tag="650" ind1="2" ind2="4"><subfield code="a">Artificial Intelligence.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Ciència cognitiva</subfield><subfield code="2">thub</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Sistemes persona-màquina</subfield><subfield code="2">thub</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Protecció de dades</subfield><subfield code="2">thub</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Intel·ligència artificial</subfield><subfield code="2">thub</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Llibres electrònics</subfield><subfield code="2">thub</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-031-28642-1</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Stöver, Alina.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Marky, Karola.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-02-23 22:43:21 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2023-09-07 12:04:59 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5351193680004498&Force_direct=true</subfield><subfield code="Z">5351193680004498</subfield><subfield code="b">Available</subfield><subfield code="8">5351193680004498</subfield></datafield></record></collection> |