Human Factors in Privacy Research / edited by Nina Gerber, Alina Stöver, Karola Marky.

This book covers topics needed to be considered in research around usable privacy. The book starts from a psychological perspective and introduces readers to basic behavioral theories and models that can explain end-user privacy behavior (including the “privacy paradox”) on a theoretical level. Subs...

Full description

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Place / Publishing House:Cham : : Springer International Publishing :, Imprint: Springer,, 2023.
Year of Publication:2023
Edition:1st ed. 2023.
Language:English
Physical Description:1 online resource (380 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993629740304498
ctrlnum (CKB)5700000000428119
(MiAaPQ)EBC30702982
(Au-PeEL)EBL30702982
(DE-He213)978-3-031-28643-8
(OCoLC)1395077403
(EXLCZ)995700000000428119
collection bib_alma
record_format marc
spelling Gerber, Nina.
Human Factors in Privacy Research [electronic resource] / edited by Nina Gerber, Alina Stöver, Karola Marky.
1st ed. 2023.
Cham : Springer International Publishing : Imprint: Springer, 2023.
1 online resource (380 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Forward -- About this book -- Acknowledgements -- Part I Theory -- Chapter 1 Data Collection Isn't Mostly Harmless: An Introduction to Privacy Theories and Basics -- Chapter 2 From the Privacy Calculus to Crossing the Rubicon: An Introduction to Theoretical Models of User Privacy Behavior -- Part II Methodology -- Chapter 3 Empirical Research Methods in Usable Privacy and Security -- Chapter 4 Towards Valid and Reliable Privacy Concern Scales: The Example of IUIPC-8 -- Chapter 5 Achieving Usable Security and Privacy through Human-Centered Design -- Chapter 6 What HCI Can Do for (Data Protection) Law - Beyond Design -- Chapter 7 Expert Opinions as a Method of Validating Ideas: Applied to Making GDPR Usable -- Part III Applicable Areas -- Chapter 8 Privacy Nudges and Informed Consent? - Challenges for Privacy Nudge Design -- Chapter 9 The Hows and Whys of Dark Patterns: Categorizations and Privacy -- Chapter 10 "They see me scrolling" - Lessons Learned From Investigating Shoulder Surfing Behavior and Attack Mitigation Strategies -- Chapter 11 Privacy Research on the Pulse of Time: COVID-19 Contact Tracing Apps -- Chapter 12 Privacy Perception and Behavior in Safety-Critical Environments -- Part IV Solutions -- Chapter 13 Generic Consents in Digital Ecosystems: Legal, Psychological and Technical Perspectives -- Chapter 14 Human-Centered Design for Data-Sparse Tailored Privacy Information Provision -- Chapter 15 Acceptance Factors of Privacy Enhancing Technologies on the Basis of Tor and JonDonym -- Chapter 16 Increasing Users' Privacy Awareness in the Internet of Things: Design Space and Sample Scenarios -- Chapter 17 Challenges, Conflicts and Solution Strategies for the Introduction of Corporate Data Protection Measures -- Chapter 18 Data Cart - A Privacy Pattern for Personal Data Management in Organizations.
This book covers topics needed to be considered in research around usable privacy. The book starts from a psychological perspective and introduces readers to basic behavioral theories and models that can explain end-user privacy behavior (including the “privacy paradox”) on a theoretical level. Subsequently, an introduction to different study methods (e.g., experiment, survey, interviews, co-creation) used in usable privacy research is given. Based on this, different methodological aspects, such as identifying appropriate questionnaires, and applying User-Centered Design, will be discussed. Finally, the book describes application areas for privacy research such as dark patterns and presents solutions for privacy protection, e.g., regarding consent-giving and PETs. The book aims to bring together the different research approaches to the topic of usable privacy, which often originate from computer science, psychology, and law, and provide a methodologically sound basis for researchers who want to delve deeper into this topic. This is an open access book.
Open Access
Psychology.
Cognitive science.
Computer science.
Human-machine systems.
Data protection Law and legislation.
Artificial intelligence.
Behavioral Sciences and Psychology.
Cognitive Science.
Computer Science.
Human-Machine Interfaces.
Privacy.
Artificial Intelligence.
Ciència cognitiva thub
Sistemes persona-màquina thub
Protecció de dades thub
Intel·ligència artificial thub
Llibres electrònics thub
3-031-28642-1
Stöver, Alina.
Marky, Karola.
language English
format Electronic
eBook
author Gerber, Nina.
spellingShingle Gerber, Nina.
Human Factors in Privacy Research
Forward -- About this book -- Acknowledgements -- Part I Theory -- Chapter 1 Data Collection Isn't Mostly Harmless: An Introduction to Privacy Theories and Basics -- Chapter 2 From the Privacy Calculus to Crossing the Rubicon: An Introduction to Theoretical Models of User Privacy Behavior -- Part II Methodology -- Chapter 3 Empirical Research Methods in Usable Privacy and Security -- Chapter 4 Towards Valid and Reliable Privacy Concern Scales: The Example of IUIPC-8 -- Chapter 5 Achieving Usable Security and Privacy through Human-Centered Design -- Chapter 6 What HCI Can Do for (Data Protection) Law - Beyond Design -- Chapter 7 Expert Opinions as a Method of Validating Ideas: Applied to Making GDPR Usable -- Part III Applicable Areas -- Chapter 8 Privacy Nudges and Informed Consent? - Challenges for Privacy Nudge Design -- Chapter 9 The Hows and Whys of Dark Patterns: Categorizations and Privacy -- Chapter 10 "They see me scrolling" - Lessons Learned From Investigating Shoulder Surfing Behavior and Attack Mitigation Strategies -- Chapter 11 Privacy Research on the Pulse of Time: COVID-19 Contact Tracing Apps -- Chapter 12 Privacy Perception and Behavior in Safety-Critical Environments -- Part IV Solutions -- Chapter 13 Generic Consents in Digital Ecosystems: Legal, Psychological and Technical Perspectives -- Chapter 14 Human-Centered Design for Data-Sparse Tailored Privacy Information Provision -- Chapter 15 Acceptance Factors of Privacy Enhancing Technologies on the Basis of Tor and JonDonym -- Chapter 16 Increasing Users' Privacy Awareness in the Internet of Things: Design Space and Sample Scenarios -- Chapter 17 Challenges, Conflicts and Solution Strategies for the Introduction of Corporate Data Protection Measures -- Chapter 18 Data Cart - A Privacy Pattern for Personal Data Management in Organizations.
author_facet Gerber, Nina.
Stöver, Alina.
Marky, Karola.
author_variant n g ng
author2 Stöver, Alina.
Marky, Karola.
author2_variant a s as
k m km
author2_role TeilnehmendeR
TeilnehmendeR
author_sort Gerber, Nina.
title Human Factors in Privacy Research
title_full Human Factors in Privacy Research [electronic resource] / edited by Nina Gerber, Alina Stöver, Karola Marky.
title_fullStr Human Factors in Privacy Research [electronic resource] / edited by Nina Gerber, Alina Stöver, Karola Marky.
title_full_unstemmed Human Factors in Privacy Research [electronic resource] / edited by Nina Gerber, Alina Stöver, Karola Marky.
title_auth Human Factors in Privacy Research
title_new Human Factors in Privacy Research
title_sort human factors in privacy research
publisher Springer International Publishing : Imprint: Springer,
publishDate 2023
physical 1 online resource (380 pages)
edition 1st ed. 2023.
contents Forward -- About this book -- Acknowledgements -- Part I Theory -- Chapter 1 Data Collection Isn't Mostly Harmless: An Introduction to Privacy Theories and Basics -- Chapter 2 From the Privacy Calculus to Crossing the Rubicon: An Introduction to Theoretical Models of User Privacy Behavior -- Part II Methodology -- Chapter 3 Empirical Research Methods in Usable Privacy and Security -- Chapter 4 Towards Valid and Reliable Privacy Concern Scales: The Example of IUIPC-8 -- Chapter 5 Achieving Usable Security and Privacy through Human-Centered Design -- Chapter 6 What HCI Can Do for (Data Protection) Law - Beyond Design -- Chapter 7 Expert Opinions as a Method of Validating Ideas: Applied to Making GDPR Usable -- Part III Applicable Areas -- Chapter 8 Privacy Nudges and Informed Consent? - Challenges for Privacy Nudge Design -- Chapter 9 The Hows and Whys of Dark Patterns: Categorizations and Privacy -- Chapter 10 "They see me scrolling" - Lessons Learned From Investigating Shoulder Surfing Behavior and Attack Mitigation Strategies -- Chapter 11 Privacy Research on the Pulse of Time: COVID-19 Contact Tracing Apps -- Chapter 12 Privacy Perception and Behavior in Safety-Critical Environments -- Part IV Solutions -- Chapter 13 Generic Consents in Digital Ecosystems: Legal, Psychological and Technical Perspectives -- Chapter 14 Human-Centered Design for Data-Sparse Tailored Privacy Information Provision -- Chapter 15 Acceptance Factors of Privacy Enhancing Technologies on the Basis of Tor and JonDonym -- Chapter 16 Increasing Users' Privacy Awareness in the Internet of Things: Design Space and Sample Scenarios -- Chapter 17 Challenges, Conflicts and Solution Strategies for the Introduction of Corporate Data Protection Measures -- Chapter 18 Data Cart - A Privacy Pattern for Personal Data Management in Organizations.
isbn 3-031-28643-X
3-031-28642-1
callnumber-first B - Philosophy, Psychology, Religion
callnumber-subject BF - Psychology
callnumber-label BF1-990
callnumber-sort BF 11 3990
genre Llibres electrònics thub
genre_facet Llibres electrònics
illustrated Not Illustrated
dewey-hundreds 100 - Philosophy & psychology
dewey-tens 150 - Psychology
dewey-ones 150 - Psychology
dewey-full 150
dewey-sort 3150
dewey-raw 150
dewey-search 150
oclc_num 1395077403
work_keys_str_mv AT gerbernina humanfactorsinprivacyresearch
AT stoveralina humanfactorsinprivacyresearch
AT markykarola humanfactorsinprivacyresearch
status_str n
ids_txt_mv (CKB)5700000000428119
(MiAaPQ)EBC30702982
(Au-PeEL)EBL30702982
(DE-He213)978-3-031-28643-8
(OCoLC)1395077403
(EXLCZ)995700000000428119
carrierType_str_mv cr
is_hierarchy_title Human Factors in Privacy Research
author2_original_writing_str_mv noLinkedField
noLinkedField
_version_ 1796653702804668417
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04843nam a22006135i 4500</leader><controlfield tag="001">993629740304498</controlfield><controlfield tag="005">20240213212338.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr#cnu||||||||</controlfield><controlfield tag="008">230816s2023 sz | o |||| 0|eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3-031-28643-X</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-031-28643-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5700000000428119</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC30702982</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL30702982</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)978-3-031-28643-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1395077403</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995700000000428119</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">BF1-990</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">JM</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">PSY000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">JM</subfield><subfield code="2">thema</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">150</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gerber, Nina.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Human Factors in Privacy Research</subfield><subfield code="h">[electronic resource] /</subfield><subfield code="c">edited by Nina Gerber, Alina Stöver, Karola Marky.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2023.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham :</subfield><subfield code="b">Springer International Publishing :</subfield><subfield code="b">Imprint: Springer,</subfield><subfield code="c">2023.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (380 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Forward -- About this book -- Acknowledgements -- Part I Theory -- Chapter 1 Data Collection Isn't Mostly Harmless: An Introduction to Privacy Theories and Basics -- Chapter 2 From the Privacy Calculus to Crossing the Rubicon: An Introduction to Theoretical Models of User Privacy Behavior -- Part II Methodology -- Chapter 3 Empirical Research Methods in Usable Privacy and Security -- Chapter 4 Towards Valid and Reliable Privacy Concern Scales: The Example of IUIPC-8 -- Chapter 5 Achieving Usable Security and Privacy through Human-Centered Design -- Chapter 6 What HCI Can Do for (Data Protection) Law - Beyond Design -- Chapter 7 Expert Opinions as a Method of Validating Ideas: Applied to Making GDPR Usable -- Part III Applicable Areas -- Chapter 8 Privacy Nudges and Informed Consent? - Challenges for Privacy Nudge Design -- Chapter 9 The Hows and Whys of Dark Patterns: Categorizations and Privacy -- Chapter 10 "They see me scrolling" - Lessons Learned From Investigating Shoulder Surfing Behavior and Attack Mitigation Strategies -- Chapter 11 Privacy Research on the Pulse of Time: COVID-19 Contact Tracing Apps -- Chapter 12 Privacy Perception and Behavior in Safety-Critical Environments -- Part IV Solutions -- Chapter 13 Generic Consents in Digital Ecosystems: Legal, Psychological and Technical Perspectives -- Chapter 14 Human-Centered Design for Data-Sparse Tailored Privacy Information Provision -- Chapter 15 Acceptance Factors of Privacy Enhancing Technologies on the Basis of Tor and JonDonym -- Chapter 16 Increasing Users' Privacy Awareness in the Internet of Things: Design Space and Sample Scenarios -- Chapter 17 Challenges, Conflicts and Solution Strategies for the Introduction of Corporate Data Protection Measures -- Chapter 18 Data Cart - A Privacy Pattern for Personal Data Management in Organizations.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book covers topics needed to be considered in research around usable privacy. The book starts from a psychological perspective and introduces readers to basic behavioral theories and models that can explain end-user privacy behavior (including the “privacy paradox”) on a theoretical level. Subsequently, an introduction to different study methods (e.g., experiment, survey, interviews, co-creation) used in usable privacy research is given. Based on this, different methodological aspects, such as identifying appropriate questionnaires, and applying User-Centered Design, will be discussed. Finally, the book describes application areas for privacy research such as dark patterns and presents solutions for privacy protection, e.g., regarding consent-giving and PETs. The book aims to bring together the different research approaches to the topic of usable privacy, which often originate from computer science, psychology, and law, and provide a methodologically sound basis for researchers who want to delve deeper into this topic. This is an open access book.</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">Open Access</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Psychology.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cognitive science.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer science.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Human-machine systems.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield><subfield code="x">Law and legislation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Artificial intelligence.</subfield></datafield><datafield tag="650" ind1="1" ind2="4"><subfield code="a">Behavioral Sciences and Psychology.</subfield></datafield><datafield tag="650" ind1="2" ind2="4"><subfield code="a">Cognitive Science.</subfield></datafield><datafield tag="650" ind1="2" ind2="4"><subfield code="a">Computer Science.</subfield></datafield><datafield tag="650" ind1="2" ind2="4"><subfield code="a">Human-Machine Interfaces.</subfield></datafield><datafield tag="650" ind1="2" ind2="4"><subfield code="a">Privacy.</subfield></datafield><datafield tag="650" ind1="2" ind2="4"><subfield code="a">Artificial Intelligence.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Ciència cognitiva</subfield><subfield code="2">thub</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Sistemes persona-màquina</subfield><subfield code="2">thub</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Protecció de dades</subfield><subfield code="2">thub</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Intel·ligència artificial</subfield><subfield code="2">thub</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Llibres electrònics</subfield><subfield code="2">thub</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-031-28642-1</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Stöver, Alina.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Marky, Karola.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-02-23 22:43:21 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2023-09-07 12:04:59 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5351193680004498&amp;Force_direct=true</subfield><subfield code="Z">5351193680004498</subfield><subfield code="b">Available</subfield><subfield code="8">5351193680004498</subfield></datafield></record></collection>