Modern Socio-Technical Perspectives on Privacy.
Main Author: | |
---|---|
Other Authors: | , , , , |
Format: | eBook |
Language: | English |
Published: |
Cham :
Springer International Publishing AG,
2022.
|
Edition: | 1st ed. |
Subjects: | |
Online Access: | Click to View |
Table of Contents:
- Intro
- Foreword
- Acknowledgement
- Contents
- 1 Introduction and Overview
- 1.1 Introduction
- 1.2 What Is Privacy?
- 1.3 Privacy Theory and Methods
- 1.4 Domains
- 1.5 Audiences
- 1.6 Moving Forward
- 1.7 Conclusion
- References
- Part I Privacy Theory and Methods
- 2 Privacy Theories and Frameworks
- 2.1 Introduction
- 2.2 Privacy as Information Disclosure
- 2.2.1 Privacy Calculus: Assessing the Benefit vs. Cost of Information Disclosures
- 2.2.2 Privacy Paradox: The Discrepancy Between Users' Privacy Concerns and Information Disclosure Behavior
- 2.2.3 Westin's Privacy Taxonomy: The Classification of Consumers' Privacy Knowledge and Preferences
- 2.3 Privacy as an Interpersonal Boundary Regulation Process
- 2.3.1 Altman's Conceptualization of Privacy
- 2.3.2 Petronio's Communication Privacy Management Theory
- 2.4 Privacy as Social Context, Norms, and Values
- 2.4.1 Considering Social Contexts
- 2.4.2 Identifying Privacy Norms and Human Values in Design
- 2.4.3 Applying Contextual Integrity to Practice
- 2.5 A Privacy Affordance and Design Perspective
- 2.5.1 Privacy Affordances
- 2.5.2 Privacy by Design
- 2.6 The Future of Modern Privacy: Individual Differences and User-Centered Privacy
- 2.7 Guidelines for Applying Privacy Frameworks in Practice
- 2.8 Chapter Summary
- References
- 3 Revisiting APCO
- 3.1 Introduction
- 3.2 The APCO Model
- 3.2.1 The Antecedents of Privacy Concerns
- 3.2.2 Privacy Concerns
- 3.2.3 Measuring Privacy Concerns
- 3.2.4 Trust and Privacy Calculus
- 3.3 Enhanced APCO: An Expanded View on Privacy Research
- 3.4 The Research Landscape After APCO
- 3.4.1 Evolution of Technology and Personalization of Services
- 3.5 Conclusion and Avenues of Future Research
- References
- 4 Privacy and Behavioral Economics
- 4.1 Introduction
- 4.2 Uncertainty
- 4.3 Context-Dependence.
- 4.4 Malleability and Influence
- 4.5 Conclusions
- References
- 5 The Development of Privacy Norms
- 5.1 Introduction
- 5.2 Privacy and Challenges in Relation to Technology
- 5.3 Privacy as Contextual Integrity
- 5.4 Building Expectations
- 5.5 Negotiating Norms and Negotiating Technology
- 5.6 Conclusion
- References
- 6 Privacy Beyond the Individual Level
- 6.1 Introduction
- 6.2 Types of Groups and Types of Group Privacy
- 6.2.1 Types of Groups: Self-Constituted Groups and Algorithmically Determined Groups
- 6.2.2 Types of Group Privacy: "Their" Privacy and "Its" Privacy
- 6.2.3 Distinguishing Between Types and Levels of Privacy
- 6.3 Contemporary Practices That Influence the Privacy of Multiple Actors or Groups
- 6.4 Dynamics of Multi-stakeholder Privacy Decision-Making
- 6.5 Tensions Between Privacy Rights of Individuals Versus Groups
- 6.6 Recommendations for Tools and Mechanisms to Protect Privacy Beyond the Individual Level
- 6.7 Conclusion
- References
- Part II Domains
- 7 Social Media and Privacy
- 7.1 Introduction
- 7.2 A Brief History of Social Media
- 7.3 Privacy Challenges in Social Media
- 7.3.1 Information Disclosure/Control over Who Sees What
- 7.3.2 Unique Considerations for Managing Disclosures Within Social Media
- 7.3.3 Reputation Management Through Self-Presentation
- 7.3.4 Access to Oneself
- 7.3.5 Privacy Paradox
- 7.4 Reconceptualizing Social Media Privacy as Boundary Regulation
- 7.4.1 Boundary Regulation on Social Media
- 7.4.2 Coping with Social Media Privacy Violations
- 7.5 Addressing Privacy Challenges
- 7.5.1 Understanding People and Their Privacy Concerns
- 7.5.2 Measuring Privacy Concerns
- 7.5.3 Designing Privacy Features
- 7.5.4 Privacy Concerns and Social Disenfranchisement
- 7.5.5 Guidelines for Designing Privacy-Sensitive Social Media
- 7.6 Chapter Summary
- References.
- 8 Privacy-Enhancing Technologies
- 8.1 Introduction
- 8.2 Secure Messaging
- 8.3 Secure Email
- 8.4 HTTPS
- 8.4.1 HTTPS Warning Messages
- 8.4.2 HTTPS Development and Deployment
- 8.4.3 HTTPS Interception
- 8.5 Two-Factor Authentication
- 8.6 Anonymity
- 8.7 Summary
- References
- 9 Tracking and Personalization
- 9.1 Introduction
- 9.2 Aspects of Personalization
- 9.2.1 Goals of Personalization
- 9.2.2 Personalization Environments
- 9.2.2.1 Web Personalization
- 9.2.2.2 Mobile Personalization
- 9.3 Online Tracking
- 9.3.1 Tracking Contexts
- 9.3.2 Tracking Entities
- 9.3.2.1 First-Party Tracking
- 9.3.2.2 Third-Party Tracking
- 9.3.3 Tracking Techniques
- 9.3.3.1 Deployed Tracking Techniques
- 9.3.3.2 Potential Tracking Techniques
- 9.3.4 Behavioral Tracking: State of the Art
- 9.4 Personalization via Online Tracking
- 9.4.1 Relationship
- 9.4.2 Privacy Implications of Personalization
- 9.4.3 Balancing Privacy and Personalization
- 9.4.3.1 Privacy-by-Design
- 9.4.3.2 Privacy Tools
- 9.5 Conclusion
- References
- 10 Healthcare Privacy
- 10.1 Privacy in Healthcare
- 10.2 Risks
- 10.2.1 Data, Protected Health Information, and Applications
- 10.2.2 Sources and Stakeholders
- 10.2.3 Process and Services
- 10.2.4 Trade-Offs
- 10.3 Regulations
- 10.3.1 Acts
- 10.3.2 Legislation, Administrative Agencies, and Rules
- 10.3.3 Safeguards, Policies, Procedures, and Forms
- 10.4 Limitations and Challenges in Current Practices
- 10.5 Recommendations
- 10.5.1 Healthcare Practitioners
- 10.5.2 Patients and Caregivers
- 10.5.3 Insurance Companies
- 10.5.4 Technologists
- 10.5.5 Regulators
- 10.5.6 Third-Party Organizations
- 10.6 Conclusion
- References
- 11 Privacy and the Internet of Things
- 11.1 Defining IoT
- 11.1.1 Wearable IoT Domain
- 11.1.2 Household IoT Domain
- 11.1.3 Public IoT Domain.
- 11.1.4 Outline
- 11.2 Privacy Challenges
- 11.2.1 No Awareness/No Interface
- 11.2.2 Accumulation and Inference of Data
- 11.2.3 Multiple Users
- 11.2.4 Little Control
- 11.2.5 (In)Security of IoT Devices
- 11.3 Case Studies
- 11.3.1 Fitness Trackers
- 11.3.2 Smart Voice Assistants
- 11.3.3 Security Cameras
- 11.4 Solutions and Guidelines
- 11.4.1 Privacy Notices and Awareness Mechanisms
- 11.4.2 On Device Controls
- 11.4.3 Data Privacy
- 11.4.4 Community-Oriented Controls
- 11.4.5 Context-Adaptive and User-Tailored Privacy
- 11.5 Conclusion
- References
- Part III Audiences
- 12 Cross-Cultural Privacy Differences
- 12.1 Introduction
- 12.2 How to Study Culture
- 12.2.1 Cultural Dimensions
- 12.2.2 Cultural Differences in Behaviors
- 12.2.3 Cultural Differences in Perceptions
- 12.2.3.1 Step 1: Define a Factor Model Based on the Items in a Questionnaire
- 12.2.3.2 Step 2: Configural Invariance
- 12.2.3.3 Step 3: Metric Invariance
- 12.2.3.4 Step 4: Scalar Invariance
- 12.2.3.5 Step 5: Full Invariance
- 12.3 Cross-Cultural Privacy Differences in Social Media
- 12.3.1 Cultural Differences in Sharing with Different Social Relationships
- 12.3.2 Cultural Differences in Collective Privacy Management
- 12.3.2.1 Cultural Differences in Interpretations of Collective Privacy Management Strategies
- 12.3.2.2 Cultural Differences in Perceptions of Others' or Group Privacy
- 12.3.3 Design Implications
- 12.3.3.1 Invest More Effort to Support Collective Privacy Management in Collectivistic Countries
- 12.3.3.2 Differentiate Considerations in Audience Control in Different Cultures
- 12.3.3.3 Provide More Privacy Support to Protect Others' Privacy in Collectivistic Countries
- 12.3.3.4 Secure Individual Privacy in Individualistic Countries.
- 12.4 Cross-Cultural Privacy Differences in Users' Information Disclosure to Organizations
- 12.4.1 Cultural Differences in Data Collection Entities
- 12.4.2 Cultural Differences in Usage Purpose
- 12.4.3 Cultural Differences in Collection Methods
- 12.4.4 Cultural Differences in Value Exchange from Data Collection
- 12.4.5 Cultural Differences in Third-Party Accountability
- 12.4.6 Design Implications
- 12.4.6.1 Customize Data Collection Strategies in Different Countries
- 12.4.6.2 Enable Different Options in Different Countries to Control Personal Data Flow
- 12.4.6.3 Differentiate Relationships Between Privacy Perceptions and Privacy Decisions in Different Cultures
- 12.5 Conclusions
- References
- 13 Accessible Privacy
- 13.1 Introduction
- 13.2 Privacy and Underserved Populations
- 13.2.1 Models of Disability
- 13.2.2 People with Visual Impairments
- 13.2.3 Are Existing Privacy-Enhancing Technologies Sufficient?
- 13.2.4 Intersectional Privacy
- 13.2.5 People with Hidden Disabilities
- 13.2.6 People with Other Disabilities
- 13.3 Why Is Accessible Privacy Difficult?
- 13.4 Working Towards Accessible Privacy
- 13.5 Future Directions
- References
- 14 Privacy in Adolescence
- 14.1 Introduction
- 14.1.1 The Developmental Stage of Adolescence
- 14.1.2 Adolescence as a "Privacy Paradox"
- 14.2 Teens and Networked Privacy: Empirical Evidence
- 14.2.1 Privacy Turbulence Within Families
- 14.2.2 Risk as a Learning Process and the Suppressive Effect of Restrictive Parental Mediation During Adolescence
- 14.3 Designing Sociotechnical Systems to Support Adolescence
- 14.4 Design Guidelines for Privacy and Risk-Taking During Adolescence
- 14.5 Summary
- References
- 15 Privacy and Vulnerable Populations
- 15.1 Introduction
- 15.2 How Technology Reinforces and Promotes Inequality.
- 15.3 Who Is Vulnerable: Defining Unique Privacy Concerns.