Modern Socio-Technical Perspectives on Privacy.

Bibliographic Details
Main Author: Knijnenburg, Bart P.
Other Authors: Page, Xinru., Wisniewski, Pamela., Lipford, Heather Richter., Proferes, Nicholas., Romano, Jennifer.
Format: eBook
Language:English
Published: Cham : Springer International Publishing AG, 2022.
Edition:1st ed.
Subjects:
Online Access:Click to View
Table of Contents:
  • Intro
  • Foreword
  • Acknowledgement
  • Contents
  • 1 Introduction and Overview
  • 1.1 Introduction
  • 1.2 What Is Privacy?
  • 1.3 Privacy Theory and Methods
  • 1.4 Domains
  • 1.5 Audiences
  • 1.6 Moving Forward
  • 1.7 Conclusion
  • References
  • Part I Privacy Theory and Methods
  • 2 Privacy Theories and Frameworks
  • 2.1 Introduction
  • 2.2 Privacy as Information Disclosure
  • 2.2.1 Privacy Calculus: Assessing the Benefit vs. Cost of Information Disclosures
  • 2.2.2 Privacy Paradox: The Discrepancy Between Users' Privacy Concerns and Information Disclosure Behavior
  • 2.2.3 Westin's Privacy Taxonomy: The Classification of Consumers' Privacy Knowledge and Preferences
  • 2.3 Privacy as an Interpersonal Boundary Regulation Process
  • 2.3.1 Altman's Conceptualization of Privacy
  • 2.3.2 Petronio's Communication Privacy Management Theory
  • 2.4 Privacy as Social Context, Norms, and Values
  • 2.4.1 Considering Social Contexts
  • 2.4.2 Identifying Privacy Norms and Human Values in Design
  • 2.4.3 Applying Contextual Integrity to Practice
  • 2.5 A Privacy Affordance and Design Perspective
  • 2.5.1 Privacy Affordances
  • 2.5.2 Privacy by Design
  • 2.6 The Future of Modern Privacy: Individual Differences and User-Centered Privacy
  • 2.7 Guidelines for Applying Privacy Frameworks in Practice
  • 2.8 Chapter Summary
  • References
  • 3 Revisiting APCO
  • 3.1 Introduction
  • 3.2 The APCO Model
  • 3.2.1 The Antecedents of Privacy Concerns
  • 3.2.2 Privacy Concerns
  • 3.2.3 Measuring Privacy Concerns
  • 3.2.4 Trust and Privacy Calculus
  • 3.3 Enhanced APCO: An Expanded View on Privacy Research
  • 3.4 The Research Landscape After APCO
  • 3.4.1 Evolution of Technology and Personalization of Services
  • 3.5 Conclusion and Avenues of Future Research
  • References
  • 4 Privacy and Behavioral Economics
  • 4.1 Introduction
  • 4.2 Uncertainty
  • 4.3 Context-Dependence.
  • 4.4 Malleability and Influence
  • 4.5 Conclusions
  • References
  • 5 The Development of Privacy Norms
  • 5.1 Introduction
  • 5.2 Privacy and Challenges in Relation to Technology
  • 5.3 Privacy as Contextual Integrity
  • 5.4 Building Expectations
  • 5.5 Negotiating Norms and Negotiating Technology
  • 5.6 Conclusion
  • References
  • 6 Privacy Beyond the Individual Level
  • 6.1 Introduction
  • 6.2 Types of Groups and Types of Group Privacy
  • 6.2.1 Types of Groups: Self-Constituted Groups and Algorithmically Determined Groups
  • 6.2.2 Types of Group Privacy: "Their" Privacy and "Its" Privacy
  • 6.2.3 Distinguishing Between Types and Levels of Privacy
  • 6.3 Contemporary Practices That Influence the Privacy of Multiple Actors or Groups
  • 6.4 Dynamics of Multi-stakeholder Privacy Decision-Making
  • 6.5 Tensions Between Privacy Rights of Individuals Versus Groups
  • 6.6 Recommendations for Tools and Mechanisms to Protect Privacy Beyond the Individual Level
  • 6.7 Conclusion
  • References
  • Part II Domains
  • 7 Social Media and Privacy
  • 7.1 Introduction
  • 7.2 A Brief History of Social Media
  • 7.3 Privacy Challenges in Social Media
  • 7.3.1 Information Disclosure/Control over Who Sees What
  • 7.3.2 Unique Considerations for Managing Disclosures Within Social Media
  • 7.3.3 Reputation Management Through Self-Presentation
  • 7.3.4 Access to Oneself
  • 7.3.5 Privacy Paradox
  • 7.4 Reconceptualizing Social Media Privacy as Boundary Regulation
  • 7.4.1 Boundary Regulation on Social Media
  • 7.4.2 Coping with Social Media Privacy Violations
  • 7.5 Addressing Privacy Challenges
  • 7.5.1 Understanding People and Their Privacy Concerns
  • 7.5.2 Measuring Privacy Concerns
  • 7.5.3 Designing Privacy Features
  • 7.5.4 Privacy Concerns and Social Disenfranchisement
  • 7.5.5 Guidelines for Designing Privacy-Sensitive Social Media
  • 7.6 Chapter Summary
  • References.
  • 8 Privacy-Enhancing Technologies
  • 8.1 Introduction
  • 8.2 Secure Messaging
  • 8.3 Secure Email
  • 8.4 HTTPS
  • 8.4.1 HTTPS Warning Messages
  • 8.4.2 HTTPS Development and Deployment
  • 8.4.3 HTTPS Interception
  • 8.5 Two-Factor Authentication
  • 8.6 Anonymity
  • 8.7 Summary
  • References
  • 9 Tracking and Personalization
  • 9.1 Introduction
  • 9.2 Aspects of Personalization
  • 9.2.1 Goals of Personalization
  • 9.2.2 Personalization Environments
  • 9.2.2.1 Web Personalization
  • 9.2.2.2 Mobile Personalization
  • 9.3 Online Tracking
  • 9.3.1 Tracking Contexts
  • 9.3.2 Tracking Entities
  • 9.3.2.1 First-Party Tracking
  • 9.3.2.2 Third-Party Tracking
  • 9.3.3 Tracking Techniques
  • 9.3.3.1 Deployed Tracking Techniques
  • 9.3.3.2 Potential Tracking Techniques
  • 9.3.4 Behavioral Tracking: State of the Art
  • 9.4 Personalization via Online Tracking
  • 9.4.1 Relationship
  • 9.4.2 Privacy Implications of Personalization
  • 9.4.3 Balancing Privacy and Personalization
  • 9.4.3.1 Privacy-by-Design
  • 9.4.3.2 Privacy Tools
  • 9.5 Conclusion
  • References
  • 10 Healthcare Privacy
  • 10.1 Privacy in Healthcare
  • 10.2 Risks
  • 10.2.1 Data, Protected Health Information, and Applications
  • 10.2.2 Sources and Stakeholders
  • 10.2.3 Process and Services
  • 10.2.4 Trade-Offs
  • 10.3 Regulations
  • 10.3.1 Acts
  • 10.3.2 Legislation, Administrative Agencies, and Rules
  • 10.3.3 Safeguards, Policies, Procedures, and Forms
  • 10.4 Limitations and Challenges in Current Practices
  • 10.5 Recommendations
  • 10.5.1 Healthcare Practitioners
  • 10.5.2 Patients and Caregivers
  • 10.5.3 Insurance Companies
  • 10.5.4 Technologists
  • 10.5.5 Regulators
  • 10.5.6 Third-Party Organizations
  • 10.6 Conclusion
  • References
  • 11 Privacy and the Internet of Things
  • 11.1 Defining IoT
  • 11.1.1 Wearable IoT Domain
  • 11.1.2 Household IoT Domain
  • 11.1.3 Public IoT Domain.
  • 11.1.4 Outline
  • 11.2 Privacy Challenges
  • 11.2.1 No Awareness/No Interface
  • 11.2.2 Accumulation and Inference of Data
  • 11.2.3 Multiple Users
  • 11.2.4 Little Control
  • 11.2.5 (In)Security of IoT Devices
  • 11.3 Case Studies
  • 11.3.1 Fitness Trackers
  • 11.3.2 Smart Voice Assistants
  • 11.3.3 Security Cameras
  • 11.4 Solutions and Guidelines
  • 11.4.1 Privacy Notices and Awareness Mechanisms
  • 11.4.2 On Device Controls
  • 11.4.3 Data Privacy
  • 11.4.4 Community-Oriented Controls
  • 11.4.5 Context-Adaptive and User-Tailored Privacy
  • 11.5 Conclusion
  • References
  • Part III Audiences
  • 12 Cross-Cultural Privacy Differences
  • 12.1 Introduction
  • 12.2 How to Study Culture
  • 12.2.1 Cultural Dimensions
  • 12.2.2 Cultural Differences in Behaviors
  • 12.2.3 Cultural Differences in Perceptions
  • 12.2.3.1 Step 1: Define a Factor Model Based on the Items in a Questionnaire
  • 12.2.3.2 Step 2: Configural Invariance
  • 12.2.3.3 Step 3: Metric Invariance
  • 12.2.3.4 Step 4: Scalar Invariance
  • 12.2.3.5 Step 5: Full Invariance
  • 12.3 Cross-Cultural Privacy Differences in Social Media
  • 12.3.1 Cultural Differences in Sharing with Different Social Relationships
  • 12.3.2 Cultural Differences in Collective Privacy Management
  • 12.3.2.1 Cultural Differences in Interpretations of Collective Privacy Management Strategies
  • 12.3.2.2 Cultural Differences in Perceptions of Others' or Group Privacy
  • 12.3.3 Design Implications
  • 12.3.3.1 Invest More Effort to Support Collective Privacy Management in Collectivistic Countries
  • 12.3.3.2 Differentiate Considerations in Audience Control in Different Cultures
  • 12.3.3.3 Provide More Privacy Support to Protect Others' Privacy in Collectivistic Countries
  • 12.3.3.4 Secure Individual Privacy in Individualistic Countries.
  • 12.4 Cross-Cultural Privacy Differences in Users' Information Disclosure to Organizations
  • 12.4.1 Cultural Differences in Data Collection Entities
  • 12.4.2 Cultural Differences in Usage Purpose
  • 12.4.3 Cultural Differences in Collection Methods
  • 12.4.4 Cultural Differences in Value Exchange from Data Collection
  • 12.4.5 Cultural Differences in Third-Party Accountability
  • 12.4.6 Design Implications
  • 12.4.6.1 Customize Data Collection Strategies in Different Countries
  • 12.4.6.2 Enable Different Options in Different Countries to Control Personal Data Flow
  • 12.4.6.3 Differentiate Relationships Between Privacy Perceptions and Privacy Decisions in Different Cultures
  • 12.5 Conclusions
  • References
  • 13 Accessible Privacy
  • 13.1 Introduction
  • 13.2 Privacy and Underserved Populations
  • 13.2.1 Models of Disability
  • 13.2.2 People with Visual Impairments
  • 13.2.3 Are Existing Privacy-Enhancing Technologies Sufficient?
  • 13.2.4 Intersectional Privacy
  • 13.2.5 People with Hidden Disabilities
  • 13.2.6 People with Other Disabilities
  • 13.3 Why Is Accessible Privacy Difficult?
  • 13.4 Working Towards Accessible Privacy
  • 13.5 Future Directions
  • References
  • 14 Privacy in Adolescence
  • 14.1 Introduction
  • 14.1.1 The Developmental Stage of Adolescence
  • 14.1.2 Adolescence as a "Privacy Paradox"
  • 14.2 Teens and Networked Privacy: Empirical Evidence
  • 14.2.1 Privacy Turbulence Within Families
  • 14.2.2 Risk as a Learning Process and the Suppressive Effect of Restrictive Parental Mediation During Adolescence
  • 14.3 Designing Sociotechnical Systems to Support Adolescence
  • 14.4 Design Guidelines for Privacy and Risk-Taking During Adolescence
  • 14.5 Summary
  • References
  • 15 Privacy and Vulnerable Populations
  • 15.1 Introduction
  • 15.2 How Technology Reinforces and Promotes Inequality.
  • 15.3 Who Is Vulnerable: Defining Unique Privacy Concerns.