Buch, Englisch, 380 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 758 g
ISBN: 978-3-031-28642-1
Verlag: Springer
This book covers topics needed to be considered in research around usable privacy. The book starts from a psychological perspective and introduces readers to basic behavioral theories and models that can explain end-user privacy behavior (including the “privacy paradox”) on a theoretical level. Subsequently, an introduction to different study methods (e.g., experiment, survey, interviews, co-creation) used in usable privacy research is given. Based on this, different methodological aspects, such as identifying appropriate questionnaires, and applying User-Centered Design, will be discussed. Finally, the book describes application areas for privacy research such as dark patterns and presents solutions for privacy protection, e.g., regarding consent-giving and PETs. The book aims to bring together the different research approaches to the topic of usable privacy, which often originate from computer science, psychology, and law, and provide a methodologically sound basis for researchers who want to delve deeper into this topic.
This is an open access book.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein
- Sozialwissenschaften Psychologie Psychologie / Allgemeines & Theorie Psychologie: Allgemeines
- Technische Wissenschaften Elektronik | Nachrichtentechnik Nachrichten- und Kommunikationstechnik Signalverarbeitung
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz
- Geisteswissenschaften Philosophie Moderne Philosophische Disziplinen Philosophie des Geistes, Neurophilosophie
Weitere Infos & Material
- Foreword, by: requested from Prof. Jason Hong (Carnegie Mellon University) – answer pending
- Preface: History and importance of usable privacy, contribution of the present book- (1) Introduction/Theoretical background:
o 1.1 Psychological theories (e.g., theory of planned behavior)
o 1.2 behavioral models (e.g., risk-trust-model)
o 1.3 Privacy personas
o 1.4 Dimensions of privacy
o 1.5 Cultural aspects- (2) Methodological aspects
o 2.1 Description of different types of studies (e.g., laboratory study, survey study, field study, interview study)
o 2.2 Relevant questionnaires for privacy studieso 2.3 Dependent variables (what should be measured in privacy studies)
o 2.4 Challenges of measuring actual privacy behavior, conducting field studies, conducting long term studies, conducting online (remote) studies (incl. checklists)
- (3) Application areas for privacy research:
o 3.1 IoT
o 3.2 Social media
o 3.3 Healtho 3.4 App permissions and smartphone privacy settings
o 3.5 Contact tracing apps
o 3.6 Cookies
o 3.7 Perspective of service providers
o 3.8 Dark pattern- (4) Privacy protection:
o 4.1 Privacy enhancing technologies (e.g., privacy assistants, privacy score)
o 4.2 Privacy iconso 4.3 Interventions for raising privacy awareness (e.g., quizzes, communication of privacy consequences)
o 4.4 Nudging
- Index: Figures, tables, abbreviations
- Bibliography
- Glossary




