Vai al contenuto principale della pagina
Autore: | Gerber Nina |
Titolo: | Human Factors in Privacy Research / / edited by Nina Gerber, Alina Stöver, Karola Marky |
Pubblicazione: | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Edizione: | 1st ed. 2023. |
Descrizione fisica: | 1 online resource (380 pages) |
Disciplina: | 150 |
Soggetto topico: | Psychology |
Cognitive science | |
Computer science | |
Human-machine systems | |
Data protection - Law and legislation | |
Artificial intelligence | |
Behavioral Sciences and Psychology | |
Cognitive Science | |
Computer Science | |
Human-Machine Interfaces | |
Privacy | |
Artificial Intelligence | |
Ciència cognitiva | |
Sistemes persona-màquina | |
Protecció de dades | |
Intel·ligència artificial | |
Soggetto genere / forma: | Llibres electrònics |
Altri autori: | StöverAlina MarkyKarola |
Nota di contenuto: | Forward -- About this book -- Acknowledgements -- Part I Theory -- Chapter 1 Data Collection Isn't Mostly Harmless: An Introduction to Privacy Theories and Basics -- Chapter 2 From the Privacy Calculus to Crossing the Rubicon: An Introduction to Theoretical Models of User Privacy Behavior -- Part II Methodology -- Chapter 3 Empirical Research Methods in Usable Privacy and Security -- Chapter 4 Towards Valid and Reliable Privacy Concern Scales: The Example of IUIPC-8 -- Chapter 5 Achieving Usable Security and Privacy through Human-Centered Design -- Chapter 6 What HCI Can Do for (Data Protection) Law - Beyond Design -- Chapter 7 Expert Opinions as a Method of Validating Ideas: Applied to Making GDPR Usable -- Part III Applicable Areas -- Chapter 8 Privacy Nudges and Informed Consent? - Challenges for Privacy Nudge Design -- Chapter 9 The Hows and Whys of Dark Patterns: Categorizations and Privacy -- Chapter 10 "They see me scrolling" - Lessons Learned From Investigating Shoulder Surfing Behavior and Attack Mitigation Strategies -- Chapter 11 Privacy Research on the Pulse of Time: COVID-19 Contact Tracing Apps -- Chapter 12 Privacy Perception and Behavior in Safety-Critical Environments -- Part IV Solutions -- Chapter 13 Generic Consents in Digital Ecosystems: Legal, Psychological and Technical Perspectives -- Chapter 14 Human-Centered Design for Data-Sparse Tailored Privacy Information Provision -- Chapter 15 Acceptance Factors of Privacy Enhancing Technologies on the Basis of Tor and JonDonym -- Chapter 16 Increasing Users' Privacy Awareness in the Internet of Things: Design Space and Sample Scenarios -- Chapter 17 Challenges, Conflicts and Solution Strategies for the Introduction of Corporate Data Protection Measures -- Chapter 18 Data Cart - A Privacy Pattern for Personal Data Management in Organizations. |
Sommario/riassunto: | This book covers topics needed to be considered in research around usable privacy. The book starts from a psychological perspective and introduces readers to basic behavioral theories and models that can explain end-user privacy behavior (including the “privacy paradox”) on a theoretical level. Subsequently, an introduction to different study methods (e.g., experiment, survey, interviews, co-creation) used in usable privacy research is given. Based on this, different methodological aspects, such as identifying appropriate questionnaires, and applying User-Centered Design, will be discussed. Finally, the book describes application areas for privacy research such as dark patterns and presents solutions for privacy protection, e.g., regarding consent-giving and PETs. The book aims to bring together the different research approaches to the topic of usable privacy, which often originate from computer science, psychology, and law, and provide a methodologically sound basis for researchers who want to delve deeper into this topic. This is an open access book. |
Titolo autorizzato: | Human Factors in Privacy Research |
ISBN: | 3-031-28643-X |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910737294903321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |