Privacy protection in pervasive systems: State of the art and technical challenges
Pervasive and mobile computing applications are dramatically increasing the amount of
personal data released to service providers as well as to third parties. Data includes …
personal data released to service providers as well as to third parties. Data includes …
Secrets and likes: The drive for privacy and the difficulty of achieving it in the digital age
We review different streams of social science literature on privacy with the goal of
understanding consumer privacy decision making and deriving implications for policy. We …
understanding consumer privacy decision making and deriving implications for policy. We …
A room with an overview: Towards meaningful transparency for the consumer Internet of Things
As our physical environments become ever-more connected, instrumented, and automated,
it can be increasingly difficult for users to understand what is happening within them and …
it can be increasingly difficult for users to understand what is happening within them and …
Beyond the personalization–privacy paradox: Privacy valuation, transparency features, and service personalization
S Karwatzki, O Dytynko, M Trenz… - Journal of Management …, 2017 - Taylor & Francis
Digital services need access to consumers' data to improve service quality and to generate
revenues. However, it remains unclear how such services should be configured to facilitate …
revenues. However, it remains unclear how such services should be configured to facilitate …
An empirical investigation of the antecedents and consequences of privacy uncertainty in the context of mobile apps
When using digital goods that extensively collect user information, privacy uncertainty, which
is consumers' difficulty in assessing the privacy of the data they entrust to others, is a major …
is consumers' difficulty in assessing the privacy of the data they entrust to others, is a major …
Too tired and in too good of a mood to worry about privacy: explaining the privacy paradox through the lens of effort level in information processing
The confluence of digital transactions, growing cybersecurity threats, and the internet of the
future (eg, web 3.0 and the metaverse) have made information privacy increasingly …
future (eg, web 3.0 and the metaverse) have made information privacy increasingly …
Information disclosure of social media users: does control over personal information, user awareness and security notices matter?
Purpose–The purpose of this paper is to bridge the gap in the existing literature by exploring
the antecedents of information disclosure of social media users. In particular, the paper …
the antecedents of information disclosure of social media users. In particular, the paper …
How short is too short? Implications of length and framing on the effectiveness of privacy notices
Privacy policies are often too long and difficult to understand, and are therefore ignored by
users. Shorter privacy notices with clearer wording may increase users' privacy awareness …
users. Shorter privacy notices with clearer wording may increase users' privacy awareness …
[PDF][PDF] The cyber security body of knowledge
D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …
The project would like organisations using, or intending to use, CyBOK for the purposes of …
Prospective consent: The effect of framing on cookie consent decisions
Prospect theory is a behavioral model of how people make decisions in the presence of risk;
this work explores the application of prospect theory, particularly the reference-dependence …
this work explores the application of prospect theory, particularly the reference-dependence …