Privacy visualizations help users understand the privacy implications of using an online service. Privacy by Design guidelines provide generally accepted privacy standards for developers of online ...services. To obtain a comprehensive understanding of online privacy, we review established approaches, distill a unified list of 15 privacy attributes and rank them based on perceived importance by users and privacy experts. We then discuss similarities, explain notable differences, and examine trends in terms of the attributes covered. Finally, we show how our results provide a foundation for user-centric privacy visualizations, inspire best practices for developers, and give structure to privacy policies.
This meta‐analysis investigates privacy concerns and literacy as predictors of use of online services and social network sites (SNSs), sharing information, and adoption of privacy protective ...measures. A total of 166 studies from 34 countries (n = 75,269) were included in the analysis. In line with the premise of privacy paradox, privacy concerns did not predict SNS use. However, users concerned about privacy were less likely to use online services and share information and were more likely to utilize privacy protective measures. Except for information sharing, the relationships were comparable for intentions and behavior. Analyses also confirm the role that privacy literacy plays in enhancing use of privacy protective measures. The findings can be generalized across gender, cultural orientation, and national legal systems.
The art of data privacy Bowen, Claire McKay
Significance (Oxford, England),
February 2022, 2022-02-01, 20220201, Volume:
19, Issue:
1
Journal Article
Open access
Statistics are vital for understanding society, but they can pose a risk to the privacy of individuals who contribute their data. Claire McKay Bowen illustrates some of the methods used to minimise ...that risk – with the aid of a famous artwork
Statistics are vital for understanding society, but they can pose a risk to the privacy of individuals who contribute their data. Claire McKay Bowen illustrates some of the methods used to minimise that risk — with the aid of a famous artwork.
This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to ...modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book’s primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teacherscan assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academicswho are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.
Three Control Views on Privacy Menges, Leonhard
Social theory and practice,
10/2022, Volume:
48, Issue:
4
Journal Article
Peer reviewed
Open access
This paper discusses the idea that the concept of privacy should be understood in terms of control. Three different attempts to spell out this idea will be critically discussed. The conclusion will ...be that the Source Control View on privacy is the most promising version of the idea that privacy is to be understood in terms of control.
Vehicle-to-Everything (V2X) communication is receiving growing attention from industry and academia as multiple pilot projects explore its capabilities and feasibility. With about 50% of global road ...vehicle exports coming from the European Union (EU), and within the context of EU legislation around security and data protection, V2X initiatives must consider security and privacy aspects across the system stack, in addition to road safety. Contrary to this principle, our survey of relevant standards, research outputs, and EU pilot projects indicates otherwise; we identify multiple security- and privacy-related shortcomings and inconsistencies across the standards. We conduct a root cause analysis of the reasons and difficulties associated with these gaps, and categorize the identified security and privacy issues relative to these root causes. As a result, our comprehensive analysis sheds lights on a number of areas that require improvements in the standards, which are not explicitly identified in related work. Our analysis fills gaps left by other related surveys, which are focused on specific technical areas but do not necessarily point out underlying root issues in standard specifications. We bring forward recommendations to address these gaps for the overall improvement of security and safety in vehicular communication.