- ホーム
- > 洋書
- > ドイツ書
- > Humanities, Arts & Music
- > Psychology
Full Description
This book covers topics needed to be considered in research around usable privacy. The book starts from a psychological perspective and introduces readers to basic behavioral theories and models that can explain end-user privacy behavior (including the "privacy paradox") on a theoretical level. Subsequently, an introduction to different study methods (e.g., experiment, survey, interviews, co-creation) used in usable privacy research is given. Based on this, different methodological aspects, such as identifying appropriate questionnaires, and applying User-Centered Design, will be discussed. Finally, the book describes application areas for privacy research such as dark patterns and presents solutions for privacy protection, e.g., regarding consent-giving and PETs. The book aims to bring together the different research approaches to the topic of usable privacy, which often originate from computer science, psychology, and law, and provide a methodologically sound basis for researchers who want to delve deeper into this topic.
This is an open access book.
Contents
Forward.- About this book.- Acknowledgements.- Part I Theory.- Chapter 1 Data Collection Isn't Mostly Harmless: An Introduction to Privacy Theories and Basics.- Chapter 2 From the Privacy Calculus to Crossing the Rubicon: An Introduction to Theoretical Models of User Privacy Behavior.- Part II Methodology.- Chapter 3 Empirical Research Methods in Usable Privacy and Security.- Chapter 4 Towards Valid and Reliable Privacy Concern Scales: The Example of IUIPC-8.- Chapter 5 Achieving Usable Security and Privacy through Human-Centered Design.- Chapter 6 What HCI Can Do for (Data Protection) Law - Beyond Design.- Chapter 7 Expert Opinions as a Method of Validating Ideas: Applied to Making GDPR Usable.- Part III Applicable Areas.- Chapter 8 Privacy Nudges and Informed Consent? - Challenges for Privacy Nudge Design.- Chapter 9 The Hows and Whys of Dark Patterns: Categorizations and Privacy.- Chapter 10 "They see me scrolling" - Lessons Learned From Investigating Shoulder Surfing Behavior and Attack Mitigation Strategies.- Chapter 11 Privacy Research on the Pulse of Time: COVID-19 Contact Tracing Apps.- Chapter 12 Privacy Perception and Behavior in Safety-Critical Environments.- Part IV Solutions.- Chapter 13 Generic Consents in Digital Ecosystems: Legal, Psychological and Technical Perspectives.- Chapter 14 Human-Centered Design for Data-Sparse Tailored Privacy Information Provision.- Chapter 15 Acceptance Factors of Privacy Enhancing Technologies on the Basis of Tor and JonDonym.- Chapter 16 Increasing Users' Privacy Awareness in the Internet of Things: Design Space and Sample Scenarios.- Chapter 17 Challenges, Conflicts and Solution Strategies for the Introduction of Corporate Data Protection Measures.- Chapter 18 Data Cart - A Privacy Pattern for Personal Data Management in Organizations.