Nudges for privacy and security: Understanding and assisting users' choices online

A Acquisti, I Adjerid, R Balebako… - ACM Computing …, 2017 - dl.acm.org
Advancements in information technology often task users with complex and consequential
privacy and security decisions. A growing body of research has investigated individuals' …

Blockchain technology as a regulatory technology: From code is law to law is code

P De Filippi, S Hassan - arXiv preprint arXiv:1801.02507, 2018 - arxiv.org
" Code is law" refers to the idea that, with the advent of digital technology, code has
progressively established itself as the predominant way to regulate the behavior of Internet …

A design space for effective privacy notices

F Schaub, R Balebako, AL Durity… - Eleventh symposium on …, 2015 - usenix.org
Notifying users about a system's data practices is supposed to enable users to make
informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy …

Taking account of privacy when designing cloud computing services

S Pearson - 2009 ICSE Workshop on Software Engineering …, 2009 - ieeexplore.ieee.org
Privacy is an important issue for cloud computing, both in terms of legal compliance and
user trust, and needs to be considered at every phase of design. In this paper the privacy …

Digital privacy challenges with shared mobile phone use in Bangladesh

SI Ahmed, MR Haque, J Chen, N Dell - … of the ACM on Human-computer …, 2017 - dl.acm.org
Prior research on technology use in the Global South suggests that people in marginalized
communities frequently share a single device among multiple individuals. However, the data …

How short is too short? Implications of length and framing on the effectiveness of privacy notices

J Gluck, F Schaub, A Friedman, H Habib… - Twelfth symposium on …, 2016 - usenix.org
Privacy policies are often too long and difficult to understand, and are therefore ignored by
users. Shorter privacy notices with clearer wording may increase users' privacy awareness …

End-user privacy in human–computer interaction

G Iachello, J Hong - Foundations and Trends® in Human …, 2007 - nowpublishers.com
The purpose of this article is twofold. First, we summarize research on the topic of privacy in
Human–Computer Interaction (HCI), outlining current approaches, results, and trends …

[PDF][PDF] Privacy enhancing technologies: A review

Y Shen, S Pearson - … Packard Development Company. Disponible en https …, 2011 - Citeseer
Organisations handle employees', customers' and third parties' Personally Identifiable
Information (PII) in a number of ways and for a variety of reasons; when doing this, it is …

Tools for achieving usable ex post transparency: a survey

P Murmann, S Fischer-Hübner - IEEE Access, 2017 - ieeexplore.ieee.org
Transparency of personal data processing is a basic privacy principle and a right that is well
acknowledged by data protection legislation, such as the EU general data protection …

A client-based privacy manager for cloud computing

M Mowbray, S Pearson - Proceedings of the fourth international ICST …, 2009 - dl.acm.org
A significant barrier to the adoption of cloud services is that users fear data leakage and loss
of privacy if their sensitive data is processed in the cloud. In this paper, we describe a client …