Nudges for privacy and security: Understanding and assisting users' choices online
Advancements in information technology often task users with complex and consequential
privacy and security decisions. A growing body of research has investigated individuals' …
privacy and security decisions. A growing body of research has investigated individuals' …
Blockchain technology as a regulatory technology: From code is law to law is code
P De Filippi, S Hassan - arXiv preprint arXiv:1801.02507, 2018 - arxiv.org
" Code is law" refers to the idea that, with the advent of digital technology, code has
progressively established itself as the predominant way to regulate the behavior of Internet …
progressively established itself as the predominant way to regulate the behavior of Internet …
A design space for effective privacy notices
F Schaub, R Balebako, AL Durity… - Eleventh symposium on …, 2015 - usenix.org
Notifying users about a system's data practices is supposed to enable users to make
informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy …
informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy …
Taking account of privacy when designing cloud computing services
S Pearson - 2009 ICSE Workshop on Software Engineering …, 2009 - ieeexplore.ieee.org
Privacy is an important issue for cloud computing, both in terms of legal compliance and
user trust, and needs to be considered at every phase of design. In this paper the privacy …
user trust, and needs to be considered at every phase of design. In this paper the privacy …
Digital privacy challenges with shared mobile phone use in Bangladesh
Prior research on technology use in the Global South suggests that people in marginalized
communities frequently share a single device among multiple individuals. However, the data …
communities frequently share a single device among multiple individuals. However, the data …
How short is too short? Implications of length and framing on the effectiveness of privacy notices
Privacy policies are often too long and difficult to understand, and are therefore ignored by
users. Shorter privacy notices with clearer wording may increase users' privacy awareness …
users. Shorter privacy notices with clearer wording may increase users' privacy awareness …
End-user privacy in human–computer interaction
G Iachello, J Hong - Foundations and Trends® in Human …, 2007 - nowpublishers.com
The purpose of this article is twofold. First, we summarize research on the topic of privacy in
Human–Computer Interaction (HCI), outlining current approaches, results, and trends …
Human–Computer Interaction (HCI), outlining current approaches, results, and trends …
[PDF][PDF] Privacy enhancing technologies: A review
Organisations handle employees', customers' and third parties' Personally Identifiable
Information (PII) in a number of ways and for a variety of reasons; when doing this, it is …
Information (PII) in a number of ways and for a variety of reasons; when doing this, it is …
Tools for achieving usable ex post transparency: a survey
P Murmann, S Fischer-Hübner - IEEE Access, 2017 - ieeexplore.ieee.org
Transparency of personal data processing is a basic privacy principle and a right that is well
acknowledged by data protection legislation, such as the EU general data protection …
acknowledged by data protection legislation, such as the EU general data protection …
A client-based privacy manager for cloud computing
A significant barrier to the adoption of cloud services is that users fear data leakage and loss
of privacy if their sensitive data is processed in the cloud. In this paper, we describe a client …
of privacy if their sensitive data is processed in the cloud. In this paper, we describe a client …