Bringing design to the privacy table: Broadening “design” in “privacy by design” through the lens of HCI
RY Wong, DK Mulligan - Proceedings of the 2019 CHI conference on …, 2019 - dl.acm.org
In calls for privacy by design (PBD), regulators and privacy scholars have investigated the
richness of the concept of" privacy." In contrast," design" in HCI is comprised of rich and …
richness of the concept of" privacy." In contrast," design" in HCI is comprised of rich and …
Detecting privacy requirements from User Stories with NLP transfer learning models
Context: To provide privacy-aware software systems, it is crucial to consider privacy from the
very beginning of the development. However, developers do not have the expertise and the …
very beginning of the development. However, developers do not have the expertise and the …
Privacy detective: Detecting private information and collective privacy behavior in a large social network
A Caliskan Islam, J Walsh, R Greenstadt - Proceedings of the 13th …, 2014 - dl.acm.org
Detecting the presence and amount of private information being shared in online media is
the first step towards analyzing information revealing habits of users in social networks and …
the first step towards analyzing information revealing habits of users in social networks and …
[HTML][HTML] “Most Americans like their privacy.” Exploring privacy concerns through US guests' reviews
Purpose This study aims to explore US hotel guests' privacy concerns with a twofold aim as
follows: to investigate the privacy categories, themes and attributes most commonly …
follows: to investigate the privacy categories, themes and attributes most commonly …
Analysis and classification of privacy-sensitive content in social media posts
User-generated contents often contain private information, even when they are shared
publicly on social media and on the web in general. Although many filtering and natural …
publicly on social media and on the web in general. Although many filtering and natural …
Do security and privacy policies in B2B and B2C e-commerce differ? A comparative study using content analysis
Security and privacy policies address consumer concerns related to security and privacy in e-
commerce websites. As these policies represent only the vendor's perspective, often there …
commerce websites. As these policies represent only the vendor's perspective, often there …
Inside the black box of dictionary building for text analytics: a design science approach
The purpose of this paper is to develop and demonstrate a dictionary building process
model for text analytics projects following the design science methodology. Using inductive …
model for text analytics projects following the design science methodology. Using inductive …
[HTML][HTML] How does an imaginary persona's attractiveness affect designers' perceptions and IT solutions? An experimental study on users' remote working needs
Purpose The “what is beautiful is good”(WIBIG) effect implies that observers tend to perceive
physically attractive people in a positive light. The authors investigate how the WIBIG effect …
physically attractive people in a positive light. The authors investigate how the WIBIG effect …
What is' Cyber Security'? Differential Language of Cyber Security Across the Lifespan
People experience and understand cyber security differently. Our ongoing work aims to
address the fundamental challenge of how we can understand a diverse range of cyber …
address the fundamental challenge of how we can understand a diverse range of cyber …
An Automatic Privacy‐Aware Framework for Text Data in Online Social Network Based on a Multi‐Deep Learning Model
G Liu, X Sun, Y Li, H Li, S Zhao… - International Journal of …, 2023 - Wiley Online Library
With the increasing severity of user privacy leaks in online social networks (OSNs), existing
privacy protection technologies have difficulty meeting the diverse privacy protection needs …
privacy protection technologies have difficulty meeting the diverse privacy protection needs …