Bringing design to the privacy table: Broadening “design” in “privacy by design” through the lens of HCI

RY Wong, DK Mulligan - Proceedings of the 2019 CHI conference on …, 2019 - dl.acm.org
In calls for privacy by design (PBD), regulators and privacy scholars have investigated the
richness of the concept of" privacy." In contrast," design" in HCI is comprised of rich and …

Detecting privacy requirements from User Stories with NLP transfer learning models

F Casillo, V Deufemia, C Gravino - Information and Software Technology, 2022 - Elsevier
Context: To provide privacy-aware software systems, it is crucial to consider privacy from the
very beginning of the development. However, developers do not have the expertise and the …

Privacy detective: Detecting private information and collective privacy behavior in a large social network

A Caliskan Islam, J Walsh, R Greenstadt - Proceedings of the 13th …, 2014 - dl.acm.org
Detecting the presence and amount of private information being shared in online media is
the first step towards analyzing information revealing habits of users in social networks and …

[HTML][HTML] “Most Americans like their privacy.” Exploring privacy concerns through US guests' reviews

D D'Acunto, S Volo, R Filieri - International Journal of Contemporary …, 2021 - emerald.com
Purpose This study aims to explore US hotel guests' privacy concerns with a twofold aim as
follows: to investigate the privacy categories, themes and attributes most commonly …

Analysis and classification of privacy-sensitive content in social media posts

L Bioglio, RG Pensa - EPJ Data Science, 2022 - epjds.epj.org
User-generated contents often contain private information, even when they are shared
publicly on social media and on the web in general. Although many filtering and natural …

Do security and privacy policies in B2B and B2C e-commerce differ? A comparative study using content analysis

KA Vakeel, S Das, GJ Udo, K Bagchi - Behaviour & Information …, 2017 - Taylor & Francis
Security and privacy policies address consumer concerns related to security and privacy in e-
commerce websites. As these policies represent only the vendor's perspective, often there …

Inside the black box of dictionary building for text analytics: a design science approach

Q Deng, MJ Hine, S Ji, S Sur - Journal of …, 2019 - scholarworks.lib.csusb.edu
The purpose of this paper is to develop and demonstrate a dictionary building process
model for text analytics projects following the design science methodology. Using inductive …

[HTML][HTML] How does an imaginary persona's attractiveness affect designers' perceptions and IT solutions? An experimental study on users' remote working needs

J Salminen, JM Santos, S Jung… - Information Technology & …, 2023 - emerald.com
Purpose The “what is beautiful is good”(WIBIG) effect implies that observers tend to perceive
physically attractive people in a positive light. The authors investigate how the WIBIG effect …

What is' Cyber Security'? Differential Language of Cyber Security Across the Lifespan

SL Jones, EIM Collins, A Levordashka, K Muir… - Extended Abstracts of …, 2019 - dl.acm.org
People experience and understand cyber security differently. Our ongoing work aims to
address the fundamental challenge of how we can understand a diverse range of cyber …

An Automatic Privacy‐Aware Framework for Text Data in Online Social Network Based on a Multi‐Deep Learning Model

G Liu, X Sun, Y Li, H Li, S Zhao… - International Journal of …, 2023 - Wiley Online Library
With the increasing severity of user privacy leaks in online social networks (OSNs), existing
privacy protection technologies have difficulty meeting the diverse privacy protection needs …