001476298 000__ 05255cam\\22006497i\4500 001476298 001__ 1476298 001476298 003__ OCoLC 001476298 005__ 20231003174642.0 001476298 006__ m\\\\\o\\d\\\\\\\\ 001476298 007__ cr\un\nnnunnun 001476298 008__ 230824s2023\\\\sz\a\\\\o\\\\\001\0\eng\d 001476298 019__ $$a1396180666$$a1396896319 001476298 020__ $$a9783031286438$$q(electronic bk.) 001476298 020__ $$a303128643X$$q(electronic bk.) 001476298 020__ $$z9783031286421 001476298 020__ $$z3031286421 001476298 020__ $$z3031286456 001476298 020__ $$z9783031286452 001476298 0247_ $$a10.1007/978-3-031-28643-8$$2doi 001476298 035__ $$aSP(OCoLC)1395077403 001476298 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dEBLCP 001476298 049__ $$aISEA 001476298 050_4 $$aBF637.P74 001476298 08204 $$a005.7$$223/eng/20230824 001476298 24500 $$aHuman factors in privacy research /$$cNina Gerber, Alina Stöver, Karola Marky, editors. 001476298 264_1 $$aCham :$$bSpringer,$$c2023. 001476298 300__ $$a1 online resource (xiv, 380 pages) :$$billustrations (some color) 001476298 336__ $$atext$$btxt$$2rdacontent 001476298 337__ $$acomputer$$bc$$2rdamedia 001476298 338__ $$aonline resource$$bcr$$2rdacarrier 001476298 500__ $$aIncludes index. 001476298 5050_ $$aForward -- About this book -- Acknowledgements -- Part I Theory -- Chapter 1 Data Collection Isn't Mostly Harmless: An Introduction to Privacy Theories and Basics -- Chapter 2 From the Privacy Calculus to Crossing the Rubicon: An Introduction to Theoretical Models of User Privacy Behavior -- Part II Methodology -- Chapter 3 Empirical Research Methods in Usable Privacy and Security -- Chapter 4 Towards Valid and Reliable Privacy Concern Scales: The Example of IUIPC-8 -- Chapter 5 Achieving Usable Security and Privacy through Human-Centered Design -- Chapter 6 What HCI Can Do for (Data Protection) Law - Beyond Design -- Chapter 7 Expert Opinions as a Method of Validating Ideas: Applied to Making GDPR Usable -- Part III Applicable Areas -- Chapter 8 Privacy Nudges and Informed Consent? - Challenges for Privacy Nudge Design -- Chapter 9 The Hows and Whys of Dark Patterns: Categorizations and Privacy -- Chapter 10 "They see me scrolling" - Lessons Learned From Investigating Shoulder Surfing Behavior and Attack Mitigation Strategies -- Chapter 11 Privacy Research on the Pulse of Time: COVID-19 Contact Tracing Apps -- Chapter 12 Privacy Perception and Behavior in Safety-Critical Environments -- Part IV Solutions -- Chapter 13 Generic Consents in Digital Ecosystems: Legal, Psychological and Technical Perspectives -- Chapter 14 Human-Centered Design for Data-Sparse Tailored Privacy Information Provision -- Chapter 15 Acceptance Factors of Privacy Enhancing Technologies on the Basis of Tor and JonDonym -- Chapter 16 Increasing Users' Privacy Awareness in the Internet of Things: Design Space and Sample Scenarios -- Chapter 17 Challenges, Conflicts and Solution Strategies for the Introduction of Corporate Data Protection Measures -- Chapter 18 Data Cart - A Privacy Pattern for Personal Data Management in Organizations. 001476298 5060_ $$aOpen access.$$5GW5XE 001476298 520__ $$aThis book covers topics needed to be considered in research around usable privacy. The book starts from a psychological perspective and introduces readers to basic behavioral theories and models that can explain end-user privacy behavior (including the "privacy paradox") on a theoretical level. Subsequently, an introduction to different study methods (e.g., experiment, survey, interviews, co-creation) used in usable privacy research is given. Based on this, different methodological aspects, such as identifying appropriate questionnaires, and applying User-Centered Design, will be discussed. Finally, the book describes application areas for privacy research such as dark patterns and presents solutions for privacy protection, e.g., regarding consent-giving and PETs. The book aims to bring together the different research approaches to the topic of usable privacy, which often originate from computer science, psychology, and law, and provide a methodologically sound basis for researchers who want to delve deeper into this topic. This is an open access book. 001476298 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed August 24, 2023). 001476298 650_0 $$aPrivacy$$xResearch. 001476298 650_0 $$aPrivacy, Right of$$xResearch. 001476298 650_0 $$aUser-centered system design. 001476298 655_0 $$aElectronic books. 001476298 7001_ $$aGerber, Nina,$$eeditor. 001476298 7001_ $$aStöver, Alina,$$eeditor. 001476298 7001_ $$aMarky, Karola,$$eeditor. 001476298 77608 $$iPrint version: $$z3031286421$$z9783031286421$$z3031286456$$z9783031286452$$w(OCoLC)1371014165 001476298 852__ $$bebk 001476298 85640 $$3Springer Nature$$uhttps://link.springer.com/10.1007/978-3-031-28643-8$$zOnline Access$$91397441.2 001476298 909CO $$ooai:library.usi.edu:1476298$$pGLOBAL_SET 001476298 980__ $$aBIB 001476298 980__ $$aEBOOK 001476298 982__ $$aEbook 001476298 983__ $$aOnline 001476298 994__ $$a92$$bISE