Skip to main content
Top

2018 | OriginalPaper | Chapter

Privacy in Social Information Access

Author : Bart P. Knijnenburg

Published in: Social Information Access

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Social information access (SIA) systems crucially depend on user-provided information, and must therefore provide extensive privacy provisions to encourage users to share their personal data. Even though the information SIA systems use is usually considered public, they often use this information in novel ways, and the outcomes of this process may at times lead to unintended consequences for their users’ privacy. Indeed, even if a SIA system is deemed generally beneficial, privacy concerns can play a limiting role in its adoption. This chapter analyzes the privacy implications of several types of SIA systems (aggregators, public content systems, and social network-based systems) from various angles, and discusses a wide range of solutions (both technical and decision-support solutions) to potential privacy threats. Acknowledging that SIA systems are not just a threat to users’ privacy, the chapter concludes with a discussion of the use of social information access as a solution to privacy threats, i.e. by using it to provide social justifications, or by means of adaptive privacy decision support.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
See Chap. 1 of this book for a more detailed definition [37].
 
2
“Knowledge of one’s actions” can also be considered information, and this is included in the definition as well.
 
3
This is a trade-off; having users opt in to a feature might be an impediment to the adoption of the feature (cf. [282]).
 
4
Users also seem to prefer to share their personal information selectively with aggregators and public content systems [208], but mechanisms to automate selective sharing in these domains have not gained much traction [20].
 
Literature
1.
5.
go back to reference Acquisti, A., Grossklags, J.: What can behavioral economics teach us about privacy? In: Acquisti, A., De Capitani di Vimercati, S., Gritzalis, S., Lambrinoudakis, C. (eds.) Digital Privacy: Theory, Technologies, and Practices, pp. 363–377. Auerbach Publications, New York/London (2008). https://doi.org/10.1201/9781420052183.ch18 Acquisti, A., Grossklags, J.: What can behavioral economics teach us about privacy? In: Acquisti, A., De Capitani di Vimercati, S., Gritzalis, S., Lambrinoudakis, C. (eds.) Digital Privacy: Theory, Technologies, and Practices, pp. 363–377. Auerbach Publications, New York/London (2008). https://​doi.​org/​10.​1201/​9781420052183.​ch18
7.
go back to reference Adjerid, I., Acquisti, A., Brandimarte, L., Loewenstein, G.: Sleights of privacy: framing, disclosures, and the limits of transparency. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS 2013, pp. 9:1–9:11. ACM, Newcastle (2013). https://doi.org/10.1145/2501604.2501613 Adjerid, I., Acquisti, A., Brandimarte, L., Loewenstein, G.: Sleights of privacy: framing, disclosures, and the limits of transparency. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS 2013, pp. 9:1–9:11. ACM, Newcastle (2013). https://​doi.​org/​10.​1145/​2501604.​2501613
9.
go back to reference Aizenbud-Reshef, N., Barger, A., Dubinsky, Y., Guy, I., Kremer-Davidson, S.: Privacy concerns in enterprise social travel: attitudes and actions. In: Campos, P., Graham, N., Jorge, J., Nunes, N., Palanque, P., Winckler, M. (eds.) INTERACT 2011. LNCS, vol. 6948, pp. 242–249. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23765-2_17CrossRef Aizenbud-Reshef, N., Barger, A., Dubinsky, Y., Guy, I., Kremer-Davidson, S.: Privacy concerns in enterprise social travel: attitudes and actions. In: Campos, P., Graham, N., Jorge, J., Nunes, N., Palanque, P., Winckler, M. (eds.) INTERACT 2011. LNCS, vol. 6948, pp. 242–249. Springer, Heidelberg (2011). https://​doi.​org/​10.​1007/​978-3-642-23765-2_​17CrossRef
10.
go back to reference Alluri, A.V.: Empirical study on key attributes of yelp dataset which account for susceptibility of a user to social influence. M.S. thesis, University of Cincinnati, Cincinnati, OH (2015) Alluri, A.V.: Empirical study on key attributes of yelp dataset which account for susceptibility of a user to social influence. M.S. thesis, University of Cincinnati, Cincinnati, OH (2015)
11.
go back to reference Altman, I.: The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole Publishing Company, Monterey (1975) Altman, I.: The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole Publishing Company, Monterey (1975)
13.
go back to reference Angst, C.M., Agarwal, R.: Adoption of electronic health records in the presence of privacy concerns: the elaboration likelihood model and individual persuasion. MIS Q. 33(2), 339–370 (2009)CrossRef Angst, C.M., Agarwal, R.: Adoption of electronic health records in the presence of privacy concerns: the elaboration likelihood model and individual persuasion. MIS Q. 33(2), 339–370 (2009)CrossRef
16.
go back to reference Awad, N.F., Krishnan, M.S.: The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Q. 30(1), 13–28 (2006)CrossRef Awad, N.F., Krishnan, M.S.: The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Q. 30(1), 13–28 (2006)CrossRef
17.
go back to reference Balebako, R., Leon, P.G., Mugan, J., Acquisti, A., Cranor, L.F., Sadeh, N.: Nudging users towards privacy on mobile devices. In: CHI 2011 Workshop on Persuasion, Influence, Nudge and Coercion Through Mobile Devices, PINC 2011, Vancouver, Canada, pp. 23–26 (2011) Balebako, R., Leon, P.G., Mugan, J., Acquisti, A., Cranor, L.F., Sadeh, N.: Nudging users towards privacy on mobile devices. In: CHI 2011 Workshop on Persuasion, Influence, Nudge and Coercion Through Mobile Devices, PINC 2011, Vancouver, Canada, pp. 23–26 (2011)
25.
go back to reference Berry, M.J., Linoff, G.: Data Mining Techniques: For Marketing, Sales, and Customer Support. Wiley, New York (1997) Berry, M.J., Linoff, G.: Data Mining Techniques: For Marketing, Sales, and Customer Support. Wiley, New York (1997)
26.
28.
go back to reference Binder, J., Howes, A., Sutcliffe, A.: The problem of conflicting social spheres: effects of network structure on experienced tension in social network sites. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, pp. 965–974. ACM, Boston (2009). https://doi.org/10.1145/1518701.1518849 Binder, J., Howes, A., Sutcliffe, A.: The problem of conflicting social spheres: effects of network structure on experienced tension in social network sites. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, pp. 965–974. ACM, Boston (2009). https://​doi.​org/​10.​1145/​1518701.​1518849
29.
go back to reference Birnholtz, J., Guillory, J., Hancock, J., Bazarova, N.: “On my way”: deceptive texting and interpersonal awareness narratives. In: Proceedings of the 2010 ACM Conference on Computer Supported Cooperative Work, CSCW 2010, pp. 1–4. ACM, Savannah (2010). https://doi.org/10.1145/1718918.1718920 Birnholtz, J., Guillory, J., Hancock, J., Bazarova, N.: “On my way”: deceptive texting and interpersonal awareness narratives. In: Proceedings of the 2010 ACM Conference on Computer Supported Cooperative Work, CSCW 2010, pp. 1–4. ACM, Savannah (2010). https://​doi.​org/​10.​1145/​1718918.​1718920
30.
go back to reference Bogers, T.: Tag-based recommendation. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 441–479. Springer, Cham (2018) Bogers, T.: Tag-based recommendation. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 441–479. Springer, Cham (2018)
31.
go back to reference Bothorel, C., Lathia, N., Picot-Clemente, R., Noulas, A.: Location recommendation with social media data. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 624–653. Springer, Cham (2018) Bothorel, C., Lathia, N., Picot-Clemente, R., Noulas, A.: Location recommendation with social media data. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 624–653. Springer, Cham (2018)
34.
go back to reference Brody, R.G., Mulig, E., Kimball, V.: Phishing, pharming and identity theft. Acad. Account. Finan. Stud. J. 11(3), 43–56 (2007) Brody, R.G., Mulig, E., Kimball, V.: Phishing, pharming and identity theft. Acad. Account. Finan. Stud. J. 11(3), 43–56 (2007)
35.
37.
go back to reference Brusilovsky, P., He, D.: Social information access: definition and classification. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 1–18. Springer, Cham (2018) Brusilovsky, P., He, D.: Social information access: definition and classification. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 1–18. Springer, Cham (2018)
38.
go back to reference Brusilovsky, P., Smyth, B., Shapira, B.: Social search. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 213–276. Springer, Cham (2018) Brusilovsky, P., Smyth, B., Shapira, B.: Social search. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 213–276. Springer, Cham (2018)
42.
go back to reference Calandrino, J.A., Kilzer, A., Narayanan, A., Felten, E.W., Shmatikov, V.: You might also like: privacy risks of collaborative filtering. In: Proceedings of the 2011 IEEE Symposium on Security and Privacy, pp. 231–246. IEEE, Oakland (2011). https://doi.org/10.1109/SP.2011.40 Calandrino, J.A., Kilzer, A., Narayanan, A., Felten, E.W., Shmatikov, V.: You might also like: privacy risks of collaborative filtering. In: Proceedings of the 2011 IEEE Symposium on Security and Privacy, pp. 231–246. IEEE, Oakland (2011). https://​doi.​org/​10.​1109/​SP.​2011.​40
44.
go back to reference Canny, J.F.: Collaborative filtering with privacy. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 45–57. IEEE Computer Society, Washington, DC (2002) Canny, J.F.: Collaborative filtering with privacy. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 45–57. IEEE Computer Society, Washington, DC (2002)
46.
go back to reference Cassel, L.N., Wolz, U.: Client side personalization. In: DELOS Workshop: Personalisation and Recommender Systems in Digital Libraries, Dublin, Ireland, pp. 8–12 (2001) Cassel, L.N., Wolz, U.: Client side personalization. In: DELOS Workshop: Personalisation and Recommender Systems in Digital Libraries, Dublin, Ireland, pp. 8–12 (2001)
47.
go back to reference Cavusoglu, H., Phan, T., Cavusoglu, H.: Privacy controls and content sharing patterns of online social network users: a natural experiment. In: ICIS 2013 Proceedings, Milan, Italy (2013) Cavusoglu, H., Phan, T., Cavusoglu, H.: Privacy controls and content sharing patterns of online social network users: a natural experiment. In: ICIS 2013 Proceedings, Milan, Italy (2013)
51.
go back to reference Chen, H., Chiang, R.H.L., Storey, V.C.: Business intelligence and analytics: from big data to big impact. MIS Q. 36(4), 1165–1188 (2012) Chen, H., Chiang, R.H.L., Storey, V.C.: Business intelligence and analytics: from big data to big impact. MIS Q. 36(4), 1165–1188 (2012)
54.
go back to reference Cho, D., Kim, S., Acquisti, A.: Empirical analysis of online anonymity and user behaviors: the impact of real name policy. In: 2012 45th Hawaii International Conference on System Science, HICSS 2012, pp. 3041–3050. IEEE Computer Society, Maui (2012). https://doi.org/10.1109/HICSS.2012.241 Cho, D., Kim, S., Acquisti, A.: Empirical analysis of online anonymity and user behaviors: the impact of real name policy. In: 2012 45th Hawaii International Conference on System Science, HICSS 2012, pp. 3041–3050. IEEE Computer Society, Maui (2012). https://​doi.​org/​10.​1109/​HICSS.​2012.​241
55.
go back to reference Coleman, G.: Phreaks, hackers, and trolls: the politics of transgression and spectacle. In: Mandiberg, M. (ed.) The Social Media Reader, pp. 99–119. NYU Press, New York (2012) Coleman, G.: Phreaks, hackers, and trolls: the politics of transgression and spectacle. In: Mandiberg, M. (ed.) The Social Media Reader, pp. 99–119. NYU Press, New York (2012)
57.
go back to reference Consolvo, S., Smith, I., Matthews, T., LaMarca, A., Tabert, J., Powledge, P.: Location disclosure to social relations: why, when, & what people want to share. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2005, pp. 81–90. ACM, Portland (2005). https://doi.org/10.1145/1054972.1054985 Consolvo, S., Smith, I., Matthews, T., LaMarca, A., Tabert, J., Powledge, P.: Location disclosure to social relations: why, when, & what people want to share. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2005, pp. 81–90. ACM, Portland (2005). https://​doi.​org/​10.​1145/​1054972.​1054985
59.
go back to reference Cosley, D., Lam, S.K., Albert, I., Konstan, J.A., Riedl, J.: Is seeing believing?: how recommender system interfaces affect users’ opinions. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2003, pp. 585–592. ACM, Ft. Lauderdale (2003). https://doi.org/10.1145/642611.642713 Cosley, D., Lam, S.K., Albert, I., Konstan, J.A., Riedl, J.: Is seeing believing?: how recommender system interfaces affect users’ opinions. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2003, pp. 585–592. ACM, Ft. Lauderdale (2003). https://​doi.​org/​10.​1145/​642611.​642713
63.
go back to reference De Wolf, R., Pierson, J.: Researching social privacy on SNS through developing and evaluating alternative privacy technologies. In: Proceedings of the CSCW 2013 Networked Social Privacy Workshop, San Antonio, TX (2013) De Wolf, R., Pierson, J.: Researching social privacy on SNS through developing and evaluating alternative privacy technologies. In: Proceedings of the CSCW 2013 Networked Social Privacy Workshop, San Antonio, TX (2013)
64.
go back to reference Deuker, A.: Friend-to-friend privacy protection on social networking sites: a grounded theory study. In: AMCIS 2012 Proceedings, Seattle, WA (2012) Deuker, A.: Friend-to-friend privacy protection on social networking sites: a grounded theory study. In: AMCIS 2012 Proceedings, Seattle, WA (2012)
65.
go back to reference Di Castro, D., Lewin-Eytan, L., Maarek, Y., Wolff, R., Zohar, E.: Enforcing K-anonymity in web mail auditing. In: Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, WSDM 2016, pp. 327–336. ACM, New York (2016). https://doi.org/10.1145/2835776.2835803 Di Castro, D., Lewin-Eytan, L., Maarek, Y., Wolff, R., Zohar, E.: Enforcing K-anonymity in web mail auditing. In: Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, WSDM 2016, pp. 327–336. ACM, New York (2016). https://​doi.​org/​10.​1145/​2835776.​2835803
67.
go back to reference DiMicco, J., Millen, D.R., Geyer, W., Dugan, C., Brownholtz, B., Muller, M.: Motivations for social networking at work. In: Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, CSCW 2008, pp. 711–720. ACM, New York (2008). https://doi.org/10.1145/1460563.1460674 DiMicco, J., Millen, D.R., Geyer, W., Dugan, C., Brownholtz, B., Muller, M.: Motivations for social networking at work. In: Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, CSCW 2008, pp. 711–720. ACM, New York (2008). https://​doi.​org/​10.​1145/​1460563.​1460674
68.
go back to reference Dimitrov, D., Helic, D., Strohmaier, M.: Tag-based navigation and visualization. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 181–212. Springer, Cham (2018) Dimitrov, D., Helic, D., Strohmaier, M.: Tag-based navigation and visualization. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 181–212. Springer, Cham (2018)
69.
go back to reference Dong, C., Jin, H., Knijnenburg, B.P.: Predicting privacy behavior on online social networks. In: Ninth International AAAI Conference on Web and Social Media, ICWSM 2015, pp. 91–100. AAAI Publications, Oxford (2015) Dong, C., Jin, H., Knijnenburg, B.P.: Predicting privacy behavior on online social networks. In: Ninth International AAAI Conference on Web and Social Media, ICWSM 2015, pp. 91–100. AAAI Publications, Oxford (2015)
73.
74.
go back to reference Ehrlich, K., Shami, N.S.: Microblogging inside and outside the workplace. In: Fourth International AAAI Conference on Weblogs and Social Media, ICWSM 2010, pp. 42–49. AAAI Publications, Washington, DC (2010) Ehrlich, K., Shami, N.S.: Microblogging inside and outside the workplace. In: Fourth International AAAI Conference on Weblogs and Social Media, ICWSM 2010, pp. 42–49. AAAI Publications, Washington, DC (2010)
77.
go back to reference Ellison, N.B., Vitak, J., Steinfield, C., Gray, R., Lampe, C.: Negotiating privacy concerns and social capital needs in a social media environment. In: Trepte, S., Reinecke, L. (eds.) Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web, pp. 19–32. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21521-6_3CrossRef Ellison, N.B., Vitak, J., Steinfield, C., Gray, R., Lampe, C.: Negotiating privacy concerns and social capital needs in a social media environment. In: Trepte, S., Reinecke, L. (eds.) Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web, pp. 19–32. Springer, Heidelberg (2011). https://​doi.​org/​10.​1007/​978-3-642-21521-6_​3CrossRef
81.
go back to reference Farzan, R., Brusilovsky, P.: Social navigation. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 142–180. Springer, Cham (2018) Farzan, R., Brusilovsky, P.: Social navigation. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 142–180. Springer, Cham (2018)
85.
go back to reference Fishbein, M., Ajzen, I.: Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research. Addison-Wesley Pub. Co., Reading (1975) Fishbein, M., Ajzen, I.: Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research. Addison-Wesley Pub. Co., Reading (1975)
91.
go back to reference Goecks, J., Edwards, W.K., Mynatt, E.D.: Challenges in supporting end-user privacy and security management with social navigation. In: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, pp. 5:1–5:12. ACM, Mountain View (2009). https://doi.org/10.1145/1572532.1572539 Goecks, J., Edwards, W.K., Mynatt, E.D.: Challenges in supporting end-user privacy and security management with social navigation. In: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, pp. 5:1–5:12. ACM, Mountain View (2009). https://​doi.​org/​10.​1145/​1572532.​1572539
95.
go back to reference Guy, I.: People recommendation on social media. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 570–623. Springer, Cham (2018) Guy, I.: People recommendation on social media. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 570–623. Springer, Cham (2018)
97.
go back to reference Han, S., He, D.: Network-based social search. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 277–309. Springer, Cham (2018) Han, S., He, D.: Network-based social search. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 277–309. Springer, Cham (2018)
98.
go back to reference Hancock, J., Birnholtz, J., Bazarova, N., Guillory, J., Perlin, J., Amos, B.: Butler lies: awareness, deception and design. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, pp. 517–526. ACM, Boston (2009). https://doi.org/10.1145/1518701.1518782 Hancock, J., Birnholtz, J., Bazarova, N., Guillory, J., Perlin, J., Amos, B.: Butler lies: awareness, deception and design. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, pp. 517–526. ACM, Boston (2009). https://​doi.​org/​10.​1145/​1518701.​1518782
99.
go back to reference Hancock, J.T., Thom-Santelli, J., Ritchie, T.: Deception and design: the impact of communication technology on lying behavior. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2004, pp. 129–134. ACM, Vienna (2004). https://doi.org/10.1145/985692.985709 Hancock, J.T., Thom-Santelli, J., Ritchie, T.: Deception and design: the impact of communication technology on lying behavior. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2004, pp. 129–134. ACM, Vienna (2004). https://​doi.​org/​10.​1145/​985692.​985709
102.
go back to reference Hasler, L., Ruthven, I.: Escaping information poverty through internet newsgroups. In: Fifth International AAAI Conference on Weblogs and Social Media, ICWSM 2011, pp. 153–160. AAAI Publications, Barcelona (2011) Hasler, L., Ruthven, I.: Escaping information poverty through internet newsgroups. In: Fifth International AAAI Conference on Weblogs and Social Media, ICWSM 2011, pp. 153–160. AAAI Publications, Barcelona (2011)
103.
go back to reference Hassing, L.: An exploratory study in the concerns for information privacy. Master thesis, University of Delft, Netherlands (2015) Hassing, L.: An exploratory study in the concerns for information privacy. Master thesis, University of Delft, Netherlands (2015)
105.
go back to reference Ho, S.Y., Tam, K.: Understanding the impact of web personalization on user information processing and decision outcomes. MIS Q. 30(4), 865–890 (2006)CrossRef Ho, S.Y., Tam, K.: Understanding the impact of web personalization on user information processing and decision outcomes. MIS Q. 30(4), 865–890 (2006)CrossRef
107.
go back to reference House, W.: Consumer data privacy in a networked world: a framework for protecting privacy and promoting innovation in the global economy. Technical report, White House, Washington, D.C. (2012) House, W.: Consumer data privacy in a networked world: a framework for protecting privacy and promoting innovation in the global economy. Technical report, White House, Washington, D.C. (2012)
109.
go back to reference Huber, J., Puto, C.: Market boundaries and product choice: illustrating attraction and substitution effects. J. Consum. Res. 10(1), 31–44 (1983)CrossRef Huber, J., Puto, C.: Market boundaries and product choice: illustrating attraction and substitution effects. J. Consum. Res. 10(1), 31–44 (1983)CrossRef
114.
go back to reference Iachello, G., Smith, I., Consolvo, S., Chen, M., Abowd, G.D.: Developing privacy guidelines for social location disclosure applications and services. In: Proceedings of the 2005 Symposium on Usable Privacy and Security, SOUPS 2005, pp. 65–76. ACM, Philadelphia (2005). https://doi.org/10.1145/1073001.1073008 Iachello, G., Smith, I., Consolvo, S., Chen, M., Abowd, G.D.: Developing privacy guidelines for social location disclosure applications and services. In: Proceedings of the 2005 Symposium on Usable Privacy and Security, SOUPS 2005, pp. 65–76. ACM, Philadelphia (2005). https://​doi.​org/​10.​1145/​1073001.​1073008
116.
go back to reference Jannach, D., Lerche, L., Zanker, M.: Recommending based on implicit feedback. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 510–569. Springer, Cham (2018) Jannach, D., Lerche, L., Zanker, M.: Recommending based on implicit feedback. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 510–569. Springer, Cham (2018)
117.
go back to reference Jedrzejczyk, L., Price, B.A., Bandara, A.K., Nuseibeh, B.: On the impact of real-time feedback on users’ behaviour in mobile location-sharing applications. In: Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, Redmond, Washington, pp. 14:1–14:12 (2010). https://doi.org/10.1145/1837110.1837129 Jedrzejczyk, L., Price, B.A., Bandara, A.K., Nuseibeh, B.: On the impact of real-time feedback on users’ behaviour in mobile location-sharing applications. In: Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, Redmond, Washington, pp. 14:1–14:12 (2010). https://​doi.​org/​10.​1145/​1837110.​1837129
128.
go back to reference Kahneman, D., Tversky, A.: Choices, Values, and Frames. Cambridge University Press, Cambridge (2000)MATH Kahneman, D., Tversky, A.: Choices, Values, and Frames. Cambridge University Press, Cambridge (2000)MATH
129.
134.
go back to reference Kluver, D., Ekstrand, M., Konstan, J.: Rating-based collaborative filtering: algorithms and evaluation. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 344–390. Springer, Cham (2018) Kluver, D., Ekstrand, M., Konstan, J.: Rating-based collaborative filtering: algorithms and evaluation. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 344–390. Springer, Cham (2018)
135.
go back to reference Knijnenburg, B.P.: Simplifying privacy decisions: towards interactive and adaptive solutions. In: Proceedings of the Recsys 2013 Workshop on Human Decision Making in Recommender Systems, Decisions@Recsys 2013, Hong Kong, China, pp. 40–41 (2013) Knijnenburg, B.P.: Simplifying privacy decisions: towards interactive and adaptive solutions. In: Proceedings of the Recsys 2013 Workshop on Human Decision Making in Recommender Systems, Decisions@Recsys 2013, Hong Kong, China, pp. 40–41 (2013)
137.
go back to reference Knijnenburg, B.P., Jin, H.: The persuasive effect of privacy recommendations. In: Twelfth Annual Workshop on HCI Research in MIS, Milan, Italy, pp. 16:1–16:5 (2013) Knijnenburg, B.P., Jin, H.: The persuasive effect of privacy recommendations. In: Twelfth Annual Workshop on HCI Research in MIS, Milan, Italy, pp. 16:1–16:5 (2013)
138.
go back to reference Knijnenburg, B.P., Kobsa, A.: Helping users with information disclosure decisions: potential for adaptation. In: Proceedings of the 2013 ACM International Conference on Intelligent User Interfaces, IUI 2013, pp. 407–416. ACM Press, Santa Monica (2013). https://doi.org/10.1145/2449396.2449448 Knijnenburg, B.P., Kobsa, A.: Helping users with information disclosure decisions: potential for adaptation. In: Proceedings of the 2013 ACM International Conference on Intelligent User Interfaces, IUI 2013, pp. 407–416. ACM Press, Santa Monica (2013). https://​doi.​org/​10.​1145/​2449396.​2449448
140.
go back to reference Knijnenburg, B.P., Kobsa, A.: Increasing sharing tendency without reducing satisfaction: finding the best privacy-settings user interface for social networks. In: ICIS 2014 Proceedings, Auckland, New Zealand (2014) Knijnenburg, B.P., Kobsa, A.: Increasing sharing tendency without reducing satisfaction: finding the best privacy-settings user interface for social networks. In: ICIS 2014 Proceedings, Auckland, New Zealand (2014)
141.
go back to reference Knijnenburg, B.P., Kobsa, A., Jin, H.: Counteracting the negative effect of form auto-completion on the privacy calculus. In: ICIS 2013 Proceedings, Milan, Italy (2013) Knijnenburg, B.P., Kobsa, A., Jin, H.: Counteracting the negative effect of form auto-completion on the privacy calculus. In: ICIS 2013 Proceedings, Milan, Italy (2013)
143.
go back to reference Knijnenburg, B.P., Kobsa, A., Jin, H.: Preference-based location sharing: are more privacy options really better? In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2013, pp. 2667–2676. ACM, Paris (2013). https://doi.org/10.1145/2470654.2481369 Knijnenburg, B.P., Kobsa, A., Jin, H.: Preference-based location sharing: are more privacy options really better? In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2013, pp. 2667–2676. ACM, Paris (2013). https://​doi.​org/​10.​1145/​2470654.​2481369
152.
go back to reference Kobsa, A., Teltzrow, M.: Contextualized communication of privacy practices and personalization benefits: impacts on users’ data sharing and purchase behavior. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 329–343. Springer, Heidelberg (2005). https://doi.org/10.1007/11423409_21CrossRef Kobsa, A., Teltzrow, M.: Contextualized communication of privacy practices and personalization benefits: impacts on users’ data sharing and purchase behavior. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 329–343. Springer, Heidelberg (2005). https://​doi.​org/​10.​1007/​11423409_​21CrossRef
153.
go back to reference Koroleva, K., Krasnova, H., Veltri, N., Günther, O.: It’s all about networking! empirical investigation of social capital formation on social network sites. In: ICIS 2011 Proceedings, Shanghai, China (2011) Koroleva, K., Krasnova, H., Veltri, N., Günther, O.: It’s all about networking! empirical investigation of social capital formation on social network sites. In: ICIS 2011 Proceedings, Shanghai, China (2011)
155.
go back to reference Krämer, N.C., Haferkamp, N.: Online self-presentation: balancing privacy concerns and impression construction on social networking sites. In: Trepte, S., Reinecke, L. (eds.) Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web, pp. 127–141. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21521-6_10CrossRef Krämer, N.C., Haferkamp, N.: Online self-presentation: balancing privacy concerns and impression construction on social networking sites. In: Trepte, S., Reinecke, L. (eds.) Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web, pp. 127–141. Springer, Heidelberg (2011). https://​doi.​org/​10.​1007/​978-3-642-21521-6_​10CrossRef
156.
go back to reference Krasnova, H., Hildebrand, T., Guenther, O.: Investigating the value of privacy in online social networks: conjoint analysis. In: ICIS 2009 Proceedings, Phoenix, AZ (2009) Krasnova, H., Hildebrand, T., Guenther, O.: Investigating the value of privacy in online social networks: conjoint analysis. In: ICIS 2009 Proceedings, Phoenix, AZ (2009)
158.
go back to reference Lai, Y.L., Hui, K.L.: Internet opt-in and opt-out: investigating the roles of frames, defaults and privacy concerns. In: Proceedings of the 2006 ACM SIGMIS Conference on Computer Personnel Research, Claremont, CA, pp. 253–263 (2006). https://doi.org/10.1145/1125170.1125230 Lai, Y.L., Hui, K.L.: Internet opt-in and opt-out: investigating the roles of frames, defaults and privacy concerns. In: Proceedings of the 2006 ACM SIGMIS Conference on Computer Personnel Research, Claremont, CA, pp. 253–263 (2006). https://​doi.​org/​10.​1145/​1125170.​1125230
159.
go back to reference Lampe, C., Ellison, N., Steinfield, C.: A face(book) in the crowd: social searching vs. social browsing. In: Proceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work, CSCW 2006, pp. 167–170. ACM, Banff (2006). https://doi.org/10.1145/1180875.1180901 Lampe, C., Ellison, N., Steinfield, C.: A face(book) in the crowd: social searching vs. social browsing. In: Proceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work, CSCW 2006, pp. 167–170. ACM, Banff (2006). https://​doi.​org/​10.​1145/​1180875.​1180901
160.
go back to reference Lampinen, A., Lehtinen, V., Lehmuskallio, A., Tamminen, S.: We’re in it together: interpersonal management of disclosure in social network services. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2011, pp. 3217–3226. ACM, New York (2011). https://doi.org/10.1145/1978942.1979420 Lampinen, A., Lehtinen, V., Lehmuskallio, A., Tamminen, S.: We’re in it together: interpersonal management of disclosure in social network services. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2011, pp. 3217–3226. ACM, New York (2011). https://​doi.​org/​10.​1145/​1978942.​1979420
161.
go back to reference Lanier, J.: You Are Not a Gadget: A Manifesto, Large Print edn. Thorndike Press, Waterville (2010) Lanier, J.: You Are Not a Gadget: A Manifesto, Large Print edn. Thorndike Press, Waterville (2010)
162.
go back to reference Lathia, N., Hailes, S., Capra, L.: Private distributed collaborative filtering using estimated concordance measures. In: Proceedings of the 2007 ACM Conference on Recommender Systems, RecSys 2007, pp. 1–8. ACM, New York (2007) Lathia, N., Hailes, S., Capra, L.: Private distributed collaborative filtering using estimated concordance measures. In: Proceedings of the 2007 ACM Conference on Recommender Systems, RecSys 2007, pp. 1–8. ACM, New York (2007)
163.
go back to reference Laufer, R.S., Proshansky, H.M., Wolfe, M.: Some analytic dimensions of privacy. In: Küller, R. (ed.) Proceedings of the Lund Conference on Architectural Psychology. Dowden, Hutchinson & Ross, Lund (1973) Laufer, R.S., Proshansky, H.M., Wolfe, M.: Some analytic dimensions of privacy. In: Küller, R. (ed.) Proceedings of the Lund Conference on Architectural Psychology. Dowden, Hutchinson & Ross, Lund (1973)
165.
go back to reference Leary, M.R.: Self-presentation: Impression Management and Interpersonal Behavior. Routledge, Boulder (1996). ISBN 978-0-8133-3004-4 Leary, M.R.: Self-presentation: Impression Management and Interpersonal Behavior. Routledge, Boulder (1996). ISBN 978-0-8133-3004-4
167.
go back to reference Lederer, S., Mankoff, J., Dey, A.K.: Who wants to know what when? Privacy preference determinants in ubiquitous computing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2003, pp. 724–725. ACM, Ft. Lauderdale (2003). https://doi.org/10.1145/765891.765952 Lederer, S., Mankoff, J., Dey, A.K.: Who wants to know what when? Privacy preference determinants in ubiquitous computing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2003, pp. 724–725. ACM, Ft. Lauderdale (2003). https://​doi.​org/​10.​1145/​765891.​765952
168.
go back to reference Lee, D., Brusilovsky, P.: Recommendations based on social links. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 391–440. Springer, Cham (2018) Lee, D., Brusilovsky, P.: Recommendations based on social links. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 391–440. Springer, Cham (2018)
174.
go back to reference Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing Facebook privacy settings: user expectations vs. reality. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC 2011, pp. 61–70. ACM, Berlin (2011). https://doi.org/10.1145/2068816.2068823 Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing Facebook privacy settings: user expectations vs. reality. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC 2011, pp. 61–70. ACM, Berlin (2011). https://​doi.​org/​10.​1145/​2068816.​2068823
176.
go back to reference Lowry, P.B., Moody, G., Vance, A., Jensen, M., Jenkins, J., Wells, T.: Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers. J. Am. Soc. Inf. Sci. Technol. 63(4), 755–776 (2012). https://doi.org/10.1002/asi.21705CrossRef Lowry, P.B., Moody, G., Vance, A., Jensen, M., Jenkins, J., Wells, T.: Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers. J. Am. Soc. Inf. Sci. Technol. 63(4), 755–776 (2012). https://​doi.​org/​10.​1002/​asi.​21705CrossRef
177.
go back to reference Lustig, C., Pine, K., Nardi, B., Irani, L., Lee, M.K., Nafus, D., Sandvig, C.: Algorithmic authority: the ethics, politics, and economics of algorithms that interpret, decide, and manage. In: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, CHI EA 2016, pp. 1057–1062. ACM, New York (2016). https://doi.org/10.1145/2851581.2886426 Lustig, C., Pine, K., Nardi, B., Irani, L., Lee, M.K., Nafus, D., Sandvig, C.: Algorithmic authority: the ethics, politics, and economics of algorithms that interpret, decide, and manage. In: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, CHI EA 2016, pp. 1057–1062. ACM, New York (2016). https://​doi.​org/​10.​1145/​2851581.​2886426
180.
go back to reference Madejski, M., Johnson, M., Bellovin, S.: A study of privacy settings errors in an online social network. In: 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), SESOC 2012, Lugano, Switzerland, pp. 340–345 (2012). https://doi.org/10.1109/PerComW.2012.6197507 Madejski, M., Johnson, M., Bellovin, S.: A study of privacy settings errors in an online social network. In: 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), SESOC 2012, Lugano, Switzerland, pp. 340–345 (2012). https://​doi.​org/​10.​1109/​PerComW.​2012.​6197507
182.
go back to reference McGinty, L., Smyth, B.: Adaptive selection: an analysis of critiquing and preference-based feedback in conversational recommender systems. Int. J. Electron. Commer. 11(2), 35–57 (2006)CrossRef McGinty, L., Smyth, B.: Adaptive selection: an analysis of critiquing and preference-based feedback in conversational recommender systems. Int. J. Electron. Commer. 11(2), 35–57 (2006)CrossRef
184.
go back to reference McSherry, F., Mironov, I.: Differentially private recommender systems: building privacy into the net. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2009, pp. 627–636. ACM, Paris (2009). https://doi.org/10.1145/1557019.1557090 McSherry, F., Mironov, I.: Differentially private recommender systems: building privacy into the net. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2009, pp. 627–636. ACM, Paris (2009). https://​doi.​org/​10.​1145/​1557019.​1557090
190.
191.
go back to reference Mikians, J., Gyarmati, L., Erramilli, V., Laoutaris, N.: Crowd-assisted search for price discrimination in e-commerce: first results. In: Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies, CoNEXT 2013, pp. 1–6. ACM, Santa Barbara (2013). https://doi.org/10.1145/2535372.2535415 Mikians, J., Gyarmati, L., Erramilli, V., Laoutaris, N.: Crowd-assisted search for price discrimination in e-commerce: first results. In: Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies, CoNEXT 2013, pp. 1–6. ACM, Santa Barbara (2013). https://​doi.​org/​10.​1145/​2535372.​2535415
193.
go back to reference Milne, G.R.: Consumer participation in mailing lists: a field experiment. J. Public Policy Mark. 16(2), 298–309 (1997) Milne, G.R.: Consumer participation in mailing lists: a field experiment. J. Public Policy Mark. 16(2), 298–309 (1997)
195.
go back to reference Mirzadeh, N., Ricci, F., Bansal, M.: Feature selection methods for conversational recommender systems. In: Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, EEE 2005, Hong Kong, China, pp. 772–777 (2005). https://doi.org/10.1109/EEE.2005.75 Mirzadeh, N., Ricci, F., Bansal, M.: Feature selection methods for conversational recommender systems. In: Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, EEE 2005, Hong Kong, China, pp. 772–777 (2005). https://​doi.​org/​10.​1109/​EEE.​2005.​75
197.
go back to reference Mulligan, D., Schwartz, A.: Your place or mine?: privacy concerns and solutions for server and client-side storage of personal information. In: Tenth Conference on Computers, Freedom and Privacy, Toronto, Ontario, pp. 81–84 (2000). https://doi.org/10.1145/332186.332255 Mulligan, D., Schwartz, A.: Your place or mine?: privacy concerns and solutions for server and client-side storage of personal information. In: Tenth Conference on Computers, Freedom and Privacy, Toronto, Ontario, pp. 81–84 (2000). https://​doi.​org/​10.​1145/​332186.​332255
199.
go back to reference Navarro Bullock, B., Hotho, A., Stumme, G.: Accessing information with tags: search and ranking. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 310–343. Springer, Cham (2018) Navarro Bullock, B., Hotho, A., Stumme, G.: Accessing information with tags: search and ranking. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 310–343. Springer, Cham (2018)
201.
go back to reference Nissenbaum, H.: Privacy as contextual integrity. Wash. Law Rev. 79, 119–157 (2004) Nissenbaum, H.: Privacy as contextual integrity. Wash. Law Rev. 79, 119–157 (2004)
202.
go back to reference Nissenbaum, H.: Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, Stanford (2009) Nissenbaum, H.: Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, Stanford (2009)
204.
206.
go back to reference Oh, S.: Social Q&A. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 75–107. Springer, Cham (2018) Oh, S.: Social Q&A. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 75–107. Springer, Cham (2018)
209.
go back to reference O’Mahoney, M., Smyth, B.: From opinions to recommendations. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 480–509. Springer, Cham (2018) O’Mahoney, M., Smyth, B.: From opinions to recommendations. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 480–509. Springer, Cham (2018)
210.
go back to reference Orwell, G.: Nineteen Eighty-Four. A Novel. Secker & Warburg, London (1949) Orwell, G.: Nineteen Eighty-Four. A Novel. Secker & Warburg, London (1949)
211.
go back to reference Page, X., Knijnenburg, B.P., Kobsa, A.: FYI: communication style preferences underlie differences in location-sharing adoption and usage. In: Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2013, pp. 153–162. ACM, Zurich (2013). https://doi.org/10.1145/2493432.2493487 Page, X., Knijnenburg, B.P., Kobsa, A.: FYI: communication style preferences underlie differences in location-sharing adoption and usage. In: Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2013, pp. 153–162. ACM, Zurich (2013). https://​doi.​org/​10.​1145/​2493432.​2493487
212.
go back to reference Page, X., Knijnenburg, B.P., Kobsa, A.: What a tangled web we weave: lying backfires in location-sharing social media. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work, CSCW 2013, pp. 273–284. ACM, San Antonio (2013). https://doi.org/10.1145/2441776.2441808 Page, X., Knijnenburg, B.P., Kobsa, A.: What a tangled web we weave: lying backfires in location-sharing social media. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work, CSCW 2013, pp. 273–284. ACM, San Antonio (2013). https://​doi.​org/​10.​1145/​2441776.​2441808
213.
go back to reference Page, X., Kobsa, A., Knijnenburg, B.P.: Don’t disturb my circles! boundary preservation is at the center of location-sharing concerns. In: Proceedings of the Sixth International AAAI Conference on Weblogs and Social Media, ICWSM 2012, pp. 266–273. AAAI Publications, Dublin (2012) Page, X., Kobsa, A., Knijnenburg, B.P.: Don’t disturb my circles! boundary preservation is at the center of location-sharing concerns. In: Proceedings of the Sixth International AAAI Conference on Weblogs and Social Media, ICWSM 2012, pp. 266–273. AAAI Publications, Dublin (2012)
214.
217.
go back to reference Pariser, E.: The Filter Bubble: How the New Personalized Web is Changing What We Read and How We Think. Penguin Books, New York (2012)CrossRef Pariser, E.: The Filter Bubble: How the New Personalized Web is Changing What We Read and How We Think. Penguin Books, New York (2012)CrossRef
219.
go back to reference Patil, S., Lai, J.: Who gets to know what when: configuring privacy permissions in an awareness application. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2005, pp. 101–110. ACM, Portland (2005). https://doi.org/10.1145/1054972.1054987 Patil, S., Lai, J.: Who gets to know what when: configuring privacy permissions in an awareness application. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2005, pp. 101–110. ACM, Portland (2005). https://​doi.​org/​10.​1145/​1054972.​1054987
220.
go back to reference Patil, S., Norcie, G., Kapadia, A., Lee, A.J.: Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS 2012, pp. 5:1–5:15. ACM, Washington, DC (2012). https://doi.org/10.1145/2335356.2335363 Patil, S., Norcie, G., Kapadia, A., Lee, A.J.: Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS 2012, pp. 5:1–5:15. ACM, Washington, DC (2012). https://​doi.​org/​10.​1145/​2335356.​2335363
221.
go back to reference Patil, S., Page, X., Kobsa, A.: With a little help from my friends: can social navigation inform interpersonal privacy preferences? In: Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work, CSCW 2011, pp. 391–394. ACM, Hangzhou (2011). https://doi.org/10.1145/1958824.1958885 Patil, S., Page, X., Kobsa, A.: With a little help from my friends: can social navigation inform interpersonal privacy preferences? In: Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work, CSCW 2011, pp. 391–394. ACM, Hangzhou (2011). https://​doi.​org/​10.​1145/​1958824.​1958885
222.
go back to reference Pavlou, P.A.: Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int. J. Electron. Commer. 7(3), 101–134 (2003) Pavlou, P.A.: Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int. J. Electron. Commer. 7(3), 101–134 (2003)
223.
go back to reference Pavlou, P.A.: State of the information privacy literature: where are we now and where should we go. MIS Q. 35(4), 977–988 (2011)CrossRef Pavlou, P.A.: State of the information privacy literature: where are we now and where should we go. MIS Q. 35(4), 977–988 (2011)CrossRef
231.
go back to reference Rashid, A.M., Albert, I., Cosley, D., Lam, S.K., McNee, S.M., Konstan, J.A., Riedl, J.: Getting to know you: learning new user preferences in recommender systems. In: Proceedings of the 7th International Conference on Intelligent User Interfaces, IUI 2002, pp. 127–134. ACM, San Francisco (2002). https://doi.org/10.1145/502716.502737 Rashid, A.M., Albert, I., Cosley, D., Lam, S.K., McNee, S.M., Konstan, J.A., Riedl, J.: Getting to know you: learning new user preferences in recommender systems. In: Proceedings of the 7th International Conference on Intelligent User Interfaces, IUI 2002, pp. 127–134. ACM, San Francisco (2002). https://​doi.​org/​10.​1145/​502716.​502737
233.
235.
go back to reference Riboni, D., Bettini, C.: Private context-aware recommendation of points of interest: an initial investigation. In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 584–589. IEEE Computer Society, Los Alamitos (2012). https://doi.org/10.1109/PerComW.2012.6197582 Riboni, D., Bettini, C.: Private context-aware recommendation of points of interest: an initial investigation. In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 584–589. IEEE Computer Society, Los Alamitos (2012). https://​doi.​org/​10.​1109/​PerComW.​2012.​6197582
247.
go back to reference Shelton, M., Lo, K., Nardi, B.: Online media forums as separate social lives: a qualitative study of disclosure within and beyond Reddit. In: iConference 2015 Proceedings, Newport Beach, CA (2015) Shelton, M., Lo, K., Nardi, B.: Online media forums as separate social lives: a qualitative study of disclosure within and beyond Reddit. In: iConference 2015 Proceedings, Newport Beach, CA (2015)
248.
go back to reference Sheng, H., Nah, F.F.H., Siau, K.: An experimental study on ubiquitous commerce adoption: impact of personalization and privacy concerns. J. Assoc. Inf. Syst. 9(6), 344–376 (2008) Sheng, H., Nah, F.F.H., Siau, K.: An experimental study on ubiquitous commerce adoption: impact of personalization and privacy concerns. J. Assoc. Inf. Syst. 9(6), 344–376 (2008)
250.
go back to reference Shi, P., Xu, H., Erickson, L., Zhang, C.: See friendship: interpersonal privacy management in a collective world. In: AMCIS 2012 Proceedings (2012) Shi, P., Xu, H., Erickson, L., Zhang, C.: See friendship: interpersonal privacy management in a collective world. In: AMCIS 2012 Proceedings (2012)
251.
go back to reference Shklovski, I., Mainwaring, S.D., Skúladóttir, H.H., Borgthorsson, H.: Leakiness and creepiness in app space: perceptions of privacy and mobile app use. In: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems, CHI 2014, pp. 2347–2356. ACM, Toronto (2014). https://doi.org/10.1145/2556288.2557421 Shklovski, I., Mainwaring, S.D., Skúladóttir, H.H., Borgthorsson, H.: Leakiness and creepiness in app space: perceptions of privacy and mobile app use. In: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems, CHI 2014, pp. 2347–2356. ACM, Toronto (2014). https://​doi.​org/​10.​1145/​2556288.​2557421
252.
go back to reference Shokri, R., Pedarsani, P., Theodorakopoulos, G., Hubaux, J.P.: Preserving privacy in collaborative filtering through distributed aggregation of offline profiles. In: RecSys, pp. 157–164 (2009) Shokri, R., Pedarsani, P., Theodorakopoulos, G., Hubaux, J.P.: Preserving privacy in collaborative filtering through distributed aggregation of offline profiles. In: RecSys, pp. 157–164 (2009)
253.
go back to reference Simonson, I.: Choice based on reasons: the case of attraction and compromise effects. J. Consum. Res. 16(2), 158–174 (1989)CrossRef Simonson, I.: Choice based on reasons: the case of attraction and compromise effects. J. Consum. Res. 16(2), 158–174 (1989)CrossRef
255.
go back to reference Sleeper, M., Balebako, R., Das, S., McConahy, A.L., Wiese, J., Cranor, L.F.: The post that wasn’t: exploring self-censorship on Facebook. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work, CSCW 2013, pp. 793–802. ACM, San Antonio (2013). https://doi.org/10.1145/2441776.2441865 Sleeper, M., Balebako, R., Das, S., McConahy, A.L., Wiese, J., Cranor, L.F.: The post that wasn’t: exploring self-censorship on Facebook. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work, CSCW 2013, pp. 793–802. ACM, San Antonio (2013). https://​doi.​org/​10.​1145/​2441776.​2441865
256.
go back to reference Smith, A.: 6 new facts about Facebook (2014) Smith, A.: 6 new facts about Facebook (2014)
258.
go back to reference Smith, H.J., Dinev, T., Xu, H.: Information privacy research: an interdisciplinary review. MIS Q. 35(4), 989–1016 (2011)CrossRef Smith, H.J., Dinev, T., Xu, H.: Information privacy research: an interdisciplinary review. MIS Q. 35(4), 989–1016 (2011)CrossRef
260.
go back to reference Smith, H.J., Rogers, Y.: Managing one’s social network: does age make a difference? In: Human Computer Interaction - INTERACT 2003, pp. 551–558. IOS Press (2003) Smith, H.J., Rogers, Y.: Managing one’s social network: does age make a difference? In: Human Computer Interaction - INTERACT 2003, pp. 551–558. IOS Press (2003)
262.
go back to reference Solove, D.J.: The Digital Person: Technology and Privacy in the Information Age. New York University Press, New York (2004) Solove, D.J.: The Digital Person: Technology and Privacy in the Information Age. New York University Press, New York (2004)
264.
go back to reference Solove, D.J.: Understanding Privacy. Harvard University Press, Cambridge (2008) Solove, D.J.: Understanding Privacy. Harvard University Press, Cambridge (2008)
265.
go back to reference Solove, D.J.: Privacy self-management and the consent dilemma. Harv. Law Rev. 126, 1880–1903 (2013) Solove, D.J.: Privacy self-management and the consent dilemma. Harv. Law Rev. 126, 1880–1903 (2013)
266.
go back to reference Spiekermann, S.: User Control in Ubiquitous Computing: Design Alternatives and User Acceptance. Shaker Verlag, Aachen (2008) Spiekermann, S.: User Control in Ubiquitous Computing: Design Alternatives and User Acceptance. Shaker Verlag, Aachen (2008)
267.
go back to reference Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd generation e-commerce: privacy preferences versus actual behavior. In: Proceedings of the 3rd ACM Conference on Electronic Commerce, Tampa, FL, pp. 38–47 (2001). https://doi.org/10.1145/501158.501163 Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd generation e-commerce: privacy preferences versus actual behavior. In: Proceedings of the 3rd ACM Conference on Electronic Commerce, Tampa, FL, pp. 38–47 (2001). https://​doi.​org/​10.​1145/​501158.​501163
269.
go back to reference Stone, D.L.: The effects of the valence of outcomes for providing data and the perceived relevance of the data requested on privacy-related behaviors, beliefs, and attitudes. Ph.D. thesis, Purdue University (1981) Stone, D.L.: The effects of the valence of outcomes for providing data and the perceived relevance of the data requested on privacy-related behaviors, beliefs, and attitudes. Ph.D. thesis, Purdue University (1981)
270.
go back to reference Strater, K., Lipford, H.R.: Strategies and struggles with privacy in an online social networking community. In: Proceedings of the 22nd British HCI Group Annual Conference on People and Computers, BCS-HCI 2008, pp. 111–119. British Computer Society, Swinton (2008) Strater, K., Lipford, H.R.: Strategies and struggles with privacy in an online social networking community. In: Proceedings of the 22nd British HCI Group Annual Conference on People and Computers, BCS-HCI 2008, pp. 111–119. British Computer Society, Swinton (2008)
271.
go back to reference Stutzman, F., Kramer-Duffield, J.: Friends only: examining a privacy-enhancing behavior in Facebook. In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, pp. 1553–1562. ACM, Atlanta (2010). https://doi.org/10.1145/1753326.1753559 Stutzman, F., Kramer-Duffield, J.: Friends only: examining a privacy-enhancing behavior in Facebook. In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, pp. 1553–1562. ACM, Atlanta (2010). https://​doi.​org/​10.​1145/​1753326.​1753559
274.
go back to reference Sutanto, J., Palme, E., Tan, C.H., Phang, C.W.: Addressing the personalization-privacy paradox: an empirical assessment from a field experiment on smartphone users. MIS Q. 37(4), 1141–1164 (2013)CrossRef Sutanto, J., Palme, E., Tan, C.H., Phang, C.W.: Addressing the personalization-privacy paradox: an empirical assessment from a field experiment on smartphone users. MIS Q. 37(4), 1141–1164 (2013)CrossRef
275.
go back to reference Tang, K., Hong, J., Siewiorek, D.: The implications of offering more disclosure choices for social location sharing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2012, pp. 391–394. ACM, Austin (2012). https://doi.org/10.1145/2207676.2207730 Tang, K., Hong, J., Siewiorek, D.: The implications of offering more disclosure choices for social location sharing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2012, pp. 391–394. ACM, Austin (2012). https://​doi.​org/​10.​1145/​2207676.​2207730
276.
go back to reference Tang, K., Lin, J., Hong, J., Siewiorek, D., Sadeh, N.: Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing. In: Proceedings of the 12th ACM International Conference Adjunct Papers on Ubiquitous Computing, UbiComp 2010, pp. 85–94. ACM, Copenhagen (2010). https://doi.org/10.1145/1864349.1864363 Tang, K., Lin, J., Hong, J., Siewiorek, D., Sadeh, N.: Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing. In: Proceedings of the 12th ACM International Conference Adjunct Papers on Ubiquitous Computing, UbiComp 2010, pp. 85–94. ACM, Copenhagen (2010). https://​doi.​org/​10.​1145/​1864349.​1864363
279.
go back to reference Taylor, H.: Most people are “Privacy Pragmatists” who, while concerned about privacy, will sometimes trade it off for other benefits. Technical report 17, Harris Interactive, Inc. (2003) Taylor, H.: Most people are “Privacy Pragmatists” who, while concerned about privacy, will sometimes trade it off for other benefits. Technical report 17, Harris Interactive, Inc. (2003)
280.
281.
go back to reference Tene, O., Polonetsky, J.: Big data for all: privacy and user control in the age of analytics. Northwest. J. Technol. Intellect. Prop. 11(5), 239–272 (2012) Tene, O., Polonetsky, J.: Big data for all: privacy and user control in the age of analytics. Northwest. J. Technol. Intellect. Prop. 11(5), 239–272 (2012)
282.
go back to reference Tene, O., Polonetsky, J.: A theory of creepy: technology, privacy and shifting social norms. Yale J. Law Technol. 16, 59–102 (2013) Tene, O., Polonetsky, J.: A theory of creepy: technology, privacy and shifting social norms. Yale J. Law Technol. 16, 59–102 (2013)
283.
go back to reference Thaler, R.H., Sunstein, C.: Nudge: Improving Decisions About Health, Wealth, and Happiness. Yale University Press, New Haven, London (2008) Thaler, R.H., Sunstein, C.: Nudge: Improving Decisions About Health, Wealth, and Happiness. Yale University Press, New Haven, London (2008)
286.
go back to reference Toch, E., Cranshaw, J., Drielsma, P.H., Tsai, J.Y., Kelley, P.G., Springfield, J., Cranor, L., Hong, J., Sadeh, N.: Empirical models of privacy in location sharing. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing, UbiComp 2010, pp. 129–138. ACM, Copenhagen (2010). https://doi.org/10.1145/1864349.1864364 Toch, E., Cranshaw, J., Drielsma, P.H., Tsai, J.Y., Kelley, P.G., Springfield, J., Cranor, L., Hong, J., Sadeh, N.: Empirical models of privacy in location sharing. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing, UbiComp 2010, pp. 129–138. ACM, Copenhagen (2010). https://​doi.​org/​10.​1145/​1864349.​1864364
287.
go back to reference Treiblmaier, H., Pollach, I.: Users’ perceptions of benefits and costs of personalization. In: ICIS 2007 Proceedings (2007) Treiblmaier, H., Pollach, I.: Users’ perceptions of benefits and costs of personalization. In: ICIS 2007 Proceedings (2007)
288.
go back to reference Tsai, J.Y., Kelley, P., Drielsma, P., Cranor, L.F., Hong, J., Sadeh, N.: Who’s viewed you?: the impact of feedback in a mobile location-sharing application. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, pp. 2003–2012. ACM, Boston (2009). https://doi.org/10.1145/1518701.1519005 Tsai, J.Y., Kelley, P., Drielsma, P., Cranor, L.F., Hong, J., Sadeh, N.: Who’s viewed you?: the impact of feedback in a mobile location-sharing application. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, pp. 2003–2012. ACM, Boston (2009). https://​doi.​org/​10.​1145/​1518701.​1519005
290.
go back to reference Turner, M.A., Varghese, R.: Making sense of the privacy debate: a comparative analysis of leading consumer privacy surveys. Technical report, Privacy & American Business (2002) Turner, M.A., Varghese, R.: Making sense of the privacy debate: a comparative analysis of leading consumer privacy surveys. Technical report, Privacy & American Business (2002)
295.
296.
go back to reference Vitak, J., Blasiola, S., Litt, E., Patil, S.: Balancing audience and privacy tensions on social network sites: strategies of highly engaged users. Int. J. Commun. 9, 1485–1504 (2015) Vitak, J., Blasiola, S., Litt, E., Patil, S.: Balancing audience and privacy tensions on social network sites: strategies of highly engaged users. Int. J. Commun. 9, 1485–1504 (2015)
297.
go back to reference Walther, J.B., Parks, M.R.: Cues filtered out, cues filtered in. In: Knapp, M.L., Daly, J.A. (eds.) Handbook of Interpersonal Communication, 4th edn, pp. 529–563. SAGE Publications Inc., Thousand Oaks (2002) Walther, J.B., Parks, M.R.: Cues filtered out, cues filtered in. In: Knapp, M.L., Daly, J.A. (eds.) Handbook of Interpersonal Communication, 4th edn, pp. 529–563. SAGE Publications Inc., Thousand Oaks (2002)
298.
go back to reference Wang, N., Grossklags, J., Xu, H.: An online experiment of privacy authorization dialogues for social applications. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work, CSCW 2013, pp. 261–272. ACM, San Antonio (2013). https://doi.org/10.1145/2441776.2441807 Wang, N., Grossklags, J., Xu, H.: An online experiment of privacy authorization dialogues for social applications. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work, CSCW 2013, pp. 261–272. ACM, San Antonio (2013). https://​doi.​org/​10.​1145/​2441776.​2441807
300.
go back to reference Wang, Y., Leon, P.G., Acquisti, A., Cranor, L.F., Forget, A., Sadeh, N.: A field trial of privacy nudges for Facebook. In: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems, CHI 2014, pp. 2367–2376. ACM, Toronto (2014). https://doi.org/10.1145/2556288.2557413 Wang, Y., Leon, P.G., Acquisti, A., Cranor, L.F., Forget, A., Sadeh, N.: A field trial of privacy nudges for Facebook. In: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems, CHI 2014, pp. 2367–2376. ACM, Toronto (2014). https://​doi.​org/​10.​1145/​2556288.​2557413
301.
go back to reference Wang, Y., Leon, P.G., Scott, K., Chen, X., Acquisti, A., Cranor, L.F.: Privacy nudges for social media: an exploratory Facebook study. In: Second International Workshop on Privacy and Security in Online Social Media, PSOSM 2013, Rio De Janeiro, Brazil, pp. 763–770 (2013) Wang, Y., Leon, P.G., Scott, K., Chen, X., Acquisti, A., Cranor, L.F.: Privacy nudges for social media: an exploratory Facebook study. In: Second International Workshop on Privacy and Security in Online Social Media, PSOSM 2013, Rio De Janeiro, Brazil, pp. 763–770 (2013)
302.
go back to reference Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P.G., Cranor, L.F.: “I regretted the minute I pressed share”: a qualitative study of regrets on Facebook. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, pp. 10:1–10:16. ACM, Pittsburgh (2011). https://doi.org/10.1145/2078827.2078841 Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P.G., Cranor, L.F.: “I regretted the minute I pressed share”: a qualitative study of regrets on Facebook. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, pp. 10:1–10:16. ACM, Pittsburgh (2011). https://​doi.​org/​10.​1145/​2078827.​2078841
304.
go back to reference Westin, A.F., Harris (Louis) and Associates, Inc.: The Dimensions of Privacy: A National Opinion Research Survey of Attitudes Toward Privacy. Garland Publishing, New York (1981) Westin, A.F., Harris (Louis) and Associates, Inc.: The Dimensions of Privacy: A National Opinion Research Survey of Attitudes Toward Privacy. Garland Publishing, New York (1981)
307.
go back to reference Wilkinson, D., Sivakumar, S., Cherry, D., Knijnenburg, B.P., Raybourn, E.M., Wisniewski, P., Sloan, H.: User-tailored privacy by design. In: Submitted to USEC 2017 (2017) Wilkinson, D., Sivakumar, S., Cherry, D., Knijnenburg, B.P., Raybourn, E.M., Wisniewski, P., Sloan, H.: User-tailored privacy by design. In: Submitted to USEC 2017 (2017)
308.
go back to reference Wilson, D., Proudfoot, J., Valacich, J.: Saving face on Facebook: privacy concerns, social benefits, and impression management. In: ICIS 2014 Proceedings (2014) Wilson, D., Proudfoot, J., Valacich, J.: Saving face on Facebook: privacy concerns, social benefits, and impression management. In: ICIS 2014 Proceedings (2014)
309.
go back to reference Wisniewski, P., Islam, A.N., Knijnenburg, B.P., Patil, S.: Give social network users the privacy they want. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, CSCW 2015, pp. 1427–1441. ACM, Vancouver (2015). https://doi.org/10.1145/2675133.2675256 Wisniewski, P., Islam, A.N., Knijnenburg, B.P., Patil, S.: Give social network users the privacy they want. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, CSCW 2015, pp. 1427–1441. ACM, Vancouver (2015). https://​doi.​org/​10.​1145/​2675133.​2675256
310.
go back to reference Wisniewski, P., Knijnenburg, B.P., Richter Lipford, H.: Profiling Facebook users’ privacy behaviors. In: SOUPS2014 Workshop on Privacy Personas and Segmentation, PPS 2014, Menlo Park, CA (2014) Wisniewski, P., Knijnenburg, B.P., Richter Lipford, H.: Profiling Facebook users’ privacy behaviors. In: SOUPS2014 Workshop on Privacy Personas and Segmentation, PPS 2014, Menlo Park, CA (2014)
311.
go back to reference Wisniewski, P., Lipford, H., Wilson, D.: Fighting for my space: coping mechanisms for SNS boundary regulation. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2012, pp. 609–618. ACM, Austin (2012). https://doi.org/10.1145/2207676.2207761 Wisniewski, P., Lipford, H., Wilson, D.: Fighting for my space: coping mechanisms for SNS boundary regulation. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2012, pp. 609–618. ACM, Austin (2012). https://​doi.​org/​10.​1145/​2207676.​2207761
312.
go back to reference Wisniewski, P., Xu, H., Chen, Y.: Understanding user adaptation strategies for the launching of Facebook timeline. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2014, pp. 2421–2430. ACM, Toronto (2014). https://doi.org/10.1145/2556288.2557363 Wisniewski, P., Xu, H., Chen, Y.: Understanding user adaptation strategies for the launching of Facebook timeline. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2014, pp. 2421–2430. ACM, Toronto (2014). https://​doi.​org/​10.​1145/​2556288.​2557363
316.
go back to reference Xie, J., Knijnenburg, B.P., Jin, H.: Location sharing privacy preference: analysis and personalized recommendation. In: Proceedings of the 19th International Conference on Intelligent User Interfaces, IUI 2014, pp. 189–198. ACM, Haifa (2014). https://doi.org/10.1145/2557500.2557504 Xie, J., Knijnenburg, B.P., Jin, H.: Location sharing privacy preference: analysis and personalized recommendation. In: Proceedings of the 19th International Conference on Intelligent User Interfaces, IUI 2014, pp. 189–198. ACM, Haifa (2014). https://​doi.​org/​10.​1145/​2557500.​2557504
319.
go back to reference Xu, H., Wang, N., Grossklags, J.: Privacy-by-redesign: alleviating privacy concerns for third-party applications. In: ICIS 2012 Proceedings, Orlando, FL (2012) Xu, H., Wang, N., Grossklags, J.: Privacy-by-redesign: alleviating privacy concerns for third-party applications. In: ICIS 2012 Proceedings, Orlando, FL (2012)
320.
go back to reference Yang, J., Morris, M.R., Teevan, J., Adamic, L.A., Ackerman, M.S.: Culture matters: a survey study of social Q&A behavior. In: Fifth International AAAI Conference on Weblogs and Social Media, ICWSM 2011, pp. 409–416. AAAI Publications (2011) Yang, J., Morris, M.R., Teevan, J., Adamic, L.A., Ackerman, M.S.: Culture matters: a survey study of social Q&A behavior. In: Fifth International AAAI Conference on Weblogs and Social Media, ICWSM 2011, pp. 409–416. AAAI Publications (2011)
322.
go back to reference Young, A.L., Quan-Haase, A.: Information revelation and internet privacy concerns on social network sites: a case study of Facebook. In: Proceedings of the Fourth International Conference on Communities and Technologies, pp. 265–274. ACM, University Park (2009). https://doi.org/10.1145/1556460.1556499 Young, A.L., Quan-Haase, A.: Information revelation and internet privacy concerns on social network sites: a case study of Facebook. In: Proceedings of the Fourth International Conference on Communities and Technologies, pp. 265–274. ACM, University Park (2009). https://​doi.​org/​10.​1145/​1556460.​1556499
323.
go back to reference Yue, Z., He, D.: Collaborative search. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 108–141. Springer, Cham (2018) Yue, Z., He, D.: Collaborative search. In: Brusilovsky, P., He, D. (eds.) Social Information Access. LNCS, vol. 10100, pp. 108–141. Springer, Cham (2018)
325.
go back to reference Zhang, B., Wang, N., Jin, H.: Privacy concerns in online recommender systems: influences of control and user data input. In: Symposium on Usable Privacy and Security, SOUPS 2014, Menlo Park, CA, pp. 159–173 (2014) Zhang, B., Wang, N., Jin, H.: Privacy concerns in online recommender systems: influences of control and user data input. In: Symposium on Usable Privacy and Security, SOUPS 2014, Menlo Park, CA, pp. 159–173 (2014)
327.
go back to reference Zhong, L.: My pins are my dreams: pinterest, collective daydreams, and the aspirational gap. M.S. thesis, Massachusetts Institute of Technology (2014) Zhong, L.: My pins are my dreams: pinterest, collective daydreams, and the aspirational gap. M.S. thesis, Massachusetts Institute of Technology (2014)
Metadata
Title
Privacy in Social Information Access
Author
Bart P. Knijnenburg
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-90092-6_2

Premium Partner