图书简介
This book covers topics needed to be considered in research around usable privacy. The book starts from a psychological perspective and introduces readers to basic behavioral theories and models that can explain end-user privacy behavior (including the “privacy paradox”) on a theoretical level. Subsequently, an introduction to different study methods (e.g., experiment, survey, interviews, co-creation) used in usable privacy research is given. Based on this, different methodological aspects, such as identifying appropriate questionnaires, and applying User-Centered Design, will be discussed. Finally, the book describes application areas for privacy research such as dark patterns and presents solutions for privacy protection, e.g., regarding consent-giving and PETs. The book aims to bring together the different research approaches to the topic of usable privacy, which often originate from computer science, psychology, and law, and provide a methodologically sound basis for researchers who want to delve deeper into this topic.This is an open access book.
Forward.- About this book.- Acknowledgements.- Part I Theory.- Chapter 1 Data Collection Isn’t Mostly Harmless: An Introduction to Privacy Theories and Basics.- Chapter 2 From the Privacy Calculus to Crossing the Rubicon: An Introduction to Theoretical Models of User Privacy Behavior.- Part II Methodology.- Chapter 3 Empirical Research Methods in Usable Privacy and Security.- Chapter 4 Towards Valid and Reliable Privacy Concern Scales: The Example of IUIPC-8.- Chapter 5 Achieving Usable Security and Privacy through Human-Centered Design.- Chapter 6 What HCI Can Do for (Data Protection) Law - Beyond Design.- Chapter 7 Expert Opinions as a Method of Validating Ideas: Applied to Making GDPR Usable.- Part III Applicable Areas.- Chapter 8 Privacy Nudges and Informed Consent? - Challenges for Privacy Nudge Design.- Chapter 9 The Hows and Whys of Dark Patterns: Categorizations and Privacy.- Chapter 10 ’They see me scrolling’ - Lessons Learned From Investigating Shoulder Surfing Behavior and Attack Mitigation Strategies.- Chapter 11 Privacy Research on the Pulse of Time: COVID-19 Contact Tracing Apps.- Chapter 12 Privacy Perception and Behavior in Safety-Critical Environments.- Part IV Solutions.- Chapter 13 Generic Consents in Digital Ecosystems: Legal, Psychological and Technical Perspectives.- Chapter 14 Human-Centered Design for Data-Sparse Tailored Privacy Information Provision.- Chapter 15 Acceptance Factors of Privacy Enhancing Technologies on the Basis of Tor and JonDonym.- Chapter 16 Increasing Users’ Privacy Awareness in the Internet of Things: Design Space and Sample Scenarios.- Chapter 17 Challenges, Conflicts and Solution Strategies for the Introduction of Corporate Data Protection Measures.- Chapter 18 Data Cart - A Privacy Pattern for Personal Data Management in Organizations.
Trade Policy 买家须知
- 关于产品:
- ● 正版保障:本网站隶属于中国国际图书贸易集团公司,确保所有图书都是100%正版。
- ● 环保纸张:进口图书大多使用的都是环保轻型张,颜色偏黄,重量比较轻。
- ● 毛边版:即书翻页的地方,故意做成了参差不齐的样子,一般为精装版,更具收藏价值。
关于退换货:
- 由于预订产品的特殊性,采购订单正式发订后,买方不得无故取消全部或部分产品的订购。
- 由于进口图书的特殊性,发生以下情况的,请直接拒收货物,由快递返回:
- ● 外包装破损/发错货/少发货/图书外观破损/图书配件不全(例如:光盘等)
并请在工作日通过电话400-008-1110联系我们。
- 签收后,如发生以下情况,请在签收后的5个工作日内联系客服办理退换货:
- ● 缺页/错页/错印/脱线
关于发货时间:
- 一般情况下:
- ●【现货】 下单后48小时内由北京(库房)发出快递。
- ●【预订】【预售】下单后国外发货,到货时间预计5-8周左右,店铺默认中通快递,如需顺丰快递邮费到付。
- ● 需要开具发票的客户,发货时间可能在上述基础上再延后1-2个工作日(紧急发票需求,请联系010-68433105/3213);
- ● 如遇其他特殊原因,对发货时间有影响的,我们会第一时间在网站公告,敬请留意。
关于到货时间:
- 由于进口图书入境入库后,都是委托第三方快递发货,所以我们只能保证在规定时间内发出,但无法为您保证确切的到货时间。
- ● 主要城市一般2-4天
- ● 偏远地区一般4-7天
关于接听咨询电话的时间:
- 010-68433105/3213正常接听咨询电话的时间为:周一至周五上午8:30~下午5:00,周六、日及法定节假日休息,将无法接听来电,敬请谅解。
- 其它时间您也可以通过邮件联系我们:customer@readgo.cn,工作日会优先处理。
关于快递:
- ● 已付款订单:主要由中通、宅急送负责派送,订单进度查询请拨打010-68433105/3213。
本书暂无推荐
本书暂无推荐