arbeiten:nudging_and_boosting_for_privacy

Unterschiede

Hier werden die Unterschiede zwischen zwei Versionen angezeigt.

Link zu dieser Vergleichsansicht

Nächste Überarbeitung
Vorhergehende Überarbeitung
Nächste ÜberarbeitungBeide Seiten der Revision
arbeiten:nudging_and_boosting_for_privacy [01.09.2020 10:51] – Erstellt mit dem Formular arbeiten:anlegen Niels Henzearbeiten:nudging_and_boosting_for_privacy [01.09.2020 10:53] Niels Henze
Zeile 30: Zeile 30:
  
 The steps which are necessary to reach this goal are the following: The steps which are necessary to reach this goal are the following:
-• Collect data to use in boosts + 
-• Design nudges and boosts based on literature and previous work +Collect data to use in boosts 
-• Implement a browser extension for Chrome/Firefox to use in a naturalistic study. This includes: +Design nudges and boosts based on literature and previous work 
-– Collecting information on participants’ browsing behavior while preserving their privacy as much as possible +Implement a browser extension for Chrome/Firefox to use in a naturalistic study. This includes: 
-– Categorizing visited websites as a measure to preserve anonymity +  Collecting information on participants’ browsing behavior while preserving their privacy as much as possible 
-– Accumulating privacy related information on website visits +  Categorizing visited websites as a measure to preserve anonymity 
-– Implementing a database and an Application Programming Interface (API) to connect to the database from the extension +  Accumulating privacy related information on website visits 
-– Presenting nudges or boosts to participants +  Implementing a database and an Application Programming Interface (API) to connect to the database from the extension 
-• Recruit a sufficient number of participants to take part in a study +  Presenting nudges or boosts to participants 
-• Conduct a study with the extension +Recruit a sufficient number of participants to take part in a study 
-• Analyze and interpret the results+Conduct a study with the extension 
 +Analyze and interpret the results
  
 === Erwartete Vorkenntnisse === === Erwartete Vorkenntnisse ===
Zeile 49: Zeile 50:
  
 [1] Utz, C., Degeling, M., Fahl, S., Schaub, F., & Holz, T. (2019). (Un)Informed consent: Studying GDPR consent notices in the field. In Proceedings of the 2019 acm sigsac conference on computer and communications security (p. 973–990). New York, NY, USA: Association for Computing Machinery. [1] Utz, C., Degeling, M., Fahl, S., Schaub, F., & Holz, T. (2019). (Un)Informed consent: Studying GDPR consent notices in the field. In Proceedings of the 2019 acm sigsac conference on computer and communications security (p. 973–990). New York, NY, USA: Association for Computing Machinery.
 +
 [2] Datta, A., Tschantz, M. C., & Datta, A. (2015). Automated experiments on ad privacy settings. Proceedings on privacy enhancing technologies, 2015(1), 92–112. [2] Datta, A., Tschantz, M. C., & Datta, A. (2015). Automated experiments on ad privacy settings. Proceedings on privacy enhancing technologies, 2015(1), 92–112.
 +
 [3] Mikians, J., Gyarmati, L., Erramilli, V., & Laoutaris, N. (2012). Detecting price and search discrimination on the internet. In Proceedings of the 11th acm workshop on hot topics in networks (p. 79–84). New York, NY, USA: Association for Computing Machinery. [3] Mikians, J., Gyarmati, L., Erramilli, V., & Laoutaris, N. (2012). Detecting price and search discrimination on the internet. In Proceedings of the 11th acm workshop on hot topics in networks (p. 79–84). New York, NY, USA: Association for Computing Machinery.
 +
 [4] Grüne-Yanoff, T., & Hertwig, R. (2016, Mar 01). Nudge versus boost: How coherent are policy and theory? Minds and Machines, 26(1), 149–183. [4] Grüne-Yanoff, T., & Hertwig, R. (2016, Mar 01). Nudge versus boost: How coherent are policy and theory? Minds and Machines, 26(1), 149–183.
 +
 [5] Acquisti, A., Adjerid, I., Balebako, R., Brandimarte, L., Cranor, L. F., Komanduri, S., … et al. (2017, 08). Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Computing Surveys (CSUR), 50(3). [5] Acquisti, A., Adjerid, I., Balebako, R., Brandimarte, L., Cranor, L. F., Komanduri, S., … et al. (2017, 08). Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Computing Surveys (CSUR), 50(3).
 +
 [6] Lowry, P. B., Dinev, T., & Willison, R. (2017). Why security and privacy research lies at the centre of the information systems (is) artefact: proposing a bold research agenda. European Journal of Information Systems, 26(6), 546-563. [6] Lowry, P. B., Dinev, T., & Willison, R. (2017). Why security and privacy research lies at the centre of the information systems (is) artefact: proposing a bold research agenda. European Journal of Information Systems, 26(6), 546-563.
 +
 [7] Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100-126. [7] Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100-126.