arbeiten:nudging_and_boosting_for_privacy

Unterschiede

Hier werden die Unterschiede zwischen zwei Versionen angezeigt.

Link zu dieser Vergleichsansicht

Nächste Überarbeitung
Vorhergehende Überarbeitung
arbeiten:nudging_and_boosting_for_privacy [01.09.2020 10:51] – Erstellt mit dem Formular arbeiten:anlegen Niels Henzearbeiten:nudging_and_boosting_for_privacy [07.11.2021 19:03] (aktuell) – [Data-Entry] wiv23079
Zeile 2: Zeile 2:
  
 ---- dataentry StudentischeArbeit ---- ---- dataentry StudentischeArbeit ----
-Thema                       : A Comparison of Nudging and Boosting for Privacy during Web Browsing +Thema                                  : A Comparison of Nudging and Boosting for Privacy during Web Browsing 
-Art_thesistypes             : MA +Art_thesistypes                        : MA 
-BetreuerIn_thesisadvisor    : David Elsweiler +BetreuerIn_thesisadvisor               : David Elsweiler 
-BearbeiterIn                : Anna-Marie Ortloff +BearbeiterIn                           : Anna-Marie Ortloff 
-ErstgutachterIn_thesisprofessor  : David Elsweiler+ErstgutachterIn_thesisprofessor        : David Elsweiler
 ZweitgutachterIn_secondthesisprofessor : Niels Henze ZweitgutachterIn_secondthesisprofessor : Niels Henze
-Status_thesisstate          in Bearbeitung +Status_thesisstate                     abgeschlossen 
-Stichworte_thesiskeywords   :  +Stichworte_thesiskeywords              :  
-angelegt_dt                 : 2020-09-01 +angelegt_dt                            : 2020-09-01 
-Anmeldung_dt                : 2020-07-01 +Anmeldung_dt                           : 2020-07-01 
-Antrittsvortrag_dt          :  +Antrittsvortrag_dt                     :  
-Abschlussvortrag_dt         :  +Abschlussvortrag_dt                    2020-11-09 
-Abgabe_dt                   :  +Abgabe_dt                              :  
-Textlizenz_textlicense      : ##Lizenz|## +Textlizenz_textlicense                  # #Lizenz|## 
-Codelizenz_codelicense      : ##Lizenz|##+Codelizenz_codelicense                  # #Lizenz|##
 ---- ----
 +
 +
  
 === Hintergrund === === Hintergrund ===
Zeile 29: Zeile 31:
 === Konkrete Aufgaben === === Konkrete Aufgaben ===
  
-The steps which are necessary to reach this goal are the following: +The steps which are necessary are the following: 
-• Collect data to use in boosts + 
-• Design nudges and boosts based on literature and previous work + Collect data to use in boosts 
-• Implement a browser extension for Chrome/Firefox to use in a naturalistic study. This includes: + Design nudges and boosts based on literature and previous work 
-– Collecting information on participants’ browsing behavior while preserving their privacy as much as possible + Implement a browser extension for Chrome/Firefox to use in a naturalistic study. This includes: 
-– Categorizing visited websites as a measure to preserve anonymity +   * Collecting information on participants’ browsing behavior while preserving their privacy as much as possible 
-– Accumulating privacy related information on website visits +   * Categorizing visited websites as a measure to preserve anonymity 
-– Implementing a database and an Application Programming Interface (API) to connect to the database from the extension +   * Accumulating privacy related information on website visits 
-– Presenting nudges or boosts to participants +   * Implementing a database and an Application Programming Interface (API) to connect to the database from the extension 
-• Recruit a sufficient number of participants to take part in a study +   * Presenting nudges or boosts to participants 
-• Conduct a study with the extension + Recruit a sufficient number of participants to take part in a study 
-• Analyze and interpret the results+ Conduct a study with the extension 
 + Analyze and interpret the results
  
 === Erwartete Vorkenntnisse === === Erwartete Vorkenntnisse ===
Zeile 49: Zeile 52:
  
 [1] Utz, C., Degeling, M., Fahl, S., Schaub, F., & Holz, T. (2019). (Un)Informed consent: Studying GDPR consent notices in the field. In Proceedings of the 2019 acm sigsac conference on computer and communications security (p. 973–990). New York, NY, USA: Association for Computing Machinery. [1] Utz, C., Degeling, M., Fahl, S., Schaub, F., & Holz, T. (2019). (Un)Informed consent: Studying GDPR consent notices in the field. In Proceedings of the 2019 acm sigsac conference on computer and communications security (p. 973–990). New York, NY, USA: Association for Computing Machinery.
 +
 [2] Datta, A., Tschantz, M. C., & Datta, A. (2015). Automated experiments on ad privacy settings. Proceedings on privacy enhancing technologies, 2015(1), 92–112. [2] Datta, A., Tschantz, M. C., & Datta, A. (2015). Automated experiments on ad privacy settings. Proceedings on privacy enhancing technologies, 2015(1), 92–112.
 +
 [3] Mikians, J., Gyarmati, L., Erramilli, V., & Laoutaris, N. (2012). Detecting price and search discrimination on the internet. In Proceedings of the 11th acm workshop on hot topics in networks (p. 79–84). New York, NY, USA: Association for Computing Machinery. [3] Mikians, J., Gyarmati, L., Erramilli, V., & Laoutaris, N. (2012). Detecting price and search discrimination on the internet. In Proceedings of the 11th acm workshop on hot topics in networks (p. 79–84). New York, NY, USA: Association for Computing Machinery.
 +
 [4] Grüne-Yanoff, T., & Hertwig, R. (2016, Mar 01). Nudge versus boost: How coherent are policy and theory? Minds and Machines, 26(1), 149–183. [4] Grüne-Yanoff, T., & Hertwig, R. (2016, Mar 01). Nudge versus boost: How coherent are policy and theory? Minds and Machines, 26(1), 149–183.
 +
 [5] Acquisti, A., Adjerid, I., Balebako, R., Brandimarte, L., Cranor, L. F., Komanduri, S., … et al. (2017, 08). Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Computing Surveys (CSUR), 50(3). [5] Acquisti, A., Adjerid, I., Balebako, R., Brandimarte, L., Cranor, L. F., Komanduri, S., … et al. (2017, 08). Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Computing Surveys (CSUR), 50(3).
 +
 [6] Lowry, P. B., Dinev, T., & Willison, R. (2017). Why security and privacy research lies at the centre of the information systems (is) artefact: proposing a bold research agenda. European Journal of Information Systems, 26(6), 546-563. [6] Lowry, P. B., Dinev, T., & Willison, R. (2017). Why security and privacy research lies at the centre of the information systems (is) artefact: proposing a bold research agenda. European Journal of Information Systems, 26(6), 546-563.
 +
 [7] Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100-126. [7] Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100-126.