Is Privacy Controllable?

One of the major views of privacy associates privacy with the control over information. This gives rise to the question how controllable privacy actually is. In this paper, we adapt certain formal methods of control theory and investigate the implications of a control theoretic analysis of privacy. We look at how control and feedback mechanisms have been studied in the privacy literature. Relying on the control theoretic framework, we develop a simplistic conceptual control model of privacy, formulate privacy controllability issues and suggest directions for possible research.

[1]  Sarah Spiekermann,et al.  Online social networks: why we disclose , 2010, J. Inf. Technol..

[2]  P. Kleingeld,et al.  The Stanford Encyclopedia of Philosophy , 2013 .

[3]  R. Marken,et al.  The Origins and Future of Control Theory in Psychology , 2015 .

[4]  Alessandro Acquisti,et al.  Misplaced Confidences , 2013, WEIS.

[5]  Sameer Patil,et al.  Reflection or action?: how feedback and control affect location sharing decisions , 2014, CHI.

[6]  Bruce A. Francis,et al.  Feedback Control Theory , 1992 .

[7]  Jeffrey B. Vancouver,et al.  Modeling the Mind and the Milieu , 2012 .

[8]  Dr B Santhosh Kumar Santhosh Balan,et al.  Closeness : A New Privacy Measure for Data Publishing , 2022 .

[9]  Roksana Boreli,et al.  Network-level security and privacy control for smart-home IoT devices , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[10]  Yefim Shulman,et al.  Towards a Broadening of Privacy Decision-Making Models: The Use of Cognitive Architectures , 2017, Privacy and Identity Management.

[11]  Bashar Nuseibeh,et al.  Privacy Itch and Scratch: On Body Privacy Warnings and Controls , 2016, CHI Extended Abstracts.

[12]  Heng Xu,et al.  Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts , 2013, Eur. J. Inf. Syst..

[13]  Sarah Theiss,et al.  Introduction To Dynamic Systems Theory Models And Applications , 2016 .

[14]  John M. Flach,et al.  Control Theory for Humans: Quantitative Approaches To Modeling Performance , 2002 .

[15]  Joachim Meyer,et al.  Is It Harmful? Re-examining Privacy Concerns , 2017, Privacy and Identity Management.

[16]  James A. Landay,et al.  Modeling Privacy Control in Context-Aware Systems , 2002, IEEE Pervasive Comput..

[17]  W. Parent Privacy, morality, and the law , 1985 .

[18]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[19]  Klaus Wehrle,et al.  Like us on Facebook! - Analyzing user preferences regarding privacy settings in Germany , 2015 .

[20]  W. Mansell,et al.  A biopsychosocial model based on negative feedback and control , 2014, Front. Hum. Neurosci..

[21]  Lorrie Faith Cranor,et al.  Who's viewed you?: the impact of feedback in a mobile location-sharing application , 2009, CHI.

[22]  Minerva M. Yeung,et al.  Fragile imperceptible digital watermark with privacy control , 1999, Electronic Imaging.

[23]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[24]  Sameer Patil,et al.  Interrupt Now or Inform Later?: Comparing Immediate and Delayed Privacy Feedback , 2015, CHI.

[25]  W. T. Powers,et al.  A General Feedback Theory of Human Behavior: Part I , 1960 .

[26]  C. Carver Control Processes, Priority Management, and Affective Dynamics , 2015 .

[27]  Yuguang Fang,et al.  Optimal Task Recommendation for Mobile Crowdsourcing With Privacy Control , 2016, IEEE Internet of Things Journal.

[28]  Eamonn O'Neill,et al.  Feasibility of structural network clustering for group-based privacy control in social networks , 2010, SOUPS.

[29]  Jessica Colnago,et al.  How to inform privacy agents on preferred level of user control? , 2016, UbiComp Adjunct.

[30]  F. Fairman Introduction to dynamic systems: Theory, models and applications , 1979, Proceedings of the IEEE.

[31]  Daniel J. Solove A Taxonomy of Privacy , 2006 .

[32]  Adam J. Lee,et al.  Viewing the Viewers: Publishers' Desires and Viewers' Privacy Concerns in Social Networks , 2017, CSCW.

[33]  Nees Jan van Eck,et al.  Bibliometric mapping of computer and information ethics , 2011, Ethics and Information Technology.

[34]  Joseph Kupfer,et al.  PRIVACY, AUTONOMY, AND SELF-CONCEPT , 2016 .

[35]  Alfred Kobsa,et al.  Increasing Sharing Tendency Without Reducing Satisfaction: Finding the Best Privacy-Settings User Interface for Social Networks , 2014, ICIS.

[36]  Erik Wästlund,et al.  What Would It Take for You to Tell Your Secrets to a Cloud? - Studying Decision Factors When Disclosing Information to Cloud Services , 2014, NordSec.

[37]  Lorrie Faith Cranor,et al.  Locaccino: a privacy-centric location sharing application , 2010, UbiComp '10 Adjunct.

[38]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[39]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[40]  Adam J. Lee,et al.  Eyeing your exposure: quantifying and controlling information sharing for improved privacy , 2011, SOUPS.

[41]  Yang Wang,et al.  Nudges for Privacy and Security , 2017, ACM Comput. Surv..

[42]  Anna Cinzia Squicciarini,et al.  Invited Paper: A Model of Paradoxical Privacy Behavior in Online Users , 2016, 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC).

[43]  David J. Danelski,et al.  Privacy and Freedom , 1968 .

[44]  Lorrie Faith Cranor,et al.  A Design Space for Effective Privacy Notices , 2015, SOUPS.

[45]  Nora A Draper,et al.  The Tradeoff Fallacy: How Marketers are Misrepresenting American Consumers and Opening Them Up to Exploitation , 2015 .

[46]  A. Moore,et al.  Defining Privacy , 2008 .

[47]  Simone Fischer-Hübner,et al.  Tools for Achieving Usable Ex Post Transparency: A Survey , 2017, IEEE Access.

[48]  Jin H. Im,et al.  Privacy , 2002, Encyclopedia of Information Systems.

[49]  Sunil Choenni,et al.  Privacy protection in data sharing: towards feedback based solutions , 2014, ICEGOV.

[50]  Sonia Chiasson,et al.  User Perceptions of Sharing, Advertising, and Tracking , 2015, SOUPS.

[51]  Thomas B. Sheridan,et al.  Man-machine systems;: Information, control, and decision models of human performance , 1974 .

[52]  David A. Wagner,et al.  Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences , 2017, SOUPS.

[53]  M. Hoagland,et al.  Feedback Systems An Introduction for Scientists and Engineers SECOND EDITION , 2015 .