Opt out of privacy or "go home": understanding reluctant privacy behaviours through the FoMO-centric design paradigm
暂无分享,去创建一个
[1] Andrew K. Przybylski,et al. Motivational, emotional, and behavioral correlates of fear of missing out , 2013, Comput. Hum. Behav..
[2] Johanneke Siljee,et al. Privacy transparency patterns , 2015, EuroPLoP.
[3] Menno D. T. de Jong,et al. The privacy paradox - Investigating discrepancies between expressed privacy concerns and actual online behavior - A systematic literature review , 2017, Telematics Informatics.
[4] Dorit Alt,et al. College students' academic motivation, media engagement and fear of missing out , 2015, Comput. Hum. Behav..
[5] Mourad Debbabi,et al. Security Design Patterns: Survey and Evaluation , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.
[6] Edward L. Deci,et al. Intrinsic Motivation and Self-Determination in Human Behavior , 1975, Perspectives in Social Psychology.
[7] Daniel Susser,et al. Invisible Influence: Artificial Intelligence and the Ethics of Adaptive Choice Architectures , 2019, AIES.
[8] Alessandro Acquisti,et al. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.
[9] Stefanie Duguay. Identity modulation in networked publics: Queer women's participation and representation on Tinder, Instagram, and Vine , 2017 .
[10] Max Jacobson,et al. A Pattern Language: Towns, Buildings, Construction , 1981 .
[11] Oren Soffer,et al. To Post or not to Post? , 2017 .
[12] Justin W. Weeks,et al. Problematic smartphone use and relations with negative affect, fear of missing out, and fear of negative and positive evaluation , 2017, Psychiatry Research.
[13] John A. Fairlie,et al. The United States Department of Justice , 1905 .
[14] Curtis R. Taylor,et al. The Economics of Privacy , 2016 .
[15] Zizi Papacharissi,et al. Fifteen Minutes of Privacy: Privacy, Sociality, and Publicity on Social Network Sites , 2011, Privacy Online.
[16] Jaap-Henk Hoepman,et al. A system of privacy patterns for user control , 2018, SAC.
[17] S Kamen,et al. The task force. , 1976, Journal of hospital dental practice.
[18] Glenn J. Browne,et al. An Empirical Investigation of Web Site Use Using a Commitment-Based Model , 2006, Decis. Sci..
[19] Susanna Paasonen,et al. Affect, data, manipulation and price in social media , 2018 .
[20] Sarah Spiekermann,et al. The challenges of privacy by design , 2012, Commun. ACM.
[21] S. Utz,et al. The privacy paradox on social network sites revisited: The role of individual characteristics and group norms , 2009 .
[22] N. McGlynn. Thinking fast and slow. , 2014, Australian veterinary journal.
[23] Elija Cassidy,et al. Social networking sites and participatory reluctance: A case study of Gaydar, user resistance and interface rejection , 2016, New Media Soc..
[24] Cliff Lampe,et al. The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..
[25] Emily van der Nagel. ‘Networks that work too well’: intervening in algorithmic connections: , 2018 .
[26] Christopher Krügel,et al. Abusing Social Networks for Automated User Profiling , 2010, RAID.
[27] Edgar R. Weippl,et al. Advanced social engineering attacks , 2015, J. Inf. Secur. Appl..
[28] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[29] Alessandro Acquisti,et al. Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.
[30] Ralph W. Thomas,et al. The Oxford Dictionary , 1907 .
[31] Xiao Wang,et al. Toward a detailed understanding of illegal digital downloading intentions: An extended theory of planned behavior approach , 2011, New Media Soc..
[32] David A. Wagner,et al. Analyzing inter-application communication in Android , 2011, MobiSys '11.
[33] Martin N. Yina. Newport, Cal. Digital Minimalism: Choosing a Focused Life in a Noisy World , 2020 .
[34] Jason Hong,et al. Privacy patterns for online interactions , 2006, PLoP '06.
[35] Saikat Guha,et al. NOYB: privacy in online social networks , 2008, WOSN '08.
[36] Yada Zhu,et al. Social Phishing , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[37] Paul Resnick,et al. It's Creepy, But it Doesn't Bother Me , 2016, CHI.
[38] David A. Wagner,et al. Contextualizing Privacy Decisions for Better Prediction (and Protection) , 2018, CHI.
[39] Monika Taddicken,et al. The 'Privacy Paradox' in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure1 , 2014, J. Comput. Mediat. Commun..
[40] H. Nissenbaum,et al. Online Manipulation: Hidden Influences in a Digital World , 2018 .
[41] Maarten H. Everts,et al. Designing Privacy-by-Design , 2012, APF.
[42] Ramona-Riin Dremljuga. The Process and Affordances of Platform-Specific Social Media Disconnection , 2018 .
[43] Norman M. Sadeh,et al. Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing , 2010, UbiComp.
[44] Gustavo S. Mesch,et al. Parental mediation, peer norms and risky online behavior among adolescents , 2014, Comput. Hum. Behav..
[45] Miriam Liss,et al. Extraversion, neuroticism, attachment style and fear of missing out as predictors of social media use and addiction , 2017 .
[46] Kerk F. Kee,et al. Is There Social Capital in a Social Network Site?: Facebook Use and College Students’ Life Satisfaction, Trust, and Participation 1 , 2009 .
[47] Frank Kargl,et al. Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns , 2016, Proc. Priv. Enhancing Technol..
[48] Tien Ee Dominic Yeo,et al. Rethinking Social Media and Political Engagement: An Examination of the Disconnective Practices of Politically Active Youths in Hong Kong , 2018, SMSociety.
[49] Daniel R. Horne,et al. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .
[50] Heather Richter Lipford,et al. Strategies and struggles with privacy in an online social networking community , 2008, BCS HCI.
[51] Hironori Washizaki,et al. A survey on security patterns , 2008 .
[52] Rainer Böhme,et al. Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data , 2011, Financial Cryptography.
[53] Jonathan Mayer,et al. Dark Patterns at Scale , 2019, Proc. ACM Hum. Comput. Interact..
[54] Nick Doty,et al. Privacy Design Patterns and Anti-Patterns Patterns Misapplied and Unintended Consequences , 2013 .
[55] Zeynep Tufekci. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites , 2008 .
[56] Russell B. Clayton,et al. The Extended iSelf: The Impact of iPhone Separation on Cognition, Emotion, and Physiology , 2015, J. Comput. Mediat. Commun..
[57] F. Okumus,et al. Generation Y travelers' commitment to online social network websites , 2013 .
[58] Sarah Spiekermann,et al. Aware but not in Control - A Qualitative Value Analysis of the Effects of New Technologies , 2018, HCC.
[59] B. J. Fogg,et al. Persuasive technology: using computers to change what we think and do , 2002, UBIQ.