Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Un-Paradoxing Privacy: Considering Hopeful Trust

Published: 25 September 2023 Publication History

Abstract

Extant literature has proposed an important role for trust in moderating people’s willingness to disclose personal information, but there is scant HCI literature that deeply explores the relationship between privacy and trust in apparent privacy paradox circumstances. Attending to this gap, this article reports a qualitative study examining how people account for continuing to use services that conflict with their stated privacy preferences, and how trust features in these accounts. Our findings undermine the notion that individuals engage in strategic thinking about privacy, raising important questions regarding the explanatory power of the well-known privacy calculus model and its proposed relationship between privacy and trust. Finding evidence of hopeful trust in participants’ accounts, we argue that trust allows people to morally account for their “paradoxical” information disclosure behavior. We propose that effecting greater alignment between people’s privacy attitudes and privacy behavior—or “un-paradoxing privacy”—will require greater regulatory assurances of privacy.

References

[1]
Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2015. Privacy and human behavior in the age of information. Science 347, 6221 (2015), 509–514.
[2]
Alessandro Acquisti and Ralph Gross. 2006. Imagined communities: Awareness, information sharing, and privacy on the facebook. In Privacy Enhancing Technologies. George Danezis and Philippe Golle (Eds.), Springer, Berlin, 36–58.
[3]
Philip E. Agre. 1999. THE architecture of identity: Embedding privacy in market institutions. Information, Communication & Society 2, 1 (1999), 1–25.
[4]
Naveen Farag Awad and Mayuram S. Krishnan. 2006. The Personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly 30, 1 (2006), 13–28.
[5]
Annette Baier. 1986. Trust and antitrust. Ethics 96, 2 (1986), 231–260.
[6]
Annette Baier. 1991. “Trust”, the tanner lectures on human values. Princeton University. March 6–8, 1991.
[7]
Annette C. Baier. 1992. Trusting people. Philosophical Perspectives 6 (1992), 137–153.
[8]
Solon Barocas and Helen Nissenbaum. 2014. Big data’s end run around procedural privacy protections. Communications of the ACM 57, 11 (Oct2014), 31–33.
[9]
Paul C. Bauer, Frederic Gerdon, Florian Keusch, Frauke Kreuter, and David Vannette. 2022. Did the GDPR increase trust in data collectors? Evidence from observational and experimental data. Information, Communication & Society 25, 14 (2022), 2101–2121.
[10]
Rajesh Bejugam and Kristen LeFevre. 2011. enList: Automatically simplifying privacy policies. In Proceedings of the 2011 IEEE 11th International Conference on Data Mining Workshops. IEEE, 620–627.
[11]
Adil Bilal, Stephen Wingreen, and Ravishankar Sharma. 2020. Virtue ethics as a solution to the privacy paradox and trust in emerging technologies. In Proceedings of the 3rd International Conference on Information Science and Systems (Cambridge, United Kingdom) (ICISS’20). 224–228.
[12]
Laura Brandimarte, Alessandro Acquisti, and George Loewenstein. 2013. Misplaced confidences: Privacy and the control paradox. Social Psychological and Personality Science 4, 3 (2013), 340–347.
[13]
J. Adam Carter. 2022. Trust as performance. Philosophical Issues 32, 1 (2022), 120–147.
[14]
Cheskin Research and Studio Archetype/Sapient. 1999. ECommerce Trust Study. Retrieved from http://www.sapient.com/cheskin
[15]
Marc A. Cohen and John Dienhart. 2013. Moral and amoral conceptions of trust, with an application in organizational ethics. Journal of Business Ethics 112, 1 (2013), 1–13.
[16]
Cynthia L. Corritore, Beverly Kracher, and Susan Wiedenbeck. 2003. On-line trust: concepts, evolving themes, a model. International Journal of Human–Computer Studies 58, 6 (2003), 737–758.
[17]
Nick Couldry and Ulises A. Mejias. 2019. The Costs of Connection. Stanford University Press.
[18]
Andy Crabtree, Peter Tolmie, and Will Knight. 2017. Repacking “Privacy” for a networked world. Computer Supported Cooperative Work (CSCW) 26, 4 (2017), 453–488.
[19]
Mary J. Culnan and Pamela K. Armstrong. 1999. Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science 10, 1 (1999), 104–115.
[20]
Tomi Dahlberg, Niina Mallat, and Anssi Öörni. 2003. Trust enhanced technology acceptance model—consumer acceptance of mobile payment solutions: Tentative evidence. Stockholm Mobility Roundtable 22, 1 (2003), 145.
[21]
Fred D. Davis. 1989. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly 13, 3 (1989), 319–340.
[22]
Jason D’Cruz. 2015. Rationalization as performative pretense. Philosophical Psychology 28, 7 (2015), 980–1000.
[23]
Jason D’Cruz. 2015. Trust, trustworthiness, and the moral consequence of consistency. Journal of the American Philosophical Association 1, 3 (2015), 467–484.
[24]
Bernhard Debatin, Jennette P. Lovejoy, Ann-Kathrin Horn, and Brittany N. Hughes. 2009. Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication 15, 1 (2009), 83–108.
[25]
Tamara Dinev and Paul Hart. 2006. An extended privacy calculus model for e-commerce transactions. Information Systems Research 17, 1 (2006), 61–80.
[26]
Paul Dourish and Graham Button. 1998. On “Technomethodology”: Foundational relationships between ethnomethodology and system design. Human–Computer Interaction 13, 4 (1998), 395–432.
[27]
Nora A. Draper. 2017. From privacy pragmatist to privacy resigned: Challenging narratives of rational choice in digital privacy debates. Policy & Internet 9, 2 (2017), 232–251.
[28]
Catherine Dwyer, Starr Hiltz, and Katia Passerini. 2007. Trust and privacy concern within social networking sites: A comparison of facebook and myspace. In Proceedings of the Thirteenth Americas Conference on Information Systems. Keystone, Colorado August 09-12 2007 (2007), 339.
[29]
Nico Ebert, Kurt Alexander Ackermann, and Peter Heinrich. 2020. Does context in privacy communication really matter?–a survey on consumer concerns and preferences. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–11.
[30]
Nico Ebert, Kurt Alexander Ackermann, and Björn Scheppler. 2021. Bolder is better: Raising user awareness through salient and concise privacy notices. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1–12.
[31]
Tatiana Ermakova, Annika Baumann, Benjamin Fabian, and Hanna Krasnova. 2014. Privacy policies and users’ trust: Does readability matter?. In Proceedings of the 20th Americas Conference on Information Systems (AMCIS).
[32]
Ulrike Felt, Milena D. Bister, Michael Strassnig, and Ursula Wagner. 2009. Refusing the information paradigm: informed consent, medical research, and patient participation. Health 13, 1 (2009), 87–106.
[33]
Carlos Flavián and Miguel Guinalíu. 2006. Consumer trust, perceived security and privacy policy: Three basic elements of loyalty to a web site. Industrial Management & Data Systems 106, 5 (2006), 601–620.
[34]
Christian Flender and Günter Müller. 2012. Type indeterminacy in privacy decisions: The privacy paradox revisited. In Proceedings of the International Symposium on Quantum Interaction. Springer, 148–159.
[35]
David Gefen. 2000. E-commerce: The role of familiarity and trust. Omega 28, 6 (2000), 725–737.
[36]
Nina Gerber, Paul Gerber, and Melanie Volkamer. 2018. Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & Security 77, August 2018 (2018), 226–261.
[37]
Isha Ghosh and Vivek Singh. 2017. Using cognitive dissonance theory to understand privacy behavior. Proceedings of the Association for Information Science and Technology 54, 1 (2017), 679–681.
[38]
Ian Goldberg, Austin Hill, and Adam Shostack. 2001. Trust, ethics, and privacy. Boston University Law Review 81, 2 (2001), 407–422.
[39]
Harald Grimen. 2009. Power, trust, and risk: Some reflections on an absent issue. Medical Anthropology Quarterly 23, 1 (2009), 16–33.
[40]
Tamy Guberek, Allison McDonald, Sylvia Simioni, Abraham H. Mhaidli, Kentaro Toyama, and Florian Schaub. 2018. Keeping a low profile? technology, risk and privacy among undocumented immigrants. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1–15.
[41]
Cory Hallam and Gianluca Zanella. 2017. Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards. Computers in Human Behavior 68, March 2017 (2017), 217–227.
[42]
Eszter Hargittai and Alice Marwick. 2016. “What Can I Really Do?” explaining the privacy paradox with online apathy. International Journal of Communication 10 (2016), 21.
[43]
Richard Harper. 2014. Trust, Computing, and Society. Cambridge University Press.
[44]
Richard Harper, Sean Rintel, Rod Watson, and Kenton O’Hara. 2017. The “interrogative gaze”: Making video calling and messaging “accountable”. Pragmatics 27, 3 (2017), 319–350.
[45]
Todd Hartman, Helen Kennedy, Robin Steedman, and Rhianne Jones. 2020. Public perceptions of good data management: Findings from a UK-based survey. Big Data & Society 7, 1 (2020), 1–16.
[46]
Stephen Hester and David Francis. 1994. Doing data: The local organization of a sociological interview. British Journal of Sociology 45, 4 (1994), 675–695.
[47]
Chris Jay Hoofnagle and Jan Whittington. 2013. Free: Accounting for the costs of the internet’s most popular price. UCLA Law Review 61, 3 (2013), 606–670.
[48]
Nicola Howe, Emma Giles, Dorothy Newbury-Birch, and Elaine McColl. 2018. Systematic review of participants’ attitudes towards data sharing: A thematic synthesis. Journal of Health Services Research & Policy 23, 2 (2018), 123–133.
[49]
Gordon Hull. 2015. Successful failure: what foucault can teach us about privacy self-management in a world of facebook and big data. Ethics and Information Technology 17, 2 (2015), 89–101.
[50]
Ada Lovelace Institute. 2021. The Citizens’ Biometrics Council. Retrieved from https://www.adalovelaceinstitute.org/project/citizens-biometrics-council/
[51]
Ada Lovelace Institute. 2021. Participatory data stewardship. Retrieved from https://www.adalovelaceinstitute.org/report/participatory-data-stewardship/
[52]
Carlos Jensen, Colin Potts, and Christian Jensen. 2005. Privacy practices of Internet users: Self-reports versus observed behavior. International Journal of Human–Computer Studies 63, 1-2 (2005), 203–227.
[53]
Adam N. Joinson, Ulf-Dietrich Reips, Tom Buchanan, and Carina B Paine Schofield. 2010. Privacy, trust, and self-disclosure online. Human–Computer Interaction 25, 1 (2010), 1–24.
[54]
Helen Kennedy. 2016. Post, Mine, Repeat. Springer.
[55]
Esther Keymolen and Astrid Voorwinden. 2020. Can we negotiate? Trust and the rule of law in the smart city paradigm. International Review of Law, Computers & Technology 34, 3 (2020), 233–253.
[56]
Bran Knowles and Vicki L. Hanson. 2018. Older adults’ deployment of “distrust”. ACM Transactions on Computer–Human Interaction (TOCHI) 25, 4 (2018), 1–25.
[57]
Bran Knowles and Vicki L. Hanson. 2018. The wisdom of older technology (non)users. Communications of the ACM 61, 3 (2018), 72–77.
[58]
Bran Knowles, Vicki L. Hanson, Yvonne Rogers, Anne Marie Piper, Jenny Waycott, Nigel Davies, Aloha Hufana Ambe, Robin N. Brewer, Debaleena Chattopadhyay, Marianne Dee, David Frohlich, Marisela Gutierrez-Lopez, Ben Jelen, Amanda Lazar, Radoslaw Nielek, Belén Barros Pena, Abi Roper, Mark Schlager, Britta Schulte, and Irene Ye Yuan. 2021. The harm in conflating aging with accessibility. Communications of the ACM 64, 7 (2021), 66–71.
[59]
Spyros Kokolakis. 2017. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & Security 64, January 2017 (2017), 122–134.
[60]
Roderick M. Kramer. 2009. Rethinking trust. Harvard Business Review 87, 6 (2009), 68–77.
[61]
Mary Jane Kwok Choon. 2018. Revisiting the privacy paradox on social media: An analysis of privacy practices associated with facebook and twitter. Canadian Journal of Communication 43, 2 (2018), 339–358.
[62]
Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, are you listening? privacy perceptions, concerns and privacy-seeking behaviors with smart speakers. Proceedings of the ACM on Human–Computer Interaction 2, CSCW (2018), 1–31.
[63]
Thomas W. Lauer and Xiaodong Deng. 2007. Building online trust through privacy practices. International Journal of Information Security 6, 5 (2007), 323–331.
[64]
Qingrui Li, Juan Li, Hui Wang, and Ashok Ginjala. 2011. Semantics-enhanced privacy recommendation for social networking sites. In Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 226–233.
[65]
Jialiu Lin, Shahriyar Amini, Jason I. Hong, Norman Sadeh, Janne Lindqvist, and Joy Zhang. 2012. Expectation and purpose: Understanding users’ mental models of mobile app privacy through crowdsourcing. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing. 501–510.
[66]
Ewa Luger, Stuart Moran, and Tom Rodden. 2013. Consent for all: Revealing the hidden complexity of terms and conditions. In Proceedings of the SIGCHI Conference on Human factors in Computing Systems. 2687–2696.
[67]
Ewa Luger and Tom Rodden. 2013. An informed view on consent for UbiComp. In Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp’13). 529–538.
[68]
Christoph Lutz and Pepe Strathoff. 2014. Privacy concerns and online behavior—not so paradoxical after all? Viewing the Privacy Paradox Through Different Theoretical Lenses (April 15, 2014) (2014), 81–99. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2425132
[69]
Michael Lynch. 1999. Silence in context: Ethnomethodology and social theory. Human Studies 22, 2 (1999), 211–233.
[70]
Naresh K. Malhotra, Sung S. Kim, and James Agarwal. 2004. Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research 15, 4 (2004), 336–355.
[71]
Alice E. Marwick and Danah Boyd. 2014. Networked privacy: How teenagers negotiate context in social media. New Media & Society 16, 7 (2014), 1051–1067.
[72]
Roger C. Mayer, James H. Davis, and F. David Schoorman. 1995. An integrative model of organizational trust. Academy of Management Review 20, 3 (1995), 709–734.
[73]
Aleecia M. McDonald and Lorrie Faith Cranor. 2010. Americans’ attitudes about internet behavioral advertising practices. In Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society, WPES’10. 63–72.
[74]
Victoria McGeer. 2008. Trust, hope and empowerment, Australasian. Journal of Philosophy 86, 2 (2008), 237–254.
[75]
D. Harrison McKnight, Vivek Choudhury, and Charles Kacmar. 2002. Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research 13, 3 (2002), 334–359.
[76]
Miriam J. Metzger. 2006. Effects of site, vendor, and consumer characteristics on web site trust and disclosure. Communication Research 33, 3 (2006), 155–179.
[77]
George R. Milne and Mary J. Culnan. 2004. Strategies for reducing online privacy risks: why consumers read (or don’t read) online privacy notices. Journal of Interactive Marketing 18, 3 (2004), 15–29.
[78]
Alistair Morrison, Donald McMillan, and Matthew Chalmers. 2014. Improving consent in large scale mobile HCI through personalised representations of data. In Proceedings of the 8th Nordic Conference on Human–Computer Interaction. 471–480.
[79]
Bettina Nissen, Victoria Neumann, Mateusz Mikusz, Rory Gianni, Sarah Clinch, Chris Speed, and Nigel Davies. 2019. Should i agree? delegating consent decisions beyond the individual. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1–13.
[80]
Helen Nissenbaum. 2020. Privacy in Context. Stanford University Press.
[81]
Patricia A. Norberg, Daniel R. Horne, and David A. Horne. 2007. The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs 41, 1 (2007), 100–126.
[82]
Leysia Palen and Paul Dourish. 2003. Unpacking “privacy” for a networked world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 129–136.
[83]
Chanda Phelan, Cliff Lampe, and Paul Resnick. 2016. It’s creepy, but it doesn’t bother me. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. 5240–5251.
[84]
David Randall, Mark Rouncefield, and Peter Tolmie. 2021. Ethnography, CSCW and ethnomethodology. Computer Supported Cooperative Work (CSCW) 30, 2 (2021), 189–214.
[85]
Daniel Reinhardt, Johannes Borchard, and Jörn Hurtienne. 2021. Visual interactive privacy policy: The better choice?. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1–12.
[86]
Neil Richards. 2021. Why Privacy Matters. Oxford University Press.
[87]
Neil Richards and Woodrow Hartzog. 2016. Taking trust seriously in privacy law. Stanford Technology Law Review 19, 3 (2016), 431–472.
[88]
Valeria Righi, Sergio Sayago, and Josep Blat. 2017. When we talk about older people in HCI, who are we talking about? Towards a ‘turn to community’ in the design of technologies for a growing ageing population. International Journal of Human–Computer Studies 108, December 2017 (2017), 15–31.
[89]
Eric P. Robinson and Yicheng Zhu. 2020. Beyond “I Agree”: Users’ understanding of web site terms of service. Social Media+ Society 6, 1 (2020), 1–13.
[90]
John-David Rusk. 2014. Trust and decision making in the privacy paradox. In Proceedings of the Southern Association for Information Systems Conference, Vol. 32. 1–6.
[91]
Benjamin Saunders, Julius Sim, Tom Kingstone, Shula Baker, Jackie Waterfield, Bernadette Bartlam, Heather Burroughs, and Clare Jinks. 2018. Saturation in qualitative research: exploring its conceptualization and operationalization. Quality & Quantity 52, 4 (2018), 1893–1907.
[92]
William Seymour, Martin J. Kraemer, Reuben Binns, and Max Van Kleek. 2020. Informing the design of privacy-empowering tools for the connected home. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–14.
[93]
Kim Bartel Sheehan and Mariea Grubbs Hoy. 2000. Dimensions of privacy concern among online consumers. Journal of Public Policy & Marketing 19, 1 (2000), 62–73.
[94]
Herbert Alexander Simon. 1997. Models of Bounded Rationality. Vol. 3. MIT press.
[95]
Thomas W. Simpson. 2012. What is trust? Pacific Philosophical Quarterly 93, 4 (2012), 550–569.
[96]
Benjamin Six. 2014. A pragmatic contribution for a more reflexive institution-based trust. Journal of Trust Research 4, 2 (2014), 132–146.
[97]
Daniel J. Solove. 2004. The Digital Person. Vol. 1. NYU Press.
[98]
Daniel J. Solove. 2013. Introduction: Privacy self-management and the consent dilemma. Harvard Law Review 126, 7 (2013), 1880–1903.
[99]
S. Shyam Sundar, Jinyoung Kim, Mary Beth Rosson, and Maria D. Molina. 2020. Online privacy heuristics that predict information disclosure. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–12.
[100]
Monika Taddicken. 2014. The “Privacy Paradox” in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. Journal of Computer-Mediated Communication 19, 2 (2014), 248–273.
[101]
Paul Ten Have. 2003. Understanding Qualitative Research and Ethnomethodology. Sage.
[102]
Peter Tolmie and Andy Crabtree. 2021. Accountability in ordinary action. In Proceedings of the Privacy by Design for the Internet of Things. IET, 1–26.
[103]
Traverse and the Ada Lovelace Institute. 2021. Public dialogue on location data ethics. Published by The Geospatial Commission. Retrieved from https://www.gov.uk/government/news/public-dialogue-on-location-data-ethics-published
[104]
Zeynep Tufekci. 2008. Can you see me now? audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society 28, 1 (2008), 20–36.
[105]
Joseph Turow, Michael Hennessy, and Nora Draper. 2015. The tradeoff fallacy: How marketers are misrepresenting american consumers and opening them up to exploitation. 26, 2015 (2015), 1–24.
[106]
Lisa van der Werff, Alison Legood, Finian Buckley, Antoinette Weibel, and David de Cremer. 2019. Trust motivation: The self-regulatory processes underlying trust decisions. Organizational Psychology Review 9, 2–3 (2019), 99–123.
[107]
Max Van Kleek, Reuben Binns, Jun Zhao, Adam Slack, Sauyon Lee, Dean Ottewell, and Nigel Shadbolt. 2018. X-Ray Refine: Supporting the exploration and refinement of information exposure resulting from smartphone apps. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1–13.
[108]
Max Van Kleek, Ilaria Liccardi, Reuben Binns, Jun Zhao, Daniel J. Weitzner, and Nigel Shadbolt. 2017. Better the devil you know: Exposing the data sharing practices of smartphone apps. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 5208–5220.
[109]
Iris van Ooijen and Helena U. Vrabec. 2019. Does the GDPR enhance consumers’ control over personal data? An analysis from a behavioural perspective. Journal of Consumer Policy 42, 1 (2019), 91–107.
[110]
Tien Wang, Trong Danh Duong, and Charlie C. Chen. 2016. Intention to disclose personal information via mobile applications: A privacy calculus perspective. International Journal of Information Management 36, 4 (2016), 531–542.
[111]
Ye Diana Wang and Henry H. Emurian. 2005. An overview of online trust: Concepts, elements, and implications. Computers in Human Behavior 21, 1 (2005), 105–125.
[112]
Rod Watson. 2009. Constitutive practices and garfinkel’s notion of trust: Revisited. Journal of Classical Sociology 9, 4 (2009), 475–499.
[113]
A. Westin. 1991. Harris-Equifax Consumer Privacy Survey. Technical Report. Tech. rep, Conducted for Equifax Inc.
[114]
Kuang-Wen Wu, Shaio Yan Huang, David C. Yen, and Irina Popova. 2012. The effect of online privacy policy on consumer privacy concern and trust. Computers in Human Behavior 28, 3 (2012), 889–897.
[115]
Shoshana Zuboff. 2019. The Age of Surveillance Capitalism. Profile books.

Cited By

View all
  • (2024)Regaining Trust: Impact of Transparent User Interface Design on Acceptance of Camera-Based In-Car Health Monitoring SystemsAdjunct Proceedings of the 16th International Conference on Automotive User Interfaces and Interactive Vehicular Applications10.1145/3641308.3685048(203-208)Online publication date: 22-Sep-2024
  • (2024)Privacy vs Convenience: understanding intention-behavior divergence post-GDPRComputers in Human Behavior10.1016/j.chb.2024.108382(108382)Online publication date: Jul-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Computer-Human Interaction
ACM Transactions on Computer-Human Interaction  Volume 30, Issue 6
December 2023
424 pages
ISSN:1073-0516
EISSN:1557-7325
DOI:10.1145/3623488
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 September 2023
Online AM: 14 July 2023
Accepted: 06 June 2023
Revised: 25 March 2023
Received: 05 July 2022
Published in TOCHI Volume 30, Issue 6

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Trust
  2. privacy
  3. consent
  4. GDPR
  5. fair information practices

Qualifiers

  • Research-article

Funding Sources

  • EPSRC
  • Lancaster University’s Faculty of Science and Technology Ethics Committee

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)416
  • Downloads (Last 6 weeks)21
Reflects downloads up to 22 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Regaining Trust: Impact of Transparent User Interface Design on Acceptance of Camera-Based In-Car Health Monitoring SystemsAdjunct Proceedings of the 16th International Conference on Automotive User Interfaces and Interactive Vehicular Applications10.1145/3641308.3685048(203-208)Online publication date: 22-Sep-2024
  • (2024)Privacy vs Convenience: understanding intention-behavior divergence post-GDPRComputers in Human Behavior10.1016/j.chb.2024.108382(108382)Online publication date: Jul-2024

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media