publication . Article . 2014

Understanding engagement with the privacy domain through design research

Vasalou, A.; Oostveen, A.; Bowers, Christopher; Beale, R.;
Open Access
  • Published: 14 Jul 2014 Journal: Journal of the Association for Information Science and Technology, volume 66, pages 1,263-1,273 (issn: 2330-1635, Copyright policy)
  • Publisher: Wiley
  • Country: United Kingdom
This paper reports findings from participatory design research aimed at uncovering how technological interventions can engage users in the domain of privacy. Our work was undertaken in the context of a new design concept “Privacy Trends” whose aspiration is to foster technology users’ digital literacy regarding ongoing privacy risks and elucidate how such risks fit within existing social, organizational and political systems, leading to a longer term privacy concern. Our study reveals two challenges for privacy intervention design: the need to develop technology users’ intrinsic motivations with the privacy domain and the importance of framing the concept of pri...
free text keywords: Participatory design, Digital literacy, Design research, Data mining, computer.software_genre, computer, Design technology, Information privacy, Framing (construction), Knowledge management, business.industry, business, Internet privacy, Computer science, Privacy by Design, Privacy software, QA76
44 references, page 1 of 3

Acquisti, A. and Grossklags, J. Privacy and Rationality in Individual Decision Making. IEEE Security and Privacy 3, 1 (2005), 26-33. [OpenAIRE]

Acquisti, A. Nudging Privacy: The Behavioral Economics of Personal Information. IEEE Security and Privacy 7, 6 (2009) 82-85.

Adams, A. and Sasse, A. Users Are Not The Enemy. Commun. ACM 42, 12 (1999), 40-46.

Baumer, D. L., J. B. Earp, et al. (2004). Internet privacy law: a comparison between the United States and the European Union. Computers & Security 23(5): 400-412. [OpenAIRE]

Brunk, B. D. (2002). Understanding the Privacy Space. First Monday 7(10).

Chakrabarti, D., and Punera, K. (2011). Event summarization using tweets. In Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media (pp. 66-73).

Chapman, E. (2003). Alternative approaches to assessing student engagement rates. Practical Assessment, Research & Evaluation 8(13).

Coles-Kemp, L. and D. M. A. Ashenden (2012). Community-centric engagement: lessons learned from privacy awareness intervention design. Proceedings of HCI 2012. The 26th BCS Conference on Human Computer Interaction. [OpenAIRE]

de Paula, R., Ding, X., Dourish, P., Nies, K., Pillet, B., Redmiles, D.F., Ren, J., Rode, J.A., and Silva Filho, R. In the eye of the beholder: a visualization-based approach to information system security. Int. J. Hum.- Comput. Stud. 63, 1-2 (2005), 5-24.

Deci, E.L. 1992. The relation of interest to the motivation of behavior: A self-determination perspective. In Renniger, K.A. Hidi, S. Krapp, A. (eds) The role of interest in learning and development.

Diakopoulos, N., De Choudhury, M., and Naaman, M. 2012. Finding and assessing social media information sources in the context of journalism. In Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems (CHI '12). ACM, New York, NY, USA, 2451-2460. [OpenAIRE]

Diamond, L. Liberation Technology. Journal of Democracy 21, 3 (2010), 69-83.

Dickey, M. (2005). Engaging By Design: How Engagement Strategies in Popular Computer and Video Games Can Inform Instructional Design. ETR&D 53(2): 67-83.

Dourish, P. and Anderson, D. Collective Information Practice: Exploring Security and Privacy as Social and Cultural Phenomena. Human Computer Interaction 21, 3 (2006), 319-342.

Dourish, P., Grinter, R. E., de la Flor, J.D. and Joseph, M. (2004). Security in the wild: user strategies for managing security as an everyday, practical problem. Personal Ubiquitous Computing 8: 391-401. [OpenAIRE]

44 references, page 1 of 3
Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue
publication . Article . 2014

Understanding engagement with the privacy domain through design research

Vasalou, A.; Oostveen, A.; Bowers, Christopher; Beale, R.;