You searched for subject:(privacy decision making)
.
Showing records 1 – 13 of
13 total matches.
No search limiters apply to these results.
1.
Almuhimedi, Hazim.
Helping Smartphone Users Manage their Privacy through Nudges.
Degree: 2017, Carnegie Mellon University
URL: http://repository.cmu.edu/dissertations/1103
► The two major smartphone platforms (Android and iOS) have more than two mil- lion mobile applications (apps) available from their respective app stores, and each…
(more)
▼ The two major smartphone platforms (Android and iOS) have more than two mil- lion mobile applications (apps) available from their respective app stores, and each store has seen more than 50 billion apps downloaded. Although apps provide desired functionality by accessing users’ personal information, they also access personal information for other purposes (e.g., advertising or profiling) that users may or may not desire. Users can exercise control over how apps access their personal information through permission managers. However, a permission manager alone might not be sufficient to help users manage their app privacy because: (1) privacy is typically a secondary task and thus users might not be motivated enough to take advantage of the permission manager’s functionality, and (2) even when using the permission manager, users often make suboptimal privacy decisions due to hurdles in decision making such as incomplete information, bounded rationality, and cognitive and behavioral biases. To address these two challenges, the theoretical framework of this dissertation is the concept of nudges: “soft paternalistic” behavioral interventions that do not restrict choice but account for decision making hurdles. Specifically, I designed app privacy nudges that primarily address the incomplete information hurdle. The nudges aim to help users make better privacy decisions by (1) increasing users’ awareness of privacy risks associated with apps, and (2) temporarily making privacy the primary task to motivate users to review and adjust their app settings. I evaluated app privacy nudges in three user studies. All three studies showed that app privacy nudges are indeed a promising approach to help users manage their privacy. App privacy nudges increased users’ awareness of privacy risks associated with apps on their phones, switched users’ attention to privacy management, and motivated users to review their app privacy settings. Additionally, the second study suggested that not all app privacy nudge contents equally help users manage their privacy. Rather, more effective nudge contents informed users of: (1) contexts in which their personal information has been accessed, (2) purposes for apps’ accessing their personal information, and (3) potential implications of secondary usage of users’ personal information. The third study showed that user engagement with nudges decreases as users receive repeated nudges. Nonetheless, the results of the third experiment also showed that users are more likely to engage with repeated nudges (1) if users have engaged with previous nudges, (2) if repeated nudges contain new in- formation (e.g., additional apps, not shown in earlier nudges, that accessed sensitive resources), or (3) if the nudge contents of repeated nudges resonate with users. The results of this dissertation suggest that mobile operating system providers should enrich their systems with app privacy nudges to assist users in managing their privacy. Additionally, the lessons learned in this dissertation may inform designing privacy…
Subjects/Keywords: Privacy; Mobile; Permission; App; Nudge; Privacy Decision Making
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Almuhimedi, H. (2017). Helping Smartphone Users Manage their Privacy through Nudges. (Thesis). Carnegie Mellon University. Retrieved from http://repository.cmu.edu/dissertations/1103
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Almuhimedi, Hazim. “Helping Smartphone Users Manage their Privacy through Nudges.” 2017. Thesis, Carnegie Mellon University. Accessed January 19, 2021.
http://repository.cmu.edu/dissertations/1103.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Almuhimedi, Hazim. “Helping Smartphone Users Manage their Privacy through Nudges.” 2017. Web. 19 Jan 2021.
Vancouver:
Almuhimedi H. Helping Smartphone Users Manage their Privacy through Nudges. [Internet] [Thesis]. Carnegie Mellon University; 2017. [cited 2021 Jan 19].
Available from: http://repository.cmu.edu/dissertations/1103.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Almuhimedi H. Helping Smartphone Users Manage their Privacy through Nudges. [Thesis]. Carnegie Mellon University; 2017. Available from: http://repository.cmu.edu/dissertations/1103
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
2.
Iucolano, Donna M.
HYPERCONNECTIVITY GIVETH AND TAKETH AWAY: RECONCILING BEING
AN “ALWAYS-ON” EMPOWERED CONSUMER AND PRIVACY IN AN ERA OF
PERVASIVE PERSONAL DATA EXCHANGES.
Degree: PhD, Management, 2019, Case Western Reserve University School of Graduate Studies
URL: http://rave.ohiolink.edu/etdc/view?acc_num=case1554468526463455
► We are living in an era of rising connectivity where consumers of all ages and socioeconomic backgrounds are “always-on.” Consumers can now engage constantly with…
(more)
▼ We are living in an era of rising connectivity where
consumers of all ages and socioeconomic backgrounds are
“always-on.” Consumers can now engage constantly with brands,
retailers, content, and each other through real-time interactions,
facilitated by a mobile-first mindset. This has earned consumers
the moniker, “highly empowered.” Consumers are indeed empowered by
the growth of the internet/mobile, proliferation of devices, and
unprecedented access to information, choice, and control. However,
rising connectivity also has downsides. Consumers now face a
barrage of decisions about whether to share their personal
information with firms or accept its collection without their
explicit consent. The outcomes of these automatic, one-time
decisions are far-reaching and long-lasting. They also empower
firms—perhaps more than consumers; something most marketers prefer
to keep secret. This research study addresses how “always-on”
supposedly empowered consumers behave while shopping and make
decisions in an era of pervasive personal information exchanges
with retailers and others. It uses an exploratory, sequential mixed
methods design beginning with a qualitative study followed by two
quantitative studies. Study 1 investigates how 40 connected
consumers behave and make decisions in shopping/retail
environments. Findings reveal pros and cons of rising connectivity,
dynamic behavior that challenges traditional customer segmentation,
and tensions over
privacy and personal data exchanges with
retailers. These tensions are explored in Study 2 using survey data
collected from 790 U.S. consumers, all heavy internet/mobile users.
Consumer acceptance of personal data collection is interpreted as a
form of coping with the stress of digital life. Study 3 extends
Study 2 by focusing on three moderating effects on consumer
willingness to share personal data or have it collected: perceived
marketing intrusiveness, high versus low
privacy knowledge, and
high versus low
privacy-protecting behaviors. Many findings are
counterintuitive with few statistically significant differences in
consumer attitudes—all affected by their perceptions of fairness in
exchanges with firms. This work contributes to the emerging streams
of research about consumer
privacy, personal data exchanges,
perceptions of fairness, and consumer acceptance in an era of
presumed high consumer empowerment. It also has implications for
marketers and marketing strategies, consumer advocates, and public
policy.
Advisors/Committee Members: Niraj, Rakesh (Committee Chair).
Subjects/Keywords: Management; Marketing; Technology; Information Science; always-on consumer; consumer connectivity; privacy; personal data exchanges; consumer empowerment; disempowerment; fairness of exchanges; consumer acceptance; consumer decision making; shopping; digital commerce; mixed methods; cluster analysis
…consumer decision making; shopping; digital commerce; mixed
methods; cluster analysis
xvii… …behavior and decision making due to technology; how
increased hyperconnectivity is empowering… …Third,
consumer decision making and personal data exchanges between consumers and retailers… …Privacy Knowledge… …127
Privacy Protecting Behavior…
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Iucolano, D. M. (2019). HYPERCONNECTIVITY GIVETH AND TAKETH AWAY: RECONCILING BEING
AN “ALWAYS-ON” EMPOWERED CONSUMER AND PRIVACY IN AN ERA OF
PERVASIVE PERSONAL DATA EXCHANGES. (Doctoral Dissertation). Case Western Reserve University School of Graduate Studies. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=case1554468526463455
Chicago Manual of Style (16th Edition):
Iucolano, Donna M. “HYPERCONNECTIVITY GIVETH AND TAKETH AWAY: RECONCILING BEING
AN “ALWAYS-ON” EMPOWERED CONSUMER AND PRIVACY IN AN ERA OF
PERVASIVE PERSONAL DATA EXCHANGES.” 2019. Doctoral Dissertation, Case Western Reserve University School of Graduate Studies. Accessed January 19, 2021.
http://rave.ohiolink.edu/etdc/view?acc_num=case1554468526463455.
MLA Handbook (7th Edition):
Iucolano, Donna M. “HYPERCONNECTIVITY GIVETH AND TAKETH AWAY: RECONCILING BEING
AN “ALWAYS-ON” EMPOWERED CONSUMER AND PRIVACY IN AN ERA OF
PERVASIVE PERSONAL DATA EXCHANGES.” 2019. Web. 19 Jan 2021.
Vancouver:
Iucolano DM. HYPERCONNECTIVITY GIVETH AND TAKETH AWAY: RECONCILING BEING
AN “ALWAYS-ON” EMPOWERED CONSUMER AND PRIVACY IN AN ERA OF
PERVASIVE PERSONAL DATA EXCHANGES. [Internet] [Doctoral dissertation]. Case Western Reserve University School of Graduate Studies; 2019. [cited 2021 Jan 19].
Available from: http://rave.ohiolink.edu/etdc/view?acc_num=case1554468526463455.
Council of Science Editors:
Iucolano DM. HYPERCONNECTIVITY GIVETH AND TAKETH AWAY: RECONCILING BEING
AN “ALWAYS-ON” EMPOWERED CONSUMER AND PRIVACY IN AN ERA OF
PERVASIVE PERSONAL DATA EXCHANGES. [Doctoral Dissertation]. Case Western Reserve University School of Graduate Studies; 2019. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=case1554468526463455

Colorado State University
3.
Dewri, Rinku.
Multi-criteria analysis in modern information management.
Degree: PhD, Computer Science, 2010, Colorado State University
URL: http://hdl.handle.net/10217/40284
► The past few years have witnessed an overwhelming amount of research in the field of information security and privacy. An encouraging outcome of this research…
(more)
▼ The past few years have witnessed an overwhelming amount of research in the field of information security and
privacy. An encouraging outcome of this research is the vast accumulation of theoretical models that help to capture the various threats that persistently hinder the best possible usage of today's powerful communication infrastructure. While theoretical models are essential to understanding the impact of any breakdown in the infrastructure, they are of limited application if the underlying business centric view is ignored. Information management in this context is the strategic management of the infrastructure, incorporating the knowledge about causes and consequences to arrive at the right balance between risk and profit. Modern information management systems are home to a vast repository of sensitive personal information. While these systems depend on quality data to boost the Quality of Service (QoS), they also run the risk of violating
privacy regulations. The presence of network vulnerabilities also weaken these systems since security policies cannot always be enforced to prevent all forms of exploitation. This problem is more strongly grounded in the insufficient availability of resources, rather than the inability to predict zero-day attacks. System resources also impact the availability of access to information, which in itself is becoming more and more ubiquitous day by day. Information access times in such ubiquitous environments must be maintained within a specified QoS level. In short, modern information management must consider the mutual interactions between risks, resources and services to achieve wide scale acceptance. This dissertation explores these problems in the context of three important domains, namely disclosure control, security risk management and wireless data broadcasting. Research in these domains has been put together under the umbrella of multi-criteria
decision making to signify that "business survival" is an equally important factor to consider while analyzing risks and providing solutions for their resolution. We emphasize that businesses are always bound by constraints in their effort to mitigate risks and therefore benefit the most from a framework that allows the exploration of solutions that abide by the constraints. Towards this end, we revisit the optimization problems being solved in these domains and argue that they oversee the underlying cost-benefit relationship. Our approach in this work is motivated by the inherent multi-objective nature of the problems. We propose formulations that help expose the cost-benefit relationship across the different objectives that must be met in these problems. Such an analysis provides a
decision maker with the necessary information to make an informed
decision on the impact of choosing a control measure over the business goals of an organization. The theories and tools necessary to perform this analysis are introduced to the community.
Advisors/Committee Members: Whitley, L. Darrell (advisor), Ray, Indrajit, 1966- (advisor), Ray, Indrakshi (committee member), Siegel, Howard Jay (committee member).
Subjects/Keywords: Information management; data broadcasting; multi-objective optimization; information security and privacy; Computer networks – Security measures; Computer security; Multiple criteria decision making
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Dewri, R. (2010). Multi-criteria analysis in modern information management. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/40284
Chicago Manual of Style (16th Edition):
Dewri, Rinku. “Multi-criteria analysis in modern information management.” 2010. Doctoral Dissertation, Colorado State University. Accessed January 19, 2021.
http://hdl.handle.net/10217/40284.
MLA Handbook (7th Edition):
Dewri, Rinku. “Multi-criteria analysis in modern information management.” 2010. Web. 19 Jan 2021.
Vancouver:
Dewri R. Multi-criteria analysis in modern information management. [Internet] [Doctoral dissertation]. Colorado State University; 2010. [cited 2021 Jan 19].
Available from: http://hdl.handle.net/10217/40284.
Council of Science Editors:
Dewri R. Multi-criteria analysis in modern information management. [Doctoral Dissertation]. Colorado State University; 2010. Available from: http://hdl.handle.net/10217/40284

Indiana University
4.
Hasan, Rakibul.
A SOCIO-TECHNICAL APPROACH TO PROTECTING PEOPLE'S PRIVACY IN THE CONTEXT OF SHARING IMAGES ON SOCIAL MEDIA
.
Degree: 2020, Indiana University
URL: http://hdl.handle.net/2022/26035
► Billions of photos are being shared on social media platforms every day. A large portion of these photos are taken in public places, and may…
(more)
▼ Billions of photos are being shared on social media platforms every day. A large portion of these
photos are taken in public places, and may contain people who were inadvertently captured (i.e.,
bystanders) and are not important for the
subject matter of the photos. When these photos are
shared online, they reveal the bystanders' identity, location, and other
privacy-sensitive information
to a potentially unbounded number of internet users. Social media users not only share photos they
own but also re-share photos from their peers and those they find on the internet; for example, the
sharing of image macros or memes on social media has risen in popularity. Internet users create
memes using photos of other people who are often unknown to them. Such photos usually portray
people in embarrassing situations, which are highlighted and ampli fied with additional text or captions.
These photos can go `viral' and cause severe personal, social, and professional consequences
to the photo subjects. While the research community has made signi cant efforts to reduce photosharers'
privacy risks on social media, protecting the
privacy of people who do not actively take
part in photo-taking or sharing activities, e.g., bystanders and meme subjects, has not received
adequate attention. This dissertation proposes machine learning and computer vision-based techniques
to reduce bystanders'
privacy risks. More specfi cally, we offer an automated and scalable
system to detect bystanders in images so that their
privacy can be protected by, e.g., removing or
obfuscating them using image transforms. In an online study, we evaluated the effectiveness and
usability of commonly used image transforms. We constructed and empirically validated models of
interactions among image filters and utility variables. Based on these models, we proposed a principled
approach to design novel obfuscations to balance the
privacy-utility trade-o s. To protect
the
privacy of meme subjects, we explored the potential of behavioral interventions to discourage
meme sharing. Through controlled experiments, we identfi ed demographic factors and personality
traits that affect behaviors regarding photo sharing that may threaten other people's
privacy. We
also discovered links between people's personality traits and their reactions to
privacy nudges that were designed to discourage them from sharing memes. These results can be used to develop direct
and personalized interventions to stimulate
privacy-respecting and prosocial behaviors among social
media users.
Advisors/Committee Members: Kapadia, Apu (advisor).
Subjects/Keywords: privacy;
social media;
human decision making;
computer vision
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Hasan, R. (2020). A SOCIO-TECHNICAL APPROACH TO PROTECTING PEOPLE'S PRIVACY IN THE CONTEXT OF SHARING IMAGES ON SOCIAL MEDIA
. (Thesis). Indiana University. Retrieved from http://hdl.handle.net/2022/26035
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Hasan, Rakibul. “A SOCIO-TECHNICAL APPROACH TO PROTECTING PEOPLE'S PRIVACY IN THE CONTEXT OF SHARING IMAGES ON SOCIAL MEDIA
.” 2020. Thesis, Indiana University. Accessed January 19, 2021.
http://hdl.handle.net/2022/26035.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Hasan, Rakibul. “A SOCIO-TECHNICAL APPROACH TO PROTECTING PEOPLE'S PRIVACY IN THE CONTEXT OF SHARING IMAGES ON SOCIAL MEDIA
.” 2020. Web. 19 Jan 2021.
Vancouver:
Hasan R. A SOCIO-TECHNICAL APPROACH TO PROTECTING PEOPLE'S PRIVACY IN THE CONTEXT OF SHARING IMAGES ON SOCIAL MEDIA
. [Internet] [Thesis]. Indiana University; 2020. [cited 2021 Jan 19].
Available from: http://hdl.handle.net/2022/26035.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Hasan R. A SOCIO-TECHNICAL APPROACH TO PROTECTING PEOPLE'S PRIVACY IN THE CONTEXT OF SHARING IMAGES ON SOCIAL MEDIA
. [Thesis]. Indiana University; 2020. Available from: http://hdl.handle.net/2022/26035
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
5.
Dahl, Teodor.
A consumer perspective of personalized marketing : An exploratory study on consumer perception of personalized marketing and how it affects the purchase decision making.
Degree: Faculty of Business, 2019, Kristianstad University
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-19592
► The traditional type of marketing is more directed towards big customer segments in specified areas. Due to technological improvement marketing has evolved into an…
(more)
▼ The traditional type of marketing is more directed towards big customer segments in specified areas. Due to technological improvement marketing has evolved into an extreme form of segmentation where marketing target the individual consumer based on their personal needs and preferences. This has led to a discussion of whether personalized marketing is something that create privacy concerns or benefits in the eyes of the consumer. The purpose of this thesis is to explore the consumer perception of personalized marketing and how the perception affects the purchase decision-making process. A conceptual framework was developed based on earlier research within personalized marketing. A qualitative method with an abductive approach has been used. Our primary data was collected through 8 different semi-structured interviews and consisted of men and women in the age span of 40-59 years’ old who had engaged in e-commerce at least once during the last six months. Our empirical data has been analyzed out of the literature review, which founds the basis for our findings. Our findings show that the consumer perception of personalized marketing affect the consumer decision-making process in varying ways. A positive perception of the personalized marketing makes the consumer more susceptible to it, which further impacts the different stages in the process.
Subjects/Keywords: Personalized marketing; Consumer perception; Past experiences; Privacy concerns; Consumer decision-making process; Business Administration; Företagsekonomi
…Consumer behavior online, Consumer
decision-making process, Consumer perception, Privacy concerns… …through a decision-making process which is described as the process from becoming aware
of a… …the personalized
marketing, and this in turn may affect the decision-making and whether the… …it has the ability to build increased trust.
During the decision making process each of… …having an impact on the
decision making process (Sipior, Ward, & Mendoza, 2011)…
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Dahl, T. (2019). A consumer perspective of personalized marketing : An exploratory study on consumer perception of personalized marketing and how it affects the purchase decision making. (Thesis). Kristianstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-19592
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Dahl, Teodor. “A consumer perspective of personalized marketing : An exploratory study on consumer perception of personalized marketing and how it affects the purchase decision making.” 2019. Thesis, Kristianstad University. Accessed January 19, 2021.
http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-19592.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Dahl, Teodor. “A consumer perspective of personalized marketing : An exploratory study on consumer perception of personalized marketing and how it affects the purchase decision making.” 2019. Web. 19 Jan 2021.
Vancouver:
Dahl T. A consumer perspective of personalized marketing : An exploratory study on consumer perception of personalized marketing and how it affects the purchase decision making. [Internet] [Thesis]. Kristianstad University; 2019. [cited 2021 Jan 19].
Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-19592.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Dahl T. A consumer perspective of personalized marketing : An exploratory study on consumer perception of personalized marketing and how it affects the purchase decision making. [Thesis]. Kristianstad University; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-19592
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

NSYSU
6.
Li, Ming-Han.
A Study of Internet Privacy Invasion in PTT.
Degree: Master, Information Management, 2010, NSYSU
URL: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0203110-120705
► Although technology is well developed, personal data is well spread in internet ,too. We can see a lot of privacy invasion in PTT. People can…
(more)
▼ Although technology is well developed, personal data is well spread in internet ,too. We can see a lot of
privacy invasion in PTT. People can find a lot of data about someone from his name or movie. People are afraid of being caught in internet. But why some people support this kind of
privacy invasion but some donât. What is the main factor?
This study uses description and different kind of event to observe if description can affect peopleâs
decision toward
privacy invasion. We separate description into violate and non-violate, and we use two stage survey to observe when people face different kind of description, is there any different between violate and non-violate description toward
privacy decision making.
In the end, we find how sex, description, and event affect
privacy decision making, and we bring up a suggestion of
privacy situational desion and the main factor toward
privacy decision making.
Advisors/Committee Members: Feng-Yang Kuo (committee member), Cathy Lin (chair), Fen-Hui Lin (chair).
Subjects/Keywords: PTT; word description; privacy decision making
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Li, M. (2010). A Study of Internet Privacy Invasion in PTT. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0203110-120705
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Li, Ming-Han. “A Study of Internet Privacy Invasion in PTT.” 2010. Thesis, NSYSU. Accessed January 19, 2021.
http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0203110-120705.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Li, Ming-Han. “A Study of Internet Privacy Invasion in PTT.” 2010. Web. 19 Jan 2021.
Vancouver:
Li M. A Study of Internet Privacy Invasion in PTT. [Internet] [Thesis]. NSYSU; 2010. [cited 2021 Jan 19].
Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0203110-120705.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Li M. A Study of Internet Privacy Invasion in PTT. [Thesis]. NSYSU; 2010. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0203110-120705
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Ohio University
7.
Hopkins, Ashley R.
Privacy Within Photo-Sharing and Gaming Applications:
Motivation and Opportunity and the Decision to Download.
Degree: PhD, Journalism (Communication), 2019, Ohio University
URL: http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1556821782704244
► This study worked to determine the amount of attention users of mobile application devices dedicate to opt-in privacy policies. As the average user is often…
(more)
▼ This study worked to determine the amount of attention
users of mobile application devices dedicate to opt-in
privacy
policies. As the average user is often faced with a variety of
motivations and distractions when determining whether to download
an application, this study created an experimental setting in which
certain participants were told that they would have to justify
their
decision to download with a sample of their peers upon
reviewing typical opt-in
privacy policies, while others faced a
time restraint when
making a
decision to download.Based on the
academic literature, this study hypothesized that 1) When faced
with a time restraint, participants would be less likely to
download an application than those who did not face a time
restraint; 2) Participants who were asked to justify the basis of
their
decision would be less likely to download an application than
those who were not asked to justify their
decision; 3) Participants
who faced a time restraint and who were not asked to consider the
basis of their decisions prior to download would be more likely to
download an application than those in other experimental
conditions; 4) Participants who did not face a time restraint and
who were asked to consider the basis of their
decision prior to
download would be less likely to download an application than those
in other experimental conditions; and 5) Participants who scored
higher on a self-efficacy scale would be more likely to download
applications than those who scored lower. It also questioned how
the various factors outlined in this study (motivation,
opportunity, and self-efficacy) worked together to affect the
decision-
making process.The results of this study help to show that
while motivation and opportunity has often been shown to play a
role in
decision-
making processes, age, experience, and self-
efficacy may play a larger part in the access mobile application
users are willing to provide to third-party developers than was
previously considered. While individuals boast the importance of
protecting their
privacy online, the more one interacts with the
technology the less risk they come to expect when deciding whether
or not to accept permissions and download a mobile
application.
Advisors/Committee Members: Meyer, Hans (Advisor).
Subjects/Keywords: Journalism; mobile applications; apps; smartphone; social media; privacy; data; datamining; data mine; Android; Apple; privacy permissions; terms and conditions; motivation; opportunity; decision-making; gaming; photo-sharing; Facebook; MODE model
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Hopkins, A. R. (2019). Privacy Within Photo-Sharing and Gaming Applications:
Motivation and Opportunity and the Decision to Download. (Doctoral Dissertation). Ohio University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1556821782704244
Chicago Manual of Style (16th Edition):
Hopkins, Ashley R. “Privacy Within Photo-Sharing and Gaming Applications:
Motivation and Opportunity and the Decision to Download.” 2019. Doctoral Dissertation, Ohio University. Accessed January 19, 2021.
http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1556821782704244.
MLA Handbook (7th Edition):
Hopkins, Ashley R. “Privacy Within Photo-Sharing and Gaming Applications:
Motivation and Opportunity and the Decision to Download.” 2019. Web. 19 Jan 2021.
Vancouver:
Hopkins AR. Privacy Within Photo-Sharing and Gaming Applications:
Motivation and Opportunity and the Decision to Download. [Internet] [Doctoral dissertation]. Ohio University; 2019. [cited 2021 Jan 19].
Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1556821782704244.
Council of Science Editors:
Hopkins AR. Privacy Within Photo-Sharing and Gaming Applications:
Motivation and Opportunity and the Decision to Download. [Doctoral Dissertation]. Ohio University; 2019. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1556821782704244
8.
Martínez-Doallo, Noelia.
El consentimiento informado del paciente como derecho fundamental y como derecho subjetivo
.
Degree: 2019, Universidad da Coruña
URL: http://hdl.handle.net/2183/26425
► [Resumo] O consentimento informado do paciente insírese no ámbito da súa autonomía decisoria. Aínda que presenta un substrato corporal, este aparece combinado con elementos de…
(more)
▼ [Resumo]
O consentimento informado do paciente insírese no ámbito da súa autonomía decisoria. Aínda que presenta un substrato corporal, este aparece combinado con elementos de índole moral que presupoñen unha noción concreta de persoa como libre e autónoma. Tanto das definicións doutrinais como do material normativo despréndese que se trata dunha posición xurídica subxectiva do paciente, alternativamente cualificada como unha “pretensión” ou “dereito subxectivo en sentido estrito”, en termos hohfeldianos; un “dereito negativo de defensa”, ou unha “inmunidade”.
En España, o Tribunal Constitucional ten vinculado o consentimento informado do paciente ao dereito fundamental á integridade física e moral (15 CE), o cal permite expor a análise en clave iusfundamental. Con todo, advírtense dúbidas e incompatibilidades entre a explicación habitual do consentimento informado, o seu fundamento constitucional e a súa regulación xurídica.
O obxectivo da presente tese de doutoramento consiste en proporcionar unha definición integral do consentimento informado como dereito subxectivo do paciente e como manifestación dun dereito fundamental, a partir dunha óptica poliédrica que achega certeza na práctica asistencial e xurídica.
Advisors/Committee Members: Seoane, José-Antonio (advisor).
Subjects/Keywords: Consentimiento informado (Derecho médico);
Personal médico-Responsabilidad profesional-España;
Pacientes-Derecho-España;
Decision-making autonomy;
Fundamental right;
Health-care relationship;
Informed consent;
Physical and moral integrity (privacy);
Right to make free choices;
Right to medical information;
Subjective right;
Medical responsibility;
Autonomía decisoria;
Derecho a la información;
Derecho de libre decisión o elección;
Derecho fundamental;
Derecho subjetivo;
Integridad física y moral;
Relación asistencial;
Responsabilidad médica;
Dereito á información;
Dereito de libre decisión ou elección;
Dereito fundamental;
Dereito subxectivo;
Integridade física e moral;
Responsabilidade médica
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Martínez-Doallo, N. (2019). El consentimiento informado del paciente como derecho fundamental y como derecho subjetivo
. (Doctoral Dissertation). Universidad da Coruña. Retrieved from http://hdl.handle.net/2183/26425
Chicago Manual of Style (16th Edition):
Martínez-Doallo, Noelia. “El consentimiento informado del paciente como derecho fundamental y como derecho subjetivo
.” 2019. Doctoral Dissertation, Universidad da Coruña. Accessed January 19, 2021.
http://hdl.handle.net/2183/26425.
MLA Handbook (7th Edition):
Martínez-Doallo, Noelia. “El consentimiento informado del paciente como derecho fundamental y como derecho subjetivo
.” 2019. Web. 19 Jan 2021.
Vancouver:
Martínez-Doallo N. El consentimiento informado del paciente como derecho fundamental y como derecho subjetivo
. [Internet] [Doctoral dissertation]. Universidad da Coruña; 2019. [cited 2021 Jan 19].
Available from: http://hdl.handle.net/2183/26425.
Council of Science Editors:
Martínez-Doallo N. El consentimiento informado del paciente como derecho fundamental y como derecho subjetivo
. [Doctoral Dissertation]. Universidad da Coruña; 2019. Available from: http://hdl.handle.net/2183/26425

Universitat Politècnica de València
9.
Such Aparicio, José Miguel.
ENHANCING PRIVACY IN MULTI-AGENT SYSTEMS
.
Degree: 2011, Universitat Politècnica de València
URL: http://hdl.handle.net/10251/13023
► La pérdida de privacidad se está convirtiendo en uno de los mayores problemas en el mundo de la informática. De hecho, la mayoría de los…
(more)
▼ La pérdida de privacidad se está convirtiendo en uno de los mayores problemas
en el mundo de la informática. De hecho, la mayoría de los usuarios
de Internet (que hoy en día alcanzan la cantidad de 2 billones de usuarios
en todo el mundo) están preocupados por su privacidad. Estas preocupaciones
también se trasladan a las nuevas ramas de la informática que están
emergiendo en los ultimos años. En concreto, en esta tesis nos centramos en
la privacidad en los Sistemas Multiagente. En estos sistemas, varios agentes
(que pueden ser inteligentes y/o autónomos) interactúan para resolver problemas.
Estos agentes suelen encapsular información personal de los usuarios
a los que representan (nombres, preferencias, tarjetas de crédito, roles, etc.).
Además, estos agentes suelen intercambiar dicha información cuando interactúan entre ellos. Todo esto puede resultar en pérdida de privacidad para
los usuarios, y por tanto, provocar que los usuarios se muestren adversos a
utilizar estas tecnologías.
En esta tesis nos centramos en evitar la colección y el procesado de información personal en Sistemas Multiagente. Para evitar la colección de información, proponemos un modelo para que un agente sea capaz de decidir
qué atributos (de la información personal que tiene sobre el usuario al que
representa) revelar a otros agentes. Además, proporcionamos una infraestructura
de agentes segura, para que una vez que un agente decide revelar
un atributo a otro, sólo este último sea capaz de tener acceso a ese atributo,
evitando que terceras partes puedan acceder a dicho atributo. Para evitar el
procesado de información personal proponemos un modelo de gestión de las
identidades de los agentes. Este modelo permite a los agentes la utilización
de diferentes identidades para reducir el riesgo del procesado de información. Además, también describimos en esta tesis la implementación de dicho
modelo en una plataforma de agentes.
Advisors/Committee Members: García Fornes, Ana María (advisor), Espinosa Minguet, Agustín Rafael (advisor).
Subjects/Keywords: Privacy;
Multi-agent systems;
Disclosure decision making;
Agent platforms;
Identity;
Trust;
Reputation;
Intimacy
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Such Aparicio, J. M. (2011). ENHANCING PRIVACY IN MULTI-AGENT SYSTEMS
. (Doctoral Dissertation). Universitat Politècnica de València. Retrieved from http://hdl.handle.net/10251/13023
Chicago Manual of Style (16th Edition):
Such Aparicio, José Miguel. “ENHANCING PRIVACY IN MULTI-AGENT SYSTEMS
.” 2011. Doctoral Dissertation, Universitat Politècnica de València. Accessed January 19, 2021.
http://hdl.handle.net/10251/13023.
MLA Handbook (7th Edition):
Such Aparicio, José Miguel. “ENHANCING PRIVACY IN MULTI-AGENT SYSTEMS
.” 2011. Web. 19 Jan 2021.
Vancouver:
Such Aparicio JM. ENHANCING PRIVACY IN MULTI-AGENT SYSTEMS
. [Internet] [Doctoral dissertation]. Universitat Politècnica de València; 2011. [cited 2021 Jan 19].
Available from: http://hdl.handle.net/10251/13023.
Council of Science Editors:
Such Aparicio JM. ENHANCING PRIVACY IN MULTI-AGENT SYSTEMS
. [Doctoral Dissertation]. Universitat Politècnica de València; 2011. Available from: http://hdl.handle.net/10251/13023

University of California – Irvine
10.
Knijnenburg, Bart Piet.
A User-Tailored Approach to Privacy Decision Support.
Degree: Information and Computer Science, 2015, University of California – Irvine
URL: http://www.escholarship.org/uc/item/9282g37p
► As an increasingly important part of our social, professional and financial lives happens online, the frequency with which we have to deal with privacy problems…
(more)
▼ As an increasingly important part of our social, professional and financial lives happens online, the frequency with which we have to deal with privacy problems is ever on the rise. In this dissertation I answer the question: How can we help users to balance the benefits and risks of information disclosure in a user-friendly manner, so that they can make good privacy decisions? After briefly motivating this question in Chapter 1, I first discuss problems with existing answers to this question in Chapters 2 and 3. In Chapter 2, I explain how providing transparency and control does sufficiently not help users in making better privacy decisions. Specifically, I demonstrate that people’s privacy decisions fall prey to all sorts of decision biases, and that most privacy decisions are too complex for people to fathom. In effect, many people refrain from exploiting the provided transparency and control altogether.In Chapter 3, I explain how “privacy nudging” is also not sufficient in its presently studied form. Specifically, I demonstrate that although nudges relieve some of the burden of privacy decision making, they tend to overlook the inherent diversity of users’ privacy preferences and the context-dependency of their decisions.The main argument of this dissertation is that because of these shortcomings of transparency-and-control and privacy nudges, privacy scholars need to move beyond the “one-size-fits-all” approach to privacy embodied in both nudges and transparency and control. I argue that because of the high variability and context-dependency of people’s privacy decisions, nudges need to be tailored to the user and her context.In several studies, I contextualize users’ privacy decisions by showing how disclosure depended on the person’s privacy profile, the type of information, and the recipient of the information (Chapter 4). Then, I present the idea of a “privacy adaptation procedure” and demonstrate its merit in Chapter 5. Finally, I test a complete implementation of the privacy adaptation procedure in Chapter 6. The results of this final study cause reserved optimism regarding the feasibility of user-tailored privacy decision support.
Subjects/Keywords: Computer science; Behavioral psychology; Information science; Adaptive systems; Decision making; Human-computer interaction; Privacy; Recommender systems; User experiments
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Knijnenburg, B. P. (2015). A User-Tailored Approach to Privacy Decision Support. (Thesis). University of California – Irvine. Retrieved from http://www.escholarship.org/uc/item/9282g37p
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Knijnenburg, Bart Piet. “A User-Tailored Approach to Privacy Decision Support.” 2015. Thesis, University of California – Irvine. Accessed January 19, 2021.
http://www.escholarship.org/uc/item/9282g37p.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Knijnenburg, Bart Piet. “A User-Tailored Approach to Privacy Decision Support.” 2015. Web. 19 Jan 2021.
Vancouver:
Knijnenburg BP. A User-Tailored Approach to Privacy Decision Support. [Internet] [Thesis]. University of California – Irvine; 2015. [cited 2021 Jan 19].
Available from: http://www.escholarship.org/uc/item/9282g37p.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Knijnenburg BP. A User-Tailored Approach to Privacy Decision Support. [Thesis]. University of California – Irvine; 2015. Available from: http://www.escholarship.org/uc/item/9282g37p
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
11.
Lustgarten, Samuel David.
Ethical considerations for the information age: a qualitative study of doctoral psychology trainees' preparation and decision making for technology use.
Degree: PhD, Psychological and Quantitative Foundations, 2018, University of Iowa
URL: https://ir.uiowa.edu/etd/6462
► Psychologists now use and interact with a mélange of technology for client care, including (but not limited to) email (Delsignore et al., 2016; Eysenbach,…
(more)
▼ Psychologists now use and interact with a mélange of technology for client care, including (but not limited to) email (Delsignore et al., 2016; Eysenbach, 2000), text messaging (Bradley & Hendricks, 2009; Elhai & Frueh, 2016), electronic medical records (Harrison & Palacio, 2006; Steinfeld & Keyes, 2011), telemental health/televideo (Richardson, Frueh, Grubaugh, Egede, & Elhai, 2012), and digital assessments (Jellins, 2015; Pearson Education Inc., 2015b). Amidst this technological revolution, threats to ethical obligations and regulations exist that might hinder effective client care (Elhai & Hall, 2016b; Lustgarten, 2015; Lustgarten & Colbow, 2017). Literature suggests that individuals, organizations, companies, and government actors have targeted individuals and nations for their data (Elhai & Hall, 2016b; Greenwald, 2014; Lustgarten, 2015). Despite concerns for protecting client information, little is known about the education and training opportunities present in APA-accredited clinical and/or counseling psychology doctoral programs around technology competence. Researchers have recommended trainees receive technology training for use within psychotherapy (Colbow, 2013; Lustgarten & Colbow, 2017; Mallen, Vogel, & Rochlen, 2005). This study interviewed 9 doctoral trainees about their experiences,
decision making, thought processes, responsibilities for stakeholders, and additional needs from training programs, organizations, and practicum sites when using technology. Results suggested that participants had limited opportunities for education, but interacted with and were expected to use various forms of technology (e.g., email, text messaging, and electronic medical records). Additionally, participants tended to request increased organizational involvement on this topic in the form of formal conversations, workshops, and continuing education. More research is recommended to highlight disparities between expectations and education within doctoral training programs.
Advisors/Committee Members: Westefeld, John S. (supervisor).
Subjects/Keywords: Decision Making; Doctoral Trainees; Ethics; Privacy and Confidentiality; Technology; Training and Education; Educational Psychology
…their experiences, decision making, thought processes, responsibilities for stakeholders,
and… …74
Decision Making around Technology Use… …Additionally, they have improved
clinical decision making (Harrison & Palacio, 2006). By… …privacy and confidentiality, practitioner competence, and a lack of training exist
(Colbow… …11
Privacy and Confidentiality…
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Lustgarten, S. D. (2018). Ethical considerations for the information age: a qualitative study of doctoral psychology trainees' preparation and decision making for technology use. (Doctoral Dissertation). University of Iowa. Retrieved from https://ir.uiowa.edu/etd/6462
Chicago Manual of Style (16th Edition):
Lustgarten, Samuel David. “Ethical considerations for the information age: a qualitative study of doctoral psychology trainees' preparation and decision making for technology use.” 2018. Doctoral Dissertation, University of Iowa. Accessed January 19, 2021.
https://ir.uiowa.edu/etd/6462.
MLA Handbook (7th Edition):
Lustgarten, Samuel David. “Ethical considerations for the information age: a qualitative study of doctoral psychology trainees' preparation and decision making for technology use.” 2018. Web. 19 Jan 2021.
Vancouver:
Lustgarten SD. Ethical considerations for the information age: a qualitative study of doctoral psychology trainees' preparation and decision making for technology use. [Internet] [Doctoral dissertation]. University of Iowa; 2018. [cited 2021 Jan 19].
Available from: https://ir.uiowa.edu/etd/6462.
Council of Science Editors:
Lustgarten SD. Ethical considerations for the information age: a qualitative study of doctoral psychology trainees' preparation and decision making for technology use. [Doctoral Dissertation]. University of Iowa; 2018. Available from: https://ir.uiowa.edu/etd/6462
12.
Anastasopoulou, Kalliopi.
Privacy decision-making in the digital era.
Degree: 2016, University of the Aegean; Πανεπιστήμιο Αιγαίου
URL: http://hdl.handle.net/10442/hedi/41036
► Human activities that involve the Internet lead to the disclosure of personal information, either directly, as in the case of posting photos, videos and personal…
(more)
▼ Human activities that involve the Internet lead to the disclosure of personal information, either directly, as in the case of posting photos, videos and personal thoughts on an online social network, or indirectly, as in the case of purchase preferences revealed by consumers in an internet shop. Modern systems that can store and process vast amounts of information provide boundless capabilities for using and misusing personal information. Thus, information privacy has become a prime issue of concern for users, technologists, entrepreneurs, researchers and governments.People negotiate their information privacy when they interact with enterprises and government agencies via the Internet. In this context, all relevant stakeholders take privacy-related decisions. Individuals, either as consumers buying online products and services or citizens using e-government services, they face decisions about the use of online services, the disclosure of personal information, and the use of privacy enhancing technologies. Enterprises make decisions regarding their investments in policies and technologies for privacy protection. Governments also decide on privacy regulations, as well as on the development of e-government services that store and process citizens’ personal information.Motivated by the issues and challenges above, this doctoral thesis focuses on aspects of privacy decision-making in the digital era and uses a variety of research methods to address issues of individuals’ privacy behaviour and issues of strategic privacy decision-making for online service providers and e-government service providers.Based on the Cultural Theory of Risk we study citizens’ intention to use e-Government services from the perspective of decision biases. In this context, we present the results of an empirical study regarding citizens’ intention to use a new service offered by the Greek Ministry of Finance, the so-called “Tax Card”. Tax Card has been used to collect information about everyday purchases and aims to diminish tax avoidance. We have examined the strong influence of Cultural Bias on the formulation of intention to use and concluded that different cultural types of people should be addressed in various ways to achieve broad adoption of e-government services.Based on Behavioral Game Theory we introduce models of strategic interactions between users and enterprises. In this context, we study several cases. We present the strategic interactions of cloud-based online storage providers with sensitive privacy stakeholders. Privacy-related interactions are conducted between service providers and end users when the latter place their personal data in the cloud system. In this study, we use a game-theoretic model to analyse stakeholders’ interactions and show how their behaviour can increase or not system reliability and also, improve or not the quality of service in a cloud computing content.We also, present an analysis of privacy-related strategic choices of buyers and sellers in e-commerce transactions. E-commerce transactions, in addition…
Subjects/Keywords: Λήψη αποφάσεων ιδιωτικότητας; Ιδιωτικότητα; Λήψη αποφάσεων; Θεωρία παιγνίων; Privacy decision-making; Privacy; Decision-making; Game theory
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Anastasopoulou, K. (2016). Privacy decision-making in the digital era. (Thesis). University of the Aegean; Πανεπιστήμιο Αιγαίου. Retrieved from http://hdl.handle.net/10442/hedi/41036
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Anastasopoulou, Kalliopi. “Privacy decision-making in the digital era.” 2016. Thesis, University of the Aegean; Πανεπιστήμιο Αιγαίου. Accessed January 19, 2021.
http://hdl.handle.net/10442/hedi/41036.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Anastasopoulou, Kalliopi. “Privacy decision-making in the digital era.” 2016. Web. 19 Jan 2021.
Vancouver:
Anastasopoulou K. Privacy decision-making in the digital era. [Internet] [Thesis]. University of the Aegean; Πανεπιστήμιο Αιγαίου; 2016. [cited 2021 Jan 19].
Available from: http://hdl.handle.net/10442/hedi/41036.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Anastasopoulou K. Privacy decision-making in the digital era. [Thesis]. University of the Aegean; Πανεπιστήμιο Αιγαίου; 2016. Available from: http://hdl.handle.net/10442/hedi/41036
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Vienna
13.
Kosanke, Laura.
The fundamental right to privacy in the European Union.
Degree: 2019, University of Vienna
URL: http://othes.univie.ac.at/58361/
► Social Scoring ist die Zukunft der Kreditvergabe. Es baut auf die Verarbeitung von Social-Media-Daten, die zur Bonitätsprüfung gesammelt werden. Das Geschäftsmodell verbreitet sich weltweit. Es…
(more)
▼ Social Scoring ist die Zukunft der Kreditvergabe. Es baut auf die Verarbeitung von Social-Media-Daten, die zur Bonitätsprüfung gesammelt werden. Das Geschäftsmodell verbreitet sich weltweit. Es wird auch in einigen Mitgliedsstaaten der EU praktiziert. Bevor das Geschäft boomt, ist es wichtig, den rechtlichen Rahmen abzustecken sowie dessen Defizite zu untersuchen, um systematischen Rechtsbrüchen vorzubeugen; Rechtsbrüche sind mit einer Vielfalt von weiteren Menschenrechtsverletzungen verbunden. Wegen dieser Entwicklung ist diese Masterarbeit der folgenden Forschungsfrage gewidmet: Welche Defizite muss die EU ausbessern, um das Grundrecht auf Privatsphäre im Rahmen von Social Scoring zu gewährleisten? Das erste Kapitel beschreibt Social-Scoring-Systeme und veranschaulicht solche von Lenddo und ZestFinance. In einem zweiten Schritt wird der rechtliche Rahmen der EU abgesteckt. Schließlich werden die rechtlichen Defizite der EU angesichts Social Scorings offengelegt.
Social scoring is the future of financial lending. It builds upon processing social media data (SMD) for a creditworthiness assessment. Spreading around the globe, social scoring is also practiced in some Member States of the EU. Before the business booms, it is crucial to assess the legal scope and shortcomings regarding the fundamental right to privacy to prevent systematic violations; breaches of the law are connected to a variety of other fundamental rights violations. Facing this development, this thesis is dedicated to answering the following question: What shortcomings does the EU need to improve when safeguarding the fundamental right to privacy in the case of social scoring? The first chapter describes social scoring systems and provides examples of the systems by Lenddo and ZestFinance. Secondly, the EU’s legal scope is examined. Finally, the EU’s legal shortcomings regarding social scoring practices are revealed.
Subjects/Keywords: 86.85 Menschenrechte; 86.90 Europarecht: Sonstiges; EU / Grundrecht auf Privatsphäre / Schutz personenbezogener Daten / Social Scoring / automatisierte Entscheidungen im Einzelfall; EU / fundamental right to privacy / data protection / social scoring / automated individual decision-making
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Kosanke, L. (2019). The fundamental right to privacy in the European Union. (Thesis). University of Vienna. Retrieved from http://othes.univie.ac.at/58361/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Kosanke, Laura. “The fundamental right to privacy in the European Union.” 2019. Thesis, University of Vienna. Accessed January 19, 2021.
http://othes.univie.ac.at/58361/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Kosanke, Laura. “The fundamental right to privacy in the European Union.” 2019. Web. 19 Jan 2021.
Vancouver:
Kosanke L. The fundamental right to privacy in the European Union. [Internet] [Thesis]. University of Vienna; 2019. [cited 2021 Jan 19].
Available from: http://othes.univie.ac.at/58361/.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Kosanke L. The fundamental right to privacy in the European Union. [Thesis]. University of Vienna; 2019. Available from: http://othes.univie.ac.at/58361/
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
.