Privacy by design: Examining two key aspects of social applications

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Social applications do not only acquire users’ personal information but potentially also collects the personal information of users’ social networks. Despite considerable discussion of privacy problems in prior work, questions remain as to how to design privacy-preserving social applications and how to evaluate its effect on privacy. Drawing on the justice framework, we identify two key aspects of social, namely information acquisition and exposure control and examine the effects on user evaluation of social applications. Furthermore, we investigate the impact of this evaluation on usage intention. In doing so, we provide new insight into embedding privacy in technology development.

Cite

CITATION STYLE

APA

Choi, B. C. F., & Tam, J. (2015). Privacy by design: Examining two key aspects of social applications. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9191, pp. 41–52). Springer Verlag. https://doi.org/10.1007/978-3-319-20895-4_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free