How to protect my privacy? - classifying end-user information privacy protection behaviors

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The Internet and smart devices pose many risks at users’ information privacy. Individuals are aware of that and try to counter tracking activities by applying different privacy protection behaviors. These are manifold and differ in scope, goal and degree of technology utilization. Although there is a lot of literature which investigates protection strategies, it is lacking holistic user-centric classifications. We review literature and identify 141 privacy protection behaviors end-users show. We map these results to 38 distinct categories and apply hybrid cart sorting to create a taxonomy, which we call the “End-User Information Privacy Protection Behavior Model” (EIPPBM).

Cite

CITATION STYLE

APA

Ebbers, F. (2020). How to protect my privacy? - classifying end-user information privacy protection behaviors. In IFIP Advances in Information and Communication Technology (Vol. 576 LNCS, pp. 327–342). Springer. https://doi.org/10.1007/978-3-030-42504-3_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free