Privacy by redesign: Alleviating privacy concerns for third-party applications

Heng Xu, Na Wang, Jens Grossklags

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Abstract

In online social networks, the aggressive way of data access and transmission by thirdparty applications (apps) has made privacy concerns particularly salient. Users' private information can be easily revealed by their and even their friends' use of apps. A heightened need for empowering user control for third-party apps arises due to the inability to monitor the data use by app providers within and outside of the social networking platform and the inherent uncertainty about their privacy practices. Drawing on the theoretical framework developed by Malhotra et al. (2004), we propose two improved designs of privacy authorization dialogues to encompass control and awareness as the essential factors to address users' privacy concerns toward thirdparty apps on Facebook. The approach of Privacy by ReDesign is employed to investigate whether users can more adequately represent their preferences for sharing and releasing personal information with these two improved designs.

Original languageEnglish (US)
Title of host publicationInternational Conference on Information Systems, ICIS 2012
Pages3851-3858
Number of pages8
StatePublished - Dec 1 2012
EventInternational Conference on Information Systems, ICIS 2012 - Orlando, FL, United States
Duration: Dec 16 2012Dec 19 2012

Publication series

NameInternational Conference on Information Systems, ICIS 2012
Volume5

Other

OtherInternational Conference on Information Systems, ICIS 2012
Country/TerritoryUnited States
CityOrlando, FL
Period12/16/1212/19/12

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Statistics, Probability and Uncertainty
  • Applied Mathematics
  • Library and Information Sciences

Fingerprint

Dive into the research topics of 'Privacy by redesign: Alleviating privacy concerns for third-party applications'. Together they form a unique fingerprint.

Cite this