Abstract This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book’s primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teacherscan assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academicswho are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.
AbstractList This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy).The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape.The book's primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teachers can assign (parts of) the book for a "professional issues" course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academics who are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.
This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book’s primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teacherscan assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academicswho are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.
Author Bart P. Knijnenburg, Xinru Page, Pamela Wisniewski, Heather Richter Lipford, Nicholas Proferes, Jennifer Romano
Author_xml – sequence: 1
  fullname: Knijnenburg, Bart P
– sequence: 2
  fullname: Page, Xinru
– sequence: 3
  fullname: Wisniewski, Pamela
– sequence: 4
  fullname: Lipford, Heather Richter
– sequence: 5
  fullname: Proferes, Nicholas
– sequence: 6
  fullname: Romano, Jennifer
BookMark eNpNkM1v1DAQxV1BEf0SZwSHHJAQh7TjcfyFxKEshVZqu5VacbUcZ9KGpvFiL4v635NuVqinmSf_3jzr7bKXQxyIsbccDjmAPrLalKIEAaVBbVTJt9iuGOVawYvn4hV7M59dfi44WiNsJSv7mh3k_AsAUAvgIHbY4UVsKA3FdQxdLG8o3A1d8H1xRSkvKCy7FeUiDsVV6lY-PO6z7db3mQ42c4_9_H5yMzstz-c_zmbH56UXoqp4GYznymLrFdacUyCLVNfEq0oqrby3gbdWNU2wHuoaQUpvSFCtRdO2TdWIPfZhOhxXlJoxnFwd431282-XAE9NIFRmxD5NmM_39DffxX6Z3aqniR27-t8GH9mPE7tI8fcfyku3xgINy-R7d_J1poyRFnEk329ISj3dxk20BIF6Hfpl8ze_oMEtUvfg06OLvnN9V6dpf3qJ6dYhjD5wHJXUTqJBOfrfPfc30U_3tUGF4h_E1Y3d
ContentType eBook
DBID V1H
A7I
YSPEL
AHRNR
DOI 10.1007/978-3-030-82786-1
DatabaseName DOAB: Directory of Open Access Books
OAPEN
Perlego
OverDrive Ebooks
DatabaseTitleList




Database_xml – sequence: 1
  dbid: V1H
  name: DOAB: Directory of Open Access Books
  url: https://directory.doabooks.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Law
Computer Science
EISBN 3030827860
9783030827861
Edition 1
1st Edition 2022
Editor Proferes, Nicholas
Wisniewski, Pamela
Lipford, Heather Richter
Knijnenburg, Bart P
Page, Xinru
Romano, Jennifer
Editor_xml – sequence: 1
  fullname: Knijnenburg, Bart P
– sequence: 2
  fullname: Page, Xinru
– sequence: 3
  fullname: Wisniewski, Pamela
– sequence: 4
  fullname: Lipford, Heather Richter
– sequence: 5
  fullname: Proferes, Nicholas
– sequence: 6
  fullname: Romano, Jennifer
ExternalDocumentID ODN0010072048
9783030827861
EBC6885922
5032748
oai_library_oapen_org_20_500_12657_52825
78262
Genre Electronic books
GrantInformation_xml – fundername: Clemson University
GroupedDBID 38.
A7I
AABBV
AAKKN
AALJR
AAQKC
AAZWU
ABEEZ
ABSVR
ABTHU
ABVND
ACBPT
ACHZO
ACPMC
ADNVS
AEJLV
AEKFX
AGWHU
AHRNR
AHVRR
AIQUZ
ALMA_UNASSIGNED_HOLDINGS
ALNDD
BBABE
CZZ
EIXGO
IEZ
SBO
TPJZQ
V1H
YSPEL
AAYZJ
AKAAH
ID FETCH-LOGICAL-a33441-c8a1692fa62b11ece92ebbe1445676aa9c1f96ddc9a0bb2055a8e3eb73dffd4d3
IEDL.DBID A7I
ISBN 3030827860
9783030827861
3030827852
9783030827854
IngestDate Fri Jul 04 04:34:42 EDT 2025
Fri Nov 08 02:35:54 EST 2024
Fri May 30 22:47:49 EDT 2025
Tue Sep 02 23:59:27 EDT 2025
Wed Sep 03 02:56:27 EDT 2025
Tue Jul 08 20:05:00 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
LCCallNum_Ident QA76.9.A25
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a33441-c8a1692fa62b11ece92ebbe1445676aa9c1f96ddc9a0bb2055a8e3eb73dffd4d3
Notes Electronic reproduction. Dordrecht: Springer, 2022. Requires the Libby app or a modern web browser.
OCLC OCN: 1298394549
1298394549
OpenAccessLink https://library.oapen.org/handle/20.500.12657/52825
PQID EBC6885922
PageCount 462
ParticipantIDs overdrive_books_ODN0010072048
askewsholts_vlebooks_9783030827861
proquest_ebookcentral_EBC6885922
perlego_books_5032748
oapen_primary_oai_library_oapen_org_20_500_12657_52825
oapen_doabooks_78262
PublicationCentury 2000
PublicationDate 2022
2022-02-09
2022.
PublicationDateYYYYMMDD 2022-01-01
2022-02-09
PublicationDate_xml – year: 2022
  text: 2022
PublicationDecade 2020
PublicationPlace Cham
PublicationPlace_xml – name: Cham
PublicationYear 2022
Publisher Springer Nature
Springer International Publishing
Springer International Publishing AG
Clemson University
Publisher_xml – name: Springer Nature
– name: Springer International Publishing
– name: Springer International Publishing AG
– name: Clemson University
SSID ssj0002730103
Score 2.426699
Snippet This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical...
SourceID overdrive
askewsholts
proquest
perlego
oapen
SourceType Aggregation Database
Publisher
SubjectTerms Application software
Communication
Communication studies
Computer security
Computer Technology
COMPUTERS
Computers and civilization
Computing and Information Technology
Data protection—Law and legislation
Digital and information technologies: social and ethical aspects
Human and societal aspects of security and privacy
Information retrieval
Information systems applications
Information technology: general topics
Interdisciplinary studies
Nonfiction
Open Access
Privacy and data protection
Privacy policies
Privacy-enhancing technologies
Reference, Information and Interdisciplinary subjects
Social aspects of computer privacy
Social network security and privacy
Social networks
SubjectTermsDisplay Computer Technology.
Electronic books.
Nonfiction.
Reference.
TableOfContents 15.3 Who Is Vulnerable: Defining Unique Privacy Concerns
12.4 Cross-Cultural Privacy Differences in Users' Information Disclosure to Organizations -- 12.4.1 Cultural Differences in Data Collection Entities -- 12.4.2 Cultural Differences in Usage Purpose -- 12.4.3 Cultural Differences in Collection Methods -- 12.4.4 Cultural Differences in Value Exchange from Data Collection -- 12.4.5 Cultural Differences in Third-Party Accountability -- 12.4.6 Design Implications -- 12.4.6.1 Customize Data Collection Strategies in Different Countries -- 12.4.6.2 Enable Different Options in Different Countries to Control Personal Data Flow -- 12.4.6.3 Differentiate Relationships Between Privacy Perceptions and Privacy Decisions in Different Cultures -- 12.5 Conclusions -- References -- 13 Accessible Privacy -- 13.1 Introduction -- 13.2 Privacy and Underserved Populations -- 13.2.1 Models of Disability -- 13.2.2 People with Visual Impairments -- 13.2.3 Are Existing Privacy-Enhancing Technologies Sufficient? -- 13.2.4 Intersectional Privacy -- 13.2.5 People with Hidden Disabilities -- 13.2.6 People with Other Disabilities -- 13.3 Why Is Accessible Privacy Difficult? -- 13.4 Working Towards Accessible Privacy -- 13.5 Future Directions -- References -- 14 Privacy in Adolescence -- 14.1 Introduction -- 14.1.1 The Developmental Stage of Adolescence -- 14.1.2 Adolescence as a "Privacy Paradox" -- 14.2 Teens and Networked Privacy: Empirical Evidence -- 14.2.1 Privacy Turbulence Within Families -- 14.2.2 Risk as a Learning Process and the Suppressive Effect of Restrictive Parental Mediation During Adolescence -- 14.3 Designing Sociotechnical Systems to Support Adolescence -- 14.4 Design Guidelines for Privacy and Risk-Taking During Adolescence -- 14.5 Summary -- References -- 15 Privacy and Vulnerable Populations -- 15.1 Introduction -- 15.2 How Technology Reinforces and Promotes Inequality
11.1.4 Outline -- 11.2 Privacy Challenges -- 11.2.1 No Awareness/No Interface -- 11.2.2 Accumulation and Inference of Data -- 11.2.3 Multiple Users -- 11.2.4 Little Control -- 11.2.5 (In)Security of IoT Devices -- 11.3 Case Studies -- 11.3.1 Fitness Trackers -- 11.3.2 Smart Voice Assistants -- 11.3.3 Security Cameras -- 11.4 Solutions and Guidelines -- 11.4.1 Privacy Notices and Awareness Mechanisms -- 11.4.2 On Device Controls -- 11.4.3 Data Privacy -- 11.4.4 Community-Oriented Controls -- 11.4.5 Context-Adaptive and User-Tailored Privacy -- 11.5 Conclusion -- References -- Part III Audiences -- 12 Cross-Cultural Privacy Differences -- 12.1 Introduction -- 12.2 How to Study Culture -- 12.2.1 Cultural Dimensions -- 12.2.2 Cultural Differences in Behaviors -- 12.2.3 Cultural Differences in Perceptions -- 12.2.3.1 Step 1: Define a Factor Model Based on the Items in a Questionnaire -- 12.2.3.2 Step 2: Configural Invariance -- 12.2.3.3 Step 3: Metric Invariance -- 12.2.3.4 Step 4: Scalar Invariance -- 12.2.3.5 Step 5: Full Invariance -- 12.3 Cross-Cultural Privacy Differences in Social Media -- 12.3.1 Cultural Differences in Sharing with Different Social Relationships -- 12.3.2 Cultural Differences in Collective Privacy Management -- 12.3.2.1 Cultural Differences in Interpretations of Collective Privacy Management Strategies -- 12.3.2.2 Cultural Differences in Perceptions of Others' or Group Privacy -- 12.3.3 Design Implications -- 12.3.3.1 Invest More Effort to Support Collective Privacy Management in Collectivistic Countries -- 12.3.3.2 Differentiate Considerations in Audience Control in Different Cultures -- 12.3.3.3 Provide More Privacy Support to Protect Others' Privacy in Collectivistic Countries -- 12.3.3.4 Secure Individual Privacy in Individualistic Countries
8 Privacy-Enhancing Technologies -- 8.1 Introduction -- 8.2 Secure Messaging -- 8.3 Secure Email -- 8.4 HTTPS -- 8.4.1 HTTPS Warning Messages -- 8.4.2 HTTPS Development and Deployment -- 8.4.3 HTTPS Interception -- 8.5 Two-Factor Authentication -- 8.6 Anonymity -- 8.7 Summary -- References -- 9 Tracking and Personalization -- 9.1 Introduction -- 9.2 Aspects of Personalization -- 9.2.1 Goals of Personalization -- 9.2.2 Personalization Environments -- 9.2.2.1 Web Personalization -- 9.2.2.2 Mobile Personalization -- 9.3 Online Tracking -- 9.3.1 Tracking Contexts -- 9.3.2 Tracking Entities -- 9.3.2.1 First-Party Tracking -- 9.3.2.2 Third-Party Tracking -- 9.3.3 Tracking Techniques -- 9.3.3.1 Deployed Tracking Techniques -- 9.3.3.2 Potential Tracking Techniques -- 9.3.4 Behavioral Tracking: State of the Art -- 9.4 Personalization via Online Tracking -- 9.4.1 Relationship -- 9.4.2 Privacy Implications of Personalization -- 9.4.3 Balancing Privacy and Personalization -- 9.4.3.1 Privacy-by-Design -- 9.4.3.2 Privacy Tools -- 9.5 Conclusion -- References -- 10 Healthcare Privacy -- 10.1 Privacy in Healthcare -- 10.2 Risks -- 10.2.1 Data, Protected Health Information, and Applications -- 10.2.2 Sources and Stakeholders -- 10.2.3 Process and Services -- 10.2.4 Trade-Offs -- 10.3 Regulations -- 10.3.1 Acts -- 10.3.2 Legislation, Administrative Agencies, and Rules -- 10.3.3 Safeguards, Policies, Procedures, and Forms -- 10.4 Limitations and Challenges in Current Practices -- 10.5 Recommendations -- 10.5.1 Healthcare Practitioners -- 10.5.2 Patients and Caregivers -- 10.5.3 Insurance Companies -- 10.5.4 Technologists -- 10.5.5 Regulators -- 10.5.6 Third-Party Organizations -- 10.6 Conclusion -- References -- 11 Privacy and the Internet of Things -- 11.1 Defining IoT -- 11.1.1 Wearable IoT Domain -- 11.1.2 Household IoT Domain -- 11.1.3 Public IoT Domain
Intro -- Foreword -- Acknowledgement -- Contents -- 1 Introduction and Overview -- 1.1 Introduction -- 1.2 What Is Privacy? -- 1.3 Privacy Theory and Methods -- 1.4 Domains -- 1.5 Audiences -- 1.6 Moving Forward -- 1.7 Conclusion -- References -- Part I Privacy Theory and Methods -- 2 Privacy Theories and Frameworks -- 2.1 Introduction -- 2.2 Privacy as Information Disclosure -- 2.2.1 Privacy Calculus: Assessing the Benefit vs. Cost of Information Disclosures -- 2.2.2 Privacy Paradox: The Discrepancy Between Users' Privacy Concerns and Information Disclosure Behavior -- 2.2.3 Westin's Privacy Taxonomy: The Classification of Consumers' Privacy Knowledge and Preferences -- 2.3 Privacy as an Interpersonal Boundary Regulation Process -- 2.3.1 Altman's Conceptualization of Privacy -- 2.3.2 Petronio's Communication Privacy Management Theory -- 2.4 Privacy as Social Context, Norms, and Values -- 2.4.1 Considering Social Contexts -- 2.4.2 Identifying Privacy Norms and Human Values in Design -- 2.4.3 Applying Contextual Integrity to Practice -- 2.5 A Privacy Affordance and Design Perspective -- 2.5.1 Privacy Affordances -- 2.5.2 Privacy by Design -- 2.6 The Future of Modern Privacy: Individual Differences and User-Centered Privacy -- 2.7 Guidelines for Applying Privacy Frameworks in Practice -- 2.8 Chapter Summary -- References -- 3 Revisiting APCO -- 3.1 Introduction -- 3.2 The APCO Model -- 3.2.1 The Antecedents of Privacy Concerns -- 3.2.2 Privacy Concerns -- 3.2.3 Measuring Privacy Concerns -- 3.2.4 Trust and Privacy Calculus -- 3.3 Enhanced APCO: An Expanded View on Privacy Research -- 3.4 The Research Landscape After APCO -- 3.4.1 Evolution of Technology and Personalization of Services -- 3.5 Conclusion and Avenues of Future Research -- References -- 4 Privacy and Behavioral Economics -- 4.1 Introduction -- 4.2 Uncertainty -- 4.3 Context-Dependence
4.4 Malleability and Influence -- 4.5 Conclusions -- References -- 5 The Development of Privacy Norms -- 5.1 Introduction -- 5.2 Privacy and Challenges in Relation to Technology -- 5.3 Privacy as Contextual Integrity -- 5.4 Building Expectations -- 5.5 Negotiating Norms and Negotiating Technology -- 5.6 Conclusion -- References -- 6 Privacy Beyond the Individual Level -- 6.1 Introduction -- 6.2 Types of Groups and Types of Group Privacy -- 6.2.1 Types of Groups: Self-Constituted Groups and Algorithmically Determined Groups -- 6.2.2 Types of Group Privacy: "Their" Privacy and "Its" Privacy -- 6.2.3 Distinguishing Between Types and Levels of Privacy -- 6.3 Contemporary Practices That Influence the Privacy of Multiple Actors or Groups -- 6.4 Dynamics of Multi-stakeholder Privacy Decision-Making -- 6.5 Tensions Between Privacy Rights of Individuals Versus Groups -- 6.6 Recommendations for Tools and Mechanisms to Protect Privacy Beyond the Individual Level -- 6.7 Conclusion -- References -- Part II Domains -- 7 Social Media and Privacy -- 7.1 Introduction -- 7.2 A Brief History of Social Media -- 7.3 Privacy Challenges in Social Media -- 7.3.1 Information Disclosure/Control over Who Sees What -- 7.3.2 Unique Considerations for Managing Disclosures Within Social Media -- 7.3.3 Reputation Management Through Self-Presentation -- 7.3.4 Access to Oneself -- 7.3.5 Privacy Paradox -- 7.4 Reconceptualizing Social Media Privacy as Boundary Regulation -- 7.4.1 Boundary Regulation on Social Media -- 7.4.2 Coping with Social Media Privacy Violations -- 7.5 Addressing Privacy Challenges -- 7.5.1 Understanding People and Their Privacy Concerns -- 7.5.2 Measuring Privacy Concerns -- 7.5.3 Designing Privacy Features -- 7.5.4 Privacy Concerns and Social Disenfranchisement -- 7.5.5 Guidelines for Designing Privacy-Sensitive Social Media -- 7.6 Chapter Summary -- References
Title Modern Socio-Technical Perspectives on Privacy
URI https://directory.doabooks.org/handle/20.500.12854/78262
https://library.oapen.org/handle/20.500.12657/52825
https://www.perlego.com/book/5032748/modern-sociotechnical-perspectives-on-privacy-pdf
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=6885922
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783030827861
http://link.overdrive.com/?titleID=10072048&websiteID=
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwEB71cYC9QB-IQFtFiKtXfmwc50pptaC-DlD1ZtmxcwFtqs0C6r_vjOPdgnrjEikZKbHmc8YzY883AB-7ygTZOM580wU2k9IzY0THvBSxwxWP65TMubzS8--zr3fVXa7jHp5yF9PeYTSfdvJHtgEM0qcVJzIETSE8VVxuw66WuNqTP1R_2SRWJM1ZTv0bVOJiqY3O3E6be7He3swMs4qhhCURExOYuOEHWhi0PquB-iDRUCbwgo5UhiXaIHSV7-MSo_r-mQFPq9L5a9iNVKqwB1txsQ-v1g0ayvy_7sP2hftzANOx31mZalNYyqUTMuXNU53lUPaL8ga_6tqHQ7g9P_t2Ome5TQJzSqE3w1rjhG5k57T0QsQ2NjJ6HzFUqnStnWta0TU6hBYx8V7yqnImquhrFbouzIJ6AzuLfhHfQqkcb2p06ohCcqadcj6i_4ImsCWtOlXAh7-UY3__TFu6g_1HuwUcJJ3Z0LtRjG6IlgXo8fH9yKNhidk6421HCeJtJbcItE1A2wR0Accb3dvxhdefryia5dRixxRwmPHI0oorDLbxeblGx6Zx5vOu9uzTqTamaqR8979jeg8vJRVCpGTMEeyslr_iMbonK3-SpiNeb8X8ERxa2mg
linkProvider Open Access Publishing in European Networks
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Modern+socio-technical+perspectives+on+privacy&rft.au=Knijnenburg%2C+Bart+P&rft.date=2022-01-01&rft.isbn=9783030827861&rft_id=info:doi/10.1007%2F978-3-030-82786-1&rft.externalDBID=n%2Fa&rft.externalDocID=ODN0010072048
thumbnail_l http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fwww.perlego.com%2Fbooks%2FRM_Books%2Fingram_csplus_gexhsuob%2F9783030827861.jpg
thumbnail_m http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97830308%2F9783030827861.jpg