Modern Socio-Technical Perspectives on Privacy
This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and u...
Saved in:
Main Authors | , , , , , |
---|---|
Format | eBook |
Language | English |
Published |
Cham
Springer Nature
2022
Springer International Publishing Springer International Publishing AG Clemson University |
Edition | 1 |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book’s primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teacherscan assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academicswho are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects. |
---|---|
AbstractList | This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy).The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape.The book's primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teachers can assign (parts of) the book for a "professional issues" course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academics who are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects. This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book’s primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teacherscan assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academicswho are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects. |
Author | Bart P. Knijnenburg, Xinru Page, Pamela Wisniewski, Heather Richter Lipford, Nicholas Proferes, Jennifer Romano |
Author_xml | – sequence: 1 fullname: Knijnenburg, Bart P – sequence: 2 fullname: Page, Xinru – sequence: 3 fullname: Wisniewski, Pamela – sequence: 4 fullname: Lipford, Heather Richter – sequence: 5 fullname: Proferes, Nicholas – sequence: 6 fullname: Romano, Jennifer |
BookMark | eNpNkM1v1DAQxV1BEf0SZwSHHJAQh7TjcfyFxKEshVZqu5VacbUcZ9KGpvFiL4v635NuVqinmSf_3jzr7bKXQxyIsbccDjmAPrLalKIEAaVBbVTJt9iuGOVawYvn4hV7M59dfi44WiNsJSv7mh3k_AsAUAvgIHbY4UVsKA3FdQxdLG8o3A1d8H1xRSkvKCy7FeUiDsVV6lY-PO6z7db3mQ42c4_9_H5yMzstz-c_zmbH56UXoqp4GYznymLrFdacUyCLVNfEq0oqrby3gbdWNU2wHuoaQUpvSFCtRdO2TdWIPfZhOhxXlJoxnFwd431282-XAE9NIFRmxD5NmM_39DffxX6Z3aqniR27-t8GH9mPE7tI8fcfyku3xgINy-R7d_J1poyRFnEk329ISj3dxk20BIF6Hfpl8ze_oMEtUvfg06OLvnN9V6dpf3qJ6dYhjD5wHJXUTqJBOfrfPfc30U_3tUGF4h_E1Y3d |
ContentType | eBook |
DBID | V1H A7I YSPEL AHRNR |
DOI | 10.1007/978-3-030-82786-1 |
DatabaseName | DOAB: Directory of Open Access Books OAPEN Perlego OverDrive Ebooks |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: V1H name: DOAB: Directory of Open Access Books url: https://directory.doabooks.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Law Computer Science |
EISBN | 3030827860 9783030827861 |
Edition | 1 1st Edition 2022 |
Editor | Proferes, Nicholas Wisniewski, Pamela Lipford, Heather Richter Knijnenburg, Bart P Page, Xinru Romano, Jennifer |
Editor_xml | – sequence: 1 fullname: Knijnenburg, Bart P – sequence: 2 fullname: Page, Xinru – sequence: 3 fullname: Wisniewski, Pamela – sequence: 4 fullname: Lipford, Heather Richter – sequence: 5 fullname: Proferes, Nicholas – sequence: 6 fullname: Romano, Jennifer |
ExternalDocumentID | ODN0010072048 9783030827861 EBC6885922 5032748 oai_library_oapen_org_20_500_12657_52825 78262 |
Genre | Electronic books |
GrantInformation_xml | – fundername: Clemson University |
GroupedDBID | 38. A7I AABBV AAKKN AALJR AAQKC AAZWU ABEEZ ABSVR ABTHU ABVND ACBPT ACHZO ACPMC ADNVS AEJLV AEKFX AGWHU AHRNR AHVRR AIQUZ ALMA_UNASSIGNED_HOLDINGS ALNDD BBABE CZZ EIXGO IEZ SBO TPJZQ V1H YSPEL AAYZJ AKAAH |
ID | FETCH-LOGICAL-a33441-c8a1692fa62b11ece92ebbe1445676aa9c1f96ddc9a0bb2055a8e3eb73dffd4d3 |
IEDL.DBID | A7I |
ISBN | 3030827860 9783030827861 3030827852 9783030827854 |
IngestDate | Fri Jul 04 04:34:42 EDT 2025 Fri Nov 08 02:35:54 EST 2024 Fri May 30 22:47:49 EDT 2025 Tue Sep 02 23:59:27 EDT 2025 Wed Sep 03 02:56:27 EDT 2025 Tue Jul 08 20:05:00 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
LCCallNum_Ident | QA76.9.A25 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-a33441-c8a1692fa62b11ece92ebbe1445676aa9c1f96ddc9a0bb2055a8e3eb73dffd4d3 |
Notes | Electronic reproduction. Dordrecht: Springer, 2022. Requires the Libby app or a modern web browser. |
OCLC | OCN: 1298394549 1298394549 |
OpenAccessLink | https://library.oapen.org/handle/20.500.12657/52825 |
PQID | EBC6885922 |
PageCount | 462 |
ParticipantIDs | overdrive_books_ODN0010072048 askewsholts_vlebooks_9783030827861 proquest_ebookcentral_EBC6885922 perlego_books_5032748 oapen_primary_oai_library_oapen_org_20_500_12657_52825 oapen_doabooks_78262 |
PublicationCentury | 2000 |
PublicationDate | 2022 2022-02-09 2022. |
PublicationDateYYYYMMDD | 2022-01-01 2022-02-09 |
PublicationDate_xml | – year: 2022 text: 2022 |
PublicationDecade | 2020 |
PublicationPlace | Cham |
PublicationPlace_xml | – name: Cham |
PublicationYear | 2022 |
Publisher | Springer Nature Springer International Publishing Springer International Publishing AG Clemson University |
Publisher_xml | – name: Springer Nature – name: Springer International Publishing – name: Springer International Publishing AG – name: Clemson University |
SSID | ssj0002730103 |
Score | 2.426699 |
Snippet | This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical... |
SourceID | overdrive askewsholts proquest perlego oapen |
SourceType | Aggregation Database Publisher |
SubjectTerms | Application software Communication Communication studies Computer security Computer Technology COMPUTERS Computers and civilization Computing and Information Technology Data protection—Law and legislation Digital and information technologies: social and ethical aspects Human and societal aspects of security and privacy Information retrieval Information systems applications Information technology: general topics Interdisciplinary studies Nonfiction Open Access Privacy and data protection Privacy policies Privacy-enhancing technologies Reference, Information and Interdisciplinary subjects Social aspects of computer privacy Social network security and privacy Social networks |
SubjectTermsDisplay | Computer Technology. Electronic books. Nonfiction. Reference. |
TableOfContents | 15.3 Who Is Vulnerable: Defining Unique Privacy Concerns 12.4 Cross-Cultural Privacy Differences in Users' Information Disclosure to Organizations -- 12.4.1 Cultural Differences in Data Collection Entities -- 12.4.2 Cultural Differences in Usage Purpose -- 12.4.3 Cultural Differences in Collection Methods -- 12.4.4 Cultural Differences in Value Exchange from Data Collection -- 12.4.5 Cultural Differences in Third-Party Accountability -- 12.4.6 Design Implications -- 12.4.6.1 Customize Data Collection Strategies in Different Countries -- 12.4.6.2 Enable Different Options in Different Countries to Control Personal Data Flow -- 12.4.6.3 Differentiate Relationships Between Privacy Perceptions and Privacy Decisions in Different Cultures -- 12.5 Conclusions -- References -- 13 Accessible Privacy -- 13.1 Introduction -- 13.2 Privacy and Underserved Populations -- 13.2.1 Models of Disability -- 13.2.2 People with Visual Impairments -- 13.2.3 Are Existing Privacy-Enhancing Technologies Sufficient? -- 13.2.4 Intersectional Privacy -- 13.2.5 People with Hidden Disabilities -- 13.2.6 People with Other Disabilities -- 13.3 Why Is Accessible Privacy Difficult? -- 13.4 Working Towards Accessible Privacy -- 13.5 Future Directions -- References -- 14 Privacy in Adolescence -- 14.1 Introduction -- 14.1.1 The Developmental Stage of Adolescence -- 14.1.2 Adolescence as a "Privacy Paradox" -- 14.2 Teens and Networked Privacy: Empirical Evidence -- 14.2.1 Privacy Turbulence Within Families -- 14.2.2 Risk as a Learning Process and the Suppressive Effect of Restrictive Parental Mediation During Adolescence -- 14.3 Designing Sociotechnical Systems to Support Adolescence -- 14.4 Design Guidelines for Privacy and Risk-Taking During Adolescence -- 14.5 Summary -- References -- 15 Privacy and Vulnerable Populations -- 15.1 Introduction -- 15.2 How Technology Reinforces and Promotes Inequality 11.1.4 Outline -- 11.2 Privacy Challenges -- 11.2.1 No Awareness/No Interface -- 11.2.2 Accumulation and Inference of Data -- 11.2.3 Multiple Users -- 11.2.4 Little Control -- 11.2.5 (In)Security of IoT Devices -- 11.3 Case Studies -- 11.3.1 Fitness Trackers -- 11.3.2 Smart Voice Assistants -- 11.3.3 Security Cameras -- 11.4 Solutions and Guidelines -- 11.4.1 Privacy Notices and Awareness Mechanisms -- 11.4.2 On Device Controls -- 11.4.3 Data Privacy -- 11.4.4 Community-Oriented Controls -- 11.4.5 Context-Adaptive and User-Tailored Privacy -- 11.5 Conclusion -- References -- Part III Audiences -- 12 Cross-Cultural Privacy Differences -- 12.1 Introduction -- 12.2 How to Study Culture -- 12.2.1 Cultural Dimensions -- 12.2.2 Cultural Differences in Behaviors -- 12.2.3 Cultural Differences in Perceptions -- 12.2.3.1 Step 1: Define a Factor Model Based on the Items in a Questionnaire -- 12.2.3.2 Step 2: Configural Invariance -- 12.2.3.3 Step 3: Metric Invariance -- 12.2.3.4 Step 4: Scalar Invariance -- 12.2.3.5 Step 5: Full Invariance -- 12.3 Cross-Cultural Privacy Differences in Social Media -- 12.3.1 Cultural Differences in Sharing with Different Social Relationships -- 12.3.2 Cultural Differences in Collective Privacy Management -- 12.3.2.1 Cultural Differences in Interpretations of Collective Privacy Management Strategies -- 12.3.2.2 Cultural Differences in Perceptions of Others' or Group Privacy -- 12.3.3 Design Implications -- 12.3.3.1 Invest More Effort to Support Collective Privacy Management in Collectivistic Countries -- 12.3.3.2 Differentiate Considerations in Audience Control in Different Cultures -- 12.3.3.3 Provide More Privacy Support to Protect Others' Privacy in Collectivistic Countries -- 12.3.3.4 Secure Individual Privacy in Individualistic Countries 8 Privacy-Enhancing Technologies -- 8.1 Introduction -- 8.2 Secure Messaging -- 8.3 Secure Email -- 8.4 HTTPS -- 8.4.1 HTTPS Warning Messages -- 8.4.2 HTTPS Development and Deployment -- 8.4.3 HTTPS Interception -- 8.5 Two-Factor Authentication -- 8.6 Anonymity -- 8.7 Summary -- References -- 9 Tracking and Personalization -- 9.1 Introduction -- 9.2 Aspects of Personalization -- 9.2.1 Goals of Personalization -- 9.2.2 Personalization Environments -- 9.2.2.1 Web Personalization -- 9.2.2.2 Mobile Personalization -- 9.3 Online Tracking -- 9.3.1 Tracking Contexts -- 9.3.2 Tracking Entities -- 9.3.2.1 First-Party Tracking -- 9.3.2.2 Third-Party Tracking -- 9.3.3 Tracking Techniques -- 9.3.3.1 Deployed Tracking Techniques -- 9.3.3.2 Potential Tracking Techniques -- 9.3.4 Behavioral Tracking: State of the Art -- 9.4 Personalization via Online Tracking -- 9.4.1 Relationship -- 9.4.2 Privacy Implications of Personalization -- 9.4.3 Balancing Privacy and Personalization -- 9.4.3.1 Privacy-by-Design -- 9.4.3.2 Privacy Tools -- 9.5 Conclusion -- References -- 10 Healthcare Privacy -- 10.1 Privacy in Healthcare -- 10.2 Risks -- 10.2.1 Data, Protected Health Information, and Applications -- 10.2.2 Sources and Stakeholders -- 10.2.3 Process and Services -- 10.2.4 Trade-Offs -- 10.3 Regulations -- 10.3.1 Acts -- 10.3.2 Legislation, Administrative Agencies, and Rules -- 10.3.3 Safeguards, Policies, Procedures, and Forms -- 10.4 Limitations and Challenges in Current Practices -- 10.5 Recommendations -- 10.5.1 Healthcare Practitioners -- 10.5.2 Patients and Caregivers -- 10.5.3 Insurance Companies -- 10.5.4 Technologists -- 10.5.5 Regulators -- 10.5.6 Third-Party Organizations -- 10.6 Conclusion -- References -- 11 Privacy and the Internet of Things -- 11.1 Defining IoT -- 11.1.1 Wearable IoT Domain -- 11.1.2 Household IoT Domain -- 11.1.3 Public IoT Domain Intro -- Foreword -- Acknowledgement -- Contents -- 1 Introduction and Overview -- 1.1 Introduction -- 1.2 What Is Privacy? -- 1.3 Privacy Theory and Methods -- 1.4 Domains -- 1.5 Audiences -- 1.6 Moving Forward -- 1.7 Conclusion -- References -- Part I Privacy Theory and Methods -- 2 Privacy Theories and Frameworks -- 2.1 Introduction -- 2.2 Privacy as Information Disclosure -- 2.2.1 Privacy Calculus: Assessing the Benefit vs. Cost of Information Disclosures -- 2.2.2 Privacy Paradox: The Discrepancy Between Users' Privacy Concerns and Information Disclosure Behavior -- 2.2.3 Westin's Privacy Taxonomy: The Classification of Consumers' Privacy Knowledge and Preferences -- 2.3 Privacy as an Interpersonal Boundary Regulation Process -- 2.3.1 Altman's Conceptualization of Privacy -- 2.3.2 Petronio's Communication Privacy Management Theory -- 2.4 Privacy as Social Context, Norms, and Values -- 2.4.1 Considering Social Contexts -- 2.4.2 Identifying Privacy Norms and Human Values in Design -- 2.4.3 Applying Contextual Integrity to Practice -- 2.5 A Privacy Affordance and Design Perspective -- 2.5.1 Privacy Affordances -- 2.5.2 Privacy by Design -- 2.6 The Future of Modern Privacy: Individual Differences and User-Centered Privacy -- 2.7 Guidelines for Applying Privacy Frameworks in Practice -- 2.8 Chapter Summary -- References -- 3 Revisiting APCO -- 3.1 Introduction -- 3.2 The APCO Model -- 3.2.1 The Antecedents of Privacy Concerns -- 3.2.2 Privacy Concerns -- 3.2.3 Measuring Privacy Concerns -- 3.2.4 Trust and Privacy Calculus -- 3.3 Enhanced APCO: An Expanded View on Privacy Research -- 3.4 The Research Landscape After APCO -- 3.4.1 Evolution of Technology and Personalization of Services -- 3.5 Conclusion and Avenues of Future Research -- References -- 4 Privacy and Behavioral Economics -- 4.1 Introduction -- 4.2 Uncertainty -- 4.3 Context-Dependence 4.4 Malleability and Influence -- 4.5 Conclusions -- References -- 5 The Development of Privacy Norms -- 5.1 Introduction -- 5.2 Privacy and Challenges in Relation to Technology -- 5.3 Privacy as Contextual Integrity -- 5.4 Building Expectations -- 5.5 Negotiating Norms and Negotiating Technology -- 5.6 Conclusion -- References -- 6 Privacy Beyond the Individual Level -- 6.1 Introduction -- 6.2 Types of Groups and Types of Group Privacy -- 6.2.1 Types of Groups: Self-Constituted Groups and Algorithmically Determined Groups -- 6.2.2 Types of Group Privacy: "Their" Privacy and "Its" Privacy -- 6.2.3 Distinguishing Between Types and Levels of Privacy -- 6.3 Contemporary Practices That Influence the Privacy of Multiple Actors or Groups -- 6.4 Dynamics of Multi-stakeholder Privacy Decision-Making -- 6.5 Tensions Between Privacy Rights of Individuals Versus Groups -- 6.6 Recommendations for Tools and Mechanisms to Protect Privacy Beyond the Individual Level -- 6.7 Conclusion -- References -- Part II Domains -- 7 Social Media and Privacy -- 7.1 Introduction -- 7.2 A Brief History of Social Media -- 7.3 Privacy Challenges in Social Media -- 7.3.1 Information Disclosure/Control over Who Sees What -- 7.3.2 Unique Considerations for Managing Disclosures Within Social Media -- 7.3.3 Reputation Management Through Self-Presentation -- 7.3.4 Access to Oneself -- 7.3.5 Privacy Paradox -- 7.4 Reconceptualizing Social Media Privacy as Boundary Regulation -- 7.4.1 Boundary Regulation on Social Media -- 7.4.2 Coping with Social Media Privacy Violations -- 7.5 Addressing Privacy Challenges -- 7.5.1 Understanding People and Their Privacy Concerns -- 7.5.2 Measuring Privacy Concerns -- 7.5.3 Designing Privacy Features -- 7.5.4 Privacy Concerns and Social Disenfranchisement -- 7.5.5 Guidelines for Designing Privacy-Sensitive Social Media -- 7.6 Chapter Summary -- References |
Title | Modern Socio-Technical Perspectives on Privacy |
URI | https://directory.doabooks.org/handle/20.500.12854/78262 https://library.oapen.org/handle/20.500.12657/52825 https://www.perlego.com/book/5032748/modern-sociotechnical-perspectives-on-privacy-pdf https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=6885922 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783030827861 http://link.overdrive.com/?titleID=10072048&websiteID= |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwEB71cYC9QB-IQFtFiKtXfmwc50pptaC-DlD1ZtmxcwFtqs0C6r_vjOPdgnrjEikZKbHmc8YzY883AB-7ygTZOM580wU2k9IzY0THvBSxwxWP65TMubzS8--zr3fVXa7jHp5yF9PeYTSfdvJHtgEM0qcVJzIETSE8VVxuw66WuNqTP1R_2SRWJM1ZTv0bVOJiqY3O3E6be7He3swMs4qhhCURExOYuOEHWhi0PquB-iDRUCbwgo5UhiXaIHSV7-MSo_r-mQFPq9L5a9iNVKqwB1txsQ-v1g0ayvy_7sP2hftzANOx31mZalNYyqUTMuXNU53lUPaL8ga_6tqHQ7g9P_t2Ome5TQJzSqE3w1rjhG5k57T0QsQ2NjJ6HzFUqnStnWta0TU6hBYx8V7yqnImquhrFbouzIJ6AzuLfhHfQqkcb2p06ohCcqadcj6i_4ImsCWtOlXAh7-UY3__TFu6g_1HuwUcJJ3Z0LtRjG6IlgXo8fH9yKNhidk6421HCeJtJbcItE1A2wR0Accb3dvxhdefryia5dRixxRwmPHI0oorDLbxeblGx6Zx5vOu9uzTqTamaqR8979jeg8vJRVCpGTMEeyslr_iMbonK3-SpiNeb8X8ERxa2mg |
linkProvider | Open Access Publishing in European Networks |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Modern+socio-technical+perspectives+on+privacy&rft.au=Knijnenburg%2C+Bart+P&rft.date=2022-01-01&rft.isbn=9783030827861&rft_id=info:doi/10.1007%2F978-3-030-82786-1&rft.externalDBID=n%2Fa&rft.externalDocID=ODN0010072048 |
thumbnail_l | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fwww.perlego.com%2Fbooks%2FRM_Books%2Fingram_csplus_gexhsuob%2F9783030827861.jpg |
thumbnail_m | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97830308%2F9783030827861.jpg |