IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v13y2021i2p23-d484724.html
   My bibliography  Save this article

Identifying Privacy Related Requirements for the Design of Self-Adaptive Privacy Protections Schemes in Social Networks

Author

Listed:
  • Angeliki Kitsiou

    (Privacy Engineering and Social Informatics Laboratory, Department of Cultural Technology and Communication, University of the Aegean, GR 81100 Lesvos, Greece)

  • Eleni Tzortzaki

    (Information and Communication Systems Security Laboratory, Deptartment of Information and Communication Systems Engineering, University of the Aegean, GR 83200 Samos, Greece)

  • Christos Kalloniatis

    (Privacy Engineering and Social Informatics Laboratory, Department of Cultural Technology and Communication, University of the Aegean, GR 81100 Lesvos, Greece)

  • Stefanos Gritzalis

    (Laboratory of Systems Security, Department of Digital Systems, University of Piraeus, GR 18532 Piraeus, Greece)

Abstract

Social Networks (SNs) bring new types of privacy risks threats for users; which developers should be aware of when designing respective services. Aiming at safeguarding users’ privacy more effectively within SNs, self-adaptive privacy preserving schemes have been developed, considered the importance of users’ social and technological context and specific privacy criteria that should be satisfied. However, under the current self-adaptive privacy approaches, the examination of users’ social landscape interrelated with their privacy perceptions and practices, is not thoroughly considered, especially as far as users’ social attributes concern. This study, aimed at elaborating this examination in depth, in order as to identify the users’ social characteristics and privacy perceptions that can affect self-adaptive privacy design, as well as to indicate self-adaptive privacy related requirements that should be satisfied for users’ protection in SNs. The study was based on an interdisciplinary research instrument, adopting constructs and metrics from both sociological and privacy literature. The results of the survey lead to a pilot taxonomic analysis for self-adaptive privacy within SNs and to the proposal of specific privacy related requirements that should be considered for this domain. For further establishing of our interdisciplinary approach, a case study scenario was formulated, which underlines the importance of the identified self-adaptive privacy related requirements. In this regard, the study provides further insight for the development of the behavioral models that will enhance the optimal design of self-adaptive privacy preserving schemes in SNs, as well as designers to support the principle of PbD from a technical perspective.

Suggested Citation

  • Angeliki Kitsiou & Eleni Tzortzaki & Christos Kalloniatis & Stefanos Gritzalis, 2021. "Identifying Privacy Related Requirements for the Design of Self-Adaptive Privacy Protections Schemes in Social Networks," Future Internet, MDPI, vol. 13(2), pages 1-25, January.
  • Handle: RePEc:gam:jftint:v:13:y:2021:i:2:p:23-:d:484724
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/13/2/23/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/13/2/23/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Rajagopal, 2014. "The Human Factors," Palgrave Macmillan Books, in: Architecting Enterprise, chapter 9, pages 225-249, Palgrave Macmillan.
    2. Nicky J. Welton & Howard H. Z. Thom, 2015. "Value of Information," Medical Decision Making, , vol. 35(5), pages 564-566, July.
    3. Hongliang Chen & Christopher E. Beaudoin & Traci Hong, 2016. "Teen online information disclosure: Empirical testing of a protection motivation and social capital model," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 67(12), pages 2871-2881, December.
    4. Naresh K. Malhotra & Sung S. Kim & James Agarwal, 2004. "Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model," Information Systems Research, INFORMS, vol. 15(4), pages 336-355, December.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Angeliki Kitsiou & Charikleia Despotidi & Christos Kalloniatis & Stefanos Gritzalis, 2022. "The Role of Users’ Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study," Future Internet, MDPI, vol. 14(11), pages 1-31, November.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Ribeiro-Navarrete, Samuel & Saura, Jose Ramon & Palacios-Marqués, Daniel, 2021. "Towards a new era of mass data collection: Assessing pandemic surveillance technologies to preserve user privacy," Technological Forecasting and Social Change, Elsevier, vol. 167(C).
    2. Ae-Ri Lee, 2021. "Investigating the Personalization–Privacy Paradox in Internet of Things (IoT) Based on Dual-Factor Theory: Moderating Effects of Type of IoT Service and User Value," Sustainability, MDPI, vol. 13(19), pages 1-27, September.
    3. Jun Ge & Mincheol Kang & Tegegne Tesfaye Haile, 2021. "Users' Continuance Intention to Use a Mobile Application: Adapting Store Personality as Application Personality," International Journal of Asian Business and Information Management (IJABIM), IGI Global, vol. 12(3), pages 133-155, July.
    4. Morlok, Tina & Matt, Christian & Hess, Thomas, 2017. "Privatheitsforschung in den Wirtschaftswissenschaften: Entwicklung, Stand und Perspektiven," Working Papers 1/2017, University of Munich, Munich School of Management, Institute for Information Systems and New Media.
    5. Fahad Asmi & Rongting Zhou & Liu Lu, 2017. "E-government Adoption in Developing Countries: Need of Customer-centric Approach: A Case of Pakistan," International Business Research, Canadian Center of Science and Education, vol. 10(1), pages 42-58, January.
    6. Johannes Klumpe & Oliver Francis Koch & Alexander Benlian, 2020. "How pull vs. push information delivery and social proof affect information disclosure in location based services," Electronic Markets, Springer;IIM University of St. Gallen, vol. 30(3), pages 569-586, September.
    7. Aguiar-Castillo Lidia & Rufo-Torres Julio & De Saa-Pérez Petra & Perez-Jimenez Rafael, 2018. "How to Encourage Recycling Behaviour? The Case of WasteApp: A Gamified Mobile Application," Sustainability, MDPI, vol. 10(5), pages 1-20, May.
    8. Federico Iannacci & Colm Fearon & Kristine Pole, 2021. "From Acceptance to Adaptive Acceptance of Social Media Policy Change: a Set-Theoretic Analysis of B2B SMEs," Information Systems Frontiers, Springer, vol. 23(3), pages 663-680, June.
    9. David Schneider & Johannes Klumpe & Martin Adam & Alexander Benlian, 2020. "Nudging users into digital service solutions," Electronic Markets, Springer;IIM University of St. Gallen, vol. 30(4), pages 863-881, December.
    10. María Isabel Palacios-Rangel & Juan Manuel Vargas-Canales & Jorge Aguilar-Ávila & Joaquín Huitzilihuitl Camacho-Vera & Jorge Gustavo Ocampo-Ledesma & Sergio Ernesto Medina-Cuellar, 2018. "Efficiency of small enterprises of protected agriculture in the adoption of innovations in Mexico," Estudios Gerenciales, Universidad Icesi, vol. 34(146), pages 52-62, February.
    11. Federico Mangiò & Daniela Andreini & Giuseppe Pedeliento, 2020. "Hands off my data: users’ security concerns and intention to adopt privacy enhancing technologies," Italian Journal of Marketing, Springer, vol. 2020(4), pages 309-342, December.
    12. Tomu Tominaga & Yoshinori Hijikata & Joseph A. Konstan, 2018. "How self-disclosure in Twitter profiles relate to anonymity consciousness and usage objectives: a cross-cultural study," Journal of Computational Social Science, Springer, vol. 1(2), pages 391-435, September.
    13. Jakob Wirth & Christian Maier & Sven Laumer & Tim Weitzel, 2019. "Perceived information sensitivity and interdependent privacy protection: a quantitative study," Electronic Markets, Springer;IIM University of St. Gallen, vol. 29(3), pages 359-378, September.
    14. Reilly, Allison C. & Baroud, Hiba & Flage, Roger & Gerst, Michael D., 2021. "Sources of uncertainty in interdependent infrastructure and their implications," Reliability Engineering and System Safety, Elsevier, vol. 213(C).
    15. Gupta, Shaphali & Leszkiewicz, Agata & Kumar, V. & Bijmolt, Tammo & Potapov, Dmitriy, 2020. "Digital Analytics: Modeling for Insights and New Methods," Journal of Interactive Marketing, Elsevier, vol. 51(C), pages 26-43.
    16. Chen, Qi & Feng, Yuqiang & Liu, Luning & Tian, Xianyun, 2019. "Understanding consumers’ reactance of online personalized advertising: A new scheme of rational choice from a perspective of negative effects," International Journal of Information Management, Elsevier, vol. 44(C), pages 53-64.
    17. Valentine Weydert & Pierre Desmet & Caroline Lancelot Miltgen, 2019. "Convincing consumers to share personal data: double-edged effect of offering money," Post-Print hal-02566613, HAL.
    18. Joffre, Olivier M. & Poortvliet, P. Marijn & Klerkx, Laurens, 2019. "To cluster or not to cluster farmers? Influences on network interactions, risk perceptions, and adoption of aquaculture practices," Agricultural Systems, Elsevier, vol. 173(C), pages 151-160.
    19. Cheng, Junjun & Chen, Bo & Huang, Zihang, 2023. "Collective-based ad transparency in targeted hotel advertising: Consumers’ regulatory focus underlying the crowd safety effect," Journal of Retailing and Consumer Services, Elsevier, vol. 72(C).
    20. Rahman, Shaikh Moksadur, 2020. "Relationship between Job Satisfaction and Turnover Intention: Evidence from Bangladesh," Asian Business Review, Asian Business Consortium, vol. 10(2), pages 99-108.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:13:y:2021:i:2:p:23-:d:484724. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.