Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work &Amp; Social Computing 2016
DOI: 10.1145/2818048.2819941
|View full text |Cite
|
Sign up to set email alerts
|

Examining American and Chinese Internet Users' Contextual Privacy Preferences of Behavioral Advertising

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

4
13
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(17 citation statements)
references
References 37 publications
4
13
0
Order By: Relevance
“…Their estimated mean RSeBIS score is lower by about 9 than that of the American participants. Our results align with previous work that shows that Asian users are likely to be less concerned about online privacy, to exhibit less private behavior online, and not to use phone lockingmechanisms, than their western counterparts (e.g., [22,29,35,53]).…”
Section: Culturesupporting
confidence: 91%
See 2 more Smart Citations
“…Their estimated mean RSeBIS score is lower by about 9 than that of the American participants. Our results align with previous work that shows that Asian users are likely to be less concerned about online privacy, to exhibit less private behavior online, and not to use phone lockingmechanisms, than their western counterparts (e.g., [22,29,35,53]).…”
Section: Culturesupporting
confidence: 91%
“…Cross-cultural studies in the area of computer security and privacy studied the differences in privacy concerns and behavior between different cultures and explored the reasons underlying these differences (e.g., [2,3,12,32,53,57]). For example, Almakrami compared the self-disclosure practices of Saudis on Facebook with those of Australians [2].…”
Section: Culture In Computer Security and Privacymentioning
confidence: 99%
See 1 more Smart Citation
“…Perhaps the most common-sense understanding of privacy in the literature is that it is about the ability to control the flow of personal data. Often attributed to legal scholar Alan Westin (1967), this notion is articulated in various ways, including the extent to which individuals, groups, or institutions may control when, how, and to what extent information about them is: shared with others (Tang et al 2011), known to others (Wang et al 2016), or communicated to others (Page et al 2013). The control thesis may also be applied to how information and its visibility is limited (Shoemaker andInkpen 2001, Williamson et al 2010), filtered (Smith et al 2012), directed (Gorm and Shklovski 2016), or used (Karat et al 2006).…”
Section: Privacy In (Some Of) the Design Literaturementioning
confidence: 99%
“…These studies do not explicitly specify "privacy expectation" in the study. Some of the studies elicit users' privacy preferences (Olson et al, 2005;Leon et al, 2013;Wang et al, 2016;Naeini et al, 2017). By measuring preferences, they may be implicitly measuring privacy expectation in the desired sense.…”
Section: Empirical Studies On Privacy Expectationmentioning
confidence: 99%