Research on the privacy paradox shows that ICT users have serious concerns about their online privacy but often do not behave accordingly. Most insights, however, are based on research among lay users. It is unclear whether users with high expertise on online privacy and cybersecurity would show similar discrepancies between concerns and behavior. We therefore interviewed 20 privacy and cybersecurity experts about their views on online privacy regarding mobile apps. Despite their technical knowledge, results showed that the experts’ perceptions and reported behaviors resembled those of lay users. A lack of specialized knowledge therefore does not seem to be a plausible explanation for the privacy paradox among mobile app users
In this exploratory study we investigate the attitudes and influential factors of users' tendency to...
In opinion polls, the public frequently claim to value their privacy. However, individuals often see...
Smartphones contain a myriad of personal information and, due to their ubiquity and the possibility ...
Research shows that people's use of computers and mobile phones is often characterized by a privacy ...
Research shows that people's use of computers and mobile phones is often characterized by a privacy ...
Research shows that people's use of computers and mobile phones is often characterized by a privacy ...
Research shows that people's use of computers and mobile phones is often characterized by a privacy ...
Also known as the privacy paradox, recent research on online behavior has revealed discrepancies bet...
Human-Computer Interaction looks to better understand the relationship between people and computers....
Human-Computer Interaction looks to better understand the relationship between people and computers....
In opinion polls, the public frequently claim to value their privacy. However, individuals often see...
Individuals' privacy has become an essential theme to be addressed in today's growing digital world"...
In this exploratory study, we investigate the factors affecting two opposite types of online privacy...
We explore mobile privacy through a survey and through usability evaluation of three privacy-preserv...
In this exploratory study we investigate the attitudes and influential factors of users' tendency to...
In this exploratory study we investigate the attitudes and influential factors of users' tendency to...
In opinion polls, the public frequently claim to value their privacy. However, individuals often see...
Smartphones contain a myriad of personal information and, due to their ubiquity and the possibility ...
Research shows that people's use of computers and mobile phones is often characterized by a privacy ...
Research shows that people's use of computers and mobile phones is often characterized by a privacy ...
Research shows that people's use of computers and mobile phones is often characterized by a privacy ...
Research shows that people's use of computers and mobile phones is often characterized by a privacy ...
Also known as the privacy paradox, recent research on online behavior has revealed discrepancies bet...
Human-Computer Interaction looks to better understand the relationship between people and computers....
Human-Computer Interaction looks to better understand the relationship between people and computers....
In opinion polls, the public frequently claim to value their privacy. However, individuals often see...
Individuals' privacy has become an essential theme to be addressed in today's growing digital world"...
In this exploratory study, we investigate the factors affecting two opposite types of online privacy...
We explore mobile privacy through a survey and through usability evaluation of three privacy-preserv...
In this exploratory study we investigate the attitudes and influential factors of users' tendency to...
In this exploratory study we investigate the attitudes and influential factors of users' tendency to...
In opinion polls, the public frequently claim to value their privacy. However, individuals often see...
Smartphones contain a myriad of personal information and, due to their ubiquity and the possibility ...