Order of control and perceived control over personal information

Yefim Shulman*, Thao Ngo, Joachim Meyer

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Focusing on personal information disclosure, we apply control theory and the notion of the Order of Control to study people’s understanding of the implications of information disclosure and their tendency to consent to disclosure. We analyzed the relevant literature and conducted a preliminary online study (N = 220) to explore the relationship between the Order of Control and perceived control over personal information. Our analysis of existing research suggests that the notion of the Order of Control can help us understand people’s decisions regarding the control over their personal information. We discuss limitations and future directions for research regarding the application of the idea of the Order of Control to online privacy.

Original languageEnglish
Title of host publicationPrivacy and Identity Management. Data for Better Living
Subtitle of host publicationAI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Revised Selected Papers
EditorsMichael Friedewald, Melek Önen, Eva Lievens, Stephan Krenn, Samuel Fricker
PublisherSpringer
Pages359-375
Number of pages17
ISBN (Print)9783030425036
DOIs
StatePublished - 2020
Event14th IFIP International Summer School on Privacy and Identity Management, 2019 - Windisch, Switzerland
Duration: 19 Aug 201923 Aug 2019

Publication series

NameIFIP Advances in Information and Communication Technology
Volume576 LNCS
ISSN (Print)1868-4238
ISSN (Electronic)1868-422X

Conference

Conference14th IFIP International Summer School on Privacy and Identity Management, 2019
Country/TerritorySwitzerland
CityWindisch
Period19/08/1923/08/19

Keywords

  • Order of Control
  • Perceived information control
  • Personal information disclosure
  • Privacy

Fingerprint

Dive into the research topics of 'Order of control and perceived control over personal information'. Together they form a unique fingerprint.

Cite this