{"id":"https://openalex.org/W7114802965","doi":"https://doi.org/10.48550/arxiv.2512.08025","title":"\"Your Privacy is Your Responsibility\": Understanding How Users Collectively Navigate the Complexity of Privacy on Quora","display_name":"\"Your Privacy is Your Responsibility\": Understanding How Users Collectively Navigate the Complexity of Privacy on Quora","publication_year":2025,"publication_date":"2025-12-08","ids":{"openalex":"https://openalex.org/W7114802965","doi":"https://doi.org/10.48550/arxiv.2512.08025"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2512.08025","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.08025","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2512.08025","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Shiri, Varun","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Shiri, Varun","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Xiong, Maggie","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiong, Maggie","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Guo, Jin L. C.","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guo, Jin L. C.","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Cheng, Jinghui","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cheng, Jinghui","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.7922999858856201,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.7922999858856201,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10803","display_name":"Innovative Human-Technology Interaction","score":0.044599998742341995,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.024299999698996544,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.573199987411499},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.5547000169754028},{"id":"https://openalex.org/keywords/position-paper","display_name":"Position paper","score":0.5307000279426575},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.4657000005245209},{"id":"https://openalex.org/keywords/position","display_name":"Position (finance)","score":0.4514000117778778},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.4124999940395355},{"id":"https://openalex.org/keywords/privacy-policy","display_name":"Privacy policy","score":0.41119998693466187}],"concepts":[{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6868000030517578},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.573199987411499},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.5547000169754028},{"id":"https://openalex.org/C78780964","wikidata":"https://www.wikidata.org/wiki/Q7233193","display_name":"Position paper","level":2,"score":0.5307000279426575},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5123000144958496},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.4657000005245209},{"id":"https://openalex.org/C198082294","wikidata":"https://www.wikidata.org/wiki/Q3399648","display_name":"Position (finance)","level":2,"score":0.4514000117778778},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.4124999940395355},{"id":"https://openalex.org/C102938260","wikidata":"https://www.wikidata.org/wiki/Q1999831","display_name":"Privacy policy","level":3,"score":0.41119998693466187},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.3813000023365021},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3409999907016754},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.33070001006126404},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.3147999942302704},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2930000126361847},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.28369998931884766},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.28130000829696655},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.2766000032424927},{"id":"https://openalex.org/C67497173","wikidata":"https://www.wikidata.org/wiki/Q977345","display_name":"Legal aspects of computing","level":3,"score":0.2508000135421753}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2512.08025","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.08025","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2512.08025","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.08025","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0],"the":[1,76,95,98,146],"current":[2],"technology":[3,35],"environment,":[4],"users":[5,44],"are":[6,60],"often":[7],"in":[8,123],"a":[9,66],"vulnerable":[10],"position":[11],"when":[12],"it":[13],"comes":[14],"to":[15,21,39,42,117],"protecting":[16],"their":[17],"privacy.":[18],"Previous":[19],"efforts":[20,122],"promote":[22],"privacy":[23,71,79,107],"protection":[24,83],"have":[25],"largely":[26],"focused":[27],"on":[28,62],"top-down":[29],"approaches":[30],"such":[31],"as":[32],"regulation":[33],"and":[34,56,81,87,90,102,133,138,140,143],"design,":[36],"missing":[37],"opportunities":[38],"understand":[40],"how":[41,57],"empower":[43],"through":[45],"bottom-up,":[46],"collective":[47,121],"approaches.":[48],"Our":[49,92],"paper":[50],"addresses":[51],"this":[52],"by":[53,75],"analyzing":[54],"what":[55],"privacy-related":[58,131],"topics":[59,72],"discussed":[61],"Quora.":[63],"We":[64],"identified":[65],"wide":[67],"range":[68],"of":[69],"interconnected":[70],"brought":[73],"up":[74],"users,":[77],"including":[78],"risks":[80],"dangers,":[82],"strategies,":[84],"organizational":[85],"practices,":[86],"existing":[88],"laws":[89],"regulations.":[91],"results":[93],"highlight":[94],"interplay":[96],"among":[97],"individual,":[99],"technological,":[100],"organizational,":[101],"societal":[103],"factors":[104],"affecting":[105],"users'":[106,120,129],"attitudes.":[108],"Moreover,":[109],"we":[110],"provide":[111],"implications":[112],"for":[113],"designing":[114],"community-based":[115],"tools":[116,126],"better":[118],"support":[119],"navigating":[124],"privacy,":[125],"that":[127],"incorporate":[128],"diverse":[130],"behaviors":[132],"preferences,":[134],"simplify":[135],"information":[136],"access":[137],"sharing,":[139],"connect":[141],"designers":[142],"developers":[144],"with":[145],"user":[147],"community.":[148]},"counts_by_year":[],"updated_date":"2025-12-11T23:13:37.075516","created_date":"2025-12-11T00:00:00"}
