{"id":"https://openalex.org/W4400942840","doi":"https://doi.org/10.7148/2024-0521","title":"Evaluating the effects of nudging and deterrence on users' behavior for privacy-by-design","display_name":"Evaluating the effects of nudging and deterrence on users' behavior for privacy-by-design","publication_year":2024,"publication_date":"2024-06-07","ids":{"openalex":"https://openalex.org/W4400942840","doi":"https://doi.org/10.7148/2024-0521"},"language":"en","primary_location":{"id":"doi:10.7148/2024-0521","is_oa":true,"landing_page_url":"http://dx.doi.org/10.7148/2024-0521","pdf_url":"http://www.scs-europe.net/dlib/2024/ecms2024acceptedpapers/0521_dis_ecms2024_0079.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ECMS 2024 Proceedings edited by Daniel Grzonka, Natalia Rylko, Grazyna Suchacka, Vladimir Mityushev","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://www.scs-europe.net/dlib/2024/ecms2024acceptedpapers/0521_dis_ecms2024_0079.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009067582","display_name":"Mauro Iacono","orcid":"https://orcid.org/0000-0002-2089-975X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mauro Iacono","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5017821211","display_name":"Michele Mastroianni","orcid":"https://orcid.org/0000-0001-6415-1180"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Michele Mastroianni","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5009067582"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18438264,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"521","last_page":"527"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deterrence","display_name":"Deterrence (psychology)","score":0.8473832011222839},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5237876176834106},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5049031376838684},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5029484629631042},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.45076924562454224},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.42570433020591736},{"id":"https://openalex.org/keywords/law-and-economics","display_name":"Law and economics","score":0.20579877495765686},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.17803362011909485}],"concepts":[{"id":"https://openalex.org/C2780982575","wikidata":"https://www.wikidata.org/wiki/Q332142","display_name":"Deterrence (psychology)","level":2,"score":0.8473832011222839},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5237876176834106},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5049031376838684},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5029484629631042},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.45076924562454224},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.42570433020591736},{"id":"https://openalex.org/C190253527","wikidata":"https://www.wikidata.org/wiki/Q295354","display_name":"Law and economics","level":1,"score":0.20579877495765686},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.17803362011909485}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.7148/2024-0521","is_oa":true,"landing_page_url":"http://dx.doi.org/10.7148/2024-0521","pdf_url":"http://www.scs-europe.net/dlib/2024/ecms2024acceptedpapers/0521_dis_ecms2024_0079.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ECMS 2024 Proceedings edited by Daniel Grzonka, Natalia Rylko, Grazyna Suchacka, Vladimir Mityushev","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.7148/2024-0521","is_oa":true,"landing_page_url":"http://dx.doi.org/10.7148/2024-0521","pdf_url":"http://www.scs-europe.net/dlib/2024/ecms2024acceptedpapers/0521_dis_ecms2024_0079.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ECMS 2024 Proceedings edited by Daniel Grzonka, Natalia Rylko, Grazyna Suchacka, Vladimir Mityushev","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.5699999928474426,"id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4400942840.pdf"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2584827882","https://openalex.org/W2538581760","https://openalex.org/W3195097297","https://openalex.org/W3038106605","https://openalex.org/W2513267613","https://openalex.org/W3049084372","https://openalex.org/W2528109871","https://openalex.org/W2940702331","https://openalex.org/W4225340788","https://openalex.org/W4318485713"],"abstract_inverted_index":{"The":[0],"definition":[1],"of":[2,11,42,49,52,58,89,94,189,231,243],"privacy-related":[3,69,183],"specifications":[4,70],"is":[5,15,44,60,71,83,151,194,249],"crucial":[6],"in":[7,31,145,154,207,255],"the":[8,18,36,40,87,92,110,146,155,187,198,256],"design":[9,219,248,257],"process":[10],"any":[12],"system":[13],"which":[14,29,193],"subject":[16],"to":[17,68,103,140,197,210,216,222,238],"GDPR.":[19],"Privacy-related":[20],"requirements":[21,28,34],"can":[22,136,142,203],"be":[23,77,100,119,128,137,143,204,253],"seen":[24],"as":[25,130,214],"qualitative":[26],"non-functional":[27],"result":[30],"additional":[32],"functional":[33],"during":[35],"specification":[37,184],"process.":[38],"As":[39],"application":[41],"GDPR":[43],"basically":[45],"assessed":[46],"by":[47,158],"means":[48],"risk":[50,135,199],"analysis":[51,200,230],"data":[53],"treatments,":[54],"a":[55,65,167,190,232],"quantitative":[56,66],"aspect":[57],"evaluation":[59],"anyway":[61],"needed:":[62],"consequently,":[63],"defining":[64],"approach":[67],"desirable,":[72],"and":[73,91,102,121,149,164,170,185,221,251],"suitable":[74],"tools":[75,98],"should":[76,127,252],"identified":[78],"or":[79],"provided.":[80],"While":[81],"there":[82],"some":[84,104,173],"analogy":[85],"with":[86],"field":[88,93],"security":[90,147],"dependability,":[95],"so":[96],"that":[97,115,240],"might":[99],"somehow":[101],"extent":[105],"borrowed":[106],"from":[107,234],"those":[108],"domains,":[109],"privacy":[111,156,212],"domain":[112,157,201],"also":[113],"requires":[114],"human":[116,125],"factor":[117],"must":[118],"modeled,":[120],"external":[122],"influences":[123],"on":[124,182,245],"factors":[126],"modeled":[129],"well.":[131],"In":[132,175],"this":[133,150,176,180,241],"sense,":[134],"evaluated":[138],"similarly":[139],"what":[141],"done":[144,153],"field,":[148],"actually":[152],"approaches":[159],"like":[160],"DPIA,":[161],"but":[162,202],"nudging":[163],"deterrence":[165],"play":[166],"different":[168],"role":[169],"are":[171],"worth":[172],"reflections.":[174],"paper":[177],"we":[178],"discuss":[179,186],"perspective":[181],"use":[188],"tool,":[191],"Pythia,":[192],"not":[195],"related":[196],"profitably":[205],"used,":[206],"our":[208,235],"opinion,":[209],"define":[211],"policies":[213],"complementary":[215],"privacy-aware":[217,246],"systems":[218,247],"cycles":[220],"assess":[223],"their":[224],"impact.":[225],"We":[226],"present":[227],"an":[228],"improved":[229],"model":[233],"previous":[236],"research":[237],"show":[239],"point":[242],"view":[244],"peculiar":[250],"considered":[254],"processes.":[258]},"counts_by_year":[],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
