Skip to Main content Skip to Navigation
New interface
Conference papers

How to Protect My Privacy? - Classifying End-User Information Privacy Protection Behaviors

Abstract : The Internet and smart devices pose many risks at users’ information privacy. Individuals are aware of that and try to counter tracking activities by applying different privacy protection behaviors. These are manifold and differ in scope, goal and degree of technology utilization. Although there is a lot of literature which investigates protection strategies, it is lacking holistic user-centric classifications.We review literature and identify 141 privacy protection behaviors end-users show. We map these results to 38 distinct categories and apply hybrid cart sorting to create a taxonomy, which we call the “End-User Information Privacy Protection Behavior Model” (EIPPBM).
Document type :
Conference papers
Complete list of metadata
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Thursday, October 14, 2021 - 5:48:02 PM
Last modification on : Wednesday, November 3, 2021 - 8:14:30 AM
Long-term archiving on: : Saturday, January 15, 2022 - 7:55:22 PM


 Restricted access
To satisfy the distribution rights of the publisher, the document is embargoed until : 2023-01-01

Please log in to resquest access to the document


Distributed under a Creative Commons Attribution 4.0 International License



Frank Ebbers. How to Protect My Privacy? - Classifying End-User Information Privacy Protection Behaviors. 14th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2019, Windisch, Switzerland. pp.327-342, ⟨10.1007/978-3-030-42504-3_21⟩. ⟨hal-03378956⟩



Record views