Login / Signup
Perceived Privacy Violations through Unauthorized secondary Use - Diving into Users' Perceptions and responses.
Christina Wagner
Manuel Trenz
Chee-Wee Tan
Daniel Veit
Published in:
ECIS (2023)
Keyphrases
</>
privacy violations
user perceptions
user satisfaction
end users
private information
user interface
user profiles
data sets
recommender systems
user interaction
collaborative filtering
data collection
rapid growth
personal data
individual privacy