{"id":50,"date":"2018-01-10T17:38:40","date_gmt":"2018-01-10T17:38:40","guid":{"rendered":"http:\/\/mobileprivacy.umd.edu\/?page_id=50"},"modified":"2023-08-04T14:38:05","modified_gmt":"2023-08-04T14:38:05","slug":"publications","status":"publish","type":"page","link":"http:\/\/3.85.109.143\/index.php\/publications\/","title":{"rendered":""},"content":{"rendered":"<h3><strong>Below are articles published and presentations by research team members on topics related to mobile privacy since 2016.<br \/>\n<\/strong><\/h3>\n<h2><strong>Articles<\/strong><\/h2>\n<div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p><strong>Vitak, J.<\/strong>,<strong> Kumar, P., Liao, Y., &amp; Zimmer, M<\/strong>. (2023). Boundary regulation processes and privacy concerns with (non-)use of voice-based assistants. <em>Human Machine Communication, 6<\/em>, 185-204<em>.<\/em> <a href=\"https:\/\/doi.org\/10.30658\/hmc.6.10\">https:\/\/doi.org\/10.30658\/hmc.6.10<\/a>\u00a0 [open access<a href=\"https:\/\/doi.org\/10.30658\/hmc.6.10\">]<\/a><\/p>\n<p><strong>Vitak, J., Liao, Y., Mols, A., D., Zimmer, M., Kumar, P. C., &amp; Pridmore, J.<\/strong> (2023). When does data collection and use become a matter of concern? A cross-cultural comparison of American and Dutch people\u2019s privacy attitudes. <em>International Journal of Communication, 17<\/em>, 471-498. <a href=\"https:\/\/ijoc.org\/index.php\/ijoc\/article\/view\/19391%20\">https:\/\/ijoc.org\/index.php\/ijoc\/article\/view\/19391\u00a0<\/a> [open access]\n<\/div>\n<p><strong>Zimmer, M., Vitak, J.<\/strong>, &amp; Wu, P. (2020). Editorial introduction: &#8220;Information privacy in the digital age&#8221; [Special Issue]. <em>Journal of the Association for Information Science and Technology, 71<\/em>(9), 997-1001. <a href=\"https:\/\/doi.org\/10.1002\/asi.24394\">https:\/\/doi.org\/10.1002\/asi.24394\u00a0<\/a> [<a href=\"_wp_link_placeholder\" data-wplink-edit=\"true\">pdf<\/a>]\n<\/div>\n<p><strong>Zimmer, M., Kumar, P., Vitak, J., Liao, Y., &amp; Chamberlain Kritikos, K.<\/strong> (2020). \u2018There\u2019s nothing really they can do with this information\u2019: Unpacking how users manage privacy boundaries for personal fitness information. <em>Information, Communication &amp; Society<\/em>,<em> 23<\/em>(7), 1020-1037. <a href=\"https:\/\/doi.org\/10.1080\/1369118X.2018.1543442\">https:\/\/doi.org\/10.1080\/1369118X.2018.1543442<\/a>\u00a0 <a href=\"https:\/\/doi.org\/10.1080\/1369118X.2018.1543442\">[<\/a><a href=\"https:\/\/mobileprivacy.umd.edu\/wp-content\/uploads\/2019\/01\/Zimmer_etal-2018-ICS.pdf\">pdf<\/a><a href=\"https:\/\/doi.org\/10.1080\/1369118X.2018.1543442\">]<\/a><\/p>\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>Wu, P. F., <strong>Vitak, J., &amp; Zimmer, M. T<\/strong>. (2019). A contextual approach to information privacy research. <em>Journal of the Association for Information Science and Technology, 71<\/em>(4), 785-790. <a href=\"https:\/\/doi.org\/10.1002\/asi.24232\">https:\/\/doi.org\/10.1002\/asi.24232 <\/a> [<a href=\"https:\/\/mobileprivacy.umd.edu\/wp-content\/uploads\/2019\/11\/Wu_etal-2019-JASIST-privacy.pdf\">pdf<\/a>]\n<p><strong>Liao, Y., Vitak, J., Kumar, P., Zimmer, M., &amp; Kritikos, K.<\/strong> (2019). Understanding the role of privacy and trust in intelligent personal assistant adoption. <em>Proceedings of the 13th Annual iConference, Lecture Notes in Computer Science, volume 11420<\/em> (pp. 102-113). https:\/\/doi.org\/10.1007\/978-3-030-15742-5_9 [<a href=\"https:\/\/mobileprivacy.umd.edu\/wp-content\/uploads\/2019\/01\/Liao_etal-2019-iconference.pdf\">pdf<\/a>]\n<p><strong>Pridmore, J., Zimmer, M., Vitak, J., Mols, A., Trottier, D., Kumar, P., &amp; Liao, Y.<\/strong> (2019). Intelligent personal assistants and the article intercultural negotiations of dataveillance in platformed households. <em>Surveillance &amp; Society, 17(1\/2), 125-131<\/em>. https:\/\/doi.org\/10.24908\/ss.v17i1\/2.12936 [<a href=\"https:\/\/mobileprivacy.umd.edu\/wp-content\/uploads\/2019\/11\/Pridmore_etal-2019-SurveillanceSociety-PDFA.pdf\">pdf<\/a>]\n<p><strong>Pridmore, J., Mols,\u00a0A.,\u00a0<\/strong>Wang, Y., &amp; Holleman, F. (2018). Keeping an Eye on the Neighbours. The Police Journal. DOI: 10.1177\/0032258X18768397 [<a href=\"https:\/\/mobileprivacy.umd.edu\/wp-content\/uploads\/2018\/06\/Keeping-an-eye-on-the-neighbours-Pridmore-Mols-Wang-Holleman.pdf\">pdf<\/a>]\n<\/div>\n<\/div>\n<\/div>\n<p><strong>Vitak, J., Liao, Y., Kumar, P., Zimmer, M., <\/strong>&amp;<strong> Kritikos, K.<\/strong> (2018). Privacy attitudes and data valuation among fitness tracker users. Proceedings of the 13th Annual iConference. [<a href=\"http:\/\/mobileprivacy.umd.edu\/wp-content\/uploads\/2018\/01\/Fitbit-privacy-2018-final-iconf-edits-Dec10.pdf\">pdf<\/a>]\n<p>Dogruel, L., Joeckel, S., &amp; <strong>Vitak, J. <\/strong>(2017). The valuation of privacy premium features for smartphone apps: The influence of defaults and experts. <em>Computers in Human Behavior, 77, <\/em>230-239. <a href=\"https:\/\/doi.org\/10.1016\/j.chb.2017.08.035\">https:\/\/doi.org\/10.1016\/j.chb.2017.08.035<\/a><\/p>\n<h2><strong>Presentations<\/strong><\/h2>\n<p><strong>Liao, Y., Mols, A., Vitak, J., Michael, Z., Daniel, T., Kumar, P., &amp; Pridmore, J.<\/strong> (2020, May). When does data collection and use become a matter of concern? A cross cultural comparison of American and Dutch people\u2019s privacy attitudes. [Virtual] presentation at the 70th Annual International Communication Association (ICA) Conference, Gold Coast, Australia. [<a href=\"https:\/\/youtu.be\/epsSzbrEbS8\">Youtube<\/a>]\n<p><strong>Vitak, J., Kumar, P., Liao, Y., &amp; Zimmer, M.<\/strong> (2020, May). Feature creep or just plain creepy? How advances in \u201csmart\u201d technologies affect attitudes toward data privacy. [Virtual] presentation at the 70th Annual International Communication Association (ICA) Conference, Gold Coast, Australia. [<a href=\"https:\/\/youtu.be\/wyaimvC-IeQ\">Youtube<\/a>]\n<p><strong>Zimmer, M. Kritikos, K.C., Vitak, J., Kumar, P, &amp; Liao, Y.<\/strong> (2018, October). <em>Privacy boundaries and information flow solipsism in the personal fitness information ecosystem.<\/em> Presentation at the Association of Internet Researchers Annual Conference<em>,<\/em> Montreal, Quebec, Canada. [<a href=\"https:\/\/mobileprivacy.umd.edu\/wp-content\/uploads\/2019\/11\/AoIR-2018-Abstract-for-sharing.pdf\">pdf<\/a>]\n<p><strong>Mols, A., &amp; Pridmore, J.<\/strong> (2018).\u00a0<em>\u201cWork and personal life, they just blur together\u201d: Messaging apps and the amplification of workplace surveillance and context collapse.<\/em> Presentation at Surveillance and Society (SSN) Conference, Aarhus, Denmark. [<a href=\"https:\/\/mobileprivacy.umd.edu\/wp-content\/uploads\/2018\/06\/SSN-2018-Mols-Pridmore-presentation.pdf\">pdf of slides<\/a>]\n<p><strong>Vitak, J., Liao, Y., Kumar, P., Zimmer, M., &amp; Kritikos, K.C.<\/strong> (2018, May). <em>\u201cFitness stuff is for me, not for everybody else\u201d: Unpacking how fitness tracker users manage privacy boundaries for personal fitness information.<\/em> Presentation at the Information Ethics Roundtable, Copenhagen, Denmark. [<a href=\"https:\/\/mobileprivacy.umd.edu\/wp-content\/uploads\/2018\/06\/UMich-talk-privacy-security-ethics-data-collection-March2018.pdf\">ppt of slides<\/a>]\n<p><strong>Pridmore, J., &amp; Mols, A.<\/strong> (2018). <em>Personal choices and the production of situated data: Privacy negotiations and concerns with home communicative devices.<\/em> Presentation at the Big Data Surveillance Workshop, Stirling, Scotland. [<a href=\"https:\/\/mobileprivacy.umd.edu\/wp-content\/uploads\/2018\/06\/Keeping-an-eye-on-the-neighbours-Pridmore-Mols-Wang-Holleman.pdf\">pdf of slides<\/a>]\n<p><strong>Vitak, J.<\/strong> (2018). <em>\u201cWhere&#8217;s my data going? Privacy, security, and ethical challenges in the era of ubiquitous data collection.<\/em> Michigan Interactive and Social Computing, University of Michigan, Ann Arbor, MI, March 23, 2018 [<a href=\"https:\/\/mobileprivacy.umd.edu\/wp-content\/uploads\/2018\/06\/UMich-talk-privacy-security-ethics-data-collection-March2018.pdf\">pdf of slides<\/a>]\n<p><strong>Zimmer, M., Kumar, P., Vitak, J., Liao, Y., &amp; Kritikos, K.<\/strong> (2018, May). <em>\u201cThere\u2019s nothing really they can do with this information\u201d: Unpacking how users manage privacy boundaries for personal fitness information.<\/em> Paper presented at the 68th International Communication Association Conference, Prague, Czech Republic. [<a href=\"https:\/\/mobileprivacy.umd.edu\/wp-content\/uploads\/2018\/06\/ICA2018-fitbit-presentation.pdf\">pdf of slides<\/a>]\n<p><strong>Mols, A.,\u00a0 Pridmore, J., &amp;\u00a0Trottier, D<\/strong>. (2017).\u00a0<em>Watching our neighbours: The negotiation of privacy in neighbourhoods.<b>\u00a0<\/b><\/em>Presentation at TILTing conference, Tilburg University, Tilburg, The Netherlands. [<a href=\"https:\/\/mobileprivacy.umd.edu\/wp-content\/uploads\/2018\/06\/TILTing-presentation-2017-.pdf\">pdf of slides<\/a>]\n<p><strong>Mols, A., &amp; Pridmore, J.<\/strong> (2017). <em>Citizens, safety and the precariousness of digital community initiatives.<\/em>\u00a0 Presentation at 4S Conference, Boston, MA. [<a href=\"https:\/\/mobileprivacy.umd.edu\/wp-content\/uploads\/2018\/06\/Mols-Pridmore-4S-2017-presentation.pdf\">pdf of slides<\/a>]\n","protected":false},"excerpt":{"rendered":"<p>Below are articles published and presentations by research team members on topics related to mobile privacy since 2016. Articles Vitak, J., Kumar, P., Liao, Y., &amp; Zimmer, M. (2023). Boundary regulation processes and privacy concerns with (non-)use of voice-based assistants. Human Machine Communication, 6, 185-204. https:\/\/doi.org\/10.30658\/hmc.6.10\u00a0 [open access] Vitak, J., Liao, Y., Mols, A., D., [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-50","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>- Mapping Privacy Surveillance Dynamics in Mobile Ecosystems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mobileprivacy.umd.edu\/index.php\/publications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"- Mapping Privacy Surveillance Dynamics in Mobile Ecosystems\" \/>\n<meta property=\"og:description\" content=\"Below are articles published and presentations by research team members on topics related to mobile privacy since 2016. Articles Vitak, J., Kumar, P., Liao, Y., &amp; Zimmer, M. (2023). Boundary regulation processes and privacy concerns with (non-)use of voice-based assistants. Human Machine Communication, 6, 185-204. https:\/\/doi.org\/10.30658\/hmc.6.10\u00a0 [open access] Vitak, J., Liao, Y., Mols, A., D., [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mobileprivacy.umd.edu\/index.php\/publications\/\" \/>\n<meta property=\"og:site_name\" content=\"Mapping Privacy Surveillance Dynamics in Mobile Ecosystems\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-04T14:38:05+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mobileprivacy.umd.edu\\\/index.php\\\/publications\\\/\",\"url\":\"https:\\\/\\\/www.mobileprivacy.umd.edu\\\/index.php\\\/publications\\\/\",\"name\":\"- Mapping Privacy Surveillance Dynamics in Mobile Ecosystems\",\"isPartOf\":{\"@id\":\"http:\\\/\\\/10.0.102.187\\\/#website\"},\"datePublished\":\"2018-01-10T17:38:40+00:00\",\"dateModified\":\"2023-08-04T14:38:05+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mobileprivacy.umd.edu\\\/index.php\\\/publications\\\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"http:\\\/\\\/10.0.102.187\\\/#website\",\"url\":\"http:\\\/\\\/10.0.102.187\\\/\",\"name\":\"Mapping Privacy Surveillance Dynamics in Mobile Ecosystems\",\"description\":\"\",\"publisher\":{\"@id\":\"http:\\\/\\\/10.0.102.187\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\\\/\\\/10.0.102.187\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"http:\\\/\\\/10.0.102.187\\\/#organization\",\"name\":\"Mapping Privacy Surveillance Dynamics in Mobile Ecosystems\",\"url\":\"http:\\\/\\\/10.0.102.187\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\\\/\\\/10.0.102.187\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"http:\\\/\\\/3.85.109.143\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/phone-with-project-name-uni-logos-1.png\",\"contentUrl\":\"http:\\\/\\\/3.85.109.143\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/phone-with-project-name-uni-logos-1.png\",\"width\":628,\"height\":398,\"caption\":\"Mapping Privacy  Surveillance Dynamics in Mobile Ecosystems\"},\"image\":{\"@id\":\"http:\\\/\\\/10.0.102.187\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"- Mapping Privacy Surveillance Dynamics in Mobile Ecosystems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mobileprivacy.umd.edu\/index.php\/publications\/","og_locale":"en_US","og_type":"article","og_title":"- Mapping Privacy Surveillance Dynamics in Mobile Ecosystems","og_description":"Below are articles published and presentations by research team members on topics related to mobile privacy since 2016. Articles Vitak, J., Kumar, P., Liao, Y., &amp; Zimmer, M. (2023). Boundary regulation processes and privacy concerns with (non-)use of voice-based assistants. Human Machine Communication, 6, 185-204. https:\/\/doi.org\/10.30658\/hmc.6.10\u00a0 [open access] Vitak, J., Liao, Y., Mols, A., D., [&hellip;]","og_url":"https:\/\/www.mobileprivacy.umd.edu\/index.php\/publications\/","og_site_name":"Mapping Privacy Surveillance Dynamics in Mobile Ecosystems","article_modified_time":"2023-08-04T14:38:05+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.mobileprivacy.umd.edu\/index.php\/publications\/","url":"https:\/\/www.mobileprivacy.umd.edu\/index.php\/publications\/","name":"- Mapping Privacy Surveillance Dynamics in Mobile Ecosystems","isPartOf":{"@id":"http:\/\/10.0.102.187\/#website"},"datePublished":"2018-01-10T17:38:40+00:00","dateModified":"2023-08-04T14:38:05+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mobileprivacy.umd.edu\/index.php\/publications\/"]}]},{"@type":"WebSite","@id":"http:\/\/10.0.102.187\/#website","url":"http:\/\/10.0.102.187\/","name":"Mapping Privacy Surveillance Dynamics in Mobile Ecosystems","description":"","publisher":{"@id":"http:\/\/10.0.102.187\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/10.0.102.187\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"http:\/\/10.0.102.187\/#organization","name":"Mapping Privacy Surveillance Dynamics in Mobile Ecosystems","url":"http:\/\/10.0.102.187\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/10.0.102.187\/#\/schema\/logo\/image\/","url":"http:\/\/3.85.109.143\/wp-content\/uploads\/2017\/08\/phone-with-project-name-uni-logos-1.png","contentUrl":"http:\/\/3.85.109.143\/wp-content\/uploads\/2017\/08\/phone-with-project-name-uni-logos-1.png","width":628,"height":398,"caption":"Mapping Privacy  Surveillance Dynamics in Mobile Ecosystems"},"image":{"@id":"http:\/\/10.0.102.187\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"http:\/\/3.85.109.143\/index.php\/wp-json\/wp\/v2\/pages\/50","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/3.85.109.143\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/3.85.109.143\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/3.85.109.143\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/3.85.109.143\/index.php\/wp-json\/wp\/v2\/comments?post=50"}],"version-history":[{"count":20,"href":"http:\/\/3.85.109.143\/index.php\/wp-json\/wp\/v2\/pages\/50\/revisions"}],"predecessor-version":[{"id":158,"href":"http:\/\/3.85.109.143\/index.php\/wp-json\/wp\/v2\/pages\/50\/revisions\/158"}],"wp:attachment":[{"href":"http:\/\/3.85.109.143\/index.php\/wp-json\/wp\/v2\/media?parent=50"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}