Privacy dark patterns in identity management
dc.contributor.author | Fritsch, Lothar | |
dc.contributor.editor | Fritsch, Lothar | |
dc.contributor.editor | Roßnagel, Heiko | |
dc.contributor.editor | Hühnlein, Detlef | |
dc.date.accessioned | 2017-08-28T23:20:01Z | |
dc.date.available | 2017-08-28T23:20:01Z | |
dc.date.issued | 2017 | |
dc.description.abstract | This article presents three privacy dark patterns observed in identity management. Dark patterns are software design patterns that intentionally violate requirements, in the given case privacy requirements for identity management. First, the theoretical background is presented, and then next, the observed patterns are documented, described and formalized. The resulting dark patterns show how security is used as obfuscation of data collection, how the seemingly harmless collection of additional data is advertised to end users, and how the use of anonymization technology is actively discouraged by service providers. | en |
dc.identifier.isbn | 978-3-88579-671-8 | |
dc.identifier.pissn | 1617-5468 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik, Bonn | |
dc.relation.ispartof | Open Identity Summit 2017 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-277 | |
dc.subject | privacy patterns | |
dc.subject | dark patterns | |
dc.subject | identity management | |
dc.subject | identity attribute extraction | |
dc.subject | dark patterns | |
dc.subject | GDPR | |
dc.title | Privacy dark patterns in identity management | en |
gi.citation.endPage | 104 | |
gi.citation.startPage | 93 | |
gi.conference.date | 5.-6. October 2017 | |
gi.conference.location | Karlstad, Sweden | |
gi.conference.sessiontitle | Regular Research Papers |
Dateien
Originalbündel
1 - 1 von 1