Fig. 3From: Making context the central concept in privacy engineeringThe theory of contextual integrity (after Nissenbaum, 2010)Back to article page