973
Views
7
CrossRef citations to date
0
Altmetric
Articles

‘A right to be forgotten’: retrospective privacy concerns in social networking services

, , , &
Pages 829-850 | Received 08 Jan 2021, Accepted 19 Feb 2022, Published online: 15 Mar 2022

References

  • Altman, I. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Monterey, CA: Brooks/Cole.
  • Altman, I. 1976. “Privacy: A Conceptual Analysis.” Environment and Behavior 8 (1): 7–29.
  • Ayalon, O., and E. Toch. 2013. “Retrospective Privacy: Managing Longitudinal Privacy in Online Social Networks.” In Proceedings of the Ninth Symposium on Usable Privacy and Security. Newcastle, 1–13.
  • Ayalon, O., and E. Toch. 2017. “Not Even Past: Information Aging and Temporal Privacy in Online Social Networks.” Human–Computer Interaction 32 (2): 73–102.
  • Badillo-Urquiola, K., X. Page, and P. Wisniewski. 2018. “Literature Review: Examining Contextual Integrity Within Human-Computer Interaction.” Paper presented at the Symposium on Applications of Contextual Integrity. 1–4, Princeton University.
  • Barth, A., A. Datta, J. C. Mitchell, and H. Nissenbaum. 2006. “Privacy and Contextual Integrity: Framework and Applications.” In 2006 IEEE Symposium on Security and Privacy. Oakland, CA, 1–15.
  • Bauer, L., L. F. Cranor, S. Komanduri, M. L. Mazurek, M. K. Reiter, M. Sleeper, and B. Ur. 2013. “The Post Anachronism: The Temporal Dimension of Facebook Privacy.” In Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic society. 1–12.
  • Bayer, J. B., N. B. Ellison, S. Y. Schoenebeck, and E. B. Falk. 2016. “Sharing the Small Moments: Ephemeral Social Interaction on Snapchat.” Information, Communication & Society 19 (7): 956–977.
  • Belanger, F., and H. Xu. 2015. “The Role of Information Systems Research in Shaping the Future of Information Privacy.” Information Systems Journal 25 (6): 573–578.
  • Bernstein, M. S., E. Bakshy, M. Burke, and B. Karrer. 2013. “Quantifying the Invisible Audience in Social Networks.” In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 21–30.
  • Brandimarte, L., A. Acquisti, and G. Loewenstein. 2013. “Misplaced Confidences: Privacy and the Control Paradox.” Social Psychological and Personality Science 4 (3): 340–347.
  • Brandtzaeg, P. B., and M. Lüders. 2018. “Time Collapse in Social Media: Extending the Context Collapse.” Social Media + Society 4 (1): 1–10.
  • Brislin, R. W. 1980. “Translation and Content Analysis of Oral and Written Material.” In Handbook of Cross-cultural Psychology, edited by H. C. Triandis and J. W. Berry, 398–444. Boston, MA: Allyn & Bacon.
  • Cavalcanti, L. H. C., A. Pinto, J. R. Brubaker, and L. S. Dombrowski. 2017. “Media, Meaning, and Context Loss in Ephemeral Communication Platforms: A Qualitative Investigation on Snapchat.” In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing 1934–1945.
  • Chang, C. W., and J. Heo. 2014. “Visiting Theories That Predict College Students’ Self-Disclosure on Facebook.” Computers in Human Behavior 30: 79–86.
  • Chen, H. G., et al. 2008. “Online Privacy Control via Anonymity and Pseudonym: Cross-Cultural Implications.” Behaviour & Information Technology 27 (3): 229–242.
  • Chen, K. J., and H. L. Cheung. 2019. “Unlocking the Power of Ephemeral Content: The Roles of Motivations, Gratification, Need for Closure, and Engagement.” Computers in Human Behavior 97: 67–74.
  • Chin, W. W. 1998. “The Partial Least Squares Approach to Structural Equation Modeling.” Modern Methods for Business Research 295 (2): 295–336.
  • Choi, B. C., Z. Jiang, B. Xiao, and S. S. Kim. 2015. “Embarrassing Exposures in Online Social Networks: An Integrated Perspective of Privacy Invasion and Relationship Bonding.” Information Systems Research 26 (4): 675–694.
  • Choi, T. R., and Y. Sung. 2018. “Instagram Versus Snapchat: Self-Expression and Privacy Concern on Social Media.” Telematics and Informatics 35 (8): 2289–2298.
  • Culnan, M. J., and P. K. Armstrong. 1999. “Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation.” Organization Science 10: 104–115.
  • Dinev, T., M. Bellotto, P. Hart, V. Russo, I. Serra, and C. Colautti. 2006. “Privacy Calculus Model in e-Commerce – A Study of Italy and the United States.” European Journal of Information System 15: 389–402.
  • Dinev, T., H. Xu, J. H. Smith, and P. Hart. 2013. “Information Privacy and Correlates: An Empirical Attempt to Bridge and Distinguish Privacy-Related Concepts.” European Journal of Information Systems 22 (3): 295–316.
  • Dunbar, R. I. 2012. “Social Cognition on the Internet: Testing Constraints on Social Network Size.” Philosophical Transactions of the Royal Society of London 367: 2192–2201.
  • Ellison, N. B., J. Vitak, C. Steinfield, R. Gray, and C. Lampe. 2011. “Negotiating Privacy Concerns and Social Capital Needs in a Social Media Environment.” In Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social web, edited by S. Trepte and L. Reinecke, 19–32. New York: Springer.
  • Eşkisu, M., R. Hoşoğlu, and K. Rasmussen. 2017. “An Investigation of the Relationship Between Facebook Usage, Big Five, Self-Esteem and Narcissism.” Computers in Human Behavior 69: 294–301.
  • EU Commission. 2018. “General Data Protection Regulation.” https://gdprinfo.eu.
  • Forest, A. L., and J. V. Wood. 2011. “When Partner Caring Leads to Sharing: Partner Responsiveness Increases Expressivity, but Only for Individuals with low Self-Esteem.” Journal of Experimental Social Psychology 47: 843–848.
  • Fornell, C., and D. F. Larcker. 1981. “Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics.” Journal of Marketing Research, 18, 382–388.
  • Gabisch, J. A., and G. R. Milne. 2014. “The Impact of Compensation on Information Ownership and Privacy Control.” Journal of Consumer Marketing 31 (1): 13–26.
  • Gao, S., and X. Zhang. 2015. “Understanding the Use of Location Sharing Services on Social Networking Platforms in China.” In International Conference on E-Business and telecommunications. 124–136.
  • Goodwin, C. 1991. “Privacy: Recognition of a Consumer Right.” Journal of Public Policy and Marketing 10 (1): 149–166.
  • Hair, J. F., W. C. Black, B. J. Barry, and R. E. Anderson. 2010. Multivariate Data Analysis: A Global Perspective. 7th ed. Upper Saddle River, NJ: Pearson Prentice Hall.
  • Harper, R., E. Whitworth, and R. Page. 2012. “Fixity: Identity, Time and Durée on Facebook.” In Proceeding of the 13th Annual International and Interdisciplinary Conference of the Association of Internet Researchers. Salford, 18–21 October, 1–21, New York: ACM.
  • Huang, X., J. Vitak, and Y. Tausczik. 2020. “‘You Don’t Have to Know my Past’: How WeChat Moments Users Manage Their Evolving Self-Presentation.” In Proceedings of the 2020 CHI Conference on Human Factors in Computing systems. 1–13.
  • Jeong, Y., and Y. Kim. 2017. “Privacy Concerns on Social Networking Sites: Interplay among Posting Types, Content, and Audiences.” Computers in Human Behavior 69: 302–310.
  • Joinson, A. N., U. D. Reips, T. Buchanan, and C. B. P. Schofield. 2010. “Privacy, Trust, and Self-Disclosure Online.” Human–Computer Interaction 25 (1): 1–24.
  • Jordaan, Y., and G. Van Heerden. 2017. “Online Privacy-Related Predictors of Facebook Usage Intensity.” Computers in Human Behavior 70: 90–96.
  • Kehr, F., T. Kowatsch, D. Wentzel, and E. Fleisch. 2015. “Blissfully Ignorant: The Effects of General Privacy Concerns, General Institutional Trust, and Affect in the Privacy Calculus.” Information Systems Journal 25 (6): 607–635.
  • Kobsa, A., S. Patil, and B. Meyer. 2012. “Privacy in Instant Messaging: An Impression Management Model.” Behaviour & Information Technology 31 (4): 355–370.
  • Koohikamali, M., D. A. Peak, and V. R. Prybutok. 2017. “Beyond Self-Disclosure: Disclosure of Information About Others in Social Network Sites.” Computers in Human Behavior 69: 29–42.
  • Kroll, T., and S. Stieglitz. 2019. “Digital Nudging and Privacy: Improving Decisions About Self-Disclosure in Social Networks.” Behaviour & Information Technology. Doi:10.1080/0144929X.2019.1584644
  • Kruikemeier, S., S. C. Boerman, and N. Bol. 2020. “Breaching the Contract? Using Social Contract Theory to Explain Individuals’ Online Behavior to Safeguard Privacy.” Media Psychology 23 (2): 269–292.
  • Kumar, P. 2018. “Contextual Integrity as a Conceptual, Analytical, and Educational Tool for Research.” In Proceedings of symposium on applications of contextual integrity. Princeton, 13–14 September, 1–5.
  • Kumar, S., P. Kumar, and B. Bhasker. 2018. “Interplay Between Trust, Information Privacy Concerns and Behavioural Intention of Users on Online Social Networks.” Behaviour & Information Technology 37 (6): 622–633.
  • Külcü, Ö, and T. Henkoğlu. 2014. “Privacy in Social Networks: An Analysis of Facebook.” International Journal of Information Management 34 (6): 761–769.
  • Lankton, N. K., D. H. McKnight, and J. F. Tripp. 2017. “Facebook Privacy Management Strategies: A Cluster Analysis of User Privacy Behaviors.” Computers in Human Behavior 76: 149–163.
  • Laufer, R. S., and M. Wolfe. 1977. “Privacy as a Concept and a Social Issue – Multidimensional Developmental Theory.” Journal of Social Issues 33 (3): 22–24.
  • Li, P., H. Cho, and Z. H. Goh. 2019. “Unpacking the Process of Privacy Management and Self-Disclosure from the Perspectives of Regulatory Focus and Privacy Calculus.” Telematics and Informatics 41: 114–125.
  • Li, Y., X. Gui, Y. Chen, H. Xu, and A. Kobsa. 2018. “When SNS Privacy Settings Become Granular: Investigating Users’ Choices, Rationales, and Influences on Their Social Experience.” In Proceedings of the ACM on Human-Computer Interaction. 1–21.
  • Li, K., Z. Lin, and X. Wang. 2015. “An Empirical Analysis of Users’ Privacy Disclosure Behaviors on Social Network Sites.” Information & Management 52: 882–891.
  • Li, Y., J. Mou, L. Ye, J. Long, and W. W. Huang. 2021. “An Empirical Investigation of the Utilitarian, Social Benefits in LBS Information Disclosure – The Moderating Effect of the Gender Based Social Role Theory.” International Journal of Information Management 56: 102243.
  • Li, Y., E. H. R. Rho, and A. Kobsa. 2020. “Cultural Differences in the Effects of Contextual Factors and Privacy Concerns on Users’ Privacy Decision on Social Networking Sites.” Behaviour & Information Technology. Doi:10.1080/0144929X.2020.1831608
  • Liang, H., N. Saraf, Q. Hu, and Y. Xue. 2007. “Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of top Management.” MIS Quarterly, 31, 59–87.
  • Litt, E., and E. Hargittai. 2014. “A Bumpy Ride on the Information Superhighway: Exploring Turbulence Online.” Computers in Human Behavior 36: 520–529.
  • Litt, E., and E. Hargittai. 2016. “The Imagined Audience on Social Network Sites.” Social Media + Society 2 (1): 1–12.
  • Luria, M., and N. Foulds. 2021. “Hashtag-Forget: Using Social Media Ephemerality to Support Evolving Identities.” In Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems. 1–5.
  • Ma, X., Y. Qin, Z. Chen, and H. Cho. 2021. “Perceived Ephemerality, Privacy Calculus, and the Privacy Settings of an Ephemeral Social Media Site.” Computers in Human Behavior 124: 106928.
  • Malhotra, N. K., S. S. Kim, and J. Agarwal. 2004. “Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model.” Information Systems Research 15 (4): 336–355.
  • Marder, B. 2018. “Trumped by Context Collapse: Examination of ‘Liking’ Political Candidates in the Presence of Audience Diversity.” Computers in Human Behavior 79: 169–180.
  • Martin, K., and H. Nissenbaum. 2016. “Measuring Privacy: An Empirical Test Using Context to Expose Confounding Variables.” Columbia Science & Technology Law Review 18: 176–218.
  • Marwick, A. E., and D. Boyd. 2011. “I Tweet Honestly, I Tweet Passionately: Twitter Users, Context Collapse, and the Imagined Audience.” New Media & Society 13 (1): 114–133.
  • Mondal, M., J. Messias, S. Ghosh, K. P. Gummadi, and A. Kate. 2017. “Managing Longitudinal Exposure of Socially Shared Data on the Twitter Social Media.” International Journal of Advances in Engineering Sciences and Applied Mathematics 9 (4): 238–257.
  • Nissenbaum, H. 2004. “Privacy as Contextual Integrity.” Washington Law Review 79 (1): 101–158.
  • Nissenbaum, H. 2010. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford, CA: Stanford Law Books.
  • Novotny, A., and S. Spiekermann. 2014. “Oblivion on the web: An Inquiry of User Needs and Technologies.” In Proceedings of the ECIS 2014 European Conference on Information Systems. 1–15.
  • Oeldorf-Hirsch, A., J. Birnholtz, and J. T. Hancock. 2017. “Your Post is Embarrassing Me: Face Threats, Identity, and the Audience on Facebook.” Computers in Human Behavior 73: 92–99.
  • Oh, H. J., and R. LaRose. 2016. “Impression Management Concerns and Support-Seeking Behavior on Social Network Sites.” Computers in Human Behavior 57: 38–47.
  • Palen, L., and P. Dourish. 2003. “Unpacking Privacy for a Networked World.” Paper presented the SIGCHI Conference on Human Factors in Computing Systems. 129–136.
  • Panek, E. T., Y. Nardis, and S. Konrath. 2013. “Mirror or Megaphone? How Relationships Between Narcissism and Social Networking Site Use Differ on Facebook and Twitter.” Computers in Human Behavior 29 (5): 2004–2012.
  • Petronio, S. 2002. Boundaries of Privacy: Dialectics of Disclosure. Albany, NY: State University of New York Press.
  • Petronio, S. 2007. “Translational Research Endeavors and the Practices of Communication Privacy Management.” Journal of Applied Communication Research 35: 218–222.
  • Podsakoff, P. M., S. B. MacKenzie, J. Y. Lee, and N. P. Podsakoff. 2003. “Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies.” Journal of Applied Psychology 88 (5): 879–903.
  • Preacher, K. J., and A. F. Hayes. 2008. “Asymptotic and Resampling Strategies for Assessing and Comparing Indirect Effects in Multiple Mediator Models.” Behavior Research Methods 40 (3): 879–891.
  • Proudfoot, J. G., D. Wilson, J. S. Valacich, and M. D. Byrd. 2018. “Saving Face on Facebook: Privacy Concerns, Social Benefits, and Impression Management.” Behaviour & Information Technology 37 (1): 16–37.
  • Ruggieri, S., R. C. Bonfanti, A. Passanisi, U. Pace, and A. Schimmenti. 2021. “Electronic Surveillance in the Couple: The Role of Self-Efficacy and Commitment.” Computers in Human Behavior 114: 106577.
  • Schoenebeck, S., N. B. Ellison, L. Blackwell, J. B. Bayer, and E. B. Falk. 2016. “Playful Backstalking and Serious Impression Management: How Young Adults Reflect on Their Past Identities on Facebook.” In Proceedings of the 19th ACM Conference on Computer-supported Cooperative Work & Social Computing. San Francisco, 27 February–2 May, 1475–1487, New York: ACM.
  • Shamim, S., Y. Yang, N. U. Zia, and M. H. Shah. 2021. “Big Data Management Capabilities in the Hospitality Sector: Service Innovation and Customer Generated Online Quality Ratings.” Computers in Human Behavior 121: 106777.
  • Sharma, S., and R. E. Crossler. 2014. “Disclosing Too Much? Situational Factors Affecting Information Disclosure in Social Commerce Environment.” Electronic Commerce Research and Applications 13 (5): 305–319.
  • Shi, P., H. Xu, and Y. Chen. 2013. “Using Contextual Integrity to Examine Interpersonal Information Boundary on Social Network Sites.” In Proceedings of the SIGCHI conference on human factors in computing systems. Paris, 27 April–2 May, 35–38, New York: ACM.
  • Smith, H. J., T. Dinev, and H. Xu. 2011. “Information Privacy Research: An Interdisciplinary Review.” MIS Quarterly 35 (4): 989–1016.
  • Smith, K., F. Mendez, and G. L. White. 2014. “Narcissism as a Predictor of Facebook Users’ Privacy Concern, Vigilance, and Exposure to Risk.” International Journal of Technology and Human Interaction 10 (2): 78–95.
  • Solove, D. J. 2006. “A Taxonomy of Privacy.” University of Pennsylvania Law Review 154 (3): 477–560.
  • Steinbart, P., M. Keith, and J. Babb. 2017. “Measuring Privacy Concern and the Right to Be Forgotten.” In Proceedings of the 50th Hawaii International Conference on System Sciences. 4967–4976.
  • Tang, J. H., and Y. J. Lin. 2017. “Websites, Data Types and Information Privacy Concerns: A Contingency Model.” Telematics & Informatics 34 (7): 1274–1284.
  • Tokunaga, R. S. 2016. “Interpersonal Surveillance Over Social Network Sites: Applying a Theory of Negative Relational Maintenance and the Investment Model.” Journal of Social and Personal Relationships 33 (2): 171–190.
  • Tufekci, Z. 2008. “Can you see me now? Audience and Disclosure Regulation in Online Social Network Sites.” Bulletin of Science Technology & Society 28 (1): 20–36.
  • Vitak, J. 2012. “The Impact of Context Collapse and Privacy on Social Network Site Disclosures.” Journal of Broadcasting & Electronic Media 56 (4): 451–470.
  • Vitak, J., S. Blasiola, E. Litt, and S. Patil. 2015. “Balancing Audience and Privacy Tensions on Social Network Sites: Strategies of Highly Engaged Users.” International Journal of Communication 9 (20): 1485–1504.
  • Whiting, A., and D. Williams. 2013. “Why People Use Social Media: A Uses and Gratifications Approach.” Qualitative Market Research: An International Journal 16 (4): 362–369. Doi:10.1108/QMR-06-2013-0041.
  • Winter, B. 2013. “Linear Models and Linear Mixed Effects Models in R with Linguistic Applications.” arXiv, 1308.5499.
  • Wisniewski, P. J., B. P. Knijnenburg, and H. R. Lipford. 2017. “Making Privacy Personal: Profiling Social Network Users to Inform Privacy Education and Nudging.” International Journal of Human-Computer Studies 98: 95–108.
  • Wu, P. F., J. Vitak, and M. T. Zimmer. 2019. “A Contextual Approach to Information Privacy Research.” Journal of the Association for Information Science and Technology 71 (4): 485–490.
  • Xu, B., P. Chang, C. L. Welker, N. N. Bazarova, and D. Cosley. 2016. “Automatic Archiving Versus Default Deletion: What Snapchat Tells us About Ephemerality in Design.” In Proceedings of the 19th ACM Conference on Computer-supported Cooperative Work & Social Computing. 1662–1675, ACM.
  • Xu, H., T. Dinev, H. J. Smith, and P. Hart. 2008. “Examining the Formation of Individual’s Information Privacy Concerns: Toward an Integrative View.” In Proceedings of the 29th annual International Conference on information systems, Paris, France (AIS, Atlanta).
  • Xu, H., T. Dinev, J. Smith, and P. Hart. 2011. “Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances.” Journal of the Association for Information Systems 12 (12): 798–824.
  • Xu, H., S. Gupta, M. B. Rosson, and J. M. Carroll. 2012. “Measuring Mobile Users’ Concerns for Information Privacy.” In Proceeding of thirty Third International Conference on information systems, Orlando, Florida, December 16–19, 2012.
  • Xu, F., K. Michael, and X. Chen. 2013. “Factors Affecting Privacy Disclosure on Social Network Sites: An Integrated Model.” Electronic Commerce Research 13 (2): 151–168.
  • Xu, H., H. H. Teo, B. C. Tan, and R. Agarwal. 2012. “Research Note – Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services.” Information Systems Research 23 (4): 1342–1363.
  • Yang, Y., Y. Gong, L. P. W. Land, and T. Chesney. 2020. “Understanding the Effects of Physical Experience and Information Integration on Consumer Use of Online to Offline Commerce.” International Journal of Information Management 51: 102046.
  • Youn, S., and W. Shin. 2019. “Teens’ Responses to Facebook Newsfeed Advertising: The Effects of Cognitive Appraisal and Social Influence on Privacy Concerns and Coping Strategies.” Telematics and Informatics 38: 30–45.
  • Young, L., and A. Quan-Haase. 2013. “Privacy Protection Strategies on Facebook.” Information, Communication & Society 16 (4): 479–500.
  • Zhang, Y., S. Shi, S. Guo, X. Chen, and Z. Piao. 2021. “Audience Management, Online Turbulence and Lurking in Social Networking Services: A Transactional Process of Stress Perspective.” International Journal of Information Management. Doi:10.1016/j.ijinfomgt.2020.102233.
  • Zhang, Y., H. Wang, C. Luo, and S. Chen. 2021. “Ephemerality in Social Media: Unpacking the Personal and Social Characteristics of Time Limit Users on WeChat Moments.” Frontiers in Psychology 12: 712440.
  • Zhao, X., N. Salehi, S. Naranjit, S. Alwaalan, S. Voida, and D. Cosley. 2013. “The Many Faces of Facebook: Experiencing Social Media as Performance, Exhibition, and Personal Archive.” In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Paris, 27 April–2 May, 1–10, New York: ACM.
  • Zhou, T. 2017. “Understanding Location-Based Services Users’ Privacy Concern an Elaboration Likelihood Model Perspective.” Internet Research 27 (3): 1–27.
  • Zhu, Y., and Z. Bao. 2018. “The Role of Negative Network Externalities in SNS Fatigue: An Empirical Study Based on Impression Management Concern, Privacy Concern, and Social Overload.” Data Technologies and Applications 52 (3): 313–328.
  • Zimmer, M. 2008. “The Gaze of the Perfect Search Engine: Google as an Infrastructure of Dataveillance.” In Web Search: Multidisciplinary Perspectives, edited by A. Spink and M. Zimmer, 77–99. Berlin: Springer.
  • Zimmer, J. C., R. E. Arsal, M. Al-Marzouq, and V. Grover. 2010. “Investigating Online Information Disclosure: Effects of Information Relevance, Trust and Risk.” Information & Management 47 (2): 115–123.
  • Zlatolas, L. N., T. Welzer, M. Heričko, and M. Hölbl. 2015. “Privacy Antecedents for SNS Self-Disclosure: The Case of Facebook.” Computers in Human Behavior 45: 158–167.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.