Design of a multi-media vehicle for social browsing
CSCW '88 Proceedings of the 1988 ACM conference on Computer-supported cooperative work
Design rationale: the argument behind the artifact
CHI '89 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Using critics to empower users
CHI '90 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The active badge location system
ACM Transactions on Information Systems (TOIS)
Realizing a video environment: EuroPARC's RAVE system
CHI '92 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Evaluating video as a technology for informal communication
CHI '92 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Iterative design of video communication systems
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
Groupware and social dynamics: eight challenges for developers
Communications of the ACM
Design patterns: elements of reusable object-oriented software
Design patterns: elements of reusable object-oriented software
Communications of the ACM
Usability inspection methods
CSCW '94 Proceedings of the 1994 ACM conference on Computer supported cooperative work
Integrating communication, cooperation, and awareness: the DIVA virtual office environment
CSCW '94 Proceedings of the 1994 ACM conference on Computer supported cooperative work
CHI '95 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Why people do and don't wear active badges: a case study
Computer Supported Cooperative Work
Thunderwire: a field study of an audio-only media space
CSCW '96 Proceedings of the 1996 ACM conference on Computer supported cooperative work
Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems
CSCW '96 Proceedings of the 1996 ACM conference on Computer supported cooperative work
interactions
Hanging on the ‘wire: a field study of an audio-only media space
ACM Transactions on Computer-Human Interaction (TOCHI) - Special issue on speech as data
Towards a theory of privacy in the information age
ACM SIGCAS Computers and Society
Ethics of computing: codes, spaces for discussion and law
Ethics of computing: codes, spaces for discussion and law
Design for privacy in multimedia computing and communications environments
Technology and privacy
Communications of the ACM
Social, individual and technological issues for groupware calendar systems
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
The elements of computer credibility
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Privacy interfaces for information management
Communications of the ACM
Multimedia information changes the whole privacy ballgame
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Optimistic security: a new access control paradigm
Proceedings of the 1999 workshop on New security paradigms
Privacy in e-commerce: examining user scenarios and privacy preferences
Proceedings of the 1st ACM conference on Electronic commerce
Social translucence: an approach to designing systems that support social processes
ACM Transactions on Computer-Human Interaction (TOCHI) - Special issue on human-computer interaction in the new millennium, Part 1
DIS '00 Proceedings of the 3rd conference on Designing interactive systems: processes, practices, methods, and techniques
Designing trust into online experiences
Communications of the ACM
Configuration agents, control and privacy
CUU '00 Proceedings on the 2000 conference on Universal Usability
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
The effects of filtered video on awareness and privacy
CSCW '00 Proceedings of the 2000 ACM conference on Computer supported cooperative work
Interaction and outeraction: instant messaging in action
CSCW '00 Proceedings of the 2000 ACM conference on Computer supported cooperative work
Providing presence cues to telephone users
CSCW '00 Proceedings of the 2000 ACM conference on Computer supported cooperative work
Cookies and Web browser design: toward realizing informed consent online
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Single display privacyware: augmenting public displays with private information
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Linking public spaces: technical and social issues
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Multilateral security a concept and examples for balanced security
Proceedings of the 2000 workshop on New security paradigms
Private and public digital domestic spaces
International Journal of Human-Computer Studies
Casablanca: designing social communication devices for the home
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
GROUP '01 Proceedings of the 2001 International ACM SIGGROUP Conference on Supporting Group Work
E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
Proceedings of the 3rd ACM conference on Electronic Commerce
The importance of translucence in mobile computing systems
ACM Transactions on Computer-Human Interaction (TOCHI)
Personalized hypermedia and international privacy
Communications of the ACM - The Adaptive Web
Users' conceptions of web security: a comparative study
CHI '02 Extended Abstracts on Human Factors in Computing Systems
Safe and sound: a safety-critical approach to security
Proceedings of the 2001 workshop on New security paradigms
Pretty good persuasion: a first step towards effective password security in the real world
Proceedings of the 2001 workshop on New security paradigms
Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
Contextual Design: Defining Customer-Centered Systems
Contextual Design: Defining Customer-Centered Systems
America Calling: A Social History of the Telephone to 1940
America Calling: A Social History of the Telephone to 1940
Technology and Privacy: The New Landscape
Technology and Privacy: The New Landscape
Code and Other Laws of Cyberspace
Code and Other Laws of Cyberspace
Multimedia Video-Based Surveillance Systems: Requirements, Issues and Solutions
Multimedia Video-Based Surveillance Systems: Requirements, Issues and Solutions
Mediated voice communication via mobile IP
Proceedings of the 15th annual ACM symposium on User interface software and technology
Information Technology in a Democracy
Information Technology in a Democracy
The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security
Proceedings of the 20th annual international conference on Computer documentation
Instant messaging in teen life
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
Who can claim complete abstinence from peeking at print jobs?
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
Work rhythms: analyzing visualizations of awareness histories of distributed groups
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
ACM Transactions on Internet Technology (TOIT)
Toward Objective, Systematic Design-Method Comparisons
IEEE Software
Privacy critics: UI components to safeguard users' privacy
CHI '99 Extended Abstracts on Human Factors in Computing Systems
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Usability and privacy: a study of Kazaa P2P file-sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Design-oriented human-computer interaction
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Ambiguity as a resource for design
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Proceedings of the IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society on board M/S Illich and ashore
The Family Intercom: Developing a Context-Aware Audio Communication System
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
The Family Intercom: Developing a Context-Aware Audio Communication System
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Issues in Personalizing Shared Ubiquitous Devices
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Who wants to know what when? privacy preference determinants in ubiquitous computing
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
User needs for location-aware mobile services
Personal and Ubiquitous Computing
Usability meets security - the Identity-Manager as your personal security assistant for the Internet
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Informed Consent in the Mozilla Browser: Implementing Value Sensitive Design
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 8 - Volume 8
Proceedings of the 2002 workshop on New security paradigms
Designing for Ubiquity: The Perception of Privacy
IEEE Pervasive Computing
Patient Privacy in Electronic Prescription Transfer
IEEE Security and Privacy
Why we can't be bothered to read privacy policies models of privacy economics as a lemons market
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
Protecting Personal Data: Can IT Security Management Standards Help?
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
The Mobile Connection: The Cell Phone's Impact on Society
The Mobile Connection: The Cell Phone's Impact on Society
Deception and design: the impact of communication technology on lying behavior
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy policies as decision-making tools: an evaluation of online privacy notices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
'I didn't buy it for myself' privacy and ecommerce personalization
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
Development and evaluation of emerging design patterns for ubiquitous computing
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
Using the Focus Group Method in Software Engineering: Obtaining Practitioner and User Experiences
ISESE '04 Proceedings of the 2004 International Symposium on Empirical Software Engineering
A requirements taxonomy for reducing Web site privacy vulnerabilities
Requirements Engineering
Privacy issues in an electronic voting machine
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Predictors of availability in home life context-mediated communication
CSCW '04 Proceedings of the 2004 ACM conference on Computer supported cooperative work
Lilsys: Sensing Unavailability
CSCW '04 Proceedings of the 2004 ACM conference on Computer supported cooperative work
Presence versus availability: the design and evaluation of a context-aware communication client
International Journal of Human-Computer Studies
Privacy in pervasive environments: next generation labeling protocols
Personal and Ubiquitous Computing
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Inside JetBlue's Privacy Policy Violations
IEEE Security and Privacy
Privacy and Rationality in Individual Decision Making
IEEE Security and Privacy
Privacy in e-commerce: stated preferences vs. actual behavior
Communications of the ACM - Transforming China
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Making space for stories: ambiguity in the design of personal communication systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A study of preferences for sharing and privacy
CHI '05 Extended Abstracts on Human Factors in Computing Systems
The language of privacy: Learning from video media space analysis and design
ACM Transactions on Computer-Human Interaction (TOCHI)
Stopping spyware at the gate: a user study of privacy, notice and spyware
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Developing privacy guidelines for social location disclosure applications and services
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Proceedings of the 7th international conference on Human computer interaction with mobile devices & services
Gathering evidence: use of visual security cues in web browsers
GI '05 Proceedings of Graphics Interface 2005
Using relationship to control disclosure in Awareness servers
GI '05 Proceedings of Graphics Interface 2005
Bridging the gap between organizational and user perspectives of security in the clinical domain
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Privacy practices of Internet users: self-reports versus observed behavior
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Keeping ubiquitous computing to yourself: a practical model for user control of privacy
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Security and Usability
Peripheral privacy notifications for wireless networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Three Faces of Human-Computer Interaction
IEEE Annals of the History of Computing
Evaluating interfaces for privacy policy rule authoring
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Girls, technology and privacy: "is my mother listening?"
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Secrecy, flagging, and paranoia: adoption criteria in encrypted email
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Keeping up appearances: understanding the dimensions of incidental information privacy
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Tensions in designing capture technologies for an evidence-based care community
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
What do they "indicate?": evaluating security and privacy indicators
interactions - A contradiction in terms?
Protecting Job Seekers from Identity Theft
IEEE Internet Computing
Communications of the ACM - Services science
Proceedings of the second symposium on Usable privacy and security
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Power strips, prophylactics, and privacy, oh my!
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Blur filtration fails to preserve privacy for home-based video conferencing
ACM Transactions on Computer-Human Interaction (TOCHI)
Designing for privacy in interactive systems
Designing for privacy in interactive systems
An analysis of P3P-enabled web sites among top-20 search results
ICEC '06 Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet
User interfaces for privacy agents
ACM Transactions on Computer-Human Interaction (TOCHI)
Privacy and proportionality
Using availability indicators to enhance context-aware family communication applications
Using availability indicators to enhance context-aware family communication applications
Design for privacy in ubiquitous computing environments
ECSCW'93 Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work
Using empirical data to reason about internet research ethics
ECSCW'05 Proceedings of the ninth conference on European Conference on Computer Supported Cooperative Work
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Communications of the ACM
Behaviour & Information Technology
A Framework for Comparing Perspectives on Privacy and Pervasive Technologies
IEEE Pervasive Computing
Changing places: contexts of awareness in computing
Human-Computer Interaction
Desituating action: digital representation of context
Human-Computer Interaction
Privacy-enhancing technologies for the internet, II: five years later
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
The adaptive web: methods and strategies of web personalization
The adaptive web: methods and strategies of web personalization
Searching for privacy: design and implementation of a p3p-enabled search engine
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Imagined communities: awareness, information sharing, and privacy on the facebook
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
The Design of Everyday Things
IEEE Wireless Communications
Physical, Social, and Experiential Knowledge in Pervasive Computing Environments
IEEE Pervasive Computing
Exploring a human centered approach to managing visual privacy concerns during collaboration
HCC '08 Proceedings of the 3rd ACM international workshop on Human-centered computing
Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges
Measuring mobile service usage: methods and measurement points
International Journal of Mobile Communications
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ACM Transactions on Accessible Computing (TACCESS)
Improving personal privacy in social systems with people-tagging
Proceedings of the ACM 2009 international conference on Supporting group work
Four billion little brothers?: privacy, mobile phones, and ubiquitous data collection
Communications of the ACM - Scratch Programming for All
Methods for Evaluating Interactive Information Retrieval Systems with Users
Foundations and Trends in Information Retrieval
Faking contextual data for fun, profit, and privacy
Proceedings of the 8th ACM workshop on Privacy in the electronic society
The PROBE Framework for the Personalized Cloaking of Private Locations
Transactions on Data Privacy
Informing security indicator design in web browsers
Proceedings of the 2011 iConference
Understanding users' perception of privacy in human-robot interaction
Proceedings of the 6th international conference on Human-robot interaction
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy for a Networked World: bridging theory and design
CHI '11 Extended Abstracts on Human Factors in Computing Systems
Caché: caching location-enhanced content to improve user privacy
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Third party geolocation services in LBS: privacy requirements and research issues
Transactions on Data Privacy
Trusting to learn: trust and privacy issues in serious games
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
International Journal of Human-Computer Studies
The effect of monitoring by cameras and robots on the privacy enhancing behaviors of older adults
HRI '12 Proceedings of the seventh annual ACM/IEEE international conference on Human-Robot Interaction
The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Building a dynamic and computational understanding of personal social networks
Proceedings of the 1st ACM workshop on Mobile systems for computational social science
The impact of Arab cultural values on online social networking: The case of Facebook
Computers in Human Behavior
Understanding identity exposure in pervasive computing environments
Pervasive and Mobile Computing
Long-term effects of ubiquitous surveillance in the home
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
Location-based crowdsourcing of hyperlocal news: dimensions of participation preferences
Proceedings of the 17th ACM international conference on Supporting group work
Participatory personal data: An emerging research challenge for the information sciences
Journal of the American Society for Information Science and Technology
ACM Transactions on Interactive Intelligent Systems (TiiS) - Special issue on highlights of the decade in interactive intelligent systems
Measuring networked social privacy
Proceedings of the 2013 conference on Computer supported cooperative work companion
When privacy and utility are in harmony: towards better design of presence technologies
Personal and Ubiquitous Computing
Categorised ethical guidelines for large scale mobile HCI
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The influential factors for the variation of data sensitivity in ubiquitous social networking
International Journal of Wireless and Mobile Computing
It takes a network to get dinner: designing location-based systems to address local food needs
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
PriCal: dynamic privacy adaptation of collaborative calendar displays
Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication
Making Decisions about Privacy: Information Disclosure in Context-Aware Recommender Systems
ACM Transactions on Interactive Intelligent Systems (TiiS)
Investigating the Engage in Electronic Societies via Facebook in the Arab World
International Journal of Technology and Human Interaction
Dimensionality of information disclosure behavior
International Journal of Human-Computer Studies
Hi-index | 0.00 |
The purpose of this article is twofold. First, we summarize research on the topic of privacy in Human-Computer Interaction (HCI), outlining current approaches, results, and trends. Practitioners and researchers can draw upon this review when working on topics related to privacy in the context of HCI and CSCW. The second purpose is that of charting future research trends and of pointing out areas of research that are timely but lagging. This work is based on a comprehensive analysis of published academic and industrial literature spanning three decades, and on the experience of both ourselves and of many of our colleagues.