Design rationale: the argument behind the artifact
CHI '89 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Scaling up: a research agenda for software engineering
Communications of the ACM
Ubiquitous audio: capturing spontaneous collaboration
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
Information systems security design methods: implications for information systems development
ACM Computing Surveys (CSUR)
Usability inspection methods
interactions
Hanging on the ‘wire: a field study of an audio-only media space
ACM Transactions on Computer-Human Interaction (TOCHI) - Special issue on speech as data
Ethics of computing: codes, spaces for discussion and law
Ethics of computing: codes, spaces for discussion and law
On the effective use and reuse of HCI knowledge
ACM Transactions on Computer-Human Interaction (TOCHI) - Special issue on human-computer interaction in the new millennium, Part 2
Private and public digital domestic spaces
International Journal of Human-Computer Studies
Real-time audio buffering for telephone applications
Proceedings of the 14th annual ACM symposium on User interface software and technology
Usability Engineering
Toward Objective, Systematic Design-Method Comparisons
IEEE Software
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Design-oriented human-computer interaction
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the IFIP TC9/WG9.6 Working Conference on Security and Control of Information Technology in Society on board M/S Illich and ashore
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
Development and evaluation of emerging design patterns for ubiquitous computing
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
Passive capture and ensuing issues for a personal lifetime store
Proceedings of the the 1st ACM workshop on Continuous archival and retrieval of personal experiences
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Developing privacy guidelines for social location disclosure applications and services
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Designing for privacy in interactive systems
Designing for privacy in interactive systems
Privacy and proportionality
Design for privacy in ubiquitous computing environments
ECSCW'93 Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work
Exploring Privacy Concerns about Personal Sensing
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Teaching privacy with ubicomp scenarios in HCI classes
OZCHI '09 Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7
Interactive visual supports for children with autism
Personal and Ubiquitous Computing
Hi-index | 0.00 |
We describe the two-year-long development and evaluation of the Proportionality Method, a design method intended to aid HCI practitioners in designing advanced IT applications with complex privacy implications. The method is inspired by Data Protection Authorities' (DPA) and Courts' practice and proposes to balance the impact on privacy of IT applications with their usefulness. We discuss the results of an evaluation of the design method to verify its usability, usefulness and effectiveness vis-à-vis other design methods proposed in the HCI literature to address similar issues. Results suggest that different design methods for privacy highlight different sets of issues and a combination of methods should be employed in a comprehensive design process. We propose to judge design methods based on their overall quantitative and qualitative merits, including the type of application and technology for which they are most fit and their methodological approach. We finally propose to develop a privacy toolbox, that is, a set of heuristic methods that designers can choose from with knowledge and understanding of their relative advantages and limitations.