Instance-Based Learning Algorithms
Machine Learning
The active badge location system
ACM Transactions on Information Systems (TOIS)
Why people do and don't wear active badges: a case study
Computer Supported Cooperative Work
The Cricket location-support system
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Who wants to know what when? privacy preference determinants in ubiquitous computing
CHI '03 Extended Abstracts on Human Factors in Computing Systems
User needs for location-aware mobile services
Personal and Ubiquitous Computing
ICDAR '95 Proceedings of the Third International Conference on Document Analysis and Recognition (Volume 1) - Volume 1
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Who gets to know what when: configuring privacy permissions in an awareness application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Context-aware telephony: privacy preferences and sharing patterns
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
User-Controllable Security and Privacy for Pervasive Computing
HOTMOBILE '07 Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Field deployment of IMBuddy: a study of privacy control and feedback mechanisms for contextual IM
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Protecting user data in ubiquitous computing: towards trustworthy environments
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Place lab: device positioning using radio beacons in the wild
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Capturing Social Networking Privacy Preferences
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
From spaces to places: emerging contexts in mobile privacy
Proceedings of the 11th international conference on Ubiquitous computing
Generating default privacy policies for online social networks
CHI '10 Extended Abstracts on Human Factors in Computing Systems
Expressive auctions for externalities in online advertising
Proceedings of the 19th international conference on World wide web
Privacy enhancements for mobile and social uses of consumer electronics
IEEE Communications Magazine
On the impact of real-time feedback on users' behaviour in mobile location-sharing applications
Proceedings of the Sixth Symposium on Usable Privacy and Security
Hide and seek: location sharing practices with social media
Proceedings of the 12th international conference on Human computer interaction with mobile devices and services
Proceedings of the 12th international conference on Human computer interaction with mobile devices and services
Modeling people's place naming preferences in location sharing
Proceedings of the 12th ACM international conference on Ubiquitous computing
Proceedings of the 12th ACM international conference on Ubiquitous computing
Empirical models of privacy in location sharing
Proceedings of the 12th ACM international conference on Ubiquitous computing
Bridging the gap between physical location and online social networks
Proceedings of the 12th ACM international conference on Ubiquitous computing
Locaccino: a privacy-centric location sharing application
Proceedings of the 12th ACM international conference adjunct papers on Ubiquitous computing - Adjunct
Studying mobile context-aware social services in the wild
Proceedings of the 6th Nordic Conference on Human-Computer Interaction: Extending Boundaries
Sharing location in online social networks
IEEE Network: The Magazine of Global Internetworking
Dynamic privacy management in pervasive sensor networks
AmI'10 Proceedings of the First international joint conference on Ambient intelligence
Personality-based privacy management for location-sharing in diverse subpopulations
Proceedings of the 2011 iConference
When are users comfortable sharing locations with advertisers?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Caché: caching location-enhanced content to improve user privacy
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Public vs. publicized: content use trends and privacy expectations
HotSec'11 Proceedings of the 6th USENIX conference on Hot topics in security
Who's your best friend?: targeted privacy attacks In location-sharing social networks
Proceedings of the 13th international conference on Ubiquitous computing
Understanding how visual representations of location feeds affect end-user privacy concerns
Proceedings of the 13th international conference on Ubiquitous computing
Towards privacy-enhanced mobile communities-Architecture, concepts and user trials
Journal of Systems and Software
Privacy preservation in the dissemination of location data
ACM SIGKDD Explorations Newsletter
Super-Ego: a framework for privacy-sensitive bounded context-awareness
CASEMANS '11 Proceedings of the 5th ACM International Workshop on Context-Awareness for Self-Managing Systems
Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs
Personal and Ubiquitous Computing
Towards a mechanism for incentivating privacy
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Classifying music user groups and identifying needs for mobile virtual music services
Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments
User controllable security and privacy for mobile mashups
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications
Datalog for security, privacy and trust
Datalog'10 Proceedings of the First international conference on Datalog Reloaded
Contrail: enabling decentralized social networks on smartphones
Middleware'11 Proceedings of the 12th ACM/IFIP/USENIX international conference on Middleware
The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The implications of offering more disclosure choices for social location sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
PlexC: a policy language for exposure control
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Measuring user confidence in smartphone security and privacy
Proceedings of the Eighth Symposium on Usable Privacy and Security
Android permissions: user attention, comprehension, and behavior
Proceedings of the Eighth Symposium on Usable Privacy and Security
Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice
Proceedings of the Eighth Symposium on Usable Privacy and Security
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Short paper: location privacy: user behavior in the field
Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices
Understanding sharing preferences and behavior for mHealth devices
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
VSSA: a service-oriented vehicular social-networking platform for transportation efficiency
Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Contrail: enabling decentralized social networks on smartphones
Proceedings of the 12th International Middleware Conference
My privacy policy: exploring end-user specification of free-form location access rules
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
Location privacy policy management system
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Tailoring user visibility and privacy in a context-aware mobile social network
UCAmI'12 Proceedings of the 6th international conference on Ubiquitous Computing and Ambient Intelligence
Tweets are forever: a large-scale quantitative analysis of deleted tweets
Proceedings of the 2013 conference on Computer supported cooperative work
When privacy and utility are in harmony: towards better design of presence technologies
Personal and Ubiquitous Computing
Disclosure Intention of Location-Related Information in Location-Based Social Network Services
International Journal of Electronic Commerce
A comparative study of location-sharing privacy preferences in the United States and China
Personal and Ubiquitous Computing
"Shared joy is double joy": the social practices of user networks within group shopping sites
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Preference-based location sharing: are more privacy options really better?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy manipulation and acclimation in a location sharing application
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Adaptive information-sharing for privacy-aware mobile social networks
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Journal of Electronic Commerce in Organizations
Reconciling mobile app privacy and usability on smartphones: could user privacy profiles help?
Proceedings of the 23rd international conference on World wide web
Crowdsourcing privacy preferences in context-aware applications
Personal and Ubiquitous Computing
Hi-index | 0.01 |
A number of mobile applications have emerged that allow users to locate one another. However, people have expressed concerns about the privacy implications associated with this class of software, suggesting that broad adoption may only happen to the extent that these concerns are adequately addressed. In this article, we report on our work on PeopleFinder, an application that enables cell phone and laptop users to selectively share their locations with others (e.g. friends, family, and colleagues). The objective of our work has been to better understand people's attitudes and behaviors towards privacy as they interact with such an application, and to explore technologies that empower users to more effectively and efficiently specify their privacy preferences (or "policies"). These technologies include user interfaces for specifying rules and auditing disclosures, as well as machine learning techniques to refine user policies based on their feedback. We present evaluations of these technologies in the context of one laboratory study and three field studies.