CHI '92 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
GroupLens: an open architecture for collaborative filtering of netnews
CSCW '94 Proceedings of the 1994 ACM conference on Computer supported cooperative work
Footprints: history-rich tools for information foraging
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Privacy in e-commerce: examining user scenarios and privacy preferences
Proceedings of the 1st ACM conference on Electronic commerce
Extending document management systems with user-specific active properties
ACM Transactions on Information Systems (TOIS)
Communications of the ACM
Cookies and Web browser design: toward realizing informed consent online
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Social navigation of food recipes
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Mining the network value of customers
Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining
The Laws of the Web: Patterns in the Ecology of Information
The Laws of the Web: Patterns in the Ecology of Information
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Is seeing believing?: how recommender system interfaces affect users' opinions
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Informed Consent in the Mozilla Browser: Implementing Value Sensitive Design
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 8 - Volume 8
Web Privacy with P3p
Privacy policies as decision-making tools: an evaluation of online privacy notices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Slash(dot) and burn: distributed moderation in a large online conversation space
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Think different: increasing online community participation using uniqueness and group dissimilarity
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Secrets and Lies: Digital Security in a Networked World
Secrets and Lies: Digital Security in a Networked World
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Social navigation as a model for usable security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Privacy practices of Internet users: self-reports versus observed behavior
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
What do they "indicate?": evaluating security and privacy indicators
interactions - A contradiction in terms?
Don't look stupid: avoiding pitfalls when recommending research papers
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
tagging, communities, vocabulary, evolution
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
Looking for trouble: understanding end-user security management
Proceedings of the 2007 symposium on Computer human interaction for the management of information technology
User help techniques for usable security
Proceedings of the 2007 symposium on Computer human interaction for the management of information technology
Internet users' perceptions of 'privacy concerns' and 'privacy actions'
International Journal of Human-Computer Studies
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Cost-effective outbreak detection in networks
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
The influence limiter: provably manipulation-resistant recommender systems
Proceedings of the 2007 ACM conference on Recommender systems
Security automation considered harmful?
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
The impact of social navigation on privacy policy configuration
Proceedings of the Sixth Symposium on Usable Privacy and Security
Principles for applying social navigation to collaborative systems
Proceedings of the 4th Symposium on Computer Human Interaction for the Management of Information Technology
With a little help from my friends: can social navigation inform interpersonal privacy preferences?
Proceedings of the ACM 2011 conference on Computer supported cooperative work
Integrating user feedback with heuristic security and privacy management systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ROAuth: recommendation based open authorization
Proceedings of the Seventh Symposium on Usable Privacy and Security
Social overlays: augmenting existing UIs with social cues
Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work Companion
Proceedings of the 2012 workshop on New security paradigms
Hi-index | 0.00 |
Social navigation is a promising approach for supporting privacy and security management. By aggregating and presenting the choices made by others, social navigation systems can provide users with easily understandable guidance on security and privacy decisions, rather than requiring that they understand low-level technical details in order to make informed decisions. We have developed two prototype systems to explore how social navigation can help users manage their privacy and security. The Acumen system employs social navigation to address a common privacy activity, managing Internet cookies, and the Bonfire system uses social navigation to help users manage their personal firewall. Our experiences with Acumen and Bonfire suggest that, despite the promise of social navigation, there are significant challenges in applying these techniques to the domains of end-user privacy and security management. Due to features of these domains, individuals may misuse community data when making decisions, leading to incorrect individual decisions, inaccurate community data, and "herding" behavior that is an example of what economists term an informational cascade. By understanding this phenomenon in these terms, we develop and present two general approaches for mitigating herding in social navigation systems that support end-user security and privacy management, mitigation via algorithms and mitigation via user interaction. Mitigation via user interaction is a novel and promising approach to mitigating cascades in social navigation systems.