Cookies and Web browser design: toward realizing informed consent online
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Preserving Privacy in Environments with Location-Based Applications
IEEE Pervasive Computing
Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Safe & sound: a wireless leash
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Developing privacy guidelines for social location disclosure applications and services
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Profiles as Conversation: Networked Identity Performance on Friendster
HICSS '06 Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 03
Value scenarios: a technique for envisioning systemic effects of new technologies
CHI '07 Extended Abstracts on Human Factors in Computing Systems
Proceedings of the 2007 international ACM conference on Supporting group work
Analysis on the Prospects of Parent-Adolescent Communication Served by Mobile Technology
WMUTE '08 Proceedings of the Fifth IEEE International Conference on Wireless, Mobile, and Ubiquitous Technology in Education
A Framework for Comparing Perspectives on Privacy and Pervasive Technologies
IEEE Pervasive Computing
The watcher and the watched: social judgments about privacy in a public place
Human-Computer Interaction
Panic passwords: authenticating under duress
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Vanish: increasing data privacy with self-destructing data
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Protecting user data in ubiquitous computing: towards trustworthy environments
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Place lab: device positioning using radio beacons in the wild
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Development of a privacy addendum for open source licenses: value sensitive design in industry
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
Fear and danger in nocturnal urban environments
Proceedings of the 22nd Conference of the Computer-Human Interaction Special Interest Group of Australia on Computer-Human Interaction
Improving the safety of homeless young people with mobile phones: values, form and function
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Social and technical challenges in parenting teens' social media use
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Welcome to the jungle: HCI after dark
CHI '11 Extended Abstracts on Human Factors in Computing Systems
A Value Sensitive Design Investigation of Privacy Enhancing Tools in Web Browsers
Decision Support Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Fine-grained sharing of sensed physical activity: a value sensitive approach
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Hi-index | 0.00 |
An increasing number of high-tech devices, such as driver monitoring systems and Internet usage monitoring tools, are advertised as useful or even necessary for good parenting of teens. Simultaneously, there is a growing market for mobile "personal safety" devices. As these trends merge, there will be significant implications for parent-teen relationships, affecting domains such as privacy, trust, and maturation. Not only the teen and his or her parents are affected; other important stakeholders include the teen's friends who may be unwittingly monitored. This problem space, with less clear-cut assets, risks, and affected parties, thus lies well outside of more typical computer security applications. To help understand this problem domain and what, if anything, should be built, we turn to the theory and methods of Value Sensitive Design, a systematic approach to designing for human values in technology. We first develop value scenarios that highlight potential issues, benefits, harms, and challenges. We then conducted semi-structured interviews with 18 participants (9 teens and their parents). Results show significant differences with respect to information about: 1) internal state (e.g., mood) versus external environment (e.g., location) state; 2) situation (e.g., emergency vs. non-emergency); and 3) awareness (e.g., notification vs. non-notification). The value scenario and interview results positioned us to identify key technical challenges -- such as strongly protecting the privacy of a teen's contextual information during ordinary situations but immediately exposing that information to others as appropriate in an emergency -- and corresponding architectural levers for these technologies. In addition to laying a foundation for future work in this area, this research serves as a prototypical example of using Value Sensitive Design to explicate the underlying human values in complex security domains.