Design and implementation of the idemix anonymous credential system
Proceedings of the 9th ACM conference on Computer and communications security
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Impacts of user privacy preferences on personalized systems: a comparative study
Designing personalized user experiences in eCommerce
Privacy practices of Internet users: self-reports versus observed behavior
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Development of measures of online privacy concern and protection for use on the Internet
Journal of the American Society for Information Science and Technology
Internet users' perceptions of 'privacy concerns' and 'privacy actions'
International Journal of Human-Computer Studies
The user is not the enemy: fighting malware by tracking user intentions
Proceedings of the 2008 workshop on New security paradigms
Choose the red pill and the blue pill: a position paper
Proceedings of the 2008 workshop on New security paradigms
Reflections on privacy, identity and consent in on-line services
Information Security Tech. Report
Privacy and consent in pervasive networks
Information Security Tech. Report
Informational privacy, consent and the "control" of personal data
Information Security Tech. Report
The need for enhanced privacy and consent dialogues
Information Security Tech. Report
What is the shape of your security policy?: security as a classification problem
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Generative usability: security and user centered design beyond the appliance
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Trap hunting: finding personal data management issues in next generation AAC devices
SLPAT '11 Proceedings of the Second Workshop on Speech and Language Processing for Assistive Technologies
Service users' requirements for tools to support effective on-line privacy and consent practices
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Hi-index | 0.00 |
With the move to deliver services on-line, there is a reduction in opportunities for a service user to discuss and agree to the terms of the management of their personal data. As the focus is turned to on-line technologies, the design question becomes one of privacy protection not privacy negotiation and conflict resolution. However, the findings from a large privacy survey and the outputs of several follow-up focus groups reflect a need for privacy systems to also support different types of privacy and consent dialogues. These dialogues are used to support the resolution of privacy dilemmas through the selection of effective privacy protection practices. As the face to face contact between service user and service provider decreases, the potential for these types of dialogues to become increasingly important grows. The work presented in this paper forms the initial part of a study to learn more about the types of privacy dialogue and negotiation that should be deployed in on-line services. In this position paper we outline the types of privacy and consent dialogues that service providers and service users want to have. We also explore how a socio-technical approach should ideally form the basis of the design and implementation of any dialogue system.