E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
Proceedings of the 3rd ACM conference on Electronic Commerce
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Privacy and Rationality in Individual Decision Making
IEEE Security and Privacy
Who gets to know what when: configuring privacy permissions in an awareness application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A face(book) in the crowd: social Searching vs. social browsing
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
A survey of trust and reputation systems for online service provision
Decision Support Systems
Yesterday’s tomorrows: notes on ubiquitous computing’s dominant vision
Personal and Ubiquitous Computing
The Emperor's New Security Indicators
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
The new school of information security
The new school of information security
Collective information practice: emploring privacy and security as social and cultural phenomena
Human-Computer Interaction
Adaptive Security Dialogs for Improved Security Behavior of Users
INTERACT '09 Proceedings of the 12th IFIP TC 13 International Conference on Human-Computer Interaction: Part I
Designing participation in agile ridesharing with mobile social software
OZCHI '09 Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7
Design from the everyday: continuously evolving, embedded exploratory prototypes
Proceedings of the 8th ACM Conference on Designing Interactive Systems
Proceedings of the 11th Biennial Participatory Design Conference
Proceedings of the 22nd Conference of the Computer-Human Interaction Special Interest Group of Australia on Computer-Human Interaction
An opportunistic client user interface to support centralized ride share planning
Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration
Hi-index | 0.00 |
Many current HCI, social networking, ubiquitous computing, and context aware designs, in order for the design to function, have access to, or collect, significant personal information about the user. This raises concerns about privacy and security, in both the research community and main-stream media. From a practical perspective, in the social world, secrecy and security form an ongoing accomplishment rather than something that is set up and left alone. We explore how design can support privacy as practical action, and investigate the notion of collective information-practice of privacy and security concerns of participants of a mobile, social software for ride sharing. This paper contributes an understanding of HCI security and privacy tensions, discovered while "designing in use" using a Reflective, Agile, Iterative Design (RAID) method.