Realizing a video environment: EuroPARC's RAVE system
CHI '92 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Role-Based Access Control Models
Computer
Protection in operating systems
Communications of the ACM
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Preserving Privacy in Environments with Location-Based Applications
IEEE Pervasive Computing
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
SD3: A Trust Management System with Certified Evaluation
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Providing architectural support for building context-aware applications
Providing architectural support for building context-aware applications
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Privacy protecting data collection in media spaces
Proceedings of the 12th annual ACM international conference on Multimedia
A logic-based framework for attribute based access control
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Who gets to know what when: configuring privacy permissions in an awareness application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Location Privacy in Mobile Systems: A Personalized Anonymization Model
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Protecting Location Privacy Through Path Confusion
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Attribute-Based Access Control with Hidden Policies and Hidden Credentials
IEEE Transactions on Computers
OACerts: Oblivious Attribute Certificates
IEEE Transactions on Dependable and Secure Computing
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Design for privacy in ubiquitous computing environments
ECSCW'93 Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work
Proceedings of the 6th ACM conference on Embedded network sensor systems
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A privacy framework for mobile health and home-care systems
Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems
Oblivious enforcement of hidden information release policies
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Virtual walls: protecting digital privacy in pervasive environments
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Field deployment of IMBuddy: a study of privacy control and feedback mechanisms for contextual IM
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Empirical models of privacy in location sharing
Proceedings of the 12th ACM international conference on Ubiquitous computing
Locaccino: a privacy-centric location sharing application
Proceedings of the 12th ACM international conference adjunct papers on Ubiquitous computing - Adjunct
Are you exposed?: conveying information exposure
Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work Companion
PlexC: a policy language for exposure control
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
My privacy policy: exploring end-user specification of free-form location access rules
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
Attire: conveying information exposure through avatar apparel
Proceedings of the 2013 conference on Computer supported cooperative work companion
When privacy and utility are in harmony: towards better design of presence technologies
Personal and Ubiquitous Computing
Combining social authentication and untrusted clouds for private location sharing
Proceedings of the 18th ACM symposium on Access control models and technologies
Proximity sensor: privacy-aware location sharing
Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services
Hi-index | 0.00 |
A large body of research has focused on disclosure policies for controlling information release in social sharing (e.g., location-based) applications. However, less work has considered how exposed these policies actually leave users; i.e., to what extent are disclosures in compliance with these policies actually being made? For instance, consider a disclosure policy granting Alice's coworkers access to her location during work hours. Alice might feel that this policy appropriately controls her exposure, but may feel differently if she learned that her boss was accessing her location every 5 minutes. In addition to specifying who has access to personal information, users need a way to quantify, interpret, and control the extent to which this data is shared. We propose and evaluate an intuitive mechanism for summarizing and controlling a user's exposure on smartphone-based platforms. Our approach uses the visual metaphor of eyes appearing and growing in size on the home screen; the rate at which these eyes grow depends on the number of accesses granted for a user's location, and the type of person (e.g., family vs. friend) making these accesses. This approach gives users an accurate and ambient sense of their exposure and helps them take actions to limit their exposure, all without explicitly identifying the social contacts making requests. Through two systematic user studies (N = 43,41) we show that our interface is indeed effective at summarizing complex exposure information and provides comparable information to a more cumbersome interface presenting more detailed information.