Generational development of data protection in Europe
Technology and privacy
Socially translucent systems: social proxies, persistent conversation, and the design of “babble”
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Technology and Privacy: The New Landscape
Technology and Privacy: The New Landscape
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Who wants to know what when? privacy preference determinants in ubiquitous computing
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The language of privacy: Learning from video media space analysis and design
ACM Transactions on Computer-Human Interaction (TOCHI)
Interweaving mobile games with everyday life
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Yesterday’s tomorrows: notes on ubiquitous computing’s dominant vision
Personal and Ubiquitous Computing
Privacy in Location-Aware Computing Environments
IEEE Pervasive Computing
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Accountabilities of presence: reframing location-based systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
From awareness to repartee: sharing location within social groups
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Collective information practice: emploring privacy and security as social and cultural phenomena
Human-Computer Interaction
EyeSpy: supporting navigation through play
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
"When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Understanding and capturing people's privacy policies in a mobile social networking application
Personal and Ubiquitous Computing
From spaces to places: emerging contexts in mobile privacy
Proceedings of the 11th international conference on Ubiquitous computing
The commodification of location: dynamics of power in location-based systems
Proceedings of the 11th international conference on Ubiquitous computing
Student socialization in the age of facebook
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Friends only: examining a privacy-enhancing behavior in facebook
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
On the impact of real-time feedback on users' behaviour in mobile location-sharing applications
Proceedings of the Sixth Symposium on Usable Privacy and Security
Proceedings of the 12th ACM international conference on Ubiquitous computing
Empirical models of privacy in location sharing
Proceedings of the 12th ACM international conference on Ubiquitous computing
Proceedings of the 12th ACM international conference on Ubiquitous computing
CoupleVIBE: mobile implicit communication to improve awareness for (long-distance) couples
Proceedings of the ACM 2011 conference on Computer supported cooperative work
Tweets from Justin Bieber's heart: the dynamics of the location field in user profiles
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs
Personal and Ubiquitous Computing
Contextual gaps: privacy issues on Facebook
Ethics and Information Technology
UbiComp'05 Proceedings of the 7th international conference on Ubiquitous Computing
Long-term effects of ubiquitous surveillance in the home
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Privacy management in dynamic groups: understanding information privacy in medical practices
Proceedings of the 2013 conference on Computer supported cooperative work
Taking data exposure into account: how does it affect the choice of sign-in accounts?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Using contextual integrity to examine interpersonal information boundary on social network sites
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Can you see me now?: location, visibility and the management of impressions on foursquare
Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services
Adaptive information-sharing for privacy-aware mobile social networks
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
The policy knot: re-integrating policy, practice and design in cscw studies of social computing
Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing
A reflexive analysis of 'context' in privacy research: Two case studies in HIV care
International Journal of Human-Computer Studies
Hi-index | 0.01 |
Privacy is a widely studied concept in relation to social computing and sensor-based technologies; scores of research papers have investigated people's "privacy preferences" and apparent reluctance to share personal data. In this paper we explore how Ubicomp and HCI studies have approached the notion of privacy, often as a quantifiable concept. Leaning on several theoretical frameworks, but in particular Nissenbaum's notion of contextual integrity, we question the viability of obtaining universal answers in terms of people's "general" privacy practices and apply elements of Nissenbaum's theory to our own data in order to illustrate its relevance. We then suggest restructuring inquiries into information sharing in studies of state-of-the-art technologies and analyze contextually grounded issues using a different, more specific vocabulary. Finally, we provide the first building blocks to such vocabulary.