Triggers and barriers to customizing software
CHI '91 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The platform for privacy preferences
Communications of the ACM
Cookies and Web browser design: toward realizing informed consent online
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Access control with IBM Tivoli access manager
ACM Transactions on Information and System Security (TISSEC)
Web Privacy with P3p
Privacy policies as decision-making tools: an evaluation of online privacy notices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model
Information Systems Research
Gathering evidence: use of visual security cues in web browsers
GI '05 Proceedings of Graphics Interface 2005
Do security toolbars actually prevent phishing attacks?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
An architecture for privacy-sensitive ubiquitous computing
An architecture for privacy-sensitive ubiquitous computing
Employees' Behavior towards IS Security Policy Compliance
HICSS '07 Proceedings of the 40th Annual Hawaii International Conference on System Sciences
The Dynamics of Click-and-Mortar Electronic Commerce: Opportunities and Management Strategies
International Journal of Electronic Commerce
Proceedings of the 2007 international ACM conference on Supporting group work
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy patterns for online interactions
Proceedings of the 2006 conference on Pattern languages of programs
Financial Privacy Policies and the Need for Standardization
IEEE Security and Privacy
Exploring User Reactions to New Browser Cues for Extended Validation Certificates
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Journal of Management Information Systems
Design and natural science research on information technology
Decision Support Systems
Platform for enterprise privacy practices: privacy-enabled management of customer data
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Proceedings of the Sixth Symposium on Usable Privacy and Security
A pervasive P3P-based negotiation mechanism for privacy-aware pervasive e-commerce
Decision Support Systems
Privacy-Preserving OLAP: An Information-Theoretic Approach
IEEE Transactions on Knowledge and Data Engineering
An analysis of private browsing modes in modern browsers
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Web Services: Concepts, Architectures and Applications
Web Services: Concepts, Architectures and Applications
Design science in information systems research
MIS Quarterly
Searching for privacy: design and implementation of a p3p-enabled search engine
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
POCKET: A tool for protecting children's privacy online
Decision Support Systems
Hi-index | 0.00 |
Privacy concern has been identified as a major factor hindering the growth of e-business. Recently, various privacy-enhancing tools (PETs) have been proposed to protect the online privacy of Internet users. However, most of these PETs have been designed using an ad hoc approach rather than a systematic design. In this paper, we present an exploratory investigation of an end-use PET using a Value Sensitive Design approach. We propose an integrated design of a Privacy Enhancing Support System (PESS) with three proposed tools, namely privacy-enhancing search feature (PESearch), privacy-enhancing control for personal data (PEControl), and privacy-enhancing review for sharing the ratings and reviews of websites' privacy practices (PEReview). This system could enhance the interactivity of Internet users' privacy experiences, increase users' control perceptions over their personal information, and reduce their privacy concerns. An empirical evaluation of PESearch, PEControl, and PEReview revealed that novices felt the most important aspect of the tools for downloading and usage intentions was its usefulness; most experts felt the tool met the design principles as specified.