Digital family portraits: supporting peace of mind for extended family members
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Design requirements for technologies that encourage physical activity
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Scene completion using millions of photographs
ACM SIGGRAPH 2007 papers
User-Controllable Security and Privacy for Pervasive Computing
HOTMOBILE '07 Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications
UbiGreen: investigating a mobile tool for tracking and supporting green transportation habits
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Exploring Privacy Concerns about Personal Sensing
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
HydroSense: infrastructure-mediated single-point sensing of whole-home water activity
Proceedings of the 11th international conference on Ubiquitous computing
Catalyzing social support for breast cancer patients
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A stage-based model of personal informatics systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Proceedings of the Sixth Symposium on Usable Privacy and Security
Proceedings of the 12th ACM international conference on Ubiquitous computing
Proceedings of the 12th ACM international conference on Ubiquitous computing
CoupleVIBE: mobile implicit communication to improve awareness for (long-distance) couples
Proceedings of the ACM 2011 conference on Computer supported cooperative work
Opportunities for computing technologies to support healthy sleep behaviors
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Who's your best friend?: targeted privacy attacks In location-sharing social networks
Proceedings of the 13th international conference on Ubiquitous computing
UbiComp'05 Proceedings of the 7th international conference on Ubiquitous Computing
Development of a privacy addendum for open source licenses: value sensitive design in industry
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
Fish'n'Steps: encouraging physical activity with an interactive computer game
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
Lullaby: a capture & access system for understanding the sleep environment
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Detecting leisure activities with dense motif discovery
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
What a tangled web we weave: lying backfires in location-sharing social media
Proceedings of the 2013 conference on Computer supported cooperative work
Hi-index | 0.00 |
Personal informatics applications in a variety of domains are increasingly enabled by low cost personal sensing. Although applications capture fine-grained activity for self reflection, sharing is generally limited to high level summaries. There are potential advantages to fine-grained sharing, but also potential harms. To help investigate this complex design space, we employ Value Sensitive Design to consider whether and how to share fine grained step activity. We identify key values and value tensions, and we develop scenarios to highlight these. We then design a set of data transformations that seek to maximize the benefits while minimizing the harms of detailed sharing. These include a novel approach to interactive modification of fine grained step data, allowing people to remove private data and using motif discovery to generate realistic replacement data. Finally, we conduct semi structured interviews with 12 participants examining these scenarios and transformations. We distill results into a set of design considerations for fine-grained physical activity sharing.