Cognitive walkthroughs: a method for theory-based evaluation of user interfaces
International Journal of Man-Machine Studies
The platform for privacy preferences
Communications of the ACM
Design and implementation of the idemix anonymous credential system
Proceedings of the 9th ACM conference on Computer and communications security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
User interfaces for privacy agents
ACM Transactions on Computer-Human Interaction (TOCHI)
Thoughtful Interaction Design: A Design Perspective on Information Technology
Thoughtful Interaction Design: A Design Perspective on Information Technology
Usability and privacy in identity management architectures
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
Identity management: multiple presentations of self in facebook
Proceedings of the 2007 international ACM conference on Supporting group work
Handbook of Usability TestingXXX: Howto Plan, Design, and Conduct Effective Tests
Handbook of Usability TestingXXX: Howto Plan, Design, and Conduct Effective Tests
The Seven Flaws of Identity Management: Usability and Security Challenges
IEEE Security and Privacy
Lockr: better privacy for social networks
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Audience Segregation in Social Network Sites
SOCIALCOM '10 Proceedings of the 2010 IEEE Second International Conference on Social Computing
Digital privacy
Privacy and Identity Management for Life
Privacy and Identity Management for Life
Talking in circles: selective sharing in google+
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
+Your circles: sharing behavior on Google+
Proceedings of the Eighth Symposium on Usable Privacy and Security
Privacy-Friendly cloud storage for the data track: an educational transparency tool
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
Hi-index | 0.00 |
Whereas in real everyday life individuals have an intuitive approach at deciding which information to disseminate to others, in the digital world it becomes difficult to keep control over the information that is distributed to different online services. In this paper we present the design of a user interface for a system that can help users decide which pieces of information to distribute to which type of service providers by allowing them to segregate their information attributes into various personalized profiles. Iterative usability evaluations showed that users understand and appreciate the possibility to segregate information, and revealed possible improvements, implications and limitations of such an interface.