The media equation: how people treat computers, television, and new media like real people and places
Human values and the design of computer technology
Human values and the design of computer technology
Computers are social actors: a review of current research
Human values and the design of computer technology
Steps toward universal access with a communications company
Human values and the design of computer technology
Communications of the ACM
ACM Transactions on Internet Technology (TOIT)
What's in a barcode? informed consent and machine scannable driver licenses
CHI '03 Extended Abstracts on Human Factors in Computing Systems
The human-computer interaction handbook
Human values, ethics, and design
The human-computer interaction handbook
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
WWW '05 Proceedings of the 14th international conference on World Wide Web
Omnivore: risk management through bidirectional transparency
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Secrecy, flagging, and paranoia: adoption criteria in encrypted email
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
An examination of user perception and misconception of internet cookies
CHI '06 Extended Abstracts on Human Factors in Computing Systems
User interfaces for privacy agents
ACM Transactions on Computer-Human Interaction (TOCHI)
Doppelganger: Better browser privacy without the bother
Proceedings of the 13th ACM conference on Computer and communications security
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Collective information practice: emploring privacy and security as social and cultural phenomena
Human-Computer Interaction
Design methods for ethical persuasive computing
Proceedings of the 4th International Conference on Persuasive Technology
Challenges in supporting end-user privacy and security management with social navigation
Proceedings of the 5th Symposium on Usable Privacy and Security
Methods for Evaluating Interactive Information Retrieval Systems with Users
Foundations and Trends in Information Retrieval
Making love in the network closet: the benefits and work of family videochat
Proceedings of the 2010 ACM conference on Computer supported cooperative work
Proceedings of the Sixth Symposium on Usable Privacy and Security
An automatic HTTP cookie management system
Computer Networks: The International Journal of Computer and Telecommunications Networking
An analysis of private browsing modes in modern browsers
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
What blogs tell us about websites: a demographics study
Proceedings of the fourth ACM international conference on Web search and data mining
Next steps for value sensitive design
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy-preserving social plugins
Security'12 Proceedings of the 21st USENIX conference on Security symposium
A Value Sensitive Design Investigation of Privacy Enhancing Tools in Web Browsers
Decision Support Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Hi-index | 0.01 |
We first provide criteria for assessing informed consent online. Then we examine how cookie technology and Web browser designs have responded to concerns about informed consent. Specifically, we document relevant design changes in Netscape Navigator and Internet Explorer over a 5-year period, starting in 1995. Our retrospective analyses leads us to conclude that while cookie technology has improved over time regarding informed consent, some startling problems remain. We specify six of these problems and offer design remedies. This work fits within the emerging field of Value-Sensitive Design.