PICS: Internet access controls without censorship
Communications of the ACM
Human values and the design of computer technology
Social impact statements: engaging public participation in information technology design
Human values and the design of computer technology
The platform for privacy preferences
Communications of the ACM
Cookies and Web browser design: toward realizing informed consent online
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
HTTP Cookies: Standards, privacy, and politics
ACM Transactions on Internet Technology (TOIT)
Proceedings of the 12th annual conference on Computers, freedom and privacy
Code and Other Laws of Cyberspace
Code and Other Laws of Cyberspace
Privacy critics: UI components to safeguard users' privacy
CHI '99 Extended Abstracts on Human Factors in Computing Systems
Web Privacy with P3p
Privacy-enhancing technologies for the internet, II: five years later
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Privacy in pervasive environments: next generation labeling protocols
Personal and Ubiquitous Computing
The language of privacy: Learning from video media space analysis and design
ACM Transactions on Computer-Human Interaction (TOCHI)
Dynamic privacy management: a plug-in service for the middleware in pervasive computing
Proceedings of the 7th international conference on Human computer interaction with mobile devices & services
An analysis of P3P-enabled web sites among top-20 search results
ICEC '06 Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet
User interfaces for privacy agents
ACM Transactions on Computer-Human Interaction (TOCHI)
Online information disclosure: Motivators and measurements
ACM Transactions on Internet Technology (TOIT)
IEEE Pervasive Computing
A Survey and Analysis of the P3P Protocol's Agents, Adoption, Maintenance, and Future
IEEE Transactions on Dependable and Secure Computing
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Electronic Commerce Research and Applications
Timing is everything?: the effects of timing and placement of online privacy indicators
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A practical generic privacy language
ICISS'10 Proceedings of the 6th international conference on Information systems security
Extending p3p to facilitate proxies which pose as a potential threat to privacy
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Hi-index | 0.00 |
As a "social protocol" aimed at providing a technological means to address concerns over Internet privacy, the Platform for Privacy Preferences (P3P) has been controversial since its announcement in 1997. In the U.S., critics have decried P3P as an industry attempt to avoid meaningful privacy legislation, while developers have portrayed the proposal as a tool for helping users make informed decisions about the impact of their Web surfing choices. This dispute touches upon the privacy model underlying P3P, the U.S. political context regarding privacy, and the technical components of the protocol. This article presents an examination of these factors, with an eye towards distilling lessons for developers of future social protocols.