The depth/breadth trade-off in the design of menu-driven user interfaces
International Journal of Man-Machine Studies
Accommodating individual differences in searching a hierarchical file system
International Journal of Man-Machine Studies
Web page design: implications of memory, structure and scent for information retrieval
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
User Interaction Design for Secure Systems
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
The many colors of multimedia security
Communications of the ACM - The Blogosphere
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
Listening in: practices surrounding iTunes music sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Content availability, pollution and poisoning in file sharing peer-to-peer networks
Proceedings of the 6th ACM conference on Electronic commerce
Omnivore: risk management through bidirectional transparency
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Two experiences designing for effective security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Stopping spyware at the gate: a user study of privacy, notice and spyware
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Social navigation as a model for usable security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Improving user-interface dependability through mitigation of human error
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
LLSS: toward system support for plugging privacy leaks
Proceedings of the twentieth ACM symposium on Operating systems principles
Share and share alike: exploring the user interface affordances of file sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Noticing notice: a large-scale experiment on the timing of software license agreements
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Exploring patterns of social commonality among file directories at work
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Investigating Privacy Attitudes and Behavior in Relation to Personalization
Social Science Computer Review
Expandable grids for visualizing and authoring computer security policies
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
An analytical framework for evaluating peer-to-peer business models
Electronic Commerce Research and Applications
The social web: global village or private cliques?
Proceedings of the 2007 conference on Designing for User eXperiences
Family accounts: a new paradigm for user accounts within the home environment
Proceedings of the 2008 ACM conference on Computer supported cooperative work
Why file sharing networks are dangerous?
Communications of the ACM - Inspiring Women in Computing
Collective information practice: emploring privacy and security as social and cultural phenomena
Human-Computer Interaction
Information displays for managing shared files
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
Journal of Management Information Systems
SPATE: small-group PKI-less authenticated trust establishment
Proceedings of the 7th international conference on Mobile systems, applications, and services
Proceedings of the 5th Symposium on Usable Privacy and Security
The effects of introspection on creating privacy policy
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Real-time performance analysis for publish/subscribe systems
Future Generation Computer Systems
How to build awareness-supported systems without sacrificing privacy
CSCWD'06 Proceedings of the 10th international conference on Computer supported cooperative work in design III
Usability challenges in security and privacy policy-authoring interfaces
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
Empirical studies on software notices to inform policy makers and usability designers
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Two heads are better than one: security and usability of device associations in group scenarios
Proceedings of the Sixth Symposium on Usable Privacy and Security
Tightlip: keeping applications from spilling the beans
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
More than skin deep: measuring effects of the underlying model on access-control system usability
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A statistical study of today’s gnutella
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
Representing our information structures for research and for everyday use
CHI '12 Extended Abstracts on Human Factors in Computing Systems
Adaptive service node placements in P2P-like architectures
ACACOS'12 Proceedings of the 11th WSEAS international conference on Applied Computer and Applied Computational Science
How many eyes are spying on your shared folders?
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
TrustNeighborhoods: visualizing trust in distributed file sharing systems
EUROVIS'07 Proceedings of the 9th Joint Eurographics / IEEE VGTC conference on Visualization
Exploring user preferences for privacy interfaces in mobile sensing applications
Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia
Privacy is a process, not a PET: a theory for effective privacy practice
Proceedings of the 2012 workshop on New security paradigms
Consumer Piracy Risk: Conceptualization and Measurement in Music Sharing
International Journal of Electronic Commerce
Proceedings of International Conference on Advances in Mobile Computing & Multimedia
Hi-index | 0.01 |
P2P file sharing systems such as Gnutella, Freenet, and KaZaA, while primarily intended for sharing multimedia files, frequently allow other types of information to be shared. This raises serious concerns about the extent to which users may unknowingly be sharing private or personal information.In this paper, we report on a cognitive walkthrough and a laboratory user study of the KaZaA file sharing user interface. The majority of the users in our study were unable to tell what files they were sharing, and sometimes incorrectly assumed they were not sharing any files when in fact they were sharing all files on their hard drive. An analysis of the KaZaA network suggested that a large number of users appeared to be unwittingly sharing personal and private files, and that some users were indeed taking advantage of this and downloading files containing ostensibly private information.