Triggers and barriers to customizing software
CHI '91 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Locating systems at work: implications for the development of active badge applications
Interacting with Computers
Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems
CSCW '96 Proceedings of the 1996 ACM conference on Computer supported cooperative work
Technology and privacy
Do categories have politics? The language/action perspective reconsidered
Human values and the design of computer technology
Social, individual and technological issues for groupware calendar systems
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Taming the wolf in sheep's clothing: privacy in multimedia communications
MULTIMEDIA '99 Proceedings of the seventh ACM international conference on Multimedia (Part 1)
Multimedia information changes the whole privacy ballgame
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
The effects of filtered video on awareness and privacy
CSCW '00 Proceedings of the 2000 ACM conference on Computer supported cooperative work
Interaction and outeraction: instant messaging in action
CSCW '00 Proceedings of the 2000 ACM conference on Computer supported cooperative work
Cookies and Web browser design: toward realizing informed consent online
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Linking public spaces: technical and social issues
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Making sense of sensing systems: five questions for designers and researchers
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Usability and privacy: a study of Kazaa P2P file-sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Who wants to know what when? privacy preference determinants in ubiquitous computing
CHI '03 Extended Abstracts on Human Factors in Computing Systems
User needs for location-aware mobile services
Personal and Ubiquitous Computing
Usability meets security - the Identity-Manager as your personal security assistant for the Internet
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Informed Consent in the Mozilla Browser: Implementing Value Sensitive Design
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 8 - Volume 8
Designing for Ubiquity: The Perception of Privacy
IEEE Pervasive Computing
SenSay: A Context-Aware Mobile Phone
ISWC '03 Proceedings of the 7th IEEE International Symposium on Wearable Computers
How push-to-talk makes talk less pushy
GROUP '03 Proceedings of the 2003 international ACM SIGGROUP conference on Supporting group work
Friendster and publicly articulated social networking
CHI '04 Extended Abstracts on Human Factors in Computing Systems
Design for privacy in ubiquitous computing environments
ECSCW'93 Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
The intellectual challenge of CSCW: the gap between social requirements and technical feasibility
Human-Computer Interaction
Human-Computer Interaction
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Who gets to know what when: configuring privacy permissions in an awareness application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Usable security and privacy: a case study of developing privacy management tools
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Bridging the gap between organizational and user perspectives of security in the clinical domain
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Tensions in designing capture technologies for an evidence-based care community
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Nokia sensor: from research to product
DUX '05 Proceedings of the 2005 conference on Designing for User eXperience
User interfaces for privacy agents
ACM Transactions on Computer-Human Interaction (TOCHI)
Context-aware telephony: privacy preferences and sharing patterns
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Capturing, sharing, and using local place information
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
PrivateBits: managing visual privacy in web browsers
GI '07 Proceedings of Graphics Interface 2007
Precision: Privacy Enhanced Context-Aware Information Fusion in Ubiquitous Healthcare
SEPCASE '07 Proceedings of the 1st International Workshop on Software Engineering for Pervasive Computing Applications, Systems, and Environments
Privacy and the access of information in a smart house environment
Proceedings of the 15th international conference on Multimedia
Physical Access Control for Captured RFID Data
IEEE Pervasive Computing
Privacy in Location-Aware Computing Environments
IEEE Pervasive Computing
Disappearing for a while - using white lies in pervasive computing
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Privacy in the open: how attention mediates awareness and privacy in open-plan offices
Proceedings of the 2007 international ACM conference on Supporting group work
Social Science Computer Review
Investigating Privacy Attitudes and Behavior in Relation to Personalization
Social Science Computer Review
Social Science Computer Review
Access control by testing for shared knowledge
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A user study of policy creation in a flexible access-control system
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Urban sensing systems: opportunistic or participatory?
Proceedings of the 9th workshop on Mobile computing systems and applications
Dynamic privacy assessment in a smart house environment using multimodal sensing
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Challenges of Designing Privacy Enhanced Context-Aware Middleware for Assisted Healthcare
ICOST '08 Proceedings of the 6th international conference on Smart Homes and Health Telematics
Exploring awareness related messaging through two situated-display-based systems
Human-Computer Interaction
ACM Transactions on Accessible Computing (TACCESS)
Older adults' privacy considerations for vision based recognition methods of eldercare applications
Technology and Health Care
Smart Privacy Management in Ubiquitous Computing Environments
Proceedings of the Symposium on Human Interface 2009 on Human Interface and the Management of Information. Information and Interaction. Part II: Held as part of HCI International 2009
Faces of Privacy: Effect of Culture and Context
INTERACT '09 Proceedings of the 12th IFIP TC 13 International Conference on Human-Computer Interaction: Part I
Mobile Identity Management Revisited
Electronic Notes in Theoretical Computer Science (ENTCS)
An empirical investigation of attitude towards location-aware social network service
International Journal of Mobile Communications
Digital parenting: designing children's safety
Proceedings of the 23rd British HCI Group Annual Conference on People and Computers: Celebrating People and Technology
Teaching privacy with ubicomp scenarios in HCI classes
OZCHI '09 Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7
Enhancing privacy management support in instant messaging
Interacting with Computers
Lightweight selective availability in instant messaging
CHI '10 Extended Abstracts on Human Factors in Computing Systems
Users and trust: the new threats, the new possibilities
UAHCI'07 Proceedings of the 4th international conference on Universal access in human-computer interaction: applications and services
How to build awareness-supported systems without sacrificing privacy
CSCWD'06 Proceedings of the 10th international conference on Computer supported cooperative work in design III
Field deployment of IMBuddy: a study of privacy control and feedback mechanisms for contextual IM
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Usability improvements for WLAN access
HCI'07 Proceedings of the 12th international conference on Human-computer interaction: interaction design and usability
Usability challenges in security and privacy policy-authoring interfaces
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
Supporting collaborative privacy-observant information sharing using RFID-tagged objects
Advances in Human-Computer Interaction
A model of triangulating environments for policy authoring
Proceedings of the 15th ACM symposium on Access control models and technologies
Feasibility of structural network clustering for group-based privacy control in social networks
Proceedings of the Sixth Symposium on Usable Privacy and Security
On the impact of real-time feedback on users' behaviour in mobile location-sharing applications
Proceedings of the Sixth Symposium on Usable Privacy and Security
Proceedings of the 12th international conference on Human computer interaction with mobile devices and services
Practices of balancing privacy and publicness in social network services
Proceedings of the 16th ACM international conference on Supporting group work
Identity in the Information Society
Trusting to learn: trust and privacy issues in serious games
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
HI'11 Proceedings of the 2011 international conference on Human interface and the management of information - Volume Part I
An investigation into facebook friend grouping
INTERACT'11 Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part III
Personalising context-aware applications
OTM'05 Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems
DigiDress: a field trial of an expressive social proximity application
UbiComp'05 Proceedings of the 7th international conference on Ubiquitous Computing
Development of a privacy addendum for open source licenses: value sensitive design in industry
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
More than modelling and hiding: towards a comprehensive view of Web mining and privacy
Data Mining and Knowledge Discovery
Regroup: interactive machine learning for on-demand group creation in social networks
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Policy-by-example for online social networks
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Understanding identity exposure in pervasive computing environments
Pervasive and Mobile Computing
Privacy is a process, not a PET: a theory for effective privacy practice
Proceedings of the 2012 workshop on New security paradigms
Grounding Privacy in Mediated Communication
Computer Supported Cooperative Work
Privacy analysis in mobile social networks: the influential factors for disclosure of personal data
International Journal of Wireless and Mobile Computing
An online experiment of privacy authorization dialogues for social applications
Proceedings of the 2013 conference on Computer supported cooperative work
What a tangled web we weave: lying backfires in location-sharing social media
Proceedings of the 2013 conference on Computer supported cooperative work
The influential factors for the variation of data sensitivity in ubiquitous social networking
International Journal of Wireless and Mobile Computing
Narrowcasting in social media: effects and perceptions
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Proceedings of the 2013 ACM international symposium on New ideas, new paradigms, and reflections on programming & software
Proceedings of International Conference on Advances in Mobile Computing & Multimedia
A reflexive analysis of 'context' in privacy research: Two case studies in HIV care
International Journal of Human-Computer Studies
A look at unsociability on Facebook
BCS-HCI '13 Proceedings of the 27th International BCS Human Computer Interaction Conference
Hi-index | 0.00 |
To participate in meaningful privacy practice in the context of technical systems, people require opportunities to understand the extent of the systems’ alignment with relevant practice and to conduct discernible social action through intuitive or sensible engagement with the system. It is a significant challenge to design for such understanding and action through the feedback and control mechanisms of today’s devices. To help designers meet this challenge, we describe five pitfalls to beware when designing interactive systems—on or off the desktop—with personal privacy implications. These pitfalls are: (1) obscuring potential information flow, (2) obscuring actual information flow, (3) emphasizing configuration over action, (4) lacking coarse-grained control, and (5) inhibiting existing practice. They are based on a review of the literature, on analyses of existing privacy-affecting systems, and on our own experiences in designing a prototypical user interface for managing privacy in ubiquitous computing. We illustrate how some existing research and commercial systems—our prototype included—fall into these pitfalls and how some avoid them. We suggest that privacy-affecting systems that heed these pitfalls can help users appropriate and engage them in alignment with relevant privacy practice.