Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems
CSCW '96 Proceedings of the 1996 ACM conference on Computer supported cooperative work
Ethics of computing: codes, spaces for discussion and law
Ethics of computing: codes, spaces for discussion and law
Privacy in e-commerce: examining user scenarios and privacy preferences
Proceedings of the 1st ACM conference on Electronic commerce
The effects of filtered video on awareness and privacy
CSCW '00 Proceedings of the 2000 ACM conference on Computer supported cooperative work
Multilateral security a concept and examples for balanced security
Proceedings of the 2000 workshop on New security paradigms
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
Development and evaluation of emerging design patterns for ubiquitous computing
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
A Framework for Comparing Perspectives on Privacy and Pervasive Technologies
IEEE Pervasive Computing
Tensions in designing capture technologies for an evidence-based care community
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
On the relative importance of privacy guidelines for ambient health care
Proceedings of the 4th Nordic conference on Human-computer interaction: changing roles
Physical Access Control for Captured RFID Data
IEEE Pervasive Computing
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Investigating Privacy Attitudes and Behavior in Relation to Personalization
Social Science Computer Review
From privacy methods to a privacy toolbox: Evaluation shows that heuristics are complementary
ACM Transactions on Computer-Human Interaction (TOCHI)
Pervasive '08 Proceedings of the 6th International Conference on Pervasive Computing
Ubiquitous Computing for Capture and Access
Foundations and Trends in Human-Computer Interaction
Providing integrity and authenticity in DICOM images: a novel approach
IEEE Transactions on Information Technology in Biomedicine - Special section on biomedical informatics
Teaching privacy with ubicomp scenarios in HCI classes
OZCHI '09 Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7
Enhancing privacy management support in instant messaging
Interacting with Computers
Designing an aural comprehension aid for interlingual communication
IWIC'07 Proceedings of the 1st international conference on Intercultural collaboration
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Understanding compliance to privacy guidelines using text-and video-based scenarios
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
UbiComp'05 Proceedings of the 7th international conference on Ubiquitous Computing
Investigating receptiveness to sensing and inference in the home using sensor proxies
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Digital neighborhood watch: investigating the sharing of camera data amongst neighbors
Proceedings of the 2013 conference on Computer supported cooperative work
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Supporting Effortless Coordination: 25 Years of Awareness Research
Computer Supported Cooperative Work
Hi-index | 0.01 |
We argue that an analytic proportionality assessment balancing usefulness and burden on individual or group privacy must be conducted throughout the design process to create acceptable ubiquitous computing (ubicomp) applications and services. We introduce the principle of proportionality, which originates within the legal and data protection communities. Inspired by this principle, we develop a design method for ubicomp applications, based on our own experience, and aimed at HCI practitioners and designers. We discuss the method in relation to real-world examples, user inquiry techniques and requirements engineering models. Finally, we report a sample application of the method, involving a ubiquitous, personal memory aid tool.