Why CSCW applications fail: problems in the design and evaluationof organizational interfaces
CSCW '88 Proceedings of the 1988 ACM conference on Computer-supported cooperative work
The active badge location system
ACM Transactions on Information Systems (TOIS)
Realizing a video environment: EuroPARC's RAVE system
CHI '92 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Portholes: supporting awareness in a distributed work group
CHI '92 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Media spaces: bringing people together in a video, audio, and computing environment
Communications of the ACM
Low disturbance audio for awareness and privacy in media space applications
Proceedings of the third ACM international conference on Multimedia
Thunderwire: a field study of an audio-only media space
CSCW '96 Proceedings of the 1996 ACM conference on Computer supported cooperative work
Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems
CSCW '96 Proceedings of the 1996 ACM conference on Computer supported cooperative work
Peepholes: low cost awareness of one's community
Conference Companion on Human Factors in Computing Systems
Social, individual and technological issues for groupware calendar systems
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
The effects of filtered video on awareness and privacy
CSCW '00 Proceedings of the 2000 ACM conference on Computer supported cooperative work
ConNexus to awarenex: extending awareness to mobile users
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Introducing instant messaging and chat in the workplace
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Queue - Game Development
Presence versus availability: the design and evaluation of a context-aware communication client
International Journal of Human-Computer Studies
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
Supporting groupware conventions through contextual awareness
ECSCW'97 Proceedings of the fifth conference on European Conference on Computer-Supported Cooperative Work
Keeping up appearances: understanding the dimensions of incidental information privacy
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A face(book) in the crowd: social Searching vs. social browsing
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
A grounded theory of information sharing behavior in a personal learning space
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
Context-aware telephony: privacy preferences and sharing patterns
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Designing home availability services
Personal and Ubiquitous Computing
PrivateBits: managing visual privacy in web browsers
GI '07 Proceedings of Graphics Interface 2007
Privacy in Location-Aware Computing Environments
IEEE Pervasive Computing
The magic window: lessons from a year in the life of a co-present media space
Proceedings of the 2007 international ACM conference on Supporting group work
Contact management on the wall: a card-game metaphor for large displays
Proceedings of the 2nd international conference on Tangible and embedded interaction
MyPlace Locator: Flexible Sharing of Location Information
UM '07 Proceedings of the 11th international conference on User Modeling
Collective information practice: emploring privacy and security as social and cultural phenomena
Human-Computer Interaction
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Understanding and capturing people's privacy policies in a mobile social networking application
Personal and Ubiquitous Computing
A conceptual analysis of group privacy in the virtual environment
International Journal of Networking and Virtual Organisations
Mobile map interactions during a rendezvous: exploring the implications of automation
Personal and Ubiquitous Computing
Enhancing privacy management support in instant messaging
Interacting with Computers
Catalyzing social support for breast cancer patients
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Managing disclosure of personal health information in smart home healthcare
UAHCI'07 Proceedings of the 4th international conference on Universal access in human-computer interaction: ambient interaction
Field deployment of IMBuddy: a study of privacy control and feedback mechanisms for contextual IM
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Do i do what i say?: observed versus stated privacy preferences
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction
Assessing mobile phone communication utility preferences in a social support network
Telematics and Informatics
Comparing privacy attitudes of knowledge workers in the U.S. and India
Proceedings of the 3rd international conference on Intercultural collaboration
Proceedings of the 12th ACM international conference on Ubiquitous computing
Studying mobile context-aware social services in the wild
Proceedings of the 6th Nordic Conference on Human-Computer Interaction: Extending Boundaries
How HCI design influences web security decisions
Proceedings of the 22nd Conference of the Computer-Human Interaction Special Interest Group of Australia on Computer-Human Interaction
With a little help from my friends: can social navigation inform interpersonal privacy preferences?
Proceedings of the ACM 2011 conference on Computer supported cooperative work
Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Trust-aware privacy control for social media
CHI '11 Extended Abstracts on Human Factors in Computing Systems
Designing for privacy in personal learning spaces
The New Review of Hypermedia and Multimedia - Special issue: Observing users of digital educational technologies
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs
Personal and Ubiquitous Computing
Tensions in developing a secure collective information practice - the case of agile ridesharing
INTERACT'11 Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
Predicting selective availability for instant messaging
INTERACT'11 Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part III
Eyeing your exposure: quantifying and controlling information sharing for improved privacy
Proceedings of the Seventh Symposium on Usable Privacy and Security
“Need to know”: examining information need in location discourse
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
Development of a privacy addendum for open source licenses: value sensitive design in industry
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
The implications of offering more disclosure choices for social location sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
"Check out where I am!": location-sharing motivations, preferences, and practices
CHI '12 Extended Abstracts on Human Factors in Computing Systems
Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice
Proceedings of the Eighth Symposium on Usable Privacy and Security
+Your circles: sharing behavior on Google+
Proceedings of the Eighth Symposium on Usable Privacy and Security
The PViz comprehension tool for social network privacy settings
Proceedings of the Eighth Symposium on Usable Privacy and Security
Informing and performing: investigating how mediated sociality becomes visible
Personal and Ubiquitous Computing
My privacy policy: exploring end-user specification of free-form location access rules
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
Grounding Privacy in Mediated Communication
Computer Supported Cooperative Work
Privacy manipulation and acclimation in a location sharing application
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
"Who decides?": security and privacy in the wild
Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration
Location sharing privacy preference: analysis and personalized recommendation
Proceedings of the 19th international conference on Intelligent User Interfaces
Hi-index | 0.01 |
We report on a study (N=36) of user preferences for balancing awareness with privacy. Participants defined permissions for sharing of location, availability, calendar information and instant messaging (IM) activity within an application called mySpace. MySpace is an interactive visualization of the physical workplace that provides dynamic information about people, places and equipment. We found a significant preference for defining privacy permissions at the group level. While "family" received high levels of awareness sharing, interestingly, "team" was granted comparable levels during business hours at work. Surprisingly, presenting participants with a detailed list of all pieces of personal context to which the system had access, did not result in more conservative privacy settings. Although location was the most sensitive aspect of awareness, participants were comfortable disclosing room-level location information to their team members at work. Our findings suggest utilizing grouping mechanisms to balance privacy control with configuration burden, and argue for increased system transparency to build trust.