Developing for privacy: civility frameworks and technical design
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Optimistic security: a new access control paradigm
Proceedings of the 1999 workshop on New security paradigms
Privacy in e-commerce: examining user scenarios and privacy preferences
Proceedings of the 1st ACM conference on Electronic commerce
A new dimension in access control: studying maintenance engineering across organizational boundaries
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
Share and share alike: exploring the user interface affordances of file sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Keeping up appearances: understanding the dimensions of incidental information privacy
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Examining the content and privacy of web browsing incidental information
Proceedings of the 15th international conference on World Wide Web
A grounded theory of information sharing behavior in a personal learning space
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
Context-aware telephony: privacy preferences and sharing patterns
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
What is your husband's name?: sociological dimensions of internet banking authentication
OZCHI '06 Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments
The social dimensions of the security of internet banking
Journal of Theoretical and Applied Electronic Commerce Research
Password sharing: implications for security design based on social practice
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Exploring patterns of social commonality among file directories at work
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Designing home availability services
Personal and Ubiquitous Computing
PrivateBits: managing visual privacy in web browsers
GI '07 Proceedings of Graphics Interface 2007
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Privacy and technology: folk definitions and perspectives
CHI '08 Extended Abstracts on Human Factors in Computing Systems
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Ad-hoc guesting: when exceptions are the rule
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
Secure localised storage based on super-distributed RFID-tag infrastructures
Journal of Location Based Services - Privacy Aware and Location-Based Mobile Services
Requirements and recommendations for an enhanced meeting viewing experience
MM '08 Proceedings of the 16th ACM international conference on Multimedia
Exploring a human centered approach to managing visual privacy concerns during collaboration
HCC '08 Proceedings of the 3rd ACM international workshop on Human-centered computing
Busy families' awareness needs
International Journal of Human-Computer Studies
Discovering the Scope of Privacy Needs in Collaborative Search
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 01
Supporting privacy by preventing misclosure
CHI '09 Extended Abstracts on Human Factors in Computing Systems
xShare: supporting impromptu sharing of mobile phones
Proceedings of the 7th international conference on Mobile systems, applications, and services
A survey of computational location privacy
Personal and Ubiquitous Computing
Proceedings of the 5th Symposium on Usable Privacy and Security
Computer-supported access control
ACM Transactions on Computer-Human Interaction (TOCHI)
INTERACT '09 Proceedings of the 12th IFIP TC 13 International Conference on Human-Computer Interaction: Part II
A utility-theoretic approach to privacy and personalization
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 2
Social search and need-driven knowledge sharing in Wikis with Woogle
Proceedings of the 5th International Symposium on Wikis and Open Collaboration
Enhancing privacy management support in instant messaging
Interacting with Computers
The infrastructure problem in HCI
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Access Control for Home Data Sharing: Attitudes, Needs and Practices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Understanding information sharing from a cross-cultural perspective
CHI '10 Extended Abstracts on Human Factors in Computing Systems
Exploring reactive access control
CHI '10 Extended Abstracts on Human Factors in Computing Systems
Managing disclosure of personal health information in smart home healthcare
UAHCI'07 Proceedings of the 4th international conference on Universal access in human-computer interaction: ambient interaction
Do i do what i say?: observed versus stated privacy preferences
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction
Supporting collaborative privacy-observant information sharing using RFID-tagged objects
Advances in Human-Computer Interaction
A model of triangulating environments for policy authoring
Proceedings of the 15th ACM symposium on Access control models and technologies
Feasibility of structural network clustering for group-based privacy control in social networks
Proceedings of the Sixth Symposium on Usable Privacy and Security
Users' (mis)conceptions of social applications
Proceedings of Graphics Interface 2010
Comparing privacy attitudes of knowledge workers in the U.S. and India
Proceedings of the 3rd international conference on Intercultural collaboration
How to share your favourite search results while preserving privacy and quality
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
Proceedings of the 1st ACM International Health Informatics Symposium
Analysis of an online health social network
Proceedings of the 1st ACM International Health Informatics Symposium
Public disclosure versus private practice: challenges in business process management
ICSOC/ServiceWave'09 Proceedings of the 2009 international conference on Service-oriented computing
Toward a behavioral approach to privacy for online social networks
SocInfo'10 Proceedings of the Second international conference on Social informatics
A utility-theoretic approach to privacy in online services
Journal of Artificial Intelligence Research
With a little help from my friends: can social navigation inform interpersonal privacy preferences?
Proceedings of the ACM 2011 conference on Computer supported cooperative work
Exploring reactive access control
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Designing for privacy in personal learning spaces
The New Review of Hypermedia and Multimedia - Special issue: Observing users of digital educational technologies
Proceedings of the 13th international conference on Ubiquitous computing
Predicting selective availability for instant messaging
INTERACT'11 Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part III
A design space analysis of availability-sharing systems
Proceedings of the 24th annual ACM symposium on User interface software and technology
How and to whom people share: the role of culture in self-disclosure in online communities
Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work
Keeping Found Things Found: The Study and Practice of Personal Information Management: The Study and Practice of Personal Information Management
Regroup: interactive machine learning for on-demand group creation in social networks
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Tag, you can see it!: using tags for access control in photo sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Policy-by-example for online social networks
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Who knows about me?: an analysis of age-related disclosure preferences
BCS-HCI '11 Proceedings of the 25th BCS Conference on Human-Computer Interaction
Does your boss know where you are?: predicting adoption of LBS in the workplace
BCS-HCI '11 Proceedings of the 25th BCS Conference on Human-Computer Interaction
Self-disclosure decision making based on intimacy and privacy
Information Sciences: an International Journal
+Your circles: sharing behavior on Google+
Proceedings of the Eighth Symposium on Usable Privacy and Security
Understanding identity exposure in pervasive computing environments
Pervasive and Mobile Computing
Understanding sharing preferences and behavior for mHealth devices
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Privacy analysis in mobile social networks: the influential factors for disclosure of personal data
International Journal of Wireless and Mobile Computing
Efficient discovery of de-identification policy options through a risk-utility frontier
Proceedings of the third ACM conference on Data and application security and privacy
The post that wasn't: exploring self-censorship on facebook
Proceedings of the 2013 conference on Computer supported cooperative work
The influential factors for the variation of data sensitivity in ubiquitous social networking
International Journal of Wireless and Mobile Computing
Narrowcasting in social media: effects and perceptions
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Dimensionality of information disclosure behavior
International Journal of Human-Computer Studies
Toward strong, usable access control for shared distributed data
FAST'14 Proceedings of the 12th USENIX conference on File and Storage Technologies
Hi-index | 0.00 |
We describe studies of preferences about information sharing aimed at identifying fundamental concerns with privacy and at understanding how people might abstract the details of sharing into higher-level classes of recipients and information that are treated similarly. Thirty people specified what information they are willing to share with whom.. Although people vary in their overall level of comfort in sharing, we identified key classes of recipients and information. Such abstractions highlight the promise of developing expressive controls for sharing and privacy.