Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Who wants to know what when? privacy preference determinants in ubiquitous computing
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ECSCW'01 Proceedings of the seventh conference on European Conference on Computer Supported Cooperative Work
Place lab: device positioning using radio beacons in the wild
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Social disclosure of place: from location technology to communication practices
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The whereabouts clock: early testing of a situated awareness device
CHI '06 Extended Abstracts on Human Factors in Computing Systems
Home-school technologies: considering the family
Proceedings of the 2006 conference on Interaction design and children
Extending the location API for J2ME™ to support friend finder services
Proceedings of the 2006 ACM symposium on Applied computing
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Accountabilities of presence: reframing location-based systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
From awareness to repartee: sharing location within social groups
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Devices that tell on you: privacy trends in consumer ubiquitous computing
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
From privacy methods to a privacy toolbox: Evaluation shows that heuristics are complementary
ACM Transactions on Computer-Human Interaction (TOCHI)
Anonysense: privacy-aware people-centric sensing
Proceedings of the 6th international conference on Mobile systems, applications, and services
Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems
Collective information practice: emploring privacy and security as social and cultural phenomena
Human-Computer Interaction
`Aware of What?' A Formal Model of Awareness Systems That Extends the Focus-Nimbus Model
Engineering Interactive Systems
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ACM Transactions on Accessible Computing (TACCESS)
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Pervasive '08 Proceedings of the 6th International Conference on Pervasive Computing
Friendlee: a mobile application for your social life
Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services
Magrathea: Building and Analyzing Ubiquitous and Social Systems
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 01
Opportunistic sensing: security challenges for the new paradigm
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Virtual walls: protecting digital privacy in pervasive environments
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Field deployment of IMBuddy: a study of privacy control and feedback mechanisms for contextual IM
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Locating family values: a field trial of the whereabouts clock
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Proceedings of the Sixth Symposium on Usable Privacy and Security
Modeling people's place naming preferences in location sharing
Proceedings of the 12th ACM international conference on Ubiquitous computing
Proceedings of the 12th ACM international conference on Ubiquitous computing
Evaluation of a pervasive awareness system designed for busy parents
Pervasive and Mobile Computing
AnonySense: A system for anonymous opportunistic sensing
Pervasive and Mobile Computing
In the best families: tracking and relationships
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services
“Need to know”: examining information need in location discourse
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
Privacy aware publishing of successive location information in sensor networks
Future Generation Computer Systems
Development of a privacy addendum for open source licenses: value sensitive design in industry
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
Friend or foe? relationship-based adaptation on public displays
AmI'11 Proceedings of the Second international conference on Ambient Intelligence
Measuring user confidence in smartphone security and privacy
Proceedings of the Eighth Symposium on Usable Privacy and Security
I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns
Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices
Short paper: location privacy: user behavior in the field
Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices
Participatory personal data: An emerging research challenge for the information sciences
Journal of the American Society for Information Science and Technology
Discovering personally semantic places from GPS trajectories
Proceedings of the 21st ACM international conference on Information and knowledge management
Privacy analysis in mobile social networks: the influential factors for disclosure of personal data
International Journal of Wireless and Mobile Computing
Radiator: context propagation based on delayed aggregation
Proceedings of the 2013 conference on Computer supported cooperative work
The influential factors for the variation of data sensitivity in ubiquitous social networking
International Journal of Wireless and Mobile Computing
Hi-index | 0.00 |
In this article, we describe the design process of Reno, a location-enhanced, mobile coordination tool and person finder. The design process included three field experiments: a formative Experience Sampling Method (ESM) study, a pilot deployment and an extended user study. These studies were targeted at the significant personal security, privacy and data protection concerns caused by this application. We distil this experience into a small set of guidelines for designers of social mobile applications and show how these guidelines can be applied to a different application, called Boise. These guidelines cover issues pertaining to personal boundary definition, control, deception and denial, and group vs. individual communication. We also report on lessons learned from our evaluation experience, which might help practitioners in designing novel mobile applications, including the choice and characterization of users for testing security and privacy features of designs, the length of learning curves and their effect on evaluation and the impact of peculiar deployment circumstances on the results of these finely tuned user studies.