Privacy interfaces for information management
Communications of the ACM
Privacy in e-commerce: examining user scenarios and privacy preferences
Proceedings of the 1st ACM conference on Electronic commerce
Keeping found things found on the web
Proceedings of the tenth international conference on Information and knowledge management
Privacy critics: UI components to safeguard users' privacy
CHI '99 Extended Abstracts on Human Factors in Computing Systems
Who wants to know what when? privacy preference determinants in ubiquitous computing
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Developing and Validating Trust Measures for e-Commerce: An Integrative Typology
Information Systems Research
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy in electronic commerce and the economics of immediate gratification
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
Who gets to know what when: configuring privacy permissions in an awareness application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy gradients: exploring ways to manage incidental information during co-located collaboration
CHI '05 Extended Abstracts on Human Factors in Computing Systems
A study of preferences for sharing and privacy
CHI '05 Extended Abstracts on Human Factors in Computing Systems
Information search and re-access strategies of experienced web users
WWW '05 Proceedings of the 14th international conference on World Wide Web
Two experiences designing for effective security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Gathering evidence: use of visual security cues in web browsers
GI '05 Proceedings of Graphics Interface 2005
Role-based control of shared application views
Proceedings of the 18th annual ACM symposium on User interface software and technology
Uncovering privacy attitudes and practices in instant messaging
GROUP '05 Proceedings of the 2005 international ACM SIGGROUP conference on Supporting group work
Keeping up appearances: understanding the dimensions of incidental information privacy
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Protecting private data in public
CHI '06 Extended Abstracts on Human Factors in Computing Systems
Examining the content and privacy of web browsing incidental information
Proceedings of the 15th international conference on World Wide Web
The impact of task on the usage of web browser navigation mechanisms
GI '06 Proceedings of Graphics Interface 2006
“Need to know”: examining information need in location discourse
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
Exploring a human centered approach to managing visual privacy concerns during collaboration
HCC '08 Proceedings of the 3rd ACM international workshop on Human-centered computing
Privacy-aware shared UI toolkit for nomadic environments
Software—Practice & Experience
Hi-index | 0.00 |
Privacy can be an issue during collaboration around a personal display when previous browsing activities become visible within web browser features (e.g., AutoComplete). Users currently lack methods to present only appropriate traces of prior activity in these features. In this paper we explore a semi-automatic approach to privacy management that allows users to classify traces of browsing activity and filter them appropriately when their screen is visible by others. We developed PrivateBits, a prototype web browser that instantiates previously proposed general design guidelines for privacy management systems as well as those specific to web browser visual privacy. A preliminary evaluation found this approach to be flexible enough to meet participants' varying privacy concerns, privacy management strategies, and viewing contexts. However, the results also emphasized the need for additional security features to increase trust in the system and raised questions about how to best manage the tradeoff between ease of use and system concealment.