Results 1 - 10
of
19
The Language of Privacy: Learning from video media space analysis and design
- ACM TOCHI
, 2005
"... Video media spaces are an excellent crucible for the study of privacy. Their design affords opportunities for misuse, prompts ethical questions, and engenders grave concerns from both users and nonusers. Despite considerable discussion of the privacy problems uncovered in prior work, questions remai ..."
Abstract
-
Cited by 79 (12 self)
- Add to MetaCart
Video media spaces are an excellent crucible for the study of privacy. Their design affords opportunities for misuse, prompts ethical questions, and engenders grave concerns from both users and nonusers. Despite considerable discussion of the privacy problems uncovered in prior work, questions remain as to how to design a privacy-preserving video media space and how to evaluate its effect on privacy. The problem is more deeply rooted than this, however. Privacy is an enormous concept from which a large vocabulary of terms emerges. Disambiguating the meanings of and relationships between these terms facilitates understanding of the link between privacy and design. In this article, we draw from resources in environmental psychology and computersupported cooperative work (CSCW) to build a broadly and deeply rooted vocabulary for privacy. We relate the vocabulary back to the real and hard problem of designing privacy-preserving video media spaces. In doing so, we facilitate analysis of the privacy-design relationship.
Keeping ubiquitous computing to yourself: a practical model for user control of privacy
- International Journal of Human-Computer Studies
, 2005
"... As with all the major advances in information and communication technology, ubiquitous computing (ubicomp) introduces new risks to individual privacy. Our analysis of privacy protection in ubicomp has identified four layers through which users must navigate: the regulatory regime they are currently ..."
Abstract
-
Cited by 33 (5 self)
- Add to MetaCart
As with all the major advances in information and communication technology, ubiquitous computing (ubicomp) introduces new risks to individual privacy. Our analysis of privacy protection in ubicomp has identified four layers through which users must navigate: the regulatory regime they are currently in, the type of ubicomp service required, the type of data being disclosed, and their personal privacy policy. We illustrate and compare the protection afforded by regulation and by some major models for user control of privacy. We identify the shortcomings of each and propose a model which allows user control of privacy levels in a ubicomp environment. Our model balances the user’s privacy preferences against the applicable privacy regulations and incorporates five types of user controlled “noise ” to protect location privacy by introducing ambiguities. We also incorporate an economics-based approach to assist users in balancing the trade-offs between giving up privacy and receiving ubicomp services. We conclude with a scenario and heuristic evaluation which suggests that regulation can have both positive and negative influences on privacy interfaces in ubicomp and that social translucence is an important heuristic for ubicomp privacy interface functionality.
Towards everyday privacy for ubiquitous computing
, 2003
"... The goal of everyday privacy is to make it easy for endusers to share information with the right people at the right level of detail in ubiquitous computing environments. In this paper, we describe a conceptual model we have developed for everyday privacy, consisting of control over and feedback abo ..."
Abstract
-
Cited by 10 (1 self)
- Add to MetaCart
The goal of everyday privacy is to make it easy for endusers to share information with the right people at the right level of detail in ubiquitous computing environments. In this paper, we describe a conceptual model we have developed for everyday privacy, consisting of control over and feedback about disclosure. We also describe a prototype we have created for helping end-users manage their personal privacy, an evaluation of that prototype, and a revised prototype based on feedback from the evaluation.
Losses, Gains, and Hyperbolic Discounting: An Experimental Approach to Information Security Attitudes and Behavior
, 2003
"... 2nd Annual Workshop on “Economics and Information Security” Surveys and experiments have uncovered a dichotomy between stated attitudes and actual behavior of individuals facing decisions affecting their privacy and their personal information security. Surveys report that most individuals are concer ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
(Show Context)
2nd Annual Workshop on “Economics and Information Security” Surveys and experiments have uncovered a dichotomy between stated attitudes and actual behavior of individuals facing decisions affecting their privacy and their personal information security. Surveys report that most individuals are concerned about the security of their personal information and are willing to act to protect it. Experiments reveal that very few individuals actually take any action to protect their personal information, even when doing so involves limited costs. In this paper we analyze the causes of this dichotomy. We discuss which economic considerations are likely to affect individual choice and we advance testable hypotheses about why individuals ’ information security attitudes seem inconsistent with their behavior. We then outline an experimental design to test our hypotheses. The experiment is designed to compare individuals ’ characteristics as market agents to their information security attitudes and behavior.
An User-centric MIX-net Protocol to Protect Privacy
- In Proc. of the Workshop on Privacy in Digital Environments: Empowering Users
, 2002
"... MIX-net" systems protect the privacy of participants by clouding together their transactions through cascades of third parties. Reliability and trust are therefore open issues in this literature and limit the applicability of these systems. This paper discusses how the MIX approach can be ad ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
MIX-net" systems protect the privacy of participants by clouding together their transactions through cascades of third parties. Reliability and trust are therefore open issues in this literature and limit the applicability of these systems. This paper discusses how the MIX approach can be adapted to put the user at the center of the protocol and in control of it, so that each participant can take active steps to protect his or her privacy. The paper also highlights various possible uses of the protocol. Being "in control" comes at a cost, however, and the paper discusses the trade-o#s arising from the proposed approach.
The development of a privacy-enhancing infrastructure: Some interesting findings
- Ubicomp Privacy: Current Status and Future Directions Workshop, UbiComp 2004
, 2004
"... Providing privacy protection for ubiquitous environments is a complex task that has only recently has become a hot topic. In this paper we describe the current state of our privacyenhancing infrastructure and address some issues that have arisen during its evolution. In particular we contrast users’ ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
(Show Context)
Providing privacy protection for ubiquitous environments is a complex task that has only recently has become a hot topic. In this paper we describe the current state of our privacyenhancing infrastructure and address some issues that have arisen during its evolution. In particular we contrast users’ online and offline privacy concerns, and their perceived and actual performance in configuring access control mechanisms. We also present a brief assessment of cryptographic performance on small devices.
A Privacy Preference Model for Pervasive Computing
"... Abstract: Widespread acceptance of e-government and m-government (and for that matter pervasive-Government) services will only take place when citizens are satisfied that personal data is stored, transmitted and processed with respect to their privacy. We compare and contrast data protection regimes ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
Abstract: Widespread acceptance of e-government and m-government (and for that matter pervasive-Government) services will only take place when citizens are satisfied that personal data is stored, transmitted and processed with respect to their privacy. We compare and contrast data protection regimes found around the World and suggest that these have directly influenced the uptake of existing private-sector mobile services. Citizen uptake of e-government services will be encouraged by strong regulatory regimes dedicated to the protection of personal data. Consumers will entrust personal data where they can exert some measure of control over the release of that data to other parties. We examine a number of such controlling mechanisms and suggest a new privacy architecture intended for mobile service provision.
Ubiquitous Computing, Customer Tracking, and Price Discrimination
, 2005
"... The availability and cost-efficiency of modern information and communication technology have made “interactive marketing ” and individual customer addressability not only possible but economical. In 1991, Blattberg and Deighton Blattberg and Deighton [1991] defined the new frontiers for marketing op ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
The availability and cost-efficiency of modern information and communication technology have made “interactive marketing ” and individual customer addressability not only possible but economical. In 1991, Blattberg and Deighton Blattberg and Deighton [1991] defined the new frontiers for marketing opened by
A Payment & Receipt Business Model in U-Commerce Environment Jeong-In Ju
"... ABSTRACT The key to U-payment is convenience and security in the transfer of financial information. The purpose of this paper is to find a desirable U-payment scheme promoting seamlessness and privacy with a consumer device and peer-based information transactions. We also propose a new business mod ..."
Abstract
- Add to MetaCart
ABSTRACT The key to U-payment is convenience and security in the transfer of financial information. The purpose of this paper is to find a desirable U-payment scheme promoting seamlessness and privacy with a consumer device and peer-based information transactions. We also propose a new business model through digital receipt which is evidence of commercial decision making and transaction. We propose U-PR (Ubiquitous Payment and Receipt) business model and method as a way to make transactions seamless, secure and privacy protected.
Supporting Collaborative Privacy-Observant Information Sharing Using RFID-Tagged Objects
, 2009
"... RFID technology provides an economically feasible means to embed computing and communication capabilities in numerous physical objects around us, thereby allowing anyone to effortlessly announce and expose varieties of information anywhere at any time. As the technology is increasingly used in ever ..."
Abstract
- Add to MetaCart
(Show Context)
RFID technology provides an economically feasible means to embed computing and communication capabilities in numerous physical objects around us, thereby allowing anyone to effortlessly announce and expose varieties of information anywhere at any time. As the technology is increasingly used in everyday environments, there is a heightening tension in the design and shaping of social boundaries in the digitally enhanced real world. Our experiments of RFID-triggered information sharing have identified usability, deployment, and privacy issues of physically based information systems. We discuss awareness issues and cognitive costs in regulating RFID-triggered information flows and propose a framework for privacy-observant RFID applications. The proposed framework supports users' in situ privacy boundary control by allowing users to (1) see how their information is socially disclosed and viewed by others, (2) dynamically negotiate their privacy boundaries, and (3) automate certain information disclosure processes.