TY - JOUR T1 - Simplifying User-Controlled Privacy Policies JF - IEEE Pervasive Computing Y1 - 2009 A1 - Mark S. Ackerman A1 - Tao Dong A1 - Gifford, Scott A1 - Kim, Jungwoo A1 - Mark W. Newman A1 - Atul Prakash A1 - Qidwai, Sarah KW - location-aware computing KW - location-based computing KW - privacy KW - privacy-enhancing architectures KW - privacy-protective applications AB -

Location-aware computing infrastructures are becoming widely available.

However, a key problem remains: letting users manage their privacy while

also giving them interesting applications that take advantage of location

information.

VL - 8 UR - Complete IS - 4 ER - TY - CHAP T1 - Privacy Issues and Human-Computer Interaction T2 - Security and usability: designing secure systems that people can use Y1 - 2005 A1 - Mark S. Ackerman A1 - Scott D. Mainwaring ED - Cranor, Lorrie Faith ED - Garfinkel, Simson KW - privacy AB -

 This chapter will largely view HCI in its broader context. HCI is not just about user interfaces but also about the user experience  of systems: how people perceive and understand, reason and learn about, and react and adapt to digital technologies. To borrow the terminology Sasse and Flechais2  use in discussing security, HCI has come to deal not only with process  (how systems are used, designed, and developed) and product  (the systems themselves and their interfaces), but also panorama  (cultural and organizational contexts that support, discourage, or otherwise shape the systems they envelope). Privacy, like security, implicates all of these levels. It is by its nature both a question of the user and his or her data but also the user and others’ use of that data. Our interests, therefore, will be those of HCI-writ-large.

While HCI has gone through several generations of computational technologies, it has carried a number of research themes forward. As mentioned, this chapter will consider the various HCI themes and their research findings that may be important when designing, constructing, or evaluating privacy mechanisms. Before exploring these HCI research streams, however, we first need a working definition of privacy, and to compare and contrast privacy concerns with HCI concerns.

JF - Security and usability: designing secure systems that people can use PB - O'Reilly Media CY - Cambridge, MA ER - TY - JOUR T1 - Privacy in pervasive environments: next generation labeling protocols JF - Personal and Ubiquitous Computing Y1 - 2004 A1 - Mark S. Ackerman KW - labeling protocols KW - P3P KW - pervasive environments KW - platform for privacy preferences KW - privacy KW - ubiquitous computing AB -

In pervasive environments, privacy is likely to be a major issue for users, and users will want to be notified of potential data capture. To provide notice to users, this paper argues for what it calls labeling protocols, technical mechanisms through which users can be informed of data requests and their consequences. Recent experiences with the Platform for Privacy Preferences Project (P3P), an attempt to provide privacy mechanisms for the Web, suggest important lessons for the design of a next generation labeling protocol that will be usable and useful in pervasive environments. This paper examines the P3P lessons and open issues with an eye to pervasive requirements.
 

VL - 8 UR - Complete ER - TY - JOUR T1 - Beyond concern: Understanding net users' attitudes about online privacy JF - The Internet upheaval: raising questions, seeking answers in communications policy Y1 - 2000 A1 - Cranor, Lorrie Faith A1 - Reagle, Joseph A1 - Mark S. Ackerman KW - net users KW - online environment KW - online privacy KW - personal information KW - privacy KW - survey AB -

Over the past decade, numerous surveys conducted around the world have found consistently high levels of concern about privacy. The more recent studies have found that this concern is as prevalent in the online environment as it is for physical-world interactions. For example, Westin (Harris 1998) found 81% of Net users are concerned about threats to their privacy while online. While many studies have measured the magnitude of privacy concerns, it is still critical to study the concern in detail, especially for the online environment. As Hine and Eve (1998) point out: Despite this wide range of interests in privacy as a topic, we have little idea of the ways in which people in their ordinary lives conceive of privacy and their reactions to the collection and use of personal information (Hine and Eve 1998, 253) With this study, we have tried to better understand the nature of online privacy concerns.

UR - Complete-New ER - TY - CONF T1 - Privacy Critics: UI Components to Safeguard Users' Privacy T2 - ACM Conference on Human Factors in Computing Systems (CHI'99 Y1 - 1999 A1 - Mark S. Ackerman A1 - Cranor, Lorrie KW - agent architectures KW - collaboration KW - critics KW - critics architecture KW - P3P KW - platform for privacy preferences KW - privacy KW - World Wide Web AB -

Creating usable systems to protect online privacy is an inherently difficult problem. Privacy critics are semiautonomous agents that help people protect their online privacy by offering suggestions and warnings. Two sample critics are presented.

JF - ACM Conference on Human Factors in Computing Systems (CHI'99 UR - Complete ER - TY - CONF T1 - Privacy in e-Commerce: Examining User Scenarios and Privacy Preferences T2 - Proceedings of the 1st ACM Conference on Electronic Commerce (EC'99) Y1 - 1999 A1 - Mark S. Ackerman A1 - Cranor, Lorrie Faith A1 - Reagle, Joseph KW - electronic commerce KW - platform for privacy preferences KW - privacy KW - privacy protocols KW - user survey KW - World Wide Web AB -

Privacy is a necessary concern in electronic commerce. It is difficult, if not impossible, to complete a transaction without revealing some personal data – a shipping address, billing information, or product preference. Users may be unwilling to provide this necessary information or even to browse online if they believe their privacy is invaded or threatened. Fortunately, there are technologies to help users protect their privacy. P3P (Platform for Privacy Preferences Project) from the World Wide Web Consortium is one such technology. However, there is a need to know more about the range of user concerns and preferences about privacy in order to build usable and effective interface mechanisms for P3P and other privacy technologies. Accordingly, we conducted a survey of 381 U.S. Net users, detailing a range of commerce scenarios and examining the participants' concerns and preferences about privacy. This paper presents both the findings from that study as well as their design implications

JF - Proceedings of the 1st ACM Conference on Electronic Commerce (EC'99) UR - Complete ER - TY - JOUR T1 - Hanging on the 'Wire: A Field Study of an Audio-only Media Space JF - ACM Transactions on Computer-Human Interaction Y1 - 1997 A1 - Mark S. Ackerman A1 - Starr, Brian A1 - Hindus, Debby A1 - Scott D. Mainwaring KW - audio KW - audio spaces KW - CMC KW - computer-mediated communication KW - electronic social spaces KW - media spaces KW - mediated communication KW - norms KW - privacy KW - rich interactions KW - social interactions KW - social presence KW - speech interactions KW - telepresence AB -

The primary focus of this article is an analysis of an audio-only media space from a computer-supported cooperative work (CSCW) perspective. To explore whether audio by itself is suitable for shared media systems, we studied a workgroup using an audio-only media space. This media space, called Thunderwire, combined high-quality audio with open connec-tions to create a shared space for its users. The two-month field study provided a richly nuanced understanding of this audio spaces social use. The system afforded rich sociable interactions. As well, users were able to create a useful, usable social space; however, through an analysis of the social norms that the participants formulated, we show that they had to take into account being in an audio-only environment. Within the field study, then, audio by itself was sufficient for a usable media space and a useful social space, but users were forced to adapt to many audio-only and system conditions. The article also considers audios implications for privacy.

VL - 4 UR - Complete IS - 1 ER -