forked from peiyaoh/um-thesis
-
Notifications
You must be signed in to change notification settings - Fork 0
/
references.bib
3554 lines (3195 loc) · 296 KB
/
references.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
% My references
@book{bernard_research_2017,
title = {Research {Methods} in {Anthropology}: {Qualitative} and {Quantitative} {Approaches}},
isbn = {978-1-4422-6886-9},
shorttitle = {Research {Methods} in {Anthropology}},
abstract = {Research Methods in Anthropology is the standard textbook for methods classes in anthropology. Written in Russ Bernard’s unmistakable conversational style, this guide has launched tens of thousands of students into the fieldwork enterprise with a combination of rigorous methodology, wry humor, and commonsense advice. Whether you are coming from a scientific, interpretive, or applied anthropological tradition, you will learn field methods from the best guide in both qualitative and quantitative methods.},
language = {en},
publisher = {Rowman \& Littlefield},
author = {Bernard, H. Russell},
month = nov,
year = {2017},
note = {Google-Books-ID: 2Fk7DwAAQBAJ},
keywords = {Social Science / Anthropology / General, Social Science / Methodology, Social Science / Research},
}
@book{bernard_social_2000,
title = {Social {Research} {Methods}: {Qualitative} and {Quantitative} {Approaches}},
isbn = {978-0-7619-1403-7},
shorttitle = {Social {Research} {Methods}},
abstract = {At last, a social research methods text for students and future researchers who will need to use both words and numbers in their research. Using actual examples from psychology, sociology, anthropology, health, and education, the book provides readers with both a conceptual understanding of each technique as well as showing them how to use the technique. H. Russell Bernard, author of the best-selling textbook Research Methods in Anthropology and a world figure in the social sciences, brings to the researcher and the student the excitement of the research act as never before.},
language = {en},
publisher = {SAGE},
author = {Bernard, Harvey Russell},
year = {2000},
note = {Google-Books-ID: VDPftmVO5lYC},
keywords = {Social Science / Research},
}
@article{gustarini_anonymous_2016,
title = {Anonymous smartphone data collection: factors influencing the users’ acceptance in mobile crowd sensing},
volume = {20},
issn = {1617-4917},
shorttitle = {Anonymous smartphone data collection},
url = {https://doi.org/10.1007/s00779-015-0898-0},
doi = {10.1007/s00779-015-0898-0},
abstract = {Mobile crowd sensing (MCS) assumes a collaborative effort from mobile smartphone users to sense and share their data needed to fulfill a given MCS objective (e.g., modeling of urban traffic or wellness index of a community). In this paper, we investigate the user’s perception of anonymity in MCS and factors influencing it. We conducted a 4-week extensive smartphone user study to fulfill three main objectives. (1) Understand if users prefer to share data anonymously or not anonymously. (2) Investigate the possible factors influencing the difference between these two modalities, considering: (a) users’ sharing attitude, (b) shared data kind and (c) users’ intimacy when data are shared (we defined intimacy as the users’ perception of their context with respect to place, number and kind of people around them). (3) Identify further users’ personal factors influencing their perception of anonymity via multiple interviews along the user study. In the results, we show that data are shared significantly more when anonymously collected. We found that the shared data kind is the factor significantly contributing to this difference. Additionally, users have a common way to perceive anonymity and its effectiveness. To ensure the success of anonymization algorithms in the context of MCS systems, we highlight which issues the researchers developing these algorithms should carefully consider. Finally, we argue about new research paths to better investigate the user perception of anonymity and develop anonymous MCS systems that users are more likely to trust based on our findings.},
language = {en},
number = {1},
urldate = {2020-02-22},
journal = {Personal and Ubiquitous Computing},
author = {Gustarini, Mattia and Wac, Katarzyna and Dey, Anind K.},
month = feb,
year = {2016},
pages = {65--82}
}
@article{fogues_sosharp:_2017,
title = {{SoSharP}: {Recommending} {Sharing} {Policies} in {Multiuser} {Privacy} {Scenarios}},
volume = {21},
issn = {1089-7801, 1941-0131},
shorttitle = {{SoSharP}},
doi = {10.1109/MIC.2017.4180836},
abstract = {Users often share information about others; sometimes this inadvertently violates others' privacy. Thus, here the authors propose SoSharP, an agent-based approach to help users maintain their own and others' privacy by guiding a selection of sharing policies in multiuser scenarios. SoSharP learns incrementally and asks for users' input only when required, reducing users' effort.},
number = {6},
journal = {IEEE Internet Computing},
author = {Fogues, Ricard L. and Murukannaiah, Pradeep K. and Such, Jose M. and Singh, Munindar P.},
month = nov,
year = {2017},
keywords = {Computational modeling, Social network services, multi-agent systems, recommender systems, social media, learning (artificial intelligence), crowdsourcing, privacy, Crowdsourcing, Privacy, Internet/Web technologies, data privacy, recommender system, Sensitivity, multiuser, agent-based approach, multiuser privacy scenarios, sharing policies recommendation, SoSharP, Training},
pages = {28--36}
}
@article{miller_magical_1956,
title = {The magical number seven, plus or minus two: {Some} limits on our capacity for processing information},
volume = {63},
issn = {1939-1471(Electronic),0033-295X(Print)},
shorttitle = {The magical number seven, plus or minus two},
doi = {10.1037/h0043158},
abstract = {A variety of researches are examined from the standpoint of information theory. It is shown that the unaided observer is severely limited in terms of the amount of information he can receive, process, and remember. However, it is shown that by the use of various techniques, e.g., use of several stimulus dimensions, recoding, and various mnemonic devices, this informational bottleneck can be broken. 20 references. (PsycInfo Database Record (c) 2021 APA, all rights reserved)},
number = {2},
journal = {Psychological Review},
author = {Miller, George A.},
year = {1956},
note = {Place: US
Publisher: American Psychological Association},
keywords = {Cognitive Processes, Information Theory},
pages = {81--97}
}
@article{glasgow_diabetes_1999,
title = {In diabetes care, moving from compliance to adherence is not enough},
volume = {22},
copyright = {Copyright American Diabetes Association Dec 1999},
issn = {01495992},
url = {https://www.proquest.com/docview/223033003/citation/86470315C4A24E2BPQ/1},
language = {English},
number = {12},
urldate = {2021-08-09},
journal = {Diabetes Care},
author = {Glasgow, Russell E. and Anderson, Robert M.},
month = dec,
year = {1999},
note = {Num Pages: 3
Place: Alexandria, United States
Publisher: American Diabetes Association},
keywords = {Medical Sciences--Endocrinology},
pages = {2090--2}
}
@article{piras_beyond_2019,
title = {Beyond self-tracking: {Exploring} and unpacking four emerging labels of patient data work},
volume = {25},
issn = {1460-4582},
shorttitle = {Beyond self-tracking},
url = {https://doi.org/10.1177/1460458219833121},
doi = {10.1177/1460458219833121},
abstract = {Despite the growing attention of researchers, healthcare managers and policy makers, data gathering and information management practices are largely untheorized areas. In this work are presented and discussed some early-stage conceptualizations: patient-generated health data, observations of daily living, quantified self and personal health information management. As I shall try to demonstrate, these labels are not neutral; rather, they underpin quite different perspectives with respect to health, patient–doctor relationship and the status of data.},
language = {en},
number = {3},
urldate = {2021-05-04},
journal = {Health Informatics Journal},
author = {Piras, Enrico Maria},
month = sep,
year = {2019},
note = {Publisher: SAGE Publications Ltd},
keywords = {quantified-self, self-tracking, observations of daily living, patient-generated health data, data-work, personal health information management},
pages = {598--607}
}
@inproceedings{schroeder_examining_2018,
address = {Hong Kong, China},
series = {{DIS} '18},
title = {Examining {Self}-{Tracking} by {People} with {Migraine}: {Goals}, {Needs}, and {Opportunities} in a {Chronic} {Health} {Condition}},
isbn = {978-1-4503-5198-0},
shorttitle = {Examining {Self}-{Tracking} by {People} with {Migraine}},
url = {https://doi.org/10.1145/3196709.3196738},
doi = {10.1145/3196709.3196738},
abstract = {Self-tracked health data can help people and their health providers understand and manage chronic conditions. This paper examines personal informatics practices and challenges in migraine, a condition characterized by unpredictable, intermittent, and poorly-understood symptoms. To investigate how people with migraine track and use data related to their condition, we surveyed 279 people with migraine and conducted semi-structured interviews with 13 survey respondents and 6 health providers. We find four distinct goals people bring to tracking and data: 1) answering questions about migraines, 2) predicting and preventing migraines, 3) monitoring and managing migraines over time, and 4) enabling motivation and social recognition. Each goal suggests different needs for the design of tools to support migraine tracking. We also find needs resulting from an individual's goals evolving over time, their varied personal experiences, and their communication and collaboration with providers. We discuss these goals and needs in terms of opportunities for personal informatics tools to facilitate learning to: 1) avoid common pitfalls; 2) support customization and flexibility; 3) account for burden, negativity, and lapsing; and 4) support management with uncertainty.},
urldate = {2020-06-20},
booktitle = {Proceedings of the 2018 {Designing} {Interactive} {Systems} {Conference}},
publisher = {Association for Computing Machinery},
author = {Schroeder, Jessica and Chung, Chia-Fang and Epstein, Daniel A. and Karkar, Ravi and Parsons, Adele and Murinova, Natalia and Fogarty, James and Munson, Sean A.},
month = jun,
year = {2018},
keywords = {migraine, personal informatics, health, chronic condition},
pages = {135--148}
}
@inproceedings{bowyer_understanding_2018,
address = {New York, NY, USA},
series = {{CHI} '18},
title = {Understanding the {Family} {Perspective} on the {Storage}, {Sharing} and {Handling} of {Family} {Civic} {Data}},
isbn = {978-1-4503-5620-6},
url = {http://doi.acm.org/10.1145/3173574.3173710},
doi = {10.1145/3173574.3173710},
abstract = {Across social care, healthcare and public policy, enabled by the "big data" revolution (which has normalized large-scale data-based decision-making), there are moves to "join up" citizen databases to provide care workers with holistic views of families they support. In this context, questions of personal data privacy, security, access, control and (dis-)empowerment are critical considerations for system designers and policy makers alike. To explore the family perspective on this landscape of what we call Family Civic Data, we carried out ethnographic interviews with four North-East families. Our design-game-based interviews were effective for engaging both adults and children to talk about the impact of this dry, technical topic on their lives. Our findings, delivered in the form of design guidelines, show support for dynamic consent: families would feel most empowered if involved in an ongoing co-operative relationship with state welfare and civic authorities through shared interaction with their data.},
urldate = {2018-05-05},
booktitle = {Proceedings of the 2018 {CHI} {Conference} on {Human} {Factors} in {Computing} {Systems}},
publisher = {ACM},
author = {Bowyer, Alex and Montague, Kyle and Wheater, Stuart and McGovern, Ruth and Lingam, Raghu and Balaam, Madeline},
year = {2018},
keywords = {big data, boundary objects, healthcare, personal data, ubicomp, user-centered design, data sharing, family, data privacy, civic data, data security, design games, dynamic consent, ethnographic interviews, family design games, family research, social care},
pages = {136:1--136:13}
}
@inproceedings{bowser_accounting_2017,
address = {Portland, Oregon, USA},
series = {{CSCW} '17},
title = {Accounting for {Privacy} in {Citizen} {Science}: {Ethical} {Research} in a {Context} of {Openness}},
isbn = {978-1-4503-4335-0},
shorttitle = {Accounting for {Privacy} in {Citizen} {Science}},
url = {https://doi.org/10.1145/2998181.2998305},
doi = {10.1145/2998181.2998305},
abstract = {In citizen science, volunteers collect and share data with researchers, other volunteers, and the public at large. Data shared in citizen science includes information on volunteer location or other sensitive personal information; yet, volunteers do not typically express privacy concerns. This study uses the framework of contextual integrity to understand privacy accounting in the context of citizen science, by analyzing contextual variables including roles; information types; data flows and transmission principles; and, uses, norms, and values. Findings show that uses, norms, and values-including core values shared by researchers and public volunteers, and the motivations of individual volunteers' have a significant impact on privacy accounting. Overall, citizen science volunteers and practitioners share and promote openness and data sharing over protecting privacy. Studying the context of citizen science offers an example of contextually-appropriate data sharing that can inform broader questions about research ethics in an age of pervasive data. Based on these findings, this paper offers implications for designing data and information flows and supporting technologies in public and voluntary data sharing projects.},
urldate = {2020-06-19},
booktitle = {Proceedings of the 2017 {ACM} {Conference} on {Computer} {Supported} {Cooperative} {Work} and {Social} {Computing}},
publisher = {Association for Computing Machinery},
author = {Bowser, Anne and Shilton, Katie and Preece, Jenny and Warrick, Elizabeth},
month = feb,
year = {2017},
keywords = {citizen science, digital volunteers, crowdsourcing, privacy, open data, contextual integrity, research ethics},
pages = {2124--2136}
}
@inproceedings{borders_cpol_2005,
address = {New York, NY, USA},
series = {{CCS} '05},
title = {{CPOL}: high-performance policy evaluation},
isbn = {978-1-59593-226-6},
shorttitle = {{CPOL}},
url = {https://doi.org/10.1145/1102120.1102142},
doi = {10.1145/1102120.1102142},
abstract = {Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users fine-grained control over when and how information can be accessed, and are flexible enough to be used in a variety of applications. Evaluation of these policies, however, is not optimized for performance. Emerging applications, such as real-time enforcement of privacy policies in a sensor network or location-aware computing environment, require high throughput. Our experiments indicate that current policy enforcement solutions are unable to deliver the level of performance needed for such systems, and limit their overall scalability. To deal with the need for high-throughput evaluation, we propose CPOL, a flexible C++ framework for policy evaluation. CPOL is designed to evaluate policies as efficiently as possible, and still maintain a level of expressiveness comparable to current policy languages. CPOL achieves its performance goals by efficiently evaluating policies and caching query results (while still preserving correctness). To evaluate CPOL, we ran a simulated workload of users making privacy queries in a location-sensing infrastructure. CPOL was able to handle policy evaluation requests two to six orders of magnitude faster than a MySql implementation and an existing policy evaluation system. We present the design and implementation of CPOL, a high-performance policy evaluation engine, along with our testing methodology and experimental results.},
urldate = {2021-08-09},
booktitle = {Proceedings of the 12th {ACM} conference on {Computer} and communications security},
publisher = {Association for Computing Machinery},
author = {Borders, Kevin and Zhao, Xin and Prakash, Atul},
month = nov,
year = {2005},
keywords = {performance, policy evaluation, privacy policy},
pages = {147--157}
}
@inproceedings{fong_relationship-based_2011,
address = {New York, NY, USA},
series = {{CODASPY} '11},
title = {Relationship-based {Access} {Control}: {Protection} {Model} and {Policy} {Language}},
isbn = {978-1-4503-0466-5},
shorttitle = {Relationship-based {Access} {Control}},
url = {http://doi.acm.org/10.1145/1943513.1943539},
doi = {10.1145/1943513.1943539},
abstract = {Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control (ReBAC) to refer to this paradigm. ReBAC is characterized by the explicit tracking of interpersonal relationships between users, and the expression of access control policies in terms of these relationships. This work explores what it takes to widen the applicability of ReBAC to application domains other than social computing. To this end, we formulate an archetypical ReBAC model to capture the essence of the paradigm, that is, authorization decisions are based on the relationship between the resource owner and the resource accessor in a social network maintained by the protection system. A novelty of the model is that it captures the contextual nature of relationships. We devise a policy language, based on modal logic, for composing access control policies that support delegation of trust. We use a case study in the domain of Electronic Health Records to demonstrate the utility of our model and its policy language. This work provides initial evidence to the feasibility and utility of ReBAC as a general-purpose paradigm of access control.},
urldate = {2019-02-24},
booktitle = {Proceedings of the {First} {ACM} {Conference} on {Data} and {Application} {Security} and {Privacy}},
publisher = {ACM},
author = {Fong, Philip W.L.},
year = {2011},
note = {event-place: San Antonio, TX, USA},
keywords = {contexts, electronic health records, modal logic, policy language, relationship-based access control, social networks},
pages = {191--202}
}
@inproceedings{kumaraguru_survey_2007,
title = {A survey of privacy policy languages},
booktitle = {Workshop on {Usable} {IT} {Security} {Management} ({USM} 07): {Proceedings} of the 3rd {Symposium} on {Usable} {Privacy} and {Security}, {ACM}},
author = {Kumaraguru, Ponnurangam and Cranor, Lorrie and Lobo, Jorge and Calo, Seraphin},
year = {2007},
}
@inproceedings{zhao_privacy_2016,
address = {Republic and Canton of Geneva, CHE},
series = {{WWW} '16 {Companion}},
title = {Privacy {Languages}: {Are} we there yet to enable user controls?},
isbn = {978-1-4503-4144-8},
shorttitle = {Privacy {Languages}},
url = {http://doi.org/10.1145/2872518.2890590},
doi = {10.1145/2872518.2890590},
abstract = {Privacy protection is one of the most prominent concerns for web users. Despite numerous efforts, users remain powerless in controlling how their personal information should be used and by whom, and find limited options to actually opt-out of dominating service providers, who often process users information with limited transparency or respect for their privacy preferences. Privacy languages are designed to express the privacy-related preferences of users and the practices of organisations, in order to establish a privacy-preserved data handling protocol. However, in practice there has been limited adoption of these languages, by either users or data controllers. This survey paper attempts to understand the strengths and limitations of existing policy languages, focusing on their capacity of enabling users to express their privacy preferences. Our preliminary results show a lack of focus on normal web users, in both language design and their tooling design. This systematic survey lays the ground work for future privacy protection designs that aim to be centred around web users for empowering their control of data privacy.},
urldate = {2021-08-09},
booktitle = {Proceedings of the 25th {International} {Conference} {Companion} on {World} {Wide} {Web}},
publisher = {International World Wide Web Conferences Steering Committee},
author = {Zhao, Jun and Binns, Reuben and Van Kleek, Max and Shadbolt, Nigel},
month = apr,
year = {2016},
keywords = {data terms of use, privacy languages, user control},
pages = {799--806}
}
@article{luca_usable_2016,
title = {Usable privacy and security},
volume = {58},
issn = {2196-7032},
url = {https://www.degruyter.com/document/doi/10.1515/itit-2016-0034/html},
doi = {10.1515/itit-2016-0034},
abstract = {Article Usable privacy and security was published on October 28, 2016 in the journal it - Information Technology (volume 58, issue 5).},
language = {en},
number = {5},
urldate = {2021-08-05},
journal = {it - Information Technology},
author = {Luca, Alexander De and Zezschwitz, Emanuel von},
month = oct,
year = {2016},
note = {Publisher: De Gruyter Oldenbourg
Section: it - Information Technology},
pages = {215--216}
}
@inproceedings{liu_analyzing_2011,
title={Analyzing facebook privacy settings: user expectations vs. reality},
author={Liu, Yabing and Gummadi, Krishna P and Krishnamurthy, Balachander and Mislove, Alan},
booktitle={Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference},
pages={61--70},
year={2011}
}
@inproceedings{sharma_studying_2015,
address = {Vancouver, BC, Canada},
series = {{CSCW} '15},
title = {Studying and {Modeling} the {Connection} between {People}'s {Preferences} and {Content} {Sharing}},
isbn = {978-1-4503-2922-4},
url = {https://doi.org/10.1145/2675133.2675151},
doi = {10.1145/2675133.2675151},
abstract = {People regularly share items using online social media. However, people's decisions around sharing---who shares what to whom and why---are not well understood. We present a user study involving 87 pairs of Facebook users to understand how people make their sharing decisions. We find that even when sharing to a specific individual, people's own preference for an item (individuation) dominates over the recipient's preferences (altruism). People's open-ended responses about how they share, however, indicate that they do try to personalize shares based on the recipient. To explain these contrasting results, we propose a novel process model of sharing that takes into account people's preferences and the salience of an item. We also present encouraging results for a sharing prediction model that incorporates both the senders' and the recipients' preferences. These results suggest improvements to both algorithms that support sharing in social media and to information diffusion models.},
urldate = {2020-06-19},
booktitle = {Proceedings of the 18th {ACM} {Conference} on {Computer} {Supported} {Cooperative} {Work} \& {Social} {Computing}},
publisher = {Association for Computing Machinery},
author = {Sharma, Amit and Cosley, Dan},
month = feb,
year = {2015},
keywords = {user preferences, information diffusion, directed sharing, sharing process},
pages = {1246--1257}
}
@inproceedings{olejnik_smarper_2017,
title = {{SmarPer}: {Context}-{Aware} and {Automatic} {Runtime}-{Permissions} for {Mobile} {Devices}},
shorttitle = {{SmarPer}},
doi = {10.1109/SP.2017.25},
abstract = {Permission systems are the main defense that mobile platforms, such as Android and iOS, offer to users to protect their private data from prying apps. However, due to the tension between usability and control, such systems have several limitations that often force users to overshare sensitive data. We address some of these limitations with SmarPer, an advanced permission mechanism for Android. To address the rigidity of current permission systems and their poor matching of users' privacy preferences, SmarPer relies on contextual information and machine learning methods to predict permission decisions at runtime. Note that the goal of SmarPer is to mimic the users' decisions, not to make privacy-preserving decisions per se. Using our SmarPer implementation, we collected 8,521 runtime permission decisions from 41 participants in real conditions. With this unique data set, we show that using an efficient Bayesian linear regression model results in a mean correct classification rate of 80\% (±3\%). This represents a mean relative reduction of approximately 50\% in the number of incorrect decisions when compared with a user-defined static permission policy, i.e., the model used in current permission systems. SmarPer also focuses on the suboptimal trade-off between privacy and utility, instead of only "allow" or "deny" type of decisions, SmarPer also offers an "obfuscate" option where users can still obtain utility by revealing partial information to apps. We implemented obfuscation techniques in SmarPer for different data types and evaluated them during our data collection campaign. Our results show that 73\% of the participants found obfuscation useful and it accounted for almost a third of the total number of decisions. In short, we are the first to show, using a large dataset of real in situ permission decisions, that it is possible to learn users' unique decision patterns at runtime using contextual information while supporting data obfuscation, this is an important step towards automating the management of permissions in smartphones.},
booktitle = {2017 {IEEE} {Symposium} on {Security} and {Privacy} ({SP})},
author = {Olejnik, Katarzyna and Dacosta, Italo and Machado, Joana Soares and Huguenin, Kévin and Khan, Mohammad Emtiyaz and Hubaux, Jean-Pierre},
month = may,
year = {2017},
note = {ISSN: 2375-1207},
keywords = {Smart phones, privacy preferences, mobile privacy, machine learning, Privacy, Mobile communication, Data models, Runtime, permission systems, Androids, Humanoid robots},
pages = {1058--1076}
}
@inproceedings{emami-naeini_privacy_2017,
address = {Santa Clara, CA},
title = {Privacy {Expectations} and {Preferences} in an {IoT} {World}},
isbn = {978-1-931971-39-3},
url = {https://www.usenix.org/conference/soups2017/technical-sessions/presentation/naeini},
booktitle = {Thirteenth {Symposium} on {Usable} {Privacy} and {Security} ({SOUPS} 2017)},
publisher = {USENIX Association},
author = {Emami-Naeini, Pardis and Bhagavatula, Sruti and Habib, Hana and Degeling, Martin and Bauer, Lujo and Cranor, Lorrie Faith and Sadeh, Norman},
year = {2017},
pages = {399--412}
}
@inproceedings{lee_privacy_2017,
title = {Privacy preference modeling and prediction in a simulated campuswide {IoT} environment},
doi = {10.1109/PERCOM.2017.7917874},
abstract = {With the advent of the Internet of Things (IoT), users are more likely to have privacy concerns since their personal information could be collected, analyzed, and utilized without notice by the networked IoT devices and services. Users may want to control all such activities by explicitly expressing their privacy preferences. However, it is becoming increasingly difficult for users to do so, not only because of the cognitive burden of continuously making privacy decisions for IoT services, but also because IoT devices have no, or only very restricted, user interfaces. Intelligent software helping users make better privacy decisions will be an important component of privacy-preserving IoT environments. In order to construct such a component, we aim to verify whether it will be possible to computationally model and predict users' privacy preferences in IoT. To that end, we survey 172 participants in a simulated campuswide IoT environment about their privacy preferences regarding hypothetical personal information tracking scenarios. Then, we cluster the scenarios based on the survey responses, arriving at four clusters with distinct associated privacy preferences. Based on the clustering results, we uncover contextual factors that induce privacy violations in IoT. Finally, we build machine learning models to predict users' privacy decisions, using both contextual information and the corresponding cluster membership as training data. The final trained model shows 77\% accuracy in predicting users' decisions whether or not to allow the respective IoT scenario.},
booktitle = {2017 {IEEE} {International} {Conference} on {Pervasive} {Computing} and {Communications} ({PerCom})},
author = {Lee, Hosub and Kobsa, Alfred},
month = mar,
year = {2017},
note = {ISSN: 2474-249X},
keywords = {privacy decision making, user interfaces, learning (artificial intelligence), personal information, decision making, privacy, experience sampling, IoT, data privacy, Internet of Things, K-modes clustering, conditional inference tree, Google Glass, hypothetical personal information tracking scenarios, intelligent software, Internet of Things users, machine learning models, networked IoT devices, networked IoT services, preference modeling, privacy preference modeling, privacy-preserving IoT environments, simulated campuswide IoT environment, user privacy decision prediction, user privacy preference prediction},
pages = {276--285}
}
@article{apthorpe_discovering_2018,
title = {Discovering {Smart} {Home} {Internet} of {Things} {Privacy} {Norms} {Using} {Contextual} {Integrity}},
volume = {2},
url = {https://doi.org/10.1145/3214262},
doi = {10.1145/3214262},
abstract = {The proliferation of Internet of Things (IoT) devices for consumer "smart" homes raises concerns about user privacy. We present a survey method based on the Contextual Integrity (CI) privacy framework that can quickly and efficiently discover privacy norms at scale. We apply the method to discover privacy norms in the smart home context, surveying 1,731 American adults on Amazon Mechanical Turk. For \$2,800 and in less than six hours, we measured the acceptability of 3,840 information flows representing a combinatorial space of smart home devices sending consumer information to first and third-party recipients under various conditions. Our results provide actionable recommendations for IoT device manufacturers, including design best practices and instructions for adopting our method for further research.},
number = {2},
urldate = {2020-01-26},
journal = {Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies},
author = {Apthorpe, Noah and Shvartzshnaider, Yan and Mathur, Arunesh and Reisman, Dillon and Feamster, Nick},
month = jul,
year = {2018},
keywords = {Privacy, Internet of Things, Contextual Integrity},
pages = {59:1--59:23}
}
@article{he_data-driven_2019,
title = {A {Data}-{Driven} {Approach} to {Designing} for {Privacy} in {Household} {IoT}},
volume = {10},
issn = {2160-6455},
url = {https://doi.org/10.1145/3241378},
doi = {10.1145/3241378},
abstract = {In this article, we extend and improve upon a previously developed data-driven approach to design privacy-setting interfaces for users of household IoT devices. The essence of this approach is to gather users’ feedback on household IoT scenarios before developing the interface, which allows us to create a navigational structure that preemptively maximizes users’ efficiency in expressing their privacy preferences, and develop a series of ‘privacy profiles’ that allow users to express a complex set of privacy preferences with the single click of a button. We expand upon the existing approach by proposing a more sophisticated translation of statistical results into interface design, and by extensively discussing and analyzing the tradeoff between user-model parsimony and accuracy in developing privacy profiles and default settings.},
number = {1},
urldate = {2020-02-21},
journal = {ACM Transactions on Interactive Intelligent Systems (TiiS)},
author = {He, Yangyang and Bahirat, Paritosh and Knijnenburg, Bart P. and Menon, Abhilash},
month = sep,
year = {2019},
keywords = {privacy, Designing for IoT},
pages = {10:1--10:47}
}
@article{barbosa_what_2019,
title = {“{What} if?” {Predicting} {Individual} {Users}’ {Smart} {Home} {Privacy} {Preferences} and {Their} {Changes}},
volume = {2019},
shorttitle = {“{What} if?},
url = {https://content.sciendo.com/configurable/contentpage/journals$002fpopets$002f2019$002f4$002farticle-p211.xml},
doi = {10.2478/popets-2019-0066},
language = {en},
number = {4},
urldate = {2020-01-25},
journal = {Proceedings on Privacy Enhancing Technologies},
author = {Barbosa, Natã M. and Park, Joon S. and Yao, Yaxing and Wang, Yang},
month = oct,
year = {2019},
pages = {211--231}
}
@inproceedings{li_towards_2020,
address = {New York, NY, USA},
series = {{CHI} '20},
title = {Towards {A} {Taxonomy} of {Content} {Sensitivity} and {Sharing} {Preferences} for {Photos}},
isbn = {978-1-4503-6708-0},
url = {https://doi.org/10.1145/3313831.3376498},
doi = {10.1145/3313831.3376498},
abstract = {Determining which photos are sensitive is difficult. Although emerging computer vision systems can label content items, previous attempts to distinguish private or sensitive content fall short. There is no human-centered taxonomy that describes what content is sensitive or how sharing preferences for content differs across recipients. To fill this gap, we introduce a new sensitive content elicitation method which surmounts limitations of previous approaches, and, using this new method, collected sensitive content from 116 participants. We also recorded participants' sharing preferences with 20 recipient groups. Next, we conducted a card sort to surface user-defined categories of sensitive content. Using data from these studies, we generated a taxonomy that identifies 28 categories of sensitive content. We also establish how sharing preferences for content differs across groups of recipients. This taxonomy can serve as a framework for understanding photo privacy, which can, in turn, inform new photo privacy protection mechanisms.},
urldate = {2021-05-13},
booktitle = {Proceedings of the 2020 {CHI} {Conference} on {Human} {Factors} in {Computing} {Systems}},
publisher = {Association for Computing Machinery},
author = {Li, Yifang and Vishwamitra, Nishant and Hu, Hongxin and Caine, Kelly},
month = apr,
year = {2020},
keywords = {privacy, security, photo privacy, sensitive content},
pages = {1--14}
}
@inproceedings{loukil_liopy_2018,
title = {{LIoPY}: {A} {Legal} {Compliant} {Ontology} to {Preserve} {Privacy} for the {Internet} of {Things}},
volume = {02},
shorttitle = {{LIoPY}},
doi = {10.1109/COMPSAC.2018.10322},
abstract = {The Internet of Things (IoT) provides the opportunity to collect, process and analyze data. This opportunity helps to understand preferences and life patterns of individuals in order to offer them customized services. However, privacy has become a significant issue due to the personal nature of the knowledge derived from these data and the involved potential risks. Despite the increasing legislation pressure, few proposed solutions have dealt with the privacy requirements, such as consent and choice, purpose specification, and collection limitation. In this paper, we propose a privacy ontology in order to incorporate privacy legislation into privacy policies while considering several privacy requirements. Our proposed ontology aims both at making the smart devices more autonomous and able to infer data access rights and enforcing the privacy policy compliance at the execution level. We implemented and evaluated our privacy ontology based on a healthcare scenario.},
booktitle = {2018 {IEEE} 42nd {Annual} {Computer} {Software} and {Applications} {Conference} ({COMPSAC})},
author = {Loukil, Faiza and Ghedira-Guegan, Chirine and Boukadi, Khouloud and Benharkat, Aicha Nabila},
month = jul,
year = {2018},
note = {ISSN: 0730-3157},
keywords = {Data privacy, Internet of Things (IoT), IoT data lifecycle, Law, Ontologies, Privacy, privacy ontology, Smart devices, Standards},
pages = {701--706}
}
@inproceedings{arruda_toward_2019,
address = {New York, NY, USA},
series = {{SAC} '19},
title = {Toward a lightweight ontology for privacy protection in {IoT}},
isbn = {978-1-4503-5933-7},
url = {https://doi.org/10.1145/3297280.3297367},
doi = {10.1145/3297280.3297367},
abstract = {The literature asserts that the design of an ontology-based privacy model is an essential starting point to address privacy risks in IoT, where connected devices are increasingly capable of monitoring human activities. Due to the omnipresence of data privacy concerns in IoT, we highlight the need for privacy ontologies that combine an expressive vocabulary with extension points but that do not overload the processing of privacy policies data. This paper presents IoT-Priv as a lightweight privacy layer upon IoT basic concepts such as device, sensor, and service. We introduce privacy requirements guiding the IoT-Priv ontology design, match these requirements to the respective privacy terms modeled, and show how to use IoT-Priv through a usage scenario. Finally, we evaluate static metrics and response times of spatial and temporal query filters over instances of privacy policies. Results open the way for the creation of scalable, privacy-enabled systems.},
urldate = {2021-05-21},
booktitle = {Proceedings of the 34th {ACM}/{SIGAPP} {Symposium} on {Applied} {Computing}},
publisher = {Association for Computing Machinery},
author = {Arruda, Mayke Ferreira and Bulcão-Neto, Renato Freitas},
month = apr,
year = {2019},
keywords = {evaluation, internet of things, ontology, privacy, requirements},
pages = {880--888}
}
@inproceedings{kanaan_ontological_2017,
title = {An {Ontological} {Model} for {Privacy} in {Emerging} {Decentralized} {Healthcare} {Systems}},
doi = {10.1109/ISADS.2017.37},
abstract = {Emerging healthcare systems are expected to leverage new Internet of Things (IoT) trends to enable preventive and personalized medicine. However, the success of such systems is entirely dependent on the ability to preserve patient privacy. This paper proposes a decentralized ontology based system architecture that caters to a healthcare organization's privacy needs as well as its enterprise security policy concerns considering futuristic IoT and Electronic Health Records (EHR) trends in healthcare. To identify privacy infringements and organizational policy violations across the institution, our proposed HealthCare Security and Privacy (HCSP) ontology is utilized in conjunction with three agent-level filters: the Exception Creation Agent (ECA), the Policy Mapping Agent (PMA), and the Privacy Assurance Filter (PAF). Preliminary evaluation has shown effectiveness of the HCSP ontology in terms of detection of policy compliance to HIPAA standards.},
booktitle = {2017 {IEEE} 13th {International} {Symposium} on {Autonomous} {Decentralized} {System} ({ISADS})},
author = {Kanaan, Hisham and Mahmood, Khalid and Sathyan, Varun},
month = mar,
year = {2017},
keywords = {Data privacy, Healthcare, HIPAA, Internet of Things, Medical services, Ontologies, Ontology, Organizations, Privacy, Security, Standards organizations},
pages = {107--113}
}
@inproceedings{wang_ontology-based_2016,
title = {Ontology-{Based} {Resource} {Description} {Model} for {Internet} of {Things}},
doi = {10.1109/CyberC.2016.29},
abstract = {Internet of things (IoT) mainly realizes the access of kinds of "things". For the massive heterogeneous devices, how to achieve their unified resource description is an important issue for IoT. Considering the lack of unified description model for devices in IoT, an Ontology-based Resource Description Model (ORDM) is proposed in this paper. The resource in IoT is described from attribute, state, control, historical information and privacy classes. In the application of smart office, the ORDM is implemented and applied in detail. The experiments results show that the proposed model can support the rich access devices and business functions in IoT, and has significant application value and prospect.},
booktitle = {2016 {International} {Conference} on {Cyber}-{Enabled} {Distributed} {Computing} and {Knowledge} {Discovery} ({CyberC})},
author = {Wang, Shulong and Hou, Yibin and Gao, Fang and Ma, Songsong},
month = oct,
year = {2016},
keywords = {Internet of Things, ontology, resource description},
pages = {105--108}
}
@inproceedings{toch_locaccino:_2010,
address = {New York, NY, USA},
series = {{UbiComp} '10 {Adjunct}},
title = {Locaccino: {A} {Privacy}-centric {Location} {Sharing} {Application}},
isbn = {978-1-4503-0283-8},
shorttitle = {Locaccino},
url = {http://doi.acm.org/10.1145/1864431.1864446},
doi = {10.1145/1864431.1864446},
abstract = {Locaccino is a location sharing application designed to empower users to effectively control their privacy. It has been piloted by close to 2000 users and has been used by researchers as an experimental platform for conducting research on location-based social networks. Featured technologies include expressive privacy rule creation, detailed feedback mechanisms that help users understand their privacy, algorithms for analyzing privacy preferences, and clients for mobile computers and smartphone devices. In addition, variations of Locaccino are also being piloted as part of research on user-controllable policy learning, learning usable privacy personas and reconciling expressiveness and user burden. The purpose of this demo is to introduce participants to the features of Locaccino, so that they can try out the Locaccino smartphone and laptop applications on their own devices, locate their friends and colleagues, and set rich privacy policies for sharing their location.},
urldate = {2018-06-11},
booktitle = {Proceedings of the 12th {ACM} {International} {Conference} {Adjunct} {Papers} on {Ubiquitous} {Computing} - {Adjunct}},
publisher = {ACM},
author = {Toch, Eran and Cranshaw, Justin and Hankes-Drielsma, Paul and Springfield, Jay and Kelley, Patrick Gage and Cranor, Lorrie and Hong, Jason and Sadeh, Norman},
year = {2010},
keywords = {location sharing technology, mobile social technology, privacy},
pages = {381--382}
}
@inproceedings{toch_empirical_2010,
address = {New York, NY, USA},
series = {{UbiComp} '10},
title = {Empirical models of privacy in location sharing},
isbn = {978-1-60558-843-8},
url = {https://doi.org/10.1145/1864349.1864364},
doi = {10.1145/1864349.1864364},
abstract = {The rapid adoption of location tracking and mobile social networking technologies raises significant privacy challenges. Today our understanding of people's location sharing privacy preferences remains very limited, including how these preferences are impacted by the type of location tracking device or the nature of the locations visited. To address this gap, we deployed Locaccino, a mobile location sharing system, in a four week long field study, where we examined the behavior of study participants (n=28) who shared their location with their acquaintances (n=373.) Our results show that users appear more comfortable sharing their presence at locations visited by a large and diverse set of people. Our study also indicates that people who visit a wider number of places tend to also be the subject of a greater number of requests for their locations. Over time these same people tend to also evolve more sophisticated privacy preferences, reflected by an increase in time- and location-based restrictions. We conclude by discussing the implications our findings.},
urldate = {2021-08-09},
booktitle = {Proceedings of the 12th {ACM} international conference on {Ubiquitous} computing},
publisher = {Association for Computing Machinery},
author = {Toch, Eran and Cranshaw, Justin and Drielsma, Paul Hankes and Tsai, Janice Y. and Kelley, Patrick Gage and Springfield, James and Cranor, Lorrie and Hong, Jason and Sadeh, Norman},
month = sep,
year = {2010},
keywords = {location sharing technology, mobile social technology, privacy},
pages = {129--138}
}
@inproceedings{knijnenburg_information_2014,
title = {Information disclosure profiles for segmentation and recommendation},
booktitle = {{SOUPS2014} {Workshop} on {Privacy} {Personas} and {Segmentation}},
author = {Knijnenburg, Bart P},
year = {2014}
}
@inproceedings{gulotta_digital_2013,
address = {Paris, France},
series = {{CHI} '13},
title = {Digital artifacts as legacy: exploring the lifespan and value of digital data},
isbn = {978-1-4503-1899-0},
shorttitle = {Digital artifacts as legacy},
url = {https://doi.org/10.1145/2470654.2466240},
doi = {10.1145/2470654.2466240},
abstract = {Legacy is the meaningful and complex way in which information, values, and possessions are passed on to others. As digital systems and information become meaningfully parts of people's everyday and social relationships, it is essential to develop new insights about how technology intersects with legacy and inheritance practices. We designed three interactive systems to investigate how digital materials might be passed down in the future. We conducted in-home interviews with ten parents using the systems to provoke discussion about how technology might support or complicate their existing practices. Sessions revealed parents desired to treat their digital information in ways not fully supported by technology. Findings are interpreted to describe design considerations for future work in this emerging space.},
urldate = {2020-06-08},
booktitle = {Proceedings of the {SIGCHI} {Conference} on {Human} {Factors} in {Computing} {Systems}},
publisher = {Association for Computing Machinery},
author = {Gulotta, Rebecca and Odom, William and Forlizzi, Jodi and Faste, Haakon},
month = apr,
year = {2013},
keywords = {design, inheritance, interviews, legacy, reflective design, speculative design, technology probes, digital artifacts},
pages = {1813--1822}
}
@inproceedings{vertesi_data_2016,
address = {New York, NY, USA},
series = {{CSCW} '16},
title = {Data {Narratives}: {Uncovering} {Tensions} in {Personal} {Data} {Management}},
isbn = {978-1-4503-3592-8},
shorttitle = {Data {Narratives}},
url = {http://doi.acm.org/10.1145/2818048.2820017},
doi = {10.1145/2818048.2820017},
abstract = {We present an interview study of 34 participants in the US and Korea who described how they manage their personal data, from work files to family photos. Through their 'data narratives' - accounts of their data management practices, including device usage patterns and negotiations with system and brand ecosystems' we explore how individuals negotiate a complex, multi-service, and morally-charged sociotechnical landscape, balancing demands to share and to safeguard their data in appropriate ways against a shifting background of changing technologies, relationships, individuals, and corporations. We describe the guiding framework that people use to make decisions as a 'moral economy' of data management, contributing to our understanding of context-specific system choices.},
urldate = {2016-03-29},
booktitle = {Proceedings of the 19th {ACM} {Conference} on {Computer}-{Supported} {Cooperative} {Work} \& {Social} {Computing}},
publisher = {ACM},
author = {Vertesi, Janet and Kaye, Jofish and Jarosewski, Samantha N. and Khovanskaya, Vera D. and Song, Jenna},
year = {2016},
keywords = {Data management, data narratives., Data sharing, data sharing, privacy, Privacy},
pages = {478--490}
}
@inproceedings{thayer_i_2012,
address = {Seattle, Washington, USA},
series = {{CSCW} '12},
title = {I love you, let's share calendars: calendar sharing as relationship work},
isbn = {978-1-4503-1086-4},
shorttitle = {I love you, let's share calendars},
url = {https://doi.org/10.1145/2145204.2145317},
doi = {10.1145/2145204.2145317},
abstract = {While there has been substantial research into the use of online calendar systems (OCS) within organizations and families with children, no research focuses on adults without children. In our study, we focus on these OCS users' practices of calendar sharing as relationship work, the continually negotiated practice of managing friendships and intimacy. We conducted semi-structured interviews as part of a qualitative user study of Google Calendar users. We report the calendar sharing behaviors and strategies of our participants, who maintain multiple calendars for different purposes and with different users, communicating factual and emotional information through their calendar events. We contribute new knowledge by discussing four strategies derived from our participants' calendar sharing and relationship work activities.},
urldate = {2020-06-01},
booktitle = {Proceedings of the {ACM} 2012 conference on {Computer} {Supported} {Cooperative} {Work}},
publisher = {Association for Computing Machinery},
author = {Thayer, Alexander and Bietz, Matthew J. and Derthick, Katie and Lee, Charlotte P.},
month = feb,
year = {2012},
keywords = {calendars, groupware, intimacy, relationship work},
pages = {749--758}
}
@inproceedings{kumar_modern_2015,
address = {Vancouver, BC, Canada},
series = {{CSCW} '15},
title = {The {Modern} {Day} {Baby} {Book}: {Enacting} {Good} {Mothering} and {Stewarding} {Privacy} on {Facebook}},
isbn = {978-1-4503-2922-4},
shorttitle = {The {Modern} {Day} {Baby} {Book}},
url = {https://doi.org/10.1145/2675133.2675149},
doi = {10.1145/2675133.2675149},
abstract = {The practice of sharing family photographs is as old as the camera itself. Many mothers now share baby photos online, yet little is known about what kinds of baby photos they share and their motivations for doing so. Drawing on semi-structured interviews with 22 new mothers, we find that they share cute, funny, milestone, and family and friend photos but refrain from sharing crying and naked photos. While some mothers harbor concerns about controlling information, oversharing, and digital footprints, the benefits of receiving validation outweighs their concerns. Sharing baby photos on Facebook helps new mothers enact and receive validation of "good mothering." However, mothers are charged with the responsibility of stewarding their children's privacy and identities online. We introduce the concept of privacy stewardship to describe the responsibility parents take on when deciding what is appropriate to share about their children online and ensuring that family and friends respect and maintain the integrity of those rules. As a result, mothers must exchange benefits of sharing baby photos with risks of creating digital footprints for their child.},
urldate = {2020-06-08},
booktitle = {Proceedings of the 18th {ACM} {Conference} on {Computer} {Supported} {Cooperative} {Work} \& {Social} {Computing}},
publisher = {Association for Computing Machinery},
author = {Kumar, Priya and Schoenebeck, Sarita},
month = feb,
year = {2015},
keywords = {photo sharing, social media, motherhood, facebook, babies},
pages = {1302--1312}
}
@inproceedings{tolmie_this_2016,
address = {New York, NY, USA},
series = {{CSCW} '16},
title = {“{This} {Has} to {Be} the {Cats}”: {Personal} {Data} {Legibility} in {Networked} {Sensing} {Systems}},
isbn = {978-1-4503-3592-8},
shorttitle = {“{This} {Has} to {Be} the {Cats}”},
url = {http://doi.acm.org/10.1145/2818048.2819992},
doi = {10.1145/2818048.2819992},
abstract = {Notions like 'Big Data' and the 'Internet of Things' turn upon anticipated harvesting of personal data through ubiquitous computing and networked sensing systems. It is largely presumed that understandings of peopleâs everyday interactions will be relatively easy to âread offâ of such data and that this, in turn, poses a privacy threat. An ethnographic study of how people account for sensed data to third parties uncovers serious challenges to such ideas. The study reveals that the legibility of sensor data turns upon various orders of situated reasoning involved in articulating the data and making it accountable. Articulation work is indispensable to personal data sharing and raises real requirements for networked sensing systems premised on the harvesting of personal data.},
urldate = {2016-04-03},
booktitle = {Proceedings of the 19th {ACM} {Conference} on {Computer}-{Supported} {Cooperative} {Work} \& {Social} {Computing}},
publisher = {ACM},
author = {Tolmie, Peter and Crabtree, Andy and Rodden, Tom and Colley, James and Luger, Ewa},
year = {2016},
keywords = {accountability, articulation work, ethnography, Networked sensing systems, personal data, privacy, Privacy},
pages = {491--502}
}
@inproceedings{langheinrich_privacy_2001,
title={Privacy by design—principles of privacy-aware ubiquitous systems},
author={Langheinrich, Marc},
booktitle={International conference on Ubiquitous Computing},
pages={273--291},
year={2001},
organization={Springer}
}
@inproceedings{odom_lost_2012,
address = {Austin, Texas, USA},
series = {{CHI} '12},
title = {Lost in translation: understanding the possession of digital things in the cloud},
isbn = {978-1-4503-1015-4},
shorttitle = {Lost in translation},
url = {https://doi.org/10.1145/2207676.2207789},
doi = {10.1145/2207676.2207789},
abstract = {People are amassing larger and more diverse collections of digital things. The emergence of Cloud computing has enabled people to move their personal files to online places, and create new digital things through online services. However, little is known about how this shift might shape people's orientations toward their digital things. To investigate, we conducted in depth interviews with 13 people comparing and contrasting how they think about their possessions, moving from physical ones, to locally kept digital materials, to the online world. Findings are interpreted to detail design and research opportunities in this emerging space.},
urldate = {2020-06-08},
booktitle = {Proceedings of the {SIGCHI} {Conference} on {Human} {Factors} in {Computing} {Systems}},
publisher = {Association for Computing Machinery},
author = {Odom, William and Sellen, Abi and Harper, Richard and Thereska, Eno},
month = may,
year = {2012},
keywords = {cloud computing, interactive systems design, materiality, human-centered architectures, possession},
pages = {781--790}
}
@article{warren_right_1890,
title = {The {Right} to {Privacy}},
volume = {4},
issn = {0017-811X},
url = {http://www.jstor.org/stable/1321160},
doi = {10.2307/1321160},
number = {5},
journal = {Harvard Law Review},
author = {Warren, Samuel D. and Brandeis, Louis D.},
year = {1890},
pages = {193--220}
}
@book{westin_privacy_1968,
title = {Privacy and {Freedom}},
language = {en},
author = {Westin, Alan F.},
year = {1968},
note = {Google-Books-ID: EqGAfBTQreMC}
}
@article{nissenbaum_privacy_2004,
title = {Privacy as contextual integrity},
volume = {79},
journal = {Wash. L. Rev.},
author = {Nissenbaum, Helen},
year = {2004},
note = {Publisher: HeinOnline},
pages = {119}
}
@article{smullen_best_2020,
title = {The {Best} of {Both} {Worlds}: {Mitigating} {Trade}-offs {Between} {Accuracy} and {User} {Burden} in {Capturing} {Mobile} {App} {Privacy} {Preferences}},
volume = {2020},
shorttitle = {The {Best} of {Both} {Worlds}},
url = {https://content.sciendo.com/view/journals/popets/2020/1/article-p195.xml},
doi = {10.2478/popets-2020-0011},
abstract = {In today’s data-centric economy, data flows are increasingly diverse and complex. This is best exemplified by mobile apps, which are given access to an increasing number of sensitive APIs. Mobile operating systems have attempted to balance the introduction of sensitive APIs with a growing collection of permission settings, which users can grant or deny. The challenge is that the number of settings has become unmanageable. Yet research also shows that existing settings continue to fall short when it comes to accurately capturing people’s privacy preferences. An example is the inability to control mobile app permissions based on the purpose for which an app is requesting access to sensitive data. In short, while users are already overwhelmed, accurately capturing their privacy preferences would require the introduction of an even greater number of settings. A promising approach to mitigating this trade-off lies in using machine learning to generate setting recommendations or bundle some settings. This article is the first of its kind to offer a quantitative assessment of how machine learning can help mitigate this trade-off, focusing on mobile app permissions. Results suggest that it is indeed possible to more accurately capture people’s privacy preferences while also reducing user burden.},
language = {en},
number = {1},
urldate = {2020-11-17},
journal = {Proceedings on Privacy Enhancing Technologies},
author = {Smullen, Daniel and Feng, Yuanyuan and Zhang, Shikun Aerin and Sadeh, Norman},
month = jan,
year = {2020},
note = {Publisher: Sciendo
Section: Proceedings on Privacy Enhancing Technologies},
pages = {195--215}
}
@article{rader_identifying_2015,
title = {Identifying patterns in informal sources of security information},
volume = {1},
issn = {2057-2085},
url = {https://academic.oup.com/cybersecurity/article/1/1/121/2367023},
doi = {10.1093/cybsec/tyv008},
abstract = {Abstract. Computer users have access to computer security information from many different sources, but few people receive explicit computer security training.},
language = {en},
number = {1},
urldate = {2019-11-22},
journal = {Journal of Cybersecurity},
author = {Rader, Emilee and Wash, Rick},
month = sep,
year = {2015},
pages = {121--144}
}
@inproceedings{das_effect_2014,
address = {Menlo Park, CA},
title = {The {Effect} of {Social} {Influence} on {Security} {Sensitivity}},
isbn = {978-1-931971-13-3},
url = {https://www.usenix.org/conference/soups2014/proceedings/presentation/das},
booktitle = {10th {Symposium} {On} {Usable} {Privacy} and {Security} ({SOUPS} 2014)},
publisher = {USENIX Association},
author = {Das, Sauvik and Kim, Tiffany Hyun-Jin and Dabbish, Laura A. and Hong, Jason I.},
year = {2014},
pages = {143--157}
}
@inproceedings{digioia_social_2005,
address = {New York, NY, USA},
series = {{SOUPS} '05},
title = {Social {Navigation} {As} a {Model} for {Usable} {Security}},
isbn = {978-1-59593-178-8},
url = {http://doi.acm.org/10.1145/1073001.1073011},
doi = {10.1145/1073001.1073011},
abstract = {As interest in usable security spreads, the use of visual approaches in which the functioning of a distributed system is made visually available to end users is an approach that a number of researchers have examined. In this paper, we discuss the use of the social navigation paradigm as a way of organizing visual displays of system action. Drawing on a previous study of security in the Kazaa peer to peer system, we present some examples of the ways in which social navigation can be incorporated in support of usable security.},
urldate = {2019-11-22},
booktitle = {Proceedings of the 2005 {Symposium} on {Usable} {Privacy} and {Security}},
publisher = {ACM},
author = {DiGioia, Paul and Dourish, Paul},
year = {2005},
note = {event-place: Pittsburgh, Pennsylvania, USA},
keywords = {social navigation, visualization, collaborative interfaces, peer-to-peer filesharing},
pages = {101--108}
}
@article{chouhan_co-designing_2019,
title = {Co-designing for {Community} {Oversight}: {Helping} {People} {Make} {Privacy} and {Security} {Decisions} {Together}},
volume = {3},
issn = {2573-0142},
shorttitle = {Co-designing for {Community} {Oversight}},
url = {http://doi.acm.org/10.1145/3359248},
doi = {10.1145/3359248},
abstract = {Collective feedback can support an individual's decision-making process. For instance, individuals often seek the advice of friends, family, and co-workers to help them make privacy decisions. However, current technologies often do not provide mechanisms for this type of collaborative interaction. To address this gap, we propose a novel model of Community Oversight for Privacy and Security ("CO-oPS"), which identifies mechanisms for users to interact with people they trust to help one another make digital privacy and security decisions. We apply our CO-oPS model in the context of mobile applications ("apps"). To interrogate and refine this model, we conducted participatory design sessions with 32 participants in small groups of 2-4 people who know one another, with the goal of designing a mobile app that facilitates collaborative privacy and security decision-making. We describe and reflect on the opportunities and challenges that arise from the unequal motivation and trust in seeking support and giving support within and beyond a community. Through this research, we contribute a novel framework for collaborative digital privacy and security decision-making and provide empirical evidence towards how researchers and designers might translate this framework into design-based features.},
number = {CSCW},
urldate = {2019-11-22},
journal = {Proc. ACM Hum.-Comput. Interact.},
author = {Chouhan, Chhaya and LaPerriere, Christy M. and Aljallad, Zaina and Kropczynski, Jess and Lipford, Heather and Wisniewski, Pamela J.},
month = nov,
year = {2019},
keywords = {community, mobile privacy, security, collaborative privacy, collective feedback, oversight},
pages = {146:1--146:31}
}
@inproceedings{zhao_effect_2016,
address = {New York, NY, USA},
series = {{IUI} '16},
title = {The {Effect} of {Privacy} {Concerns} on {Privacy} {Recommenders}},
isbn = {978-1-4503-4137-0},
url = {http://doi.acm.org/10.1145/2856767.2856771},
doi = {10.1145/2856767.2856771},
abstract = {Location-sharing services such as Facebook and Foursquare/Swarm have become increasingly popular, due to the ease at which users can share their locations, and participate in services, games and other applications that leverage these locations. But it is important for people who use these services to configure appropriate location-privacy preferences so that they can control to whom they want to share their location information. Manually configuring these preferences may be burdensome and confusing, and so location-privacy preference recommenders based on crowdsourcing preferences from other users have been proposed. Whether people will accept the recommended preferences acquired from other users, who they may not know or trust, has not, however, been investigated. In this paper, we present a user experiment (n=99) to explore what factors influence people's acceptance of location-privacy preference recommenders. We find that 44\% of our participants have privacy concerns about such recommenders. These concerns are shown to have a negative effect (p{\textless}0.001) on their acceptance of the recommendations and their satisfaction about their choices. Furthermore, users' acceptance of recommenders varies according to both context and recommendations being made. Our findings are potentially useful to designers of location-sharing services and privacy recommenders.},
urldate = {2019-11-16},
booktitle = {Proceedings of the 21st {International} {Conference} on {Intelligent} {User} {Interfaces}},
publisher = {ACM},
author = {Zhao, Yuchen and Ye, Juan and Henderson, Tristan},
year = {2016},
note = {event-place: Sonoma, California, USA},
keywords = {location-based services, privacy preferences, recommender systems, location-sharing services, user acceptance},
pages = {218--227}
}
@book{hidalgo_how_2021,
title = {How {Humans} {Judge} {Machines}},
isbn = {978-0-262-36252-8},
abstract = {How people judge humans and machines differently, in scenarios involving natural disasters, labor displacement, policing, privacy, algorithmic bias, and more.How would you feel about losing your job to a machine? How about a tsunami alert system that fails? Would you react differently to acts of discrimination depending on whether they were carried out by a machine or by a human? What about public surveillance? How Humans Judge Machines compares people's reactions to actions performed by humans and machines. Using data collected in dozens of experiments, this book reveals the biases that permeate human-machine interactions. Are there conditions in which we judge machines unfairly? Is our judgment of machines affected by the moral dimensions of a scenario? Is our judgment of machine correlated with demographic factors such as education or gender? César Hidalgo and colleagues use hard science to take on these pressing technological questions. Using randomized experiments, they create revealing counterfactuals and build statistical models to explain how people judge artificial intelligence and whether they do it fairly. Through original research, How Humans Judge Machines bring us one step closer tounderstanding the ethical consequences of AI.},
language = {en},
publisher = {MIT Press},
author = {Hidalgo, Cesar A. and Orghiain, Diana and Canals, Jordi Albo and Almeida, Filipa De and Martin, Natalia},
month = feb,
year = {2021},
note = {Google-Books-ID: jM\_tDwAAQBAJ},
keywords = {Computers / Intelligence (AI) \& Semantics, Computers / Social Aspects, Science / Ethics}
}
@online{zoom_video_2020,
author = {Zoom},
title = {Video {Conferencing}, {Web} {Conferencing}, {Webinars}, {Screen} {Sharing}},
url = {https://zoom.us/},
lastaccessed ={November 12, 2020},
year = {2020}
}
@online{miro_miro_2020,
author = {Miro},
title = {Miro {\textbar} {Free} {Online} {Collaborative} {Whiteboard} {Platform}},
url = {https://miro.com/},
lastaccessed ={November 12, 2020},
year = {2020}
}
@inproceedings{choe_living_2011,
address = {Beijing, China},
series = {{UbiComp} '11},
title = {Living in a glass house: a survey of private moments in the home},
isbn = {978-1-4503-0630-0},
shorttitle = {Living in a glass house},
url = {https://doi.org/10.1145/2030112.2030118},
doi = {10.1145/2030112.2030118},
abstract = {As advances in technology accelerate, sensors and recording devices are increasingly being integrated into homes. Although the added benefit of sensing is often clear (e.g., entertainment, security, encouraging sustainable behaviors, etc.), the home is a private and intimate place, with multiple stakeholders who may have competing priorities and tolerances for what is acceptable and useful. In an effort to develop systems that account for the needs and concerns of householders, we conducted an anonymous survey (N = 475) focusing on the activities and habits that people do at home that they would not want to be recorded. In this paper, we discuss those activities and where in the home they are performed, and offer suggestions for the design of UbiComp systems that rely on sensing and recording.},
urldate = {2020-01-24},
booktitle = {Proceedings of the 13th international conference on {Ubiquitous} computing},
publisher = {Association for Computing Machinery},
author = {Choe, Eun Kyoung and Consolvo, Sunny and Jung, Jaeyeon and Harrison, Beverly and Kientz, Julie A.},
month = sep,
year = {2011},
keywords = {capture and access, home, mechanical turk, sensing, survey, questionnaire, sensors, privacy, self-report, postcard},
pages = {41--44}
}
@article{belanger_pocket:_2013,
title = {{POCKET}: {A} tool for protecting children's privacy online},
volume = {54},
issn = {0167-9236},
shorttitle = {{POCKET}},
url = {http://www.sciencedirect.com/science/article/pii/S0167923612003429},
doi = {10.1016/j.dss.2012.11.010},
abstract = {Children's privacy in the online environment has become critical. Use of the Internet is increasing for commercial purposes, in requests for information, and in the number of children who use the Internet for casual web surfing, chatting, games, schoolwork, e-mail, interactive learning, and other applications. Often, websites hosting these activities ask for personal information such as name, e-mail, street address, and phone number. In the United States, the children's online privacy protection act (COPPA) of 1998 was enacted in reaction to widespread collection of information from children and subsequent abuses identified by the Federal Trade Commission (FTC). COPPA is aimed at protecting a child's privacy by requiring parental consent before collecting information from children under the age of 13. To date, however, the business practices used and the technical approaches employed to comply with COPPA fail to protect children's online privacy effectively. In this paper, we describe the design of an automated tool for protecting children's online privacy, called POCKET (Parental Online Consent for Kid's Electronic Transactions). The POCKET framework is a novel, technically feasible and legally sound solution to automatically enforce COPPA.},
language = {en},
number = {2},
urldate = {2019-11-16},
journal = {Decision Support Systems},
author = {Bélanger, France and Crossler, Robert E. and Hiller, Janine S. and Park, Jung-Min and Hsiao, Michael S.},
month = jan,
year = {2013},
keywords = {Children, COPPA, Design science, Information privacy, IT artifact, Privacy},
pages = {1161--1173}
}
@incollection{ackerman_socio_2018,
title={Socio-technical design for the care of people with spinal cord injuries},
author={Ackerman, Mark S. and Büyüktür, Ayşe G. and Hung, Pei-Yao and Meade, Michelle A and Newman, Mark W},
booktitle={Designing Healthcare That Works},
pages={1--18},
year={2018},
publisher={Elsevier}
}
@article{alan_tariff_2016,
title = {Tariff {Agent}: {Interacting} with a {Future} {Smart} {Energy} {System} at {Home}},
volume = {23},
issn = {1073-0516},
shorttitle = {Tariff {Agent}},
url = {https://doi.org/10.1145/2943770},
doi = {10.1145/2943770},
abstract = {Smart systems are becoming increasingly ubiquitous and consequently transforming our lives. The level of system autonomy plays a vital role in the development of smart systems as it profoundly affects how people and these systems interact with each other. However, to date, there are very few studies on human interaction with such systems. This paper presents findings from two field studies where two different prototypes for automating energy tariff-switching were developed and evaluated in the wild. Both prototypes offer flexible autonomy by which users can shift the system's level of autonomy among three options: suggestion-only, semi-autonomy, and full autonomy, whenever they like. Our findings based on thematic analysis show that flexible autonomy is a promising way to sustain users' engagement with smart systems, despite their occasional mistakes. The findings also suggest that users take responsibility for the undesired outcomes of automated actions when delegation of autonomy can be adjusted flexibly.},
number = {4},
urldate = {2020-03-23},
journal = {ACM Transactions on Computer-Human Interaction},
author = {Alan, Alper T. and Costanza, Enrico and Ramchurn, Sarvapali D. and Fischer, Joel and Rodden, Tom and Jennings, Nicholas R.},
month = aug,
year = {2016},
keywords = {field study, internet of things, flexible autonomy, human--agent interaction, Interactive intelligent systems, smart grid},
pages = {25:1--25:28}
}
@inproceedings{voida_listening_2005,
address = {Portland, Oregon, USA},
series = {{CHI} '05},
title = {Listening in: practices surrounding {iTunes} music sharing},
isbn = {978-1-58113-998-3},
shorttitle = {Listening in},
url = {https://doi.org/10.1145/1054972.1054999},
doi = {10.1145/1054972.1054999},
abstract = {This paper presents a descriptive account of the social practices surrounding the iTunes music sharing of 13 participants in one organizational setting. Specifically, we characterize adoption, critical mass, and privacy; impression management and access control; the musical impressions of others that are created as a result of music sharing; the ways in which participants attempted to make sense of the dynamic system; and implications of the overlaid technical, musical, and corporate topologies. We interleave design implications throughout our results and relate those results to broader themes in a music sharing design space.},
urldate = {2020-06-01},
booktitle = {Proceedings of the {SIGCHI} {Conference} on {Human} {Factors} in {Computing} {Systems}},
publisher = {Association for Computing Machinery},
author = {Voida, Amy and Grinter, Rebecca E. and Ducheneaut, Nicolas and Edwards, W. Keith and Newman, Mark W.},
month = apr,
year = {2005},
keywords = {discovery, iTunes, music sharing},
pages = {191--200}
}
@book{goffman_the_1978,
title={The presentation of self in everyday life},
author={Goffman, Erving and others},
year={1978},
publisher={Harmondsworth London}
}
@article{ackerman_intellectual_2000,
title = {The {Intellectual} {Challenge} of {CSCW}: {The} {Gap} {Between} {Social} {Requirements} and {Technical} {Feasibility}},
volume = {15},
issn = {0737-0024},
url = {http://dl.acm.org/citation.cfm?id=1463015.1463020},
doi = {10.1207/S15327051HCI1523_5},
number = {2},
journal = {Human-Computer Interaction},
author = {Ackerman, Mark S.},
month = sep,
year = {2000},
pages = {179--203}
}
@inproceedings{kim_co-performing_2019,
address = {Glasgow, Scotland Uk},
series = {{CHI} '19},
title = {Co-{Performing} {Agent}: {Design} for {Building} {User}-{Agent} {Partnership} in {Learning} and {Adaptive} {Services}},
isbn = {978-1-4503-5970-2},
shorttitle = {Co-{Performing} {Agent}},
url = {https://doi.org/10.1145/3290605.3300714},
doi = {10.1145/3290605.3300714},
abstract = {Intelligent agents have become prevalent in everyday IT products and services. To improve an agent's knowledge of a user and the quality of personalized service experience, it is important for the agent to cooperate with the user (e.g., asking users to provide their information and feedback). However, few works inform how to support such user-agent co-performance from a human-centered perspective. To fill this gap, we devised Co-Performing Agent, a Wizard-of-Oz-based research probe of an agent that cooperates with a user to learn by helping users to have a partnership mindset. By incorporating the probe, we conducted a two-month exploratory study, aiming to understand how users experience co-performing with their agent over time. Based on the findings, this paper presents the factors that affected users' co-performing behaviors and discusses design implications for supporting constructive co-performance and building a resilient user-agent partnership over time.},
urldate = {2020-03-23},
booktitle = {Proceedings of the 2019 {CHI} {Conference} on {Human} {Factors} in {Computing} {Systems}},
publisher = {Association for Computing Machinery},
author = {Kim, Da-jung and Lim, Youn-kyung},
month = may,
year = {2019},
keywords = {intelligent agents, personalization, co-performance, adaptive services},
pages = {1--14}
}
@article{carroll_training_1984,
title = {Training {Wheels} in a {User} {Interface}},
volume = {27},
issn = {0001-0782},
abstract = {New users of high-function application systems can become frustrated and confused by the errors they make in the early stages of learning. A training interface for a commercial word processor was designed to make typical and troublesome error states “unreachable,” thus eliminating the sources of some new-user learning problems. Creating a training environment from the basic function of the system itself afforded substantially faster learning coupled with better learning achievement and better performance on a comprehension post-test. A control group spent almost a quarter of their time recovering from the error states that the training interface blocked off. We speculate on how this training strategy might be refined, and more generally, on how function should be organized in a user interface.},
number = {8},
urldate = {2014-04-09},
journal = {Commun. ACM},
author = {Carroll, John M. and Carrithers, Caroline},
month = aug,
year = {1984},
keywords = {ease of learning, education, human learning, human-computer interaction, training, Usability, user interface architecture},
pages = {800--806}
}
@inproceedings{yang_learning_2013,
address = {Zurich, Switzerland},
series = {{UbiComp} '13},
title = {Learning from a learning thermostat: lessons for intelligent systems for the home},
isbn = {978-1-4503-1770-2},
shorttitle = {Learning from a learning thermostat},
url = {https://doi.org/10.1145/2493432.2493489},
doi = {10.1145/2493432.2493489},
abstract = {Everyday systems and devices in the home are becoming smarter. In order to better understand the challenges of deploying an intelligent system in the home, we studied the experience of living with an advanced thermostat, the Nest. The Nest utilizes machine learning, sensing, and networking technology, as well as eco-feedback features. We conducted interviews with 23 participants, ten of whom also participated in a three-week diary study. Our findings show that while the Nest was well-received overall, the intelligent features of the Nest were not perceived to be as useful or intuitive as expected, in particular due to the system's inability to understand the intent behind sensed behavior and users' difficulty in understanding how the Nest works. A number of participants developed workarounds for the shortcomings they encountered. Based on our observations, we propose three avenues for future development of interactive intelligent technologies for the home: exception flagging, incidental intelligibility, and constrained engagement.},
urldate = {2020-03-18},
booktitle = {Proceedings of the 2013 {ACM} international joint conference on {Pervasive} and ubiquitous computing},
publisher = {Association for Computing Machinery},
author = {Yang, Rayoung and Newman, Mark W.},
month = sep,
year = {2013},
keywords = {smart home, sustainability, intelligent systems},
pages = {93--102}
}
@inproceedings{li_stage-based_2010,
address = {New York, NY, USA},
series = {{CHI} '10},
title = {A {Stage}-based {Model} of {Personal} {Informatics} {Systems}},
isbn = {978-1-60558-929-9},
url = {http://doi.acm.org.proxy.lib.umich.edu/10.1145/1753326.1753409},
doi = {10.1145/1753326.1753409},
abstract = {People strive to obtain self-knowledge. A class of systems called personal informatics is appearing that help people collect and reflect on personal information. However, there is no comprehensive list of problems that users experience using these systems, and no guidance for making these systems more effective. To address this, we conducted surveys and interviews with people who collect and reflect on personal information. We derived a stage-based model of personal informatics systems composed of five stages (preparation, collection, integration, reflection, and action) and identified barriers in each of the stages. These stages have four essential properties: barriers cascade to later stages; they are iterative; they are user-driven and/or system-driven; and they are uni-faceted or multi-faceted. From these properties, we recommend that personal informatics systems should 1) be designed in a holistic manner across the stages; 2) allow iteration between stages; 3) apply an appropriate balance of automated technology and user control within each stage to facilitate the user experience; and 4) explore support for associating multiple facets of people's lives to enrich the value of systems.},
urldate = {2014-07-15},
booktitle = {Proceedings of the {SIGCHI} {Conference} on {Human} {Factors} in {Computing} {Systems}, {Atlanta}, {Georgia}, {USA}, 10 {April} - 15 {April}, 2010},
publisher = {ACM},
author = {Li, Ian and Dey, Anind and Forlizzi, Jodi},
year = {2010},
keywords = {barriers, collection, model, personal informatics, reflection},
pages = {557--566}
}
@online{quantified_self_quantified_2020,
title = {Quantified {Self} - {Self} {Knowledge} {Through} {Numbers}},
year = {2020},
url = {https://quantifiedself.com/},
language = {en},
urldate = {2020-07-21},
journal = {Quantified Self - Self Knowledge Through Numbers},
author = {{Quantified Self}},
note = {Library Catalog: quantifiedself.com}
}
@inproceedings{nissen_should_2019,
address = {New York, NY, USA},
series = {{CHI} '19},
title = {Should {I} {Agree}?: {Delegating} {Consent} {Decisions} {Beyond} the {Individual}},
isbn = {978-1-4503-5970-2},
shorttitle = {Should {I} {Agree}?},
url = {http://doi.acm.org/10.1145/3290605.3300745},
doi = {10.1145/3290605.3300745},
abstract = {Obtaining meaningful user consent is increasingly problematic in a world of numerous, heterogeneous digital services. Current approaches (e.g. agreeing to Terms and Conditions) are rooted in the idea of individual control despite growing evidence that users do not (or cannot) exercise such control in informed ways. We consider an alternative approach whereby users can opt to delegate consent decisions to an ecosystem of third-parties including friends, experts, groups and AI entities. We present the results of a study that used a technology probe at a large festival to explore initial public responses to this reframing -- focusing on when and to whom users would delegate such decisions. The results reveal substantial public interest in delegating consent and identify differing preferences depending on the privacy context, highlighting the need for alternative decision mechanisms beyond the current focus on individual choice.},
urldate = {2019-11-07},
booktitle = {Proceedings of the 2019 {CHI} {Conference} on {Human} {Factors} in {Computing} {Systems}},
publisher = {ACM},
author = {Nissen, Bettina and Neumann, Victoria and Mikusz, Mateusz and Gianni, Rory and Clinch, Sarah and Speed, Chris and Davies, Nigel},
year = {2019},
note = {event-place: Glasgow, Scotland Uk},
keywords = {consent, delegation, design, permission management, privacy, technology probe},
pages = {515:1--515:13}
}
@inproceedings{colnago_informing_2020,
address = {Honolulu, HI, USA},
series = {{CHI} '20},
title = {Informing the {Design} of a {Personalized} {Privacy} {Assistant} for the {Internet} of {Things}},
isbn = {978-1-4503-6708-0},
url = {https://doi.org/10.1145/3313831.3376389},
doi = {10.1145/3313831.3376389},
abstract = {Internet of Things (IoT) devices create new ways through which personal data is collected and processed by service providers. Frequently, end users have little awareness of, and even less control over, these devices' data collection. IoT Personalized Privacy Assistants (PPAs) can help overcome this issue by helping users discover and, when available, control the data collection practices of nearby IoT resources. We use semi-structured interviews with 17 participants to explore user perceptions of three increasingly more autonomous potential implementations of PPAs, identifying benefits and issues associated with each implementation. We find that participants weigh the desire for control against the fear of cognitive overload. We recommend solutions that address users' differing automation preferences and reduce notification overload. We discuss open issues related to opting out from public data collections, automated consent, the phenomenon of user resignation, and designing PPAs with at-risk communities in mind.},
urldate = {2020-05-09},
booktitle = {Proceedings of the 2020 {CHI} {Conference} on {Human} {Factors} in {Computing} {Systems}},
publisher = {Association for Computing Machinery},
author = {Colnago, Jessica and Feng, Yuanyuan and Palanivel, Tharangini and Pearman, Sarah and Ung, Megan and Acquisti, Alessandro and Cranor, Lorrie Faith and Sadeh, Norman},
month = apr,
year = {2020},
keywords = {internet of things, inteviews, personalized privacy assistants},
pages = {1--13}
}