End-User Privacy in Human-Computer Interaction
End-User Privacy in Human-Computer Interaction surveys the rich and diverse landscape of privacy in Human-Computer Interaction (HCI) and Computer Supported Cooperative Work (CSCW), describing some of the legal foundations and historical aspects of privacy, sketching out an overview of the body of knowledge with respect to designing, implementing, and evaluating privacy-affecting systems, and charting many directions for future work. The authors first summarize the research that has been done on the topic over the past three decades, outlining current approaches, results, and trends. They proceed to chart future research trends and point out areas of research that are timely but lagging. In summarizing thirty years of privacy research in HCI and CSCW, End-User Privacy in Human-Computer Interaction helps to shed light on many of the salient issues and will help practitioners and researchers alike explore these complex issues in a more informed and conscious way.
What people are saying - Write a review
We haven't found any reviews in the usual places.
11 Why Should HCI Researchers Care About Privacy?
12 Sources Used and Limitations of this Survey
The Privacy Landscape
22 Philosophical Perspectives on Privacy
23 An Historic Perspective on Privacy
Understanding Building and Evaluating Privacy in Interactive Systems
31 Understanding Users Privacy Preferences
35 Privacy Frameworks
Trends and Challenges in Privacy HCI Research
41 Better Ways of Helping EndUsers Manage Their Personal Privacy
42 A Deeper Understanding of Peoples Attitudes and Behavior
43 Developing a Privacy HCI Toolbox
44 Better Organizational Practices
45 Understanding Adoption
32 Methodological Issues
33 Prototyping Building and Deploying PrivacySensitive Applications
acceptance Acquisti adoption aﬀect applications awareness behavior Bellotti and Sellen beneﬁts browsers certiﬁcate challenge cognitive walkthrough communication conﬁguration context Cranor CSCW data protection legislation data sharers default deﬁned developed diﬀerent diﬃcult disclosing e-commerce eﬀective encryption end-user evaluation example feedback ﬁeld FIPS ﬁrst framework guidelines HCI research Human–Computer Interaction Iachello identiﬁed identity management individuals inﬂuence informational self-determination Instant Messaging interpersonal Jensen location-based location-based services media spaces mobile models notiﬁcation oﬃce one’s organizations Palen participants participatory design people’s personal data personal information personal privacy plausible deniability potential privacy and security privacy concerns privacy issues privacy policies privacy preferences privacy research privacy risks privacy-sensitive probe protect privacy reﬂected requirements RFID risk analysis Section security and privacy shared signiﬁcant social translucency speciﬁc suﬃcient survey techniques tion trust ubicomp ubiquitous computing understanding usability user interfaces vacy value proposition web browsers Westin