ABSTRACT
This paper presents an organized set of variables that can aid intelligent privacy agents in predicting the best and necessary moments to interrupt users in order to give them control and awareness over their privacy, avoiding information overload or over choice.
- Alessandro Acquisti. 2013. Complementary Perspectives on Privacy and Security: Economics. IEEE Secur. Priv. 11, 2, 93--95. Google ScholarDigital Library
- Alessandro Acquisti, Idris Adjerid, and Laura Brandimarte. 2013. Gone in 15 Seconds: The Limits of Privacy Transparency and Control. IEEE Secur. Priv. 11, 4, 72--74. Google ScholarDigital Library
- Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Faith Cranor, and Yuvraj Agarwal 2015. Your Location has been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging. In Proc. ACM Conference on Human Factors in Computing Systems (CHI '15). 787--796. Google ScholarDigital Library
- Lisanne Bainbridge. 1983. Brief paper: Ironies of automation. Automatica 19, 6, 775--779. Google ScholarDigital Library
- Louise Barkhuus. 2012. The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. In Proc. ACM Conference on Human Factors in Computing Systems (CHI '12). 367--376. Google ScholarDigital Library
- Victoria Bellotti and Abigail Sellen. 1993. Design for privacy in ubiquitous computing environments. In Proc. European Conference on Computer-Supported Cooperative Work (ECSCW'93). 77--92. Google ScholarDigital Library
- Michael Boyle and Saul Greenberg. 2005. The Language of Privacy: Learning from Video Media Space Analysis and Design. ACM Trans. Comput. Interact. 12, 2, 328--370. Google ScholarDigital Library
- Christian Bunnig and Clemens H. Cap. 2009. Ad Hoc Privacy Management in Ubiquitous Computing Environments. In Proc. International Conference on Advances in Human-Oriented and Personalized Mechanisms, Technologies, and Services. 85--90. Google ScholarDigital Library
- Sunny Consolvo, Ian E. Smith, Tara Matthews, Anthony LaMarca, Jason Tabert, and Pauline Powledge. 2005. Location Disclosure to Social Relations: Why, When & What People Want to Share. In Proc. SIGCHI Conference on Human Factors in Computing Systems (CHI '05). 81--90. Google ScholarDigital Library
- Bertrand Copigneaux. 2014. Semi-autonomous, context-aware, agent using behaviour modelling and reputation systems to authorize data operation in the Internet of Things. In Proc. World Forum on Internet of Things (WF-IoT). 411--416.Google ScholarCross Ref
- Laura A. Dabbish and Ryan S. Baker. 2003. Administrative assistants as interruption mediators. In CHI '03 Extended Abstracts on Human Factors in Computing Systems (CHI EA '03). 1020--1021. Google ScholarDigital Library
- Fred D. Davis, Richard P. Bagozzi, and Paul R. Warshaw. 1989. User acceptance of computer technology: a comparison of two theoretical models. Manage. Sci. 35, 8, 982--1003. Google ScholarDigital Library
- Deborah Ann Guerrera Ercolini and Mieczyslaw M. Kokar. 1997. Desktop Agent Manager (DAM): Decision Mechanism. Int. J. Hum. Comput. Interact. 9, 2, 133--149.Google ScholarCross Ref
- Robert Fisher and Reid Simmons. 2011. Smartphone Interruptibility Using Density-Weighted Uncertainty Sampling with Reinforcement Learning. In Proc. International Conference on Machine Learning and Applications and Workshops (ICMLA '11). 436--441. Google ScholarDigital Library
- Nirmal Gaud, Anjana Deen, and Sanjay Silakari. 2012. Architecture for discovery of context-aware web services based on privacy preferences. In Proc. Conference on Computational Intelligence and Communication Networks. 887--892. Google ScholarDigital Library
- Sukeshini Grandhi and Quentin Jones. 2010. Technology-mediated interruption management. Int. J. Hum. Comput. Stud. 68, 5, 288--306. Google ScholarDigital Library
- Rikard Harr and Victor Kaptelinin. 2012. Interrupting or not: Exploring the effect of social context on interrupters' decision making. In Proc. Nordic Conference on Human-Computer Interaction Design (NordiCHI '12). 707--710. Google ScholarDigital Library
- Hans Van Der Heijden. 2003. Ubiquitous computing, user control, and user performance: conceptual model and preliminary experimental design. In Proc. Research Symposium on Emerging Electronic Markets. 107--112.Google Scholar
- Joyce Ho and Stephen S. Intille. 2005. Using context-aware computing to reduce the perceived burden of interruptions from mobile devices. In Proc. SIGCHI Conference on Human Factors in Computing Systems (CHI '05). 909--918. Google ScholarDigital Library
- Kevin Hoff and Masooda Bashir. 2013. A Theoretical Model for Trust in Automated Systems. In CHI '13 Extended Abstracts on Human Factors in Computing Systems (CHI EA '13). 115--120. Google ScholarDigital Library
- Jason I. Hong and James A. Landay. 2004. An architecture for privacy-sensitive ubiquitous computing. In Proc. Conference on Mobile systems, applications, and services (MobiSys '04). 177--189. Google ScholarDigital Library
- Ponnurangam Kumaraguru and Lf Cranor. 2005. Privacy indexes: A survey of westin's studies, Pittsburg, PA.Google Scholar
- Scott Lederer, Jennifer Mankoff, and Anind K. Dey. 2003. Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. In CHI '03 Extended Abstracts on Human Factors in Computing Systems (CHI EA '03). 724--725. Google ScholarDigital Library
- Naresh K. Malhotra, Sung S. Kim, and James Agarwal. 2004. Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Inf. Syst. Res. 15, 4 (2004), 336--355. Google ScholarDigital Library
- Abhinav Mehrotra, Mirco Musolesi, Robert Hendley, and Veljko Pejovic. 2015. Designing content-driven intelligent notification mechanisms for mobile applications. In Proc. ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '15). 813--824. Google ScholarDigital Library
- Antti Oulasvirta and Antti Salovaara. 2004. A cognitive meta-analysis of design approaches to interruptions in intelligent environments. In CHI '04 Extended Abstracts on Human Factors in Computing Systems (CHI EA '04). 1155--1158. Google ScholarDigital Library
- Sameer Patil, Roberto Hoyle, Roman Schlegel, Apu Kapadia, and Adam J. Lee. 2015. Interrupt Now or Inform Later? Comparing Immediate and Delayed Privacy Feedback. In Proc. ACM Conference on Human Factors in Computing Systems (CHI '15). 1415--1418. Google ScholarDigital Library
- Veljko Pejovic and Mirco Musolesi. 2014. InterruptMe: designing intelligent prompting mechanisms for pervasive applications. In Proc. ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '14). 897--908. Google ScholarDigital Library
- Veljko Pejovic, Mirco Musolesi, and Abhinav Mehrotra. 2015. Investigating The Role of Task Engagement in Mobile Interruptibility. In Proc. Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct (MobileHCI '15). 1100--1105. Google ScholarDigital Library
- Hillol Sarker, Moushumi Sharmin, Amin Ahsan Ali, Md. Mahbubur Rahman, Rummana Bari, Syed Monowar Hossain, and Santosh Kumar. 2014. Assessing the Availability of Users to Engage in JustIn-Time Intervention in the Natural Environment. In Proc. International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '14). 909--920. Google ScholarDigital Library
- Florian Schaub, Bastian Könings, Michael Weber, and Frank Kargl. 2012. Towards Context Adaptive Privacy Decisions in Ubiquitous Computing. In Proc. International Conference on Pervasive Computing and Communications Workshops. 407--410.Google ScholarCross Ref
- Gunnvald B. Svendsen, Jan-Are K. Johnsen, Live Almås-Sørensen, and Joar Vittersø. 2013. Personality and technology acceptance: the influence of personality factors on the core constructs of the Technology Acceptance Model. Behav. Inf. Technol. 32, 4, 323--334. Google ScholarDigital Library
- Eran Toch. 2011. Super-Ego: A Framework for Privacy-Sensitive Bounded Context-Awareness. In Proc. International Workshop on Context-Awareness for Self-Managing Systems (CASEMANS '11). 24--32. Google ScholarDigital Library
- Alan Westin. 1967. Privacy and Freedom, The Bodley Head LtdGoogle Scholar
Index Terms
- How to inform privacy agents on preferred level of user control?
Recommendations
User interfaces for privacy agents
Most people do not often read privacy policies because they tend to be long and difficult to understand. The Platform for Privacy Preferences (P3P) addresses this problem by providing a standard machine-readable format for website privacy policies. P3P ...
Multi-level privacy preserving data publishing
Policedata is an important source of social media data and can be regarded as a technical assistance to increase government accountability and transparency. Notably, it contains large amounts of personal private information that should be preserved ...
Privacy Languages: Are we there yet to enable user controls?
WWW '16 Companion: Proceedings of the 25th International Conference Companion on World Wide WebPrivacy protection is one of the most prominent concerns for web users. Despite numerous efforts, users remain powerless in controlling how their personal information should be used and by whom, and find limited options to actually opt-out of dominating ...
Comments