skip to main content
10.1145/2968219.2968546acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

How to inform privacy agents on preferred level of user control?

Authors Info & Claims
Published:12 September 2016Publication History

ABSTRACT

This paper presents an organized set of variables that can aid intelligent privacy agents in predicting the best and necessary moments to interrupt users in order to give them control and awareness over their privacy, avoiding information overload or over choice.

References

  1. Alessandro Acquisti. 2013. Complementary Perspectives on Privacy and Security: Economics. IEEE Secur. Priv. 11, 2, 93--95. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Alessandro Acquisti, Idris Adjerid, and Laura Brandimarte. 2013. Gone in 15 Seconds: The Limits of Privacy Transparency and Control. IEEE Secur. Priv. 11, 4, 72--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Faith Cranor, and Yuvraj Agarwal 2015. Your Location has been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging. In Proc. ACM Conference on Human Factors in Computing Systems (CHI '15). 787--796. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Lisanne Bainbridge. 1983. Brief paper: Ironies of automation. Automatica 19, 6, 775--779. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Louise Barkhuus. 2012. The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. In Proc. ACM Conference on Human Factors in Computing Systems (CHI '12). 367--376. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Victoria Bellotti and Abigail Sellen. 1993. Design for privacy in ubiquitous computing environments. In Proc. European Conference on Computer-Supported Cooperative Work (ECSCW'93). 77--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Michael Boyle and Saul Greenberg. 2005. The Language of Privacy: Learning from Video Media Space Analysis and Design. ACM Trans. Comput. Interact. 12, 2, 328--370. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Christian Bunnig and Clemens H. Cap. 2009. Ad Hoc Privacy Management in Ubiquitous Computing Environments. In Proc. International Conference on Advances in Human-Oriented and Personalized Mechanisms, Technologies, and Services. 85--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Sunny Consolvo, Ian E. Smith, Tara Matthews, Anthony LaMarca, Jason Tabert, and Pauline Powledge. 2005. Location Disclosure to Social Relations: Why, When & What People Want to Share. In Proc. SIGCHI Conference on Human Factors in Computing Systems (CHI '05). 81--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Bertrand Copigneaux. 2014. Semi-autonomous, context-aware, agent using behaviour modelling and reputation systems to authorize data operation in the Internet of Things. In Proc. World Forum on Internet of Things (WF-IoT). 411--416.Google ScholarGoogle ScholarCross RefCross Ref
  11. Laura A. Dabbish and Ryan S. Baker. 2003. Administrative assistants as interruption mediators. In CHI '03 Extended Abstracts on Human Factors in Computing Systems (CHI EA '03). 1020--1021. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Fred D. Davis, Richard P. Bagozzi, and Paul R. Warshaw. 1989. User acceptance of computer technology: a comparison of two theoretical models. Manage. Sci. 35, 8, 982--1003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Deborah Ann Guerrera Ercolini and Mieczyslaw M. Kokar. 1997. Desktop Agent Manager (DAM): Decision Mechanism. Int. J. Hum. Comput. Interact. 9, 2, 133--149.Google ScholarGoogle ScholarCross RefCross Ref
  14. Robert Fisher and Reid Simmons. 2011. Smartphone Interruptibility Using Density-Weighted Uncertainty Sampling with Reinforcement Learning. In Proc. International Conference on Machine Learning and Applications and Workshops (ICMLA '11). 436--441. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Nirmal Gaud, Anjana Deen, and Sanjay Silakari. 2012. Architecture for discovery of context-aware web services based on privacy preferences. In Proc. Conference on Computational Intelligence and Communication Networks. 887--892. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Sukeshini Grandhi and Quentin Jones. 2010. Technology-mediated interruption management. Int. J. Hum. Comput. Stud. 68, 5, 288--306. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Rikard Harr and Victor Kaptelinin. 2012. Interrupting or not: Exploring the effect of social context on interrupters' decision making. In Proc. Nordic Conference on Human-Computer Interaction Design (NordiCHI '12). 707--710. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Hans Van Der Heijden. 2003. Ubiquitous computing, user control, and user performance: conceptual model and preliminary experimental design. In Proc. Research Symposium on Emerging Electronic Markets. 107--112.Google ScholarGoogle Scholar
  19. Joyce Ho and Stephen S. Intille. 2005. Using context-aware computing to reduce the perceived burden of interruptions from mobile devices. In Proc. SIGCHI Conference on Human Factors in Computing Systems (CHI '05). 909--918. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Kevin Hoff and Masooda Bashir. 2013. A Theoretical Model for Trust in Automated Systems. In CHI '13 Extended Abstracts on Human Factors in Computing Systems (CHI EA '13). 115--120. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Jason I. Hong and James A. Landay. 2004. An architecture for privacy-sensitive ubiquitous computing. In Proc. Conference on Mobile systems, applications, and services (MobiSys '04). 177--189. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Ponnurangam Kumaraguru and Lf Cranor. 2005. Privacy indexes: A survey of westin's studies, Pittsburg, PA.Google ScholarGoogle Scholar
  23. Scott Lederer, Jennifer Mankoff, and Anind K. Dey. 2003. Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. In CHI '03 Extended Abstracts on Human Factors in Computing Systems (CHI EA '03). 724--725. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Naresh K. Malhotra, Sung S. Kim, and James Agarwal. 2004. Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Inf. Syst. Res. 15, 4 (2004), 336--355. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Abhinav Mehrotra, Mirco Musolesi, Robert Hendley, and Veljko Pejovic. 2015. Designing content-driven intelligent notification mechanisms for mobile applications. In Proc. ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '15). 813--824. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Antti Oulasvirta and Antti Salovaara. 2004. A cognitive meta-analysis of design approaches to interruptions in intelligent environments. In CHI '04 Extended Abstracts on Human Factors in Computing Systems (CHI EA '04). 1155--1158. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Sameer Patil, Roberto Hoyle, Roman Schlegel, Apu Kapadia, and Adam J. Lee. 2015. Interrupt Now or Inform Later? Comparing Immediate and Delayed Privacy Feedback. In Proc. ACM Conference on Human Factors in Computing Systems (CHI '15). 1415--1418. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Veljko Pejovic and Mirco Musolesi. 2014. InterruptMe: designing intelligent prompting mechanisms for pervasive applications. In Proc. ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '14). 897--908. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Veljko Pejovic, Mirco Musolesi, and Abhinav Mehrotra. 2015. Investigating The Role of Task Engagement in Mobile Interruptibility. In Proc. Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct (MobileHCI '15). 1100--1105. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Hillol Sarker, Moushumi Sharmin, Amin Ahsan Ali, Md. Mahbubur Rahman, Rummana Bari, Syed Monowar Hossain, and Santosh Kumar. 2014. Assessing the Availability of Users to Engage in JustIn-Time Intervention in the Natural Environment. In Proc. International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '14). 909--920. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Florian Schaub, Bastian Könings, Michael Weber, and Frank Kargl. 2012. Towards Context Adaptive Privacy Decisions in Ubiquitous Computing. In Proc. International Conference on Pervasive Computing and Communications Workshops. 407--410.Google ScholarGoogle ScholarCross RefCross Ref
  32. Gunnvald B. Svendsen, Jan-Are K. Johnsen, Live Almås-Sørensen, and Joar Vittersø. 2013. Personality and technology acceptance: the influence of personality factors on the core constructs of the Technology Acceptance Model. Behav. Inf. Technol. 32, 4, 323--334. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Eran Toch. 2011. Super-Ego: A Framework for Privacy-Sensitive Bounded Context-Awareness. In Proc. International Workshop on Context-Awareness for Self-Managing Systems (CASEMANS '11). 24--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Alan Westin. 1967. Privacy and Freedom, The Bodley Head LtdGoogle ScholarGoogle Scholar

Index Terms

  1. How to inform privacy agents on preferred level of user control?

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      UbiComp '16: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct
      September 2016
      1807 pages
      ISBN:9781450344623
      DOI:10.1145/2968219

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 September 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate764of2,912submissions,26%

      Upcoming Conference

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader