My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules
详细信息    查看全文
  • 作者:Sameer Patil (19)
    Yann Le Gall (20)
    Adam J. Lee (20)
    Apu Kapadia (19)
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2012
  • 出版时间:2012
  • 年:2012
  • 卷:7398
  • 期:1
  • 页码:98-111
  • 全文大小:398KB
  • 参考文献:1. Benisch, M., Kelley, P.G., Sadeh, N., Cranor, L.F.: Capturing Location-Privacy Preferences: Quantifying Accuracy and User-Burden Tradeoffs. Personal Ubiquitous Comput.?15, 679-94 (2011) CrossRef
    2. Berendt, B., Günther, O., Spiekermann, S.: Privacy in e-Commerce: Stated Preferences vs. Actual Behavior. Communications of the ACM?48, 101-06 (2005) CrossRef
    3. Brodie, C.A., Karat, C.M., Karat, J.: An Empirical Study of Natural Language Parsing of Privacy Policy Rules Using the SPARCLE Policy Workbench. In: Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006, pp. 8-9. ACM, New York (2006) CrossRef
    4. Consolvo, S., Smith, I.E., Matthews, T., LaMarca, A., Tabert, J., Powledge, P.: Location Disclosure to Social Relations: Why, When, & What People Want to Share. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2005, pp. 81-0. ACM, New York (2005) CrossRef
    5. Kapadia, A., Henderson, T., Fielding, J.J., Kotz, D.: Virtual Walls: Protecting Digital Privacy in Pervasive Environments. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol.?4480, pp. 162-79. Springer, Heidelberg (2007) CrossRef
    6. Khan, R.M., Khan, M.A.: Academic Sojourners, Culture Shock and Intercultural Adaptation: A Trend Analysis. Studies About Languages?10, 38-6 (2007)
    7. Kobsa, A., Patil, S., Meyer, B.: Privacy in instant messaging: An impression management model. Behaviour & Information Technology?31(4), 355-70 (2012) CrossRef
    8. Lederer, S., Mankoff, J., Dey, A.K.: Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. In: CHI 2003 Extended Abstracts on Human factors in Computing Systems, CHI EA 2003, pp. 724-25. ACM, New York (2003) CrossRef
    9. Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet Users-Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research?15, 336-55 (2004) CrossRef
    10. Miluzzo, E., Lane, N.D., Fodor, K., Peterson, R., Lu, H., Musolesi, M., Eisenman, S.B., Zheng, X., Campbell, A.T.: Sensing Meets Mobile Social Networks: The Design, Implementation and Evaluation of the CenceMe Application. In: SenSys 2008: Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, pp. 337-50. ACM, New York (2008) CrossRef
    11. Patil, S., Kobsa, A.: Instant Messaging and Privacy. In: Proceedings of HCI 2004, pp. 85-8 (2004), http://www.ics.uci.edu/~kobsa/papers/2004-HCI-kobsa.pdf
    12. Patil, S., Kobsa, A.: Uncovering Privacy Attitudes and Practices in Instant Messaging. In: GROUP 2005: Proceedings of the 2005 International ACM SIGGROUP Conference on Supporting Group Work, pp. 109-12. ACM, New York (2005), doi:10.1145/1099203.1099220 CrossRef
    13. Patil, S., Lai, J.: Who Gets to Know What When: Configuring Privacy Permissions in an Awareness Application. In: CHI 2005: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 101-10. ACM, New York (2005), doi:10.1145/1054972.1054987 CrossRef
    14. Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., Rao, J.: Understanding and Capturing People’s Privacy Policies in a Mobile Social Networking Application. Personal and Ubiquitous Computing?13, 401-12 (2009) CrossRef
    15. Schlegel, R., Kapadia, A., Lee, A.J.: Eyeing your Exposure: Quantifying and Controlling Information Sharing for Improved Privacy. In: Proceedings of the 2011 Symposium on Usable Privacy and Security (SOUPS) (July 2011)
    16. Toch, E., Cranshaw, J., Drielsma, P.H., Tsai, J.Y., Kelley, P.G., Springfield, J., Cranor, L., Hong, J., Sadeh, N.: Empirical Models of Privacy in Location Sharing. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing, Ubicomp 2010, pp. 129-38. ACM, New York (2010) CrossRef
    17. Toch, E., Cranshaw, J., Hankes-Drielsma, P., Springfield, J., Kelley, P.G., Cranor, L., Hong, J., Sadeh, N.: Locaccino: A Privacy-Centric Location Sharing Application. In: Proceedings of the 12th ACM International Conference Adjunct Papers on Ubiquitous Computing, Ubicomp 2010, pp. 381-82. ACM, New York (2010) CrossRef
    18. Tsai, J.Y., Kelley, P., Drielsma, P., Cranor, L.F., Hong, J., Sadeh, N.: Who’s Viewed You?: The Impact of Feedback in a Mobile Location-Sharing Application. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, pp. 2003-012. ACM, New York (2009) CrossRef
    19. Wagner, D., Lopez, M., Doria, A., Pavlyshak, I., Kostakos, V., Oakley, I., Spiliotopoulos, T.: Hide and seek: Location Sharing Practices with Social Media. In: Proceedings of the 12th International Conference on Human Computer Interaction with Mobile Devices and Services, MobileHCI 2010, pp. 55-8. ACM, New York (2010) CrossRef
  • 作者单位:Sameer Patil (19)
    Yann Le Gall (20)
    Adam J. Lee (20)
    Apu Kapadia (19)

    19. School of Informatics and Computing, Indiana University, Bloomington, IN, 47408, USA
    20. Department of Computer Science, University of Pittsburgh, Pittsburgh, PA, 15260, USA
文摘
The increasing inclusion of location and other contextual information in social media applications requires users to be more aware of what their location disclosures reveal. As such, it is important to consider whether existing access-control mechanisms for managing location sharing meet the needs of today’s users. We report on a questionnaire (N--03) in which respondents were asked to specify location access control rules using free-form everyday language. Respondents also rated and ranked the importance of a variety of contextual factors that could influence their decisions for allowing or disallowing access to their location. Our findings validate some prior results (e.g., the recipient was the most highly rated and ranked factor and appeared most often in free-form rules) while challenging others (e.g., time-based constraints were deemed relatively less important, despite being features of multiple location-sharing services). We also identified several themes in the free-form rules (e.g., special rules for emergency situations). Our findings can inform the design of tools to empower end users to articulate and capture their access-control preferences more effectively.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700