[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1056808.1057073acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article

A study of preferences for sharing and privacy

Published: 02 April 2005 Publication History

Abstract

We describe studies of preferences about information sharing aimed at identifying fundamental concerns with privacy and at understanding how people might abstract the details of sharing into higher-level classes of recipients and information that are treated similarly. Thirty people specified what information they are willing to share with whom. Although people vary in their overall level of comfort in sharing, we identified key classes of recipients and information. Such abstractions highlight the promise of developing expressive controls for sharing and privacy.

References

[1]
Ackerman, M. S. (2000). Developing for privacy: Civility frameworks and technical design. Proc. Computers, Freedom, & Privacy, 19--23.]]
[2]
Ackerman, M. S., Cranor, L. F., and Reagle, J. (1999). Privacy in e-commerce: Examining user scenarios and privacy preferences. Proc. ACM Conference on Electronic Commerce, 1--8.]]
[3]
Bellotti, V., & Sellen, A. (1993). Design for privacy in ubiquitous computing environments. ECSCW-93, 77--92.]]
[4]
Butler, J. K. (1991). Toward understanding and measuring conditions of trust: Evolution of a conditions of trust inventory. Journal of Management, 17, 643--663.]]
[5]
Corter, J. E. (1996). Tree models of similarity and association. Sage University Paper.]]
[6]
Ferraiolo, D., Duginin, J. A., & Kuhn, D. R. (1995). Role based access control (RBAC): Features and motivation. 11th Annual Computer Security Applications Conference.]]
[7]
Lederer, S., Beckmann, C., Dey, A., & Mankoff, J. (2003). Managing personal information disclosure in ubiquitous computing environments. Intel Research Berkeley Technical Report 03--015.]]
[8]
Lederer, S., Dey, A. K., & Mankoff, J. (2003). Who wants to know what when? Privacy preference determinants in ubiquitous computing CY* 2003 Shortpapers, 724--725.]]
[9]
Olson, J.S., Grudin, J., & Horvitz, E. (2004). Toward understanding preferences for sharing and privacy. MSR Technical Report 2004--138. ftp://ftp.research.microsoft.com/pub/tr/TR-2004-138.pdf]]
[10]
Povey, D. (1999). Optimistic security: A new access control paradigm. Proc. ACM New Security Paradigms Workshop, 40--45.]]
[11]
Stevens, G. & Wulf, V. (2002). A new dimension in access control: Studying maintenance engineering across organizational boundaries. Proc. CSCW 2002, 196--205.]]
[12]
Stiemerling. O., & Wulf, V. (2000). Beyond 'yes or no'-Extending access control in groupware with awareness and negotiation. Group Decision and Negotiation, 9, 221--235.]]
[13]
Westin, A. F. (1998). E-commerce & Privacy: What Net Users Want. Hackensack, NJ: Privacy & American Business.]]

Cited By

View all
  • (2024)Swipe left for identity theftProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699183(5053-5070)Online publication date: 14-Aug-2024
  • (2024)“Shared Online, Made People Envious, Felt Good”International Journal of Social Media and Online Communities10.4018/IJSMOC.34158716:1(1-19)Online publication date: 26-Mar-2024
  • (2024)Designing Privacy-Protecting System with Visual Masking Based on Investigation of Privacy Concerns in Virtual Screen Sharing EnvironmentsProceedings of the ACM on Human-Computer Interaction10.1145/36981338:ISS(165-188)Online publication date: 24-Oct-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CHI EA '05: CHI '05 Extended Abstracts on Human Factors in Computing Systems
April 2005
1358 pages
ISBN:1595930027
DOI:10.1145/1056808
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 April 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. information sharing
  2. perceptions of trust
  3. privacy

Qualifiers

  • Article

Conference

CHI05
Sponsor:

Acceptance Rates

Overall Acceptance Rate 6,164 of 23,696 submissions, 26%

Upcoming Conference

CHI 2025
ACM CHI Conference on Human Factors in Computing Systems
April 26 - May 1, 2025
Yokohama , Japan

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)44
  • Downloads (Last 6 weeks)7
Reflects downloads up to 02 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Swipe left for identity theftProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699183(5053-5070)Online publication date: 14-Aug-2024
  • (2024)“Shared Online, Made People Envious, Felt Good”International Journal of Social Media and Online Communities10.4018/IJSMOC.34158716:1(1-19)Online publication date: 26-Mar-2024
  • (2024)Designing Privacy-Protecting System with Visual Masking Based on Investigation of Privacy Concerns in Virtual Screen Sharing EnvironmentsProceedings of the ACM on Human-Computer Interaction10.1145/36981338:ISS(165-188)Online publication date: 24-Oct-2024
  • (2024)DIPA2Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314397:4(1-30)Online publication date: 12-Jan-2024
  • (2024)"I know even if you don't tell me": Understanding Users' Privacy Preferences Regarding AI-based Inferences of Sensitive Information for PersonalizationProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642180(1-21)Online publication date: 11-May-2024
  • (2024)Impact of perceived privacy and security in the TAM model: The perceived trust as the mediated factorsInternational Journal of Information Management Data Insights10.1016/j.jjimei.2024.1002704:2(100270)Online publication date: Nov-2024
  • (2023)Analyzing the Use of Large Language Models for Content Moderation with ChatGPT ExamplesProceedings of the 3rd International Workshop on Open Challenges in Online Social Networks10.1145/3599696.3612895(1-8)Online publication date: 4-Sep-2023
  • (2023)Disentangling the relation among trust, efficacy and privacy management: a moderated mediation analysis of public support for government surveillance during the COVID-19 pandemicBehaviour & Information Technology10.1080/0144929X.2023.2178830(1-20)Online publication date: 20-Feb-2023
  • (2023)“I Simply Accept the Terms and Conditions so that I Can Use an App at All”: Smartphone Use and Privacy Among Older Adults in SwitzerlandHCI International 2023 – Late Breaking Papers10.1007/978-3-031-48041-6_14(191-202)Online publication date: 2-Dec-2023
  • (2022)A Game Theory Approach for Assisting Humans in Online Information-SharingInformation10.3390/info1304018313:4(183)Online publication date: 2-Apr-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media