[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3234695.3241003acmconferencesArticle/Chapter ViewAbstractPublication PagesassetsConference Proceedingsconference-collections
poster

Using Icons to Communicate Privacy Characteristics of Adaptive Assistive Technologies

Published: 08 October 2018 Publication History

Abstract

Adaptive assistive technologies can support the accessibility needs of people with changing abilities by monitoring and adapting to their performance over time. Despite their benefits, these systems can pose privacy threats to users whose data is collected. This issue is amplified by the ambiguity on how user performance data, which might reveal sensitive health data, is used by these applications and whether similar to medical data it is protected from unauthorized sharing with third-parties. In interviews with older adults who experience pointing difficulties, we found that participants felt a lack of agency over their collected pointing data and desired clear communication mechanisms to keep them informed about the privacy characteristics of adaptive assistive systems. Based on this input, we present an icon set, that can be used in online application stores or with the licensing agreements of adaptive systems, to visually communicate privacy characteristics to users.

References

[1]
Peter G. Bain, Leslie J. Findley, Paul D. Thompson, Michael A. Gresty, John C. Rothwell, Anita E. Harding, David Marsden. 1994. A study of hereditary essential tremor. Brain 117(Pt 4), 805--824.
[2]
William Gaver, Tony Dunne, and Elena Pacenti. 1999. Design: cultural probes. Interactions, 6(1), 21--29.
[3]
Alvaro D. Taveira and Sang D. Choi. 2009. Review Study of Computer Input Devices and Older Users. International Journal of Human-Computer Interaction, 25(5), 455--474.
[4]
Simeon Keates and Shari Trewin. 2005. Effect of age and Parkinson's disease on cursor positioning using a mouse. In Proceedings of the 7th International ACM SIGACCESS Conference on Computers and Accessibility (ASSETS'05), 68--75.
[5]
Foad Hamidi, Kellie Poneres, Aaron Massey and Amy Hurst. 2018. Who Should See my Data? Privacy Tradeoffs of Adaptive Assistive Technologies. In Proceedings of the 20th International ACM SIGACCESS Conference on Computers and Accessibility (ASSETS'18), to appear.
[6]
Amy Hurst, Scott Hudson, Jennifer Mankoff, and Sheri Trewin. 2013. Distinguishing Users by Pointing Performance in Laboratory and Real-World Tasks. ACM Trans. Accessible Computing. 5, 2, Article 5 (October 2013), 27 pages.
[7]
Amy Hurst, Jennifer Mankoff, and Scott E. Hudson. 2008. Understanding pointing problems in real world computing environments. In Proceedings of the 10th international ACM SIGACCESS conference on Computers and accessibility (Assets '08). ACM, New York, NY, USA, 43--50.
[8]
U.S. Department of Health & Human Services. 2017. Your Rights Under HIPAA. HHS.gov. Retrieved June 10, 2018 from https://www.hhs.gov/hipaa/for-individuals/guidance-materials-for-consumers/index.html?language=es
[9]
Madiha Tabassum, Abdulmajeed Alqhatani, Marran Aldossari, and Heather Richter Lipford. 2018. Increasing User Attention with a Comic-based Policy. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, New York, NY, USA, Paper 200, 6 pages.
[10]
Patrick G. Kelley, Lucian Cesca, Joanna Bresee, and Lorrie F. Cranor. 2010. Standardizing privacy notices: An online study of the nutrition label approach. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10), ACM, New York, NY, USA, 1573--1582.

Cited By

View all
  • (2022)It’s Long and Complicated! Enhancing One-Pager Privacy Policies in Smart Home ApplicationsNordic Human-Computer Interaction Conference10.1145/3546155.3546657(1-13)Online publication date: 8-Oct-2022
  • (2022)Understanding Online Privacy—A Systematic Review of Privacy Visualizations and Privacy by Design GuidelinesACM Computing Surveys10.1145/350228855:3(1-37)Online publication date: 3-Feb-2022

Index Terms

  1. Using Icons to Communicate Privacy Characteristics of Adaptive Assistive Technologies

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ASSETS '18: Proceedings of the 20th International ACM SIGACCESS Conference on Computers and Accessibility
    October 2018
    508 pages
    ISBN:9781450356503
    DOI:10.1145/3234695
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 October 2018

    Check for updates

    Author Tags

    1. adaptive assistive systems
    2. essential tremors
    3. icons
    4. older adults
    5. privacy threats

    Qualifiers

    • Poster

    Funding Sources

    • National Institute on Disability Independent Living and Rehabilitation Research(NIDILRR)

    Conference

    ASSETS '18
    Sponsor:

    Acceptance Rates

    ASSETS '18 Paper Acceptance Rate 28 of 108 submissions, 26%;
    Overall Acceptance Rate 436 of 1,556 submissions, 28%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)10
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 30 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)It’s Long and Complicated! Enhancing One-Pager Privacy Policies in Smart Home ApplicationsNordic Human-Computer Interaction Conference10.1145/3546155.3546657(1-13)Online publication date: 8-Oct-2022
    • (2022)Understanding Online Privacy—A Systematic Review of Privacy Visualizations and Privacy by Design GuidelinesACM Computing Surveys10.1145/350228855:3(1-37)Online publication date: 3-Feb-2022

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media