[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2441955.2441961acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
demonstration

Attire: conveying information exposure through avatar apparel

Published: 23 February 2013 Publication History

Abstract

Systems of interpersonal interaction typically allow a user to manage privacy by specifying which accesses to his or her personal information are permitted. However, users rarely know whether, when, and by whom information was actually accessed within the parameters they specified. We define actual accesses to personal information as "information exposure". Knowing one's exposure can potentially enhance privacy management. Toward this end, we present Attire: an app for computers and smartphones that represents the user with an avatar. Attire conveys real-time information exposure in a lightweight and unobtrusive manner via modifications to the avatar's clothing.

Supplementary Material

JPG File (cscwd19.jpg)
suppl.mov (cscwd19.mp4)
Supplemental video

References

[1]
Biehl, J. T., Czerwinski, M., Smith, G., and Robertson, G. G. Fastdash: A visual dashboard for fostering awareness in software teams. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '07, ACM (New York, NY, USA, 2007), 1313--1322.
[2]
De Guzman, E. S., Yau, M., Gagliano, A., Park, A., and Dey, A. K. Exploring the design and use of peripheral displays of awareness information. In CHI '04 Extended Abstracts on Human Factors in Computing Systems, CHI EA '04, ACM (New York, NY, USA, 2004), 1247--1250.
[3]
Dey, A. K., and de Guzman, E. From awareness to connectedness: The design and deployment of presence displays. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '06, ACM (New York, NY, USA, 2006), 899--908.
[4]
Patil, S., and Kapadia, A. Are you exposed?: Conveying information exposure. In Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work Companion, CSCW '12, ACM (New York, NY, USA, 2012), 191--194.
[5]
Patil, S., Norcie, G., Kapadia, A., and Lee, A. J. Reasons, rewards, regrets: Privacy considerations in location sharing as an interactive practice. In Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, ACM (New York, NY, USA, 2012), 5:1--5:15.
[6]
Schlegel, R., Kapadia, A., and Lee, A. J. Eyeing your exposure: Quantifying and controlling information sharing for improved privacy. In Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS '11, ACM (New York, NY, USA, July 2011), 14:1--14:14.
[7]
Tomitsch, M., Grechenig, T., and Mayrhofer, S. Mobility and emotional distance: Exploring the ceiling as an ambient display to provide remote awareness. In Proceedings of the 3rd IET International Conference on Intelligent Environments (Sept. 2007), 164--167.

Cited By

View all
  • (2016)Fast Detection of Transformed Data LeaksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2015.250327111:3(528-542)Online publication date: Mar-2016
  • (2016)Rapid Screening of Big Data Against Inadvertent LeaksBig Data Concepts, Theories, and Applications10.1007/978-3-319-27763-9_5(193-235)Online publication date: 4-Mar-2016

Index Terms

  1. Attire: conveying information exposure through avatar apparel

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CSCW '13: Proceedings of the 2013 conference on Computer supported cooperative work companion
    February 2013
    356 pages
    ISBN:9781450313322
    DOI:10.1145/2441955

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 23 February 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. avatar
    2. exposure
    3. location sharing services
    4. privacy

    Qualifiers

    • Demonstration

    Conference

    CSCW '13
    Sponsor:
    CSCW '13: Computer Supported Cooperative Work
    February 23 - 27, 2013
    Texas, San Antonio, USA

    Acceptance Rates

    Overall Acceptance Rate 2,235 of 8,521 submissions, 26%

    Upcoming Conference

    CSCW '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 19 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2016)Fast Detection of Transformed Data LeaksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2015.250327111:3(528-542)Online publication date: Mar-2016
    • (2016)Rapid Screening of Big Data Against Inadvertent LeaksBig Data Concepts, Theories, and Applications10.1007/978-3-319-27763-9_5(193-235)Online publication date: 4-Mar-2016

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media