Towards Everyday Privacy for Ubiquitous Computing

The goal of everyday privacy is to make it easy for endusers to share information with the right people at the right level of detail in ubiquitous computing environments. In this paper, we describe a conceptual model we have developed for everyday privacy, consisting of control over and feedback about disclosure. We also describe a prototype we have created for helping end-users manage their personal privacy, an evaluation of that prototype, and a revised prototype based on feedback from the evaluation.

[1]  P. Agre,et al.  Technology and privacy: The new landscape , 1998 .

[2]  A. Acquisti Protecting Privacy with Economics: Economic Incentives for Preventive Technologies in Ubiquitous Computing Environments , 2002 .

[3]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[4]  Simson Garfinkel,et al.  Database Nation , 2000 .

[5]  Anind K. Dey,et al.  Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.

[6]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[7]  James A. Landay,et al.  An Infrastructure Approach to Context-Aware Computing , 2001, Hum. Comput. Interact..

[8]  Dogan Kesdogan,et al.  Analysis of Security and Privacy in Mobile-IP , 1996 .

[9]  Joshua Cole,et al.  :Documenting Individual Identity: The Development of State Practices in the Modern World , 2004 .

[10]  Steve Talbott The trouble with ubiquitous technology pushers , 2000, CFP '00.

[11]  Gary Alan Fine,et al.  The Social Fabric: Dimensions and Issues , 1989 .

[12]  Jonathan Grudin,et al.  Desituating Action: Digital Representation of Context , 2001, Hum. Comput. Interact..

[13]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[14]  Selma C. Etter Database Nation the Death of Privacy in the 21st Century , 2000, Journal of Computing in Higher Education.

[15]  Anne Adams,et al.  Multimedia information changes the whole privacy ballgame , 2000, CFP '00.

[16]  Gary T. Marx,et al.  17. Identity and Anonymity: Some Conceptual Distinctions and Issues for Research , 2002 .

[17]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[18]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[19]  Richard Harper Why do People Wear Active Badges , 1993 .

[20]  Allison Woodruff,et al.  How push-to-talk makes talk less pushy , 2003, GROUP.

[21]  E. Goffman The Presentation of Self in Everyday Life , 1959 .

[22]  G. Marx Murky conceptual waters: The public and the private , 2001, Ethics and Information Technology.

[23]  J. Doug Tygar,et al.  Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.

[24]  Bonnie A. Nardi,et al.  Interaction and outeraction: instant messaging in action , 2000, CSCW '00.

[25]  James A. Landay,et al.  Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.