Toward Understanding Preferences for Sharing and Privacy

E-commerce has spawned a growing concern and discussion about privacy. Similar concerns about privacy are emerging with ubiquitous computing applications that sense and report one’s location and activity. But sharing is as important as privacy; work and social interaction are more efficient when people share some information with some recipients. Unfortunately, commonly available tools for specifying who can see what have been too complex and tedious for most computer users. We report on studies of preferences about privacy and sharing aimed at identifying fundamental concerns with privacy and at understanding how people might abstract the details of sharing into higher-level classes of recipients and information that people tend to treat in a similar manner. To characterize such classes, we collected information about sharing preferences, recruiting 30 people to specify what information they are willing to share with whom. Although people vary in their overall level of comfort in sharing, we discovered key classes of recipients and information. Such abstractions highlight the promise of developing simpler, more expressive controls for sharing and privacy. Author

[1]  Anind K. Dey,et al.  Managing Personal Information Disclosure in Ubiquitous Computing Environments , 2003 .

[2]  Mark S. Ackerman,et al.  Privacy critics: UI components to safeguard users' privacy , 1999, CHI Extended Abstracts.

[3]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[4]  Mark S. Ackerman,et al.  Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.

[5]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[6]  D. Richard Kuhn,et al.  Role-Based Access Control ( RBAC ) : Features and Motivations , 2014 .

[7]  David R. Kuhn,et al.  Role-Based Access Control (RBAC): Features and Motivations | NIST , 1995 .

[8]  Mark S. Ackerman,et al.  Developing for privacy: civility frameworks and technical design , 2000, CFP '00.

[9]  Volker Wulf,et al.  A new dimension in access control: studying maintenance engineering across organizational boundaries , 2002, CSCW '02.

[10]  J. Horrigan,et al.  Trust and privacy online: Why Americans want to rewrite the rules , 2000 .

[11]  Bettina Berendt,et al.  E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.

[12]  John K. Butler Toward Understanding and Measuring Conditions of Trust: Evolution of a Conditions of Trust Inventory , 1991 .

[13]  Anind K. Dey,et al.  Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.

[14]  Rudi Volti,et al.  America Calling: A Social History of the Telephone to 1940 , 1992 .

[15]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[16]  James A. Landay,et al.  Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.

[17]  Kai Lung Hui,et al.  Online Information Privacy: Measuring the Cost-Benefit Trade-Off , 2002, ICIS.

[18]  Volker Wulf,et al.  Beyond "Yes or No" - Extending Access Control in Groupware with Awareness and Negotiation , 2000 .

[19]  Dean Povey Optimistic security: a new access control paradigm , 1999, NSPW '99.