1 Privacy Issues and Human-Computer Interaction

Privacy can be a key aspect of the user experience with computers, online systems, and new technologies. Knowing what to consider about users and their views of computer systems can only improve privacy mechanisms. Human-Computer Interaction (HCI) is the subfield of Computer Science that studies how people interact with and through computational technologies. This chapter examines what HCI, as a research area, offers to both those designing and those researching privacy mechanisms.

[1]  Jonathan Grudin,et al.  Toward Understanding Preferences for Sharing and Privacy , 2004 .

[2]  James A. Landay,et al.  Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.

[3]  James A. Landay,et al.  Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.

[4]  Jonathan Grudin,et al.  Managerial use and emerging norms: effects of activity patterns on software design and deployment , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[5]  Paul Dourish,et al.  A Tale of Two Toolkits: Relating Infrastructure and Use in Flexible CSCW Toolkits , 1999, Computer Supported Cooperative Work (CSCW).

[6]  Bernard Mérialdo,et al.  Design of Extensible Component-Based Groupware , 1999, Computer Supported Cooperative Work (CSCW).

[7]  Austin Henderson,et al.  Your place or mine? Learning from long-term use of Audio-Video communication , 1996, Computer Supported Cooperative Work (CSCW).

[8]  Richard Beckwith,et al.  Designing for Ubiquity: The Perception of Privacy , 2003, IEEE Pervasive Comput..

[9]  Bettina Berendt,et al.  E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.

[10]  Gurpreet Dhillon,et al.  Internet Privacy: Interpreting Key Issues , 2001, Inf. Resour. Manag. J..

[11]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[12]  Mark S. Ackerman,et al.  The Intellectual Challenge of CSCW: The Gap Between Social Requirements and Technical Feasibility , 2000, Hum. Comput. Interact..

[13]  David R. Millen,et al.  Rapid ethnography: time deepening strategies for HCI field research , 2000, DIS '00.

[14]  M. Culnan Protecting Privacy Online: Is Self-Regulation Working? , 2000 .

[15]  Gregory D. Abowd,et al.  Charting past, present, and future research in ubiquitous computing , 2000, TCHI.

[16]  Mark S. Ackerman,et al.  Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.

[17]  Mark S. Ackerman,et al.  Privacy critics: UI components to safeguard users' privacy , 1999, CHI Extended Abstracts.

[18]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[19]  Mark S. Ackerman,et al.  Hanging on the ‘wire: a field study of an audio-only media space , 1997, TCHI.

[20]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[21]  Susanne Bødker,et al.  From implementation to design: tailoring and the emergence of systematization in CSCW , 1994, CSCW '94.

[22]  Jonathan Grudin,et al.  Computer-supported cooperative work: history and focus , 1994, Computer.

[23]  Bonnie A. Nardi,et al.  A Small Matter of Programming: Perspectives on End User Computing , 1993 .

[24]  Stephen J. Westerman,et al.  Individual differences in human-computer interaction , 1993 .

[25]  Wanda J. Orlikowski,et al.  Learning from Notes: organizational issues in groupware implementation , 1992, CSCW '92.

[26]  Wendy E. Mackay,et al.  Triggers and barriers to customizing software , 1991, CHI.

[27]  Wendy E. Mackay,et al.  Patterns of sharing customizable software , 1990, CSCW '90.

[28]  Thomas W. Mastaglio,et al.  Using critics to empower users , 1990, CHI '90.

[29]  Kevin Crowston,et al.  How do experienced information lens users use rules? , 1989, CHI '89.

[30]  Gerhard Fischer,et al.  Construction Kits and Design Environments: Steps Toward Human Problem-Domain Communication , 1987, Hum. Comput. Interact..

[31]  K. A. Ericsson,et al.  Protocol Analysis: Verbal Reports as Data , 1984 .