Results 1 - 10
of
225
An architecture for privacy-sensitive ubiquitous computing
- In MobiSYS ’04: Proceedings of the 2nd international conference on mobile systems, applications, and services
, 2004
"... Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in designing software architectures and in creating interactions that are effective in helping end-users manage their privacy ..."
Abstract
-
Cited by 231 (16 self)
- Add to MetaCart
(Show Context)
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in designing software architectures and in creating interactions that are effective in helping end-users manage their privacy. To address this problem, we present Confab, a toolkit for facilitating the development of privacy-sensitive ubiquitous computing applications. The requirements for Confab were gathered through an analysis of privacy needs for both end-users and application developers. Confab provides basic support for building ubiquitous computing applications, providing a framework as well as several customizable privacy mechanisms. Confab also comes with extensions for managing location privacy. Combined, these features allow application developers and end-users to support a spectrum of trust levels and privacy needs.
Implications for Design
- Proc. ACM Conf. Human Factors in Computing Systems CHI 2006
, 2006
"... Although ethnography has become a common approach in HCI research and design, considerable confusion still attends both ethnographic practice and the criteria by which it should be evaluated in HCI. Often, ethnography is seen as an approach to field investigation that can generate requirements for s ..."
Abstract
-
Cited by 123 (4 self)
- Add to MetaCart
(Show Context)
Although ethnography has become a common approach in HCI research and design, considerable confusion still attends both ethnographic practice and the criteria by which it should be evaluated in HCI. Often, ethnography is seen as an approach to field investigation that can generate requirements for systems development; by that token, the major evaluative criterion for an ethnographic study is the implications it can provide for design. Exploring the nature of ethnographic inquiry, this paper suggests that “implications for design ” may not be the best metric for evaluation and may, indeed, fail to capture the value of ethnographic investigations.
Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem
- PERSONAL AND UBIQUITOUS COMPUTING
, 2004
"... Ubiquitous and mobile technologies create new challenges for system security. Effective security solutions depend not only on the mathematical and technical properties of those solutions, but also on people’s ability to understand them and use them as part of their work. As a step towards solving t ..."
Abstract
-
Cited by 114 (6 self)
- Add to MetaCart
Ubiquitous and mobile technologies create new challenges for system security. Effective security solutions depend not only on the mathematical and technical properties of those solutions, but also on people’s ability to understand them and use them as part of their work. As a step towards solving this problem, we have been examining how people experience security as a facet of their daily life, and how they routinely answer the question, “is this system secure enough for what I want to do?” We present a number of findings concerning the scope of security, attitudes towards security, and the social and organizational contexts within which security concerns arise, and point towards emerging technical solutions.
Changes in use and perception of Facebook
- In Proceedings of the ACM 2008 conference on Computer supported cooperative
, 2008
"... As social computing systems persist over time, the user experiences and interactions they support may change. One type of social computing system, Social Network Sites (SNSs), are becoming more popular across broad segments of Internet users. Facebook, in particular, has very broad participation amo ..."
Abstract
-
Cited by 69 (6 self)
- Add to MetaCart
(Show Context)
As social computing systems persist over time, the user experiences and interactions they support may change. One type of social computing system, Social Network Sites (SNSs), are becoming more popular across broad segments of Internet users. Facebook, in particular, has very broad participation amongst college attendees, and has been growing in other populations as well. This paper looks at how use of Facebook has changed over time, as indicated by three consecutive years of survey data and interviews with a subset of survey respondents. Reported uses of the site remain relatively constant over time, but the perceived audience for user profiles and attitudes about the site show differences over the study period. Author Keywords Social network sites, Facebook, audience, privacy,
"Breaking the Code", moving between private and public work in . . .
- IN COLLABORATIVE SOFTWARE DEVELOPMENT" ACM SIGGROUP BULLETIN VOLUME 24 , ISSUE 1
, 2003
"... Software development is typically cooperative endeavor where a group of engineers need to work together to achieve a common, coordinated result. As a cooperative effort, it is especially difficult because of the many interdependencies amongst the artifacts created during the process. This has lead s ..."
Abstract
-
Cited by 34 (1 self)
- Add to MetaCart
Software development is typically cooperative endeavor where a group of engineers need to work together to achieve a common, coordinated result. As a cooperative effort, it is especially difficult because of the many interdependencies amongst the artifacts created during the process. This has lead software engineers to create tools, such as configuration management tools, that isolate developers from the effects of each other’s work. In so doing, these tools create a distinction between private and public aspects of work of the developer. Technical support is provided to these aspects as well as for transitions between them. However, we present empirical material collected from a software development team that suggests that the transition from private to public work needs to be more carefully handled. Indeed, the analysis of our material suggests that different formal and informal work practices are adopted by the developers to allow a delicate transition, where software developers are not largely affected by the emergent public work. Finally, we discuss how groupware tools might support this transition.
Managing Personal Information Disclosure in Ubiquitous Computing Environments
, 2003
"... ..."
(Show Context)
Security Automation Considered Harmful?
, 2007
"... End-users are often perceived as the weakest link in information security. Because of this perception, a growing body of research and commercial activity is focused on automated approaches to security. With these approaches, security decisions are removed from the hands of the users, and are placed ..."
Abstract
-
Cited by 27 (3 self)
- Add to MetaCart
End-users are often perceived as the weakest link in information security. Because of this perception, a growing body of research and commercial activity is focused on automated approaches to security. With these approaches, security decisions are removed from the hands of the users, and are placed instead in systems themselves, or in remote services or organizations that establish policies that are automatically enforced. We contend that although security automation is potentially beneficial in theory, in practice it is not a panacea for end-user information security. A number of technical and social factors mitigate against the acceptance and efficacy of automated end-user security solutions in many cases. In this paper, we present a discussion of the inherent limitations of automating security for end-users. We then discuss a set of design guidelines for choosing whether to automate end-user security systems. We conclude with a set of research directions focused on increasing the acceptance and efficacy of security solutions for end-users.
A Conceptual Model and a Metaphor of Everyday Privacy in Ubiquitous Computing Environments
- Computer
, 2002
"... Abstract. We present a unified model of everyday privacy in ubiquitous computing environments, designed to aid system designers and administrators in conceptualizing the end-user privacy experience. The model accounts for the influence of societal-scale forces, contextual factors, and subjective per ..."
Abstract
-
Cited by 27 (1 self)
- Add to MetaCart
(Show Context)
Abstract. We present a unified model of everyday privacy in ubiquitous computing environments, designed to aid system designers and administrators in conceptualizing the end-user privacy experience. The model accounts for the influence of societal-scale forces, contextual factors, and subjective perception on end-user privacy. We identify notice and consent as the fair information practices of greatest everyday utility to users, as they gradually engender the user’s conceptual model of ubicomp privacy. Navigating the regular deluge of personal information collection events in ubicomp requires that notice be minimally intrusive and consent be implicitly granted by a persistent, situation-specific set of user preferences. We extend our model into an interactional metaphor called situational faces, designed to mitigate the complexity of privacy for the end-user. When encountering a situation, a user engages the appropriate face, a metaphorical abstraction of a set of privacy preferences. 1
Argumentation support: From technologies to tools
- ACM
, 2006
"... Electronic argumentation support is increasingly important in today’s networked society. Virtual research collaboration, e-business, and many other domains of professional life critically depend on adequate support of tools for productive argumentative interactions. However, a plethora of technologi ..."
Abstract
-
Cited by 22 (4 self)
- Add to MetaCart
Electronic argumentation support is increasingly important in today’s networked society. Virtual research collaboration, e-business, and many other domains of professional life critically depend on adequate support of tools for productive argumentative interactions. However, a plethora of technologies exist that are not necessarily tools. A technology only is a tool if it serves the purposes of the community in which it is used. In this paper, we outline an approach to diagnose to what extent a particular argumentation technology is a tool. We do this by combining a sociotechnical view on technologies with a pragma-dialectical approach to argumentation analysis. We argue that for technologies to become a tool, argumentation routines and design need to co-evolve. We illustrate our approach by applying it to a case on group report authoring. 1.
Social Software for Life-long Learning
"... Life-long learning is a key issue for our knowledge society. With social software systems new heterogeneous kinds of technology enhanced informal learning are now available to the life-long learner. Learners outside of learning institutions now have access to powerful social communities of experts a ..."
Abstract
-
Cited by 22 (0 self)
- Add to MetaCart
(Show Context)
Life-long learning is a key issue for our knowledge society. With social software systems new heterogeneous kinds of technology enhanced informal learning are now available to the life-long learner. Learners outside of learning institutions now have access to powerful social communities of experts and peers who are together forging a new web 2.0. This paper reviews current work in pan-European initiatives that impact upon life-long learning via views of professional learning, learner competence and social networking. It seeks to provide an overview of some of the critical research questions for the interdisciplinary field of social software research.