skip to main content
10.1145/1979742.1979579acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
tutorial

Privacy for a Networked World: bridging theory and design

Authors Info & Claims
Published:07 May 2011Publication History

ABSTRACT

As our lives are more commonly mediated by IT, an interactional perspective of privacy [7] is increasingly applicable to the study of how people find and construct privacy in socio-technical interactions. This perspective has received increasing attention within the HCI research community in recent years. While the interactional perspective has proven effective as a starting point for theoretical and empirical studies of privacy in relation to everyday use of IT, there remain important open questions regarding how to translate results based on this perspective into design practice. Addressing these questions requires a greater sensitivity to when interactional privacy is applicable, a better understanding of suitable research methods, and more effective means for communicating results to the research and practitioner communities.

References

  1. Hoofnagle, C., King, J., Li, S., and Turow, J. How Different are Young Adults from Older Adults when it Comes to Information Privacy Attitudes and Policies. UC Berkeley Center for Law and Technology (2010).Google ScholarGoogle Scholar
  2. Madden, M. and Smith, A. Reputation Management and Social Media: How people monitor their identity and search for others online. Pew Internet and American Life Project (2010).Google ScholarGoogle Scholar
  3. Iachello, G. and Hong, J. 2007. End-user privacy in human-computer interaction. Found. Trends Hum.-Comput. Interact. 1, 1 (Jan. 2007), 1--137 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Hoffman, L. J. 1969. Computers and Privacy: A Survey. ACM Comput. Surv. 1, 2 (Jun. 1969), 85--103 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Westin, A. Privacy and Freedom. Atheneum, New York (1967).Google ScholarGoogle Scholar
  6. Bennett, C. and Raab, C. The Governance of Privacy: Policy Instruments in Global Perspective. Cambridge, The MIT Press (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Altman, I. The Environment and Social Behavior - Privacy, Personal Space, Territory, Crowding. Brooks/Cole Publishing Company, Monterey, CA (1975).Google ScholarGoogle Scholar
  8. Palen, L. and Dourish, P. 2003. Unpacking "privacy" for a networked world. In Proc CHI 2003, ACM Press (2003) 129--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Besmer, A. and Richter Lipford, H. 2010. Moving beyond untagging: photo privacy in a tagged world. In Proc CHI 2010, ACM Press (2010), 1563--1572. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Mancini, C., Thomas, K., Rogers, Y., Price, B. A., Jedrzejczyk, L., Bandara, A. K., Joinson, A. N., and Nuseibeh, B. From spaces to places: emerging contexts in mobile privacy. In Proc Ubicomp 2009, ACM Press (2009), 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Stutzman, F. and Kramer-Duffield, J. 2010. Friends Only: Examining a Privacy-Enhancing Behavior in Facebook. In Proc CHI 2010, ACM Press (2010) 1553--1562. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Child, J. T., Pearson, J. C., and Petronio, S. . Blogging, communication, and privacy management: Development of the Blogging Privacy Management Measure. JASIST 60, 10 (2009) 2079--2094. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Snyder, J. L. E-Mail Privacy in the Workplace. Journal of Business Communication 47, 3 (2010) 266--294.Google ScholarGoogle Scholar
  14. Tufekci, Z. 2008. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites. Bulletin of Science Technology and Society 2, 1 (2008) 20--36.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Privacy for a Networked World: bridging theory and design

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI EA '11: CHI '11 Extended Abstracts on Human Factors in Computing Systems
      May 2011
      2554 pages
      ISBN:9781450302685
      DOI:10.1145/1979742

      Copyright © 2011 Authors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 May 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • tutorial

      Acceptance Rates

      Overall Acceptance Rate6,164of23,696submissions,26%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader