Filters








7,746 Hits in 6.5 sec

Privacy arguments: Analysing selective disclosure requirements for mobile applications

Thein Than Tun, Arosha K. Bandara, Blaine A. Price, Yijun Yu, Charles Haley, Inah Omoronyia, Bashar Nuseibeh
2012 2012 20th IEEE International Requirements Engineering Conference (RE)  
Privacy requirements for mobile applications offer a distinct set of challenges for requirements engineering.  ...  In this paper, we introduce privacy arguments as a means of analysing privacy requirements in general and selective disclosure requirements (that are both content-and context-sensitive) in particular.  ...  Unlike privacy requirements centrally prescribed in regulations and site policy statements, user privacy requirements for mobile applications are difficult to describe and analyse.  ... 
doi:10.1109/re.2012.6345797 dblp:conf/re/TunBPYHON12 fatcat:l6zvim466zckzmflq2aer7a7pe

Distilling privacy requirements for mobile applications

Keerthi Thomas, Arosha K. Bandara, Blaine A. Price, Bashar Nuseibeh
2014 Proceedings of the 36th International Conference on Software Engineering - ICSE 2014  
As mobile computing applications have become commonplace, it is increasingly important for them to address end-users' privacy requirements.  ...  However, traditional requirements elicitation methods do not sufficiently account for contextual factors and therefore cannot be used effectively to represent and analyse the privacy requirements of mobile  ...  Privacy Arguments In previous work we developed a notation for mobile application privacy requirements called privacy arguments, that could: be used to reason about privacy requirements; be integrated  ... 
doi:10.1145/2568225.2568240 dblp:conf/icse/ThomasBPN14 fatcat:7olzc3foqvhqtoxtzbmpen53we

Privacy and proportionality

Giovanni Iachello, Gregory D. Abowd
2005 Proceedings of the SIGCHI conference on Human factors in computing systems - CHI '05  
Inspired by this principle, we develop a design method for ubicomp applications, based on our own experience, and aimed at HCI practitioners and designers.  ...  (ubicomp) applications and services.  ...  Truong and the anonymous reviewers for their thoughtful comments.  ... 
doi:10.1145/1054972.1054986 dblp:conf/chi/IachelloA05 fatcat:76q2gl4norfmrlnipxkny6nurq

Privacy Personas for IoT-Based Health Research: A Privacy Calculus Approach

Benjamin Maus, Carl Magnus Olsson, Dario Salvi
2021 Frontiers in Digital Health  
Based on an online survey with 85 participants, we make use of the privacy calculus to analyse the respondents' perceptions.  ...  In e-commerce or social network studies of citizen science, a privacy calculus related to user perceptions is commonly developed, capturing the information disclosure intent of the participants.  ...  Overall, our privacy personas are applicable to IoT- and mobile- supported health research.  ... 
doi:10.3389/fdgth.2021.675754 pmid:34977856 pmcid:PMC8716597 fatcat:k2fgrzsdm5b6bgq5xo6ywcaofm

Privacy Nudging: How the Design of Privacy Settings Affects Disclosure in Social Networks

Kathrin Figl, Christiane Lehrer
2020 European Conference on Information Systems  
However, this approach requires a thorough understanding of the impact of different design parameters on disclosure behavior.  ...  , which will also allow us to derive practical recommendations for social network providers.  ...  Drop-down lists may be advantageous for application settings, especially on mobile devices, as they take up less screen space than radio buttons.  ... 
dblp:conf/ecis/FiglL20 fatcat:3cmypovqi5hsjav6pqq7bkm4ha

Privacy Lies

Shruti Sannon, Natalya N. Bazarova, Dan Cosley
2018 Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems - CHI '18  
Going beyond privacy lenses that focus on privacy concerns or cost/benefit analyses, we explore how contextual factors, motivations, and individuallevel characteristics affect lying behavior through a  ...  Together, our results point to the need for conceptualizations of privacy lies-and PPBs more broadly-that account for multiple goals, perceived control over data, contextual factors, and attitudes about  ...  ACKNOWLEDGEMENTS We thank our participants, reviewers, Cornell Social Media Lab Manager Jessie Taft, and the National Science Foundation (Award #1405634) for support.  ... 
doi:10.1145/3173574.3173626 dblp:conf/chi/SannonBC18 fatcat:wnrmfwufxvgplajg25dolrle2u

Dimension-based analysis of hypotheticals from supreme court oral argument

E. L. Rissland
1989 Proceedings of the second international conference on Artificial intelligence and law - ICAIL '89  
It's been tied up there for the last 36 years.  ...  The BEST-CASE-SELECTOR and 3-PLY-ARGUMENT modules then select cases offering support for the user's case and those cutting against it, which must be distinguished, and suggest the skeleton of an argument  ...  The Court stated that these two requirements mobility and settingensure that law enforcement officers are not unnecessarily hamstrung in their efforts and assure that legitimate privacy interests are also  ... 
doi:10.1145/74014.74030 dblp:conf/icail/Rissland89 fatcat:xbpxhvrhujcp3a4rnzqecfa3qe

Analysing privacy in visual lifelogging

Md Sadek Ferdous, Soumyadeb Chowdhury, Joemon M. Jose
2017 Pervasive and Mobile Computing  
. • Selective Disclosure (SD). This requirement will allow any user to choose specific PII before the information is released to another entity. • Explicit Consent (EC).  ...  By combining these two arguments, we summarise, in Table 2 , which threats are applicable to which actor within which dimensions.  ... 
doi:10.1016/j.pmcj.2017.03.003 fatcat:wcmfpypvvfcnvooxpvgpmb6ijq

Towards privacy-sensitive participatory sensing

Kuan Lun Huang, Salil S. Kanhere, Wen Hu
2009 2009 IEEE International Conference on Pervasive Computing and Communications  
In this paper, we propose the use of microaggregation, a concept used for protecting privacy in databases, as a solution to this problem.  ...  However, such applications introduce a key research challenge: preserving the location privacy of the individuals contributing data.  ...  We note here that computing Euclidean distances may not be the best strategy for the application to analyse the data received.  ... 
doi:10.1109/percom.2009.4912864 dblp:conf/percom/HuangKH09 fatcat:7hliamcv6rfrdjqxvlhdpu5y34

Self-Surveillance Privacy

Jerry Kang, Katie Shilton, Deborah Estrin, Jeff Burke, Mark Hansen
2010 Social Science Research Network  
To counter this trend, we recommend the creation of the Privacy Data Guardian, a new profession that manages Privacy Data Vaults, which are repositories for selfsurveillance data.  ...  But for a nascent data practice we call "self-surveillance," the threat may actually come from ourselves.  ...  For example, the PDG might release GSM celltower triangulations rather than more precise GPS data to third-party applications that don't require fine-grained location information.  ... 
doi:10.2139/ssrn.1729332 fatcat:phxik4dyonh3zj4smol77sko6i

Unpacking "privacy" for a networked world

Leysia Palen, Paul Dourish
2003 Proceedings of the conference on Human factors in computing systems - CHI '03  
These suggest new ways for thinking about privacy in sociotechnical environments as a practical matter.  ...  Although privacy is broadly recognized as a dominant concern for the development of novel interactive technologies, our ability to reason analytically about privacy in real settings is limited.  ...  We are grateful to Mark Ackerman, Victoria Bellotti, Tom Erickson, Jonathan Grudin, John King and anonymous reviewers for valuable comments.  ... 
doi:10.1145/642633.642635 fatcat:fh7tbwdlyjhohkbpnpo2alg3g4

The Evolution of Privacy Norms: Mapping 35 Years of Technology-Related Privacy Discourse, 1980-2014

Patrick Cichy, Torsten-Oliver Salge
2015 International Conference on Information Systems  
When unpacking the dynamics of privacy norms and their salience for disclosure decision-making in such a way, privacy norms emerge as fragile social constructions that are increasingly vulnerable to collective  ...  This paper argues that collective privacy norms serve as such a heuristic that guides individuals in their disclosure decisions and gradually replaces the individual privacy calculus.  ...  Acknowledgements We would like to thank Matthias Rüdiger for his invaluable support in preparing the NYT data for analyis and Eduard Grünwald for his excellent research assistance throughout this project  ... 
dblp:conf/icis/CichyS15 fatcat:nylfu4ipzrg4jewpeitninecry

Big Data Anonymization Requirements vs Privacy Models

Josep Domingo-Ferrer
2018 Proceedings of the 15th International Joint Conference on e-Business and Telecommunications  
In this article we identify requirements that should be satisfied by privacy models to be applicable to big data.  ...  We then examine how well the two main privacy models (k-anonymity and ε-differential privacy) satisfy those requirements.  ...  I hold the UNESCO Chair in Data Privacy, but the opinions in this paper are my own and do not commit UNESCO.  ... 
doi:10.5220/0006830004710478 dblp:conf/icete/Domingo-Ferrer18 fatcat:owraocc7wvgkjpabvr4vmknbr4

Designing Privacy-aware Internet of Things Applications [article]

Charith Perera, Mahmoud Barhamgi, Arosha K. Bandara, Muhammad Ajmal, Blaine Price, Bashar Nuseibeh
2019 arXiv   pre-print
Internet of Things (IoT) applications typically collect and analyse personal data that can be used to derive sensitive information about individuals.  ...  In this paper, we explore how a Privacy-by-Design (PbD) framework, formulated as a set of guidelines, can help software engineers integrate data privacy considerations into the design of IoT applications  ...  The design and development process for IoT applications is more complicated than that for desktop, mobile, or web applications for a number of reasons.  ... 
arXiv:1703.03892v5 fatcat:4tf2awgekncztef5v7o2crlupm

Unpacking "privacy" for a networked world

Leysia Palen, Paul Dourish
2003 Proceedings of the conference on Human factors in computing systems - CHI '03  
These suggest new ways for thinking about privacy in sociotechnical environments as a practical matter.  ...  Although privacy is broadly recognized as a dominant concern for the development of novel interactive technologies, our ability to reason analytically about privacy in real settings is limited.  ...  We are grateful to Mark Ackerman, Victoria Bellotti, Tom Erickson, Jonathan Grudin, John King and anonymous reviewers for valuable comments.  ... 
doi:10.1145/642611.642635 dblp:conf/chi/PalenD03 fatcat:tqh6v6j3lfctbdbt5sn5vroryi
« Previous Showing results 1 — 15 out of 7,746 results