<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Scott D. Mainwaring</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Cranor, Lorrie Faith</style></author><author><style face="normal" font="default" size="100%">Garfinkel, Simson</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Privacy Issues and Human-Computer Interaction</style></title><secondary-title><style face="normal" font="default" size="100%">Security and usability: designing secure systems that people can use</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><publisher><style face="normal" font="default" size="100%">O&#039;Reilly Media</style></publisher><pub-location><style face="normal" font="default" size="100%">Cambridge, MA</style></pub-location><pages><style face="normal" font="default" size="100%">19--26</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;&amp;nbsp;This chapter will largely view HCI in its broader context. HCI is not just about user interfaces but also about the user experience&amp;nbsp; of systems: how people perceive and understand, reason and learn about, and react and adapt to digital technologies. To borrow the terminology Sasse and Flechais2&amp;nbsp; use in discussing security, HCI has come to deal not only with process&amp;nbsp; (how systems are used, designed, and developed) and product &amp;nbsp;(the systems themselves and their interfaces), but also panorama&amp;nbsp; (cultural and organizational contexts that support, discourage, or otherwise shape the systems they envelope). Privacy, like security, implicates all of these levels. It is by its nature both a question of the user and his or her data but also the user and others’ use of that data. Our interests, therefore, will be those of HCI-writ-large.&lt;/p&gt;&lt;p&gt;While HCI has gone through several generations of computational technologies, it has carried a number of research themes forward. As mentioned, this chapter will consider the various HCI themes and their research findings that may be important when designing, constructing, or evaluating privacy mechanisms. Before exploring these HCI research streams, however, we first need a working definition of privacy, and to compare and contrast privacy concerns with HCI concerns.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Cranor, Lorrie Faith</style></author><author><style face="normal" font="default" size="100%">Reagle, Joseph</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Beyond concern: Understanding net users&#039; attitudes about online privacy</style></title><secondary-title><style face="normal" font="default" size="100%">The Internet upheaval: raising questions, seeking answers in communications policy</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">net users</style></keyword><keyword><style  face="normal" font="default" size="100%">online environment</style></keyword><keyword><style  face="normal" font="default" size="100%">online privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">personal information</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">survey</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2000</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete-New</style></url></web-urls></urls><pages><style face="normal" font="default" size="100%">47–70</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Over the past decade, numerous surveys conducted around the world have found consistently high levels of concern about privacy. The more recent studies have found that this concern is as prevalent in the online environment as it is for physical-world interactions. For example, Westin (Harris 1998) found 81% of Net users are concerned about threats to their privacy while online. While many studies have measured the magnitude of privacy concerns, it is still critical to study the concern in detail, especially for the online environment. As Hine and Eve (1998) point out: Despite this wide range of interests in privacy as a topic, we have little idea of the ways in which people in their ordinary lives conceive of privacy and their reactions to the collection and use of personal information (Hine and Eve 1998, 253) With this study, we have tried to better understand the nature of online privacy concerns.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Cranor, Lorrie Faith</style></author><author><style face="normal" font="default" size="100%">Reagle, Joseph</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Privacy in e-Commerce: Examining User Scenarios and Privacy Preferences</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the 1st ACM Conference on Electronic Commerce (EC&#039;99)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">electronic commerce</style></keyword><keyword><style  face="normal" font="default" size="100%">platform for privacy preferences</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy protocols</style></keyword><keyword><style  face="normal" font="default" size="100%">user survey</style></keyword><keyword><style  face="normal" font="default" size="100%">World Wide Web</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">1999</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><pages><style face="normal" font="default" size="100%">1–8</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Privacy is a necessary concern in electronic commerce. It is difficult, if not impossible, to complete a transaction without revealing some personal data – a shipping address, billing information, or product preference. Users may be unwilling to provide this necessary information or even to browse online if they believe their privacy is invaded or threatened. Fortunately, there are technologies to help users protect their privacy. P3P (Platform for Privacy Preferences Project) from the World Wide Web Consortium is one such technology. However, there is a need to know more about the range of user concerns and preferences about privacy in order to build usable and effective interface mechanisms for P3P and other privacy technologies. Accordingly, we conducted a survey of 381 U.S. Net users, detailing a range of commerce scenarios and examining the participants&#039; concerns and preferences about privacy. This paper presents both the findings from that study as well as their design implications&lt;/p&gt;</style></abstract></record></records></xml>