<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Tao Dong</style></author><author><style face="normal" font="default" size="100%">Gifford, Scott</style></author><author><style face="normal" font="default" size="100%">Kim, Jungwoo</style></author><author><style face="normal" font="default" size="100%">Mark W. Newman</style></author><author><style face="normal" font="default" size="100%">Atul Prakash</style></author><author><style face="normal" font="default" size="100%">Qidwai, Sarah</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Simplifying User-Controlled Privacy Policies</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE Pervasive Computing</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">location-aware computing</style></keyword><keyword><style  face="normal" font="default" size="100%">location-based computing</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy-enhancing architectures</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy-protective applications</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">09/2009</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">8</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Location-aware computing infrastructures are becoming widely available.&lt;/p&gt;&lt;p&gt;However, a key problem remains: letting users manage their privacy while&lt;/p&gt;&lt;p&gt;also giving them interesting applications that take advantage of location&lt;/p&gt;&lt;p&gt;information.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue><section><style face="normal" font="default" size="100%">2</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Scott D. Mainwaring</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Cranor, Lorrie Faith</style></author><author><style face="normal" font="default" size="100%">Garfinkel, Simson</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Privacy Issues and Human-Computer Interaction</style></title><secondary-title><style face="normal" font="default" size="100%">Security and usability: designing secure systems that people can use</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><publisher><style face="normal" font="default" size="100%">O&#039;Reilly Media</style></publisher><pub-location><style face="normal" font="default" size="100%">Cambridge, MA</style></pub-location><pages><style face="normal" font="default" size="100%">19--26</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;&amp;nbsp;This chapter will largely view HCI in its broader context. HCI is not just about user interfaces but also about the user experience&amp;nbsp; of systems: how people perceive and understand, reason and learn about, and react and adapt to digital technologies. To borrow the terminology Sasse and Flechais2&amp;nbsp; use in discussing security, HCI has come to deal not only with process&amp;nbsp; (how systems are used, designed, and developed) and product &amp;nbsp;(the systems themselves and their interfaces), but also panorama&amp;nbsp; (cultural and organizational contexts that support, discourage, or otherwise shape the systems they envelope). Privacy, like security, implicates all of these levels. It is by its nature both a question of the user and his or her data but also the user and others’ use of that data. Our interests, therefore, will be those of HCI-writ-large.&lt;/p&gt;&lt;p&gt;While HCI has gone through several generations of computational technologies, it has carried a number of research themes forward. As mentioned, this chapter will consider the various HCI themes and their research findings that may be important when designing, constructing, or evaluating privacy mechanisms. Before exploring these HCI research streams, however, we first need a working definition of privacy, and to compare and contrast privacy concerns with HCI concerns.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Privacy in pervasive environments: next generation labeling protocols</style></title><secondary-title><style face="normal" font="default" size="100%">Personal and Ubiquitous Computing</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">labeling protocols</style></keyword><keyword><style  face="normal" font="default" size="100%">P3P</style></keyword><keyword><style  face="normal" font="default" size="100%">pervasive environments</style></keyword><keyword><style  face="normal" font="default" size="100%">platform for privacy preferences</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">ubiquitous computing</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">8</style></volume><pages><style face="normal" font="default" size="100%">430–439</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;In pervasive environments, privacy is likely to be a major issue for users, and users will want to be notified of potential data capture. To provide notice to users, this paper argues for what it calls labeling protocols, technical mechanisms through which users can be informed of data requests and their consequences. Recent experiences with the Platform for Privacy Preferences Project (P3P), an attempt to provide privacy mechanisms for the Web, suggest important lessons for the design of a next generation labeling protocol that will be usable and useful in pervasive environments. This paper examines the P3P lessons and open issues with an eye to pervasive requirements.&lt;br&gt;&amp;nbsp;&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Cranor, Lorrie Faith</style></author><author><style face="normal" font="default" size="100%">Reagle, Joseph</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Beyond concern: Understanding net users&#039; attitudes about online privacy</style></title><secondary-title><style face="normal" font="default" size="100%">The Internet upheaval: raising questions, seeking answers in communications policy</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">net users</style></keyword><keyword><style  face="normal" font="default" size="100%">online environment</style></keyword><keyword><style  face="normal" font="default" size="100%">online privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">personal information</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">survey</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2000</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete-New</style></url></web-urls></urls><pages><style face="normal" font="default" size="100%">47–70</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Over the past decade, numerous surveys conducted around the world have found consistently high levels of concern about privacy. The more recent studies have found that this concern is as prevalent in the online environment as it is for physical-world interactions. For example, Westin (Harris 1998) found 81% of Net users are concerned about threats to their privacy while online. While many studies have measured the magnitude of privacy concerns, it is still critical to study the concern in detail, especially for the online environment. As Hine and Eve (1998) point out: Despite this wide range of interests in privacy as a topic, we have little idea of the ways in which people in their ordinary lives conceive of privacy and their reactions to the collection and use of personal information (Hine and Eve 1998, 253) With this study, we have tried to better understand the nature of online privacy concerns.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Cranor, Lorrie</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Privacy Critics: UI Components to Safeguard Users&#039; Privacy</style></title><secondary-title><style face="normal" font="default" size="100%">ACM Conference on Human Factors in Computing Systems (CHI&#039;99</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">agent architectures</style></keyword><keyword><style  face="normal" font="default" size="100%">collaboration</style></keyword><keyword><style  face="normal" font="default" size="100%">critics</style></keyword><keyword><style  face="normal" font="default" size="100%">critics architecture</style></keyword><keyword><style  face="normal" font="default" size="100%">P3P</style></keyword><keyword><style  face="normal" font="default" size="100%">platform for privacy preferences</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">World Wide Web</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">1999</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><pages><style face="normal" font="default" size="100%">258–259</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Creating usable systems to protect online privacy is an inherently difficult problem. Privacy critics are semiautonomous agents that help people protect their online privacy by offering suggestions and warnings. Two sample critics are presented.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Cranor, Lorrie Faith</style></author><author><style face="normal" font="default" size="100%">Reagle, Joseph</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Privacy in e-Commerce: Examining User Scenarios and Privacy Preferences</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the 1st ACM Conference on Electronic Commerce (EC&#039;99)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">electronic commerce</style></keyword><keyword><style  face="normal" font="default" size="100%">platform for privacy preferences</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy protocols</style></keyword><keyword><style  face="normal" font="default" size="100%">user survey</style></keyword><keyword><style  face="normal" font="default" size="100%">World Wide Web</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">1999</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><pages><style face="normal" font="default" size="100%">1–8</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Privacy is a necessary concern in electronic commerce. It is difficult, if not impossible, to complete a transaction without revealing some personal data – a shipping address, billing information, or product preference. Users may be unwilling to provide this necessary information or even to browse online if they believe their privacy is invaded or threatened. Fortunately, there are technologies to help users protect their privacy. P3P (Platform for Privacy Preferences Project) from the World Wide Web Consortium is one such technology. However, there is a need to know more about the range of user concerns and preferences about privacy in order to build usable and effective interface mechanisms for P3P and other privacy technologies. Accordingly, we conducted a survey of 381 U.S. Net users, detailing a range of commerce scenarios and examining the participants&#039; concerns and preferences about privacy. This paper presents both the findings from that study as well as their design implications&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Starr, Brian</style></author><author><style face="normal" font="default" size="100%">Hindus, Debby</style></author><author><style face="normal" font="default" size="100%">Scott D. Mainwaring</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Hanging on the &#039;Wire: A Field Study of an Audio-only Media Space</style></title><secondary-title><style face="normal" font="default" size="100%">ACM Transactions on Computer-Human Interaction</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">audio</style></keyword><keyword><style  face="normal" font="default" size="100%">audio spaces</style></keyword><keyword><style  face="normal" font="default" size="100%">CMC</style></keyword><keyword><style  face="normal" font="default" size="100%">computer-mediated communication</style></keyword><keyword><style  face="normal" font="default" size="100%">electronic social spaces</style></keyword><keyword><style  face="normal" font="default" size="100%">media spaces</style></keyword><keyword><style  face="normal" font="default" size="100%">mediated communication</style></keyword><keyword><style  face="normal" font="default" size="100%">norms</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">rich interactions</style></keyword><keyword><style  face="normal" font="default" size="100%">social interactions</style></keyword><keyword><style  face="normal" font="default" size="100%">social presence</style></keyword><keyword><style  face="normal" font="default" size="100%">speech interactions</style></keyword><keyword><style  face="normal" font="default" size="100%">telepresence</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">1997</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">4</style></volume><pages><style face="normal" font="default" size="100%">39–66</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The primary focus of this article is an analysis of an audio-only media space from a computer-supported cooperative work (CSCW) perspective. To explore whether audio by itself is suitable for shared media systems, we studied a workgroup using an audio-only media space. This media space, called Thunderwire, combined high-quality audio with open connec-tions to create a shared space for its users. The two-month field study provided a richly nuanced understanding of this audio spaces social use. The system afforded rich sociable interactions. As well, users were able to create a useful, usable social space; however, through an analysis of the social norms that the participants formulated, we show that they had to take into account being in an audio-only environment. Within the field study, then, audio by itself was sufficient for a usable media space and a useful social space, but users were forced to adapt to many audio-only and system conditions. The article also considers audios implications for privacy.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record></records></xml>