Bridging the Gap between Privacy by Design and Privacy in Practice
Workshop Summaries
/
Stark, Luke
/
King, Jen
/
Page, Xinru
/
Lampinen, Airi
/
Vitak, Jessica
/
Wisniewski, Pamela
/
Whalen, Tara
/
Good, Nathaniel
Extended Abstracts of the ACM CHI'16 Conference on Human Factors in
Computing Systems
2016-05-07
v.2
p.3415-3422
© Copyright 2016 ACM
Summary: While there has been considerable academic work over the past decade on
preserving and enhancing digital privacy, little of this scholarship has
influenced practitioners in design or industry. By bringing together leading
privacy academics and commercial stakeholders, this workshop builds on previous
gatherings at ACM conferences and in the broader privacy community. Workshop
attendees will address the 'privacy by design' implementation problem, and will
work together to identify actionable methods and design heuristics for closing
the gap between academic research and industry solutions for protecting user
privacy in the design of systems, digital products and services.
The Future of Networked Privacy: Challenges and Opportunities
Workshops
/
Vitak, Jessica
/
Wisniewski, Pamela
/
Page, Xinru
/
Lampinen, Airi
/
Litt, Eden
/
De Wolf, Ralf
/
Kelley, Patrick Gage
/
Sleeper, Manya
Companion Proceedings of ACM CSCW 2015 Conference on Computer-Supported
Cooperative Work and Social Computing
2015-03-14
v.2
p.267-272
© Copyright 2015 ACM
Summary: Building on recent work in privacy management and disclosure in networked
spaces, this two-day workshop examines networked privacy challenges from a
broader perspective by (1) identifying the most important issues researchers
will need to address in the next decade and (2) working to create actionable
solutions for these privacy issues. This workshop comes at a critical time for
organizations, researchers, and consumers, as content-sharing applications soar
in popularity and more privacy and security vulnerabilities emerge. Workshop
participants and organizers will work together to develop a guiding framework
for the community that highlights the future challenges and opportunities of
networked privacy.
FYI: communication style preferences underlie differences in
location-sharing adoption and usage
Location-based services I
/
Page, Xinru
/
Knijnenburg, Bart P.
/
Kobsa, Alfred
Proceedings of the 2013 International Joint Conference on Pervasive and
Ubiquitous Computing
2013-09-08
v.1
p.153-162
© Copyright 2013 ACM
Summary: In a mixed-methods study on adoption of location-sharing social networks
(LSSN), we discovered that variations in adoption and usage behavior could be
explained by one's predisposition to communicate in a certain style.
Specifically, we found that certain individuals prefer a communication style we
call FYI (For Your Information). FYI communicators like to infer availability
and to keep in touch with others without having to interact with them, which is
the predominant style in current LSSN. Using structural equation modeling on a
U.S. nationwide survey (N=1021), we show how the FYI communication style
predicts the adoption of LSSN while also showing a negative effect on one's
desire to call someone on the phone. Moreover, we find that as age increases,
FYI preference significantly decreases. In a follow-on survey (N=180), we
refine the FYI construct and show that it affects users' level of disclosure
and participation in social media. Furthermore, we show that it completely
mediates the effect of certain Big-5 personality traits on social media
participation and LSSN usage. The results suggest that to cater to a wider
segment of the population, LSSN (and arguably any social media) should support
an active communication style.
What a tangled web we weave: lying backfires in location-sharing social
media
Sharing and privacy
/
Page, Xinru
/
Knijnenburg, Bart P.
/
Kobsa, Alfred
Proceedings of ACM CSCW'13 Conference on Computer-Supported Cooperative Work
2013-02-23
v.1
p.273-284
© Copyright 2013 ACM
Summary: Prior research shows that a root cause of many privacy concerns in
location-sharing social media is people's desire to preserve offline
relationship boundaries. Other literature recognizes lying as an everyday
phenomenon that preserves such relationship boundaries by facilitating smooth
social interactions. Combining these strands of research, one might hypothesize
that people with a predisposition to lie would generally have lower privacy
concerns since lying is a means to preserve relationship boundaries. We tested
this hypothesis using structural equation modeling on data from a survey
administered nationwide (N=1532), and found that for location-sharing, people
with a high propensity to lie actually have increased boundary preservation
concerns as well as increased privacy concerns. We explain these findings using
results from semi-structured interviews.
Measuring networked social privacy
Workshop summaries
/
Page, Xinru
/
Tang, Karen
/
Stutzman, Fred
/
Lampinen, Airi
Proceedings of ACM CSCW'13 Conference on Computer-Supported Cooperative Work
2013-02-23
v.2
p.315-320
© Copyright 2013 ACM
Summary:
Much privacy research focuses on concerns about data protection and has
established metrics, such as privacy scales, for evaluating those concerns.
Recent work recognizes the importance of understanding interpersonal and
interactional privacy concerns in social media, but ways to measure privacy
within these contexts remain unsettled. This workshop aims to cultivate an
understanding of the current landscape for interpersonal privacy framework and
ways to measure social privacy for networked settings. For full details, visit
networkedprivacy2013.wordpress.com/
With a little help from my friends: can social navigation inform
interpersonal privacy preferences?
Identity and self-disclosure
/
Patil, Sameer
/
Page, Xinru
/
Kobsa, Alfred
Proceedings of ACM CSCW'11 Conference on Computer-Supported Cooperative Work
2011-03-19
p.391-394
© Copyright 2011 ACM
Summary: Recent privacy controversies surrounding social networking sites demonstrate
that the mere availability of settings is not enough for effective privacy
management. We investigated whether the aggregated privacy choices of one's
social circle might guide users in making informed privacy decisions. We
conducted an experiment in which users specified preferences for six
privacy-relevant settings in Instant Messaging. In one condition, users were
provided with information indicating the privacy preferences of the majority of
their ''buddies." Our results suggest that while this information did influence
user choices, the effect was secondary to that of the ''privacy-sensitivity" of
the system feature controlled by the particular setting. Frequency of IM usage
was also associated with privacy choices. The experiment data coupled with user
comments suggest several usability improvements in interfaces for specifying
privacy preferences.
Personality-based privacy management for location-sharing in diverse
subpopulations
Posters
/
Page, Xinru
/
Kobsa, Alfred
Proceedings of the 2011 iConference
2011-02-08
p.736-738
© Copyright 2011 ACM
Summary: Researchers in the area of privacy management often suggest to provide users
with a collection of privacy settings and good defaults for them. However, our
research into people's attitudes towards location-sharing technology
(considering both adopters and non-adopters) indicates that the right way to
manage privacy and the right default can vary for different types of people;
Key privacy concerns may differ by demographics and personality type, and
personality may also influence privacy management preferences. To help
researchers and practitioners better understand who is concerned about what,
and how to best address those concerns, we will draw on our research and
theories in the literature to construct and validate a scale that 1) assesses
an individual's main privacy concerns towards location-sharing technology, and
2) measures personality traits relevant to privacy management. We will then put
this scale into practice by deploying an enterprise-wide survey at our field
site (a large multi-national entertainment corporation) that tests the
relationship between the scale/subscales and an individual's intention to adopt
location-sharing technology. We hope this will help us identify subpopulations
with similar privacy concerns and/or personality traits, which can guide future
design of privacy-sensitive location-sharing technology.