HCI Bibliography : Search Results skip to search form | skip to results |
Database updated: 2016-05-10 Searches since 2006-12-01: 32,279,150
director@hcibib.org
Hosted by ACM SIGCHI
The HCI Bibliogaphy was moved to a new server 2015-05-12 and again 2016-01-05, substantially degrading the environment for making updates.
There are no plans to add to the database.
Please send questions or comments to director@hcibib.org.
Query: Page_X* Results: 7 Sorted by: Date  Comments?
Help Dates
Limit:   
Bridging the Gap between Privacy by Design and Privacy in Practice Workshop Summaries / Stark, Luke / King, Jen / Page, Xinru / Lampinen, Airi / Vitak, Jessica / Wisniewski, Pamela / Whalen, Tara / Good, Nathaniel Extended Abstracts of the ACM CHI'16 Conference on Human Factors in Computing Systems 2016-05-07 v.2 p.3415-3422
ACM Digital Library Link
Summary: While there has been considerable academic work over the past decade on preserving and enhancing digital privacy, little of this scholarship has influenced practitioners in design or industry. By bringing together leading privacy academics and commercial stakeholders, this workshop builds on previous gatherings at ACM conferences and in the broader privacy community. Workshop attendees will address the 'privacy by design' implementation problem, and will work together to identify actionable methods and design heuristics for closing the gap between academic research and industry solutions for protecting user privacy in the design of systems, digital products and services.

The Future of Networked Privacy: Challenges and Opportunities Workshops / Vitak, Jessica / Wisniewski, Pamela / Page, Xinru / Lampinen, Airi / Litt, Eden / De Wolf, Ralf / Kelley, Patrick Gage / Sleeper, Manya Companion Proceedings of ACM CSCW 2015 Conference on Computer-Supported Cooperative Work and Social Computing 2015-03-14 v.2 p.267-272
ACM Digital Library Link
Summary: Building on recent work in privacy management and disclosure in networked spaces, this two-day workshop examines networked privacy challenges from a broader perspective by (1) identifying the most important issues researchers will need to address in the next decade and (2) working to create actionable solutions for these privacy issues. This workshop comes at a critical time for organizations, researchers, and consumers, as content-sharing applications soar in popularity and more privacy and security vulnerabilities emerge. Workshop participants and organizers will work together to develop a guiding framework for the community that highlights the future challenges and opportunities of networked privacy.

FYI: communication style preferences underlie differences in location-sharing adoption and usage Location-based services I / Page, Xinru / Knijnenburg, Bart P. / Kobsa, Alfred Proceedings of the 2013 International Joint Conference on Pervasive and Ubiquitous Computing 2013-09-08 v.1 p.153-162
ACM Digital Library Link
Summary: In a mixed-methods study on adoption of location-sharing social networks (LSSN), we discovered that variations in adoption and usage behavior could be explained by one's predisposition to communicate in a certain style. Specifically, we found that certain individuals prefer a communication style we call FYI (For Your Information). FYI communicators like to infer availability and to keep in touch with others without having to interact with them, which is the predominant style in current LSSN. Using structural equation modeling on a U.S. nationwide survey (N=1021), we show how the FYI communication style predicts the adoption of LSSN while also showing a negative effect on one's desire to call someone on the phone. Moreover, we find that as age increases, FYI preference significantly decreases. In a follow-on survey (N=180), we refine the FYI construct and show that it affects users' level of disclosure and participation in social media. Furthermore, we show that it completely mediates the effect of certain Big-5 personality traits on social media participation and LSSN usage. The results suggest that to cater to a wider segment of the population, LSSN (and arguably any social media) should support an active communication style.

What a tangled web we weave: lying backfires in location-sharing social media Sharing and privacy / Page, Xinru / Knijnenburg, Bart P. / Kobsa, Alfred Proceedings of ACM CSCW'13 Conference on Computer-Supported Cooperative Work 2013-02-23 v.1 p.273-284
ACM Digital Library Link
Summary: Prior research shows that a root cause of many privacy concerns in location-sharing social media is people's desire to preserve offline relationship boundaries. Other literature recognizes lying as an everyday phenomenon that preserves such relationship boundaries by facilitating smooth social interactions. Combining these strands of research, one might hypothesize that people with a predisposition to lie would generally have lower privacy concerns since lying is a means to preserve relationship boundaries. We tested this hypothesis using structural equation modeling on data from a survey administered nationwide (N=1532), and found that for location-sharing, people with a high propensity to lie actually have increased boundary preservation concerns as well as increased privacy concerns. We explain these findings using results from semi-structured interviews.

Measuring networked social privacy Workshop summaries / Page, Xinru / Tang, Karen / Stutzman, Fred / Lampinen, Airi Proceedings of ACM CSCW'13 Conference on Computer-Supported Cooperative Work 2013-02-23 v.2 p.315-320
ACM Digital Library Link
Summary: Much privacy research focuses on concerns about data protection and has established metrics, such as privacy scales, for evaluating those concerns. Recent work recognizes the importance of understanding interpersonal and interactional privacy concerns in social media, but ways to measure privacy within these contexts remain unsettled. This workshop aims to cultivate an understanding of the current landscape for interpersonal privacy framework and ways to measure social privacy for networked settings. For full details, visit networkedprivacy2013.wordpress.com/

With a little help from my friends: can social navigation inform interpersonal privacy preferences? Identity and self-disclosure / Patil, Sameer / Page, Xinru / Kobsa, Alfred Proceedings of ACM CSCW'11 Conference on Computer-Supported Cooperative Work 2011-03-19 p.391-394
ACM Digital Library Link
Summary: Recent privacy controversies surrounding social networking sites demonstrate that the mere availability of settings is not enough for effective privacy management. We investigated whether the aggregated privacy choices of one's social circle might guide users in making informed privacy decisions. We conducted an experiment in which users specified preferences for six privacy-relevant settings in Instant Messaging. In one condition, users were provided with information indicating the privacy preferences of the majority of their ''buddies." Our results suggest that while this information did influence user choices, the effect was secondary to that of the ''privacy-sensitivity" of the system feature controlled by the particular setting. Frequency of IM usage was also associated with privacy choices. The experiment data coupled with user comments suggest several usability improvements in interfaces for specifying privacy preferences.

Personality-based privacy management for location-sharing in diverse subpopulations Posters / Page, Xinru / Kobsa, Alfred Proceedings of the 2011 iConference 2011-02-08 p.736-738
ACM Digital Library Link
Summary: Researchers in the area of privacy management often suggest to provide users with a collection of privacy settings and good defaults for them. However, our research into people's attitudes towards location-sharing technology (considering both adopters and non-adopters) indicates that the right way to manage privacy and the right default can vary for different types of people; Key privacy concerns may differ by demographics and personality type, and personality may also influence privacy management preferences. To help researchers and practitioners better understand who is concerned about what, and how to best address those concerns, we will draw on our research and theories in the literature to construct and validate a scale that 1) assesses an individual's main privacy concerns towards location-sharing technology, and 2) measures personality traits relevant to privacy management. We will then put this scale into practice by deploying an enterprise-wide survey at our field site (a large multi-national entertainment corporation) that tests the relationship between the scale/subscales and an individual's intention to adopt location-sharing technology. We hope this will help us identify subpopulations with similar privacy concerns and/or personality traits, which can guide future design of privacy-sensitive location-sharing technology.