Skip to main content

From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions

  • Conference paper
Privacy Enhancing Technologies (PET 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2760))

Included in the following conference series:

  • 883 Accesses

Abstract

Internet users are becoming more concerned about their privacy. In addition, various governments (most notably in Europe) are adopting strong privacy protection legislation. The result is that system developers and service operators must determine how to comply with legal requirements and satisfy users. The human factors requirements for effective privacy interface design can be grouped into four categories: (1) comprehension, (2) consciousness, (3) control, and (4) consent. A technique called ”Privacy Interface Analysis” is introduced to show how interface design solutions can be used when developing a privacy-enhanced application or service. To illustrate the technique, an application adopted by the Privacy Incorporated Software Agents consortium (PISA) is analyzed in which users will launch autonomous software agents on the Internet to search for jobs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Comstock, E.M., Clemens, E.A.: Perceptions of computer manuals: A view from the field. In: Proceedings of the Human Factors Society 31st Annual Meeting, pp. 139–143 (1987)

    Google Scholar 

  2. Cranor, L.F., Arjula, M., Guduru, P.: Use of a P3P User Agent by Early Adopters. In: Proceedings of Workshop on Privacy in the Electronic Society, Washington, D.C., November 21 (2002)

    Google Scholar 

  3. Directive 95/46/EC of the European Parliament and of the Council of October 24, 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of such Data. Official Journal of the European Communities, p. 31 (1995)

    Google Scholar 

  4. Directive 97/66/EC of the European Parliament and of the Council of December 15, 1997, concerning the processing of personal data and the protection of privacy in the telecommunications sector. Official Journal L 024, 30/01/1998 p. 0001 – 0008 (1997)

    Google Scholar 

  5. Halket, T.D., Cosgrove, D.B.: Is your online agreement in jeopardy?, http://www.cio.com/legal/edit/010402_agree.html

  6. Kenny, S., Borking, J.: The value of privacy engineering. Journal of Information, Law and Technology, JILT (2002), http://elj.warwick.ac.uk/jilt/02-1/kenny.html

  7. Kobsa, A.: Tailoring privacy to users’ needs (Invited Keynote). In: Bauer, M., Gmytrasiewicz, P.J., Vassileva, J. (eds.) UM 2001. LNCS (LNAI), vol. 2109, pp. 303–313. Springer, Heidelberg (2001), http://www.ics.uci.edu/~kobsa/papers/2001-UM01-kobsa.pdf

    Chapter  Google Scholar 

  8. Kobsa, A.: Personalized hypermedia and international privacy. Communications of the ACM 45(5), 64–67 (2002), http://www.ics.uci.edu/~kobsa/papers/2002-CACM-kobsa.pdf

    Article  Google Scholar 

  9. Kunz, C.L.: Click-Through Agreements: Strategies for Avoiding Disputes on Validity of Assent (2002), http://www.efscouncil.org/frames/Forum%20Members/Kunz_Clickthr_%20Agrmt_%20Strategies.ppt . See also Kunz, C.L., Debrow, J., Del Duca, M., Thayer, H.: Click-Through Agreements: Strategies for Avoiding Disputes on Validity of Assent. Business Lawyer 57, 401 (2001)

  10. Nielsen, J.: Usability engineering. Morgan Kaufmann, San Diego (1993)

    MATH  Google Scholar 

  11. Norman, D.A.: The psychology of everyday things. Basic Books, New York (1988)

    Google Scholar 

  12. Preece, J., Rogers, Y., Sharp, H., Benyon, D., Holland, S., Carey, T.: Humancomputer interaction. Addison-Wesley, Reading (1994)

    Google Scholar 

  13. Rumbaugh, J., Jacobson, I., Booch, G.: The unified modeling language reference manual. Addison-Wesley, Reading (1998)

    Google Scholar 

  14. Saunders, C.: Trust central to E-commerce, online marketing. Internet Advertising Report (2001), http://www.internetnews.com/IAR/article.php/12_926191

  15. Shneiderman, B.: Designing the user interface: Strategies for effective humancomputer interaction. Addison-Wesley, Reading (1987)

    Google Scholar 

  16. Slade, K.H.: Dealing with customers: Protecting their privacy and enforcing your contracts (1999), http://www.haledorr.com/db30/cgi-bin/pubs/1999_06_CLE_Program.pdf

  17. Thornburgh, D.: Click-through contracts: How to make them stick. In: Internet Management Strategies (2001), http://www.loeb.com/FSL5CS/articles/articles45.asp

  18. Wickens, C.D., Hollands, J.G.: Engineering psychology and human performance, 3rd edn. Prentice Hall, Upper Saddle River (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Patrick, A.S., Kenny, S. (2003). From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions. In: Dingledine, R. (eds) Privacy Enhancing Technologies. PET 2003. Lecture Notes in Computer Science, vol 2760. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-40956-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-40956-4_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20610-1

  • Online ISBN: 978-3-540-40956-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics