Abstract
Internet users are becoming more concerned about their privacy. In addition, various governments (most notably in Europe) are adopting strong privacy protection legislation. The result is that system developers and service operators must determine how to comply with legal requirements and satisfy users. The human factors requirements for effective privacy interface design can be grouped into four categories: (1) comprehension, (2) consciousness, (3) control, and (4) consent. A technique called ”Privacy Interface Analysis” is introduced to show how interface design solutions can be used when developing a privacy-enhanced application or service. To illustrate the technique, an application adopted by the Privacy Incorporated Software Agents consortium (PISA) is analyzed in which users will launch autonomous software agents on the Internet to search for jobs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Comstock, E.M., Clemens, E.A.: Perceptions of computer manuals: A view from the field. In: Proceedings of the Human Factors Society 31st Annual Meeting, pp. 139–143 (1987)
Cranor, L.F., Arjula, M., Guduru, P.: Use of a P3P User Agent by Early Adopters. In: Proceedings of Workshop on Privacy in the Electronic Society, Washington, D.C., November 21 (2002)
Directive 95/46/EC of the European Parliament and of the Council of October 24, 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of such Data. Official Journal of the European Communities, p. 31 (1995)
Directive 97/66/EC of the European Parliament and of the Council of December 15, 1997, concerning the processing of personal data and the protection of privacy in the telecommunications sector. Official Journal L 024, 30/01/1998 p. 0001 – 0008 (1997)
Halket, T.D., Cosgrove, D.B.: Is your online agreement in jeopardy?, http://www.cio.com/legal/edit/010402_agree.html
Kenny, S., Borking, J.: The value of privacy engineering. Journal of Information, Law and Technology, JILT (2002), http://elj.warwick.ac.uk/jilt/02-1/kenny.html
Kobsa, A.: Tailoring privacy to users’ needs (Invited Keynote). In: Bauer, M., Gmytrasiewicz, P.J., Vassileva, J. (eds.) UM 2001. LNCS (LNAI), vol. 2109, pp. 303–313. Springer, Heidelberg (2001), http://www.ics.uci.edu/~kobsa/papers/2001-UM01-kobsa.pdf
Kobsa, A.: Personalized hypermedia and international privacy. Communications of the ACM 45(5), 64–67 (2002), http://www.ics.uci.edu/~kobsa/papers/2002-CACM-kobsa.pdf
Kunz, C.L.: Click-Through Agreements: Strategies for Avoiding Disputes on Validity of Assent (2002), http://www.efscouncil.org/frames/Forum%20Members/Kunz_Clickthr_%20Agrmt_%20Strategies.ppt . See also Kunz, C.L., Debrow, J., Del Duca, M., Thayer, H.: Click-Through Agreements: Strategies for Avoiding Disputes on Validity of Assent. Business Lawyer 57, 401 (2001)
Nielsen, J.: Usability engineering. Morgan Kaufmann, San Diego (1993)
Norman, D.A.: The psychology of everyday things. Basic Books, New York (1988)
Preece, J., Rogers, Y., Sharp, H., Benyon, D., Holland, S., Carey, T.: Humancomputer interaction. Addison-Wesley, Reading (1994)
Rumbaugh, J., Jacobson, I., Booch, G.: The unified modeling language reference manual. Addison-Wesley, Reading (1998)
Saunders, C.: Trust central to E-commerce, online marketing. Internet Advertising Report (2001), http://www.internetnews.com/IAR/article.php/12_926191
Shneiderman, B.: Designing the user interface: Strategies for effective humancomputer interaction. Addison-Wesley, Reading (1987)
Slade, K.H.: Dealing with customers: Protecting their privacy and enforcing your contracts (1999), http://www.haledorr.com/db30/cgi-bin/pubs/1999_06_CLE_Program.pdf
Thornburgh, D.: Click-through contracts: How to make them stick. In: Internet Management Strategies (2001), http://www.loeb.com/FSL5CS/articles/articles45.asp
Wickens, C.D., Hollands, J.G.: Engineering psychology and human performance, 3rd edn. Prentice Hall, Upper Saddle River (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Patrick, A.S., Kenny, S. (2003). From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions. In: Dingledine, R. (eds) Privacy Enhancing Technologies. PET 2003. Lecture Notes in Computer Science, vol 2760. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-40956-4_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-40956-4_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20610-1
Online ISBN: 978-3-540-40956-4
eBook Packages: Springer Book Archive