Skip to main content

Tailoring Collaboration According Privacy Needs in Real-Identity Collaborative Systems

  • Conference paper
Groupware: Design, Implementation, and Use (CRIWG 2009)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5784))

Included in the following conference series:

Abstract

Nowadays, collaboration and social interaction among people become everyday activities in our evolving information age. In many learning platforms, collaborative platforms in the educational and industrial field or social networks like LinkedIn or Xing, users have to disclose private information and reveal their identities. Working with those systems allows them to create user profiles which could reveal more information about the user, than he wants to give. Furthermore, such environments may construct profiles about users’ interaction, which may be used for attacks; thus preserving privacy is an essential component of such environments. In this paper, a decentralized group-centric approach for tailoring collaboration according privacy needs is introduced. The main idea of our approach lays in its construction. In contrast to traditional collaboration environments with central hosting, our approach gives each group the whole responsibility of hosting the collaboration environment by using their own technical means. The feasibility of our approach is demonstrated through a lightweight ubiquitous collaboration platform. The experiences gathered are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Implementing P3P using database technology. In: ICDE, pp. 595–606 (2003)

    Google Scholar 

  2. Antón, A.I., Bertino, E., Li, N., Yu, T.: A roadmap for comprehensive online privacy policy management. CACM 50(7), 109–116 (2007)

    Article  Google Scholar 

  3. Bellotti, V., Sellen, A.J.: Design for privacy in ubiquitous computing environments. In: de Michelis, G., Simone, C., Schmidt, K. (eds.) Proceedings of the Third European Conference on Computer Supported Cooperative Work - ECSCW 1993, pp. 77–92. Kluwer, Dordrecht (1993)

    Google Scholar 

  4. Borcea-Pfitzmann, K., Liesebach, K., Pfitzmann, A.: Establishing a privacy-aware collaborative elearning environment. In: Proceedings of the EADTU Annual Conference 2005: Towards Lisbon 2010: Collaboration for Innovative Content in Lifelong Open and Flexible Learning (2005)

    Google Scholar 

  5. Bourimi, M.: Collaborative design and tailoring of web based learning environments in CURE. In: Dimitriadis, Y.A., Zigurs, I., Gómez-Sánchez, E. (eds.) CRIWG 2006. LNCS, vol. 4154, pp. 421–436. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  6. Bourimi, M., Lukosch, S., Kuehnel, F.: Leveraging visual tailoring and synchronous awareness in web-based collaborative systems. In: Haake, J.M., Ochoa, S.F., Cechich, A. (eds.) CRIWG 2007. LNCS, vol. 4715, pp. 40–55. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  7. Boyle, M., Greenberg, S.: The language of privacy: Learning from video media space analysis and design. ACM Trans. Comput.-Hum. Interact. 12(2), 328–370 (2005)

    Article  Google Scholar 

  8. Boyle, M., Neustaedter, C., Greenberg, S.: Privacy factors in video-based media spaces. In: Harrision, S. (ed.) n Media Space: 20+ Years of Mediated Life, pp. 99–124. Springer, Heidelberg (2008)

    Google Scholar 

  9. Camenisch, J., Crane, S., Fischer-Hbner, S., Leenes, R., Pearson, S., Pettersson, J.S., Sommer, D., Andersson, C.: Trust in PRIME. In: Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, December 2005, pp. 552–559 (2005)

    Google Scholar 

  10. Cha, S.C., Joung, Y.J.: From P3P to data licenses. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 205–221. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  11. Cheng, L.T., Patterson, J., Rohall, S.L., Hupfer, S., Ross, S.: Weaving a social fabric into existing software. In: AOSD 2005: Proceedings of the 4th international conference on Aspect-oriented software development, pp. 147–158. ACM Press, New York (2005)

    Google Scholar 

  12. Clement, A.: Considering privacy in the development of multimedia communications, pp. 907–931 (1996)

    Google Scholar 

  13. Cranor, L., Langheinrich, M., Marchioriand, M., Presler-Marshall, M., Reagle, J.: Platform for privacy preferences (p3p). In: W3C Recommendations (2002)

    Google Scholar 

  14. Dourish, P.: Culture and control in a media space. In: ECSCW 1993: Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work, Norwell, MA, USA, pp. 125–137. Kluwer Academic Publishers, Dordrecht (1993)

    Google Scholar 

  15. EPAL: The enterprise privacy authorization language, epal 1.2 specification. IBM (2004)

    Google Scholar 

  16. EPIC, Junkbuster: Pretty Poor Privacy: An Assessment of P3P and Internet Privacy (2002)

    Google Scholar 

  17. EU News: Citizens’ privacy must become priority in digital age, says EU Commissioner Reding (2009), http://ec.europa.eu/informationsociety/newsroom/cf/itemdetail.cfm?itemid=4881

  18. Fischer-Huebner, S.: Privacy-Enhancing Technologies, Lecture Notes in Computer Science. LNCS. Springer, Heidelberg (2001)

    Google Scholar 

  19. Gross, R., Acquisti, A., Heinz III, H.J.: Information revelation and privacy in online social networks. In: WPES 2005: Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pp. 71–80. ACM, New York (2005)

    Chapter  Google Scholar 

  20. Gutwin, C., Stark, G., Greenberg, S.: Support for workspace awareness in educational groupware. In: CSCL 1995: The first international conference on Computer support for collaborative learning, Hillsdale, NJ, USA, pp. 147–156. L. Erlbaum Associates Inc., Mahwah (1995)

    Chapter  Google Scholar 

  21. Haake, J.M., Schümmer, T., Haake, A., Bourimi, M., Landgraf, B.: Supporting flexible collaborative distance learning in the cure platform, vol. 1, p. 10003a. IEEE Computer Society, Los Alamitos (2004)

    Google Scholar 

  22. Haake, J.M., Schümmer, T., Haake, A., Bourimi, M., Landgraf, B.: Two-level tailoring support for CSCL. In: Favela, J., Decouchant, D. (eds.) CRIWG 2003. LNCS, vol. 2806, pp. 74–81. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  23. Haake, J.M., Haake, A., Schümmer, T., Bourimi, M., Landgraf, B.: End-user controlled group formation and access rights management in a shared workspace system. In: CSCW 2004: Proceedings of the 2004 ACM conference on Computer supported cooperative work, Chicago, Illinois, USA, November 6-10, pp. 554–563. ACM Press, New York (2004)

    Google Scholar 

  24. Isenberg, D.: GigaLaw Guide to Internet Law. Random House Inc., New York (2002)

    Google Scholar 

  25. Koch, M., Richter, A.: Enterprise 2.0: Planung, Einführung und erfolgreicher Einsatz von Social Software in Unternehmen: Planung, Einführung und erfolgreicher Einsatz von Social Software in Unternehmen. Oldenbourg, München, Wien (2007)

    Google Scholar 

  26. Kühnel, F.: Visual tailoring and synchronous awareness support in web-based collaborative systems. Master’s thesis, FernUniversität in Hagen (January 2008)

    Google Scholar 

  27. Lukosch, S., Bourimi, M.: Towards an enhanced adaptability and usability of web-based collaborative systems. International Journal of Cooperative Information Systems, Special Issue on ’Design, Implementation of Groupware, 467–494 (2008)

    Google Scholar 

  28. Narayanan, A., Shmatikov, V.: De-anonymizing social networks (2009)

    Google Scholar 

  29. Palen, L., Dourish, P.: Unpacking “privacy” for a networked world. In: CHI 2003: Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 129–136. ACM Press, New York (2003)

    Google Scholar 

  30. Pearson, S.: Towards automated evaluation of trust constraints. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 252–266. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  31. PRIME (June 2009), http://www.prime-psroject.eu.org/

  32. Smale, S.K.: Collecting and Sharing Transient Personal Information Online. Master’s thesis, University Of Calgary (November 2007)

    Google Scholar 

  33. Szugat, M., Gewehr, J.E., Lochmann, C.: Social Software, 1st edn. Entwickler Press (2007)

    Google Scholar 

  34. Tang, J.C., Isaacs, E.A., Rua, M.: Supporting distributed groups with a montage of lightweight interactions. In: CSCW 1994: Proceedings of the 1994 ACM conference on Computer supported cooperative work, pp. 23–34. ACM, New York (1994)

    Chapter  Google Scholar 

  35. Woolf, B.P.: Building Intelligent Interactive Tutors. Morgan Kaufman, San Francisco (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bourimi, M., Kühnel, F., Haake, J.M., el Diehn I. Abou-Tair, D., Kesdogan, D. (2009). Tailoring Collaboration According Privacy Needs in Real-Identity Collaborative Systems. In: Carriço, L., Baloian, N., Fonseca, B. (eds) Groupware: Design, Implementation, and Use. CRIWG 2009. Lecture Notes in Computer Science, vol 5784. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04216-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04216-4_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04215-7

  • Online ISBN: 978-3-642-04216-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics