Skip to main content

Usable Privacy by Visual and Interactive Control of Information Flow

  • Conference paper
Security Protocols XX (Security Protocols 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7622))

Included in the following conference series:

Abstract

With over 2 billion people using the Internet and over 800 million people registered on the popular social networking website Facebook, one problem that is widely discussed in the media and extensively researched in academic circles is that of ensuring privacy of the users. Privacy has been defined as the “individuals right to control information about themselves”, but this right is hard to enforce if one does not understand the flow of information. In this paper, we suggest that in order to bring privacy enhancing protocols into life, for the user, we need to visualise the information flow from the user to the Internet and vice versa. This would help users better understand what information they are sharing with whom and disable any undesired flows, with a mouse-click or a finger-tap, before it is too late.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Obama advises caution in use of Facebook. Associated Press (September 8, 2009)

    Google Scholar 

  2. Facebook bug sees Zuckerberg pictures posted online. BBC (December 7, 2011)

    Google Scholar 

  3. Internet World Stats (2011), http://www.internetworldstats.com/stats.htm

  4. Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Security & Privacy 3(1), 26–33 (2005)

    Article  Google Scholar 

  5. Anderson, R.J.: Security engineering - a guide to building dependable distributed systems, 2nd edn. Wiley (2008)

    Google Scholar 

  6. Baddeley, A.: Working memory. Science 255(31), 556–559 (1992)

    Article  Google Scholar 

  7. Berger, P.L.: Models of Bounded Rationality, vol. I-III. The MIT Press, Cambridge (1982)

    Google Scholar 

  8. Efrati, A.: GM signs Google apps pact, in initial step toward cloud. The Wall Street Journal (November 2011)

    Google Scholar 

  9. Facebook. Facebook Statistics, http://www.facebook.com/press/info.php?statistics

  10. Gross, R., Acquisti, A., John Heinz III, H.: Information revelation and privacy in online social networks. In: WPES, pp. 71–80 (2005)

    Google Scholar 

  11. Lewman, A.: Tor: Onion routing. UCL Computer Science, Information Security Seminar Series (January 11, 2012)

    Google Scholar 

  12. Mackay, W.E.: Triggers and barriers to customizing software. In: CHI, pp. 153–160 (1991)

    Google Scholar 

  13. Mahmood, S., Desmedt, Y.: Poster: preliminary analysis of google+’s privacy. In: ACM Conference on Computer and Communications Security, pp. 809–812 (2011)

    Google Scholar 

  14. Michael Henderson, D.L., de Zwart, M., Phillips, M.: Will u friend me? Legal Risks of Social Networking Sites. Monash University (2011)

    Google Scholar 

  15. Monkovic, T.: Eagles employee fired for Facebook post. New York Times, March 10 (2009)

    Google Scholar 

  16. Naraine, R.: Facebook offers https browsing, but not yet by default (2011), http://www.zdnet.com/blog/security/facebook-offers-https-browsing-but-not-yet-by-default/8009

  17. Wang, Y., Komanduri, S., Leon, P.G., Norcie, G., Acquisti, A., Cranor, L.F.: I regretted the minute I pressed share.: A qualitative study of regrets on Facebook. In: SOUPS (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mahmood, S., Desmedt, Y. (2012). Usable Privacy by Visual and Interactive Control of Information Flow. In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J. (eds) Security Protocols XX. Security Protocols 2012. Lecture Notes in Computer Science, vol 7622. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35694-0_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35694-0_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35693-3

  • Online ISBN: 978-3-642-35694-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics