ABSTRACT
We describe studies of preferences about information sharing aimed at identifying fundamental concerns with privacy and at understanding how people might abstract the details of sharing into higher-level classes of recipients and information that are treated similarly. Thirty people specified what information they are willing to share with whom.. Although people vary in their overall level of comfort in sharing, we identified key classes of recipients and information. Such abstractions highlight the promise of developing expressive controls for sharing and privacy.
- Ackerman, M. S. (2000). Developing for privacy: Civility frameworks and technical design. Proc. Computers, Freedom, & Privacy, 19--23.]] Google ScholarDigital Library
- Ackerman, M. S., Cranor, L. F., and Reagle, J. (1999). Privacy in e-commerce: Examining user scenarios and privacy preferences. Proc. ACM Conference on Electronic Commerce, 1--8.]] Google ScholarDigital Library
- Bellotti, V., & Sellen, A. (1993). Design for privacy in ubiquitous computing environments. ECSCW-93, 77--92.]] Google ScholarDigital Library
- Butler, J. K. (1991). Toward understanding and measuring conditions of trust: Evolution of a conditions of trust inventory. Journal of Management, 17, 643--663.]]Google ScholarCross Ref
- Corter, J. E. (1996). Tree models of similarity and association. Sage University Paper.]]Google Scholar
- Ferraiolo, D., Duginin, J. A., & Kuhn, D. R. (1995). Role based access control (RBAC): Features and motivation. 11th Annual Computer Security Applications Conference.]]Google Scholar
- Lederer, S., Beckmann, C., Dey, A., & Mankoff, J. (2003). Managing personal information disclosure in ubiquitous computing environments. Intel Research Berkeley Technical Report 03--015.]]Google Scholar
- Lederer, S., Dey, A. K., & Mankoff, J. (2003). Who wants to know what when? Privacy preference determinants in ubiquitous computing CY* 2003 Shortpapers, 724--725.]]Google Scholar
- Olson, J.S., Grudin, J., & Horvitz, E. (2004). Toward understanding preferences for sharing and privacy. MSR Technical Report 2004--138. ftp://ftp.research.microsoft.com/pub/tr/TR-2004-138.pdf]]Google Scholar
- Povey, D. (1999). Optimistic security: A new access control paradigm. Proc. ACM New Security Paradigms Workshop, 40--45.]] Google ScholarDigital Library
- Stevens, G. & Wulf, V. (2002). A new dimension in access control: Studying maintenance engineering across organizational boundaries. Proc. CSCW 2002, 196--205.]] Google ScholarDigital Library
- Stiemerling. O., & Wulf, V. (2000). Beyond 'yes or no'-Extending access control in groupware with awareness and negotiation. Group Decision and Negotiation, 9, 221--235.]]Google ScholarCross Ref
- Westin, A. F. (1998). E-commerce & Privacy: What Net Users Want. Hackensack, NJ: Privacy & American Business.]]Google Scholar
Index Terms
- A study of preferences for sharing and privacy
Recommendations
Privacy-Preserving Sharing of Sensitive Information
Privacy-preserving sharing of sensitive information (PPSSI) is motivated by the increasing need for entities (organizations or individuals) that don't fully trust each other to share sensitive information. Many types of entities need to collect, analyze,...
Information sharing vs. privacy
A game model for deciding on level of information sharing when privacy is a concern.Finding threshold in which gain of information sharing outweighs the privacy risk.Two mechanisms for encouraging the firms to reach socially optimal outcome. Sharing ...
Preserving Genomic Privacy via Selective Sharing
WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic SocietyAlthough genomic data has significant impact and widespread usage in medical research, it puts individuals' privacy in danger, even if they anonymously or partially share their genomic data. To address this problem, we present a framework that is ...
Comments