skip to main content
10.1145/1056808.1057073acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article

A study of preferences for sharing and privacy

Published:02 April 2005Publication History

ABSTRACT

We describe studies of preferences about information sharing aimed at identifying fundamental concerns with privacy and at understanding how people might abstract the details of sharing into higher-level classes of recipients and information that are treated similarly. Thirty people specified what information they are willing to share with whom.. Although people vary in their overall level of comfort in sharing, we identified key classes of recipients and information. Such abstractions highlight the promise of developing expressive controls for sharing and privacy.

References

  1. Ackerman, M. S. (2000). Developing for privacy: Civility frameworks and technical design. Proc. Computers, Freedom, & Privacy, 19--23.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Ackerman, M. S., Cranor, L. F., and Reagle, J. (1999). Privacy in e-commerce: Examining user scenarios and privacy preferences. Proc. ACM Conference on Electronic Commerce, 1--8.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bellotti, V., & Sellen, A. (1993). Design for privacy in ubiquitous computing environments. ECSCW-93, 77--92.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Butler, J. K. (1991). Toward understanding and measuring conditions of trust: Evolution of a conditions of trust inventory. Journal of Management, 17, 643--663.]]Google ScholarGoogle ScholarCross RefCross Ref
  5. Corter, J. E. (1996). Tree models of similarity and association. Sage University Paper.]]Google ScholarGoogle Scholar
  6. Ferraiolo, D., Duginin, J. A., & Kuhn, D. R. (1995). Role based access control (RBAC): Features and motivation. 11th Annual Computer Security Applications Conference.]]Google ScholarGoogle Scholar
  7. Lederer, S., Beckmann, C., Dey, A., & Mankoff, J. (2003). Managing personal information disclosure in ubiquitous computing environments. Intel Research Berkeley Technical Report 03--015.]]Google ScholarGoogle Scholar
  8. Lederer, S., Dey, A. K., & Mankoff, J. (2003). Who wants to know what when? Privacy preference determinants in ubiquitous computing CY* 2003 Shortpapers, 724--725.]]Google ScholarGoogle Scholar
  9. Olson, J.S., Grudin, J., & Horvitz, E. (2004). Toward understanding preferences for sharing and privacy. MSR Technical Report 2004--138. ftp://ftp.research.microsoft.com/pub/tr/TR-2004-138.pdf]]Google ScholarGoogle Scholar
  10. Povey, D. (1999). Optimistic security: A new access control paradigm. Proc. ACM New Security Paradigms Workshop, 40--45.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Stevens, G. & Wulf, V. (2002). A new dimension in access control: Studying maintenance engineering across organizational boundaries. Proc. CSCW 2002, 196--205.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Stiemerling. O., & Wulf, V. (2000). Beyond 'yes or no'-Extending access control in groupware with awareness and negotiation. Group Decision and Negotiation, 9, 221--235.]]Google ScholarGoogle ScholarCross RefCross Ref
  13. Westin, A. F. (1998). E-commerce & Privacy: What Net Users Want. Hackensack, NJ: Privacy & American Business.]]Google ScholarGoogle Scholar

Index Terms

  1. A study of preferences for sharing and privacy

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              CHI EA '05: CHI '05 Extended Abstracts on Human Factors in Computing Systems
              April 2005
              1358 pages
              ISBN:1595930027
              DOI:10.1145/1056808

              Copyright © 2005 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 2 April 2005

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Acceptance Rates

              Overall Acceptance Rate6,164of23,696submissions,26%

              Upcoming Conference

              CHI '24
              CHI Conference on Human Factors in Computing Systems
              May 11 - 16, 2024
              Honolulu , HI , USA

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader