Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3272973.3273012acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
abstract

Privacy in Context: Critically Engaging with Theory to Guide Privacy Research and Design

Published: 30 October 2018 Publication History

Abstract

Privacy has been a key research theme in the CSCW and HCI communities, but the term is often used in an ad hoc and fragmented way. This is likely due to the fact that privacy is a complex and multi-faceted concept. This one-day workshop will facilitate discourse around key privacy theories and frameworks that can inform privacy research with the goal of producing guidelines for privacy researchers on how and when to incorporate which theories into various aspects of their empirical privacy research. This will lay the groundwork to move the privacy field forward.

References

[1]
Mark S. Ackerman, Lorrie Faith Cranor, and Joseph Reagle. 1999. Privacy in e-Commerce: Examining User Scenarios and Privacy Preferences. Proceedings of the 1st ACM Conference on Electronic Commerce, ACM, 1--8.
[2]
Alessandro Acquisti and Ralph Gross. 2006. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In Privacy enhancing technologies. 36--58.
[3]
Irwin Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Monterey, CA.
[4]
Oshrat Ayalon and Eran Toch. 2017. Not Even Past: Information Aging and Temporal Privacy in Online Social Networks. Human-Computer Interaction 32, 2: 73--102.
[5]
Karla Badillo-Urquiola, Xinru Page, and Pamela Wisniewski. 2018. Literature Review: Examining Contextual Integrity within Human-Computer Interaction. .
[6]
Louise Barkhuus. 2012. The Mismeasurement of Privacy: Using Contextual Integrity to Reconsider Privacy in HCI. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 367--376.
[7]
Susan B. Barnes. 2006. A privacy paradox: Social networking in the United States. First Monday 11, 9.
[8]
Paul Dourish and Ken Anderson. 2006. Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. Human--Computer Interaction 21, 3: 319--342.
[9]
Haiyan Jia and Heng Xu. 2016. Measuring individuals' concerns over collective privacy on social networking sites. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 10, 1.
[10]
Airi Lampinen, Vilma Lehtinen, Asko Lehmuskallio, and Sakari Tamminen. 2011. We're in It Together: Interpersonal Management of Disclosure in Social Network Services. SIGCHI Conference on Human Factors in Computing Systems, 3217--3226.
[11]
Airi Lampinen, Fred Stutzman, and Markus Bylund. 2011. "Privacy for a Networked World": Bridging Theory and Design. SIGCHI Conference on Human Factors in Computing Systems.
[12]
Robert S. Laufer and Maxine Wolfe. 2010. Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory. Journal of Social Issues 33, 3: 22--42.
[13]
Heather Richter Lipford, Pamela J. Wisniewski, Cliff Lampe, Lorraine Kisselburgh, and Kelly Caine. 2012. Reconciling privacy with social media. Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work Companion, ACM, 19--20.
[14]
Naresh K. Malhotra, Sung S. Kim, and James Agarwal. 2004. Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research 15, 4: 336--355.
[15]
Helen Nissenbaum. 2004. Privacy as Contextual Integrity. Washington Law Review 79, 119.
[16]
Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press.
[17]
Patricia A. Norberg, Daniel R. Horne, and David A. Horne. 2007. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs 41, 1: 100--126.
[18]
Judith S. Olson, Jonathan Grudin, and Eric Horvitz. 2005. A Study of Preferences for Sharing and Privacy. CHI '05 Extended Abstracts on Human Factors in Computing Systems, ACM, 1985--1988.
[19]
Xinru Page, Alfred Kobsa, and Bart P. Knijnenburg. 2012. Don't Disturb My Circles! Boundary Preservation Is at the Center of Location-Sharing Concerns. Sixth International AAAI Conference on Weblogs and Social Media.
[20]
Leysia Palen and Paul Dourish. 2003. Unpacking "privacy" for a networked world. Proceedings of the conference on Human factors in computing systems - CHI '03: 129.
[21]
Sandra Sporbert Petronio. 2002. Boundaries of Privacy: Dialects of Disclosure. SUNY Press.
[22]
Osborne M. Reynolds. 1969. Review of Privacy and Freedom. Administrative Law Review 22, 1: 101--106.
[23]
Daniel J Solove. 2006. A taxonomy of privacy. University of Pennsylvania Law Review 154, 3: 477--560.
[24]
Luke Stark, Jen King, Xinru Page, et al. 2016. Bridging the Gap Between Privacy by Design and Privacy in Practice. Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, ACM, 3415--3422.
[25]
Zeynep Tufekci. 2008. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites. Bulletin of Science, Technology & Society 28, 1: 20--36.
[26]
Jessica Vitak, Pamela Wisniewski, Xinru Page, et al. 2015. The Future of Networked Privacy: Challenges and Opportunities. Proceedings of the 18th ACM Conference Companion on Computer Supported Cooperative Work & Social Computing, ACM, 267--272.
[27]
Yang Wang, Huichuan Xia, Yaxing Yao, and Yun Huang. 2016. Flying Eyes and Hidden Controllers: A Qualitative Study of People's Privacy Perceptions of Civilian Drones in The US. Proceedings on Privacy Enhancing Technologies 2016, 3: 172--190.
[28]
Daricia Wilkinson, Moses Namara, Karla Badillo-Urquiola, et al. 2018. Moving Beyond a "One-size Fits All": Exploring Individual Differences in Privacy. Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, ACM, W16:1--W16:8.
[29]
Pamela Wisniewski, A.K.M. Najmul Islam, Bart P. Knijnenburg, and Sameer Patil. 2015. Give Social Network Users the Privacy They Want. Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, ACM, 1427--1441.
[30]
Pamela J. Wisniewski, Bart P. Knijnenburg, and Heather Richter Lipford. 2017. Making Privacy Personal. Int. J. Hum.-Comput. Stud. 98, C: 95--108.

Cited By

View all
  • (2024)A Roadmap for Applying the Contextual Integrity Framework in Qualitative Privacy ResearchProceedings of the ACM on Human-Computer Interaction10.1145/36537108:CSCW1(1-29)Online publication date: 26-Apr-2024
  • (2024)Strategies of Product Managers: Negotiating Social Values in Digital Product DesignProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642409(1-17)Online publication date: 11-May-2024
  • (2024)Beyond digital privacy: Uncovering deeper attitudes toward privacy in cameras among older adultsInternational Journal of Human-Computer Studies10.1016/j.ijhcs.2024.103345192(103345)Online publication date: Dec-2024
  • Show More Cited By

Index Terms

  1. Privacy in Context: Critically Engaging with Theory to Guide Privacy Research and Design

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CSCW '18 Companion: Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing
    October 2018
    518 pages
    ISBN:9781450360180
    DOI:10.1145/3272973
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 30 October 2018

    Check for updates

    Author Tags

    1. contextual integrity
    2. frameworks
    3. privacy
    4. theory

    Qualifiers

    • Abstract

    Conference

    CSCW '18
    Sponsor:

    Acceptance Rates

    CSCW '18 Companion Paper Acceptance Rate 105 of 385 submissions, 27%;
    Overall Acceptance Rate 2,235 of 8,521 submissions, 26%

    Upcoming Conference

    CSCW '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)48
    • Downloads (Last 6 weeks)8
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Roadmap for Applying the Contextual Integrity Framework in Qualitative Privacy ResearchProceedings of the ACM on Human-Computer Interaction10.1145/36537108:CSCW1(1-29)Online publication date: 26-Apr-2024
    • (2024)Strategies of Product Managers: Negotiating Social Values in Digital Product DesignProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642409(1-17)Online publication date: 11-May-2024
    • (2024)Beyond digital privacy: Uncovering deeper attitudes toward privacy in cameras among older adultsInternational Journal of Human-Computer Studies10.1016/j.ijhcs.2024.103345192(103345)Online publication date: Dec-2024
    • (2023)Youth understandings of online privacy and securityProceedings of the Nineteenth USENIX Conference on Usable Privacy and Security10.5555/3632186.3632208(399-416)Online publication date: 7-Aug-2023
    • (2023)Privacy Legislation as Business Risks: How GDPR and CCPA are Represented in Technology Companies' Investment Risk DisclosuresProceedings of the ACM on Human-Computer Interaction10.1145/35795157:CSCW1(1-26)Online publication date: 16-Apr-2023
    • (2023)Disability-First Design and Creation of A Dataset Showing Private Visual Information Collected With People Who Are BlindProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3580922(1-15)Online publication date: 19-Apr-2023
    • (2023)Privacy governance not included: analysis of third parties in learning management systemsInformation and Learning Sciences10.1108/ILS-04-2023-0033124:9/10(326-348)Online publication date: 26-Sep-2023
    • (2022)Privacy Theories and FrameworksModern Socio-Technical Perspectives on Privacy10.1007/978-3-030-82786-1_2(15-41)Online publication date: 9-Feb-2022
    • (2021)Tactics of Soft Resistance in User Experience Professionals' Values WorkProceedings of the ACM on Human-Computer Interaction10.1145/34794995:CSCW2(1-28)Online publication date: 18-Oct-2021
    • (2020)Making context the central concept in privacy engineeringResearch and Practice in Technology Enhanced Learning10.1186/s41039-020-00141-915:1Online publication date: 19-Oct-2020
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media