Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3411764.3445148acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article
Open access

A Design Space for Privacy Choices: Towards Meaningful Privacy Control in the Internet of Things

Published: 07 May 2021 Publication History

Abstract

“Notice and choice” is the predominant approach for data privacy protection today. There is considerable user-centered research on providing effective privacy notices but not enough guidance on designing privacy choices. Recent data privacy regulations worldwide established new requirements for privacy choices, but system practitioners struggle to implement legally compliant privacy choices that also provide users meaningful privacy control. We construct a design space for privacy choices based on a user-centered analysis of how people exercise privacy choices in real-world systems. This work contributes a conceptual framework that considers privacy choice as a user-centered process as well as a taxonomy for practitioners to design meaningful privacy choices in their systems. We also present a use case of how we leverage the design space to finalize the design decisions for a real-world privacy choice platform, the Internet of Things (IoT) Assistant, to provide meaningful privacy control in the IoT.

References

[1]
Alessandro Acquisti, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, Florian Schaub, Manya Sleeper, 2017. Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Computing Surveys (CSUR) 50, 3 (2017), 1–41.
[2]
Idris Adjerid, Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2013. Sleights of Privacy: Framing, Disclosures, and the Limits of Transparency. In Proceedings of the Ninth Symposium on Usable Privacy and Security (Newcastle, United Kingdom) (SOUPS ’13). Association for Computing Machinery, New York, NY, USA, Article 9, 11 pages. https://doi.org/10.1145/2501604.2501613
[3]
Hazim Almuhimedi. 2017. Helping Smartphone Users Manage their Privacy through Nudges. Ph.D. Dissertation. Carnegie Mellon University, Pittsburgh, PA, USA.
[4]
Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Faith Cranor, and Yuvraj Agarwal. 2015. Your Location Has Been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (Seoul, Republic of Korea) (CHI ’15). Association for Computing Machinery, New York, NY, USA, 787–796. https://doi.org/10.1145/2702123.2702210
[5]
Rebecca Balebako, Richard Shay, and Lorrie Faith Cranor. 2014. Is your inseam a biometric? a case study on the role of usability studies in developing public policy. In Workshop on Usable Security, Vol. 23.
[6]
Vinayshekhar Bannihatti Kumar, Roger Iyengar, Namita Nisal, Yuanyuan Feng, Hana Habib, Peter Story, Sushain Cherivirala, Margaret Hagan, Lorrie Cranor, Shomir Wilson, Florian Schaub, and Norman Sadeh. 2020. Finding a Choice in a Haystack: Automatic Extraction of Opt-Out Statements from Privacy Policy Text. In Proceedings of The Web Conference 2020 (Taipei, Taiwan) (WWW ’20). Association for Computing Machinery, New York, NY, USA, 1943–1954. https://doi.org/10.1145/3366423.3380262
[7]
Louise Barkhuus. 2012. The Mismeasurement of Privacy: Using Contextual Integrity to Reconsider Privacy in HCI. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Austin, Texas, USA) (CHI ’12). Association for Computing Machinery, New York, NY, USA, 367–376. https://doi.org/10.1145/2207676.2207727
[8]
Adam Barth, Anupam Datta, John C Mitchell, and Helen Nissenbaum. 2006. Privacy and contextual integrity: Framework and applications. In 2006 IEEE symposium on security and privacy (S&P’06). IEEE, 15–pp.
[9]
Ricardo Melo Bastos and Duncan Dubugras A Ruiz. 2002. Extending UML activity diagram for workflow modeling in production systems. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences. IEEE, 3786–3795.
[10]
Paola Benassi. 1999. TRUSTe: an online privacy seal program. Commun. ACM 42, 2 (1999), 56–59.
[11]
Michael Benisch, Patrick Gage Kelley, Norman Sadeh, and Lorrie Faith Cranor. 2011. Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs. Personal and Ubiquitous Computing 15, 7 (2011), 679–694.
[12]
Rainer Böhme and Stefan Köpsell. 2010. Trained to accept? A field experiment on consent dialogs. In Proceedings of the SIGCHI conference on human factors in computing systems. 2403–2406.
[13]
John J Borking, BMA Van Eck, and P Siepel. 1999. Intelligent software agents and privacy. Registratiekamer The Hague.
[14]
Cristian Bravo-Lillo, Saranga Komanduri, Lorrie Faith Cranor, Robert W Reeder, Manya Sleeper, Julie Downs, and Stuart Schechter. 2013. Your attention please: designing security-decision UIs to make genuine risks harder to ignore. In Proceedings of the Ninth Symposium on Usable Privacy and Security. 1–12.
[15]
Brazil National Congress. 2018. General Data Protection Law (English translation). https://iapp.org/resources/article/brazils-general-data-protection-law-english-translation.
[16]
Ramon Caceres and Adrian Friday. 2011. Ubicomp systems at 20: Progress, opportunities, and challenges. IEEE Pervasive Computing 11, 1 (2011), 14–21.
[17]
Fred H Cate. 2006. The failure of fair information practice principles. Consumer protection in the age of the information economy (2006).
[18]
Fred H Cate. 2010. The limits of notice and choice. IEEE Security & Privacy 8, 2 (2010), 59–62.
[19]
Andrew Chio, Georgios Bouloukakis, Cheng-Hsin Hsu, Sharad Mehrotra, and Nalini Venkatasubramanian. 2019. Adaptive Mediation for Data Exchange in IoT Systems. In Proceedings of the 18th Workshop on Adaptive and Reflexive Middleware. 1–6.
[20]
Hanbyul Choi, Jonghwa Park, and Yoonhyuk Jung. 2018. The role of privacy fatigue in online privacy behavior. Computers in Human Behavior 81 (2018), 42–51.
[21]
Richard Chow. 2017. The last mile for IoT privacy. IEEE Security & Privacy 15, 6 (2017), 73–76.
[22]
Jessica Colnago, Yuanyuan Feng, Tharangini Palanivel, Sarah Pearman, Megan Ung, Alessandro Acquisti, Lorrie Faith Cranor, and Norman Sadeh. 2020. Informing the design of a personalized privacy assistant for the internet of things. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–13.
[23]
CookieYes. 2019. GDPR cookie consent banner examples. Retrieved September 12th, 2020 from https://www.cookieyes.com/gdpr-cookie-consent-banner-examples/
[24]
Council of European Union. 2016. General Data Protection Regulation. https://gdpr-infor.eu.
[25]
Lorrie Faith Cranor. 2003. P3P: Making privacy policies more useful. IEEE Security & Privacy 1, 6 (2003), 50–55.
[26]
Lorrie Faith Cranor. 2012. Necessary but not sufficient: Standardized mechanisms for privacy notice and choice. J. on Telecomm. & High Tech. L. 10 (2012), 273.
[27]
Lorrie Faith Cranor, Praveen Guduru, and Manjula Arjula. 2006. User interfaces for privacy agents. ACM Transactions on Computer-Human Interaction (TOCHI) 13, 2(2006), 135–178.
[28]
Lorrie Faith Cranor, Hana Habib, Yixin Zou, Alessandro Acquisti, Joel Reidenberg, Norman Sadeh, and Florian Schaub. 2020. Design and Evaluation of a Usable Icon and Tagline to Signal an Opt-Out of the Sale of Personal Information as Required by CCPA. Retrieved September 13th, 2020 from https://oag.ca.gov/sites/all/files/agweb/pdfs/privacy/cranor-design-eval-usable-icon.pdf
[29]
Lorrie Faith Cranor, Kelly Idouchi, Pedro Giovanni Leon, Manya Sleeper, and Blase Ur. 2013. Are they actually any different? Comparing thousands of financial institutions’ privacy practices. In Proceedings of the Twelfth Workshop on the Economics of Information Security, Vol. 13.
[30]
Anupam Das, Martin Degeling, Daniel Smullen, and Norman Sadeh. 2018. Personalized privacy assistants for the internet of things: providing users with notice and choice. IEEE Pervasive Computing 17, 3 (2018), 35–46.
[31]
Anupam Das, Martin Degeling, Xiaoyou Wang, Junjue Wang, Norman Sadeh, and Mahadev Satyanarayanan. 2017. Assisting users in a world full of cameras: A privacy-aware infrastructure for computer vision applications. In 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). IEEE, 1387–1396.
[32]
Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, and Thorsten Holz. 2019. We value your privacy... now take some cookies: Measuring the GDPR’s impact on web privacy. In Proceedings of Network and Distributed System Security Symposium(NDSS ’19).
[33]
Jayati Dev, Emilee Rader, and Sameer Patil. 2020. Why Johnny Can’t Unsubscribe: Barriers to Stopping Unwanted Email. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–12.
[34]
Digital Advertising Alliance. 2009. Self-regulatory principles for online behavioral advertising,. Retrieved September 13th, 2020 from https://digitaladvertisingalliance.org/principles
[35]
Benchaa Djellali, Kheira Belarbi, Abdallah Chouarfia, and Pascal Lorenz. 2015. User authentication scheme preserving anonymity for ubiquitous devices. Security and Communication Networks 8, 17 (2015), 3131–3141.
[36]
Hilko Donker, Palle Klante, and Peter Gorny. 2002. The design of auditory user interfaces for blind users. In Proceedings of the second Nordic conference on Human-computer interaction. 149–156.
[37]
Yitao Duan and John Canny. 2004. Protecting user data in ubiquitous computing: Towards trustworthy environments. In International Workshop on Privacy Enhancing Technologies. Springer, 167–185.
[38]
Serge Egelman, Janice Tsai, Lorrie Faith Cranor, and Alessandro Acquisti. 2009. Timing is everything? The effects of timing and placement of online privacy indicators. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 319–328.
[39]
Marc Elshof. 2019. GDPR Update - EDPB video surveillance guidelines. Retrieved September 7th, 2020 from https://www.jdsupra.com/legalnews/gdpr-update-edpb-video-surveillance-94566/
[40]
Pardis Emami-Naeini, Yuvraj Agarwal, Lorrie Faith Cranor, and Hanan Hibshi. 2020. Ask the Experts: What Should Be on an IoT Privacy and Security Label?(2020). arXiv:2002.04631
[41]
José Estrada-Jiménez, Javier Parra-Arnau, Ana Rodríguez-Hoyos, and Jordi Forné. 2017. Online advertising: Analysis of privacy threats and protection approaches. Computer Communications 100 (2017), 32–51.
[42]
Benjamin Fabian, Tatiana Ermakova, and Tino Lentz. 2017. Large-Scale Readability Analysis of Privacy Policies. In Proceedings of the International Conference on Web Intelligence (Leipzig, Germany) (WI ’17). Association for Computing Machinery, New York, NY, USA, 18–25. https://doi.org/10.1145/3106426.3106427
[43]
Kassem Fawaz, Thomas Linden, and Hamza Harkous. 2019. The Applications of Machine Learning in Privacy Notice and Choice. In 2019 11th International Conference on Communication Systems & Networks (COMSNETS). IEEE, 118–124.
[44]
Federal Trade Commission. 2013. Mobile Privacy Disclosures: Building Trust Through Transparency (FTC Staff Report). https://www.ftc.gov/reports/mobile-privacy-disclosures-building-trust-through-transparency-federal-trade-commission.
[45]
Federal Trade Commission. 2015. Internet of Things: Privacy & Security in a Connected World (FTC Staff Report). https://www.ftc.gov/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things.
[46]
Adrienne Porter Felt, Serge Egelman, Matthew Finifter, Devdatta Akhawe, and David Wagner. 2012. How to ask for permission. In Proceedings of the 7th USENIX conference on Hot Topics in Security. 7–7.
[47]
Stacia Garlach and Daniel Suthers. 2018. I’m supposed to see that?’AdChoices Usability in the Mobile Environment. In Proceedings of the 51st Hawaii International Conference on System Sciences.
[48]
Joshua Gluck, Florian Schaub, Amy Friedman, Hana Habib, Norman Sadeh, Lorrie Faith Cranor, and Yuvraj Agarwal. 2016. How short is too short? Implications of length and framing on the effectiveness of privacy notices. In Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016). 321–340.
[49]
Nathaniel S Good, Jens Grossklags, Deirdre K Mulligan, and Joseph A Konstan. 2007. Noticing notice: a large-scale experiment on the timing of software license agreements. In Proceedings of the SIGCHI conference on Human factors in computing systems. 607–616.
[50]
Lawrence O Gostin. 2001. National health information privacy: regulations under the Health Insurance Portability and Accountability Act. Jama 285, 23 (2001), 3015–3021.
[51]
Hana Habib, Sarah Pearman, Jiamin Wang, Yixin Zou, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, and Florian Schaub. 2020. ” It’s a scavenger hunt”: Usability of Websites’ Opt-Out and Data Deletion Choices. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–12.
[52]
Hana Habib, Yixin Zou, Aditi Jannu, Neha Sridhar, Chelse Swoopes, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, and Florian Schaub. 2019. An empirical analysis of data deletion and opt-out choices on 150 websites. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019).
[53]
Hana Habib, Yixin Zou, Yaxing Yao, Alessandro Acquisti, Lorrie Faith Cranor, Joel Reidenberg, Norman Sadeh, and Florian Schaub. 2021. Toggles, Dollar Signs, and Triangles: How to (In)EffectivelyConvey Privacy Choices with Icons and Link Texts. In Conference on Human Factors in Computing Systems (CHI). ACM. https://doi.org/10.1145/3411764.3445387
[54]
Marian Harbach, Markus Hettig, Susanne Weber, and Matthew Smith. 2014. Using personal examples to improve risk communication for security & privacy decisions. In Proceedings of the SIGCHI conference on human factors in computing systems. 2647–2656.
[55]
Drew Harwell and Abha Bhattarai. 2018. Inside Amazon Go: The camera-filled convenience store that watches you back. Retrieved September 13th, 2020 from https://www.washingtonpost.com/news/business/wp/2018/01/22/inside-amazon-go-the-camera-filled-convenience-store-that-watches-you-back/
[56]
Alan R Hevner, Salvatore T March, Jinsoo Park, and Sudha Ram. 2004. Design science in information systems research. MIS quarterly (2004), 75–105.
[57]
Chris Hoffman. 2020. Why Your iPhone Keeps Asking About Background Location Use. Retrieved September 15th, 2020 from https://www.howtogeek.com/563557/why-your-iphone-keeps-asking-you-about-background-location-use/
[58]
Giovanni Iachello and Jason Hong. 2007. End-user privacy in human-computer interaction. Vol. 1. Now Publishers Inc.
[59]
Laurel Jamtgaard. 2000. Big Bird Meets Big Brother: A Look at the Children’s Online Privacy Protection Act. Santa Clara High Technology Law Journal 16, 2 (2000), 385.
[60]
Farzaneh Karegar, John Sören Pettersson, and Simone Fischer-Hübner. 2020. The dilemma of user engagement in privacy notices: Effects of interaction modes and habituation on user attention. ACM Transactions on Privacy and Security (TOPS) 23, 1 (2020), 1–38.
[61]
Mark J Keith, Courtenay Maynes, Paul Benjamin Lowry, and Jeffry Babb. 2014. Privacy fatigue: The effect of privacy control complexity on consumer electronic information disclosure. In International Conference on Information Systems (ICIS 2014), Auckland, New Zealand, December. 14–17.
[62]
Patrick Gage Kelley, Sunny Consolvo, Lorrie Faith Cranor, Jaeyeon Jung, Norman Sadeh, and David Wetherall. 2012. A Conundrum of Permissions: Installing Applications on an Android Smartphone. In Financial Cryptography and Data Security, Jim Blyth, Sven Dietrich, and L. Jean Camp (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 68–79.
[63]
Patrick Gage Kelley, Lorrie Faith Cranor, and Norman Sadeh. 2013. Privacy as part of the app decision-making process. In Proceedings of the SIGCHI conference on human factors in computing systems. 3393–3402.
[64]
Agnieszka Kitkowska, Mark Warner, Yefim Shulman, Erik Wästlund, and Leonardo A Martucci. 2020. Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affect. In Sixteenth Symposium on Usable Privacy and Security ({SOUPS} 2020). 437–456.
[65]
Saranga Komanduri, Richard Shay, Greg Norcie, and Blase Ur. 2011. Adchoices-compliance with online behavioral advertising notice and choice requirements. ISJLP 7(2011), 603.
[66]
Bastian Könings, Florian Schaub, and Michael Weber. 2013. PriFi beacons: piggybacking privacy implications on wifi beacons. In Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication. 83–86.
[67]
Bastian Könings, Sebastian Thoma, Florian Schaub, and Michael Weber. 2014. Pripref broadcaster: Enabling users to broadcast privacy preferences in their physical proximity. In Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia. 133–142.
[68]
Costas Lambrinoudakis. 2018. The general data protection regulation (GDPR) era: ten steps for compliance of data processors and data controllers. In International Conference on Trust and Privacy in Digital Business. Springer, 3–8.
[69]
Marc Langheinrich. 2001. Privacy by design—principles of privacy-aware ubiquitous systems. In International conference on Ubiquitous Computing. Springer, 273–291.
[70]
Daniel Le Métayer and Shara Monteleone. 2009. Automated consent through privacy agents: Legal requirements and technical architecture. Computer law & Security review 25, 2 (2009), 136–144.
[71]
Nicole Lee. 2019. You can now ask Alexa to delete your voice history. Retrieved September 16th, 2020 from https://www.engadget.com/2019-05-29-amazon-alexa-voice-deletion.html
[72]
Pedro Leon, Blase Ur, Richard Shay, Yang Wang, Rebecca Balebako, and Lorrie Cranor. 2012. Why Johnny can’t opt out: a usability evaluation of tools to limit online behavioral advertising. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 589–598.
[73]
Pedro Giovanni Leon, Justin Cranshaw, Lorrie Faith Cranor, Jim Graves, Manoj Hastak, Blase Ur, and Guzi Xu. 2012. What Do Online Behavioral Advertising Privacy Disclosures Communicate to Users?. In Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society (Raleigh, North Carolina, USA) (WPES ’12). Association for Computing Machinery, New York, NY, USA, 19–30. https://doi.org/10.1145/2381966.2381970
[74]
Stefan Leuthold, Javier A Bargas-Avila, and Klaus Opwis. 2008. Beyond web content accessibility guidelines: Design of enhanced text user interfaces for blind internet users. International Journal of Human-Computer Studies 66, 4 (2008), 257–270.
[75]
Jialiu Lin, Shahriyar Amini, Jason I. Hong, Norman Sadeh, Janne Lindqvist, and Joy Zhang. 2012. Expectation and Purpose: Understanding Users’ Mental Models of Mobile App Privacy through Crowdsourcing. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (Pittsburgh, Pennsylvania) (UbiComp ’12). Association for Computing Machinery, New York, NY, USA, 501–510. https://doi.org/10.1145/2370216.2370290
[76]
Jialiu Lin, Michael Benisch, Norman Sadeh, Jianwei Niu, Jason Hong, Banghui Lu, and Shaohui Guo. 2013. A Comparative Study of Location-sharing Privacy Preferences in the United States and China. Personal Ubiquitous Comput. 17, 4 (April 2013), 697–711.
[77]
Bin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Zhang, Norman Sadeh, Alessandro Acquisti, and Yuvraj Agarwal. 2016. Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. In Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security (Denver, CO, USA) (SOUPS ’16). USENIX Association, USA, 27–41.
[78]
Bin Liu, Jialiu Lin, and Norman Sadeh. 2014. Reconciling Mobile App Privacy and Usability on Smartphones: Could User Privacy Profiles Help?. In Proceedings of the 23rd International Conference on World Wide Web (Seoul, Korea) (WWW ’14). ACM, New York, NY, USA, 201–212. https://doi.org/10.1145/2566486.2568035
[79]
Duen-Ren Liu and Minxin Shen. 2003. Workflow modeling for virtual processes: an order-preserving process-view approach. Information Systems 28, 6 (2003), 505–532.
[80]
Kalle Lyytinen and Youngjin Yoo. 2002. Ubiquitous computing. Commun. ACM 45, 12 (2002), 63–96.
[81]
Allan MacLean, Richard M Young, Victoria ME Bellotti, and Thomas P Moran. 1991. Questions, options, and criteria: Elements of design space analysis. Human–computer interaction 6, 3-4 (1991), 201–250.
[82]
Tobias Matzner. 2014. Why privacy is not enough privacy in the context of “ubiquitous computing” and “big data”. Journal of Information, Communication and Ethics in Society 12, 2(2014), 93–106.
[83]
Aleecia M McDonald and Lorrie Faith Cranor. 2008. The cost of reading privacy policies. I/S: A Journal of Law and Policy for the Information Society 4 (2008), 540–565.
[84]
Aleecia M McDonald and Lorrie Faith Cranor. 2010. Americans’ attitudes about internet behavioral advertising practices. In Proceedings of the 9th annual ACM workshop on Privacy in the electronic society. 63–72.
[85]
Aleecia M. McDonald, Robert W. Reeder, Patrick Gage Kelley, and Lorrie Faith Cranor. 2009. A Comparative Study of Online Privacy Policies and Formats. In Privacy Enhancing Technologies, Ian Goldberg and Mikhail J. Atallah (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 37–55.
[86]
Diane McKerlie and Allan MacLean. 1994. Reasoning with design rationale: practical experience with design space analysis. Design Studies 15, 2 (1994), 214–226.
[87]
Sharad Mehrotra, Alfred Kobsa, Nalini Venkatasubramanian, and Siva Raj Rajagopalan. 2016. TIPPERS: A privacy cognizant IoT environment. In 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops). IEEE, 1–6.
[88]
George R Milne, Mary J Culnan, and Henry Greene. 2006. A longitudinal assessment of online privacy notice readability. Journal of Public Policy & Marketing 25, 2 (2006), 238–249.
[89]
Mozilla Wiki. 2011. Privacy icons. Mozilla. Retrieved September 15th, 2020 from https://wiki.mozilla.org/Privacy_Icons
[90]
Jakob Nielsen and Rolf Molich. 1990. Heuristic Evaluation of User Interfaces. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Seattle, Washington, USA) (CHI ’90). Association for Computing Machinery, New York, NY, USA, 249–256. https://doi.org/10.1145/97243.97281
[91]
Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press.
[92]
Midas Nouwens, Ilaria Liccardi, Michael Veale, David Karger, and Lalana Kagal. 2020. Dark Patterns after the GDPR: Scraping Consent Pop-Ups and Demonstrating Their Influence. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–13. https://doi.org/10.1145/3313831.3376321
[93]
Office of the California Attorney General. 2020. California Consumer Privacy Act (CCPA): First Modified Regulations. https://oag.ca.gov/sites/all/files/agweb/pdfs/privacy/ccpa-text-of-mod-clean-020720.pdf.
[94]
Douglas O’Shaughnessy. 2008. Automatic speech recognition: History, methods and challenges. Pattern Recognition 41, 10 (2008), 2965–2979.
[95]
Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H Diallo, and Ardalan Amiri Sani. 2019. IoT Notary: Sensor data attestation in smart environment. In 2019 IEEE 18th International Symposium on Network Computing and Applications (NCA). IEEE, 1–9.
[96]
Matthew Nicholas Papakipos and David Harry Garcia. 2017. Initializing camera subsystem for face detection based on sensor inputs. US Patent 9,596,084.
[97]
Primal Pappachan, Martin Degeling, Roberto Yus, Anupam Das, Sruti Bhagavatula, William Melicher, Pardis Emami Naeini, Shikun Zhang, Lujo Bauer, Alfred Kobsa, 2017. Towards privacy-aware smart buildings: Capturing, communicating, and enforcing privacy policies and preferences. In 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW). IEEE, 193–198.
[98]
Sameer Patil, Roberto Hoyle, Roman Schlegel, Apu Kapadia, and Adam J Lee. 2015. Interrupt now or inform later? Comparing immediate and delayed privacy feedback. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 1415–1418.
[99]
Sameer Patil, Roman Schlegel, Apu Kapadia, and Adam J Lee. 2014. Reflection or action? how feedback and control affect location sharing decisions. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 101–110.
[100]
Ken Peffers, Tuure Tuunanen, Marcus A Rothenberger, and Samir Chatterjee. 2007. A design science research methodology for information systems research. Journal of management information systems 24, 3 (2007), 45–77.
[101]
Charith Perera, Rajiv Ranjan, Lizhe Wang, Samee U Khan, and Albert Y Zomaya. 2015. Big data privacy in the internet of things era. IT Professional 17, 3 (2015), 32–39.
[102]
Charith Perera, Arkady Zaslavsky, Peter Christen, and Dimitrios Georgakopoulos. 2013. Context aware computing for the internet of things: A survey. IEEE communications surveys & tutorials 16, 1 (2013), 414–454.
[103]
Nisarg Raval, Animesh Srivastava, Kiron Lebeck, Landon Cox, and Ashwin Machanavajjhala. 2014. Markit: Privacy markers for protecting visual secrets. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. 1289–1295.
[104]
Joel R Reidenberg, Travis Breaux, Lorrie Faith Cranor, Brian French, Amanda Grannis, James T Graves, Fei Liu, Aleecia McDonald, Thomas B Norton, Rohan Ramanath, Cameron Russell, Norman Sadeh, and Florian Schaub. 2015. Disagreeable privacy policies: Mismatches between meaning and users’ understanding. Berkeley Technology Law Journal 30 (2015), 39.
[105]
Joel R Reidenberg, N Cameron Russell, Alexander J Callen, Sophia Qasir, and Thomas B Norton. 2015. Privacy harms and the effectiveness of the notice and choice framework. ISJLP 11(2015), 485.
[106]
Joel R Reidenberg, N Cameron Russell, Vlad Herta, William Sierra-Rocafort, and Thomas B Norton. 2018. Trustworthy Privacy Indicators: Grades, Labels, Certifications, and Dashboards. Washington University Law Review 96 (2018), 1409.
[107]
Christian Richthammer, Michael Netter, Moritz Riesner, and Günther Pernul. 2013. Taxonomy for social network data types from the viewpoint of privacy and user control. In 2013 International Conference on Availability, Reliability and Security. IEEE, 141–150.
[108]
Kay Romer and Friedemann Mattern. 2004. The design space of wireless sensor networks. IEEE wireless communications 11, 6 (2004), 54–61.
[109]
Jeffrey Rosen. 2012. The Right to Be Forgotten. Stanford Law Review 64(2012).
[110]
Arianna Rossi and Monica Palmirani. 2019. DaPIS: a Data Protection Icon Set to Improve Information Transparency under the GDPR. Knowledge of the Law in the Big Data Age. Frontiers 252 (2019), 181–195.
[111]
John A Rothchild. 2018. Against Notice and Choice: The Manifest Failure of the Proceduralist Paradigm to Protect Privacy Online (or Anywhere Else). Cleveland State Law Review 66, 3 (2018), 559.
[112]
Iskander Sanchez-Rola, Matteo Dell’Amico, Platon Kotzias, Davide Balzarotti, Leyla Bilge, Pierre-Antoine Vervier, and Igor Santos. 2019. Can I Opt Out Yet? GDPR and the Global Illusion of Cookie Control. In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security (Auckland, New Zealand) (Asia CCS ’19). Association for Computing Machinery, New York, NY, USA, 340–351. https://doi.org/10.1145/3321705.3329806
[113]
Florian Schaub, Rebecca Balebako, and Lorrie Faith Cranor. 2017. Designing effective privacy notices and controls. IEEE Internet Computing(2017).
[114]
Florian Schaub, Rebecca Balebako, Adam L Durity, and Lorrie Faith Cranor. 2015. A design space for effective privacy notices. In Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015). 1–17.
[115]
Florian Schaub, Bastian Könings, and Michael Weber. 2015. Context-adaptive privacy: Leveraging context awareness to support privacy decision making. IEEE Pervasive Computing 14, 1 (2015), 34–43.
[116]
Jeremy Schiff, Marci Meingast, Deirdre K Mulligan, Shankar Sastry, and Ken Goldberg. 2009. Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In Protecting Privacy in Video Surveillance. Springer, 65–89.
[117]
Paul M Schwartz. 1999. Privacy and Democracy in Cyberspace. Vanderbilt Law Review 52, 6 (1999), 1607.
[118]
Paul M Schwartz and Daniel Solove. 2009. Notice & Choice. In The Second NPLAN/BMSG Meeting on Digital Media and Marketing to Children.
[119]
Secretary’s Advisory Committee on Automated Personal Data Systems. 1973. Records, Computers, and the Rights of Citizens: Report. US Department of Health, Education & Welfare.
[120]
Robert H Sloan and Richard Warner. 2014. Beyond notice and choice: Privacy, norms, and consent. The Journal of High Technology Law 14 (2014), 370.
[121]
Daniel Smullen, Yuanyuan Feng, Shikun Aerin Zhang, and Norman Sadeh. 2020. The Best of Both Worlds: Mitigating Trade-offs Between Accuracy and User Burden in Capturing Mobile App Privacy Preferences. Proceedings on Privacy Enhancing Technologies 2020, 1(2020), 195–215.
[122]
Monica Tentori, Jesus Favela, and Marcela D Rodriguez. 2006. Privacy-aware autonomous agents for pervasive healthcare. IEEE Intelligent Systems 21, 6 (2006), 55–62.
[123]
Ash Turner. 2020. How many smartphones are in the world?Retrieved September 10th, 2020 from https://www.bankmycell.com/blog/how-many-phones-are-in-the-world
[124]
Blase Ur, Pedro Giovanni Leon, Lorrie Faith Cranor, Richard Shay, and Yang Wang. 2012. Smart, useful, scary, creepy: perceptions of online behavioral advertising. In proceedings of the eighth symposium on usable privacy and security. 1–15.
[125]
Christine Utz, Martin Degeling, Sascha Fahl, Florian Schaub, and Thorsten Holz. 2019. (Un)Informed Consent: Studying GDPR Consent Notices in the Field. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (London, United Kingdom) (CCS ’19). Association for Computing Machinery, New York, NY, USA, 973–990. https://doi.org/10.1145/3319535.3354212
[126]
Ari Ezra Waldman. 2018. Privacy, notice, and design. Stanford Technology Law Review 21, 1 (2018).
[127]
Ari Ezra Waldman. 2020. Cognitive biases, dark patterns, and the ‘privacy paradox’. Current opinion in psychology 31 (2020), 105–109.
[128]
Junjue Wang, Brandon Amos, Anupam Das, Padmanabhan Pillai, Norman Sadeh, and Mahadev Satyanarayanan. 2018. Enabling live video analytics with a scalable and privacy-aware framework. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 14, 3s (2018), 1–24.
[129]
Jason Watson, Heather Richter Lipford, and Andrew Besmer. 2015. Mapping user preference to privacy default settings. ACM Transactions on Computer-Human Interaction (TOCHI) 22, 6(2015), 1–20.
[130]
Mark Weiser. 1993. Some computer science issues in ubiquitous computing. Commun. ACM 36, 7 (1993), 75–84.
[131]
Zack Whittaker. 2019. iOS 13 will let you limit app location access to ”just once”. Retrieved September 12th, 2020 from https://techcrunch.com/2019/06/03/apple-ios-13-location-privacy/
[132]
Michael S Wogalter, Vincent C Conzola, and Tonya L Smith-Jackson. 2002. Research-based guidelines for warning design and evaluation. Applied Ergonomics 33, 3 (2002), 219–230.
[133]
Heng Xu, Robert E Crossler, and France BéLanger. 2012. A value sensitive design investigation of privacy enhancing tools in web browsers. Decision support systems 54, 1 (2012), 424–433.
[134]
Jedidiah Yueh. 2018. GDPR will make big tech even bigger. Retrieved September 15th, 2020 from https://www.forbes.com/sites/forbestechcouncil/2018/06/26/gdpr-will-make-big-tech-even-bigger/#77a24cf82592

Cited By

View all
  • (2024)Designing the informing process with streamers and bystanders in live streamingProceedings of the Twentieth USENIX Conference on Usable Privacy and Security10.5555/3696899.3696916(315-332)Online publication date: 12-Aug-2024
  • (2024)IoT Privacy Risks RevealedEntropy10.3390/e2607056126:7(561)Online publication date: 29-Jun-2024
  • (2024)AccessShare: Co-designing Data Access and Sharing with Blind PeopleProceedings of the 26th International ACM SIGACCESS Conference on Computers and Accessibility10.1145/3663548.3675612(1-16)Online publication date: 27-Oct-2024
  • Show More Cited By

Index Terms

  1. A Design Space for Privacy Choices: Towards Meaningful Privacy Control in the Internet of Things
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        CHI '21: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems
        May 2021
        10862 pages
        ISBN:9781450380966
        DOI:10.1145/3411764
        This work is licensed under a Creative Commons Attribution International 4.0 License.

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 07 May 2021

        Check for updates

        Author Tags

        1. Internet of Things
        2. design space
        3. privacy choice
        4. usable privacy

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Funding Sources

        Conference

        CHI '21
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

        Upcoming Conference

        CHI 2025
        ACM CHI Conference on Human Factors in Computing Systems
        April 26 - May 1, 2025
        Yokohama , Japan

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)1,450
        • Downloads (Last 6 weeks)125
        Reflects downloads up to 02 Feb 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Designing the informing process with streamers and bystanders in live streamingProceedings of the Twentieth USENIX Conference on Usable Privacy and Security10.5555/3696899.3696916(315-332)Online publication date: 12-Aug-2024
        • (2024)IoT Privacy Risks RevealedEntropy10.3390/e2607056126:7(561)Online publication date: 29-Jun-2024
        • (2024)AccessShare: Co-designing Data Access and Sharing with Blind PeopleProceedings of the 26th International ACM SIGACCESS Conference on Computers and Accessibility10.1145/3663548.3675612(1-16)Online publication date: 27-Oct-2024
        • (2024)Transformations in participants —Toward citizen-led participatory speculative design to create preferable data-driven workplaces in JapanProceedings of the Participatory Design Conference 2024: Exploratory Papers and Workshops - Volume 210.1145/3661455.3669889(183-189)Online publication date: 11-Aug-2024
        • (2024)Designing Privacy-Aware IoT Applications for Unregulated DomainsACM Transactions on Internet of Things10.1145/36484805:2(1-32)Online publication date: 23-Apr-2024
        • (2024)Motivating Users to Attend to Privacy: A Theory-Driven Design StudyProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661544(258-275)Online publication date: 1-Jul-2024
        • (2024)Legally Binding but Unfair? Towards Assessing Fairness of Privacy PoliciesProceedings of the 10th ACM International Workshop on Security and Privacy Analytics10.1145/3643651.3659890(15-22)Online publication date: 21-Jun-2024
        • (2024)Form-From: A Design Space of Social Media SystemsProceedings of the ACM on Human-Computer Interaction10.1145/36410068:CSCW1(1-47)Online publication date: 26-Apr-2024
        • (2024)Communicating the Privacy-Utility Trade-off: Supporting Informed Data Donation with Privacy Decision Interfaces for Differential PrivacyProceedings of the ACM on Human-Computer Interaction10.1145/36373098:CSCW1(1-56)Online publication date: 26-Apr-2024
        • (2024)Bring Privacy To The Table: Interactive Negotiation for Privacy Settings of Shared Sensing DevicesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642897(1-22)Online publication date: 11-May-2024
        • Show More Cited By

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Login options

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media