Skip to main content

Privacy Considerations in Awareness Systems: Designing with Privacy in Mind

  • Chapter
  • First Online:
Awareness Systems

Part of the book series: Human-Computer Interaction Series ((HCIS))

Abstract

The earlier chapters of this book presented a conceptual understanding of awareness (Eggen and van Mensvoort, 2009, in this volume; Metaxas and Markopoulos, 2009, in this volume). A historical account (Rittenbruch and McEwan, 2009, in this volume) as well as descriptions of various implementations (see Part III) illustrate how various systems have attempted to foster greater awareness. A common challenge faced by all awareness systems is the tension with an individual’s desire for privacy (Hudson and Smith, 1996).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The data were obtained through a search in WorldCat, the world’s largest library network with 1.2 billion items from the catalogues of more than 10,000 libraries worldwide. WorldCat removes duplicates from the retrieval results.

  2. 2.

    Palen (1999) found that individuals with unusually restrictive, or unusually liberal, calendar access settings often had immediate colleagues with similar access configurations.

  3. 3.

    It is also important to note that researchers have been exploring systems that could be built on top of other systems to make implicit aspects of awareness more explicit (Fisher and Dourish, 2004; Froehlich and Dourish, 2004).

References

  • Ackerman, M.S.: The Intellectual Challenge of CSCW: The Gap Between Social Requirements and Technical Feasibility. Human–Computer Interaction 15, 179–203 (2000)

    Article  Google Scholar 

  • Ackerman, M.S., Cranor, L.: Privacy Critics: UI Components to Safeguard Users’ Privacy. In: CHI ‘99: CHI ‘99 Extended Abstracts on Human Factors in Computing Systems, pp. 258–259. ACM, New York, NY (1999). DOI http://doi.acm.org/10.1145/632716.632875

  • Ackerman, M.S., Starr, B., Hindus, D., Mainwaring, S.D.: Hanging on the ‘Wire: A Field Study of an Audio-only Media Space. ACM Trans. Computer–Human Interaction 4(1), 39–66 (1997). DOI http://doi.acm.org/10.1145/244754.244756

  • Adams, A.: Users’ Perception of Privacy in Multimedia Communication. In: CHI ‘99: CHI ‘99 Extended Abstracts on Human Factors in Computing Systems, pp. 53–54. ACM, New York, NY (1999). DOI http://doi.acm.org/10.1145/632716.632752

  • Adams, A., Sasse, M.A.: Privacy Issues in Ubiquitous Multimedia Environments: Wake Sleeping Dogs, or Let Them Lie? In: Seventh IFIP Conference on Human–Computer Interaction INTERACT’99, pp. 214–221 (1999)

    Google Scholar 

  • Agre, P.E., Rotenberg, M. (eds.): Technology and Privacy: The New Landscape. MIT Press, Cambridge, MA (1997)

    Google Scholar 

  • Altman, I.: The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding. Brooks/Cole, Monterey, CA (1975)

    Google Scholar 

  • Altman, I.: Privacy Regulation: Culturally Universal or Culturally Specific? Journal of Social Issues 3(3), 66–84 (1977)

    Article  MathSciNet  Google Scholar 

  • Appelt, W.: WWW Based Collaboration with the BSCW System. In: SOFSEM ‘99: Proceedings of the 26th Conference on Current Trends in Theory and Practice of Informatics on Theory and Practice of Informatics, pp. 66–78. Springer-Verlag, London, UK (1999)

  • Begole, J.B., Tang, J.C., Smith, R.B., Yankelovich, N.: Work Rhythms: Analyzing Visualizations of Awareness Histories of Distributed Groups. In: CSCW ‘02: Proceedings of the 2002 ACM Conference on Computer Supported Cooperative Work, pp. 334–343. ACM, New York, NY (2002). DOI http://doi.acm.org/10.1145/587078.587125

  • Bellman, S., Johnson, E., Kobrin, S., Lohse, G.: International Differences in Information Privacy Concerns: A Global Survey of Consumers. The Information Society 20(5), 313–324 (2004)

    Article  Google Scholar 

  • Bellotti, V.: What You Don’t Know Can Hurt You: Privacy in Collaborative Computing. In: HCI ‘96: Proceedings of HCI on People and Computers XI, pp. 241–261. Springer-Verlag, London, UK (1996)

    Google Scholar 

  • Bellotti, V.: Design for Privacy in Multimedia Computing and Communications Environments. In: P.E. Agre, M. Rotenberg (eds.) Technology and Privacy: The New Landscape, pp. 63–98. MIT Press, Cambridge, MA (1997)

    Google Scholar 

  • Bellotti, V., Sellen, A.: Design for Privacy in Ubiquitous Computing Environments. In: ECSCW ‘93: Proceedings of the Third European Conference on Computer--Supported Cooperative Work, pp. 77–92. Kluwer Academic Publishers, Norwell, MA (1993)

    Google Scholar 

  • Boyle, M., Edwards, C., Greenberg, S.: The Effects of Filtered Video on Awareness and Privacy. In: CSCW ‘00: Proceedings of the 2000 ACM Conference on Computer Supported Cooperative Work, pp. 1–10. ACM, New York, NY (2000). DOI http://doi.acm.org/10.1145/358916.358935

  • Boyle, M., Greenberg, S.: The Language of Privacy: Learning from Video Media Space Analysis and Design. ACM Trans. Computer–Human Interaction 12(2), 328–370 (2005). DOI http://doi.acm.org/10.1145/1067860.1067868

  • Cadiz, J.J., Gupta, A., Grudin, J.: Using Web Annotations for Asynchronous Collaboration Around Documents. In: CSCW ‘00: Proceedings of the 2000 ACM Conference on Computer Supported Cooperative Work, pp. 309–318. ACM, New York, NY (2000). DOI http://doi.acm.org/10.1145/358916.359002

  • Calore, M.: Privacy Fears Shock Facebook. Wired News (2006). DOI http://www.wired.com/science/discoveries/news/2006/09/71739

  • Consolvo, S., Smith, I.E., Matthews, T., LaMarca, A., Tabert, J., Powledge, P.: Location Disclosure to Social Relations: Why, When, & What People Want to Share. In: CHI ‘05: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 81–90. ACM, New York, NY (2005). DOI http://doi.acm.org/10.1145/1054972.1054985

  • Cranor, L.F., Reagle, J., Ackerman, M.S.: Beyond Concern: Understanding Net Users’ Attitudes About Online Privacy. AT&T Labs-Research Technical Report TR 99.4.1 (1999)

    Google Scholar 

  • Danis, C.M.: Extending the Concept of Awareness to Include Static and Dynamic Person Information. SIGGROUP Bulletin 21(3), 59–62 (2000). DOI http://doi.acm.org/10.1145/605647.605657

  • Diffie, W., Hellman, M.E.: Privacy and Authentication: An Introduction to Cryptography. Proceedings of the IEEE 67(3), 397–427 (March 1979)

    Article  Google Scholar 

  • Dix, A.J.: Information Processing, Context and Privacy. In: INTERACT ‘90: Proceedings of the IFIP TC13 Third International Conference on Human--Computer Interaction, pp. 15–20. North-Holland Publishing Co., Amsterdam, The Netherlands (1990)

    Google Scholar 

  • Dourish, P.: Culture and Control in a Media Space. In: ECSCW ‘93: Proceedings of the Third European Conference on Computer-Supported Cooperative Work, pp. 125–137. Kluwer Academic Publishers, Norwell, MA (1993)

    Google Scholar 

  • Dourish, P., Anderson, K.: Privacy, Security... and Risk and Danger and Secrecy and Trust and Identity and Morality and Power: Understanding Collective Information Practices. Institute for Software Research (ISR) Technical Report, University of California, Irvine UCI-ISR-05-1 (2005)

    Google Scholar 

  • Dourish, P., Bly, S.: Portholes: Supporting Awareness in a Distributed Work Group. In: CHI ‘92: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 541–547. ACM, New York, NY (1992). DOI http://doi.acm.org/10.1145/142750.142982

  • Edwards, W.K.: Policies and Roles in Collaborative Applications. In: CSCW ‘96: Proceedings of the 1996 ACM Conference on Computer Supported Cooperative Work, pp. 11–20. ACM, New York, NY, USA (1996). DOI http://doi.acm.org/10.1145/240080.240175

  • Eggen, B., van Mensvoort, K.: Making Sense of What is Going Around. In: P. Markopoulos, B. de Ruyter, W. Mackay (eds.) Awareness Systems: Advances in Theory, Methodology and Design. Springer-Verlag, pp. xxx–xxx (2009)

    Google Scholar 

  • Fisher, D., Dourish, P.: Social and Temporal Structures in Everyday Collaboration. In: CHI ‘04: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 551–558. ACM, New York, NY (2004). DOI http://doi.acm.org/10.1145/985692.985762

  • Fox, S.: Trust and Privacy Online: Why Americans Want to Rewrite the Rules. Pew Internet & American Life Project (2000)

    Google Scholar 

  • Froehlich, J., Dourish, P.: Unifying Artifacts and Activities in a Visual Tool for Distributed Software Development Teams. In: ICSE ‘04: Proceedings of the 26th International Conference on Software Engineering, pp. 387–396. IEEE Computer Society, Washington, DC (2004)

    Chapter  Google Scholar 

  • Gaver, W., Moran, T., MacLean, A., Lüvstrand, L., Dourish, P., Carter, K., Buxton, W.: Realizing a Video Environment: EuroPARC’s RAVE System. In: CHI ‘92: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 27–35. ACM, New York, NY (1992). DOI http://doi.acm.org/10.1145/142750.142754

  • Goffman, E.: The Presentation of Self in Everyday Life. Doubleday, Garden City, New York (1959)

    Google Scholar 

  • Grinter, R.E., Palen, L.: Instant Messaging in Teen Life. In: CSCW ‘02: Proceedings of the 2002 ACM Conference on Computer Supported Cooperative Work, pp. 21–30. ACM, New York, NY (2002). DOI http://doi.acm.org/10.1145/587078.587082

  • Gross, T., Wirsam, W., Graether, W.: AwarenessMaps: Visualizing Awareness in Shared Workspaces. In: CHI ‘03: CHI ’03 Extended Abstracts on Human Factors in Computing Systems, pp. 784–785. ACM, New York, NY (2003). DOI http://doi.acm.org/10.1145/765891.765990

  • Heath, C., Luff, P.: Disembodied Conduct: Communication Through Video in a Multi-Media Office Environment. In: CHI ‘91: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 99–103. ACM, New York, NY (1991). DOI http://doi.acm.org/10.1145/108844.108859

  • Herbsleb, J.D., Atkins, D.L., Boyer, D.G., Handel, M., Finholt, T.A.: Introducing Instant Messaging and Chat in the Workplace. In: CHI ‘02: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 171–178. ACM, New York, NY (2002). DOI http://doi.acm.org/10.1145/503376.503408

  • Hong, J.I., Ng, J.D., Lederer, S., Landay, J.A.: Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems. In: DIS ‘04: Proceedings of the 2004 Conference on Designing Interactive Systems, pp. 91–100. ACM Press, New York, NY (2004). DOI http://doi.acm.org/10.1145/1013115.1013129

  • Hudson, S.E., Smith, I.: Techniques for Addressing Fundamental Privacy and Disruption Tradeoffs in Awareness Support Systems. In: CSCW ‘96: Proceedings of the 1996 ACM Conference on Computer Supported Cooperative Work, pp. 248–257. ACM, New York, NY (1996). DOI http://doi.acm.org/10.1145/240080.240295

  • Iachello, G., Abowd, G.D.: Privacy and Proportionality: Adapting LegalEvaluation Techniques to Inform Design in Ubiquitous Computing. In: CHI ‘05: Proceedings of the SIGCHI Conference on Human Factorsin Computing Systems, pp. 91–100. ACM Press, New York, NY (2005). DOI http://doi.acm.org/10.1145/1054972.1054986

  • Johnson, D.G.: Computers and Privacy. In: Computer Ethics. Prentice-Hall, Englewood Cliffs, NJ (1985)

    Google Scholar 

  • Kahn, J.: Yahoo helped Chinese to Prosecute Journalist. International Herald Tribune (2005)

    Google Scholar 

  • Kobsa, A., Teltzrow, M.: Contextualized Communication of Privacy Practices andPersonalization Benefits: Impacts on Users’ Data Sharing and Purchase Behavior. In: D. Martin, A. Serjantov (eds.) Privacy Enhancing Technologies: Fourth International Workshop, PET 2004, LNCS 3424, pp. 329–343. Springer (2005). DOI http://dx.doi.org/10.1007/11423409_21

  • Langheinrich, M.: Privacy by Design–Principles of Privacy-Aware Ubiquitous Systems. In: UbiComp ‘01: Proceedings of the 3rd International Conference on Ubiquitous Computing, pp. 273–291. Springer-Verlag, London, UK (2001)

    Google Scholar 

  • Lau, T., Etzioni, O., Weld, D.S.: Privacy Interfaces for Information Management. Communications of the ACM 42(10), 88–94 (1999). DOI http://doi.acm.org/10.1145/317665.317680

  • Lederer, S., Hong, J., Dey, A.K., Landay, J.: Personal Privacy Through Understanding and Action: Five Pitfalls for Designers. Personal Ubiquitous Computing 8(6), 440–454 (2004). DOI http://dx.doi.org/10.1007/s00779-004-0304-9

  • Lederer, S., Mankoff, J., Dey, A.K.: Towards a Deconstruction of the Privacy Space. In: Ubicomp 2003 Workshop on Ubicomp Communities: Privacy as Boundary Negotiation (2003a)

    Google Scholar 

  • Lederer, S., Mankoff, J., Dey, A.K.: Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. In: CHI ‘03: CHI ‘03 Extended Abstracts on Human Factors in Computing Systems, pp. 724–725. ACM, New York, NY (2003b). DOI http://doi.acm.org/10.1145/765891.765952

  • Lederer, S., Mankoff, J., Dey, A.K., Beckmann, C.: Managing Personal Information Disclosure in Ubiquitous Computing Environments. Technical Report, Computer Science Division, University of California, Berkeley UCB-CSD-03-1257 (2003c)

    Google Scholar 

  • Lee, A., Girgensohn, A., Schlueter, K.: NYNEX Portholes: Initial User Reactions and Redesign Implications. In: GROUP ‘97: Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work, pp. 385–394. ACM, New York, NY (1997). DOI http://doi.acm.org/10.1145/266838.267359

  • Lessig, L.: Code and Other Laws of Cyberspace. Basic Books, Inc., New York, NY (1999)

    Google Scholar 

  • Mantei, M.M., Baecker, R.M., Sellen, A.J., Buxton, W.A.S., Milligan, T., Wellman, B.: Experiences in the Use of a Media Space. In: CHI ‘91: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 203–208. ACM, New York, NY (1991). DOI http://doi.acm.org/10.1145/108844.108888

  • Mason, R.O.: Four Ethical Issues of the Information Age. MIS Quarterly 10(1), 5–12 (1986)

    Article  Google Scholar 

  • Metaxas, G., Markopoulos, P.: Abstractions of Awareness. In: P. Markopoulos, B. de Ruyter, W. Mackay (eds.) Awareness Systems: Advances in Theory, Methodology and Design. Springer-Verlag, Berlin, pp. xxx–xxx (2009)

    Google Scholar 

  • Milberg, S.J., Burke, S.J., Smith, H.J., Kallman, E.A.: Values, Personal Information Privacy, and Regulatory Approaches. Communications of the ACM 38(12), 65–74 (1995). DOI http://doi.acm.org/10.1145/219663.219683

  • Nardi, B.A., Whittaker, S., Bradner, E.: Interaction and Outeraction: Instant Messaging in Action. In: CSCW ‘00: Proceedings of the 2000 ACM Conference on Computer Supported Cooperative Work, pp. 79–88. ACM, New York, NY (2000). DOI http://doi.acm.org/10.1145/358916.358975

  • Neale, D.C., Carroll, J.M., Rosson, M.B.: Evaluating Computer-Supported Cooperative Work: Models and Frameworks. In: CSCW ‘04: Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work, pp. 112–121. ACM, New York, NY (2004). DOI http://doi.acm.org/10.1145/1031607.1031626

  • Negley, G.: Philosophical Views on the Value of Privacy. Law and Contemporary Problems 31(2), 319–325 (1966)

    Article  Google Scholar 

  • Olson, G.M., Olson, J.S.: Distance Matters. Human–Computer Interaction 15(2/3), 139–178 (2000)

    Article  Google Scholar 

  • Olson, J.S., Grudin, J., Horvitz, E.: A Study of Preferences for Sharing and Privacy. In: CHI ‘05: CHI ‘05 Extended Abstracts on Human Factors in Computing Systems, pp. 1985–1988. ACM, New York, NY (2005). DOI http://doi.acm.org/10.1145/1056808.1057073

  • Olson, J.S., Teasley, S.: Groupware in the Wild: Lessons Learned from a Year of Virtual Collocation. In: CSCW ‘96: Proceedings of the 1996 ACM Conference on Computer Supported Cooperative Work, pp. 419–427. ACM, New York, NY (1996). DOI http://doi.acm.org/10.1145/240080.240353

  • Palen, L.: Social, Individual and Technological Issues for Groupware Calendar Systems. In: CHI ‘99: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 17– 24. ACM, New York, NY (1999). DOI http://doi.acm.org/10.1145/302979.302982

  • Palen, L., Dourish, P.: Unpacking ‘‘Privacy” for a Networked World. In: CHI ‘03: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 129–136. ACM, New York, NY (2003). DOI http://doi.acm.org/10.1145/642611.642635

  • Patil, S., Kobsa, A.: Instant Messaging and Privacy. In: Proceedings of HCI 2004, pp. 85–88 (2004). DOI http://www.ics.uci.edu/kobsa/papers/2004-HCI-kobsa.pdf

  • Patil, S., Kobsa, A.: Privacy in Collaboration: Managing Impression. In: The First International Conference on Online Communities and Social Computing. ACM, New York, NY (2005a) DOI http://www.ics.uci.edu/kobsa/papers/2005-ICOCSC-kobsa.pdf

    Google Scholar 

  • Patil, S., Kobsa, A.: Uncovering Privacy Attitudes and Practices in Instant Messaging. In: GROUP ‘05: Proceedings of the 2005 International ACM SIGGROUP Conference on Supporting Group Work, pp. 109–112. ACM, New York, NY (2005b). DOI http://doi.acm.org/10.1145/1099203.1099220

  • Patil, S., Lai, J.: Who Gets to Know What When: Configuring Privacy Permissions in an Awareness Application. In: CHI ‘05: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 101–110. ACM, New York, NY (2005). DOI http://doi.acm.org/10.1145/1054972.1054987

  • Pinelle, D., Gutwin, C.: Designing for Loose Coupling in Mobile Groups. In: GROUP ‘03: Proceedings of the 2003 International ACM SIGGROUP Conference on Supporting Group Work, pp. 75–84. ACM, New York, NY (2003). DOI http://doi.acm.org/10.1145/958160.958173

  • Rachels, J.: Why Privacy Is Important. Philosophy and Public Affairs 4(4), 323–333 (1975)

    Google Scholar 

  • Rittenbruch, M., McEwan, G.: An Historical Reflection of Awareness in Collaboration. In: P. Markopoulos, B. de Ruyter, W. Mackay (eds.) Awareness Systems: Advances in Theory, Methodology and Design. Springer-Verlag, Berlin, pp. xxx–xxx (2009)

    Google Scholar 

  • Romero, N., Markopoulos, P.: Grounding Privacy with Awareness. In: P. Markopoulos, B. de Ruyter, W. Mackay (eds.) Awareness Systems: Advances in Theory, Methodology and Design. Springer-Verlag, Berlin, pp. xxx–xxx (2009)

    Google Scholar 

  • Samarajiva, R.: Interactivity as Though Privacy Mattered. In: P.E. Agre, M. Rotenberg (eds.) Technology and Privacy: The New Landscape, pp. 277–309. MIT Press, Cambridge, MA (1997)

    Google Scholar 

  • Schwartz, B.: The Social Psychology of Privacy. The American Journal of Sociology 73 (6), 741–752 (1968). DOI http://www.jstor.org/stable/2775779

  • Stone, E.F., Gueutal, H.G., Gardner, D.G., McClure, S.: A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations. Journal of Applied Psychology 68(3), 459–468 (1983)

    Article  Google Scholar 

  • Suchman, L.A.: Plans and Situated Actions: The Problem of Human–Machine Communication. Cambridge University Press, New York, NY (1987)

    Google Scholar 

  • U.S. Department of Health Education and Welfare: Records, Computers and the Rights of Citizens. Report of the Secretary’s Advisory Committee on Automated Personal Data Systems Publication No. 1700–00116 (1973)

    Google Scholar 

  • Warren, S.D., Brandeis, L.D.: The Right to Privacy. Harvard Law Review 4(5), 193–220 (1890)

    Article  Google Scholar 

  • Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967)

    Google Scholar 

  • Westin, A.F.: Harris-Equifax Consumer Privacy Survey 1991 Equifax, Inc., Atlanta, GA (1991)

    Google Scholar 

  • Wickramasuriya, J., Datt, M., Mehrotra, S., Venkatasubramanian, N.: Privacy Protecting Data Collection in Media Spaces. In: MULTIMEDIA ‘04: Proceedings of the 12th Annual ACM International Conference on Multimedia, pp. 48–55. ACM, New York, NY (2004). DOI http://doi.acm.org/10.1145/1027527.1027537

Download references

Acknowledgments

Some of the research described was supported by NSF grants nos. 0205724 and 0808783. We wish to acknowledge our collaborator Jennifer Lai. We also wish to thank the subjects who participated in our study on mySpace. Finally, we are grateful to Mihir Mahajan for commenting on various drafts of this chapter.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sameer Patil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag London Limited

About this chapter

Cite this chapter

Patil, S., Kobsa, A. (2009). Privacy Considerations in Awareness Systems: Designing with Privacy in Mind. In: Markopoulos, P., De Ruyter, B., Mackay, W. (eds) Awareness Systems. Human-Computer Interaction Series. Springer, London. https://doi.org/10.1007/978-1-84882-477-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-1-84882-477-5_8

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84882-476-8

  • Online ISBN: 978-1-84882-477-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics