Advertisement

From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions

  • Andrew S. Patrick
  • Steve Kenny
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2760)

Abstract

Internet users are becoming more concerned about their privacy. In addition, various governments (most notably in Europe) are adopting strong privacy protection legislation. The result is that system developers and service operators must determine how to comply with legal requirements and satisfy users. The human factors requirements for effective privacy interface design can be grouped into four categories: (1) comprehension, (2) consciousness, (3) control, and (4) consent. A technique called ”Privacy Interface Analysis” is introduced to show how interface design solutions can be used when developing a privacy-enhanced application or service. To illustrate the technique, an application adopted by the Privacy Incorporated Software Agents consortium (PISA) is analyzed in which users will launch autonomous software agents on the Internet to search for jobs.

Keywords

Unify Modeling Language Personal Data Interface Design Data Subject Unify Modeling Language Modeling 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Comstock, E.M., Clemens, E.A.: Perceptions of computer manuals: A view from the field. In: Proceedings of the Human Factors Society 31st Annual Meeting, pp. 139–143 (1987)Google Scholar
  2. 2.
    Cranor, L.F., Arjula, M., Guduru, P.: Use of a P3P User Agent by Early Adopters. In: Proceedings of Workshop on Privacy in the Electronic Society, Washington, D.C., November 21 (2002)Google Scholar
  3. 3.
    Directive 95/46/EC of the European Parliament and of the Council of October 24, 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of such Data. Official Journal of the European Communities, p. 31 (1995)Google Scholar
  4. 4.
    Directive 97/66/EC of the European Parliament and of the Council of December 15, 1997, concerning the processing of personal data and the protection of privacy in the telecommunications sector. Official Journal L 024, 30/01/1998 p. 0001 – 0008 (1997)Google Scholar
  5. 5.
    Halket, T.D., Cosgrove, D.B.: Is your online agreement in jeopardy?, http://www.cio.com/legal/edit/010402_agree.html
  6. 6.
    Kenny, S., Borking, J.: The value of privacy engineering. Journal of Information, Law and Technology, JILT (2002), http://elj.warwick.ac.uk/jilt/02-1/kenny.html
  7. 7.
    Kobsa, A.: Tailoring privacy to users’ needs (Invited Keynote). In: Bauer, M., Gmytrasiewicz, P.J., Vassileva, J. (eds.) UM 2001. LNCS (LNAI), vol. 2109, pp. 303–313. Springer, Heidelberg (2001), http://www.ics.uci.edu/~kobsa/papers/2001-UM01-kobsa.pdf CrossRefGoogle Scholar
  8. 8.
    Kobsa, A.: Personalized hypermedia and international privacy. Communications of the ACM 45(5), 64–67 (2002), http://www.ics.uci.edu/~kobsa/papers/2002-CACM-kobsa.pdf CrossRefGoogle Scholar
  9. 9.
    Kunz, C.L.: Click-Through Agreements: Strategies for Avoiding Disputes on Validity of Assent (2002), http://www.efscouncil.org/frames/Forum%20Members/Kunz_Clickthr_%20Agrmt_%20Strategies.ppt. See also Kunz, C.L., Debrow, J., Del Duca, M., Thayer, H.: Click-Through Agreements: Strategies for Avoiding Disputes on Validity of Assent. Business Lawyer 57, 401 (2001)
  10. 10.
    Nielsen, J.: Usability engineering. Morgan Kaufmann, San Diego (1993)zbMATHGoogle Scholar
  11. 11.
    Norman, D.A.: The psychology of everyday things. Basic Books, New York (1988)Google Scholar
  12. 12.
    Preece, J., Rogers, Y., Sharp, H., Benyon, D., Holland, S., Carey, T.: Humancomputer interaction. Addison-Wesley, Reading (1994)Google Scholar
  13. 13.
    Rumbaugh, J., Jacobson, I., Booch, G.: The unified modeling language reference manual. Addison-Wesley, Reading (1998)Google Scholar
  14. 14.
    Saunders, C.: Trust central to E-commerce, online marketing. Internet Advertising Report (2001), http://www.internetnews.com/IAR/article.php/12_926191
  15. 15.
    Shneiderman, B.: Designing the user interface: Strategies for effective humancomputer interaction. Addison-Wesley, Reading (1987)Google Scholar
  16. 16.
    Slade, K.H.: Dealing with customers: Protecting their privacy and enforcing your contracts (1999), http://www.haledorr.com/db30/cgi-bin/pubs/1999_06_CLE_Program.pdf
  17. 17.
    Thornburgh, D.: Click-through contracts: How to make them stick. In: Internet Management Strategies (2001), http://www.loeb.com/FSL5CS/articles/articles45.asp
  18. 18.
    Wickens, C.D., Hollands, J.G.: Engineering psychology and human performance, 3rd edn. Prentice Hall, Upper Saddle River (2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Andrew S. Patrick
    • 1
  • Steve Kenny
    • 2
  1. 1.Institute for Information Technology, National Research Council of Canada Building M-50OttawaCanada
  2. 2.Independent Consultant 

Personalised recommendations