The User Interface: Concepts for Sharing Personal Information via Multiple Identities in a Decentralized Social Network

  • Fabian Hermann
  • Andreas Schuller
  • Simon Thiel
  • Christian Knecht
  • Simon Scerri
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8006)


The userware visualizes vast personal information from various sources and allows for sharing them in a decentralized social network. Multiple identities can be used to avoid unintended linkability when communicating to other users or external systems. The user interface for that is presented in this paper. A user-centered information- and view-structure for items of the personal information sphere and concepts for multiple identities used for sharing are discussed.


user interface design decentralized social networking personal identity management security and privacy 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Al-Sinani, H.S., Alrodhan, W.A., Mitchell, C.J.: CardSpace-liberty integration for CardSpace users. In: IDTRUST 2010, Proceedings of the 9th Symposium on Identity and Trust on the Internet, pp. 12–25. ACM, New York (2010)Google Scholar
  2. 2.
    Crumlish, C., Malone, E.: Designing Social Interfaces: Principles, Patterns, and Practices Improving the User Experience. O’Reilly, Sebastopol (2009)Google Scholar
  3. 3.
    Dumas, J.: User-based evaluations. In: Jacko, J.A., Sears, A. (eds.) The Human-Computer Interaction Handbook, pp. 1093–1117. Lawrence Erlbaum Associates, Mahwah (2003)Google Scholar
  4. 4.
    Heupel, M., Bourimi, M., Kesdoğan, D.: Trust and Privacy in the Userware. In: Kurosu, M. (ed.) Human-Computer Interaction, Part III, HCII 2013. LNCS, vol. 8006, pp. 39–48. Springer, Heidelberg (2013)Google Scholar
  5. 5.
    Heupel, M., Fischer, L., Kesdogan, D., Bourimi, M., Scerri, S., Hermann, F., Giménez, R.: Towards robust multidimensional trust for the userware by considering situational context. In: 2012 5th New Technologies, Mobility and Security (NTMS), pp. 1–6 (2012)Google Scholar
  6. 6.
    Lewis, J.R.: Usability Testing. In: Salvendy, G. (ed.) Handbook of Human Factors and Ergonomics, 4th edn. Wiley (2012)Google Scholar
  7. 7.
    Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management (Version v0.34) (2010), (retrieved)
  8. 8.
    Sacco, O., Breslin, J.G.: PPO & PPM2.0: Extending the Privacy Preference Framework to provide finer-grained access control for the Web of Data. In: I-Semantics 2012 - 8th International Conference on Semantic Systems (2012)Google Scholar
  9. 9.
    Scerri, S., Schuller, A., Rivera, I., Attard, J., Debattista, J., Valla, M., Hermann, F., Handschuh, S.: Interacting with a context-aware personal information sharing system. In: Kurosu, M. (ed.) Human-Computer Interaction, Part V, HCII 2013. LNCS, vol. 8008, pp. 122–131. Springer, Heidelberg (2013)Google Scholar
  10. 10.
    Schwarte, P., Bourimi, M., Heupel, M., Kesdogan, D., Giménez, R., Wrobel, S., Thiel, S.: Multilaterally secure communication anonymity in decentralized social networking. In: Proceeding of 10th International Conference on Information Technology: New Generations, ITNG (in press, 2013)Google Scholar
  11. 11.
    Scerri, S., Gimenez, R., Hermann, F., Bourimi, M., Thiel, S.: – Towards an integrated Personal Information Sphere. In: Proceedings on the Federated Social Web Summit 2011 (2011)Google Scholar
  12. 12.
    Scerri, S., Cortis, K., Rivera, I., Hermann, F., Bourimi, M.: Context-Aware, Privacy-Sensitive Management of the Integrated Personal Information Sphere. In: EU Project Networking Track, 9th Extended Semantic Web Conference, ESWC 2012 (2012), (retrieved)
  13. 13.
    Schümmer, Lukosch: Patterns for Computer-Mediated Interaction. John Wiley & Sons, Chichester (2007)Google Scholar
  14. 14.
    Simonite, T.: Google Invites Everyone to Be Friends on Its Social Network (2011), (retrieved)
  15. 15.
    Steuer, J.K., Fernando, R., Bertino, E.: Privacy preserving identity attribute verification in windows cardspace. In: DIM 2010, Proceedings of the 6th ACM Workshop on Digital identity Management, pp. 13–16. ACM, New York (2010)Google Scholar
  16. 16.
    Sun, S.-T., Pospisil, E., Muslukhov, I., Dindar, N., Hawkey, K., Beznosov, K.: OpenID-enabled browser: towards usable and secure web single sign-on. In: CHI EA 2011, CHI 2011 Extended Abstracts on Human Factors in Computing Systems, pp. 1291–1296. ACM, New York (2011)Google Scholar
  17. 17.
    Thiel, S., Bourimi, M., Giménez, R., Scerri, S., Schuller, A., Valla, M., Fra, C., Wrobel, S., Hermann, F.: A Requirements-Driven Approach Towards Decentralized Social Networks. In: Park, J.J., Leung, V.C., Wang, C.-L., Shon, T. (eds.) Future Information Technology, Application, and Service. LNEE, vol. 164, pp. 709–718. Springer, Heidelberg (2012)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Fabian Hermann
    • 1
  • Andreas Schuller
    • 1
  • Simon Thiel
    • 1
  • Christian Knecht
    • 1
  • Simon Scerri
    • 2
  1. 1.Fraunhofer-Institute for Industrial EngineeringStuttgartGermany
  2. 2.Digital Enterprise Research InstituteNational University of IrelandGalwayIreland

Personalised recommendations