Abstract
Drawing on Value Sensitive Design, we developed a workable privacy addendum for an open source software license that not only covers intellectual property rights while allowing software developers to modify the software (the usual scope of an open source license), but also addresses end-user privacy. One central innovation of our work entails the integration of an informed consent model and a threat model for developing privacy protections for ubiquitous location aware systems. We utilized technology that provided a device’s location information in real-time: Intel’s POLS, a “sister” system to Intel’s Place Lab. In January 2006, POLS was released under a license combining the substantive terms of the Eclipse Public License together with this privacy addendum. In this paper, we describe how we developed the privacy addendum, present legal terms, and discuss characteristics of our design methods and results that have implications for protecting privacy in ubiquitous information systems released in open source.
Keywords
- Open Source
- Sensitive Design
- Application Developer
- Legal Term
- Identifiable Information
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, access via your institution.
Buying options
Preview
Unable to display preview. Download preview PDF.
References
Ackerman, M., Darrell, T., Weitzner, D.J.: Privacy in context. Human-Computer Interaction 16, 167–176 (2001)
Atkins, D., Austein, R.: Threat Analysis of the Domain Name System (retrieved March 30, 2006) (2004), from: http://www.ietf.org/rfc/rfc3833.txt?number=3833
Boyle, M., Edwards, C., Greenberg, S.: The effects of filtered video on awareness and privacy. In: Proceedings of CSCW 2000, pp. 1–10. ACM Press, New York (2000)
Borriello, G., Brunette, W., Hall, M., Hartung, C., Tangney, C.: Reminding about tagged objects using passive rFIDs. In: Davies, N., Mynatt, E.D., Siio, I. (eds.) UbiComp 2004. LNCS, vol. 3205, pp. 36–53. Springer, Heidelberg (2004)
Consolvo, S., Roessler, P., Shelton, B.E.: The careNet display: Lessons learned from an in home evaluation of an ambient display. In: Davies, N., Mynatt, E.D., Siio, I. (eds.) UbiComp 2004. LNCS, vol. 3205, pp. 1–17. Springer, Heidelberg (2004)
Consolvo, S., Smith, I.E., Matthews, T., LaMarca, A., Tabert, J., Powledge, P.: Location Disclosure to Social Relations: Why, When, & What People Want to Share. In: Proceedings of CHI 2005, pp. 81–90. ACM Press, New York (2005)
Cranor, L.F., Garfinkel, S.: Security and usability: Designing secure systems that people can use. O’Reilly, Cambridge (2005)
Felten, E.: DRM, and the First Rule of Security Analysis. Freedom to Tinker (retrieved March 30, 2006) (2003), from: http://www.freedom-to-tinker.com/index.php?p=317
Friedman, B. (ed.): Human Values and the Design of Computer Technology. Cambridge University Press and CSLI New York Stanford University (1997)
Friedman, B., Felten, E., Millett, L.I.: Informed Consent Online: A Conceptual Model and Design Principles. CSE Technical Report 00-12-02. Department of Computer Science and Engineering, University of Washington, Seattle, Washington (2000)
Friedman, B., Howe, D.C., Felten, E.: Informed consent in the Mozilla browser: Implementing value-sensitive design. In: Proc of HICSS 2002 Abstract, CD-ROM of full-paper, OSPE101, p. 247. IEEE Computer Society, Los Alamitos (2002)
Friedman, B., Kahn Jr, P.H.: Human values, ethics, & design. In: Jacko, J., Sears, A. (eds.) Handbook of human-computer interaction, pp. 1177–1201. Lawrence Erlbaum Associates, Mahwah (2003)
Friedman, B., Kahn Jr, P.H., Borning, A.: Value Sensitive Design & information systems. In: Zhang, P., Galletta, D. (eds.) Human-computer interaction in management information systems: Foundations. M. E. Sharpe, Armonk (in press)
Friedman, B., Kahn Jr, P.H., Hagman, J., Severson, R.L., Gill, B.: The Watcher and The Watched: Social Judgements about Privacy in a Public Place. Human-Computer Interaction (in press)
Friedman, B., Lin, P., Miller, J.: Informed Consent by Design. In: Cranor, L., Garfinkel, S. (eds.) Designing Secure Systems that People Can Use, pp. 495–521. O’Reilly & Associates, Cambridge (2005)
Goecks, J., Mynatt, E.D.: Leveraging Social Networks for Information Sharing. In: Proceedings of CSCW 2004, pp. 328–331 (2004)
Goldberg, Y.: Practical Threat Analysis for the Software Industry. SecurityDocs.com (retrieved March 30, 2006) (2005), from: http://www.securitydocs.com/library/2848
Grinter, R.E., Smetters, D.K.: Three Challenges for Embedding Security into Applications HCISEC Workshop at CHI 2003, Fort Lauderdale, Florida (2003) (retrieved March 30, 2006) (2003), from: http://www.andrewpatrick.ca/CHI2003/HCISEC/hcisec-workshop-grinter.pdf
Hill, R., Myagmar, S., Campbell, R.: Threat Analysis of GNU Software Radio. In: Proc. of WWC 2005, Palo Alto, CA (2005)
Hudson, S.E., Smith, I.: Techniques for addressing fundamental privacy & disruption tradeoffs in awareness support systems. In: Proceedings of CSCW 1996, pp. 248–257 (1996)
Hull, R., Kumar, B., Lieuwen, D., Patel-Schneider, P.F., Sahuguet, A., Varadarajan, S., Vyas, A.: Enabling Context-Aware and Privacy-Conscious User Data Sharing. In: Proceedings of MDM 2004, pp. 187–198 (2004)
Iachello, G., Smith, I., Consolvo, S., Abowd, G.D., Hughes, J., Howard, J., Potter, F., Scott, J., Sohn, T., Hightower, J., LaMarca, A.: Control, deception, and communication: Evaluating the deployment of a location-enhanced messaging service. In: Beigl, M., Intille, S.S., Rekimoto, J., Tokuda, H. (eds.) UbiComp 2005. LNCS, vol. 3660, pp. 213–231. Springer, Heidelberg (2005)
Iachello, G., Smith, I.E., Consolvo, S., Chen, M., Abowd, G.D.: Developing Privacy Guidelines for Social Location Disclosure Applications and Services. In: Proceedings of SOUPS 2005, pp. 65–76. ACM Press, New York (2005)
Jancke, G., Venolia, G.D., Grudin, J., Cadiz, J.J., Gupta, A.: Linking Public Spaces: Technical & Social Issues. In: Proceedings of CHI 2001, Seattle, WA, pp. 530–537 (2001)
Jiang, X., Hong, J.I., Landay, J.A.: Approximate information flows: Socially-based modeling of privacy in ubiquitous computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 176–193. Springer, Heidelberg (2002)
LaMarca, A., Chawathe, Y., Consolvo, S., Hightower, J., Smith, I., Scott, J., Sohn, T., Howard, J., Hughes, J., Potter, F., Tabert, J., Powledge, P.S., Borriello, G., Schilit, B.N.: Place lab: Device positioning using radio beacons in the wild. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, pp. 116–133. Springer, Heidelberg (2005)
Langheinrich, M.: Privacy by design–Principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)
Lederer, S., Hong, J.I., Dey, A.K., Landay, J.A.: Personal Privacy through Understanding & Action: 5 Pitfalls for Designers. Personal & Ubiquitous Computing 8(6), 440–454 (2004)
Meler, J.D., Mackman, A., Dunner, N., Vasireddy, S., Escamilla, R., Murukan, A.: Threat modeling. In: Improving Web Application Security: Threats and Countermeasures (2003)
Palen, L., Dourish, P.: Unpacking “privacy” for a networked world. In: Proceedings of CHI 2003, pp. 129–136 (2003)
Patil, S., Lai, J.: Who gets to know what when: configuring privacy permissions in an awareness application. In: Proceedings CHI 2005, Portland, OR, USA, pp. 101–110 (2005)
Schoeman, F. (ed.): Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press, Cambridge (1984)
Warren, S.D., Brandeis, L.D.: The Right to Privacy. Harvard Law Review 4(5) (1890)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Friedman, B., Smith, I., H. Kahn, P., Consolvo, S., Selawski, J. (2006). Development of a Privacy Addendum for Open Source Licenses: Value Sensitive Design in Industry. In: Dourish, P., Friday, A. (eds) UbiComp 2006: Ubiquitous Computing. UbiComp 2006. Lecture Notes in Computer Science, vol 4206. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11853565_12
Download citation
DOI: https://doi.org/10.1007/11853565_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-39634-5
Online ISBN: 978-3-540-39635-2
eBook Packages: Computer ScienceComputer Science (R0)