Abstract
The earlier chapters of this book presented a conceptual understanding of awareness (Eggen and van Mensvoort, 2009, in this volume; Metaxas and Markopoulos, 2009, in this volume). A historical account (Rittenbruch and McEwan, 2009, in this volume) as well as descriptions of various implementations (see Part III) illustrate how various systems have attempted to foster greater awareness. A common challenge faced by all awareness systems is the tension with an individual’s desire for privacy (Hudson and Smith, 1996).
Keywords
- Privacy Protection
- Privacy Concern
- Instant Messaging
- Privacy Preference
- Privacy Management
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
The data were obtained through a search in WorldCat, the world’s largest library network with 1.2 billion items from the catalogues of more than 10,000 libraries worldwide. WorldCat removes duplicates from the retrieval results.
- 2.
Palen (1999) found that individuals with unusually restrictive, or unusually liberal, calendar access settings often had immediate colleagues with similar access configurations.
- 3.
References
Ackerman, M.S.: The Intellectual Challenge of CSCW: The Gap Between Social Requirements and Technical Feasibility. Human–Computer Interaction 15, 179–203 (2000)
Ackerman, M.S., Cranor, L.: Privacy Critics: UI Components to Safeguard Users’ Privacy. In: CHI ‘99: CHI ‘99 Extended Abstracts on Human Factors in Computing Systems, pp. 258–259. ACM, New York, NY (1999). DOI http://doi.acm.org/10.1145/632716.632875
Ackerman, M.S., Starr, B., Hindus, D., Mainwaring, S.D.: Hanging on the ‘Wire: A Field Study of an Audio-only Media Space. ACM Trans. Computer–Human Interaction 4(1), 39–66 (1997). DOI http://doi.acm.org/10.1145/244754.244756
Adams, A.: Users’ Perception of Privacy in Multimedia Communication. In: CHI ‘99: CHI ‘99 Extended Abstracts on Human Factors in Computing Systems, pp. 53–54. ACM, New York, NY (1999). DOI http://doi.acm.org/10.1145/632716.632752
Adams, A., Sasse, M.A.: Privacy Issues in Ubiquitous Multimedia Environments: Wake Sleeping Dogs, or Let Them Lie? In: Seventh IFIP Conference on Human–Computer Interaction INTERACT’99, pp. 214–221 (1999)
Agre, P.E., Rotenberg, M. (eds.): Technology and Privacy: The New Landscape. MIT Press, Cambridge, MA (1997)
Altman, I.: The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding. Brooks/Cole, Monterey, CA (1975)
Altman, I.: Privacy Regulation: Culturally Universal or Culturally Specific? Journal of Social Issues 3(3), 66–84 (1977)
Appelt, W.: WWW Based Collaboration with the BSCW System. In: SOFSEM ‘99: Proceedings of the 26th Conference on Current Trends in Theory and Practice of Informatics on Theory and Practice of Informatics, pp. 66–78. Springer-Verlag, London, UK (1999)
Begole, J.B., Tang, J.C., Smith, R.B., Yankelovich, N.: Work Rhythms: Analyzing Visualizations of Awareness Histories of Distributed Groups. In: CSCW ‘02: Proceedings of the 2002 ACM Conference on Computer Supported Cooperative Work, pp. 334–343. ACM, New York, NY (2002). DOI http://doi.acm.org/10.1145/587078.587125
Bellman, S., Johnson, E., Kobrin, S., Lohse, G.: International Differences in Information Privacy Concerns: A Global Survey of Consumers. The Information Society 20(5), 313–324 (2004)
Bellotti, V.: What You Don’t Know Can Hurt You: Privacy in Collaborative Computing. In: HCI ‘96: Proceedings of HCI on People and Computers XI, pp. 241–261. Springer-Verlag, London, UK (1996)
Bellotti, V.: Design for Privacy in Multimedia Computing and Communications Environments. In: P.E. Agre, M. Rotenberg (eds.) Technology and Privacy: The New Landscape, pp. 63–98. MIT Press, Cambridge, MA (1997)
Bellotti, V., Sellen, A.: Design for Privacy in Ubiquitous Computing Environments. In: ECSCW ‘93: Proceedings of the Third European Conference on Computer--Supported Cooperative Work, pp. 77–92. Kluwer Academic Publishers, Norwell, MA (1993)
Boyle, M., Edwards, C., Greenberg, S.: The Effects of Filtered Video on Awareness and Privacy. In: CSCW ‘00: Proceedings of the 2000 ACM Conference on Computer Supported Cooperative Work, pp. 1–10. ACM, New York, NY (2000). DOI http://doi.acm.org/10.1145/358916.358935
Boyle, M., Greenberg, S.: The Language of Privacy: Learning from Video Media Space Analysis and Design. ACM Trans. Computer–Human Interaction 12(2), 328–370 (2005). DOI http://doi.acm.org/10.1145/1067860.1067868
Cadiz, J.J., Gupta, A., Grudin, J.: Using Web Annotations for Asynchronous Collaboration Around Documents. In: CSCW ‘00: Proceedings of the 2000 ACM Conference on Computer Supported Cooperative Work, pp. 309–318. ACM, New York, NY (2000). DOI http://doi.acm.org/10.1145/358916.359002
Calore, M.: Privacy Fears Shock Facebook. Wired News (2006). DOI http://www.wired.com/science/discoveries/news/2006/09/71739
Consolvo, S., Smith, I.E., Matthews, T., LaMarca, A., Tabert, J., Powledge, P.: Location Disclosure to Social Relations: Why, When, & What People Want to Share. In: CHI ‘05: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 81–90. ACM, New York, NY (2005). DOI http://doi.acm.org/10.1145/1054972.1054985
Cranor, L.F., Reagle, J., Ackerman, M.S.: Beyond Concern: Understanding Net Users’ Attitudes About Online Privacy. AT&T Labs-Research Technical Report TR 99.4.1 (1999)
Danis, C.M.: Extending the Concept of Awareness to Include Static and Dynamic Person Information. SIGGROUP Bulletin 21(3), 59–62 (2000). DOI http://doi.acm.org/10.1145/605647.605657
Diffie, W., Hellman, M.E.: Privacy and Authentication: An Introduction to Cryptography. Proceedings of the IEEE 67(3), 397–427 (March 1979)
Dix, A.J.: Information Processing, Context and Privacy. In: INTERACT ‘90: Proceedings of the IFIP TC13 Third International Conference on Human--Computer Interaction, pp. 15–20. North-Holland Publishing Co., Amsterdam, The Netherlands (1990)
Dourish, P.: Culture and Control in a Media Space. In: ECSCW ‘93: Proceedings of the Third European Conference on Computer-Supported Cooperative Work, pp. 125–137. Kluwer Academic Publishers, Norwell, MA (1993)
Dourish, P., Anderson, K.: Privacy, Security... and Risk and Danger and Secrecy and Trust and Identity and Morality and Power: Understanding Collective Information Practices. Institute for Software Research (ISR) Technical Report, University of California, Irvine UCI-ISR-05-1 (2005)
Dourish, P., Bly, S.: Portholes: Supporting Awareness in a Distributed Work Group. In: CHI ‘92: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 541–547. ACM, New York, NY (1992). DOI http://doi.acm.org/10.1145/142750.142982
Edwards, W.K.: Policies and Roles in Collaborative Applications. In: CSCW ‘96: Proceedings of the 1996 ACM Conference on Computer Supported Cooperative Work, pp. 11–20. ACM, New York, NY, USA (1996). DOI http://doi.acm.org/10.1145/240080.240175
Eggen, B., van Mensvoort, K.: Making Sense of What is Going Around. In: P. Markopoulos, B. de Ruyter, W. Mackay (eds.) Awareness Systems: Advances in Theory, Methodology and Design. Springer-Verlag, pp. xxx–xxx (2009)
Fisher, D., Dourish, P.: Social and Temporal Structures in Everyday Collaboration. In: CHI ‘04: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 551–558. ACM, New York, NY (2004). DOI http://doi.acm.org/10.1145/985692.985762
Fox, S.: Trust and Privacy Online: Why Americans Want to Rewrite the Rules. Pew Internet & American Life Project (2000)
Froehlich, J., Dourish, P.: Unifying Artifacts and Activities in a Visual Tool for Distributed Software Development Teams. In: ICSE ‘04: Proceedings of the 26th International Conference on Software Engineering, pp. 387–396. IEEE Computer Society, Washington, DC (2004)
Gaver, W., Moran, T., MacLean, A., Lüvstrand, L., Dourish, P., Carter, K., Buxton, W.: Realizing a Video Environment: EuroPARC’s RAVE System. In: CHI ‘92: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 27–35. ACM, New York, NY (1992). DOI http://doi.acm.org/10.1145/142750.142754
Goffman, E.: The Presentation of Self in Everyday Life. Doubleday, Garden City, New York (1959)
Grinter, R.E., Palen, L.: Instant Messaging in Teen Life. In: CSCW ‘02: Proceedings of the 2002 ACM Conference on Computer Supported Cooperative Work, pp. 21–30. ACM, New York, NY (2002). DOI http://doi.acm.org/10.1145/587078.587082
Gross, T., Wirsam, W., Graether, W.: AwarenessMaps: Visualizing Awareness in Shared Workspaces. In: CHI ‘03: CHI ’03 Extended Abstracts on Human Factors in Computing Systems, pp. 784–785. ACM, New York, NY (2003). DOI http://doi.acm.org/10.1145/765891.765990
Heath, C., Luff, P.: Disembodied Conduct: Communication Through Video in a Multi-Media Office Environment. In: CHI ‘91: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 99–103. ACM, New York, NY (1991). DOI http://doi.acm.org/10.1145/108844.108859
Herbsleb, J.D., Atkins, D.L., Boyer, D.G., Handel, M., Finholt, T.A.: Introducing Instant Messaging and Chat in the Workplace. In: CHI ‘02: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 171–178. ACM, New York, NY (2002). DOI http://doi.acm.org/10.1145/503376.503408
Hong, J.I., Ng, J.D., Lederer, S., Landay, J.A.: Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems. In: DIS ‘04: Proceedings of the 2004 Conference on Designing Interactive Systems, pp. 91–100. ACM Press, New York, NY (2004). DOI http://doi.acm.org/10.1145/1013115.1013129
Hudson, S.E., Smith, I.: Techniques for Addressing Fundamental Privacy and Disruption Tradeoffs in Awareness Support Systems. In: CSCW ‘96: Proceedings of the 1996 ACM Conference on Computer Supported Cooperative Work, pp. 248–257. ACM, New York, NY (1996). DOI http://doi.acm.org/10.1145/240080.240295
Iachello, G., Abowd, G.D.: Privacy and Proportionality: Adapting LegalEvaluation Techniques to Inform Design in Ubiquitous Computing. In: CHI ‘05: Proceedings of the SIGCHI Conference on Human Factorsin Computing Systems, pp. 91–100. ACM Press, New York, NY (2005). DOI http://doi.acm.org/10.1145/1054972.1054986
Johnson, D.G.: Computers and Privacy. In: Computer Ethics. Prentice-Hall, Englewood Cliffs, NJ (1985)
Kahn, J.: Yahoo helped Chinese to Prosecute Journalist. International Herald Tribune (2005)
Kobsa, A., Teltzrow, M.: Contextualized Communication of Privacy Practices andPersonalization Benefits: Impacts on Users’ Data Sharing and Purchase Behavior. In: D. Martin, A. Serjantov (eds.) Privacy Enhancing Technologies: Fourth International Workshop, PET 2004, LNCS 3424, pp. 329–343. Springer (2005). DOI http://dx.doi.org/10.1007/11423409_21
Langheinrich, M.: Privacy by Design–Principles of Privacy-Aware Ubiquitous Systems. In: UbiComp ‘01: Proceedings of the 3rd International Conference on Ubiquitous Computing, pp. 273–291. Springer-Verlag, London, UK (2001)
Lau, T., Etzioni, O., Weld, D.S.: Privacy Interfaces for Information Management. Communications of the ACM 42(10), 88–94 (1999). DOI http://doi.acm.org/10.1145/317665.317680
Lederer, S., Hong, J., Dey, A.K., Landay, J.: Personal Privacy Through Understanding and Action: Five Pitfalls for Designers. Personal Ubiquitous Computing 8(6), 440–454 (2004). DOI http://dx.doi.org/10.1007/s00779-004-0304-9
Lederer, S., Mankoff, J., Dey, A.K.: Towards a Deconstruction of the Privacy Space. In: Ubicomp 2003 Workshop on Ubicomp Communities: Privacy as Boundary Negotiation (2003a)
Lederer, S., Mankoff, J., Dey, A.K.: Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. In: CHI ‘03: CHI ‘03 Extended Abstracts on Human Factors in Computing Systems, pp. 724–725. ACM, New York, NY (2003b). DOI http://doi.acm.org/10.1145/765891.765952
Lederer, S., Mankoff, J., Dey, A.K., Beckmann, C.: Managing Personal Information Disclosure in Ubiquitous Computing Environments. Technical Report, Computer Science Division, University of California, Berkeley UCB-CSD-03-1257 (2003c)
Lee, A., Girgensohn, A., Schlueter, K.: NYNEX Portholes: Initial User Reactions and Redesign Implications. In: GROUP ‘97: Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work, pp. 385–394. ACM, New York, NY (1997). DOI http://doi.acm.org/10.1145/266838.267359
Lessig, L.: Code and Other Laws of Cyberspace. Basic Books, Inc., New York, NY (1999)
Mantei, M.M., Baecker, R.M., Sellen, A.J., Buxton, W.A.S., Milligan, T., Wellman, B.: Experiences in the Use of a Media Space. In: CHI ‘91: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 203–208. ACM, New York, NY (1991). DOI http://doi.acm.org/10.1145/108844.108888
Mason, R.O.: Four Ethical Issues of the Information Age. MIS Quarterly 10(1), 5–12 (1986)
Metaxas, G., Markopoulos, P.: Abstractions of Awareness. In: P. Markopoulos, B. de Ruyter, W. Mackay (eds.) Awareness Systems: Advances in Theory, Methodology and Design. Springer-Verlag, Berlin, pp. xxx–xxx (2009)
Milberg, S.J., Burke, S.J., Smith, H.J., Kallman, E.A.: Values, Personal Information Privacy, and Regulatory Approaches. Communications of the ACM 38(12), 65–74 (1995). DOI http://doi.acm.org/10.1145/219663.219683
Nardi, B.A., Whittaker, S., Bradner, E.: Interaction and Outeraction: Instant Messaging in Action. In: CSCW ‘00: Proceedings of the 2000 ACM Conference on Computer Supported Cooperative Work, pp. 79–88. ACM, New York, NY (2000). DOI http://doi.acm.org/10.1145/358916.358975
Neale, D.C., Carroll, J.M., Rosson, M.B.: Evaluating Computer-Supported Cooperative Work: Models and Frameworks. In: CSCW ‘04: Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work, pp. 112–121. ACM, New York, NY (2004). DOI http://doi.acm.org/10.1145/1031607.1031626
Negley, G.: Philosophical Views on the Value of Privacy. Law and Contemporary Problems 31(2), 319–325 (1966)
Olson, G.M., Olson, J.S.: Distance Matters. Human–Computer Interaction 15(2/3), 139–178 (2000)
Olson, J.S., Grudin, J., Horvitz, E.: A Study of Preferences for Sharing and Privacy. In: CHI ‘05: CHI ‘05 Extended Abstracts on Human Factors in Computing Systems, pp. 1985–1988. ACM, New York, NY (2005). DOI http://doi.acm.org/10.1145/1056808.1057073
Olson, J.S., Teasley, S.: Groupware in the Wild: Lessons Learned from a Year of Virtual Collocation. In: CSCW ‘96: Proceedings of the 1996 ACM Conference on Computer Supported Cooperative Work, pp. 419–427. ACM, New York, NY (1996). DOI http://doi.acm.org/10.1145/240080.240353
Palen, L.: Social, Individual and Technological Issues for Groupware Calendar Systems. In: CHI ‘99: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 17– 24. ACM, New York, NY (1999). DOI http://doi.acm.org/10.1145/302979.302982
Palen, L., Dourish, P.: Unpacking ‘‘Privacy” for a Networked World. In: CHI ‘03: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 129–136. ACM, New York, NY (2003). DOI http://doi.acm.org/10.1145/642611.642635
Patil, S., Kobsa, A.: Instant Messaging and Privacy. In: Proceedings of HCI 2004, pp. 85–88 (2004). DOI http://www.ics.uci.edu/kobsa/papers/2004-HCI-kobsa.pdf
Patil, S., Kobsa, A.: Privacy in Collaboration: Managing Impression. In: The First International Conference on Online Communities and Social Computing. ACM, New York, NY (2005a) DOI http://www.ics.uci.edu/kobsa/papers/2005-ICOCSC-kobsa.pdf
Patil, S., Kobsa, A.: Uncovering Privacy Attitudes and Practices in Instant Messaging. In: GROUP ‘05: Proceedings of the 2005 International ACM SIGGROUP Conference on Supporting Group Work, pp. 109–112. ACM, New York, NY (2005b). DOI http://doi.acm.org/10.1145/1099203.1099220
Patil, S., Lai, J.: Who Gets to Know What When: Configuring Privacy Permissions in an Awareness Application. In: CHI ‘05: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 101–110. ACM, New York, NY (2005). DOI http://doi.acm.org/10.1145/1054972.1054987
Pinelle, D., Gutwin, C.: Designing for Loose Coupling in Mobile Groups. In: GROUP ‘03: Proceedings of the 2003 International ACM SIGGROUP Conference on Supporting Group Work, pp. 75–84. ACM, New York, NY (2003). DOI http://doi.acm.org/10.1145/958160.958173
Rachels, J.: Why Privacy Is Important. Philosophy and Public Affairs 4(4), 323–333 (1975)
Rittenbruch, M., McEwan, G.: An Historical Reflection of Awareness in Collaboration. In: P. Markopoulos, B. de Ruyter, W. Mackay (eds.) Awareness Systems: Advances in Theory, Methodology and Design. Springer-Verlag, Berlin, pp. xxx–xxx (2009)
Romero, N., Markopoulos, P.: Grounding Privacy with Awareness. In: P. Markopoulos, B. de Ruyter, W. Mackay (eds.) Awareness Systems: Advances in Theory, Methodology and Design. Springer-Verlag, Berlin, pp. xxx–xxx (2009)
Samarajiva, R.: Interactivity as Though Privacy Mattered. In: P.E. Agre, M. Rotenberg (eds.) Technology and Privacy: The New Landscape, pp. 277–309. MIT Press, Cambridge, MA (1997)
Schwartz, B.: The Social Psychology of Privacy. The American Journal of Sociology 73 (6), 741–752 (1968). DOI http://www.jstor.org/stable/2775779
Stone, E.F., Gueutal, H.G., Gardner, D.G., McClure, S.: A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations. Journal of Applied Psychology 68(3), 459–468 (1983)
Suchman, L.A.: Plans and Situated Actions: The Problem of Human–Machine Communication. Cambridge University Press, New York, NY (1987)
U.S. Department of Health Education and Welfare: Records, Computers and the Rights of Citizens. Report of the Secretary’s Advisory Committee on Automated Personal Data Systems Publication No. 1700–00116 (1973)
Warren, S.D., Brandeis, L.D.: The Right to Privacy. Harvard Law Review 4(5), 193–220 (1890)
Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967)
Westin, A.F.: Harris-Equifax Consumer Privacy Survey 1991 Equifax, Inc., Atlanta, GA (1991)
Wickramasuriya, J., Datt, M., Mehrotra, S., Venkatasubramanian, N.: Privacy Protecting Data Collection in Media Spaces. In: MULTIMEDIA ‘04: Proceedings of the 12th Annual ACM International Conference on Multimedia, pp. 48–55. ACM, New York, NY (2004). DOI http://doi.acm.org/10.1145/1027527.1027537
Acknowledgments
Some of the research described was supported by NSF grants nos. 0205724 and 0808783. We wish to acknowledge our collaborator Jennifer Lai. We also wish to thank the subjects who participated in our study on mySpace. Finally, we are grateful to Mihir Mahajan for commenting on various drafts of this chapter.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag London Limited
About this chapter
Cite this chapter
Patil, S., Kobsa, A. (2009). Privacy Considerations in Awareness Systems: Designing with Privacy in Mind. In: Markopoulos, P., De Ruyter, B., Mackay, W. (eds) Awareness Systems. Human-Computer Interaction Series. Springer, London. https://doi.org/10.1007/978-1-84882-477-5_8
Download citation
DOI: https://doi.org/10.1007/978-1-84882-477-5_8
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-84882-476-8
Online ISBN: 978-1-84882-477-5
eBook Packages: Computer ScienceComputer Science (R0)