首页 | 本学科首页   官方微博 | 高级检索  
     


Personal privacy through understanding and action: five pitfalls for designers
Authors:Scott?Lederer  author-information"  >  author-information__contact u-icon-before"  >  mailto:lederer@cs.berkeley.edu"   title="  lederer@cs.berkeley.edu"   itemprop="  email"   data-track="  click"   data-track-action="  Email author"   data-track-label="  "  >Email author,Jason?I.?Hong,Anind?K.?Dey,James?A.?Landay
Affiliation:(1) Group for User Interface Research, Computer Science Division, University of California, Berkeley, CA, USA;(2) Intel Research, Berkeley, CA, USA;(3) DUB Group, Department of Computer Science and Engineering, University of Washington, Seattle, WA, USA;(4) Intel Research, Seattle, WA, USA
Abstract:To participate in meaningful privacy practice in the context of technical systems, people require opportunities to understand the extent of the systemsrsquo alignment with relevant practice and to conduct discernible social action through intuitive or sensible engagement with the system. It is a significant challenge to design for such understanding and action through the feedback and control mechanisms of todayrsquos devices. To help designers meet this challenge, we describe five pitfalls to beware when designing interactive systems—on or off the desktop—with personal privacy implications. These pitfalls are: (1) obscuring potential information flow, (2) obscuring actual information flow, (3) emphasizing configuration over action, (4) lacking coarse-grained control, and (5) inhibiting existing practice. They are based on a review of the literature, on analyses of existing privacy-affecting systems, and on our own experiences in designing a prototypical user interface for managing privacy in ubiquitous computing. We illustrate how some existing research and commercial systems—our prototype included—fall into these pitfalls and how some avoid them. We suggest that privacy-affecting systems that heed these pitfalls can help users appropriate and engage them in alignment with relevant privacy practice.
Contact InformationJames A. LandayEmail:
Keywords:Privacy  Interaction design  Design guidelines  Ubiquitous computing
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号