Chair: Manfred Tscheligi, University of Salzburg, Austria
The Mismeasurement of Privacy: Using Contextual Integrity to Reconsider Privacy in HCI
Contribution & Benefit: The paper criticizes the ways in which privacy issues have been studied within HCI and ubicomp. It provides an analysis of privacy on the basis of contextual integrity.
Abstract » Privacy is a widely studied concept in relation to social computing and sensor-based technologies; scores of research papers have investigated people's "privacy preferences" and apparent reluctance to share personal data. In this paper we explore how Ubicomp and HCI studies have approached the notion of privacy, often as a quantifiable concept. Leaning on several theoretical frameworks, but in particular Nissenbaum's notion of contextual integrity, we question the viability of obtaining universal answers in terms of people's "general" privacy practices and apply elements of Nissenbaum's theory to our own data in order to illustrate its relevance. We then suggest restructuring inquiries into information sharing in studies of state-of-the-art technologies and analyze contextually grounded issues using a different, more specific vocabulary. Finally, we provide the first building blocks to such vocabulary.ACM
Tag, You Can See It! Using Tags for Access Control in Photo Sharing
Contribution & Benefit: Lab study exploring whether intuitive access-control policies can be made from photo tags created for organizational and access-control purposes. Can increase understanding of user engagement with tag-based access control systems.
Abstract » Users often have rich and complex photo-sharing preferences, but properly configuring access control can be difficult and time-consuming. In an 18-participant laboratory study, we explore whether the keywords and captions with which users tag their photos can be used to help users more intuitively create and maintain access-control policies. We find that (a) tags created for organizational purposes can be repurposed to create efficient and reasonably accurate access-control rules; (b) users tagging with access control in mind develop coherent strategies that lead to significantly more accurate rules than those associated with organizational tags alone; and (c) participants can understand and actively engage with the concept of tag-based access control.ACM
Curation, Provocation, and Digital Identity: Risks and Motivations for Sharing Provocative Images Online
Contribution & Benefit: Investigates the phenomena of posting personal, revealing, and controversial images online. Provides recommendations for the development of systems that support these activities and directions for future work.
Abstract » Among the billions of photos that have been contributed to online photo-sharing sites, there are many that are provocative, controversial, and deeply personal. Previous research has examined motivations for sharing images online and has identified several key motivations for doing so: expression, curation of identity, maintaining social connections, and recording experiences. However, few studies have focused on the perceived risks of posting photos online and even fewer have examined the risks associated with provocative, controversial, or deeply personal images. In our work, we used photo-elicitation interviews to explore the motivations for posting these types of images and the perceived risks of doing so. In this paper, we describe our findings from those interviews.ACM
The Implications of Offering More Disclosure Choices for Social Location Sharing
Contribution & Benefit: Presents findings from a study that looks at how different types of disclosure options can influence users' privacy preferences for location sharing. Can help in building better privacy configuration UIs.
Abstract » We compared two privacy configuration styles for specifying rules for social sharing one's past locations. Our findings suggest that location-sharing applications (LSAs) which support varying levels of location granularities are associated with sharing rules that are less convoluted, are less likely to be negatively phrased, and can lead to more open sharing; users are also more comfortable with these rules. These findings can help inform LSA privacy designs.ACM
Interactivity as Self-Expression: A Field Experiment with Customization and Blogging
Contribution & Benefit: Describes an experiment with a portal site varying in functional customization, cosmetic customization and active vs. filter blogging. Provides user-centered guidelines for designing interactive tools that afford self-expression.
Abstract » A paradigmatic quality of interactive interfaces is that they allow users to express themselves, thereby converting message receivers into communication sources. We define this quality as Source Interactivity [26, 29], and test its effects on user experience with a field experiment (N=141) of a portal site featuring cosmetic customization, functional customization and blogging (active versus filter). In demonstrating the psychological influence of source-based interactivity on such outcomes as user engagement, sense of agency, sense of community, intrinsic motivation and attitudes toward the interface, we discuss how designers can use them for creating interactive tools for self-expression.ACM