Read e-book online End-User Privacy in Human-Computer Interaction (Foundations PDF

By Giovanni Iachello

ISBN-10: 1601980760

ISBN-13: 9781601980762

ISBN-10: 1601980779

ISBN-13: 9781601980779

End-User privateness in Human-Computer interplay surveys the wealthy and numerous panorama of privateness in Human-Computer interplay (HCI) and desktop Supported Cooperative paintings (CSCW), describing many of the felony foundations and old features of privateness, sketching out an outline of the physique of data with recognize to designing, imposing, and comparing privacy-affecting structures, and charting many instructions for destiny paintings. The authors first summarize the examine that has been performed at the subject during the last 3 a long time, outlining present ways, effects, and developments. They continue to chart destiny learn developments and indicate components of analysis which are well timed yet lagging. In summarizing thirty years of privateness learn in HCI and CSCW, End-User privateness in Human-Computer interplay is helping to make clear a few of the salient concerns and may aid practitioners and researchers alike discover those advanced concerns in a extra knowledgeable and awake means.

Show description

Read or Download End-User Privacy in Human-Computer Interaction (Foundations and Trends in Human-Computer Interaction) PDF

Similar human-computer interaction books

Download e-book for kindle: Vision: Human and Electronic by Albert Rose (auth.)

The content material of this monograph stems from the writer's early involvement with the layout of a sequence of tv digicam tubes: the orthicon, the picture orthicon and the vidicon. those tubes and their adaptations, have, at diversified occasions been the "eyes" of the tv approach virtually from its inception in 1939.

Get Human Factors and Web Development PDF

End result of the ever-changing technological panorama and the worldwide integration of the web in colleges, libraries, houses, and companies, the content material of this moment variation replaced considerably. due to the fact many laptop clients are attached at either domestic and paintings, the internet has reworked communique; intake styles; and entry to company, politicians, and pals midway all over the world.

Additional info for End-User Privacy in Human-Computer Interaction (Foundations and Trends in Human-Computer Interaction)

Sample text

Two such media that have enjoyed widespread adoption in recent years are SMS and Instant Messaging (IM). Patil and Kobsa interviewed seven participants on the privacy issues involved in IM [228]. H¨akkil¨a and Chatfield surveyed people in two different locales (Finland and Australia) about SMS messaging practices and privacy expectations of the medium [135]. , interviewees would not pick up others’ phone calls, and expected the recipient of their text messages to preserve confidentiality). H¨akkil¨a and Chatfield note that the selection of communication medium (SMS over voice) was influenced by confidentiality considerations.

The condensed privacy policy is a half-page summary of the complete privacy policy. The condensed privacy policy summarizes the most important points, whereas the complete privacy policy might span multiple pages is comprehensive. 1 To systematize the wide range of claims contained in privacy policies, Anton and Earp produced a dictionary of privacy claims contained in the privacy policies of 25 major US retailers’ web sites [21]. Similar to Dourish et al. [82], Anton and Earp used Grounded Theory and goal mining techniques to extract these claims and produced a list of 124 privacy goals.

Barkhuus and Dey employed a diary to perform an interval-contingent study about the location disclosure preferences in location-based applications [30]. This study was based in part on the Active Campus technology developed at UCSD, which includes a location-aware mobile terminal usable within the university campus. In Barkhuus and Dey’s study, participants were asked to fill out, every evening, a diary entry detailing the perceived usefulness and perceived invasiveness of one of two kinds of location-based applications, with reference to the participant’s activities during that day.

Download PDF sample

End-User Privacy in Human-Computer Interaction (Foundations and Trends in Human-Computer Interaction) by Giovanni Iachello

by Michael

Rated 4.84 of 5 – based on 9 votes