skip to main content
10.1145/1073001.1073007acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
Article

Making PRIME usable

Published:06 July 2005Publication History

ABSTRACT

Privacy-enhanced Identity Management can enable users to retain and maintain informational self-determination in our networked society. This paper describes the usability research work that has been done within the first year of the European Union project on "Privacy and Identity Management for Europe" (PRIME). It primarily discusses and compares three alternative Ul paradigms for privacy-enhanced Identity Management, and presents how important legal privacy principles derived from the European Union Directives have been mapped into suggestions of user interface solutions for PRIME. Besides, it discusses results and encountered problems from conducted usability tests on mock-ups implementing the different Ul paradigms and proposes means for addressing those problems. The paper concludes with remarks on the characteristics of usability work for privacy-enhancing technologies.

References

  1. Article 29 Data Protection Working Party. Opinion on More Harmonised Information provisions. 11987/04/EN WP 100, November 25 2004. http://europa.eu.int/comm/internal_market/privacy/workingroup/wp2004/wpdocs04_en.htmGoogle ScholarGoogle Scholar
  2. Clauß, S., Kriegelstein, T. Datenschutzfreunliches Identitätsmanagement, DuD Datenschutz und Datensicherheit 27, pp. 297, 2003.Google ScholarGoogle Scholar
  3. Cranor, L. F., Guduru, P., & Arjula, M. User Interfaces for Privacy Agents {forthcoming} ms 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector, Official Journal L No. 201, 31.07.2002.Google ScholarGoogle Scholar
  5. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Official Journal L No. 281, 23.11.1995.Google ScholarGoogle Scholar
  6. Fischer-Hübner, S. & Pettersson, J. S. (Eds.). Evaluation of early prototypes, PRIME deliverable D6.1.b, 1 December 2004. http://www.prime- project.eu.org/public/prime_products/deliverables/Google ScholarGoogle Scholar
  7. Johnston, J., Eloff, J. H. P. & Labuschagne L. Security and human computer interfaces. Computers & Security, Vol. 22 (8), pp. 675, 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Kobsa, A. Personalized Hypermedia and International Privacy. Comm. of the ACM 45(5), pp. 64--67, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Law, L-C. & Hvannberg, E. Analysis of strategies for improving and estimating the effectiveness of heuristic evaluation. In Hyrskykari, A. (Ed.) Proceedings of the Third Nordic Conference on Human-Computer Interaction, Tampere, Finland, October 23--27, 2004 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Nielsen, J. Heuristic evaluation. In Nielsen, J., and Mack, R. L. (Eds.) Usability Inspection Methods, John Wiley & Sons, New York, NY, 1994. Cf. also http://www.useit.com/papers/heuristic/heuristic_ list.html Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Nielsen, J., Molich, R., Snyder C. & Farell S. E-commerce user experience: Trust. Nielsen Norman Group, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Patrick, A. S. & Kenny, S. From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interaction. Proceedings of the Privacy Enhancing Technologies Workshop (PET2003), Dresden/Germany, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  13. Patrick, A. S., Kenny, S., Holmes C. & van Breukelen, M. Human Computer Interaction. Chapter 12 in Handbook for Privacy and Privacy-Enhancing Technologies. PISA project. Eds. van Blarkom, Borking, Olk, 2002. http://www.andrewpatrick.ca/pisa/handbook/handbook.htmlGoogle ScholarGoogle Scholar
  14. Pettersson, J. S. & Siponen, J. Ozlab - a Simple Demonstration Tool for Prototyping Interactivity. Proceedings of the Second Nordic Conference on Human-Computer Interaction, Demonstration session, October 19--23, 2002, Aarhus, Denmark. Pp. 293--294, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Pettersson, J. S. (Ed.). HCI guidance and proposals, PRIME deliverable D6.1.c, 11 February 2005. http://www.prime-project.eu.org/public/prime_products/deliverables/Google ScholarGoogle Scholar
  16. Pettersson, J. S. Ozlab -- a Systems Overview with an Account of Two Years of Experiences. Chapter 10 in Pettersson, J. S. (Ed.) HumanIT 2003, Karlstad University Studies, 26, 2003. http://www.cs.kau.se/~jsp/ozlabGoogle ScholarGoogle Scholar
  17. Pettersson, J. S. P3P and Usability -- the Mobile Case. In Duquennoy, P., Fischer-Hübner, S., Holvast J. & Zuccato A., (Eds.) Risk and challenges of the network society, Karlstad University Studies 2004:35, 2004.Google ScholarGoogle Scholar
  18. Pfitzmann, A. & Hansen, M. Anonymity, Unobservability, Pseudonymity, and Idenity Management -- A Proposal for Terminology, v0.21, 3. September 2004, http://dud.inf.tudresden.de/Literatur_V1.shtmlGoogle ScholarGoogle Scholar
  19. Raskin, J. The Humane Interface - New Directions for Designing Interactive Systems. ACM Press, New York, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. UK Information Commissioner. Annual Track Research Findings, Individuals. 2004. http:/www.informationcommissioner.gov.uk/eventual.aspxGoogle ScholarGoogle Scholar

Index Terms

  1. Making PRIME usable

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      SOUPS '05: Proceedings of the 2005 symposium on Usable privacy and security
      July 2005
      123 pages
      ISBN:1595931783
      DOI:10.1145/1073001

      Copyright © 2005 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 6 July 2005

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate15of49submissions,31%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader