skip to main content
10.1145/1056808.1056934acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article

Privacy gradients: exploring ways to manage incidental information during co-located collaboration

Published: 02 April 2005 Publication History

Abstract

This research introduces privacy issues related to the viewing of incidental information during co-located collaboration. Web browsers were the representative application used in this research as they have several convenience features that record and display traces of previous web page visits. A one-week field study examined how individuals perceive privacy needs relating to the later incidental viewing of traces of their browsing activity. Participants used a 4-tier privacy gradient to classify the privacy of their actual web browsing. The results revealed per window patterns of privacy during browsing with streaks at given privacy levels and relatively few transitions between levels. Management of incidental information is a complex problem due to multiple viewing contexts, individual differences, and the large volume of information. These privacy patterns suggest that a semi-automated approach to privacy management may be feasible.

References

[1]
Ackerman, M., Cranor, L., and Reagle, J. (1999). Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences. In Proceedings of ACM Conference on Electronic Commerce, Denver, CO. 1--8.
[2]
Cadiz, J. and Gupta, A. (2001). Privacy Interfaces for Collaboration (No. MSR-TR-2001-82). Redmond, WA. Microsoft Research.
[3]
Hawkey, K. and Inkpen, K. (2004). Privacy Gradients: Understanding Web Browsing Privacy During Ad Hoc Co-Located Collaboration (No. CS-2004-18). Halifax, NS. Dalhousie University.
[4]
Lau, T., Etzioni, O., and Weld, D. S. (1999). Privacy Interfaces for Information Management. Communications of the ACM, 42(10): 89--94.
[5]
Moor, J. H. (1997). Towards a Theory of Privacy in the Information Age. ACM SIGCAS Computers and Society, 27(3): 27--32.
[6]
Palen, L. and Dourish, P. (2003). Unpacking "Privacy" for a Networked World. In Proceedings of CHI '03, Ft. Lauderdale, FL. 129--136.
[7]
Tan, D. S. and Czerwinski, M. (2003). Information Voyeurism: Social Impact of Physically Large Displays on Information Privacy. In Extended Abstracts of CHI '03, Ft. Lauderdale, FL. 748--749.

Cited By

View all
  • (2016)(The Lack of) Privacy Concerns with Sharing Web Activity at Work and the Implications for Collaborative SearchProceedings of the 2016 ACM on Conference on Human Information Interaction and Retrieval10.1145/2854946.2854977(43-52)Online publication date: 13-Mar-2016
  • (2011)The decreasing marginal value of evaluation network sizeACM SIGCAS Computers and Society10.1145/2095266.209526941:1(23-37)Online publication date: 1-Oct-2011
  • (2009)Image, appearance and vanity in the use of media spaces and video conference systemsProceedings of the 2009 ACM International Conference on Supporting Group Work10.1145/1531674.1531712(253-262)Online publication date: 13-May-2009
  • Show More Cited By

Index Terms

  1. Privacy gradients: exploring ways to manage incidental information during co-located collaboration

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CHI EA '05: CHI '05 Extended Abstracts on Human Factors in Computing Systems
      April 2005
      1358 pages
      ISBN:1595930027
      DOI:10.1145/1056808
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 02 April 2005

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. ad hoc collaboration
      2. client-side logging
      3. contexts of use
      4. field study
      5. privacy
      6. web browsing

      Qualifiers

      • Article

      Conference

      CHI05
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 6,164 of 23,696 submissions, 26%

      Upcoming Conference

      CHI 2025
      ACM CHI Conference on Human Factors in Computing Systems
      April 26 - May 1, 2025
      Yokohama , Japan

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)4
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 06 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2016)(The Lack of) Privacy Concerns with Sharing Web Activity at Work and the Implications for Collaborative SearchProceedings of the 2016 ACM on Conference on Human Information Interaction and Retrieval10.1145/2854946.2854977(43-52)Online publication date: 13-Mar-2016
      • (2011)The decreasing marginal value of evaluation network sizeACM SIGCAS Computers and Society10.1145/2095266.209526941:1(23-37)Online publication date: 1-Oct-2011
      • (2009)Image, appearance and vanity in the use of media spaces and video conference systemsProceedings of the 2009 ACM International Conference on Supporting Group Work10.1145/1531674.1531712(253-262)Online publication date: 13-May-2009
      • (2009)Examining the Shifting Nature of Privacy, Identities, and Impression Management with Web 2.0Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 0410.1109/CSE.2009.434(990-995)Online publication date: 29-Aug-2009
      • (2008)Exploring a human centered approach to managing visual privacy concerns during collaborationProceedings of the 3rd ACM international workshop on Human-centered computing10.1145/1462027.1462038(69-76)Online publication date: 31-Oct-2008
      • (2007)Virtual wallsProceedings of the 5th international conference on Pervasive computing10.5555/1758156.1758169(162-179)Online publication date: 13-May-2007
      • (2007)PrivateBitsProceedings of Graphics Interface 200710.1145/1268517.1268553(215-223)Online publication date: 28-May-2007
      • (2007)A Goal‐based Classification of Web Information TasksProceedings of the American Society for Information Science and Technology10.1002/meet.1450430112143:1(1-22)Online publication date: 10-Oct-2007
      • (2007)A field study characterizing Web‐based information‐seeking tasksJournal of the American Society for Information Science and Technology10.1002/asi.2059058:7(999-1018)Online publication date: 29-Mar-2007
      • (2006)The impact of task on the usage of web browser navigation mechanismsProceedings of Graphics Interface 200610.5555/1143079.1143118(235-242)Online publication date: 7-Jun-2006
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media