Privacy in the United States: Some Implications for Design (original) (raw)
Related papers
Personal Privacy Through Understanding and Action: Five Pitfalls for Designers
Personal and Ubiquitous …, 2004
To participate in meaningful privacy practice in the context of technical systems, people require opportunities to understand the extent of the systems' alignment with relevant practice and to conduct discernible social action through intuitive or sensible engagement with the system. It is a significant challenge to design for such understanding and action through the feedback and control mechanisms of today's devices. To help designers meet this challenge, we describe five pitfalls to beware when designing interactive systems-on or off the desktop-with personal privacy implications. These pitfalls are: obscuring potential information flow, obscuring actual information flow, emphasizing configuration over action, lacking coarse-grained control, and inhibiting existing practice. They are based on a review of the literature, on analyses of existing privacy-affecting systems, and on our own experiences designing a prototypical user interface for managing privacy in ubiquitous computing. We illustrate how some existing research and commercial systems-our prototype included-fall into these pitfalls and how some avoid 2 them. We suggest that privacy-affecting systems that heed these pitfalls can help users appropriate and engage them in alignment with relevant privacy practice.
Crafting Privacy: Two Case Studies Integrating Cross-Disciplinary Perspectives on Privacy in Design
2019
Privacy by design is a widely acknowledged necessity, yet its practice is still in its infancy. Many scholars have argued that privacy by design requires a cross-disciplinary approach in which privacy perspectives from different disciplines need to be integrated from the beginning of the design process. This paper investigates the potentials and shortcomings of a workshop format, used in the early stages of a (re)design process, to integrate viewpoints of multiple stakeholders from different disciplines. The workshop is used in two cases involving privacy issues, in the healthcare and in the insurance domain. The results show that different stakeholders, representing social, technological, ethical, legal, domain and user perspectives, identified different problems. Together, they thus provided a more complete view on the issues at stake, forming a better starting point to account for privacy in the design process. Based on the results, the paper suggests a number of research directi...
Proceeding of the twenty-sixth annual CHI conference extended abstracts on Human factors in computing systems - CHI '08, 2008
The appropriation of privacy: Policies and practices of everyday technology use
Privacy is a complex concept involving dimensions of access and control of shared information, expectations of intended audience, and appreciation of the context in which a communication takes place. As new technologies are introduced and become ubiquitous, they intersect with influences of culture and experience to influence and appropriate privacy's interpretation and meaning. This panel will explore how conceptions of privacy are shaped and understood by examining the implications that everyday technologies, and the policies and practices embodied therein, hold for the realization of privacy goals. Culture, mobility and utility of new media forms challenge the conception and construction of privacy in these multiple contexts, and these in turn seize and shape our sociability and interactions with others. understood and potentially appropriated in everyday contexts. In doing so, we hope to enhance and refine our understanding of privacy as a desirable and valued outcome.
Internet Policy Review, 2019
This contribution provides a short introduction into the conceptual and socio-technical development of privacy. It identifies central issues that inform and structure current debates as well as transformations of privacy spurred by digital technology. In particular, it highlights central ambivalences of privacy between protection and de-politicization and the relation of individual and social perspectives. A second section connects these issues to the influential texts and discussions on digital privacy. In particular, we will demonstrate privacy in digital societies is to be conceived in a novel way, since contemporary socio-technical conditions unsettle central assumptions of established theories: forms of perceptions, social structure or individual rights. Thus, a final third paragraph summarises theoretical innovations triggered by this situationespecially research from computer science to the social sciences and law and philosophy highlighting the requirement to take groups, social relations and broader socio-cultural contexts into account.
Designing with privacy in mind
2005
Designers and researchers of awareness systems have recognized and acknowledged the existence of privacy concerns in systems covering a wide variety of domains (eg email [eg, 1], media spaces [eg, 7], data mining [eg 18], homes with advanced domestic technologies [eg, 8] and so on). Several factors contribute to making dealing with privacy issues in the digital domain quite challenging [13].
The Evolving Path of “the Right to Be Left Alone” - When Privacy Meets Technology
2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)
This paper deals with the hot, evergreen topic of the relationship between privacy and technology. We give extensive motivation for why the privacy debate is still alive for private citizens and institutions, and we investigate the privacy concept. This paper proposes our vision of the privacy ecosystem, introducing privacy dimensions, the related users' expectations, the privacy violations, and the changing factors. We provide a critical assessment of the Privacy by Design paradigm, strategies, tactics, patterns, and Privacy-Enhancing Technologies, highlighting the current open issues. We believe that promising approaches to tackle the privacy challenges move in two directions: (i) identification of effective privacy metrics; and (ii) adoption of formal tools to design privacy-compliant applications.
Translating privacy into digital designs: technical strategies to counter everyday surveillance
cosic.esat.kuleuven.be
Abstract. Privacy policies, data protection frameworks, and privacy (enhancing) technologies exist as a conglomeration of strategies that seek to counter issues arising from the proliferation of digitally mediated surveillance in everyday life. Systems designers and policy makers have proposed the introduction of privacy related measures into Information Technology (IT) systems at their inception and during their development in recent years as an effort to limit potential harms created by the intensification of digitally mediated ...