ABCDEFGHIJKLMNOPQRST
1
TopicPapersLinkSign-up
2
Introduction
3
1/17/2012Introduction, no readings
4
5
Thinking about Privacy
6
1/19/2012Palen, L., & Dourish, P. (2003). Unpacking privacy for a networked world CHI '03 Proceedings of the SIGCHI conference on human factors in computing systems (pp. 129-136). NY: ACM.http://dl.acm.org/citation.cfm?doid=642611.642635Jason
7
1/24/2012Phil Agre book, intro and chapter 1http://dl.dropbox.com/u/10650739/hciprivacy/Agre_TechnologyPrivacy_IntroCh1.pdfIdris
8
1/26/2012Iachello, G., & Hong, J. End-User Privacy in Human–Computer Interaction. (Read just sections 1 and 2)http://www.cs.cmu.edu/~jasonh/publications/fnt-end-user-privacy-in-human-computer-interaction-final.pdf
9
Nissenbaum, H. Privacy as Contextual Integrity. Washington Law Review, Vol. 79, No. 1, 2004.http://papers.ssrn.com/sol3/papers.cfm?abstract_id=534622
10
11
Methods for Evaluating Privacy
12
1/31/2012Gideon et al, Power Strips, Prophylactics, Privacy. SOUPS 2006.http://dl.acm.org/citation.cfm?id=1143137Laura
13
Olsen, J., Grudin, J., Horvitz, E. A study of preferences for sharing and privacy. CHI 2005http://dl.acm.org/citation.cfm?id=1057073
14
2/2/2012Madden, Fox, Smith, and Vitak. Digital Footprints. Pew Internet and American Life Project, 2007http://www.pewinternet.org/Reports/2007/Digital-Footprints.aspx
15
16
Ubicomp and Mobile Computing
17
2/7/2012Iachello et al, Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world. CHI 2006.http://dl.acm.org/citation.cfm?doid=1124772.1124923Bin
18
Consolvo et al, Location disclosure to social relations: why, when, & what people want to share. CHI 2005.http://dl.acm.org/citation.cfm?doid=1054972.1054985
19
2/9/2012Langheinrich, M. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. Ubicomp 2001.http://www.cs.cmu.edu/~jasonh/courses/ubicomp-sp2007/papers/05-privacy-principles.pdf
20
Grudin, J. Desituating Action: Digital Representation of Context.http://www.cs.cmu.edu/~jasonh/courses/ubicomp-sp2007/papers/06-HCI-DesituatingAction-ContextAware.pdf
21
2/14/2012Bellotti, V. Design for Privacy in Multimedia Computing and Communications Environments.http://dl.dropbox.com/u/10650739/hciprivacy/Agre_TechnologyPrivacy_Ch2.pdfNitisha
22
2/16/2012Brush et al, Exploring end user preferences for location obfuscation, location-based services, and the value of location. Ubicomp 2010.http://dl.acm.org/citation.cfm?doid=1864349.1864381
23
Toch et al, Empirical models of privacy in location sharing. Ubicomp 2010.http://dl.acm.org/citation.cfm?doid=1864349.1864364
24
2/21/2012Jung, J. et al, Privacy Oracle: a System for Finding Application Leaks with Black Box Differential Testing. CCS 2008.http://seattle.intel-research.net/pubs/ccs141-jung.pdfJasonW
25
Gruteser, M, and Grunwald, D. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. Mobisys 2003.http://dl.acm.org/citation.cfm?id=1189037
26
2/23/2012Wiese, J. et al. Are you close with me? Are you nearby? Investigating social groups, closeness, and willingness to share. Ubicomp 2011.http://www.cs.cmu.edu/~jasonh/publications/ubicomp2011-relationship-sharing-final.pdf
27
boyd, d. Making Sense of Privacy and Publicity.
28
29
Social networks and privacy
30
2/28/2012Teens, Privacy, and Online Social Networks, Pew Internethttp://www.pewinternet.org/Reports/2007/Teens-Privacy-and-Online-Social-Networks.aspxRebecca & Laura
31
http://www.danah.org/papers/talks/2010/SXSW2010.html
32
3/1/2012boyd, d., & Hargittai, E. (2010). Facebook privacy settings: Who cares? First Monday, 15(8). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/3086/2589
33
Joinson, A. Looking at, looking up or keeping up with people?: motives and use of facebook. CHI2008.http://dl.acm.org/citation.cfm?id=1357213
34
3/6/2012Wang et al. I regretted the minute I pressed share: A qualitative study of regrets on Facebook. SOUPS 2011.http://dl.acm.org/citation.cfm?doid=2078827.2078841JasonW & Nitisha
35
Rosen, J. (2010, July 21). The Web Means the End of Forgetting, The New York Times.http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html?pagewanted=all
36
3/8/2012Lujun Fang and Kristen LeFevre. Privacy Wizards for Social Networking Sites, WWW 2010http://www.eecs.umich.edu/~klefevre/Publications_files/www2010.pdf
37
Adams, P. The Real Life Social Network. Presentation at Voices That Matter Web Design Conferencehttp://www.slideshare.net/padday/the-real-life-social-network-v2
38
3/13/2012Spring BreakNo class
39
3/15/2012Spring BreakNo class
40
3/20/2012Besmer, A., and Lipford, H. Moving beyond untagging: photo privacy in a tagged world. CHI 2010.http://dl.acm.org/citation.cfm?doid=1753326.1753560Sonam
41
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing http://dl.acm.org/citation.cfm?doid=1240624.1240683
42
3/22/2012Stutzman et al. Privacy in Interaction: Exploring Disclosure and Social Capital in Facebook. ICWSM 2012http://fredstutzman.com/papers/ICWSM2012_Stutzman.pdfSonam
43
44
45
Web privacy
46
3/27/2012Anton, A., et al. How Internet Users’ Privacy Concerns Have Evolved Since 2002. IEEE Security & Privacy 2009http://theprivacyplace.org/blog/wp-content/uploads/2009/07/tr_2009_16.pdfBin :)
47
The ChoicePoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Informationhttp://theprivacyplace.org/blog/wp-content/uploads/2008/07/tr-2006-18u.pdf
48
3/29/2012Jensen, C., and Potts, C. Privacy policies as decision-making tools: an evaluation of online privacy notices. CHI 2004.http://dl.acm.org/citation.cfm?id=985752Sonam
49
Kelley et al, Standardizing privacy notices: an online study of the nutrition label approach. CHI 2010http://dl.acm.org/citation.cfm?doid=1753326.1753561
50
4/3/2012Privacy Diffusion on the Web: A Longitudinal Perspectivehttp://www2009.eprints.org/55/Rebecca
51
http://www.theatlantic.com/technology/archive/2012/02/im-being-followed-how-google-151-and-104-other-companies-151-are-tracking-me-on-the-web/253758/
52
Americans’ Attitudes About Internet Behavioral Advertising Practiceshttp://dl.acm.org/citation.cfm?id=1866929
53
4/5/2012Track Gap: Policy Implications of User Expectations for the 'Do Not Track' Internet Privacy Featurehttp://papers.ssrn.com/sol3/papers.cfm?abstract_id=1993133
54
Why Johnny Can’t Opt Out: A usability evaluation of tools to limit online behavioral advertisinghttp://www.cylab.cmu.edu/files/pdfs/tech_reports/CMUCyLab11017.pdf
55
4/10/2012Brodie, C., et al. An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench. SOUPS 2006http://dl.acm.org/citation.cfm?doid=1143120.1143123Hassan
56
Lipford et al, Visual vs. compact: a comparison of privacy policy interfaces. CHI 2010http://dl.acm.org/citation.cfm?doid=1753326.1753492
57
4/12/2012Conti et al. An honest man has nothing to fear: user perceptions on web-based information disclosure. SOUPS 2007http://dl.acm.org/citation.cfm?id=1280695
58
Draft of paper: Anonymity in Online Groups and Communities (take good notes to help our fellow CMU author of this paper)
59
60
Cultural and Economic Aspects of Privacy
61
4/17/2012Who Is Concerned about What? A Study of American, Chinese and Indian Users' Privacy Concerns on Social Network Sites http://www.cs.cmu.edu/~yangwan1/papers/TRUST2011-%C2%AD-AuthorCopy.pdfken
62
From Privacy Concern to Uses of Social Network
Sites: A Cultural Comparison via User Survey
http://www.comp.hkbu.edu.hk/~lichen/download/socialcom11_4578a457.pdf
63
4/19/2012No class, Spring carnivalxxx
64
4/24/2012Huberman, Fine, Adar. Privacy and Deviation. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=488863Manu
65
Privacy, Economics, and Price Discrimination
on the Internet
http://www.dtc.umn.edu/~odlyzko/doc/privacy.economics.pdf
66
4/26/2012Acquisti, A. Nudging Privacy: The Behavioral Economics of Personal Information. Computing Now.http://www.heinz.cmu.edu/~acquisti/papers/acquisti-privacy-nudging.pdf
67
Acquisti, A., Grossklags, J. Privacy and Rationality in Individual Decision Making. IEEE Security and Privacy 2005. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1392696
68
5/2/2012Personal privacy through understanding and action: five pitfalls for designers http://www.cs.cmu.edu/~jasonh/publications/puc2004-five-pitfalls.pdfManu
69
Edwards et al, Security Automation Considered Harmful?http://www.cc.gatech.edu/~keith/pubs/nspw07-security-automation.pdf
70
5/4/2012Predictions for the Future / Research Agenda???
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100