A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Topic | Papers | Link | Sign-up | ||||||||||||||||
2 | Introduction | |||||||||||||||||||
3 | 1/17/2012 | Introduction, no readings | ||||||||||||||||||
4 | ||||||||||||||||||||
5 | Thinking about Privacy | |||||||||||||||||||
6 | 1/19/2012 | Palen, L., & Dourish, P. (2003). Unpacking privacy for a networked world CHI '03 Proceedings of the SIGCHI conference on human factors in computing systems (pp. 129-136). NY: ACM. | http://dl.acm.org/citation.cfm?doid=642611.642635 | Jason | ||||||||||||||||
7 | 1/24/2012 | Phil Agre book, intro and chapter 1 | http://dl.dropbox.com/u/10650739/hciprivacy/Agre_TechnologyPrivacy_IntroCh1.pdf | Idris | ||||||||||||||||
8 | 1/26/2012 | Iachello, G., & Hong, J. End-User Privacy in Human–Computer Interaction. (Read just sections 1 and 2) | http://www.cs.cmu.edu/~jasonh/publications/fnt-end-user-privacy-in-human-computer-interaction-final.pdf | |||||||||||||||||
9 | Nissenbaum, H. Privacy as Contextual Integrity. Washington Law Review, Vol. 79, No. 1, 2004. | http://papers.ssrn.com/sol3/papers.cfm?abstract_id=534622 | ||||||||||||||||||
10 | ||||||||||||||||||||
11 | Methods for Evaluating Privacy | |||||||||||||||||||
12 | 1/31/2012 | Gideon et al, Power Strips, Prophylactics, Privacy. SOUPS 2006. | http://dl.acm.org/citation.cfm?id=1143137 | Laura | ||||||||||||||||
13 | Olsen, J., Grudin, J., Horvitz, E. A study of preferences for sharing and privacy. CHI 2005 | http://dl.acm.org/citation.cfm?id=1057073 | ||||||||||||||||||
14 | 2/2/2012 | Madden, Fox, Smith, and Vitak. Digital Footprints. Pew Internet and American Life Project, 2007 | http://www.pewinternet.org/Reports/2007/Digital-Footprints.aspx | |||||||||||||||||
15 | ||||||||||||||||||||
16 | Ubicomp and Mobile Computing | |||||||||||||||||||
17 | 2/7/2012 | Iachello et al, Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world. CHI 2006. | http://dl.acm.org/citation.cfm?doid=1124772.1124923 | Bin | ||||||||||||||||
18 | Consolvo et al, Location disclosure to social relations: why, when, & what people want to share. CHI 2005. | http://dl.acm.org/citation.cfm?doid=1054972.1054985 | ||||||||||||||||||
19 | 2/9/2012 | Langheinrich, M. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. Ubicomp 2001. | http://www.cs.cmu.edu/~jasonh/courses/ubicomp-sp2007/papers/05-privacy-principles.pdf | |||||||||||||||||
20 | Grudin, J. Desituating Action: Digital Representation of Context. | http://www.cs.cmu.edu/~jasonh/courses/ubicomp-sp2007/papers/06-HCI-DesituatingAction-ContextAware.pdf | ||||||||||||||||||
21 | 2/14/2012 | Bellotti, V. Design for Privacy in Multimedia Computing and Communications Environments. | http://dl.dropbox.com/u/10650739/hciprivacy/Agre_TechnologyPrivacy_Ch2.pdf | Nitisha | ||||||||||||||||
22 | 2/16/2012 | Brush et al, Exploring end user preferences for location obfuscation, location-based services, and the value of location. Ubicomp 2010. | http://dl.acm.org/citation.cfm?doid=1864349.1864381 | |||||||||||||||||
23 | Toch et al, Empirical models of privacy in location sharing. Ubicomp 2010. | http://dl.acm.org/citation.cfm?doid=1864349.1864364 | ||||||||||||||||||
24 | 2/21/2012 | Jung, J. et al, Privacy Oracle: a System for Finding Application Leaks with Black Box Differential Testing. CCS 2008. | http://seattle.intel-research.net/pubs/ccs141-jung.pdf | JasonW | ||||||||||||||||
25 | Gruteser, M, and Grunwald, D. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. Mobisys 2003. | http://dl.acm.org/citation.cfm?id=1189037 | ||||||||||||||||||
26 | 2/23/2012 | Wiese, J. et al. Are you close with me? Are you nearby? Investigating social groups, closeness, and willingness to share. Ubicomp 2011. | http://www.cs.cmu.edu/~jasonh/publications/ubicomp2011-relationship-sharing-final.pdf | |||||||||||||||||
27 | boyd, d. Making Sense of Privacy and Publicity. | |||||||||||||||||||
28 | ||||||||||||||||||||
29 | Social networks and privacy | |||||||||||||||||||
30 | 2/28/2012 | Teens, Privacy, and Online Social Networks, Pew Internet | http://www.pewinternet.org/Reports/2007/Teens-Privacy-and-Online-Social-Networks.aspx | Rebecca & Laura | ||||||||||||||||
31 | http://www.danah.org/papers/talks/2010/SXSW2010.html | |||||||||||||||||||
32 | 3/1/2012 | boyd, d., & Hargittai, E. (2010). Facebook privacy settings: Who cares? First Monday, 15(8). | http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/3086/2589 | |||||||||||||||||
33 | Joinson, A. Looking at, looking up or keeping up with people?: motives and use of facebook. CHI2008. | http://dl.acm.org/citation.cfm?id=1357213 | ||||||||||||||||||
34 | 3/6/2012 | Wang et al. I regretted the minute I pressed share: A qualitative study of regrets on Facebook. SOUPS 2011. | http://dl.acm.org/citation.cfm?doid=2078827.2078841 | JasonW & Nitisha | ||||||||||||||||
35 | Rosen, J. (2010, July 21). The Web Means the End of Forgetting, The New York Times. | http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html?pagewanted=all | ||||||||||||||||||
36 | 3/8/2012 | Lujun Fang and Kristen LeFevre. Privacy Wizards for Social Networking Sites, WWW 2010 | http://www.eecs.umich.edu/~klefevre/Publications_files/www2010.pdf | |||||||||||||||||
37 | Adams, P. The Real Life Social Network. Presentation at Voices That Matter Web Design Conference | http://www.slideshare.net/padday/the-real-life-social-network-v2 | ||||||||||||||||||
38 | 3/13/2012 | Spring Break | No class | |||||||||||||||||
39 | 3/15/2012 | Spring Break | No class | |||||||||||||||||
40 | 3/20/2012 | Besmer, A., and Lipford, H. Moving beyond untagging: photo privacy in a tagged world. CHI 2010. | http://dl.acm.org/citation.cfm?doid=1753326.1753560 | Sonam | ||||||||||||||||
41 | Over-exposed?: privacy patterns and considerations in online and mobile photo sharing | http://dl.acm.org/citation.cfm?doid=1240624.1240683 | ||||||||||||||||||
42 | 3/22/2012 | Stutzman et al. Privacy in Interaction: Exploring Disclosure and Social Capital in Facebook. ICWSM 2012 | http://fredstutzman.com/papers/ICWSM2012_Stutzman.pdf | Sonam | ||||||||||||||||
43 | ||||||||||||||||||||
44 | ||||||||||||||||||||
45 | Web privacy | |||||||||||||||||||
46 | 3/27/2012 | Anton, A., et al. How Internet Users’ Privacy Concerns Have Evolved Since 2002. IEEE Security & Privacy 2009 | http://theprivacyplace.org/blog/wp-content/uploads/2009/07/tr_2009_16.pdf | Bin :) | ||||||||||||||||
47 | The ChoicePoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information | http://theprivacyplace.org/blog/wp-content/uploads/2008/07/tr-2006-18u.pdf | ||||||||||||||||||
48 | 3/29/2012 | Jensen, C., and Potts, C. Privacy policies as decision-making tools: an evaluation of online privacy notices. CHI 2004. | http://dl.acm.org/citation.cfm?id=985752 | Sonam | ||||||||||||||||
49 | Kelley et al, Standardizing privacy notices: an online study of the nutrition label approach. CHI 2010 | http://dl.acm.org/citation.cfm?doid=1753326.1753561 | ||||||||||||||||||
50 | 4/3/2012 | Privacy Diffusion on the Web: A Longitudinal Perspective | http://www2009.eprints.org/55/ | Rebecca | ||||||||||||||||
51 | http://www.theatlantic.com/technology/archive/2012/02/im-being-followed-how-google-151-and-104-other-companies-151-are-tracking-me-on-the-web/253758/ | |||||||||||||||||||
52 | Americans’ Attitudes About Internet Behavioral Advertising Practices | http://dl.acm.org/citation.cfm?id=1866929 | ||||||||||||||||||
53 | 4/5/2012 | Track Gap: Policy Implications of User Expectations for the 'Do Not Track' Internet Privacy Feature | http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1993133 | |||||||||||||||||
54 | Why Johnny Can’t Opt Out: A usability evaluation of tools to limit online behavioral advertising | http://www.cylab.cmu.edu/files/pdfs/tech_reports/CMUCyLab11017.pdf | ||||||||||||||||||
55 | 4/10/2012 | Brodie, C., et al. An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench. SOUPS 2006 | http://dl.acm.org/citation.cfm?doid=1143120.1143123 | Hassan | ||||||||||||||||
56 | Lipford et al, Visual vs. compact: a comparison of privacy policy interfaces. CHI 2010 | http://dl.acm.org/citation.cfm?doid=1753326.1753492 | ||||||||||||||||||
57 | 4/12/2012 | Conti et al. An honest man has nothing to fear: user perceptions on web-based information disclosure. SOUPS 2007 | http://dl.acm.org/citation.cfm?id=1280695 | |||||||||||||||||
58 | Draft of paper: Anonymity in Online Groups and Communities (take good notes to help our fellow CMU author of this paper) | |||||||||||||||||||
59 | ||||||||||||||||||||
60 | Cultural and Economic Aspects of Privacy | |||||||||||||||||||
61 | 4/17/2012 | Who Is Concerned about What? A Study of American, Chinese and Indian Users' Privacy Concerns on Social Network Sites | http://www.cs.cmu.edu/~yangwan1/papers/TRUST2011-%C2%AD-AuthorCopy.pdf | ken | ||||||||||||||||
62 | From Privacy Concern to Uses of Social Network Sites: A Cultural Comparison via User Survey | http://www.comp.hkbu.edu.hk/~lichen/download/socialcom11_4578a457.pdf | ||||||||||||||||||
63 | 4/19/2012 | No class, Spring carnival | xxx | |||||||||||||||||
64 | 4/24/2012 | Huberman, Fine, Adar. Privacy and Deviation. | http://papers.ssrn.com/sol3/papers.cfm?abstract_id=488863 | Manu | ||||||||||||||||
65 | Privacy, Economics, and Price Discrimination on the Internet | http://www.dtc.umn.edu/~odlyzko/doc/privacy.economics.pdf | ||||||||||||||||||
66 | 4/26/2012 | Acquisti, A. Nudging Privacy: The Behavioral Economics of Personal Information. Computing Now. | http://www.heinz.cmu.edu/~acquisti/papers/acquisti-privacy-nudging.pdf | |||||||||||||||||
67 | Acquisti, A., Grossklags, J. Privacy and Rationality in Individual Decision Making. IEEE Security and Privacy 2005. | http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1392696 | ||||||||||||||||||
68 | 5/2/2012 | Personal privacy through understanding and action: five pitfalls for designers | http://www.cs.cmu.edu/~jasonh/publications/puc2004-five-pitfalls.pdf | Manu | ||||||||||||||||
69 | Edwards et al, Security Automation Considered Harmful? | http://www.cc.gatech.edu/~keith/pubs/nspw07-security-automation.pdf | ||||||||||||||||||
70 | 5/4/2012 | Predictions for the Future / Research Agenda | ??? | |||||||||||||||||
71 | ||||||||||||||||||||
72 | ||||||||||||||||||||
73 | ||||||||||||||||||||
74 | ||||||||||||||||||||
75 | ||||||||||||||||||||
76 | ||||||||||||||||||||
77 | ||||||||||||||||||||
78 | ||||||||||||||||||||
79 | ||||||||||||||||||||
80 | ||||||||||||||||||||
81 | ||||||||||||||||||||
82 | ||||||||||||||||||||
83 | ||||||||||||||||||||
84 | ||||||||||||||||||||
85 | ||||||||||||||||||||
86 | ||||||||||||||||||||
87 | ||||||||||||||||||||
88 | ||||||||||||||||||||
89 | ||||||||||||||||||||
90 | ||||||||||||||||||||
91 | ||||||||||||||||||||
92 | ||||||||||||||||||||
93 | ||||||||||||||||||||
94 | ||||||||||||||||||||
95 | ||||||||||||||||||||
96 | ||||||||||||||||||||
97 | ||||||||||||||||||||
98 | ||||||||||||||||||||
99 | ||||||||||||||||||||
100 |