Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3290605.3300745acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article
Open access

Should I Agree?: Delegating Consent Decisions Beyond the Individual

Published: 02 May 2019 Publication History

Abstract

Obtaining meaningful user consent is increasingly problematic in a world of numerous, heterogeneous digital services. Current approaches (e.g. agreeing to Terms and Conditions) are rooted in the idea of individual control despite growing evidence that users do not (or cannot) exercise such control in informed ways. We consider an alternative approach whereby users can opt to delegate consent decisions to an ecosystem of third-parties including friends, experts, groups and AI entities. We present the results of a study that used a technology probe at a large festival to explore initial public responses to this reframing -- focusing on when and to whom users would delegate such decisions. The results reveal substantial public interest in delegating consent and identify differing preferences depending on the privacy context, highlighting the need for alternative decision mechanisms beyond the current focus on individual choice.

Supplementary Material

MP4 File (paper515.mp4)

References

[1]
Elena Agapie, Lucas Colusso, Sean A. Munson, and Gary Hsieh. 2016. PlanSourcing: Generating Behavior Change Plans with Friends and Crowds. In Proceedings of the 19th ACM Conference on ComputerSupported Cooperative Work & Social Computing (CSCW '16). ACM, New York, NY, USA, 119--133.
[2]
Yuvraj Agarwal and Malcolm Hall. 2013. ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing. In Proceeding of the 11th annual international conference on Mobile systems, applications, and services. ACM, Taipei, Taiwan, 97--110.
[3]
Tim Baarslag, Alper T. Alan, Richard Gomer, Muddasser Alam, Charith Perera, and Enrico H. Gerding. 2017. An Automated Negotiation Agent for Permission Management. In Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems. International Foundation for Autonomous Agents and Multiagent Systems, São Paulo, Brazil, 380--390.
[4]
Solon Barocas and Helen Nissenbaum. 2014. Big Data's End Run Around Procedural Privacy Protections. Commun. ACM 57, 11 (Oct. 2014), 31--33.
[5]
Anja Bechmann. 2014. Non-Informed Consent Cultures: Privacy Policies and App Contracts on Facebook. Journal of Media Business Studies 11, 1 (March 2014), 21--38.
[6]
Rajesh Bejugam and Kirsten LeFevre. 2011. enList: Automatically Simplifying Privacy Policies. In 2011 IEEE 11th International Conference on Data Mining Workshops. IEEE, Vancouver, BC, Canada, 620--627.
[7]
Ardion Beldad, Thea van der Geest, Menno de Jong, and Michael Steehouder. 2012. Shall I Tell You Where I Live and Who I Am? Factors Influencing the Behavioral Intention to Disclose Personal Data for Online Government Transactions. International Journal of HumanComputer Interaction 28, 3 (March 2012), 163--177.
[8]
Ruha Benjamin. 2016. Informed Refusal: Toward a Justice-based Bioethics. Science, Technology, & Human Values 41, 6 (Nov. 2016), 967--990.
[9]
Jeffrey P. Bigham, Chandrika Jayant, Hanjie Ji, Greg Little, Andrew Miller, Robert C. Miller, Aubrey Tatarowicz, Brandyn White, Samuel White, and Tom Yeh. 2010. VizWiz: Nearly Real-time Answers to Visual Questions. In Proceedings of the 2010 International Cross Disciplinary Conference on Web Accessibility (W4A) (W4A '10). ACM, New York, NY, USA, Article 24, 2 pages.
[10]
Igor Bilogrevic, Kévin Huguenin, Berker Agir, Murtuza Jadliwala, Maria Gazaki, and Jean-Pierre Hubaux. 2016. A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing 25 (Jan. 2016), 125--142.
[11]
Igor Bilogrevic, Kévin Huguenin, Murtuza Jadliwala, Florent Lopez, Jean-Pierre Hubaux, Philip Ginzboorg, and Valtteri Niemi. 2013. Inferring social ties in pervasive networks: an on-campus comparative study. In Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication - UbiComp '13 Adjunct. ACM Press, Zurich, Switzerland, 123--126.
[12]
Kirsten Boehner, Janet Vertesi, Phoebe Sengers, and Paul Dourish. 2007. How HCI Interprets the Probes. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '07). ACM, New York, NY, USA, 1077--1086.
[13]
Judee K. Burgoon. 1982. Privacy and Communication. Annals of the International Communication Association 6, 1 (Jan. 1982), 206--249.
[14]
France Bélanger, Robert E. Crossler, Janine S. Hiller, Jung-Min Park, and Michael S. Hsiao. 2013. POCKET: A tool for protecting children's privacy online. Decision Support Systems 54, 2 (Jan. 2013), 1161--1173.
[15]
Amir Chaudhry, Jon Crowcroft, Heidi Howard, Anil Madhavapeddy, Richard Mortier, Hamed Haddadi, and Derek McAuley. 2015. Personal Data: Thinking Inside the Box. Aarhus Series on Human Centered Computing 1, 1 (Oct. 2015), 4.
[16]
Hyunyi Cho and Robert Larose. 1999. Privacy Issues in Internet Surveys. Social Science Computer Review 17, 4 (Nov. 1999), 421--434.
[17]
Andy Cockburn, Carl Gutwin, and Alan Dix. 2018. HARK No More: On the Preregistration of CHI Experiments. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, New York, NY, USA, 141:1--141:12.
[18]
Bart Custers. 2016. Click here to consent forever: Expiry dates for informed consent. Big Data & Society 3, 1 (Jan. 2016), 2053951715624935.
[19]
Tobias Dienlin. 2014. The Privacy Process Model. In Medien und Privatheit, M. Herz & J.-M. Mönig S. Garnett, S. Halft (Ed.). Stutz, Passau, Germany, 105--122.
[20]
Djellel Difallah, Elena Filatova, and Panos Ipeirotis. 2018. Demographics and Dynamics of Mechanical Turk Workers. In Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining (WSDM '18). ACM, New York, NY, USA, 135--143.
[21]
Andy Dow, John Vines, Rob Comber, and Rob Wilson. 2016. ThoughtCloud: Exploring the Role of Feedback Technologies in Care Organisations. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 3625--3636.
[22]
Thomas W. Dunfee and Thomas Donaldson. 1995. Contractarian Business Ethics: Current Status and Next Steps. Business Ethics Quarterly 5, 2 (1995), 173--186.
[23]
Ulrike Felt, Milena D. Bister, Michael Strassnig, and Ursula Wagner. 2009. Refusing the Information Paradigm: Informed Consent, Medical Research, and Patient Participation. Health: An Interdisciplinary Journal CHI 2019, May 4--9, 2019, Glasgow, Scotland Uk Nissen, Neumann, Mikusz, Gianni, Clinch, Speed, and Davies for the Social Study of Health, Illness and Medicine 13, 1 (2009), 87--106. http://hea.sagepub.com/content/13/1/87.short00053.
[24]
Holly Fernandez Lynch, Steven Joffe, and Eric A. Feldman. 2018. Informed Consent and the Role of the Treating Physician. New England Journal of Medicine 378, 25 (June 2018), 2433--2438.
[25]
Luciano Floridi. 1999. Information ethics: On the philosophical foundation of computer ethics. Ethics and Information Technology 1, 1 (March 1999), 33--52.
[26]
Ricard L. Fogues, Pradeep K. Murukannaiah, Jose M. Such, and Munindar P. Singh. 2017. SoSharP: Recommending Sharing Policies in Multiuser Privacy Scenarios. IEEE Internet Computing 21, 6 (Nov. 2017), 28--36.
[27]
Sarah Gallacher, Connie Golsteijn, Yvonne Rogers, Licia Capra, and Sophie Eustace. 2016. SmallTalk: Using Tangible Interactions to Gather Feedback from Children. In Proceedings of the TEI '16: Tenth International Conference on Tangible, Embedded, and Embodied Interaction (TEI '16). ACM, New York, NY, USA, 253--261.
[28]
Sarah Gallacher, Connie Golsteijn, Lorna Wall, Lisa Koeman, Sami Andberg, Licia Capra, and Yvonne Rogers. 2015. Getting Quizzical About Physical: Observing Experiences with a Tangible Questionnaire. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '15). ACM, New York, NY, USA, 263--273.
[29]
Bill Gaver, Tony Dunne, and Elena Pacenti. 1999. Design: Cultural Probes. interactions 6, 1 (Jan. 1999), 21--29.
[30]
Connie Golsteijn, Sarah Gallacher, Lisa Koeman, Lorna Wall, Sami Andberg, Yvonne Rogers, and Licia Capra. 2015. VoxBox: A Tangible Machine That Gathers Opinions from the Public at Events. In Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction (TEI '15). ACM, New York, NY, USA, 201--208.
[31]
Pauline Gourlet and Thierry Dassé. 2017. Cairn: A Tangible Apparatus for Situated Data Collection, Visualization and Analysis. In Proceedings of the 2017 Conference on Designing Interactive Systems (DIS '17). ACM, New York, NY, USA, 247--258.
[32]
Mats G Hansson, Joakim Dillner, Claus R Bartram, Joyce A Carlson, and Gert Helgesson. 2006. Should donors be allowed to give broad consent to future biobank research? The Lancet Oncology 7, 3 (March 2006), 266-- 269.
[33]
Yoan Hermstrüwer and Stephan Dickert. 2017. Sharing is daring: An experiment on consent, chilling effects and a salient privacy nudge. International Review of Law and Economics 51, Supplement C (Aug. 2017), 38--49.
[34]
Hwajung Hong, Eric Gilbert, Gregory D. Abowd, and Rosa I. Arriaga. 2015. In-group Questions and Out-group Answers: Crowdsourcing Daily Living Advice for Individuals with Autism. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15). ACM, New York, NY, USA, 777--786.
[35]
Steven Houben and Christian Weichel. 2013. Overcoming Interaction Blindness Through Curiosity Objects. In CHI '13 Extended Abstracts on Human Factors in Computing Systems (CHI EA '13). ACM, New York, NY, USA, 1539--1544.
[36]
Hilary Hutchinson, Wendy Mackay, Bo Westerlund, Benjamin B. Bederson, Allison Druin, Catherine Plaisant, Michel Beaudouin-Lafon, Stéphane Conversy, Helen Evans, Heiko Hansen, Nicolas Roussel, and Björn Eiderbäck. 2003. Technology Probes: Inspiring Design for and with Families. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '03). ACM, New York, NY, USA, 17--24.
[37]
Randall Kiser. 2010. Beyond Right and Wrong: The Power of Effective Decision Making for Attorneys and Clients. Springer Science & Business Media, Berlin-Heidelberg, Germany. Google-Books-ID: xEUP530LI2MC.
[38]
Bart Knijnenburg and Alfred Kobsa. 2013. Making Decisions about Privacy: Information Disclosure in Context-Aware Recommender Systems. ACM Transactions on Interactive Intelligent Systems (TiiS) 3, 20 (Oct. 2013), 23.
[39]
Sherrie Y. X. Komiak and Izak Benbasat. 2006. The Effects of Personalization and Familiarity on Trust and Adoption of Recommendation Agents. MIS Quarterly 30, 4 (2006), 941--960. http://www.jstor.org/stable/25148760
[40]
Tuukka Lehtiniemi and Yki Kortesniemi. 2017. Can the obstacles to privacy self-management be overcome? Exploring the consent intermediary approach. Big Data & Society 4, 2 (Dec. 2017), 2053951717721935.
[41]
Lei Li, Tong Sun, and Tao Li. 2011. Personal Social Screen--A Dynamic Privacy Assignment System for Social Sharing in Complex Social Object Networks. IEEE, Boston, MA, USA, 1403--1408.
[42]
Qingrui Li, Juan Li, Hui Wang, and Ashok Ginjala. 2011. Semanticsenhanced privacy recommendation for social networking sites. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. IEEE, Ottawa, ON, Canada, 226--233.
[43]
Christian Fernando Libaque-Saenz, Younghoon Chang, Jimin Kim, Myeong-Cheol Park, and Jae Jeung Rho. 2016. The role of perceived information practices on consumers' intention to authorise secondary use of personal data. Behaviour & Information Technology 35, 5 (May 2016), 339--356.
[44]
Jialiu Lin, Shahriyar Amini, Jason I. Hong, Norman Sadeh, Janne Lindqvist, and Joy Zhang. 2012. Expectation and Purpose: Understanding Users' Mental Models of Mobile App Privacy Through Crowdsourcing. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (UbiComp '12). ACM, New York, NY, USA, 501--510.
[45]
LinkedIn. 2019. Retrieved from https://www.linkedin.com/. (2019).
[46]
Ewa Luger, Marina Jirotka, Tom Rodden, and Lilian Edwards. 2014. How do you solve a problem like consent?: the workshop. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM Press, New York, USA, 613--619.
[47]
Ewa Luger, Stuart Moran, and Tom Rodden. 2013. Consent for All: Revealing the Hidden Complexity of Terms and Conditions. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13). ACM, New York, NY, USA, 2687--2696.
[48]
Ewa Luger and Tom Rodden. 2013. An Informed View on Consent for UbiComp. In Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '13). ACM, New York, NY, USA, 529--538.
[49]
Ewa Luger and Tom Rodden. 2014. The value of consent: Discussions with designers of ubiquitous computing systems. In 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS). IEEE, Zurich, Switzerland, 388-- 393. Should I Agree? Delegating Consent Decisions Beyond the Individual CHI 2019, May 4--9, 2019, Glasgow, Scotland Uk
[50]
Tobias Matzner. 2014. Why privacy is not enough privacy in the context of "ubiquitous computing" and "big data". Journal of Information Communication and Ethics in Society 12 (06 05 2014), 93--106. Issue 2.
[51]
Tobias Matzner and Carsten Ochs. 2017. Sorting Things Out Ethically: Privacy as a Research Issue beyond the Individual. In Internet Research Ethics for the Social Age: New Challenges, Cases, and Contexts, Michael Zimmer and Katherina Kinder-Kurlanda (Eds.). Peter Lang Publishing, New York, USA, 39--52.
[52]
Aleecia M. McDonald and Lorrie Faith Cranor. 2008. The Cost of Reading Privacy Policies. I/S: A Journal of Law and Policy for the Information Society 4 (2008), 22. Issue 3.
[53]
Moneysupermarket. 2013. Retrieved from http://www.moneysupermarket.com. (2013).
[54]
Alistair Morrison, Donald McMillan, and Matthew Chalmers. 2014. Improving Consent in Large Scale Mobile HCI Through Personalised Representations of Data. In Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational (NordiCHI '14). ACM, New York, NY, USA, 471--480.
[55]
Helen Nissenbaum. 2010. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford Law Books, Stanford, CA.
[56]
Helen Nissenbaum. 2011. A Contextual Approach to Privacy Online. Dædalus 4 (2011), 32--48.
[57]
Chris Norval and Tristan Henderson. 2017. Contextual Consent: Ethical Mining of Social Media for Health Research. arXiv:1701.07765 {cs} (Jan. 2017). http://arxiv.org/abs/1701.07765 arXiv: 1701.07765.
[58]
Jonathan A. Obar and Anne Oeldorf-Hirsch. 2016. The Biggest Lie on the Internet: Ignoring the Privacy Policies and Terms of Service Policies of Social Networking Services. SSRN Scholarly Paper ID 2757465. Social Science Research Network, Rochester, NY. https://papers.ssrn.com/abstract=2757465
[59]
Carsten Ochs. 2015. "Selbstdatenschutz", oder:: Kollektive Privatheitspraktiken als politisches Handeln in digitalen Oeffentlichkeiten. Forschungsjournal Soziale Bewegungen 3 (Nov. 2015), 45--54. https://www.wiso-net.de/document/FJSB__3CE4A11C6791F0975576100DFCB5A6E9
[60]
Carsten Ochs and Jörn Lamla. 2017. Demokratische Privacy by Design. Forschungsjournal Soziale Bewegungen 30, 2 (Jan. 2017), 189--199.
[61]
Carsten Ochs, Fabian Pittroff, Barbara Büttner, and Jörn Lamla. 2016. Governing the internet in the privacy arena. Internet Policy Review 5, 3 (Sept. 2016). https://policyreview.info/articles/analysis/governing-internet-privacy-arena
[62]
Terms of Service; Didn't Read. 2018. Retrieved from https://tosdr.org/. (2018).
[63]
Publications Office of the European Union. 2016. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). https://eur-lex.europa.eu/eli/reg/2016/679/oj. (2016).
[64]
PersonalData.IO. 2018. Retrieved from https://personaldata. io/. (2018).
[65]
Bahman Rashidi, Carol Fung, and Tam Vu. 2015. Dude, ask the experts!: Android resource access permission recommendation with RecDroid. In IFIP/IEEE International Symposium on Integrated Network Management (IM). IEEE, Ottawa, ON, 296--304.
[66]
Iyubanit Rodríguez, Maria Karyda, Andrés Lucero, and Valeria Herskovic. 2018. Exploring Tangible Ways to Evaluate User Experience for Elders. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (CHI EA '18). ACM, New York, NY, USA, Article LBW589, 6 pages.
[67]
Beate Roessler. 2006. New Ways of Thinking About Privacy. In Oxford Handbook of Political Theory, Anne Philips Bonnie Honig and John Dryzek (Eds.). Oxford University Press, Oxford, 694--713.
[68]
Beate Roessler and Dorota Mokrosinska (Eds.). 2015. Social Dimensions of Privacy. Cambridge University Press, Cambridge.
[69]
Daniel J. Solove. 2002. Conceptualizing Privacy. California Law Review 90 (2002), 1087--1156. https://heinonline.org/HOL/P?h=hein.journals/calr90&i=1101
[70]
Daniel J. Solove. 2013. Introduction: Privacy Self-Management and the Consent Dilemma. Harvard Law Review 126 (2013), 1880--1903.
[71]
Anna C. Squicciarini, Elisa Bertino, Elena Ferrari, and Indrakshi Ray. 2006. Achieving privacy in trust negotiations with an ontology-based approach. IEEE Transactions on Dependable and Secure Computing 3, 1 (Jan. 2006), 13--30.
[72]
Herman T. Tavani. 2008. Floridi's ontological theory of informational privacy: Some implications and challenges. Ethics and Information Technology 10, 2--3 (Sept. 2008), 155--166.
[73]
Nick Taylor, Justin Marshall, Alicia Blum-Ross, John Mills, Jon Rogers, Paul Egglestone, David M. Frohlich, Peter Wright, and Patrick Olivier. 2012. Viewpoint: Empowering Communities with Situated Voting Devices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '12). ACM, New York, NY, USA, 1361--1370.
[74]
Nicholas K. Taylor, Elizabeth Papadopoulou, Sarah Gallacher, and Howard M. Williams. 2013. Is There Really a Conflict Between Privacy and Personalisation? In Information Systems Development. Springer, New York, NY, 1--9.
[75]
Susanne Trauzettel-Klosinski and Klaus Dietz. 2012. Standardized assessment of reading performance: the new International Reading Speed Texts IReST. Investigative ophthalmology & visual science 53, 9 (2012), 5452--5461.
[76]
Horst Treiblmaier and Irene Pollach. 2007. Users' perceptions of benefits and costs of personalization. ICIS 2007 Proceedings (2007), 141. http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1298&context=icis2007
[77]
TripAdvisor. 2019. Retrieved from https://www.tripadvisor.co.uk/. (2019).
[78]
Vasilis Vlachokyriakos, Rob Comber, Karim Ladha, Nick Taylor, Paul Dunphy, Patrick McCorry, and Patrick Olivier. 2014. PosterVote: Expanding the Action Repertoire for Local Political Activism. In Proceedings of the 2014 Conference on Designing Interactive Systems (DIS '14). ACM, New York, NY, USA, 795--804.
[79]
Jayne Wallace, John McCarthy, Peter C. Wright, and Patrick Olivier. 2013. Making Design Probes Work. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13). ACM, New York, NY, USA, 3441--3450.
[80]
Yuchen Zhao, Juan Ye, and Tristan Henderson. 2014. Privacy-aware Location Privacy Preference Recommendations. In Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MOBIQUITOUS '14). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), ICST, Brussels, Belgium, Belgium, 120--129.
[81]
Yuchen Zhao, Juan Ye, and Tristan Henderson. 2016. The Effect of Privacy Concerns on Privacy Recommenders. In Proceedings of the 21st International Conference on Intelligent User Interfaces (IUI '16). ACM, New York, NY, USA, 218--227.

Cited By

View all
  • (2024)Data of/by/for the People: Designing Participatory Approaches to Data GovernanceCompanion Publication of the 2024 ACM Designing Interactive Systems Conference10.1145/3656156.3658402(405-408)Online publication date: 1-Jul-2024
  • (2024)Exploring the Future of Informed Consent: Applying a Service Design ApproachProceedings of the ACM on Human-Computer Interaction10.1145/36373308:CSCW1(1-31)Online publication date: 26-Apr-2024
  • (2024)Bring Privacy To The Table: Interactive Negotiation for Privacy Settings of Shared Sensing DevicesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642897(1-22)Online publication date: 11-May-2024
  • Show More Cited By

Index Terms

  1. Should I Agree?: Delegating Consent Decisions Beyond the Individual

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems
    May 2019
    9077 pages
    ISBN:9781450359702
    DOI:10.1145/3290605
    This work is licensed under a Creative Commons Attribution International 4.0 License.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 May 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. consent
    2. delegation
    3. design
    4. permission management
    5. privacy
    6. technology probe

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CHI '19
    Sponsor:

    Acceptance Rates

    CHI '19 Paper Acceptance Rate 703 of 2,958 submissions, 24%;
    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Upcoming Conference

    CHI '25
    CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)320
    • Downloads (Last 6 weeks)45
    Reflects downloads up to 25 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Data of/by/for the People: Designing Participatory Approaches to Data GovernanceCompanion Publication of the 2024 ACM Designing Interactive Systems Conference10.1145/3656156.3658402(405-408)Online publication date: 1-Jul-2024
    • (2024)Exploring the Future of Informed Consent: Applying a Service Design ApproachProceedings of the ACM on Human-Computer Interaction10.1145/36373308:CSCW1(1-31)Online publication date: 26-Apr-2024
    • (2024)Bring Privacy To The Table: Interactive Negotiation for Privacy Settings of Shared Sensing DevicesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642897(1-22)Online publication date: 11-May-2024
    • (2024)Challenges of Usable PrivacyThe Curious Case of Usable Privacy10.1007/978-3-031-54158-2_4(103-131)Online publication date: 20-Mar-2024
    • (2023)Automated cookie notice analysis and enforcementProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620300(1109-1126)Online publication date: 9-Aug-2023
    • (2023)Un-Paradoxing Privacy: Considering Hopeful TrustACM Transactions on Computer-Human Interaction10.1145/360932930:6(1-24)Online publication date: 25-Sep-2023
    • (2023)Legal Obligation and Ethical Best Practice: Towards Meaningful Verbal Consent for Voice AssistantsProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3580967(1-16)Online publication date: 19-Apr-2023
    • (2022)Automated privacy negotiations with preference uncertaintyAutonomous Agents and Multi-Agent Systems10.1007/s10458-022-09579-136:2Online publication date: 1-Oct-2022
    • (2022)User Perspectives on the Acceptability of Realtime Data Capture for Design Research by Connected Products[ ] With Design: Reinventing Design Modes10.1007/978-981-19-4472-7_144(2201-2221)Online publication date: 6-Nov-2022
    • (2021)Data Protection in AI ServicesACM Computing Surveys10.1145/344075454:2(1-38)Online publication date: 5-Mar-2021
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media