Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1073001.1073007acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
Article

Making PRIME usable

Published: 06 July 2005 Publication History

Abstract

Privacy-enhanced Identity Management can enable users to retain and maintain informational self-determination in our networked society. This paper describes the usability research work that has been done within the first year of the European Union project on "Privacy and Identity Management for Europe" (PRIME). It primarily discusses and compares three alternative Ul paradigms for privacy-enhanced Identity Management, and presents how important legal privacy principles derived from the European Union Directives have been mapped into suggestions of user interface solutions for PRIME. Besides, it discusses results and encountered problems from conducted usability tests on mock-ups implementing the different Ul paradigms and proposes means for addressing those problems. The paper concludes with remarks on the characteristics of usability work for privacy-enhancing technologies.

References

[1]
Article 29 Data Protection Working Party. Opinion on More Harmonised Information provisions. 11987/04/EN WP 100, November 25 2004. http://europa.eu.int/comm/internal_market/privacy/workingroup/wp2004/wpdocs04_en.htm
[2]
Clauß, S., Kriegelstein, T. Datenschutzfreunliches Identitätsmanagement, DuD Datenschutz und Datensicherheit 27, pp. 297, 2003.
[3]
Cranor, L. F., Guduru, P., & Arjula, M. User Interfaces for Privacy Agents {forthcoming} ms 2004.
[4]
Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector, Official Journal L No. 201, 31.07.2002.
[5]
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Official Journal L No. 281, 23.11.1995.
[6]
Fischer-Hübner, S. & Pettersson, J. S. (Eds.). Evaluation of early prototypes, PRIME deliverable D6.1.b, 1 December 2004. http://www.prime- project.eu.org/public/prime_products/deliverables/
[7]
Johnston, J., Eloff, J. H. P. & Labuschagne L. Security and human computer interfaces. Computers & Security, Vol. 22 (8), pp. 675, 2003.
[8]
Kobsa, A. Personalized Hypermedia and International Privacy. Comm. of the ACM 45(5), pp. 64--67, 2002.
[9]
Law, L-C. & Hvannberg, E. Analysis of strategies for improving and estimating the effectiveness of heuristic evaluation. In Hyrskykari, A. (Ed.) Proceedings of the Third Nordic Conference on Human-Computer Interaction, Tampere, Finland, October 23--27, 2004
[10]
Nielsen, J. Heuristic evaluation. In Nielsen, J., and Mack, R. L. (Eds.) Usability Inspection Methods, John Wiley & Sons, New York, NY, 1994. Cf. also http://www.useit.com/papers/heuristic/heuristic_ list.html
[11]
Nielsen, J., Molich, R., Snyder C. & Farell S. E-commerce user experience: Trust. Nielsen Norman Group, 2000.
[12]
Patrick, A. S. & Kenny, S. From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interaction. Proceedings of the Privacy Enhancing Technologies Workshop (PET2003), Dresden/Germany, 2003.
[13]
Patrick, A. S., Kenny, S., Holmes C. & van Breukelen, M. Human Computer Interaction. Chapter 12 in Handbook for Privacy and Privacy-Enhancing Technologies. PISA project. Eds. van Blarkom, Borking, Olk, 2002. http://www.andrewpatrick.ca/pisa/handbook/handbook.html
[14]
Pettersson, J. S. & Siponen, J. Ozlab - a Simple Demonstration Tool for Prototyping Interactivity. Proceedings of the Second Nordic Conference on Human-Computer Interaction, Demonstration session, October 19--23, 2002, Aarhus, Denmark. Pp. 293--294, 2002.
[15]
Pettersson, J. S. (Ed.). HCI guidance and proposals, PRIME deliverable D6.1.c, 11 February 2005. http://www.prime-project.eu.org/public/prime_products/deliverables/
[16]
Pettersson, J. S. Ozlab -- a Systems Overview with an Account of Two Years of Experiences. Chapter 10 in Pettersson, J. S. (Ed.) HumanIT 2003, Karlstad University Studies, 26, 2003. http://www.cs.kau.se/~jsp/ozlab
[17]
Pettersson, J. S. P3P and Usability -- the Mobile Case. In Duquennoy, P., Fischer-Hübner, S., Holvast J. & Zuccato A., (Eds.) Risk and challenges of the network society, Karlstad University Studies 2004:35, 2004.
[18]
Pfitzmann, A. & Hansen, M. Anonymity, Unobservability, Pseudonymity, and Idenity Management -- A Proposal for Terminology, v0.21, 3. September 2004, http://dud.inf.tudresden.de/Literatur_V1.shtml
[19]
Raskin, J. The Humane Interface - New Directions for Designing Interactive Systems. ACM Press, New York, 2000.
[20]
UK Information Commissioner. Annual Track Research Findings, Individuals. 2004. http:/www.informationcommissioner.gov.uk/eventual.aspx

Cited By

View all
  • (2024)Addressing Challenges: A Way ForwardThe Curious Case of Usable Privacy10.1007/978-3-031-54158-2_5(133-160)Online publication date: 20-Mar-2024
  • (2020)Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPRProceedings on Privacy Enhancing Technologies10.2478/popets-2020-00372020:2(481-498)Online publication date: 8-May-2020
  • (2020)The Dilemma of User Engagement in Privacy NoticesACM Transactions on Privacy and Security10.1145/337229623:1(1-38)Online publication date: 8-Feb-2020
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
SOUPS '05: Proceedings of the 2005 symposium on Usable privacy and security
July 2005
123 pages
ISBN:1595931783
DOI:10.1145/1073001
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 July 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. HCI
  2. identity management
  3. privacy-enhancing technologies

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 15 of 49 submissions, 31%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)1
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Addressing Challenges: A Way ForwardThe Curious Case of Usable Privacy10.1007/978-3-031-54158-2_5(133-160)Online publication date: 20-Mar-2024
  • (2020)Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPRProceedings on Privacy Enhancing Technologies10.2478/popets-2020-00372020:2(481-498)Online publication date: 8-May-2020
  • (2020)The Dilemma of User Engagement in Privacy NoticesACM Transactions on Privacy and Security10.1145/337229623:1(1-38)Online publication date: 8-Feb-2020
  • (2019)An evaluation of three designs to engage users when providing their consent on smartphonesBehaviour & Information Technology10.1080/0144929X.2019.169789840:4(398-414)Online publication date: 17-Dec-2019
  • (2019)A Contrastive Study of Pre- and Post-legislation Interaction Design for Communication and Action About Personal Data Protection in e-Commerce WebsitesHuman-Computer Interaction – INTERACT 201910.1007/978-3-030-29387-1_1(3-23)Online publication date: 2-Sep-2019
  • (2018)Helping john to make informed decisions on using social loginProceedings of the 33rd Annual ACM Symposium on Applied Computing10.1145/3167132.3167259(1165-1174)Online publication date: 9-Apr-2018
  • (2017)Tools for Achieving Usable Ex Post Transparency: A SurveyIEEE Access10.1109/ACCESS.2017.27655395(22965-22991)Online publication date: 2017
  • (2017)Visualizing Exports of Personal Data by Exercising the Right of Data Portability in the Data Track - Are People Ready for This?Privacy and Identity Management. Facing up to Next Steps10.1007/978-3-319-55783-0_12(164-181)Online publication date: 1-Apr-2017
  • (2015)Users as Prosumers of PETsStandards and Standardization10.4018/978-1-4666-8111-8.ch014(265-286)Online publication date: 2015
  • (2015)HCI Requirements for Transparency and Accountability Tools for Cloud Service ChainsAccountability and Security in the Cloud10.1007/978-3-319-17199-9_4(81-113)Online publication date: 1-Apr-2015
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media