ABSTRACT
When using wireless networks, some chats, web searches, and other information are broadcast out onto the local network. Other users on the same network may intercept and read this information. Unfortunately, without detailed knowledge of underlying technologies, many users are unable to properly evaluate the risks involved in everyday communication tasks. This study aims to develop techniques for allowing users without technical backgrounds to form more accurate expectations of privacy. We have developed a method for notifying users when their computer leaks such information. A large projected display placed in a common workplace shows excerpts from network traffic. A two-week trial was conducted to measure the effects of the display. Data was collected from network traffic monitoring and two paper surveys, which were conducted before and after the trial.
- 18 USC 2511. "Wire and electronic communications interception and interception of oral communications". Public Law.Google Scholar
- 18 USC 2701. "Unlawful access to stored communications". Public law.Google Scholar
- Agre, P.E. "Surveillance and Capture: Two models of privacy". The Information Society 10 (1994): 101--127.Google ScholarCross Ref
- Carnegie Mellon University Policies. Carnegie Mellon University. 5 Oct. 2004 <http://www.cmu.edu/esg-cat/>.Google Scholar
- Cranor, Lorrie and Mark Ackerman. "Privacy Critics: UI Components to Safeguard Users' Privacy". Conf. Human Factors in Computing Systems CHI'99 2 (1999): 258--259. Google ScholarDigital Library
- Cranor, Lorrie, Joseph Reagle, and Mark S. Ackerman. Beyond Concern: Understanding Net Users' Attitudes About Online Privacy. 14 Apr. 1999. AT&T Labs Research. 23 Sept. 2004 <<http://www.research.att.com/resources/trs/TRs/99/99.4/99.4.3/report.htm>.Google Scholar
- Cynthia Kuo. Vincent Goh, Adrian Tang, Adrian Perrig, Jesse Walker. Design and Evaluation Method for Secure 802.11 Network Configuration. Unpublished manuscript 2005.Google Scholar
- Erickson, Thomas, and Wendy Kellogg. "Social Translucence: An Approach to Designing Systems that Support Social Processes". Transactions on Computer Human Interaction 7 (2000): 59--83. Google ScholarDigital Library
- Ethereal: A Network Protocol Analyzer. 18 Nov. 2004 <http://www.ethereal.com/>.Google Scholar
- Hudson, Scott, and Ian Smith. "Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems". Proceedings of the 1996 ACM conference on Computer supported cooperative work (1996): 248--257. <http://doi.acm.org/10.1145/240080.240295>. Google ScholarDigital Library
- Leyden, John. Skype launches Pocket PC software. 10 Sept. 2004. The Register. <http://www.theregister.co.uk/2004/09/10/pocketpc_skype/>.Google Scholar
- Maglio, Paul, and Christopher Campbell. "Tradeoffs in Displaying Peripheral Information". Proceedings of ACM CHI 2000 Human Factors in Computing Systems (2000): 241--248. Google ScholarDigital Library
- Metz, Cade. "The Trouble With Wireless" PC Magazine 19 Apr. 2004.Google Scholar
- Network use policies - SCS/CMU Computing Facilities. Carnegie Mellon University. 5 Oct. 2004 <http://www-2.cs.cmu.edu/~help/networking/net_use.html>.Google Scholar
- Palen, Leysia, and Paul Dourish. "Unpacking 'privacy' for a Networked World". Proceedings of the conference on Human Factors in Computing Systems (2003): 129--136. 5 Oct. 2004 <http://doi.acm.org/10.1145/642611.642635>. Google ScholarDigital Library
- Ruby: The Object-Oriented Scripting Language. 15 Nov. 2004 <http://www.ruby-lang.org/en/>.Google Scholar
- Smith, Ian, Scott Hudson, Elizabeth Mynatt, and John Selbie. "Applying Cryptographic Techniques to Problems in Media Space Security". In Proceedings of ACM Conference on Organizational Computing Systems. 8 (1995). Google ScholarDigital Library
- Tan, Desney, and Mary Czerwinski. "Information voyeurism: social impact of physically large displays on information privacy". Extended abstracts on Human factors in computing systems. (2003): 748--749. Google ScholarDigital Library
- Turow, Joseph. Americans & Online Privacy: The System is Broken. June 2003. Annenberg Public Policy Center of the University of Pennsylvania. 9 Sept. 2004 <http://www.asc.upenn.edu/usr/jturow/internet-privacy-report/36-page-turow-version-9.pdf>.Google Scholar
Index Terms
- Peripheral privacy notifications for wireless networks
Recommendations
Privacy Provisioning in Wireless Sensor Networks
Privacy is a necessary component of any security discussion. Privacy and security must be considered separately as well as together. Threads of privacy are visible throughout the procedure of building security solutions for any system. The notions for ...
Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse
WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic SocietyPrivacy is a concept with real life ties and implications. Privacy infringement has the potential to lead to serious consequences for the stakeholders involved, hence researchers and organisations have developed various privacy enhancing techniques and ...
What Makes a Technology Privacy Enhancing? Laypersons’ and Experts’ Descriptions, Uses, and Perceptions of Privacy Enhancing Technologies
Information for a Better World: Normality, Virtuality, Physicality, InclusivityAbstractWhat makes a technology privacy-enhancing? In this study, we construct an explanation grounded in the technologies and practices that people report using to enhance their privacy. We conducted an online survey of privacy experts (i.e., privacy ...
Comments