skip to main content
10.1145/1102199.1102217acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Peripheral privacy notifications for wireless networks

Published:07 November 2005Publication History

ABSTRACT

When using wireless networks, some chats, web searches, and other information are broadcast out onto the local network. Other users on the same network may intercept and read this information. Unfortunately, without detailed knowledge of underlying technologies, many users are unable to properly evaluate the risks involved in everyday communication tasks. This study aims to develop techniques for allowing users without technical backgrounds to form more accurate expectations of privacy. We have developed a method for notifying users when their computer leaks such information. A large projected display placed in a common workplace shows excerpts from network traffic. A two-week trial was conducted to measure the effects of the display. Data was collected from network traffic monitoring and two paper surveys, which were conducted before and after the trial.

References

  1. 18 USC 2511. "Wire and electronic communications interception and interception of oral communications". Public Law.Google ScholarGoogle Scholar
  2. 18 USC 2701. "Unlawful access to stored communications". Public law.Google ScholarGoogle Scholar
  3. Agre, P.E. "Surveillance and Capture: Two models of privacy". The Information Society 10 (1994): 101--127.Google ScholarGoogle ScholarCross RefCross Ref
  4. Carnegie Mellon University Policies. Carnegie Mellon University. 5 Oct. 2004 <http://www.cmu.edu/esg-cat/>.Google ScholarGoogle Scholar
  5. Cranor, Lorrie and Mark Ackerman. "Privacy Critics: UI Components to Safeguard Users' Privacy". Conf. Human Factors in Computing Systems CHI'99 2 (1999): 258--259. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Cranor, Lorrie, Joseph Reagle, and Mark S. Ackerman. Beyond Concern: Understanding Net Users' Attitudes About Online Privacy. 14 Apr. 1999. AT&T Labs Research. 23 Sept. 2004 <<http://www.research.att.com/resources/trs/TRs/99/99.4/99.4.3/report.htm>.Google ScholarGoogle Scholar
  7. Cynthia Kuo. Vincent Goh, Adrian Tang, Adrian Perrig, Jesse Walker. Design and Evaluation Method for Secure 802.11 Network Configuration. Unpublished manuscript 2005.Google ScholarGoogle Scholar
  8. Erickson, Thomas, and Wendy Kellogg. "Social Translucence: An Approach to Designing Systems that Support Social Processes". Transactions on Computer Human Interaction 7 (2000): 59--83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ethereal: A Network Protocol Analyzer. 18 Nov. 2004 <http://www.ethereal.com/>.Google ScholarGoogle Scholar
  10. Hudson, Scott, and Ian Smith. "Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems". Proceedings of the 1996 ACM conference on Computer supported cooperative work (1996): 248--257. <http://doi.acm.org/10.1145/240080.240295>. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Leyden, John. Skype launches Pocket PC software. 10 Sept. 2004. The Register. <http://www.theregister.co.uk/2004/09/10/pocketpc_skype/>.Google ScholarGoogle Scholar
  12. Maglio, Paul, and Christopher Campbell. "Tradeoffs in Displaying Peripheral Information". Proceedings of ACM CHI 2000 Human Factors in Computing Systems (2000): 241--248. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Metz, Cade. "The Trouble With Wireless" PC Magazine 19 Apr. 2004.Google ScholarGoogle Scholar
  14. Network use policies - SCS/CMU Computing Facilities. Carnegie Mellon University. 5 Oct. 2004 <http://www-2.cs.cmu.edu/~help/networking/net_use.html>.Google ScholarGoogle Scholar
  15. Palen, Leysia, and Paul Dourish. "Unpacking 'privacy' for a Networked World". Proceedings of the conference on Human Factors in Computing Systems (2003): 129--136. 5 Oct. 2004 <http://doi.acm.org/10.1145/642611.642635>. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Ruby: The Object-Oriented Scripting Language. 15 Nov. 2004 <http://www.ruby-lang.org/en/>.Google ScholarGoogle Scholar
  17. Smith, Ian, Scott Hudson, Elizabeth Mynatt, and John Selbie. "Applying Cryptographic Techniques to Problems in Media Space Security". In Proceedings of ACM Conference on Organizational Computing Systems. 8 (1995). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Tan, Desney, and Mary Czerwinski. "Information voyeurism: social impact of physically large displays on information privacy". Extended abstracts on Human factors in computing systems. (2003): 748--749. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Turow, Joseph. Americans & Online Privacy: The System is Broken. June 2003. Annenberg Public Policy Center of the University of Pennsylvania. 9 Sept. 2004 <http://www.asc.upenn.edu/usr/jturow/internet-privacy-report/36-page-turow-version-9.pdf>.Google ScholarGoogle Scholar

Index Terms

  1. Peripheral privacy notifications for wireless networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          WPES '05: Proceedings of the 2005 ACM workshop on Privacy in the electronic society
          November 2005
          116 pages
          ISBN:1595932283
          DOI:10.1145/1102199

          Copyright © 2005 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 7 November 2005

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate106of355submissions,30%

          Upcoming Conference

          CCS '24
          ACM SIGSAC Conference on Computer and Communications Security
          October 14 - 18, 2024
          Salt Lake City , UT , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader