skip to main content
10.1145/642611.642636acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article

Usability and privacy: a study of Kazaa P2P file-sharing

Published:05 April 2003Publication History

ABSTRACT

P2P file sharing systems such as Gnutella, Freenet, and KaZaA, while primarily intended for sharing multimedia files, frequently allow other types of information to be shared. This raises serious concerns about the extent to which users may unknowingly be sharing private or personal information.In this paper, we report on a cognitive walkthrough and a laboratory user study of the KaZaA file sharing user interface. The majority of the users in our study were unable to tell what files they were sharing, and sometimes incorrectly assumed they were not sharing any files when in fact they were sharing all files on their hard drive. An analysis of the KaZaA network suggested that a large number of users appeared to be unwittingly sharing personal and private files, and that some users were indeed taking advantage of this and downloading files containing ostensibly private information.

References

  1. Jacko, J. A. B Salvendy, G. (1996). Hierarchical menu design: Breadth, depth, and task complexity-Perceptual and Motor Skills, 82, 1187--120 1.Google ScholarGoogle Scholar
  2. Kiger, J. I. (1984). The depth/breadth tradeoff in the design of menu-driven interfaces International Journal of Man-Machine Studies, 20,201--2 13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Larson, K. and Czerwinski, M., Web page design: implications of memory, structure and scent for information retrieval, Conference proceedings on Human factors in computing systems, pp. 25--32, ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Milier, G. A. (1956). The magical number seven plus or minus two: Some limits on our capacity for processing information. Psychological Review, 63, 81--97.Google ScholarGoogle Scholar
  5. Miller, D. P. (1981). The depth/breadth tradeoff in hierarchical computer menus. Proceedings of the Human Factors Society, 296--300.17.Google ScholarGoogle ScholarCross RefCross Ref
  6. Saltzer, J. H. and Schroeder, M. D. The Protection of Information in Computer Systems. In Proceedings of the IEEE, vol. 63, no. 9, September 1975, pp. 1278--1308 (see http://web.mit.edu/Saltzer/www/publications/protection/).Google ScholarGoogle Scholar
  7. Vincente, K.J. and R.C. Williges, Accommodating Individual Differences in Searching a Hierarchical File System. International Journal of man Machine Studies, 1988. 29. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Whitten A. and Tygar, J. D., Why Johnny can't encrypt. In Proceedings of the 8th USENIX Security Symposium, August 1999.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Yee, K.-P., User Interaction Design for Secure Systems, ICSIS 2002, Singapore. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Zaphiris, P. & Mtei, L. (1997). Depth vs Breadth in the Arrangement Web Links. AvailabIe at http://otal.umd.edu/SHORE/bsOGoogle ScholarGoogle Scholar

Index Terms

  1. Usability and privacy: a study of Kazaa P2P file-sharing

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CHI '03: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
          April 2003
          620 pages
          ISBN:1581136307
          DOI:10.1145/642611

          Copyright © 2003 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 5 April 2003

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          CHI '03 Paper Acceptance Rate75of468submissions,16%Overall Acceptance Rate6,199of26,314submissions,24%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader