In the past ten years, privacy has become a mainstream topic in human-computer interaction research, as attested by the growing number of surveys, studies, and experiments in this area. In this article, we presented a survey of this rich and diverse landscape, describing some of the legal foundations and historical aspects of privacy, sketching out an overview of the body of knowledge with respect to designing, implementing, and evaluating privacy-affecting systems, and charting many directions for future work.
We believe that the strong interest in and growth of this field is a response to legitimate concerns arising from the introduction of new technologies, and is, overall, a positive development. However, understanding privacy requires HCI practitioners to expand their field of view from traditional HCI domains such as social psychology and cognitive science, to a broader picture which includes economics and law.
In Section 4, we listed five challenges facing the field today, that must be tackled to advance the current state of the art in this field:
-
The development of better interaction techniques and standard defaults that users can easily understand.
-
The development of stronger analysis techniques and survey tools.
-
The documentation of the effectiveness of design tools, and the creation of a “privacy toolbox.”
-
The development of organizational support for managing personal data.
-
The development of a rigorous theory of acceptance dynamics of users, specifically related to privacy.
This review shows that work is well already underway in most of these directions, but is still unorganized and dispersed. Our hope that this article, summarizing thirty years of privacy research in HCI and CSCW, helps to shed light on many of the salient issues and will help practitioners and researchers alike explore these complex issues in a more informed and conscious way.
Acknowledgements
We thank Gregory Abowd, Alessandro Acquisti, Ben Bederson, Lorrie Cranor, Paul Dourish, Gillian Hayes, James Finlay, Heather Richter, Norman Sadeh, Karen Tang, and all the reviewers for their help. We are also indebted with countless colleagues in three continents for stimulating intellectual exchanges.
Support for this work was provided by the NSF Graduate Research Fellowship Program, the President of Georgia Tech, the Dean of the College of Computing of Georgia Tech, and the MacArthur Foundation through the Sam Nunn Security Program. This work is also supported in part by Intel Research, NSF Grants CNS-0627513 (“User-Controllable Security and Privacy for Pervasive Computing”) and IIS-0534406 (“Next Generation Instant Messaging: Communication, Coordination, and Privacy for Mobile, Multimodal, and Location-Aware Devices”), and ARO research grant DAAD19-02-1-0389 (“Perpetually Available and Secure Information Systems”) to Carnegie Mellon University's CyLab.
Any opinions, findings, conclusions, or recommendations expressed in this publication are those of the authors and do not necessarily reflect the views of the agencies above.
Page of
Share with your friends: |