Chapter Twenty One. Five Pitfalls in the Design for Privacy


Scott Lederer, Jason I. Hong, Anind K. Dey, and James A. Landay

TO PARTICIPATE IN MEANINGFUL PRIVACY PRACTICE IN THE CONTEXT OF TECHNICAL SYSTEMS, people require opportunities to understand the extent of the systems' alignment with relevant practice and to conduct discernible social action through intuitive or sensible engagement with the system. To help designers support these processes, this chapter describes five pitfalls to beware when designing interactive systemson or off the desktopwith personal privacy implications. These are based on a review of the literature, on analyses of existing privacy-affecting systems, and on our own experiences designing a prototypical user interface for managing privacy in ubiquitous computing (ubicomp).[1]

[1] This Chapter id adapted from Lederer et al., "Who Wants to Know What When?"This chapter is adapted from Lederer, Hong, Dey, and Landay, "Personal Privacy Through Understanding and Action: Five Pitfalls for Designers," Personal and Ubiquitous Computing (Springer-Verlag, 2004).



Security and Usability. Designing Secure Systems that People Can Use
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 0596008279
EAN: 2147483647
Year: 2004
Pages: 295

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net