Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications
نویسندگان
چکیده
A continually increasing number of pictures and videos is shared in online social networks. Current sharing platforms however only offer limited options to define who has access to the content. Users may either share it with individuals or groups from their social graph, or make it available to the general public. Sharing content with users to which no social ties exist, even if they were physically close to the places where content was created and witnessed the same event, is however not supported by most existing platforms. We thus propose a novel approach to share content with such users based on so-called privacy bubbles. Privacy bubbles metaphorically represent the private sphere of the users and automatically confine the access to the content generated by the bubble creator to people within the bubble. Bubbles extend in both time and space, centered around the collection time and place, and their size can be adapted to the user’s preferences. We confirm the user acceptance of our concept through a user study with 175 participants, and a prototype implementation shows the technical feasibility of our scheme.
منابع مشابه
Share with strangers: Privacy bubbles as user-centered privacy control for mobile content sharing applications
A continually increasing number of pictures and videos is shared in online social networks. Current sharing platforms, however, only offer limited options to define who has access to the content. Users may either share it with individuals or groups from their social graph, or make it available to the general public. Sharing content with users to which no social ties exist, even if they were phy...
متن کاملContext-Aware Privacy and Sharing Control in Collaborative Mobile Applications
Mobile applications are being used in every field of life. Latest advances in mobile computing technology and applications make it a new level of communication proxy for its users. Despite their power as personalized service provider and an internet connected computing device, mobile systems have their inherent limitations, like small display area and limited power and memory, which must be han...
متن کاملA XML based, User-centered Privacy Model in Pervasive Computing Systems
The fact that pervasive systems are typically embedded and invisible makes it difficult for users to know when, where, and how these devices are collecting data. So privacy is a major issue for pervasive computing applications and several privacy models have been proposed for pervasive environments. In this paper we present a XML based User-centered Privacy Model (UPM) which provides content, i...
متن کاملTurtle Guard: Helping Android Users Apply Contextual Privacy Preferences
Current mobile platforms provide privacy management interfaces to regulate how applications access sensitive data. Prior research has shown how these interfaces are insufficient from a usability standpoint: they do not allow users to make contextual decisions (i.e., different decisions for a given application based on what the user was actually doing with that application). Prior work has demon...
متن کاملUnderstandable Learning of Privacy Preferences Through Default Personas and Suggestions
As mobile and social networking applications continue to proliferate, they also increasingly rely on the collection of an ever wider range of contextual attributes, location being a prime example. Prior work has shown that people’s privacy preferences when it comes to sharing this information are often complex and that expecting users to spend the time necessary to tediously specify these prefe...
متن کامل