Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications

نویسندگان

  • Delphine Reinhardt
  • Pablo Sánchez López
  • Andreas Reinhardt
  • Matthias Hollick
  • Michaela Kauer
چکیده

A continually increasing number of pictures and videos is shared in online social networks. Current sharing platforms however only offer limited options to define who has access to the content. Users may either share it with individuals or groups from their social graph, or make it available to the general public. Sharing content with users to which no social ties exist, even if they were physically close to the places where content was created and witnessed the same event, is however not supported by most existing platforms. We thus propose a novel approach to share content with such users based on so-called privacy bubbles. Privacy bubbles metaphorically represent the private sphere of the users and automatically confine the access to the content generated by the bubble creator to people within the bubble. Bubbles extend in both time and space, centered around the collection time and place, and their size can be adapted to the user’s preferences. We confirm the user acceptance of our concept through a user study with 175 participants, and a prototype implementation shows the technical feasibility of our scheme.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Share with strangers: Privacy bubbles as user-centered privacy control for mobile content sharing applications

A continually increasing number of pictures and videos is shared in online social networks. Current sharing platforms, however, only offer limited options to define who has access to the content. Users may either share it with individuals or groups from their social graph, or make it available to the general public. Sharing content with users to which no social ties exist, even if they were phy...

متن کامل

Context-Aware Privacy and Sharing Control in Collaborative Mobile Applications

Mobile applications are being used in every field of life. Latest advances in mobile computing technology and applications make it a new level of communication proxy for its users. Despite their power as personalized service provider and an internet connected computing device, mobile systems have their inherent limitations, like small display area and limited power and memory, which must be han...

متن کامل

A XML based, User-centered Privacy Model in Pervasive Computing Systems

The fact that pervasive systems are typically embedded and invisible makes it difficult for users to know when, where, and how these devices are collecting data. So privacy is a major issue for pervasive computing applications and several privacy models have been proposed for pervasive environments. In this paper we present a XML based User-centered Privacy Model (UPM) which provides content, i...

متن کامل

Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences

Current mobile platforms provide privacy management interfaces to regulate how applications access sensitive data. Prior research has shown how these interfaces are insufficient from a usability standpoint: they do not allow users to make contextual decisions (i.e., different decisions for a given application based on what the user was actually doing with that application). Prior work has demon...

متن کامل

Understandable Learning of Privacy Preferences Through Default Personas and Suggestions

As mobile and social networking applications continue to proliferate, they also increasingly rely on the collection of an ever wider range of contextual attributes, location being a prime example. Prior work has shown that people’s privacy preferences when it comes to sharing this information are often complex and that expecting users to spend the time necessary to tediously specify these prefe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012