My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules
نویسندگان
چکیده
The increasing inclusion of location and other contextual information in social media applications requires users to be more aware of what their location disclosures reveal. As such, it is important to consider whether existing access-control mechanisms for managing location sharing meet the needs of today’s users. We report on a questionnaire (N = 103) in which respondents were asked to specify location access control rules using free-form everyday language. Respondents also rated and ranked the importance of a variety of contextual factors that could influence their decisions for allowing or disallowing access to their location. Our findings validate some prior results (e.g., the recipient was the most highly rated and ranked factor and appeared most often in free-form rules) while challenging others (e.g., time-based constraints were deemed relatively less important, despite being features of multiple location-sharing services). We also identified several themes in the free-form rules (e.g., special rules for emergency situations). Our findings can inform the design of tools to empower end users to articulate and capture their access-control preferences more effectively.
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملHelping Jonny Manage Privacy Exploring Filters as Interfaces for Privacy Preference Specification
In recent years, online interpersonal communication via social media has become an integral part of people’s personal and professional lives. Exponential growth in the adoption of mobile and wearable devices has further enriched communication by incorporating contextually relevant sensor information, such as location. At the same time, the capabilities and functionalities of these devices and s...
متن کاملEnabling Privacy-Awareness in Social Networks
Most social networks have implemented extensive and complex controls in order to battle the host of privacy concerns that initially plagued their online communities. These controls have taken the form of a-priori access control, which allow users to construct barriers preventing unwanted users from viewing their personal information. However, in cases in which the access restriction mechanisms ...
متن کاملAccess and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملPrivacy enforcement with data owner-defined policies
Data privacy continues to be a very important topic, as our dependency on electronic communication maintains its current growth and private data is shared between multiple devices, users and locations. The growing amount and the ubiquitous availability of personal private data increases the likelihood of data misuse, where private data may be used against the privacy preferences of the person t...
متن کامل