Archive for the 'Privacy' Category

Ubiquitous Systems and the Family: Thoughts about the Networked Home

Thursday, July 16th, 2009

http://cups.cs.cmu.edu/soups/2009/proceedings/a6-little.pdf
Linda Little, Elizabeth Sillence and Pam Briggs
Overall the well-being of a family is dependent on how well the members of the family communicate and interact.  If we are creating products and services for families it is important to recognize that the dynamics of a different families can be very different.  The project organizers sought to [...]

Challenges in Supporting End-User Privacy and Security Management with Social Navigation

Thursday, July 16th, 2009

http://cups.cs.cmu.edu/soups/2009/proceedings/a5-goecks.pdf
Jeremy Goecks, W.  Keith Edwards and Elizabeth D.  Mynatt
Privacy and security management often talk about users engaging in boundary management, where decisions are made about what can cross the boundary.  However, as the boundary often changes due to context and task, this can be very hard to automate.  Social navigation is seen on Amazon, NYT, [...]

Social Applications: Exploring A More Secure Framework

Thursday, July 16th, 2009

http://cups.cs.cmu.edu/soups/2009/proceedings/a2-besmer.pdf
Andrew Besmer, Heather Lipford, Mohamed Shehab and Gorrell Cheek
Social applications are apps built on top of social network platforms such as Facebook or Google’s OpenSocial.  They are intended to leverage the social network to provide value to users.
Typically when installing the app they are presented with a screen prompting the user to approve access to [...]