Skip to main content

Exploring the Feasibility of a Spatial User Interface Paradigm for Privacy-Enhancing Technoloqy

  • Conference paper
Advances in Information Systems Development

Abstract

Electronic devices get more and more involved in many of our communication processes for personal and professional activities. Each communication process may implicitly affect our privacy. An example may be the location trace of mobile phones. Experts present identity management systems to preserve the user’s1 privacy [2]. In digital correspondence users should decide about disclosure of personally identifiable information (in the following simply called “data”). However, identity management for Everyman is not yet a commonplace.

In the context of this paper, the term “user” describes the person who is using the digital equipment related to the identity management sensitive activities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Acquisti A, Dingledine R, Syverson P (2003) On the Economics of Anonymity. Proc of Financial Cryptography (FC’ 03) LNCS 2742. http://freehaven.net/doc/fc03/ econymics.pdf

    Google Scholar 

  2. Clauß S, Köhntopp M (2001) Identity Management and its Support of Multilateral Security. Computer Networks, no 37, pp 205–219

    Google Scholar 

  3. Cooper A (1999) The Inmates are Running the Asylum. SAMS

    Google Scholar 

  4. Cooper A, Reimann R (2003) About Face 2.0 The Essentials of Interaction Design. Wiley Publishing USA

    Google Scholar 

  5. Gerd tom Markotten D (2003) Benutzbare Sicherheit fur informationstechnische Systeme. Dissertation an der Albert-Ludwigs-Universitat Freiburg

    Google Scholar 

  6. Gerd tom Markotten D, Kaiser J (2000) Benutzbare Sicherheit — Herausforderungen und Modell fur E-Commerce-Systeme. Wirtschaftsinformatik, vol 42, no 6, pp 531–538

    Google Scholar 

  7. Hansen M, Berlich P (2003) Identity Management Systems: Gateway and Guardian for Virtual Residences. EMTEL Conference New Media, Technology and Everyday Life in Europe Conference London

    Google Scholar 

  8. Pettersson JS, Fischer-Hübner S (eds) (2004) PRIME Deliverable D6.1.b Evaluation of Early Prototypes. www.prime-project.eu.org/public/primejlroducts/deliverables/

    Google Scholar 

  9. Leenes R, Lips M (2004) Social Evaluation of Early Prototypes. In: Pettersson JS, Fischer-Hubner S (eds) PRIME Deliverable D6.1.b; see [8].

    Google Scholar 

  10. NN (2004) Metaphorically Speaking. The Economist 373 (8399) Survey of Information Technology. Oct. 28, pp 16–17

    Google Scholar 

  11. van Rossum H, Gardeniers H, Borking J et al (1995) Privacy-Enhancing Technologies: The Path to Anonymity. Registrierkamer The Netherlands, and Information & Privacy Commissioner/Ontario Canada

    Google Scholar 

  12. Rost M (2004) Leben mit der Landkarte — Make Identity-Management Easy. www.maroki.de/pub/privacy/tm.html

    Google Scholar 

  13. Hillenbrand, Th (2004) Melindas Mutantenzoo. Spiegel Online. www.spiegel.de/netzwelt/netzkultur/O.1518,329307,00.html

    Google Scholar 

  14. Wohlgemuth S, Jendricke U, Gerd tom Markotten D, Domer F, Müller G (2003) Sicherheit und Benutzbarkeit durch Identitätsmanagement. Proc of Aktuelle Trends in der Softwareforschung — Tagungsband zum doITForschungstag 2003 IRB Verlag Stuttgart

    Google Scholar 

  15. Wolf G, Pfitzmann A (2000) Properties of Protection Goals and their Integration into a User Interface. Computer Networks, no 32, pp 685–699

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer Science-Business Media, LLC

About this paper

Cite this paper

Bergmann, M., Rost, M., Petterssorr, J.S. (2006). Exploring the Feasibility of a Spatial User Interface Paradigm for Privacy-Enhancing Technoloqy. In: Nilsson, A.G., Gustas, R., Wojtkowski, W., Wojtkowski, W.G., Wrycza, S., Zupančič, J. (eds) Advances in Information Systems Development. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-36402-5_37

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-36402-5_37

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-30834-0

  • Online ISBN: 978-0-387-36402-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics