Abstract
Whereas in real everyday life individuals have an intuitive approach at deciding which information to disseminate to others, in the digital world it becomes difficult to keep control over the information that is distributed to different online services. In this paper we present the design of a user interface for a system that can help users decide which pieces of information to distribute to which type of service providers by allowing them to segregate their information attributes into various personalized profiles. Iterative usability evaluations showed that users understand and appreciate the possibility to segregate information, and revealed possible improvements, implications and limitations of such an interface.
Chapter PDF
Similar content being viewed by others
Keywords
References
Alpár, G., Hoepman, J.H., Siljee, J.: The identity crisis. Security, privacy and usability issues in identity management. Computer Research Repository (CoRR) (2011)
Angulo, J., Fischer-Hübner, S., Pulls, T., König, U.: HCI for Policy Display and Administration. In: PrimeLife - Privacy and Identity Management for Life in Europe, ch. 14, p. 261. Springer (June 2011)
Angulo, J., Fischer-Hübner, S., Pulls, T., Wästlund, E.: Towards usable privacy policy display & management. Information Management & Computer Security 20(1), 4–17 (2012)
Angulo, J., Wästlund, E.: Identity Management for online transactions - Using “Profiles” to segregate personal information. Tech. rep., Karlstad University, Karlstad, Sweden (April 2012), http://www.is.kau.se/julioangulo/angulo/publications/2012/2012_IdentityManagementForOnlineTransactions.pdf
Ardagna, C.A., Bussard, L., Di, S.D.C., Neven, G., Paraboschi, S., Pedrini, E., Preiss, S., Raggett, D., Samarati, P., Trabelsi, S., Verdicchio, M.: Primelife policy language. In: Proceedings of the W3C Workshop on Access Control Application Scenarios, Luxembourg (November 2009)
van den Berg, B., Pötzsch, S., Leenes, R., Borcea-Pfitzmann, K., Beato, F.: Privacy in social software. In: Camenisch, J., Fischer-Hübner, S., Rannenberg, K. (eds.) Privacy and Identity Management for Life, pp. 33–60. Springer, Heidelberg (2011)
van den Berg, B., Leenes, R.E.: Audience Segregation in Social Network Sites. In: Proceedings for the Second IEEE International Conference on Social Computing/Second IEEE International Conference on Privacy, Security, Risk and Trust, pp. 1111–1117. SocialCom/PASSAT, SSRN, Minneapolis, USA (2010)
Camenisch, J., Fischer-Hübner, S., Rannenberg, K.: PrimeLife - Privacy and Identity Management for Life in Europe, 1st edn., vol. 14. Springer (June 2011)
Camenisch, J., van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 21–30. ACM (2002)
Clauß, S., Kriegelstein, T.: Datenschutzfreundliches identitätsmanagement. Datenschutz und Datensicherheit 27(5) (2003), http://dblp.uni-trier.de/db/journals/dud/dud27.html#ClaussK03
Cranor, L.F., Guduru, P., Arjula, M.: User interfaces for privacy agents. ACM Trans. Comput.-Hum. Interact. 13(2), 135–178 (2006)
DiMicco, J.M., Millen, D.R.: Identity management: multiple presentations of self in facebook. In: Proceedings of the 2007 International ACM Conference on Supporting Group Work, GROUP 2007, pp. 383–386. ACM, Sanibel Island (2007)
Eap, T.M., Hatala, M., Gasevic, D.: Enabling user control with personal identity management. In: IEEE International Conference on Services Computing, SCC 2007, pp. 60–67. IEEE, Salt Lake City (2007)
Fischer-Hübner, S., Pettersson, J., Bergmann, M., Hansen, M., Pearson, S., Mont, M.: Human-Computer Interaction. In: Camenisch, J., Leenes, R., Sommer, D. (eds.) Digital Privacy. LNCS, vol. 6545, pp. 569–595. Springer, Heidelberg (2011)
Goffman, E.: The presentation of self in everyday life. Doubleday (1959)
Gonçalves, J.: Groupster: Narrowcasting on Social Networking Sites. Master’s thesis, Madeira Interactive Technologies Institute, University of Madeira (2011)
Grimmelmann, J.: Saving Facebook. Iowa Law Review 94(4), 1137–1206 (2009)
Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, pp. 71–80. ACM, New York (2005)
Jøsang, A., Zomai, M.A., Suriadi, S.: Usability and privacy in identity management architectures. In: ACSW Frontiers, pp. 143–152 (2007)
Kairam, S., Brzozowski, M., Huffaker, D., Chi, E.: Talking in circles: selective sharing in google+. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2012, pp. 1065–1074. ACM, New York (2012)
Löwgren, J., Stolterman, E.: Thoughtful Interaction Design: A Design Perspective on Information Technology. MIT Press (2007)
Madejski, M., Johnson, M., Bellovin, S.M.: The failure of online social network privacy settings. Tech. rep., Columbia University (2011), http://www.futureofprivacy.org/wp-content/uploads/2011/07/TheFailureofOnlineSocialNetworkPrivacySettings.pdf
Pettersson, J.S., Fischer-Hübner, S., Danielsson, N., Nilsson, J., Bergmann, M., Clauss, S., Kriegelstein, T., Krasemann, H.: Making PRIME usable. In: Proceedings of the 2005 Symposium on Usable Privacy and Security, SOUPS 2005, pp. 53–64. ACM, New York (2005)
Polson, P.G., Lewis, C., Rieman, J., Wharton, C.: Cognitive walkthroughs: a method for theory-based evaluation of user interfaces. International Journal of Man-Machine Studies 36(5), 741–773 (1992)
Pulls, T.: Privacy-friendly cloud storage for the data track. In: Jøsang, A., Carlsson, B. (eds.) NordSec 2012. LNCS, vol. 7617, pp. 231–246. Springer, Heidelberg (2012)
Dhamija, R., Dusseault, L.: The Seven Flaws of Identity Management: Usablity and Security Challenges. IEEE Security & Privacy Magazine 6(2), 24–29 (2008)
Reagle, J., Cranor, L.F.: The platform for privacy preferences. Commun. ACM 42(2), 48–55 (1999)
Rubin, J., Chisnell, D.: Handbook of usability testing : how to plan, design, and conduct effective tests. Wiley Publ., Indianapolis, Ind. (2008)
Tootoonchian, A., Saroiu, S., Ganjali, Y., Wolman, A.: Lockr: better privacy for social networks. In: Liebeherr, J., Ventre, G., Biersack, E.W., Keshav, S. (eds.) CoNEXT, pp. 169–180. ACM (2009)
Wästlund, E., Wolkerstorfer, P., Köffel, C.: PET-USES: Privacy-enhancing technology – users’ self-estimation scale. In: Bezzi, M., Duquenoy, P., Fischer-Hübner, S., Hansen, M., Zhang, G. (eds.) IFIP AICT 320. IFIP AICT, vol. 320, pp. 266–274. Springer, Heidelberg (2010)
Watson, J., Besmer, A., Lipford, H.R.: +your circles: sharing behavior on google+. In: Proceedings of the Symposium on Usable Privacy and Security, SOUPS 2012, pp. 12:1–12:9. ACM, New York (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Angulo, J., Wästlund, E. (2013). Identity Management through “Profiles”: Prototyping an Online Information Segregation Service. In: Kurosu, M. (eds) Human-Computer Interaction. Users and Contexts of Use. HCI 2013. Lecture Notes in Computer Science, vol 8006. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39265-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-39265-8_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39264-1
Online ISBN: 978-3-642-39265-8
eBook Packages: Computer ScienceComputer Science (R0)