Date & Time | Location |
Readings & Discussants |
4/3 10:30-11:50
|
ICS 243
|
- Introduction
|
4/5 10:30-11:50
|
ICS 243
|
- Types of privacy violations (Sameer
Patil, Yang Wang, Hy Loc, Paul Main)
Solove, D.J. A Taxonomy of Privacy. University of Pennsylvania Law Review,
154 (3), 2006, 477-564. URL.
|
4/10
10:30-11:50 | ICS
243 |
- Information type and stated level
of privacy concern (Deepika Gandhi, David
Nguyen, Gary Suh, Swaminathan Subramanian)
Ackerman,
M.S., Cranor, L.F. and Reagle, J., Privacy in E-commerce: Examining
User Scenarios and Privacy Preferences. In First ACM Conference
on Electronic Commerce, (Denver, CO, 1999), 1-8.
Friedman,
A. and Wathieu, L., An Empirical Approach to Understanding Privacy
Valuation. Fourth Workshop on the Economics of Information
Security (WEIS05), Cambridge, MA, 2005, .
Huberman,
B.A., Adar, E. and Fine, L.R., Valuating Privacy. Fourth Workshop
on the Economics of Information Security (WEIS05),
Cambridge, MA, 2005.
|
4/11 11:45-12:50 |
Crito Conference Room, 3200 Berkeley Place, 2nd floor |
Related
talk: RFID
in Manufacturing and Supply Chain Management (O. Günther) |
4/12 10:30-11:50 | ICS
243 |
- Privacy seals (Vivian
Olivera,
Arun Muralidharan, David
Nguyen,
Gary Suh)
Edelman,
B. Adverse Selection in Online “Trust” Certifications. Working
draft, Harvard University, 2006.
Moores,
T. Do Consumers Understand the Role of Privacy Seals in E-Commerce?
Communications of the ACM, 48 (3), 2005, 86-91
|
4/17 10:30-11:50 |
ICS 243 |
- Presentation of classs projects
|
4/19 |
|
- No
class
|
4/24 10:30-11:50 |
ICS 243 |
- Privacy statements (Swaminathan
Subramanian, Paul Main, Vivian
Olivera, Deepika Gandhi)
URL Metzger,
M. Communication Privacy Management in Electronic Commerce. Journal of
Computer-Mediated Communication, 12 (2), 2007.
Gideon,
J., Cranor, L., Egelman, S. and Acquisti, A., Power Strips, Prophylactics,
and Privacy, Oh My! In Second Symposium on Usable Privacy and Security,
Pittsburgh, Pennsylvania, 2006, ACM Press, 133-144.
|
4/26 10:30-11:50 | ICS
243 |
- Trust and some of its antecedents (Yang
Wang, Deepika Gandhi, Arun
Muralidharan, Paul Main)
Schoenbachler,
D.D. and Gordon, G.L. Trust and Customer Willingness to Provide Information
in Database-Driven Relationship Marketing. Journal of Interactive
Marketing, 16 (3), 2002, 2-16
URL Metzger,
M.J. Privacy, Trust, and Disclosure: Exploring Barriers to Electronic
Commerce. Journal of Computer-Mediated Communication, 9 (4),
2004.
|
5/01 10:30-11:50 |
ICS 243 |
- Personalization benefits (Yang
Wang, David Nguyen, Shilpa
Rao, Deepika Gandhi)
Chellappa,
R.K. and Sin, R. Personalization versus Privacy: An Empirical Examination
of the Online Consumer’s Dilemma. Information Technology and
Management, 6 (2-3), 2005, 181-202.
White,
T.B. Consumer Disclosure and Disclosure Avoidance: A Motivational
Framework. Journal of Consumer Psychology, 14 (1&2), 2004,
41-51.
|
5/03 10:30-11:50 |
ICS 243 |
- Stated privacy attitude vs. actual behavior (Anupa
Mogili, Sulagna Basu, Yang
Wang, David Nguyen)
Spiekermann,
S., Grossklags, J. and Berendt, B., E-privacy in 2nd Generation E-Commerce:
Privacy Preferences versus Actual Behavior. In EC'01: Third ACM Conference
on Electronic Commerce, (Tampa, FL, 2001), 38-47.
Jensen,
C., Potts, C. and Jensen, C. Privacy Practices of Internet Users:
Self-Reports versus Observed Behavior. International Journal of
Human-Computer Studies, 63, 2005, 203–227.
|
5/8 10:30-11:50 |
ICS 243 |
- The "privacy calculus" (Swaminathan
Subramanian, Paul Main, Yang
Wang, David Nguyen)
Acquisti,
A., Privacy in Electronic Commerce and the Economics of Immediate Gratification.
EC'04 ACM Conference on Electronic Commerce, New York, NY, 2004, 21-29..
Acquisti,
A. and Grossklags, J. Privacy and Rationality in Individual Decision
Making. IEEE Security & Privacy, 3 (1), 2005, 26-33.
|
5/10 10:30-11:50 |
ICS 243 |
- Data protection guidelines (Yang
Wang, Shilpa Rao, David Nguyen, Sulagna Basu)
URL OECD.
Recommendation of the Council Concerning Guidelines Governing the Protection
of Privacy and Transborder Flows of Personal Data, OECD, 1980.
URL USACM
Policy Recommendations on Privacy, U.S. Public Policy Committee
of the Association for Computing Machinery, New York, NY, 2006.
|
5/15
10:30-11:50 | ICS 243 |
Privacy
and monetary incentives (Shilpa
Rao, Anupa Mogili, Swaminathan Subramanian, Deepika
Gandhi)
URL Hann,
I.-H., Hui, K.-L., Lee, T.S. and Png, I.P.L., Online Information
Privacy: Measuring the Cost-Benefit Tradeoff. Proceedings of the
Twenty-Third Annual International Conference on Information Systems,
Barcelona, Spain, 2002, 1-10.
Lai,
Y.-L. and Hui, K.-L., Internet Opt-In and Opt-Out: Investigating the
Roles of Frames, Defaults and Privacy Concerns. 2006 ACM SIGMIS
CPR Conference on Computer Personnel Research, Claremont, CA, 2006,
253-263.
|
5/17 10:30-11:50 |
ICS 243 |
- Privacy of location information (Anupa
Mogili, Vivian Oliviera, Sameer
Patil, Sulagna Basu)
Consolvo,
S., Smith, I.E., Matthews, T., LaMarca, A., Tabert, J. and Powledge,
P., Location Disclosure to Social Relations: Why, When, & What
People Want to Share. In CHI 2005 Conference on Human Factors in Computing
Systems, Portland, Oregon, 2005, 81-90.
Cvrcek,
D., Kumpost, M., Matyas, V. and Danezis, G., A Study on the
Value of Location Privacy. In 5th ACM Workshop on Privacy
in the Electronic Society, Alexandria, VA, 2006, 109-118.
URL Danezis,
G., Lewis, S. and Anderson, R., How Much is Location Privacy
Worth? In Fourth Workshop on the Economics of Information
Security, Cambridge, MA, 2005. .
|
5/22 10:30-11:50 |
ICS 243 |
- Ubicomp privacy guidelines (Sulagna
Basu, Paul
Main, Sameer
Patil, David
Nguyen)
Floerkemeier,
C., Schneider, R. and Langheinrich, M., Scanning with a Purpose – Supporting
the Fair Information Principles in RFID Protocols. In Ubiquitous
Computing Systems: Second International Symposium, UCS 2004,
Tokyo, Japan, Springer Verlag.
URL Langheinrich,
M. Privacy by Design: Principles of Privacy-Aware Ubiquitous
Systems. in Abowd, G.D., Brumitt, B. and Shafer, S.A.N. eds.
Ubicomp 2001, Springer-Verlag, Berlin-Heidelberg, Germany,
2001, 273–291.
Iachello,
G., Smith, I., Consolvo, S., Chen, M. and Abowd, G.D.,
Developing Privacy Guidelines for Social Location Disclosure
Applications and Services. In Symposium on Usable Privacy
and Security, Philadelphia, PA, 2005, 65-76. .
|
5/24 10:30-11:50 |
ICS 243 |
Interim presentation
of project resutls
|
|
|
- Privacy of Incidental Information (Shilpa
Rao, Anupa Mogili, Vivian
Oliviera,
Sameer Patil)
Hawkey,
K. and Inkpen, K.M., Keeping Up Appearances: Understanding the Dimensions
of Incidental Information Privacy. SIGCHI Conference on Human Factors
in Computing Systems, Montréal, Québec, Canada, 2006,
821-83.
Hawkey,
K. and Inkpen, K.M., Examining the Content and Privacy of Web Browsing
Incidental Information. In 15th International Conference on World Wide
Web, Edinburgh, UK, 2006, 123-132.
|
5/31 10:30-11:50 |
ICS 243 |
- Sameer Patil: Privacy and Awareness (Yang
Wang, David
Nguyen, Paul
Main, Deepika Ghandi)
Hudson
& Smith (1996) - Techniques for addressing fundamental privacy
and disruption tradeoffs in awareness support systems. Proceedings
of the 1996 ACM Conference on Computer Supported Cooperative
Work, Boston, Massachusetts, 248 - 257.
• Also read the two papers in the class dropbox
|
6/05 10:30-11:50 |
ICS 243 |
- Yang Wang: Tailoring Privacy to Each Individual User (Sameer
Patil, David
Nguyen, Sulagna
Basu, Shilpa Rao)
URL Wang,
Y. and A. Kobsa : Respecting Users' Individual Privacy Constraints
in Web Personalization. Proc.
of the 11th Int'l Conf. on User Modeling, Corfu,
Greece, 2007
Wang,
Y., A. Kobsa, A. van der Hoek and J. White (2006): PLA-based
Runtime Dynamism in Support of Privacy-Enhanced Web Personalization.
Proc. of the 10th Int'l Software Product Line
Conference, Baltimore, MD, IEEE Press, 151-162
|
6/07 10:30-11:50 |
ICS 243 |
- David Nguyen: RFID and Privacy (Yang
Wang, Sameer Patil, Anupa
Mogili, Vivian Oliviera)
Simson
L. Garfinkel, Ari Juels, Ravi Pappu (2005), "RFID Privacy:
An Overview of Problems and Proposed Solutions," IEEE
Security and Privacy 3(3), pp. 34-43
Günther,
O. and Spiekermann, S. 2005. RFID and the perception of control:
the consumer's view. Commun. ACM 48, 9 (Sep. 2005), 73-76.
|