The development of organizational support for managing personal data.
The development of a rigorous theory of acceptance dynamics of users, specifically related to privacy.
This review shows that work is well already underway in most of these directions, but is still unorganized and dispersed. Our hope that this article, summarizing thirty years of privacy research in HCI and CSCW, helps to shed light on many of the salient issues and will help practitioners and researchers alike explore these complex issues in a more informed and conscious way.
We thank Gregory Abowd, Alessandro Acquisti, Ben Bederson, Lorrie Cranor, Paul Dourish, Gillian Hayes, James Finlay, Heather Richter, Norman Sadeh, Karen Tang, and all the reviewers for their help. We are also indebted with countless colleagues in three continents for stimulating intellectual exchanges.
Support for this work was provided by the NSF Graduate Research Fellowship Program, the President of Georgia Tech, the Dean of the College of Computing of Georgia Tech, and the MacArthur Foundation through the Sam Nunn Security Program. This work is also supported in part by Intel Research, NSF Grants CNS-0627513 (“User-Controllable Security and Privacy for Pervasive Computing”) and IIS-0534406 (“Next Generation Instant Messaging: Communication, Coordination, and Privacy for Mobile, Multimodal, and Location-Aware Devices”), and ARO research grant DAAD19-02-1-0389 (“Perpetually Available and Secure Information Systems”) to Carnegie Mellon University's CyLab.
Any opinions, findings, conclusions, or recommendations expressed in this publication are those of the authors and do not necessarily reflect the views of the agencies above.
end-user-privacy-in-human-computer-interaction-v57.docPage 80 of 85