Managing the Privacy of Incidental Information During Collaboration

Slides:



Advertisements
Similar presentations
Examining the Content and Privacy of Web Browsing Incidental Information Kirstie Hawkey Kori Inkpen.
Advertisements

Web Mining.
Data Mining Methodology 1. Why have a Methodology  Don’t want to learn things that aren’t true May not represent any underlying reality ○ Spurious correlation.
Designing for Multiple Screen Resolutions Screen resolution is the width and height of the computer screen in pixels Most monitors have many screen resolutions.
Software Quality Metrics
Techniques for Visual Feedback of Security State Tara Whalen and Kori Inkpen Faculty of Computer Science Dalhousie University whalen at cs dot dal dot.
IMS5401 Web-based Systems Development Topic 3: Development for the web (a) Overview of web development issues.
CSCI 347 / CS 4206: Data Mining Module 01: Introduction Topic 03: Stages in Data Mining.
Welcome to the Nebraska SharePoint User Group May 7 th, 2008 Enterprise Content Management (ECM) in SharePoint Corey Erkes.
Full Cycle: AMS’ Loss Control Environment is a full cycle loss control management solution that offers comprehensive management of the entire inspection.
Paper Prototyping Source:
1 Predicting Download Directories for Web Resources George ValkanasDimitrios Gunopulos 4 th International Conference on Web Intelligence, Mining and Semantics.
Design of a device to assist with repetitive questions in patients with Alzheimer’s Disease (AD) Contact Information: Kirstie Hawkey PhD Candidate Faculty.
Page 1 WEB MINING by NINI P SURESH PROJECT CO-ORDINATOR Kavitha Murugeshan.
-1- Philipp Heim, Thomas Ertl, Jürgen Ziegler Facet Graphs: Complex Semantic Querying Made Easy Philipp Heim 1, Thomas Ertl 1 and Jürgen Ziegler 2 1 Visualization.
Markup and Validation Agents in Vijjana – A Pragmatic model for Self- Organizing, Collaborative, Domain- Centric Knowledge Networks S. Devalapalli, R.
A technical writer’s role in software quality – an experiment Asha Mokashi, SCT Software Solutions, Bangalore.
Mantid Development introduction Nick Draper 11/04/2008.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
Collaborative Information Retrieval - Collaborative Filtering systems - Recommender systems - Information Filtering Why do we need CIR? - IR system augmentation.
Media Arts and Technology Graduate Program UC Santa Barbara MAT 259 Visualizing Information Winter 2006George Legrady1 MAT 259 Visualizing Information.
Shelby County Schools Common Core Modules for Social Studies/History Grades 6-12.
Human Interaction with Data “Meaningful Interpretations” “The Power of Crowdsourcing” &
Prepared by: Mahmoud Rafeek Al-Farra College of Science & Technology Dep. Of Computer Science & IT BCs of Information Technology Data Mining
APCS Nguyen Ngoc Dan Vy – Tran Thi Hong Diem – Instructor: Do Lenh Hung Son.
Chapter 6 CASE Tools Software Engineering Chapter 6-- CASE TOOLS
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
Paper Prototyping Source: Paper Prototyping a method of brainstorming, designing, creating, testing, refining and communicating.
Summary of HEP SW workshop Ian Bird MB 15 th April 2014.
Digital Knowledge Setting May 8th, 2009 Barcelona CLAN – Continuous Learning for Adults with Needs LLP IT-GRUNDTVIG-GMP Grant Agreement.
Dissertation Research: Managing Visual Privacy in Web Browsers Dr. Kirstie Hawkey Dalhousie University.
Speed Cash System. Purpose of the Project  online Banking Transaction Information.  keeping in view of the distributed client server computing technology,
1MIL client logo to be positioned at the mark minimum height maximum size navigator Text Lines MIL Agenda.
05/18/2004 Verizon Labs 1 Techniques for Understanding the User Experience Measuring Web Search Effectiveness: The User Perspective WWW 2004 Conference.
Data mining in web applications
Visualization in Process Mining
VILNIUS SCHOOL OF TECHNOLOGIES, BUSINESS AND AGRICULTURE
Business process management (BPM)
Recommender Systems & Collaborative Filtering
PLM, Document and Workflow Management
ALN Review February ALN Review February 2017.
Business process management (BPM)
Visio Services 2013 Collaboration APIs Chris Hopkins
Web Mining Ref:
Yr 10 Candle Holder.
Federated & Meta Search
GUI Week 9.
MaintenanceDirect – Advanced Tips and Tricks
Mining Dynamics of Data Streams in Multi-Dimensional Space
Chapter 12: Automated data collection methods
Experimental Design Proposal
Tools of Software Development
Data collection with Internet
Methontology: From Ontological art to Ontological Engineering
Boštjan Kožuh Statistical Office of the Republic of Slovenia,
Group: Chris, Daniel, Jeff, Kathy, Shirelle, Vincent
British Institute of Learning Disabilities
Chapter 13 Quality Management
Towards a Personal Briefing Assistant
Background survey Skills: none
Recommendations from the SMC Bioassessment Workgroup
Content Strategy Practice Overview
Data collection with Internet
Shane B., Esther K., Curtis S., Jennifer W.
Basic Reports.
Data collection with Internet
CSE591: Data Mining by H. Liu
T-FLEX DOCs PLM, Document and Workflow Management.
Data collection with Internet
Journal of Web Semantics 55 (2019)
Presentation transcript:

Managing the Privacy of Incidental Information During Collaboration Kirstie Hawkey and Kori Inkpen Dalhousie University {hawkey, inkpen}@cs.dal.ca Concept Challenges Ad hoc Collaboration Colleagues often gather around a computer Incidental Information Many traces of past activities are visible with casual inspection. Complexity Reduction Large volume of information. Multiple contexts of creation and viewing of incidental information. Must balance amount of control with maintenance time and effort. Privacy patterns suggest a semi-automated approach is feasible. Data Analyses High volume of logged data during field studies. Numerical averages insufficient due to individual differences. Data mining and visualization techniques may uncover patterns. System Evaluation Field setting required for evaluation of management solutions. To encourage natural behaviour, users need to maintain privacy. Large volume make fine-grained self-reports tedious. Privacy Patterns Patterns on a per-window basis suggest a semi-automated approach to privacy management may be feasible: Individual Behaviours Privacy concerns and personal information management styles are very individual. Privacy Normative privacy for personal displays does not apply; the display is an object in the collaboration. Rapid Bursts of Browsing Large Volume of Pages Personal Information Management Managing large amounts of personal information is complex. Sequential Representation Streaks Transitions Field Study: Privacy Gradients Next Steps Temporal Representation Temporal Patterns Window Re-visitation Potential Solutions Browser windows of differing privacy levels? Filter which incidental information is displayed. Classify new information as it is generated. Research studies Survey of privacy concerns with respect to incidental information (underway). Field study examining privacy in context of location and pages (underway). Longitudinal field study of management solution Methodology Field study for one week. 20 laptop users (multiple contexts). Client-side logging. Electronic diary. Privacy gradients. Paper classification tasks. Goodness of Fit 75% of gradients fit most of the time; 20% fit all of the time Hard to classify: Sites with multiple purposes Sites with variable content Overall Privacy Gradient Usage Patterns Clusters C1 C2 C3 C4 Privacy Gradient Overall Final Cluster Centers Public 42% 22% 36% 62% 18% Semi-Public 25% 58% 21% 16% 28% Private 15% 9% 11% Don’t Save 7% 46% Number of Participants 3 5 10 2 Acknowledgements Thanks to the members of the EDGE Lab for their support. This research is funded in part by NSERC