Tensions in developing a secure collective information practice - the case of agile ridesharing

, , , , , & (2011) Tensions in developing a secure collective information practice - the case of agile ridesharing. In Jorge, J, Graham, N, & Campos, P (Eds.) Human-Computer Interaction - INTERACT 2011 -13th IFIP TC 13 International Conference, Proceedings, Part II [Lecture Notes in Computer Science, Vol 6947]. Springer, Germany, pp. 524-532.

[img]
Preview
Accepted Version (PDF 148kB)
radke_INTERACT2011.pdf.

View at publisher

Description

Free to read at publisher Many current HCI, social networking, ubiquitous computing, and context aware designs, in order for the design to function, have access to, or collect, significant personal information about the user. This raises concerns about privacy and security, in both the research community and main-stream media. From a practical perspective, in the social world, secrecy and security form an ongoing accomplishment rather than something that is set up and left alone. We explore how design can support privacy as practical action, and investigate the notion of collective information-practice of privacy and security concerns of participants of a mobile, social software for ride sharing. This paper contributes an understanding of HCI security and privacy tensions, discovered while “designing in use” using a Reflective, Agile, Iterative Design (RAID) method.

Impact and interest:

12 citations in Scopus
Search Google Scholar™

Citation counts are sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

Full-text downloads:

556 since deposited on 14 Dec 2011
8 in the past twelve months

Full-text downloads displays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.

ID Code: 47744
Item Type: Chapter in Book, Report or Conference volume (Conference contribution)
ORCID iD:
Brereton, Margotorcid.org/0000-0002-0982-3404
Measurements or Duration: 9 pages
Keywords: design, trust, usability privacy and security, user experience based approaches
DOI: 10.1007/978-3-642-23771-3_39
ISBN: 978-3-642-23770-6
Pure ID: 32021215
Divisions: Past > QUT Faculties & Divisions > Faculty of Built Environment and Engineering
Past > Schools > School of Engineering Systems
Past > QUT Faculties & Divisions > Faculty of Science and Technology
Past > Institutes > Institute for Future Environments
Past > QUT Faculties & Divisions > Science & Engineering Faculty
Funding:
Copyright Owner: Consult author(s) regarding copyright matters
Copyright Statement: This work is covered by copyright. Unless the document is being made available under a Creative Commons Licence, you must assume that re-use is limited to personal use and that permission from the copyright owner must be obtained for all other uses. If the document is available under a Creative Commons License (or other specified license) then refer to the Licence for details of permitted re-use. It is a condition of access that users recognise and abide by the legal requirements associated with these rights. If you believe that this work infringes copyright please provide details by email to qut.copyright@qut.edu.au
Deposited On: 14 Dec 2011 23:18
Last Modified: 16 May 2025 12:45