Security/Contextual Identity Project/Related Work
- Vikor Mayer-Schoenberger (2009). Delete: The Virtue of Forgetting in the Digital Age.
People forget, why can't machines (on purpose, that is)? Need more tombstone APIs, fewer wayback machines.
- Carl Jung (1953). Persona theory (need a real reference for this)
Persona as mask: "One could say, with little exaggeration, that the persona is that which in reality one is not, but which oneself as well as others think one is.” -- Carl Jung
- Erving Goffman (1959). The Presentation of Self in Everyday Life
Everyone's got role(s) to play: "All the world is not, of course, a stage, but the crucial ways in which it isn't are not easy to specify." -- Goffman
Policy and privacy
- Helen Nissenbaum (2009). Privacy in Context: Technology, Policy, and the Integrity of Social Life.
Sharing information is not a privacy violation per se, and is often desireable. It is when information is shared out of context, without regard for social norms and values, that privacy is violated.
- Yang Wang, Gregory Norcie, Saranga Komanduri, Pedro Giovanni Leon, Lorrie Faith Cranor, and Alessandro Acquisti (2011). "I regretted the minute I pressed share": A Qualitative Study of Regrets on Facebook
Survey of types of posts people regret, why they post, and remediation methods.
Mental models of privacy
- L. Jean Camp (2006). Mental Models of Privacy and Security
Roundup of different mental models (criminal, warfare, physical, medical infection, economic) that inform whether or not users think they are at risk, and what motivates their attackers.
- Cormac Herley (2009). So Long, And No Thanks for the Externalities.
Users are not irrational for not heeding security advice, they are merely making a rational decision that the expected value of following that advice is negative (given the false positive rate, or the probability that not following the advice will lead to compromise).
- Rich Wash, Emilee Rader (2011). Influencing Mental Models of Security: A Research Agenda.
Mental models are simple by necessity. Having to reason about all the factors that go into a decision is not worth it, so most people satisfice. However, just because a mental model is technically incomplete or incorrect does not mean that it can't lead to a good decision. -->
- Arvind Narayanan and Vitaly Shmatikov (2008), Robust De-anonymization of Large Datasets (How to Break Anonymity of the Netflix Prize Dataset)
We show that one can link an anonymous Netflix record to external, public data not in the dataset, such as public IMDb ratings, which are associated with a person's identity.
- Arvind Narayanan and Vitaly Shmatikov (2009). De-anonymizing Social Networks
More generalized re-identification attacks.
Social media and privacy
- Mary Madden, Aaron Smith (2010). Reputation Management and Social Media.
Young people self-report changing privacy settings and taking remediative actions (deleting posts, etc) to preserve privacy than older people. Also some interesting stats about pseudonym use and monitoring digital footprints.
cookies, 3rd party cookies, web bugs, flash cookies, network monitoring, fingerprinting, geolocation, history attacks, there's gotta be a roundup for this already
Usability and privacy
- Pedro G. Leon, Blase Ur, Rebecca Balebako, Lorrie Faith Cranor, Richard Shay, and Yang Wang (2012). Why Johnny Can’t Opt Out: A Usability Evaluation of Tools to Limit Online Behavioral Advertising