Workshop on UbiComp Privacy
PRIVACY IN CONTEXT
September 11, 2005 - Tokyo, Japan

CALL FOR PAPERS

Submission Deadline (workshop position papers): EXTENDED TO July 8, 2005

The main goal of this workshop is to approach the concept of privacy from a contextual angle, by sharing actual design experiences or case studies that take a specific legal, social, or technical context into account. Areas of interest to this workshop include (but are not limited to) the following topics:

Social and legal issues in ubicomp privacy
  • How do various technology stakeholders (designers, managers, employees, consumers, regulators, activists, citizens, etc.) conceive of privacy and its relevance to ubicomp technologies? How do conceptions change over time, as they use and become more familiar with systems?
  • What incentives work best for ubicomp systems? How can weaker parties (e.g., individuals) respond to organizationsí desire for information? How should this shape design?
  • How can we conceptualize, design, and provide context-dependent privacy that dynamically changes according to a specific situation or user need? Can we gather key insights from usersí day-to-day practices to assist in the design of large-scale ubiquitous computing systems?
  • How is privacy enacted and conceived differently in different cultures and communities, e.g., in different countries, across professional groups, within families, between genders?
  • How do affordances of different application domains shape the level of privacy users expect, or the level of privacy that can be provided?
  • What trade-offs are necessary to balance privacy vs. efficiency, convenience, and security? Under what circumstances is privacy to be limited or expanded?
  • Methods for investigating and building ubicomp privacy
  • What are the best methods for evaluating, measuring, and understanding privacy concerns? What kinds of qualitative and quantitative approaches work well?
  • What can be learned from past cases? What ubicomp-relevant systems have succeeded or failed because (or despite) of their treatment of personal information and privacy risks? What systems have successfully transitioned (or unexpectedly failed to transition) from one context or culture to another?
  • Which research methods have been applied to the empirical and social study of ubiquitous computing systems and privacy? Can we identify best practices for laboratory and field experiments as well as potential longitudinal studies?
  • What kinds of design methods are most effective for understanding the privacy concerns of a given community, especially while early in the design process?
  • What kinds of tools are useful for prototyping and implementing privacy-sensitive systems?
  • What progress is needed in core technologies such as cryptography, trusted systems, AI inference and user modeling to implement better privacy-sensitive systems?
  • Workshop Format and Submission Instructions

    This workshop will last for 1 full day and will be limited to 20 participants (not including the workshop organizers) to enable lively and productive discussions. Participants will be invited on the basis of position papers. Papers should be no more than 4 pages (letter or A4 size) excluding references, and will be selected based on their originality, credibility, and topical relevance. The workshop will be organized into panels and breakout sessions. Depending on the submitted position papers, the workshop will consist of 3 to 4 panels. Each panel lasts about an hour, and includes brief presentations of 5 or 6 position papers that share a similar topic, followed by organizer-moderated discussions. Also in the afternoon, there will be breakout sessions lasting about 1.5 to 2 hours, followed by reports to a plenary session. In addition, coffee breaks and lunch will serve as opportunities for informal discussion. To the extent possible, participants will have lunch together within short walking distance of the workshop location. Papers should be submitted to in PDF or MS Word format on or before June 17, 2005 to privacyworkshop@guir.berkeley.edu. Notification of acceptance will be sent out by July 25, 2005. Accepted papers will be made accessible on the workshop website.

    Important Dates

    Submission Deadline (workshop position papers): June 17, 2005 EXTENDED TO July 8, 2005
    Acceptance Notification (workshop position papers): July 25, 2005

    Goals and Background

    The goals of this workshop are twofold:

    1. To collect examples of how context shapes the needs and the design of privacy enhancing systems.
    2. To define aspects that guide and constrain the development of privacy-sensitive ubicomp systems in real-world situations.
    Privacy is an enormously complex topic, and ubiquitous computing opens up new problems that span much of its scope. Ubicomp applications will be deployed in a multitude of environments, encompassing a large number of very different situations and devices, and involving a large variety of players: within professional groups; between friends; in families; between strangers, companies, or between customers and service providers. Identifying the common denominators and discriminating factors requires at least the understanding of principles from (i) computer science, (ii) social psychology and sociology, (iii) law, and (iv) economics. Only by bringing together experts in these areas in a forum like this can we identify the contextual dependencies and research needs for the healthy growth of the field.

    This workshop builds on three previous workshops at UbiComp run by some of the current organizers: The first workshop was titled "Socially-Informed Design of Privacy-Enhancing Solutions in Ubiquitous Computing" at UbiComp 2002 in Gothenburg, the second was "UbiComp communities: Privacy as boundary negotiation" at UbiComp 2003 in Seattle, and the last was "UbiComp Privacy: Current Status and Future Directions" at UbiComp 2004 in Nottingham.

    We also welcome cross-pollination from participants in past UbiComp workshops on related topics such as intimacy, commerce, healthcare, security, face-to-face interaction, and urban spaces.

    Last updated on February 08, 2006