Dado el creciente volumen de datos que implica la interacción con la tecnología, es necesario que los usuarios entiendan y evalúen la importancia de diferentes tipos de información personal, con el fin de hacer mejor uso de ella. El objetivo de esta tesis es entender cómo los usuarios de las web y de telefonía móvil asignan valor a su información personal en dos relevantes contextos: la navegación web y la comunicación móvil.
En esta tesis describimos dos estudios. En el primero se utiliza un Método de Muestreo de Experiencias refinado para obtener la valoración económica de la Información Personal Identificable (PII) de usuarios web. Observamos los valores de diferentes tipos de PII de manera comparativa, y reflexionamos sobre cómo estos valores se relacionan las preocupaciones de los usuarios sobre su privacidad y la monetización de su PII.
El segundo estudio se enfoca en la anotación de llamadas telefónicas móviles, un proceso que involucra la selección de información que el usuario considera ser la más importante dentro de una llamada. Encontramos los factores que principalmente influencian la necesidad del llamante de tomar notas. También observamos cómo los comportamientos y necesidades de anotación cambian a través del tiempo. Finalmente, evaluamos diferentes técnicas de anotación, incluyendo anotaciones hechas por observadores independientes del contexto. Nuestros hallazgos incluyen ideas importantes para el desarrollo de herramientas automáticas de anotación, y además sugieren que existe potencial en el uso de crowdsourcing para encontrar información notable en llamadas telefónicas móviles.
Bibliografía:
A. Acquisti and J. Grossklags. "Losses, Gains, and Hyperbolic Discounting: An Experimental Approach to Information Security Attitudes and Behavior". The Economics of Information Security (2004), pp. 179-186.
A. Acquisti and J. Grossklags. "Privacy and Rationality in Individual Decision Making". Security & Privacy, IEEE 3 (2005).
A. Acquisti and L. John. What is privacy worth. Tech. rep. Heinz College, Carnegie Mellon University, 2009.
A. Acquisti. "Privacy and Security of Personal Information: Economic Incentives and Technological Solutions". The Economics of Information Security, J. Camp and R. Lewis (eds) (2004), pp. 165-178.
A. Bothin and P. Clough. "Participants ' personal note-taking in meetings and its value for automatic meeting summarisation". Information Technology and Management 13.1 (2012), pp. 39-57.
A. Bothin, P. Clough, and G. Bradley. "Quantitative analysis of individual differences in Note-Taking and talking behaviour in meetings". Proceedings of IADIS Multi Conference on Computer Science and Information Systems. Freiburg, Germany: IADIS Multi Conference on Computer Science and Infor-mation Systems, 2010.
A. Braunstein, L. Granka, and J. Staddon. "Indirect Content Privacy Surveys: Measuring Privacy Without Asking About It". Symposium on Usable Privacy and Security (SOUPS). 2011.
A. F. Freed. "The form and function of questions in informal dyadic conversa-tion". Journal of Pragmatics 21.6 (1994), pp. 621-644.
A. M. McDonald and L. F. Cranor. "Americans' attitudes about internet be-havioral advertising practices". Proceedings of the 9th annual ACM workshop on Privacy in the electronic society. 2010.
A. Narayanan and V. Shmatikov. "Myths and fallacies of personally identifiable information". Communications of the ACM 53.6 (2010), pp. 24-26.
A. Narayanan, V. Toubiana, S. Barocas, H. Nissenbaum, and D. Boneh. "A Critical Look at Decentralized Personal Data Architectures". CoRR abs/ 1202.4503 (2012).
A. Piolat, T. Olive, and R. T. Kellogg. "Cognitive effort during note taking". Applied Cognitive Psychology 19.3 (2005), pp. 291-312.
A. Weilenmann. "'I can't talk now, I'm in a fitting room': formulating avail-ability and location in mobile-phone conversations". Environment and Plan-ning A 35 (2003), pp. 1589-1605.
B. Berendt, O. Gunther, and S. Spiekermann. "PRIVACY IN E-COMMERCE: Stated Preferences vs. Actual Behavior". Communications of the ACM (2005).
B. H. Juang and L. R. Rabiner. "Hidden Markov models for speech recogni-tion". Technometrics 33.3 (1991), pp. 251-272.
B. Huberman, E. Adar, and L. Fine. "Valuating privacy". Security & Privacy, IEEE 3.5 (2005), pp. 22-25.
B. J. Cragun. "Telephony annotation services. US Patent. US 7602892". Patent US 7602892 (US). Oct. 13, 2009.
B. Krishnamurthy and C. E. Wills. "On the leakage of personally identifiable information via online social networks". Proceedings of the 2nd ACM workshop on Online social networks. ACM. 2009, pp. 7-12.
B. Krishnamurthy and C. Wills. "Privacy diffusion on the web: a longitudinal perspective". WWW 2009. 2009.
B. Krishnamurthy, D. Malandrino, and C. E. Wills. "Measuring privacy loss and the impact of privacy protection in web browsing". SOUPS. 2007.
B. Krishnamurthy, K. Naryshkin, and W. Craig. "Privacy leakage vs. Protec-tion measures: the growing disconnect". WISP (May,2011).
C. Clopper and E. S. Pearson. "The use of confidence or fiducial limits illus-trated in the case of the binomial". Biometrika 26.4 (1934), pp. 404-413.
C. Dwyer. "Behavioral Targeting: A Case Study of Consumer Tracking on Levis.com". Risk Analysis (2009).
C. Hu, B. B. Bederson, and P. Resnik. "Translation by iterative collaboration between monolingual users". Proceedings of Graphics Interface 2010. Canadian Information Processing Society. 2010, pp. 39-46.
C. J. Announcing the AMI meeting corpus. ELRA Newsletter 11(1):3-5. 2006.
C. Jensen and C. Potts. "Privacy policies as decision-making tools: an evaluation of online privacy notices". ACM SIGCHI CHI. 2004.
C. Jensen, C. Potts, and C. Jensen. "Privacy practices of Internet users: Selfreports versus observed behavior". International Journal of Human-Computer Studies 63.1-2 (2005), pp. 203-227.
C. Mancini, K. Thomas, Y. Rogers, B. Price, L. Jedrzejczyk, A. Bandara, A. Joinson, and B. Nuseibeh. "From spaces to places: emerging contexts in mobile privacy". Proceedings of the 11th international conference on Ubiquitous computing. ACM. 2009, pp. 1-10.
C. Paine, U.-D. Reips, S. Stieger, A. Joinson, and T. Buchanan. "Internet users' perceptions of 'privacy concerns' and 'privacy actions'". Int. J. Hum.-Comput. Stud. 65 (6 June 2007), pp. 526-536.
C. Riederer, V. Erramilli, A. Chaintreau, P. Rodriguez, and B. Krishnamurty. "For sale: Your data, By: you". ACM Hotnets. 2011.
D. Cvrcek, M. Kumpost, V. Matyas, and G. Danezis. "A study on the value of location privacy". Proceedings of the 5th ACM workshop on Privacy in elec-tronic society -WPES '06. New York, New York, USA: ACM Press, 2006, p. 109.
D. Hindus and C. Schmandt. "Ubiquitous audio: capturing spontaneous col-laboration". Proceedings of the 1992 ACM conference on Computer-supported cooperative work. CSCW '92. Toronto, Ontario, Canada: ACM, 1992, pp. 210-217.
D. Lin and M. C. Loui. Taking the byte out of cookies: privacy, consent, and the Web. Vol. 28. 2. ACM, 1998.
D. MacMillan and E. Dwoskin. Smile! Marketing Firms Are Mining Your Selfies. The Wall Street Journal. http://on.wsj.com/ZSsro5.
D. Sarno. Apple collecting, sharing iPhone users precise locations. http://latimesblogs.latimes.com/technology/2010/06/apple-location-privacy-iphoneipad.html. June 2010.
E. A. Schegloff. "Beginnings in the telephone". Perpetual contact: Mobile com-munication, private talk, public performance (2002), p. 284.
E. A. Schegloff. Sequence organization in interaction: Volume 1: A primer in conversation analysis. Vol. 1. Cambridge University Press, 2007.
E. Karapanos, J. Jain, and M. Hassenzahl. "Theories, methods and case studies of longitudinal HCI research". CHI'12 Extended Abstracts on Human Factors in Computing Systems. ACM. 2012, pp. 2727-2730.
E. Laurier. "Why people say where they are during mobile phone calls" (2001).
E. Steel and G. A. Fowler. Facebook in Privacy Breach. http://on.wsj.com/buDn6d. Oct. 2010.
E. Steel. A web pioneer profiles users by name. http://on.wsj.com/riy5Qo. Oct. 2010.
F. Bonin, J. San Pedro, and N. Oliver. "A Context-Aware NLP Approach For Noteworthiness Detection in Cellphone Conversations". Proceedings of COLING 2014, the 25th International Conference on Computational Linguistics: Technical Papers. Dublin, Ireland: Dublin City University and Association for Computational Linguistics, Aug. 2014, pp. 25-36.
F. Mueller and A. Lockerd. "Cheese: Tracking Mouse Movement Activity on Websites, a Tool for User Modeling". CHI '01 Extended Abstracts on Human Factors in Computing Systems. CHI EA '01. Seattle, Washington: ACM, 2001, pp. 279-280.
F. Roesner, T. Kohno, and D. Wetherall. "Detecting and defending against third-party tracking on the web". NSDI'12: Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation. 2012, pp. 12-12.
G. Danezis, S. Lewis, and R. Anderson. "How Much is Location Privacy Worth?" Online Proceedings of the Workshop on the Economics of Information Security Series (WEIS) 2005. 2005.
G. Iachello, K. N. Truong, G. D. Abowd, G. R. Hayes, and M. Stevens. "Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world". ACM SIGCHI CHI '06 (2006).
G. Press. A Very Short History Of Big Data. Forbes.com. http://www.forbes.com/sites/gilpress/2013/05/09/a-very-short-history-of-bigdata/.
G. R. Hayes, S. N. Patel, K. N. Truong, G. Iachello, J. A. Kientz, R. Farmer, and G. D. Abowd. "The personal audio loop: Designing a ubiquitous audio-based memory aid". Mobile Human-Computer Interaction-MobileHCI 2004. Glasgow, Scotland: Springer, 2004, pp. 168-179.
G. Salton, A. Singhal, M. Mitra, and C. Buckley. "Automatic text structur-ing and summarization". Information Processing & Management 33.2 (1997), pp. 193-207.
H. Sacks, E. A. Schegloff, and G. Jefferson. "A simplest systematics for the organization of turn-taking for conversation". Language (1974), pp. 696-735.
I. Arminen and M. Leinonen. "Mobile phone call openings: tailoring answers to personalized summonses". Discourse Studies 8.3 (2006), pp. 339-368.
I. Hutchby and S. Barnett. "Aspects of the sequential organization of mobile phone conversation". Discourse Studies 7.2 (2005), pp. 147-171.
I. Li, A. K. Dey, and J. Forlizzi. "Understanding my data, myself: supporting self-reflection with ubicomp technologies". Proceedings of the 13th international conference on Ubiquitous computing. ACM. 2011, pp. 405-414.
I. Li, Y. Medynskiy, J. Froehlich, and J. Larsen. "Personal Informatics in Prac-tice: Improving Quality of Life Through Data". CHI '12 Extended Abstracts on Human Factors in Computing Systems. CHI EA '12. Austin, Texas, USA: ACM, 2012, pp. 2799-2802.
J. Angwin and S. Stecklow. Scrapers dig deep for data on Web. http://on.wsj.com/P17bnx. Oct. 2010.
J. Cohen et al. "A coefficient of agreement for nominal scales". Educational and psychological measurement 20.1 (1960), pp. 37-46.
J. Cohen. Statistical power analysis for the behavioral sciences. 2nd ed. Hills-dale, NJ: Lawrence Earlbaum Associates, 1988.
J. Cox. Many Android apps leak user privacy data. http://bit.ly/b1modi. 2010.
J. E. Fischer. "Experience-Sampling Tools: a Critical Review". Mobile Living Labs 09: Methods and Tools for Evaluation in the Wild, part of MobileHCI 2009. ACM, 2009.
J. Froehlich, M. Y. Chen, S. Consolvo, B. Harrison, and J. A. Landay. "MyEx-perience: a system for in situ tracing and capturing of user feedback on mobile phones". ACM MobiSys '07. 2007.
J. Gerken. Longitudinal Research in Human-Computer Interaction. 2011.
J. Grossklags and A. Acquisti. "When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information". Workshop on Economics of Information Security. Citeseer, 2007.
J. Kenneth and L. Hurwicz. "Studies in resource allocation processes". Ed. by Cambridge University Press, 1978. Chap. On informationally decentralized sys-tems.
J. M. Sadock and A. M. Zwicky. "Speech act distinctions in syntax". Language typology and syntactic description 1 (1985), pp. 155-196.
J. Mikians, L. Gyarmati, V. Erramilli, and N. Laoutaris. "Detecting price and search discrimination on the internet". HotNets. 2012.
J. P. Carrascal, C. Riederer, V. Erramilli, M. Cherubini, and R. de Oliveira. "Your Browsing Behavior for a Big Mac: Economics of Personal Information Online". Proceedings of the 22Nd International Conference on World Wide Web. WWW '13. Rio de Janeiro, Brazil, 2013, pp. 189-200.
J. P. Carrascal, F. Bonin, S. P. Jose, R. De Oliveira, and N. Olivier. "Who can we trust? A Comparative Evaluation of Phone Call Annotation Techniques". ACM SigCHI Conference (Submitted). 2015.
J. P. Carrascal, R. de Oliveira, and M. Cherubini. "A Note Paper on Note-taking: Understanding Annotations of Mobile Phone Calls". Proceedings of the 14th International Conference on Human-computer Interaction with Mobile Devices and Services. MobileHCI '12. San Francisco, California, USA: ACM, 2012, pp. 21-24.
J. P. Carrascal, R. de Oliveira, and M. Cherubini. "To Call or to Recall? That's the Research Question". Transactions of Computer-Human Interaction (ToCHI) (Accepted for publication) (2015).
J. Staiano, N. Oliver, B. Lepri, R. de Oliveira, M. Caraviello, and N. Sebe. "Money Walks: A Human-centric Study on the Economics of Personal Mobile Data". Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. UbiComp '14. Seattle, Washington: ACM, 2014, pp. 583-594.
J. Valentino-Devries and E. Steel. White House to Push Privacy Bill. http://on.wsj.com/hlSR7E. Mar. 2011.
J. Whalen, D. H. Zimmerman, and R. Whalen Marilyn. "When words fail: A single case analysis". Soc. Probs. 35 (1988), p. 335.
K. Audhkhasi, P. G. Georgiou, and S. S. Narayanan. "Analyzing quality of crowd-sourced speech transcriptions of noisy audio for acoustic model adapta-tion". Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE Interna-tional Conference on. IEEE. 2012, pp. 4137-4140.
K. C. Laudon. "Markets and Privacy". ICIS. 1993.
K. Hinckley, S. Zhao, R. Sarin, P. Baudisch, E. Cutrell, M. Shilman, and D. Tan. "InkSeine: In Situ search for active note taking". Proc. of CHI '07. San Jose, California, USA: ACM, 2007, pp. 251-260.
K. O'Hara, M. Perry, A. Sellen, and B. Brown. "Wireless world". Ed. by B. Brown and N. Green. New York, NY, USA: Springer-Verlag New York, Inc., 2002. Chap. Exploring the relationship between mobile phone and document activity during business travel, pp. 180-194.
L. D. Wilcox, B. N. Schilit, and N. Sawhney. "Dynomite: a dynamically or-ganized ink and audio notebook". Proc. of CHI '97. Atlanta, Georgia, United States: ACM, 1997, pp. 186-193.
L. Degen, R. Mander, and G. Salomon. "Working with audio: integrating per-sonal tape recorders and desktop computers". Proceedings of the SIGCHI con-ference on Human factors in computing systems. CHI '92. Monterey, California, United States: ACM, 1992, pp. 413-418.
L. F. Barrett and D. J. Barrett. "An Introduction to Computerized Experi-ence Sampling in Psychology". Social Science Computer Review 19.2 (Summer 2001), pp. 175-185.
M. Bernstein, M. V. Kleek, D. Karger, and M. C. Schraefel. "Information scraps: How and why information eludes our personal information management tools". ACM Trans Inf Syst 26.4 (2008), pp. 1-46.
M. Cherubini and N. Oliver. "A Refined Experience Sampling Method to Capture Mobile User Experience". Workshop of Mobile User Experience Research part of CHI'2009. 2009.
M. Cherubini, X. Anguera, N. Oliver, and R. de Oliveira. "Text versus speech: a comparison of tagging input modalities for camera phones". Proc. of MobileHCI '09. Bonn, Germany: ACM, 2009, 1:1-1:10.
M. Csikszentmihalyi and R. Larson. "Validity and reliability of the experiencesampling method". The Journal of nervous and mental disease 175.9 (1987), pp. 526-536.
M. J. Ferreira, A. K. Caraban, and E. Karapanos. "Breakout: predicting and breaking sedentary behaviour at work". CHI'14 Extended Abstracts on Human Factors in Computing Systems. ACM. 2014, pp. 2407-2412.
M. Kam, J. Wang, A. Iles, E. Tse, J. Chiu, D. Glaser, O. Tarshish, and J. Canny. "Livenotes: a system for cooperative and augmented note-taking in lectures". Proc. of CHI '05. Portland, Oregon, USA: ACM, 2005, pp. 531-540.
M. Lin, W. G. Lutters, and T. S. Kim. "Understanding the Micronote Lifecycle : Improving Mobile Support for Informal Note Taking". Proceedings of the ACM Conference on Human Factors in Computing Systems. Vienna, Austria: ACM, 2004, pp. 687-694.
M. V. Kleek, W. Styke, and D. Karger. "Finders / Keepers : A Longitudinal Study of People Managing Information Scraps in a Micro-note Tool". Proceedings of the 2011 annual conference on Human factors in computing systems. Vancouver, BC: ACM, 2011, pp. 2907-2916.
M. W. Lansdale. "The psychology of personal information management". Applied ergonomics 19.1 (1988), pp. 55-66.
M. Zawadzinski. Six Alternatives to Google and Facebook in the Battle for Online Privacy. International Business Journal. http://www.ibtimes.co.uk/six-alternatives-google-facebook-battle-online-privacy1472156.
N. D. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury, and A. T. Campbell. "A survey of mobile phone sensing". Communications Magazine, IEEE 48.9 (2010), pp. 140-150.
N. Jentsch, S. Preibusch, and A. Harasser. "Study on monetising privacy: An economic model for pricing personal information". ENISA (Feb. 2012).
R. De Oliveira and J. Carrascal. Method for collecting and storing annotations associated to a voice audio data. US Patent 8,792,863. July 2014.
R. de Oliveira and J. P. Carrascal. "Towards Effective Ethical Behavior Design". CHI '14 Extended Abstracts on Human Factors in Computing Systems. CHI EA '14. Toronto, Ontario, Canada: ACM, 2014, pp. 2149-2154.
R. Jones, R. Kumar, B. Pang, and A. Tomkins. "'I Know What You Did Last Summer': Query Logs and User Privacy". Proceedings of the Sixteenth ACM Conference on Conference on Information and Knowledge Management. CIKM '07. Lisbon, Portugal: ACM, 2007, pp. 909-914.
R. Larson and M. Csikszentmihalyi. "The experience sampling method." New Directions for Methodology of Social & Behavioral Science (1983).
R. Thaler. "Toward a positive theory of consumer choice". Journal of Economic Behavior & Organization 1.1 (1980), pp. 39-60.
S. Banerjee and A. I. Rudnicky. "An extractive-summarization baseline for the automatic detection of noteworthy utterances in multi-party human-human dialog". SLT. 2008, pp. 177-180.
S. Banerjee and A. Rudnicky. "Detecting the Noteworthiness of Utterances in Human Meetings". Proceedings of the SIGDIAL 2009 Conference. London, UK: Association for Computational Linguistics, Sept. 2009, pp. 71-78.
S. Consolvo and M. Walker. "Using the experience sampling method to evaluate ubicomp applications". IEEE Pervasive Computing 2.2 (Apr. 2003), pp. 24-31.
S. E. Hormuth. "The sampling of experiences in situ". Journal of Personality 54.1 (1986), pp. 262-293.
S. Goel, A. Broder, E. Gabrilovich, and B. Pang. "Anatomy of the Long Tail: Ordinary People with Extraordinary Tastes". in WSDM. 2010.
S. Guha and S. Kandula. "Act for affordable data care". HotNets. 2012, pp. 103-108.
S. Guha, B. Cheng, and P. Francis. "Privad: Practical Privacy in Online Ad-vertising". NSDI. 2011.
S. Koco, C. Capponi, and F. Bechet. "Applying multiview learning algorithms to human-human conversation classification". INTERSPEECH. 2012.
S. Menard. Longitudinal research. Vol. 76. Sage, 2002.
S. Richmond. Eric Schmidt: Google gets close to 'the creepy line'. http://tgr.ph/dp8BaH. Oct. 2010.
S. S. Intille, J. Rondoni, C. Kukla, I. Ancona, and L. Bao. "A context-aware experience sampling tool". CHI '03 extended abstracts on Human factors in computing systems. CHI EA '03. Ft. Lauderdale, Florida, USA: ACM, 2003, pp. 972-973.
S. Whittaker, P. Hyland, and M. Wiley. "FILOCHAT: handwritten notes provide access to recorded conversations". Proc. of CHI '94. Boston, Massachusetts, United States: ACM, 1994, pp. 271-277.
S. Whittaker, R. Laban, and S. Tucker. "Analysing meeting records: An ethno-graphic study and technological implications". Machine Learning for Multi-modal Interaction. Springer, 2006, pp. 101-113.
S. Whittaker, S. Tucker, K. Swampillai, and R. Laban. "Design and evaluation of systems to support interaction capture and retrieval". Personal Ubiquitous Comput. 12 (3 Jan. 2008), pp. 197-221.
S. Wolfram. The Personal Analytics of My Life. http://blog.stephenwolfram.com/2012/03/the-personal-analytics-of-my-life/.
S.-H. Lee. "Extended requesting: Interaction and collaboration in the pro-duction and specification of requests". Journal of Pragmatics 41.6 (2009), pp. 1248-1271.
T. N. Yorker. The Virtual Interview: Edward Snowden. http://www.newyorker.com/new-yorker-festival/live-stream-edward-snowden.
T. W. Bank. ITU releases latest global technology development figures ITU releases latest global technology development figures. DOI: 10.1596/978-0-8213-8991-1; Available at: http://www.worldbank.org/ict/IC4D2012. License: Creative Commons Attribution CC BY 3.0. 2013.
V. Kalnikaite and S. Whittaker. "Software or wetware?: discovering when and why people use digital prosthetic memory". Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI '07. San Jose, California, USA: ACM, 2007, pp. 71-80.
V. Kalnikaite, P. Ehlen, and S. Whittaker. "Markup as you talk: establishing effective memory cues while still contributing to a meeting". Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work. CSCW '12. Seattle, Washington, USA: ACM, 2012, pp. 349-358.
V. Toubiana, H. Nissenbaum, A. Narayanan, S. Barocas, and D. Boneh. "Ad-nostic: Privacy Preserving Targeted Advertising". NDSS. 2009.
W. Geyer, H. Richter, and G. D. Abowd. "Towards a Smarter Meeting Record-Capture and Access of Meetings Revisited". Multimedia Tools Appl. 27 (3 Dec. 2005), pp. 393-410.
WSJ. WSJ: What they know series. http://online.wsj.com/public/page/what-they-know-digital-privacy.html. Apr. 2012.
© 2008-2024 Fundación Dialnet · Todos los derechos reservados