Examining the Content and Privacy of Web Browsing Incidental Information Kirstie Hawkey Kori Inkpen.

Slides:



Advertisements
Similar presentations
WPA-WHO Global Survey of Psychiatrists' Attitudes Towards Mental Disorders Classification Results for the Spanish Society of Psychiatry.
Advertisements

1 A B C
Module 1: BLOCK 1 / MAIN MENU
AP STUDY SESSION 2.
1
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
Myra Shields Training Manager Introduction to OvidSP.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
UNITED NATIONS Shipment Details Report – January 2006.
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Exit a Customer Chapter 8. Exit a Customer 8-2 Objectives Perform exit summary process consisting of the following steps: Review service records Close.
Create an Application Title 1Y - Youth Chapter 5.
Create an Application Title 1A - Adult Chapter 3.
Process a Customer Chapter 2. Process a Customer 2-2 Objectives Understand what defines a Customer Learn how to check for an existing Customer Learn how.
Custom Statutory Programs Chapter 3. Customary Statutory Programs and Titles 3-2 Objectives Add Local Statutory Programs Create Customer Application For.
Custom Services and Training Provider Details Chapter 4.
CALENDAR.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Year 6 mental test 5 second questions
Year 6 mental test 10 second questions
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
Break Time Remaining 10:00.
Turing Machines.
PP Test Review Sections 6-1 to 6-6
Bright Futures Guidelines Priorities and Screening Tables
Bellwork Do the following problem on a ½ sheet of paper and turn in.
2 |SharePoint Saturday New York City
Exarte Bezoek aan de Mediacampus Bachelor in de grafische en digitale media April 2014.
VOORBLAD.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
 Copyright I/O International, 2013 Visit us at: A Feature Within from Item Class User Friendly Maintenance  Copyright.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
© 2012 National Heart Foundation of Australia. Slide 2.
Adding Up In Chunks.
SLP – Endless Possibilities What can SLP do for your school? Everything you need to know about SLP – past, present and future.
MaK_Full ahead loaded 1 Alarm Page Directory (F11)
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Synthetic.
Model and Relationships 6 M 1 M M M M M M M M M M M M M M M M
25 seconds left…...
Subtraction: Adding UP
1 hi at no doifpi me be go we of at be do go hi if me no of pi we Inorder Traversal Inorder traversal. n Visit the left subtree. n Visit the node. n Visit.
Analyzing Genes and Genomes
Types of selection structures
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Essential Cell Biology
Converting a Fraction to %
Clock will move after 1 minute
Intracellular Compartments and Transport
PSSA Preparation.
Essential Cell Biology
Physics for Scientists & Engineers, 3rd Edition
Profile. 1.Open an Internet web browser and type into the web browser address bar. 2.You will see a web page similar to the one on.
Registry and Referral System HCW/PSW Staff User Manual
Dissertation Research: Managing Visual Privacy in Web Browsers Dr. Kirstie Hawkey Dalhousie University.
Managing the Privacy of Incidental Information During Collaboration
Presentation transcript:

Examining the Content and Privacy of Web Browsing Incidental Information Kirstie Hawkey Kori Inkpen

2 Incidental Information Privacy Traces of previous activity visible on personal computer display Privacy issues arise when others can view your display. The information, incidental to the task at hand, may not be appropriate for current viewing context

3

4 Privacy Management Systems approach 1. Classify content as created with privacy level 2. Filter content appropriately according to viewing context Our previous work indicates manual classification by users would be difficult Large number of sites, rapid bursts of browsing An automated approach may be to use the content category of the web page Commercial content filtering products (e.g. Cerberian)

5 Research Questions 1. How does the content of visited web pages affect participants privacy classifications? 2. Is an automated approach to content classification scheme feasible?

6 Participants Recruited from Dalhousie University community 11 students / 4 office staff 10 female / 5 male Average age 27.8 (18 to 44) Mixture of technical and non-technical, desktop and laptop users Reported usual reasons for web browsing 37% personal browsing 18% work-related 45% school-related

7 Methodology Week long field study Browser Helper Object Logged data included: Browser window ID Date/Time stamp Page title, URL

8 Electronic Diary 4-level privacy scheme Selectively sanitized data

9 Content Categories 55 commercial web filtering categories (Cerberian) Theoretical privacy classification task

10 Content Category Analysis Researchers partitioned participants actual browsing from the week into categories Same 55 Cerberian categories Combined all participant data (31,160 page visits) Sorted by URL Filtered URLS with Zone Alarm Security Suites parental control feature Manual classification of remainder

Results

12 Visited Categories Varied 41/55 categories (average 21, 15 to 29) Category# pages# participants# part. with 10+ pages Search Engines/Portals Education Reference News/Media Shopping Arts/Entertainment Society/Lifestyle … News Group130393

13 Privacy Levels Applied (Overall) How do privacy levels change according to category of content? K-means cluster analysis found 5 clusters public semi-public private public/dont save mixture

14 Cluster: public 9.8% of visited pages

15 Cluster: semi-public 6.4% of visited pages

16 Cluster: private 21.0% of visited pages

17 Cluster: public/dont save 9.2% of visited pages

18 Cluster: Mixture 44.1% of visited pages

19 Possible Classification Approaches Standardized approach Common default privacy level for categories General consensus needed as to which privacy level is appropriate for each content category Personalized approach User defined default privacy level for categories Individuals need to be fairly consistent at their desired privacy level within each category Individuals must be able to specify default privacy levels for each category

20 Evaluate Standardized Approach Examine consistency between participants in their theoretical content category classification task Examine consistency between participants in their privacy classification of visited pages within a category

21 Theoretical Classification Task Little agreement about appropriate privacy level Only 8 categories with 80% (12+ participants) agreement Only 2 categories in complete agreement

22 Actual Privacy Classifications How much agreement is there between participants within each category? 30 categories had 2+ participants with 10+ page visits Determined primary privacy level for each participant for each category Only 4/30 categories had complete agreement between participants News/media, political activism, pornography, web hosting

23 Feasibility: Standardized Approach Is a standardized approach to automated privacy classification based on content category feasible? No Clustering showed basic agreement for some categories (C2: Public, C3: Semi-Public, C5: Private), but C2: Public/Dont Save and C4: Mixture accounted for 53.3% of visited pages Low consistency between participants in primary privacy level applied Theoretical web category classification task showed little agreement for appropriate classifications

24 Evaluate Personalized Approach Examine participant consistency at applying a single privacy level to page visits within a category Examine ability of participants to predict which privacy level they will apply

25 Consistency Within a Category How consistent were participants in assigning privacy levels to pages within a category (regardless of their primary privacy level)? For each participant with 10+ page visits in a category we computed a normalized consistency: Norm. consistency = # pages at primary privacy level total page visits in category Category consistency is average of participant consistency

26 Consistency Within a Category Average 81% consistency Most Consistent Categories%Least Consistent Categories% Real Estate100Search engines/portals61 Restaurants/dining/food99Education65 Intimate apparel/swimsuits97Computers/internet66 News/media96Web advertisements71 Political/activism/advocacy95Reference76 Brokerage/trading95Web communication76 Society/lifestyle93Streaming media/mp376 Health92News group78 Internet Auction92Religion78 Sports/recreation/Hobbies91Humour/Jokes79

27 Prediction Accuracy How well did participants predict what privacy levels they would apply to a category of web browsing? Compared participants theoretical content classification with privacy levels they applied to their web browsing For each category, we computed participants accuracy: Accuracy = # pages at predicted privacy level total page visits in category

28 Prediction Accuracy Average 58% accuracy Most Accurate Categories%Least Accurate Categories% Real Estate99Brokerage/trading0 Intimate apparel/swimsuits95Society/lifestyle10 News/media95Health16 Internet auction95Dating/personals18 Restaurants/dining/food88Web hosting29 Job search/career86Web communication32 Pornography86Shopping38 Government/legal78Sports/recreation/hobbies39 77Religion44 Financial Services75Travel45

29 Feasibility: Personalized Approach Is a personal privacy management system using automated privacy classification based on content category feasible? Maybe Participants were consistent within many categories 12/34 had greater than 90% consistency BUT 13/34 had less than 80% consistency Prediction accuracy varied greatly both across participants and for different content categories

30 Reasons for Inconsistencies Dual nature of Dont Save Semi-public (it depends) Uncertainty about appropriate classification may be due to potential viewers and also page content Viewing context may be partially resolved when considering actual page content

31 Reasons for Inconsistencies Category characteristics General categories Specific pages can have very different content Varying task purposes Information or transaction? Login, https Complex/dynamic pages Privacy sensitivity may vary depending on content at a given time

32 Recommendations to Improve Accuracy Refine content categorization through heuristics Keywords Login / secure site Query string More effectively communicate category characteristics to users Include examples of the types of content and activities that may be visible

33 Summary A standardized approach is not feasible Inconsistencies between participants Personalized scheme may be feasible participants were fairly consistent within most categories BUT More fine-grained approach to content classification is required Users would need richer descriptions of categories

Thanks to: - NSERC - NECTAR - Dalhousie University - EDGE Lab Kirstie Hawkey