Nathaniel Good

Nathaniel Good
University of California, Berkeley | UCB

About

48
Publications
28,448
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,979
Citations
Introduction

Publications

Publications (48)
Article
At UC Berkeley, we are informing political debates surrounding online privacy through empirical study of website behaviors. In 2009 and 2011, we surveyed top websites to determine how they were tracking consumers. We found that advertisers were using persistent tracking technologies that were relatively unknown to consumers. Two years later, we fou...
Article
Regulators here and abroad have embraced “privacy by design” as a critical element of their ongoing revision of current privacy laws. The underlying idea is to “build in” privacy (in the form of Fair Information Practices or FIPs) when creating software products and services. But FIPs are not self-executing. Rather, privacy by design requires the t...
Article
Full-text available
To predict the uses of new technology, we present an approach grounded in science and technology studies (STS) that examines the social uses of current technology. As part of ongoing research on next-generation mobile imaging applications, we conducted an empirical study of the social uses of personal photography. We identify three: memory, creatin...
Article
In August 2009, we demonstrated that popular websites were using “Flash cookies” to track users. Some advertisers had adopted this technology because it allowed persistent tracking even where users had taken steps to avoid web profiling. We also demonstrated “respawning” on top sites with Flash technology. This allowed sites to reinstantiate HTTP c...
Conference Paper
Full-text available
In this paper we investigate effects of the content of interruptions and of the time of interruption delivery on mobile phones. We review related work and report on a naturalistic quasi-experiment using experience-sampling that showed that the receptivity to an interruption is influenced by its content rather than by its time of delivery in the emp...
Conference Paper
Full-text available
Existing technologies for file sharing differ widely in the granu- larity of control they give users over who can access their data; achieving finer-grained control generally requires more user effort. We want to understand what level of control users need over their data, by examining what sorts of access policies users actually cre- ate in practi...
Conference Paper
Full-text available
People's work days are filled with exceptions to normal routine. These exceptions affect the security and privacy of their information access and sharing. In a recent ethnographic study of ten users in the Bay Area, we identify a number of key problems not well addressed by current data sharing technologies, and from them derive requirements for Ad...
Conference Paper
Full-text available
We evaluate the usability of End User License Agreements (EULAs) of popular consumer programs. Results from an empirical evaluation of 50 popular programs show the lack of accessibility and readability of notices. Our data from a recent study with 64 users involved in installation tasks confirms the public perception that notice to and consent by...
Conference Paper
Full-text available
ABSTRACT We address the problem of extracting semantics of tags ‐ short, unstructured text-labels assigned to resources on the Web ‐ based on each tag’s metadata,patterns. In particular, we describe an approach for extracting place and event semantics for tags that are assigned to photos on Flickr, a popular photo sharing website supporting time an...
Conference Paper
Full-text available
We describe an approach for extracting semantics of tags, unstructured text-labels assigned to resources on the Web, based on each tag's usage patterns. In particular, we fo- cus on the problem of extracting place and event seman- tics for tags that are assigned to photos on Flickr, a popu- lar photo sharing website that supports time and location...
Conference Paper
Full-text available
As sharing personal media online becomes easier and widely spread, new privacy concerns emerge - especially when the persistent nature of the media and associated context reveals details about the physical and social context in which the media items were created. In a first-of-its-kind study, we use context-aware camerephone devices to examine priv...
Conference Paper
Full-text available
Spyware is an increasing problem. Interestingly, many programs carrying spyware honestly disclose the activities of the software, but users install the software anyway. We report on a study of software installation to assess the effectiveness of different notices for helping people make better decisions on which software to install. Our study of 22...
Conference Paper
Full-text available
In contextual computing, where cues beyond direct user input are used to trigger computation, one of the most daunting challenges is inferring what the user is doing. For the domain of task management, we have developed a new approach to reducing the problem of ambiguity of user action for intelligent systems. We introduce a construct we call an Ac...
Article
Full-text available
The large majority of consumers believe that the term “privacy policy” describes a baseline level of information practices that protect their privacy. In short, “privacy,” like “free” before it, has taken on a normative meaning in the marketplace. When consumers see the term “privacy policy,” they believe that their personal information will be pro...
Article
Full-text available
Large majorities of consumers believe that the term "privacy policy" conveys a baseline level of information practices that protect their privacy. In short, "privacy," like "free" before it, has taken on normative meaning in the marketplace. When consumers see the term "privacy policy," they believe that their privacy will be protected in specific...
Article
Spyware is software which monitors user actions, gathers personal data, and/or displays advertisements to users. While some spyware is installed surreptitiously, a surprising amount is installed on users’ computers with their active participation. In some cases, users agree to accept spyware as part of a software bundle as a cost associated with ga...
Article
Full-text available
This paper describes a new approach to the automatic detection of human faces and places depicted in photographs taken on cameraphones. Cameraphones offer a unique opportunity to pursue new approaches to media analysis and management: namely to combine the analysis of automatically gathered contextual metadata with media content analysis to fundame...
Conference Paper
Full-text available
The goal of a recommender system is to suggest items of interest to a user based on historical behavior of a com- munity of users. Given detailed enough history, item-based collaborative filtering (CF) often performs as well or better than almost any other recommendation method. However, in cold-start situations—where a user, an item, or the entire...
Article
Full-text available
We studied privacy decisions made by users in a system that recorded contextual information (e.g. location, tags, and time) for photos taken with mobile phones. We looked at data from a 3-month long deployment, and conducted interviews with six of the users. We found that content is key when users make photo privacy decisions, and that for some use...
Conference Paper
Full-text available
As cameraphones become the dominant platform for consumer multimedia capture worldwide, multimedia researchers are faced both with the challenge of how to help users manage the billions of photographs they are collectively producing and the opportunity to leverage cameraphones' ability to automatically capture temporal, spatial, and social contextu...
Conference Paper
Full-text available
Spyware is a significant problem for most computer users. The term "spyware" loosely describes a new class of computer software. This type of software may track user activities online and offline, provide targeted advertising and/or engage in other types of activities that users describe as invasive or undesirable.While the magnitude of the spyware...
Conference Paper
Full-text available
In this paper, we focus on the use of context-aware, collaborative filtering, machine-learning techniques that leverage automatically sensed and inferred contextual metadata together with computer vision analysis of image content to make accurate predictions about the human subjects depicted in cameraphone photos. We apply Sparse-Factor Analysis (S...
Article
As the Internet increases our ability to access information, it also increases the severity of information overload -- the inability to find meaningful information among the slew of non-relevant information. Researchers have explored several methods for reducing information overload -- each with their strengths and their weaknesses. Information Fil...
Conference Paper
Full-text available
An abstract is not available.
Conference Paper
Full-text available
As human-computer interaction becomes more closely modeled on human-human interaction, new techniques and strategies for human-computer interaction are required. In response to the inevitable shortcomings of recognition technologies, researchers have studied mediation: interaction techniques by which users can resolve system ambiguity and error. In...
Conference Paper
Full-text available
This paper reports on the results of studies of task management to support the design of a task list manager. We examined the media used to record and organize to-dos and tracked how tasks are completed over time. Our work shows that, contrary to popular wisdom, people are not poor at prioritizing. Rather, they have well-honed strategies for tackli...
Conference Paper
Full-text available
The recent popularity of mobile camera phones allows for new opportunities to gather important metadata at the point of capture. This paper describes a method for generating metadata for photos using spatial, temporal, and social context. We describe a system we implemented for inferring location information for pictures taken with camera phones an...
Article
Full-text available
An important problem facing large, distributed organizations is the efficient management and distribution of information, knowledge, and expertise. In this paper we present the design and implementation of a low-cost, extensible, flexible, and dynamic peer-to-peer (P2P) knowledge network that helps address this problem. This system, known as Shock,...
Article
An important problem facing large, distributed organizations is the efficient management and distribution of information, knowledge, and expertise. In this paper we present the design and implementation of a low-cost, extensible, flexible, and dynamic peer-to-peer (P2P) knowledge network that helps address this problem. This system, known as Shock,...
Conference Paper
P2P file sharing systems such as Gnutella, Freenet, and KaZaA, while primarily intended for sharing multimedia files, frequently allow other types of information to be shared. This raises serious concerns about the extent to which users may unknowingly be sharing private or personal information.In this paper, we report on a cognitive walkthrough an...
Article
Full-text available
P2P file sharing systems are rapidly becoming one of the most popular applications on the internet, with millions of users online exchanging files daily. While primarily intended for sharing multimedia files, programs such as Gnutella, Freenet, and Kazaa frequently allow other types of files to be shared. Although this has no doubt contributed to P...
Article
Full-text available
Focus plus context screens are wall-size low-resolution displays with an embedded high-resolution display region. Focus plus context screens allow users to view details of a document up close, while simultaneously seeing peripheral parts of the document in lower resolution. Application areas range from geographic information systems to interactive...
Article
Full-text available
Computer users working with large visual documents, such as large layouts, blueprints, or maps perform tasks that require them to simultaneously access overview information while working on details. To avoid the need for zooming, users currently have to choose between using a sufficiently large screen or applying appropriate visualization technique...
Article
Full-text available
Users working with documents that are too large and detailed to fit on the user's screen (e.g. chip designs) have the choice between zooming or applying appropriate visualization techniques. In this paper, we present a comparison of three such techniques. The first, focus plus context screens, are wall-size low-resolution displays with an embedded...
Conference Paper
Full-text available
Users working with documents that are too large and detailed to fit the user's screen (e.g. chip designs) have the choice of zooming or applying appropriate visualization techniques. In this demonstration, we will present focus plus context screens-wall-size low-resolution displays with an embedded high-resolution display region. They allow users t...
Conference Paper
Users working with documents that are too large and detailed to fit on the user's screen (e.g. chip designs) have the choice between zooming or applying appropriate visualization techniques. In this paper, we present a comparison of three such techniques. The first, focus plus context screens, are wall-size low-resolution displays with an embedded...
Conference Paper
Users working with documents that are too large and detailed to fit the user's screen (e.g. chip designs) have the choice of zooming or applying appropriate visualization techniques. In this demonstration, we will present focus plus context screens-wall-size low-resolution displays with an embedded high-resolution display region. They allow users t...
Conference Paper
Computer users working with large visual documents, such as large layouts, blueprints, or maps perform tasks that require them to simultaneously access overview information while working on details. To avoid the need for zooming, users currently have to choose between using a sufficiently large screen or applying appropriate visualization technique...
Article
Full-text available
Information filtering agents and collaborative filtering both attempt to alleviate information overload by identifying which items a user will find worthwhile. Information filtering (IF) focuses on the analysis of item content and the development of a personal user interest profile. Collaborative filtering (CF) focuses on identification of other us...
Article
Full-text available
The recent popularity of mobile camera phones allows for new opportunities to gather important metadata at the point of capture. This paper describes and demonstrates a method for generating metadata for images using spatial, temporal, and social context. We describe a system we implemented for inferring location information for pictures taken with...
Article
Full-text available
With the growing interest in delivering content to mobile phones, there is a need to understand the contexts in which people are receptive to receiving content on the go. We studied receptivity to mobile content and found that location, activity, and other context factors predicted receptivity to a limited degree, and that the contexts in which peo...
Article
Full-text available
As the Internet increases our ability to access information, it also increases the severity of information overload – the inability to find meaningful information among the slew of non-relevant information. Researchers have explored several methods for reducing information overload – each with their strengths and their weaknesses. Information Filte...

Projects