Scott Lederer

Scott Lederer
University of California, Berkeley | UCB · Computer Science Division

About

16
Publications
2,486
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,889
Citations
Citations since 2016
0 Research Items
477 Citations
2016201720182019202020212022020406080
2016201720182019202020212022020406080
2016201720182019202020212022020406080
2016201720182019202020212022020406080

Publications

Publications (16)
Article
Radar is a new picture-sharing service designed for cameraphones. In this paper we present key observations from ongoing qualitative research on the social practices we see emerging among our early users. We discuss how Radar's unique sharing model and overall design combine to shape a new form of visual conversation anchored in pictures. In partic...
Article
Full-text available
To participate in meaningful privacy practice in the context of technical systems, people require opportunities to understand the extent of the systems' alignment with relevant practice and to conduct discernible social action through intuitive or sensible engagement with the system. It is a significant challenge to design for such understanding an...
Conference Paper
Full-text available
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on designing for privacy, there are few practical methods for helping designers create applications that provide end-users with a reasonable level of privacy protection that...
Conference Paper
We present All Together Now (ATN), a tool for visualizing localized activities involving both local and remote actors. ATN presents each user with a webpage containing a common view of a shared virtual space modeled after the physical locus of the activity. Actors signal socially meaningful behavior by manipulating the spatial positions of their re...
Article
Full-text available
When designing for or discussing privacy, it is critical to identify the conditions that create a system's or phenomenon's privacy implications. We present a set of interdependent dimensions that, when applied to the analysis of a privacy-related system or phenomenon, can expose the factors that determine the role of privacy therein. This can help...
Article
People create and maintain personal privacy by situation and influencing them through intuitive social action. It is a challenge for designers of interactive systems to empower these human-level processes of understanding and action through the limited technical mechanisms of feedback and control. To help meet this challenge, we present five pitfal...
Article
Full-text available
Ubiquitous computing stands to redefine established notions of pr ivacy as it introduces regular, pervasive sensing of personal information such as identity, location, and activity. To effectively and comfortably manage the di sclosure of personal information, end-users will require a coherent conceptual model of privacy and convenient user interfa...
Article
Full-text available
We present a technique for evaluating the usability and e#ectiveness of ambient displays. Ambient displays are abstract and aesthetic peripheral displays portraying non-critical information on the periphery of a user's attention. Although many innovative displays have been published, little existing work has focused on their evaluation, in part bec...
Article
Full-text available
We present a unified model of everyday privacy in ubiquitous computing environments, designed to aid system designers and administrators in conceptualizing the end-user privacy experience. The model accounts for the influence of societal-scale forces, contextual factors, and subjective perception on end-user privacy. We identify notice and consent...
Conference Paper
Full-text available
We conducted a questionnaire-based study of the relative importance of two factors, inquirer and situation, in determining the preferred accuracy of personal information disclosed through a ubiquitous computing system. We found that privacy preferences varied by inquirer more than by situation. That is, individuals were more likely to apply the sam...
Article
The remarkable success of the personal computing era is largely attributable to the WIMP desktop interaction framework. We identify a set of core design techniques embodied by the WIMP desktop, specifically aggregators, objects, commands, and selectors, and discuss their applicability to the design space of ubiquitous computing user interfaces. We...
Article
Full-text available
We present a conceptual model of everyday privacy in ubiquitous computing environments, based on the works of Lessig and Adams. By everyday privacy, we mean the end-user's ongoing exposure to and control over personal information collection. The model accounts for the influence of societal-scale forces, contextual factors, and subjective perception...
Article
Full-text available
The goal of everyday privacy is to make it easy for end- users to share information with the right people at the right level of detail in ubiquitous computing environments. In this paper, we describe a conceptual model we have developed for everyday privacy, consisting of control over and feedback about disclosure. We also describe a prototype we h...

Network

Cited By