Fourth UbiComp Workshop on Privacy @ UbiComp2005: Privacy in Context
September 11, 2005 - Tokyo, Japan
Url: http://www.sims.berkeley.edu/~jensg/Ubicomp2005/

The main goals of this workshop are to discuss social, technical, and 
legal solutions to reducing, managing, or redefining privacy risks under 
the various constraints shaped by the context of a certain application, a 
specific set of users, or a particular culture. Instead of seeing privacy 
as an isolated abstract concept we are interested in reviewing and 
discussing privacy as an integral part of individual contexts of 
technology use, which greatly influences both concepts and systems design. 
We invite submissions reflecting diverse perspectives on privacy, whether 
based on notions of individual rights, legal contracts, economic 
incentives, social obligation, or interpersonal intimacy.

Topics:

A - Social and legal issues in ubicomp privacy
- How do various technology stakeholders (designers, managers, 
employees, consumers, regulators, activists, citizens, etc.) conceive of 
privacy and its relevance to ubicomp technologies? How do conceptions 
change over time, as they use and become more familiar with systems?
- What incentives work best for ubicomp systems? How can weaker 
parties (e.g., individuals) respond to organizations's desire for 
information? How should this shape design?
- How can we conceptualize, design, and provide 
context-dependent privacy that dynamically changes according to a specific 
situation or user need? Can we gather key insights from users~R day-to-day 
practices to assist in the design of large-scale ubiquitous computing 
systems?
- How is privacy enacted and conceived differently in different 
cultures and communities, e.g., in different countries, across 
professional groups, within families, between genders?
- How do affordances of different application domains shape the 
level of privacy users expect, or the level of privacy that can be 
provided?
- What trade-offs are necessary to balance privacy vs. 
efficiency, convenience, and security? Under what circumstances is privacy 
to be limited or expanded?

B - Methods for investigating and building ubicomp privacy
- What are the best methods for evaluating, measuring, and 
understanding privacy concerns? What kinds of qualitative and quantitative 
approaches work well?
- What can be learned from past cases? What ubicomp-relevant 
systems have succeeded or failed because (or despite) of their treatment 
of personal information and privacy risks? What systems have successfully 
transitioned (or unexpectedly failed to transition) from one context or 
culture to another?
- Which research methods have been applied to the empirical and 
social study of ubiquitous computing systems and privacy? Can we identify 
best practices for laboratory and field experiments as well as potential 
longitudinal studies?
- What kinds of design methods are most effective for 
understanding the privacy concerns of a given community, especially while 
early in the design process?
- What kinds of tools are useful for prototyping and 
implementing privacy-sensitive systems?
- What progress is needed in core technologies such as 
cryptography, trusted systems, AI inference and user modeling to implement 
better privacy-sensitive systems?


Workshop Format and Submission Instructions

This workshop will last for 1 full day and will be limited to 20
participants (not including the workshop organizers) to enable lively
and productive discussions. Participants will be invited on the basis
of position papers. Papers should be no more than 4 pages (letter or
A4 size) excluding references, and will be selected based on their
originality, credibility, and topical relevance. The workshop will be
organized into panels and breakout sessions. Depending on the
submitted position papers, the workshop will consist of 3 to 4
panels. Each panel lasts about an hour, and includes brief
presentations of 5 or 6 position papers that share a similar topic,
followed by organizer-moderated discussions. Also in the afternoon,
there will be breakout sessions lasting about 1.5 to 2 hours, followed
by reports to a plenary session. In addition, coffee breaks and lunch
will serve as opportunities for informal discussion. To the extent
possible, participants will have lunch together within short walking
distance of the workshop location. Papers should be submitted to in
PDF or MS Word format on or before June 17, 2005 to
privacyworkshop@guir.berkeley.edu. Notification of acceptance will be
sent out by July 25, 2005. Accepted papers will be made accessible on
the workshop website.

Important Dates

Submission Deadline (workshop position papers): June 17, 2005
Acceptance Notification (workshop position papers): July 25, 2005

Goals and Background

The goals of this workshop are twofold:

   1. To collect examples of how context shapes the needs and the
      design of privacy enhancing systems.
   2. To define aspects that guide and constrain the development of
      privacy-sensitive ubicomp systems in real-world situations.

Privacy is an enormously complex topic, and ubiquitous computing opens
up new problems that span much of its scope. Ubicomp applications will
be deployed in a multitude of environments, encompassing a large
number of very different situations and devices, and involving a large
variety of players: within professional groups; between friends; in
families; between strangers, companies, or between customers and
service providers. Identifying the common denominators and
discriminating factors requires at least the understanding of
principles from (i) computer science, (ii) social psychology and
sociology, (iii) law, and (iv) economics. Only by bringing together
experts in these areas in a forum like this can we identify the
contextual dependencies and research needs for the healthy growth of
the field.

This workshop builds on three previous workshops at UbiComp run by
some of the current organizers: The first workshop was titled
"Socially-Informed Design of Privacy-Enhancing Solutions in Ubiquitous
Computing" at UbiComp 2002 in Gothenburg, the second was "UbiComp
communities: Privacy as boundary negotiation" at UbiComp 2003 in
Seattle, and the last was "UbiComp Privacy: Current Status and Future
Directions" at UbiComp 2004 in Nottingham.

We also welcome cross-pollination from participants in past UbiComp
workshops on related topics such as intimacy, commerce, healthcare,
security, face-to-face interaction, and urban spaces.

For more information see: http://www.sims.berkel