Vortragende(r): Jun.-Prof. Dr.-Ing. Delphine Reinhardt
Access control is a key principle to protect user privacy online. The combination of both the wealth of user-generated data in online social networks and overly complex user interfaces lead to a high user burden for privacy control, hence making the observance of the above principles difficult. We investigate how communication metadata on smartphones can facilitate providing tailored suggestions for restricted audience groups, thus limiting the sharing of data to the intended users only. To this end, we have performed a user study collecting a dataset including contact names, calls, SMS, MMS, and e-mail on personal smartphones in everyday use. We further perform an explorative questionnaire-based study with 42 participants. Our results confirm that users are overtaxed with existing schemes. We identify the expectations and preferences of users, thus facilitating the design of improved solutions.
Delphine Reinhardt (née Christin) is assistant professor for Privacy and Security in Ubiquitous Computing at the University of Bonn, Germany. She is also associated to the Fraunhofer Institute for Communication, Information Processing and Ergonomics (FKIE) since 2014. She completed her doctoral degree in computer science with distinction on privacy in participatory sensing in 2013 at Technische Universität Darmstadt, Germany. Her doctoral thesis received awards by the Communication and Distributed Systems Group (KuVS) of the German Informatics Society (GI) and Information Technology Society of the Association for Electrical, Electronic & Information Technologies (VDE-ITG) as well as the “Vereinigung von Freunden der Technische Universität zu Darmstadt e.V.” for outstanding academic achievements. Since 2009, she holds a double-degree in electrical engineering from TU Darmstadt and Ecole Nationale Supérieure de l’Electronique et ses Applications (ENSEA), France. Her research interests include privacy, anonymity and pseudonymity, trust and reputation, and usability in ubiquitous computing and beyond.