Number of co-authors:14
Number of publications with 3 favourite co-authors:Jeffrey J. Fielding:Tristan Henderson:Sameer Patil:
Apu Kapadia's 3 most productive colleagues in number of publications:David Kotz:16Sameer Patil:7Tristan Henderson:5
go to course
User-Centred Design - Module 1
92% booked. Starts in 3 days
go to course
Quality Web Communication: The Beginner's Guide
91% booked. Starts in 4 days
Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess
User Experience and Experience Design !
Our Latest Books
The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
Publications by Apu Kapadia (bibliography)
Patil, Sameer and Kapadia, Apu (2012): Are you exposed?: conveying information exposure. In: Companion Proceedings of ACM CSCW12 Conference on Computer-Supported Cooperative Work 2012. pp. 191-194. Available online
We explore the design space of interfaces for conveying and managing 'exposure' -- the actual access to information by parties authorized to access it. Our goal is to convey the resulting disclosure in a quickly interpretable form and to enable lightweight interactions to manage exposure, if needed. Toward this end, we propose mapping levels of exposure to levels of concepts familiar in everyday practice, e.g., the appearance and physiology of an avatar. We hope that our ideas will spur further expansion and exploration of the design space around these issues.
© All rights reserved Patil and Kapadia and/or ACM Press
Patil, Sameer, Norcie, Greg, Kapadia, Apu and Lee, Adam J. (2012): Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice. In: Proceedings of the 2012 Symposium on Usable Privacy and Security 2012. p. 5. Available online
Rapid growth in the usage of location-aware mobile phones has enabled mainstream adoption of location-sharing services (LSS). Integration with social-networking services (SNS) has further accelerated this trend. To uncover how these developments have shaped the evolution of LSS usage, we conducted an online study (N = 362) aimed at understanding the preferences and practices of LSS users in the US. We found that the main motivations for location sharing were to connect and coordinate with one's social and professional circles, to project an interesting image of oneself, and to receive rewards offered for 'checking in.' Respondents overwhelmingly preferred sharing location only upon explicit action. More than a quarter of the respondents recalled at least one instance of regret over revealing their location. Our findings suggest that privacy considerations in LSS are affected due to integration within SNS platforms and by transformation of location sharing into an interactive practice that is no longer limited only to finding people based on their whereabouts. We offer design suggestions, such as delayed disclosure and conflict detection, to enhance privacy-management capabilities of LSS.
© All rights reserved Patil et al. and/or their publisher
Schlegel, Roman, Kapadia, Apu and Lee, Adam J. (2011): Eyeing your exposure: quantifying and controlling information sharing for improved privacy. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 14. Available online
A large body of research has focused on disclosure policies for controlling information release in social sharing (e.g., location-based) applications. However, less work has considered how exposed these policies actually leave users; i.e., to what extent are disclosures in compliance with these policies actually being made? For instance, consider a disclosure policy granting Alice's coworkers access to her location during work hours. Alice might feel that this policy appropriately controls her exposure, but may feel differently if she learned that her boss was accessing her location every 5 minutes. In addition to specifying who has access to personal information, users need a way to quantify, interpret, and control the extent to which this data is shared. We propose and evaluate an intuitive mechanism for summarizing and controlling a user's exposure on smartphone-based platforms. Our approach uses the visual metaphor of eyes appearing and growing in size on the home screen; the rate at which these eyes grow depends on the number of accesses granted for a user's location, and the type of person (e.g., family vs. friend) making these accesses. This approach gives users an accurate and ambient sense of their exposure and helps them take actions to limit their exposure, all without explicitly identifying the social contacts making requests. Through two systematic user studies (N = 43,41) we show that our interface is indeed effective at summarizing complex exposure information and provides comparable information to a more cumbersome interface presenting more detailed information.
© All rights reserved Schlegel et al. and/or ACM Press
Kapadia, Apu, Triandopoulos, Nikos, Cornelius, Cory, Peebles, Daniel and Kotz, David (2008): AnonySense: Opportunistic and Privacy-Preserving Context Collection. In: Indulska, Jadwiga, Patterson, Donald J., Rodden, Tom and Ott, Max (eds.) Pervasive 2008 - Pervasive Computing, 6th International Conference May 19-22, 2008, Sydney, Australia. pp. 280-297. Available online
Bailey, Katelin, Vongsathorn, Linden, Kapadia, Apu, Masone, Chris and Smith, Sean W. (2007): TwoKind authentication: usable authenticators for untrustworthy environments. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 169-170. Available online
The ease with which a malicious third party can obtain a user's password when he or she logs into Internet sites (such as bank or email accounts) from an insecure computer creates a substantial security risk to private information and transactions. For example, a malicious administrator at a cybercafe, or a malicious user with sufficient access to install key loggers at a kiosk, can obtain users' passwords easily. Even when users do not trust the machines they are using, many of them are faced with the prospect of accessing their accounts with a single level of privilege. To address this problem, we propose a system based on two modes of authentication -- default and restricted. Users can signal to the server whether they are in an untrusted environment so that the server can log them in under restricted privileges that allow them to perform basic actions that cause no serious damage if the session or their password is compromised.
© All rights reserved Bailey et al. and/or ACM Press
Kapadia, Apu, Henderson, Tristan, Fielding, Jeffrey J. and Kotz, David (2007): Virtual Walls: Protecting Digital Privacy in Pervasive Environments. In: LaMarca, Anthony, Langheinrich, Marc and Truong, Khai N. (eds.) PERVASIVE 2007 - Pervasive Computing 5th International Conference May 13-16, 2007, Toronto, Canada. pp. 162-179. Available online
Join our community and advance:
Page maintainer: The Editorial Team