Alt text


The advent of social apps, smartphones, and ubiquitous computing has brought about a transformation to our day-to-day lives, including unprecedented challenges to our perceptions, conceptions and valuations of privacy. To be sure these call for developments in law and regulation; alongside these, however, agile methods and technical mechanisms are a necessary accompaniment for keeping pace with this rapidly evolving cyber reality. Many of the information systems upon which we rely, and which are deeply embedded in the fabric of our daily life, do not incorporate mechanisms to ensure that personal data is handled in ways that are compatible evolving privacy norms and expectations.

To tackle the momentous privacy challenges of our era requires collaboration across multiple societal sectors, including regulators, courts, academics, and industry leaders. It requires willingness to work across disciplinary boundaries to benefit from wisdom, know-how, and research results from computer science, formal methods, engineering, social science, ethics, law, and policy.

Contextual integrity (CI) provides a privacy model that bridges scientific and technical approaches, on the one hand, with ethical, legal, and policy approaches, on the other. CI’s bedrock claim is that protecting privacy means protecting appropriate informational flows. It further stipulates that appropriate information flows are flows that comport with contextual informational norms (or rules), specified by the actors (senders, recipients and subjects), attributes (the type of information at hand) and transmission principles (type of constraints).


ZoteroCI Related Publications Google group Mailing list

News

2025: The 7th Annual PrivaCI Symposium, Brussels

The aim is to bring people together to present, discuss and share ideas based on ongoing and completed projects drawing on CI as their underlying conception of privacy. Read More ›

More news

Recent Publications

generated by bibbase.org
  2025 (4)
Trust and Friction: Negotiating How Information Flows Through Decentralized Social Media. Hwang, S.; Nanayakkara, P.; and Shvartzshnaider, Y. March 2025. arXiv:2503.02150
Trust and Friction: Negotiating How Information Flows Through Decentralized Social Media [link]Paper   doi   link   bibtex   abstract  
Comments on “Ethical Guidelines for Research Using Pervasive Data”. Sanfilippo, M. R.; Abrams, K. M; Bambanek, J.; Ocepek, M. G; Tither, E.; Wickett, K. M; and Zhou, K. Z. . 2025.
link   bibtex  
Playing with Privacy: Exploring the Social Construction of Privacy Norms Through a Card Game. Berkholz, J.; Rahman, A.; and Stevens, G. Proceedings of the ACM on Human-Computer Interaction, 9(GROUP): 1–23. January 2025.
Playing with Privacy: Exploring the Social Construction of Privacy Norms Through a Card Game [link]Paper   doi   link   bibtex   abstract   1 download  
Prevalence Overshadows Concerns? Understanding Chinese Users' Privacy Awareness and Expectations Towards LLM-based Healthcare Consultation. Liu, Z.; Hu, L.; Zhou, T.; Tang, Y.; and Cai, Z. In 2025 IEEE Symposium on Security and Privacy (SP), pages 92–92, Los Alamitos, CA, USA, May 2025. IEEE Computer Society
Prevalence Overshadows Concerns? Understanding Chinese Users' Privacy Awareness and Expectations Towards LLM-based Healthcare Consultation [link]Paper   doi   link   bibtex   abstract  
  2024 (1)
Critical Provocations for Synthetic Data. Susser, D.; and Seeman, J. Surveillance & Society, 22(4). December 2024.
Critical Provocations for Synthetic Data [link]Paper   doi   link   bibtex   abstract  
  undefined (1)
Who’s Listening? Analyzing Privacy Preferences in Multi-User Smart Personal Assistants Settings. Carreira, C.; Berger, C.; Shah, K.; Agarwal, S.; Thakur, Y.; McCall, M.; Christin, N.; and Cranor, L. F. . .
link   bibtex