“…-encryption [Diffie and Hellman 1979]; -access control via preferences, policies, and roles [Edwards 1996;Wickramasuriya, Datt et al 2004]; -mechanisms to reduce the burden of preference specification such as lightweight interfaces [Lau, Etzioni et al 1999], or grouping and templates [Olson, Grudin et al 2005;Patil and Lai 2005]; -automatic or manual control of the granularity of disclosed information [Dourish and Bly 1992;Lee, Girgensohn et al 1997;Palen 1999;Consolvo, Smith et al 2005]; -feedback via visualization [Gross, Wirsam et al 2003], sound [Gaver, Moran et al 1992], intelligent agents , and contextual disclosure [Kobsa and Teltzrow 2005]; -distortion of disclosed information [Boyle, Edwards et al 2000]; -support for anonymity (or pseudonymity) [Appelt 1999]; -inference of appropriate awareness disclosure based on modeling [Begole, Tang et al 2002]. Describing these techniques is beyond the scope of this chapter.…”