Dissertation Research: Managing Visual Privacy in Web Browsers Dr. Kirstie Hawkey Dalhousie University.

Slides:



Advertisements
Similar presentations
Taxonomy & Ontology Impact on Search Infrastructure John R. McGrath Sr. Director, Fast Search & Transfer.
Advertisements

Examining the Content and Privacy of Web Browsing Incidental Information Kirstie Hawkey Kori Inkpen.
Chapter 11 Designing the User Interface
Activity Design Goal: work from problems and opportunities of problem domain to envision new activities.
Design Guidelines for Effective WWW History Mechanisms Linda Tauscher and Saul Greenberg University of Calgary This talk accompanied a paper, and was presented.
Information Retrieval Concerned with the: Representation of Storage of Organization of, and Access to Information items.
Staff Compensation Program Update
Tutorial 4 Creating Special Effects with CSS
Introduction to Qualitative Research
University of Kansas Department of Electrical Engineering and Computer Science Dr. Susan Gauch April 2005 I T T C Dr. Susan Gauch Personalized Search Based.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
LS403 Evaluation of Information Services Problem Statements.
Everyday inclusive Web design: an activity perspective CS575 MADHAVI L NIDAMARTHY.
1 Web Testing CIS 376 Bruce R. Maxim UM-Dearborn.
1 User Interface Design CIS 375 Bruce R. Maxim UM-Dearborn.
Qualitative Research: Data Analysis and Interpretation
Chapter 13: Designing the User Interface
ITIL Problem Management Tool Guide Gerald M. Guglielmo ITIL Problem Manager CD-doc
IAEA International Atomic Energy Agency The IAEA Safety Culture Assessment Methodology.
Towards Appraising Online Stores SEPI Research Group, Department of Computer Science and AI University of Malta 1 CSAW 2004 Towards Appraising Online Stores.
Use of OCAN in Crisis Intervention Webinar October, 2014.
Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.
Dr. Engr. Sami ur Rahman Assistant Professor Department of Computer Science University of Malakand Research Methods in Computer Science Lecture: Research.
Team 2 Andrew Boyd Kaven Williams.  Privacy, Security and Compliance Issues  Current State of Research  Implications  Areas of Research Opportunity.
Challenges in Information Retrieval and Language Modeling Michael Shepherd Dalhousie University Halifax, NS Canada.
Margaret J. Cox King’s College London
Tutorial 4 Creating Special Effects with CSS. XP Objectives Work with CSS selectors Create styles for lists Create and apply class styles Create a rollover.
Thesis Report Chapter 1 (Introduction)
Evaluation Framework Prevention vs. Intervention CHONG POH WAN 21 JUNE 2011.
Semester 2: Lecture 9 Analyzing Qualitative Data: Evaluation Research Prepared by: Dr. Lloyd Waller ©
Part 1-Intro; Part 2- Req; Part 3- Design  Chapter 20 Why evaluate the usability of user interface designs?  Chapter 21 Deciding on what you need to.
Chapter 11: Qualitative and Mixed-Method Research Design
Evaluating a Research Report
WELNS 670: Wellness Research Design Chapter 5: Planning Your Research Design.
©2010 John Wiley and Sons Chapter 6 Research Methods in Human-Computer Interaction Chapter 6- Diaries.
Markup and Validation Agents in Vijjana – A Pragmatic model for Self- Organizing, Collaborative, Domain- Centric Knowledge Networks S. Devalapalli, R.
An Investigation of Facebook Grouping Robin Brewer Yael Mayer Lorrie Cranor Patrick Kelley facebook Home Profile Account Search.
Notes on Research Design You have decided –What the problem is –What the study goals are –Why it is important for you to do the study Now you will construct.
The Disability Measurement Matrix Barbara M. Altman Jennifer Madans Elizabeth Rasch Angela Me Margaret Mbogoni Elena Palma.
Yarmouk University Department of Computer Information Systems CIS 499 Yarmouk University Department of Computer Information Systems CIS 499 Yarmouk University.
Dynamic Learning Maps Update Linda Howley, Bureau of Assessment and Accountability Joanne Winkelman, Office of Special Education.
A Context Model based on Ontological Languages: a Proposal for Information Visualization School of Informatics Castilla-La Mancha University Ramón Hervás.
Understanding Use: Predicting Action on a message Laura A. Dabbish Jianwei Wang CSCI6800 Spring 2005.
Writing Software Documentation A Task-Oriented Approach Thomas T. Barker Chapter 5: Analyzing Your Users Summary Cornelius Farrell Emily Werschay February.
Personalization with user’s local data Personalizing Search via Automated Analysis of Interests and Activities 1 Sungjick Lee Department of Electrical.
Requirement engineering Good Practices for Requirements Engineering
Name: Norah Aljomae Supervisor: Neville Williams.
MODES-650 Advanced System Simulation Presented by Olgun Karademirci VERIFICATION AND VALIDATION OF SIMULATION MODELS.
Second Language Classroom Research (Nunan, D. 1990) Assoc. Prof. Dr. Sehnaz Sahinkarakas.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. The Scientific Method The approach used by social scientists.
Designing Attention-Centric Notification Systems Five HCI Challenges Scott McCrickard Center for Human-Computer Interaction & Department of Computer Science.
© 2010 Health Information Management: Concepts, Principles, and Practice Chapter 5: Data and Information Management.
Module 3: Research in Psychology Learning Objectives What is the scientific method? How do psychologist use theory and research to answer questions of.
E VALUATING YOUR E - LEARNING COURSE LTU Workshop 11 March 2008.
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
Today’s Goals Learn a new strategy for interpreting visual rhetoric Review and reflect on most important concepts from class thus far Plan material and.
Case Studies and Review Week 4 NJ Kang. 5) Studying Cases Case study is a strategy for doing research which involves an empirical investigation of a particular.
Abstract Research with youth faces particular challenges, including potential confusion about researchers’ intentions and vulnerabilities related to power.
A. Strategies The general approach taken into an enquiry.
Program Design Chapter 5 6 th Edition Raymond A. Noe Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Computing Honours Project (COMP10034) Lecture 4 Primary Research.
Planning an Applied Research Project
Managing the Privacy of Incidental Information During Collaboration
Developing the Overall Audit Plan and Audit Program
Connecting Interface Metaphors to Support Creation of Path-based Collections Unmil P. Karadkar, Andruid Kerne, Richard Furuta, Luis Francisco-Revilla,
Decision Support Systems Course
Evaluating and Interpreting Oral History
How does a Requirements Package Vary from Project to Project?
Parts of a User Scenario
Qualitative Research Kirsti Malterud, Qualitative research: Standards, Challenges, and Guidelines.
Presentation transcript:

Dissertation Research: Managing Visual Privacy in Web Browsers Dr. Kirstie Hawkey Dalhousie University

2 Incidental Information Privacy (IIP) Incidental Information Many traces of past activities are visible with casual inspection. Casual Collaboration Colleagues often jointly view information on a personal computer. Display Privacy Normative privacy for personal displays does not apply. Privacy is Contextual Purpose and setting of activity vary. What is appropriate in one setting may not be in another. Secondary Concern Privacy management occurs within the context of some primary task.

3 Personal Information Management (PIM) Activities performed to acquire, organize, maintain, retrieve, and use information items such as documents, web pages, and . PIM research goal: –Have the right information in the right place, in the right form, and of sufficient completeness and quality to meet the current need. My goal: –Make sure that information is also appropriate for the current viewing context

4 Web Browsers

5 Managing Visual Privacy in Web Browsers Exploratory research –Data collection methodologies Understanding Visual Privacy Concerns –Conceptual model of dispositional and situational factors Investigation of privacy management approaches –Feasibility of 2 automated approaches –Design and evaluation of a privacy enhanced browser, PrivateBits

6 Initial Research Questions Incidental Information Privacy in Web Browsers What is the scope of the IIP problem? How do people currently manage IIP? What factors impact privacy comfort levels in a given situation? Web Browsing Behaviours What web browsing behaviours might impact the feasibility of privacy management approaches?

7 Exploratory Research: Mixed Methodology Approach Survey represents self-reported concerns, large number of people –Incidental Information Privacy (IIP) survey June 2004-March 2005, 155 participants Field studies provide actual behaviours, rich detail, few people –Privacy Gradients 1 (PG1) field study August 2004, 20 participants –Privacy Gradients 2 (PG2) field study March 2005, 15 participants

8 IIP Survey: Goals 1.What is the scope of the problem?  Frequency  Current privacy management strategies 2.What web browsing activities occur?  Location  Device 3.How does context affect level of comfort?  Sensitivity of content  3 scenarios (positive, neutral, embarrassing)  Reflect on usual browsing  Relationship to viewer  5 types (spouse, close friend, parent, colleague, supervisor)  Level of control  3 levels (you, other, away)

9 PG1 Field Study: Goals Examine participants’ perception of the privacy of their actual web browsing activity

10

11 PG2 Field Study: Goals How does context (location, content) affect participant’s privacy classifications? Do the findings from the first field study extend to a broader participant base? –PG1: laptop users/primarily technical –PG2: varied technical experience/computer use 5 technical desktop 5 non-technical desktop 5 non-technical laptop users

12 Exploratory Study Results Incidental information privacy is a concern for many –Regular occasions of others viewing displays All 155 IIP Survey participants had at least one potential viewer –Regular occasions of others using their computers 145/155 IIP Survey participants had at least one potential user –Most concerned enough to take some actions to maintain privacy 64.3% Survey, 95% PG1, 91.7% PG2

13 Overall Effect of Viewing Context Privacy comfort is affected by level of control retained, viewer, and sensitivity of content 1=extremely uncomfortable, 4=neutral, 7=extremely comfortable

14 Participants’ privacy comfort varied within each viewing context Average privacy comfort levels when reflecting on usual browsing Level of control Viewer type

15 Inherent Privacy Concerns

16 Inherent Privacy Concerns Pragmatists

17 Model of Visual Privacy within Web Browsers Situational factors Dispositional factors Browsing Activities Privacy Concerns

18 Design Guidelines Afford selective deletion/storage of traces. Provide nuanced privacy levels. Support multi-tasking – concurrent windows containing content of differing sensitivities. Accommodate varying privacy concerns through personalization/flexibility in usage. Reduce classification burden of traces with (semi-) automated support.

19 Web Browsing Characteristics Limit Design Space Magnitude of information complicates management approach –~275 page visits per day –Frequent bursts of activity

20 Evaluated Two Automated Privacy Management Approaches Theoretically examined the feasibility of using content categorization to assign a privacy level to visited pages –Results presented at WWW 2006 –Standardized approach not feasible –Need to improve results before a personalized approach would work Explored a predictive model of privacy comfort level in a given situation –Initial results promising –Need to validate with more data

21 Patterns in Privacy Application Suggest a Semi-Automated Approach

22 Explicit Approach: PrivateBits

23 Privacy controls

24 PrivateBits Evaluation Approach effective at meeting range of privacy concerns and browsing strategies Participants’ privacy comfort levels increased (8/10 > 1+ points) for viewing scenarios 9/10 would like to use it if developed BUT Additional security features required Default settings should be configurable Concealment of the system itself