Joshua Sunshine. Defining Ubiquitous Computing Unique Privacy Problems Examples Exercise 1: Privacy Solution Privacy Tradeoffs Professional Solutions.

Slides:



Advertisements
Similar presentations
Group-awareness for Mobile Cooperative Learning
Advertisements

Tool-Support for Interdisciplinary and Collaborative User Interface Specification IADIS 2008 Amsterdam – Workgroup HCI University of Konstanz – Thomas.
Introduction The increasing role of interactive public displays is important because they allow users to employ technology in place of such things as chalkboards.
Designing for Context: Usability in a Ubiquitous Environment Jenna Burrell, Paul Treadwell, Geri K. Gay Human Computer Interaction Group Cornell University.
Pennsylvania BANNER Users Group 2006 Disaster Recovery.
Tips for Training (module 6.2).
PhishZoo: Detecting Phishing Websites By Looking at Them
Protecting Location Privacy: Optimal Strategy against Localization Attacks Reza Shokri, George Theodorakopoulos, Carmela Troncoso, Jean-Pierre Hubaux,
An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong Group for User Interface Research Computer Science Division University of California.
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
TRUST Fall Meeting November , 2010 │Stanford, California A Privacy-Aware Architecture For Demand Response Systems Steve Wicker, Bob Thomas School.
E – Safety Awareness Parents Forum November 2012.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Different methods and Conclusions Liqin Zhang. Different methods Basic models Reputation models in peer-to-peer networks Reputation models in social networks.
CS 495 Application Development for Smart Devices Mobile Crowdsensing Current State and Future Challenges Mobile Crowdsensing. Overview of Crowdsensing.
Gefördert durch das Kompetenzzentrenprogramm DI Alfred Wertner 19. September 2014 Ubiquitous Personal Computing © Know-Center Security.
Context Aware Computing (part 2) CS 160 Discussion Section April 18, 2006 Ryan Aipperspach.
How is the IT-Driven Concept of “Permission Marketing” Changing the Way Companies Establish Customer Relationships Using “Old” Media as well as New? By.
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems Jason Hong Carnegie Mellon Jennifer Ng Carnegie Mellon Scott Lederer University.
Putting People in their Places An Anonymous and Privacy-Sensitive Approach to Collecting Sensed Data in Location-Based Applications Karen P. Tang Pedram.
Using Digital Credentials On The World-Wide Web M. Winslett.
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
Multilevel Security in Location Aware Applications Alexander Ng Monash University Masters of Computing (Research) Supervisor: A/P Arkady Zaslavsky.
Proactive Displays & The Experience UbiComp Project Joe McCarthy, Bill Schilit (& Anind Dey, Eric Paulos, Trevor Pering)
How to Write an Abstract Grad Tips by Saul Greenberg University of Calgary Image from:
Android Security Enforcement and Refinement. Android Applications --- Example Example of location-sensitive social networking application for mobile phones.
Introduction to Medical Informatics
FUNDRAISING Eat So They Can International Interns.
Personalized Medicine Research at the University of Rochester Henry Kautz Department of Computer Science.
Intro to MARKETING (Part 1 of 2) (626) websites. design. marketing 403 S. Mission Dr., San Gabriel, CA
HOST Data Walk 2014 Neighborhood Revitalization Conference Presentation Elsa Falkenburger.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style COPS Community Studies Presented by Sherley Codio Community-Oriented.
2003Lenko Grigorov, CISC 839 eyePROXY Lenko Grigorov, CISC 839 Supervisor: Roel Vertegaal Additional support by Skaburskis A and Changuk S.
Solutions to Security and Privacy Issues in Mobile Social Networking
Using Common Sense Reasoning to Create Intelligent Mobile Applications Software Agents Group MIT Media Lab.
Managing Privacy and Trust in P2P Communication v. 0.7 Privacy, Economy and Trust in P2P Content.
1 INTERVIEWING CLIENTS How to treat the people who may be your paycheck.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Introduction to: 1.  Goal[DEN83]:  Provide frequency, average, other statistics of persons  Challenge:  Preserving privacy[DEN83]  Interaction between.
Privacy-Aware Personalization for Mobile Advertising
+ A rapid ethnographic study of the iPad on a campus bus Jim Hahn
Do pictures always give truthful information? Can publishing it be hurtful??
Resident Communication. Made Easy. Social Media The benefits, costs, and risks involved. CFAA 2011 Copyright © Neighbourhood Buzz Communications
How Smart Homes Learn The Evolution of the Networked Home and Household Marshini Chetty, Ja-Young Sung, and Rebecca E. Grinter Ubicomp 2007 Presenter:Brian.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
An Investigation of Facebook Grouping Robin Brewer Yael Mayer Lorrie Cranor Patrick Kelley facebook Home Profile Account Search.
CS2003 Usability Engineering Usability Evaluation Dr Steve Love.
Survey on Privacy-Related Technologies Presented by Richard Lin Zhou.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Mobile and Location-Based Services Jason I. Hong Product Design and Usability April
GPS (Global Positioning System). Allows you to share your location in real time and locate your friends using smartphones and GPS.
Design Process … and some design inspiration. Course ReCap To make you notice interfaces, good and bad – You’ll never look at doors the same way again.
SHARING SOCIAL MEDIA academic and professional information through.
ISPAB Panel on Usable Security Mary Frances Theofanos - NIST Ellen Cram Kowalczyk - Microsoft.
1 City With a Memory CSE 535: Mobile Computing Andreea Danielescu Andrew McCord Brandon Mechtley Shawn Nikkila.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Dude, Where's My Car? And Other Questions in Context-Awareness Jason I. Hong James A. Landay Group for User Interface Research University of California.
Fuego Core 2005/7 Possible Directions Kimmo Raatikainen Principal Scientist Helsinki Institute for Information Technology
Communities and Portals Lan Zhang School of Information University of Texas at Austin.
Observation Direct observation in the field –Structuring frameworks –Degree of participation (insider or outsider) –Ethnography Direct observation in controlled.
Write the Screening Questionnaire GGGE /2014  Steps for developing a screener :  Review the profile to understand users’ backgrounds  Identify.
Adam Main Enabler Smart Phone New Technology Data Record Collect Software Hardware Observe Activities Interface User Consumer Lives Profile Tracking.
Designing for Context: Usability in a Ubiquitous Environment
Recommenders for Information Seeking Tasks: Lessons Learned
TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime Sadiq Basha.
Buddy Tracker “Stalker 1.0”
Data Warehousing Data Mining Privacy
Employee Monitoring Solution
Presentation transcript:

Joshua Sunshine

Defining Ubiquitous Computing Unique Privacy Problems Examples Exercise 1: Privacy Solution Privacy Tradeoffs Professional Solutions Exercise 2: User Study Conclusion

Everywhere (duh!) Invisible Mobile Interoperable Context Aware Personal Multi-Agent

More data collected, more data to be used inappropriately (Everywhere) User forget they are revealing private information (Invisible) Hard to configure data sharing (Invisible, Everywhere)

New class of data -- contextual information (Context Aware) Stalkers (location) Advertisers (location, activity) Hard To Identify Invasions (Multi-Agent) Hard to Recover (Multi-Agent)

Problem: Interruptions Caller doesnt know receivers context Solution: Reveal Context Location Activity Company Conversation

Problem: When will the next bus arrive? Tool: Cell phones Solution: Aggregate information from riders phones Send alerts to people waiting for a bus

Break up into two groups Make a list of privacy problems Come up with a solution that avoids or minimizes these problems 10 minutes

Identity violation Identity of individual is determined Happens when identifier is sent in a report to the server Tracking violation Movement of individual tracked over time Happens when identify one report as belonging to a person who sent an earlier report

Hitchhiking Anonymous data collection Location is Computed on the Client Only the Client Device is Trusted Report Approval Restriction of Reports to Specific Locations

Context Types: Location, Activity, Company, Conversation Relationship Types: Significant other, family member, friend, colleague, boss, and unknown Representative Sample of 20, regular routine Participants called at regular intervals by individual with one of the relationship types Asked to share context

Bad: Value is not real Participants were not receiving real phone calls based on their answers Goal: Avoid interruptions Questionnaire is an interruption Good: Context is more than location Ideas for Configuration in Real Setting

Value of Sharing vs. Privacy of Not Sharing Control vs. Trust Prevention vs. Detection Configurability vs. Invisibility Fidelity vs. Confidentiality Fine vs. Coarse Grained Filtering

Same groups Create a user study for the Professional Bus Tracking System Try to determine if the solution uses the correct trade offs Focus on usability of privacy, not on overall usability 20 minutes

Khalil, A. and Connelly, K Context-aware telephony: privacy preferences and sharing patterns. In Proceedings of the th Anniversary Conference on Computer Supported Cooperative Work (Banff, Alberta, Canada, November , 2006). CSCW '06. ACM, New York, NY, Tang, K. P., Keyani, P., Fogarty, J., and Hong, J. I Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montreal, Quebec, Canada, April , 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM, New York, NY, Hong, J.I., J. Ng, and J.A. Landay. Privacy Risk Models for Designing Privacy- Sensitive Ubiquitous Computing Systems. In Proceedings of Designing Interactive Systems (DIS2004). Boston, MA. pp