Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Multimedia Communications Tejinder Judge Usable Security – CS 6204 – Fall, 2009.

Slides:



Advertisements
Similar presentations
References Prof. Saul Greenberg, University of Calgary, notes and articles INUSE 6.2 and RESPECT 5.3 Handbook Prof. , University of , Notes and articles.
Advertisements

Delivering Guidance in a Group Setting: optimising the potential for personal learning and development in a group context Jane Westergaard Senior Lecturer.
Project Proposal.
Effective Communication of Cyber Security Risks: Addressing the Human Element in Security Jason R.C. Nurse (PhD, MSc, BSc) Cyber Security Centre, Department.
NETT Recruitment-Admissions Interactive Review Congruence Survey for case study 1 Relationship between recruitment and admissions activity.
Reflective Practice Leadership Development Tool. Context recognised that a key differentiator between places where people wanted to work and places where.
Publishing qualitative studies H Maisonneuve April 2015 Edinburgh, Scotland.
INFO 310 User Centered Design. User centered design (Allen, 1996) Identify a user population Investigate the information needs of the user group Discover.
Participatory Design for Sustainable Development Matthew Kam Feb 7, 2003.
INTRODUCTION. Concepts HCI, CHI Usability User-centered Design (UCD) An approach to design (software, Web, other) that involves the user Interaction Design.
Copyright Shanna Smith & Tom Bohman (2003). This work is the intellectual property of the authors. Permission is granted for this material to be shared.
Chapter One of Your Thesis
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Medical Applications Tejinder Judge Usable Security – CS 6204 – Fall, 2009 – Dennis.
Qualitative Research MKTG 3342 Fall 2008 Professor Edward Fox.
The Vision Integration Platform Change Readiness Campaign Theme “Together to the Future”
Technical Report Writing
Privacy Sensitive Architecture for Psychiatric Behaviour Monitoring Service System Presenter: Rusyaizila Ramli (Ph.D student) Supervisors: Associate Professor.
Teaching with Multimedia and Hypermedia
Principles of User Centred Design Howell Istance.
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
Raising Awareness of Grey Literature in an Academic Community Using the Cognitive Behavioral Theory GL11 Conference, December 14-15, 2009 Yongtao Lin,
+ REFLECTIVE COACHING APRIL 29, Goals for Today Check in on where everyone is in our self-guided learning and practice with reflective coaching.
Institutional Outcomes and their Implications for Student Learning by John C. Savagian History Department Alverno C O L L E G E.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 7: Focusing on Users and Their Tasks.
Adaptation knowledge needs and response under the UNFCCC process Adaptation Knowledge Day V Session 1: Knowledge Gaps Bonn, Germany 09 June 2014 Rojina.
Introduction to Evaluation Odette Parry & Sally-Ann Baker
Can VeSeL provide a model for collaborative participation in the design and delivery of e-learning? Pauline Ngimwa PhD student The Open University, UK.
Implementation and process evaluation: developing our approach Ann Lendrum University of Manchester Neil Humphrey University of Manchester Gemma Moss Institute.
The Process of Conducting Research
Research PHE 498. Define Research Research can be considered as systematic inquiry: A process that needs to be followed systematically to derive conclusions.
FOR 500 PRINCIPLES OF RESEARCH: PROPOSAL WRITING PROCESS
Science Teaching & Instructional Technology By: Asma, Melissa & Susan.
Maria E. Fernandez, Ph.D. Associate Professor Health Promotion and Behavioral Sciences University of Texas, School of Public Health.
D AFFODIL Strategic Support Evaluated Claus-Peter Klas Norbert Fuhr Andre Schaefer University of Duisburg-Essen.
Student volunteers and the volunteer- involving community organisations vinspiredstudents research.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Designing for Privacy Human factors and system’s engineering Usable Security – CS.
CS2003 Usability Engineering Human-Centred Design Dr Steve Love.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Principles of Context aware systems Presented by: Rajesh Gangam Usable Security.
1 Evaluating the Quality of the e-Learning Experience in Higher Education Anne Jelfs and Keir Thorpe, Institute of Educational Technology (IET), The Open.
Session 11 Risk Communication Messages and Materials Session 11 Slide Deck Slide 11-1.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy in Context: Contextual Integrity Peter Radics Usable Security – CS 6204.
OCLC Online Computer Library Center 1 Social Media and Advocacy.
L&I SCI 110: Information science and information theory Instructor: Xiangming(Simon) Mu Sept. 9, 2004.
Reflecting upon reflection Ann Winter E.R.A. Experience Reflective process Action.
Theories of Health Behaviors Gero 302. Health Belief Model Has intuitive Logic and clearly stated central tenents Behind the HBM values and expectancy.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Collective Information Practice: Exploring Privacy and Security as Social and Cultural.
Chapter 10 Qualitative Field Research Key Terms. Naturalism Approach to field research based on the assumption that an objective social reality exists.
Chapter 10 Qualitative Field Research Key Terms. Naturalism Approach to field research based on the assumption that an objective social reality exists.
MASS/MASC Annual Conference NOVEMBER 5, 2014 Effective Communication for District Administrators By Gail M. Zeman, Consulting School Business Administrator,
SBD: Analyzing Requirements Chris North cs3724: HCI.
CCT 333: Imagining the Audience in a Wired World Class 6: Intro to Research Methods – Qualitative Methods.
Action Research GGGE6383 Materials for Teaching & Learning Name: Izyani Binti Mistar Matric No: P73940 Title: The Use of WhatsApp in Language Learning.
Unit 32 – Networked Systems Security
By Job Alain King’s College London Research Question: Submit a report on a piece of teaching that you have planned, taught, assessed the learning and evaluated.
1 Usability Analysis n Why Analyze n Types of Usability Analysis n Human Subjects Research n Project 3: Heuristic Evaluation.
The Impact of the Social Sciences Jane
Conducting a research project. Clarify Aims and Research Questions Conduct Literature Review Describe methodology Design Research Collect DataAnalyse.
THE core elements of digital citizenship
Strategic Communications Training Crisis Communications X State MDA 1.
By Dr. Talat AnwarAdvisor Centre for Policy Studies, CIIT, Islamabad Centre for Policy Studies, CIIT, Islamabad
Cyfnewidfa Cydraddoldeb a Hawliau Dynol Digwyddiad Rhanbarthol Equality and Human Rights Exchange Regional Event 13 September 2016, Disability Sport Wales.
Dr. Anne Adams Research Methods.
Chapter 3 Intercultural Communication Competence
First-Year Experience Seminars: A Benchmark Study of Targeted Courses for Developmental Education Students.
Web University - Distance Learning and Working over High Speed Internet CERN Riitta Rinta-Filppula, Helsinki Institute of Physics
CS 522: Human-Computer Interaction Usability and HCI Topics
Problems, Purpose and Questions
Compare and Contrast Multiple Mediums
Chapter 4 Instructional Media and Technologies for Learning
Anna Adams Martina Angela Sasse
Presentation transcript:

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Multimedia Communications Tejinder Judge Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Anne Adams Associate Professor in the Institute of Educational Technology, part of The Open University in UK PhD in Psychology and Computer Science in 2000 from University College of London (UCL) Research areas - Social impacts of technology, CSCW, Research Methods, Digital Libraries Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Central theme of these papers Perceived invasions of privacy can cause breakdowns in technologically mediated interactions, leading to user rejection of the technology Understanding users' perception of privacy will prevent resentment and rejection of multimedia systems

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Paper 1 Users' perception of privacy in multimedia communication Anne Adams CHI '99 Extended Abstracts

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Motivation Multimedia communication systems such as videoconferencing are becoming ubiquitous Accessing and using such systems increases privacy risks The aim of this research is to identify the mismatch between perceived and actual privacy risks

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech 3 key privacy factors Information sensitivity Information receiver Information usage

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Information sensitivity 2 levels of information  Primary information relates to the topic of discussion  Secondary information relays other characteristics about the user via visual, auditory or textural mediums When users discover data has a secondary level and it’s being used in a way they did not anticipate, they feel that their privacy has been invaded

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Information receiver Privacy can be invaded without users being aware of it Brings up the issue of whether it is what is known about a person that is invasive or who knows it

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Information usage Users' fears of technology relate to the how their information is/will be used There is a relationship between the perceived information sensitivity and its potential receiver

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy model

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Method 1. 9 Ph.D. students at universities in the UK appraised a prototype virtual reality system through a focus group undergraduate at UCL used a videoconferencing system throughout an 8- week network communications course

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Method UCL staff responded to a quantitative/qualitative questionnaire about a video surveillance device positioned in a common room attendees at a conference that was multicast were interviewed in-depth

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Results Information sensitivity  Potential privacy invasions were produced by unaccounted-for privacy risks associated with secondary information Information receiver  There are connections between the type of information released and the privacy risks associated with the person receiving it

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Results Information usage  The major issue to surface is the lack of awareness of potential privacy risks regarding later information usage

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Take away message There is a mismatch between users' perceptions of privacy risks and the actual privacy risks

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Paper 2 Privacy in Multimedia Communications: Protecting Users, Not Just Data Anne Adams and Martina Angela Sasse Joint Proceedings of HCI2001 and ICM2001

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Motivation Most invasions of privacy are not intentional but due to designers inability to anticipate how this data could be used, by whom, and how this might affect users To address this problem a model of the user perspective on privacy in multimedia environments has been identified

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Method Used grounded theory to analyze previous privacy literature and studies of the phenomenon within multimedia communications The analysis produced:  A privacy model of the factors involved in privacy invasions  The privacy invasion cycle which details how these factors lead to privacy invasions

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy model

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy model - User Users are those who have data transmitted either directly (primary information or indirectly (secondary) about themselves Designers must understand that the user may well not be actively using the system and may actually be unaware that their data (their image, voice etc.) is being transmitted

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy model – Context Feedback of what is being transmitted, and control on when information is being transmitted is required Users need to have feedback about how they are being represented e.g. in videoconferencing What data is captured can affect how invasive the information is perceived to be

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy invasion cycle

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy invasion cycle – Stage 1 Trust: Users do not go into every situation ready to assess the privacy benefits and risks of that information exchange

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy invasion cycle – Stage 1 Assumptions: The trust felt by the user in that information exchange relies on assumptions surrounding that interaction 1. Users previous knowledge and experiences and their role in the interaction. 2. Perceived Information Sensitivity (IS). 3. Perceived Information Receiver (IR). 4. Perceived Information Usage (IU). 5. Perceived Context of interaction.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy invasion cycle

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy invasion cycle – Stage 3 Realization and Response: When users realize that their assumptions were inaccurate, they experience an invasion of privacy

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy invasion cycle – Stage 4 Decreasing Cycle: The next time the user encounters what they perceive to be a similar scenario their initial trust levels will be lowered

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy invasion cycle

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy evaluation scenario Videoconferencing seminar was given from London to a local and remote (Glasgow) audience Both audiences had similar room setups Audience ranged from novices to experts in multimedia communication  Did not know remote audience or speaker All screens displayed 4 tiled windows  London audience, Glasgow audience, presenter, seminar slides/video

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy Recommendations 1. Briefing session  System details  Interaction details  Recording details 2. Information broadcaster  Data transmission  Interaction feedback  Recording feedback

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy recommendations 3. Information receiver  Contextual feedback  Edited data  Information handling 4. Policy procedures  Recording permission  Changed usage  Editing  Continued privacy evaluation

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Take away message These models detail what guides users’ perceptions of privacy and provides a theory of the processes behind privacy invasions There is a need to counteract privacy problems before they arise thus solving them before people lose their trust and emotively reject the technology

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Central theme of these papers Perceived invasions of privacy can cause breakdowns in technologically mediated interactions, leading to user rejection of the technology Understanding users' perception of privacy will prevent resentment and rejection of multimedia systems

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Conclusion and Critique Provided two models for understanding users’ perception of privacy  Privacy model  Privacy invasion cycle Critique:  Did not interview or observe users to understand their view of privacy  Model was built using grounded theory to analyze data from privacy research

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Discussion Do these models sufficiently address all facets of privacy in multimedia systems? What other facets of privacy should be considered? How can we as researchers and designers increase users’ trust in multimedia systems?