Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian.

Slides:



Advertisements
Similar presentations
UPM E.U.I.T. Diatel Xi Chen Internet of Things UPM E.U.I.T. Diatel Xi Chen
Advertisements

Joshua Sunshine. Defining Ubiquitous Computing Unique Privacy Problems Examples Exercise 1: Privacy Solution Privacy Tradeoffs Professional Solutions.
Mobile applications Mobile applications have been a domain for recommendation –small display sizes and space limitations –naturally require.
Context and Context- Aware Computing Omar Khan CS260, Fall 2006.
Context-Aware Security Gleneesha Johnson
Interaction of RFID Technology and Public Policy Presentation at RFID Privacy MIT 15 TH November 2003 By Rakesh Kumar
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Ubiquitous Computing Definitions Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical.
Page16/2/2015 Sirlan Usage and usability considerations for SIRLAN solution success.
Information Security Policies and Standards
Usable Security (Part 1 – Oct. 30/07) Dr. Kirstie Hawkey Content primarily from Teaching Usable Privacy and Security: A guide for instructors (
ICT 1 “Putting Context in Context: The Role and Design of Context Management in a Mobility and Adaptation Enabling Middleware” Marius Mikalsen Research.
WEB BROWSER PRIVACY & SECURITY Nan Li Informed Consent in the Mozilla Browser: Implementing Value-Sensitive Design 10/13/ Usability Privacy.
Towards Security and Privacy for Pervasive Computing Author : Roy Campbell,Jalal Al-Muhtadi, Prasad Naldurg,Geetanjali Sampemane M. Dennis Mickunas.(2002)
Usable Privacy and Security Carnegie Mellon University Spring 2006 Cranor/Hong/Reiter 1 Design for Privacy 1 February.
Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong 1 User Studies Motivation January.
Think. Learn. Succeed. Aura: An Architectural Framework for User Mobility in Ubiquitous Computing Environments Presented by: Ashirvad Naik April 20, 2010.
P3P: Platform for Privacy Preferences Charlin Lu Sensitive Information in a Wired World November 11, 2003.
Designing for security and privacy. Agenda Tests Tests Project questions? Project questions? Design lecture Design lecture Assignments Assignments.
Real-Time Systems and the Aware Home Anind K. Dey Ubiquitous Computing Future Computing Environments.
C MU U sable P rivacy and S ecurity Laboratory Making privacy visible Lorrie Faith Cranor October 19, 2007.
Mark Ackerman Department of Electrical Engineering and Computer Science and School of Information University of Michigan HCI Issues in Privacy DIMACS July,
Security and Privacy in Ubiquitous Computing. Agenda Project issues? Project issues? Ubicomp quick overview Ubicomp quick overview Privacy and security.
Location Privacy Christopher Pride. Readings Location Disclosure to Social Relations: Why, When, and What People Want to Share Location Disclosure to.
Cloud Usability Framework
July 25, 2005 PEP Workshop, UM A Single Sign-On Identity Management System Without a Trusted Third Party Brian Richardson and Jim Greer ARIES Lab.
1 BTEC HNC Systems Support Castle College 2007/8 Systems Analysis Lecture 9 Introduction to Design.
CHAPTER 4 Marketing Information and Research: Analyzing the Business Environment Off-line and Online M A R K E T I N G.
Ubiquitous Computing Computers everywhere. Where are we going? What happens when the input is your car pulls into the garage, and the output is the heat.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Privacy of Home Energy Usage Data Jim Williams June 26, 2012 Jim Williams June 26, 2012.
Looking ahead in Pervasive Computing: Challenges, Opportunities in the era of Cyber Physical Convergence Authors : Marco Conti, Sajal K. Das, Chatschik.
6 Ethics and Privacy.
Software Project Management Lecture # 7. What are we studying today? Chapter 24 - Project Scheduling  Effort distribution  Defining task set for the.
Ubiquitous Computing Software Systems.
Overview of the rest of the semester Iteratively design interface to help people log their food intake over the long term.
Using UML, Patterns, and Java Object-Oriented Software Engineering Chapter 4, Requirements Elicitation.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
D1 - 25/10/2015 The present document contains information that remains the property of France Telecom. The recipient’s acceptance of this document implies.
FOREWORD By: Howard Shrobe MIT CS & AI Laboratory
CS2003 Usability Engineering Human-Centred Design Dr Steve Love.
EVALUATION OF HRD PROGRAMS Jayendra Rimal. The Purpose of HRD Evaluation HRD Evaluation – the systematic collection of descriptive and judgmental information.
An Architecture for Privacy-Sensitive Ubiquitous Computing By Jason I-An Hong In MobiSYS ’04: Proceedings of the 2nd international conference on mobile.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Principles of Context aware systems Presented by: Rajesh Gangam Usable Security.
Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing Xiaodong Jiang Jason I. Hong James A. Landay G r o u p f o r.
6 Ethics and Privacy.
Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.
SESSION 2 The Sociotechnical Gap, Do Artifacts Have Politics?
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Chapter 5:User Interface Design Concepts Of UI Interface Model Internal an External Design Evaluation Interaction Information Display Software.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Collective Information Practice: Exploring Privacy and Security as Social and Cultural.
Usable Privacy and Security and Mobile Social Services Jason Hong
Stanford hci group / cs147 u 27 November 2007 Ubiquitous Computing & “Natural” Interaction Scott Klemmer tas: Marcello Bastea-Forte,
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
The transformational capacity of ubiquitous and contextual computing.
HLG MOS Flexibility and Adaptability HLG MOS Workshop November 24, 2015 The Hague Pádraig Dalton 1.
Ambient Intelligence: Everyday Living Aid System for Elders
WOSS 04 1 Task-based Self-adaptation David Garlan Bradley Schmerl Joao Sousa Vahe Poladian Carnegie Mellon University WOSS’04.
Privacy in the Age of Ubiquitous Computing Jason I. Hong Scott Lederer Jennifer Ng Anind K. Dey James A. Landay G r o u p f o r User Interface Research.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
TC176/IAF ISO 9001:2000 Auditing Practices Group.
1 Usability Analysis n Why Analyze n Types of Usability Analysis n Human Subjects Research n Project 3: Heuristic Evaluation.
PRIVACY AND DATA PROTECTION in THE BIG DATA AGE JONATHAN PRICE.
Smart Learning concepts to enhance SMART Universities in Africa
Analysis of Privacy and Data Protection Laws and Directives
CHAPTER 9 (part a) BASIC INFORMATION SYSTEMS CONCEPTS
Recommendations in ubiquitous environments
Presentation transcript:

Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

Agenda Defining some terms What's the big deal? From the user's perspective Privacy concepts Case studies Design guidelines Conclusions

Definitions Privacy:  “The ability of individuals to control the terms under which their personal information is acquired and used.” Mary J. Culnan, “Protecting Privacy Online: Is Self-Regulation Working?” Journal of Public Policy and Marketing 19:1 (2000), 20–26.  “The right to be let alone” Samuel Warren and Louis D. Brandeis

Definitions Ubiquitous Computing  “third wave in computing, just now beginning […] or the age of calm technology, when technology recedes into the background of our lives.” - Mark Weiser,  “ubicomp”  “pervasive computing”  “everyware” “ Computing without computers, where information processing has diffused into everyday life, and virtually disappeared from view.”  Adam Greenfield, Everyware

What's the big deal? UbiComp 11 th Internation Conference  Locaccino, Google Latitude Project Oxygen (MIT) RFID Future: smart homes, wearable computers, embedded devices.... ???

What's the big deal? With all of these potentials come privacy risks.  Location → tracking  Aggregation → activity inference  Networking → data farming  Complexity → lack of understanding  Easy to forget → no informed consent (Chapter 19: Privacy Issues and Human-Computer Interaction)

From the user's perspective How they view privacy  Research on privacy configuration shows that most do not customize settings  It's important, but not a primary task Different concerns  Unauthorized access (security breach)  Sharing without consent  Collection of personal data  Inability to correct errors (Chapter 19: Privacy Issues and Human-Computer Interaction)

From the user's perspective 3 consistently observed levels of concern  Marginal (indifferent)  Fundamentalist (uncompromising)  Pragmatic (will make tradeoffs) Majority across many studies (Chapter 19: Privacy Issues and Human-Computer Interaction)

Privacy concepts Different forms of privacy  Access personal data (conscious decision)  “Exoinformation”: left by interactions Queries, timestamps, IP addresses, etc. Used to build aggregate profiles “Barn Door” property  Once left unprotected, there is no way of knowing whether data has been seen (Chapter 20: A User-Centric Privacy Space Framework)

Privacy Concepts Privacy boundaries  Disclosure boundary  Identity boundary  Temporal boundary  Users need to be aware and manage (Peripheral Privacy Notifications for Wireless Networks)

Case Study: Faces Privacy manager for ubicomp environments Disclosure preferences: user decides rules  WHO sees WHAT info in WHICH situations Metaphor: “faces” represent how users portray themselves to others in a situation  Situation: generic setting for the purpose of establishing a “face”  Ex: Weekend shopping trip (Chapter 21: Five Pitfalls in the Design for Privacy)

Case Study: Faces Levels of precision  Undisclosed, vague, approximate, precise Types of information  Identity, location, activity, nearby people Feedback: log of disclosures used to iteratively define preferences

Case Study: Faces Testing: 5 participants  Created rules for 2 inquirers, 2 situations  Given realistic scenario for each situation  Preferences stated in scenarios did not match settings for associated situations Conclusion: Separating configuration from context is a mistake. Users should mold system behavior through their actions, instead of thinking abstractly about privacy.

Case Study: Reno SMS-based location inquiry tool 3-stage experimental process  Experience Sampling Method (ESM) Who would disclose what information  Pilot study Internal testing  User study Tested with 2 families (Developing Privacy Guidelines for Social Location Disclosure Applications and Services)

Case Study: Reno Results  Responses based on specific goals  Denial and deception  Automation not popular Derived design guidelines Next step: “Boise” map-based successor

Design Guidelines: Faces Don't obscure potential information flow  Users can make informed use of a system only when they understand the scope of its privacy implications. Don't obscure actual information flow  Users should understand what information is being disclosed to whom.

Design Guidelines: Faces Promote user action over configuration  Designs should enable users to practice privacy as a natural consequence of their use of the system. Provide coarse-grained control  Designs should provide an obvious way to halt and resume disclosure. Support established practice

Design Guidelines: Reno Don't start with automation Allow flexible disclosure Support plausible deniability Support deception Support simple evasion (“busy”) Start with person-to-person communication Provide status/away messages

Design Guidelines: Reno Avoid handling user data Consider user groups likely to need privacy Characterize users' use of privacy features Account for long learning curve Account for specific circumstances

Design Guidelines: Proportionality Principle of proportionality:  “any application, system, tool, or process should balance its utility with the rights to privacy (personal, informational, etc) of the involved individuals” Method built on 3 “judgments”  Legitimacy: are the goals useful?  Appropriateness: find the best alternative  Adequacy: justify proper use of parameters

Summary Importance of ubicomp Role of privacy User's perspectives Case studies: prior research Design guidelines

Conclusion Ubicomp is an important concept and will expand rapidly in the near future. Usable privacy plays a vital role in real- world ubicomp systems. Privacy risks are a real threat to end users Design for ubicomp is challenging, but there are guidelines for preserving privacy More research is needed

Sources Security and Usability. Chapter 19 Privacy Issues and Human-Computer Interaction (M. Ackerman and S. Mainwaring) Security and Usability. Chapter 20 A User-Centric Privacy Space Framework (B. Brunk) Security and Usability. Chapter 21 Five Pitfalls in the Design for Privacy (S. Lederer, J. Hong, A. Dey, and J. Landay) Samuel Warren and Louis D. Brandeis, The Right to Privacy, Harvard Law Review, B. Kowitz and L. Cranor. Peripheral Privacy Notifications for Wireless Networks. In Proceedings of the 2005 Workshop on Privacy in the Electronic Society, 7 November 2005, Alexandria, VA, pp G. Iachello, I. Smith, S. Consolvo, M. Chen, and G. Abowd. Developing Privacy Guidelines for Social Location Disclosure Applications and Services. In Proceedings of the Symposium On Usable Privacy and Security 2005, Pittsburgh, PA, July 6-8, Iachello, G. and Abowd, G. D Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Portland, Oregon, USA, April , 2005). CHI '05. ACM Press, New York, NY,

Questions ?