Privacy and Ubiquitous Computing Jason I. Hong. Ubicomp Privacy is a Serious Concern “[Active Badge] could tell when you were in the bathroom, when you.

Slides:



Advertisements
Similar presentations
An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong Group for User Interface Research Computer Science Division University of California.
Advertisements

Initiating Partner Notification on the Internet Wednesday, March 10 10:00-11:45 Andrew Delicata Former Lead DIS Howard Brown Health Center PCRS Coordinator.
Surveys and Questionnaires. How Many People Should I Ask? Ask a lot of people many short questions: Yes/No Likert Scale Ask a smaller number.
Consumers & Online Privacy: Agenda Background and objectives General attitudes to the internet Attitudes to online data and privacy Attitudes to.
Students’ online profiles for employability and community Frances Chetwynd, Karen Kear, Helen Jefferis and John Woodthorpe The Open University.
Location Based Social Networking For All Presenter: Danny Swisher.
Using an Intelligent Tutoring System to increase parent engagement in student learning By Zach Broderick, Christine O’Connor, Courtney Mulcahy, Cristina.
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems Jason Hong Carnegie Mellon Jennifer Ng Carnegie Mellon Scott Lederer University.
GenSpace: Exploring Social Networking Metaphors for Knowledge Sharing and Scientific Collaborative Work Chris Murphy, Swapneel Sheth, Gail Kaiser, Lauren.
Privacy and Sensor Andrew Jason Hong. Characteristics –Real-time, distributed –Invisibility of sensors –Potential scale Questions –What data is collected?
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
Thursday, July 8, 2004DIMACS Workshop, NJ Instant Messaging and Privacy Sameer Patil University of California, Irvine (& IBM T. J. Watson Research Center)
EFFECTS OF COMMUNITY SIZE AND CONTACT RATE ON SYNCHRONOUS SOCIAL Q&A Ryen W. White Microsoft Research Matthew Richardson Microsoft Research Yandong Liu.
Usable Privacy and Security: Trust, Phishing, and Pervasive Computing Jason I. Hong Carnegie Mellon University.
Context Awareness System and Service SCENE JS Lee 1 UbiPhone:Human-Centered Ubiquitous Phone System.
User- Controllable Privacy and Security for Pervasive Computing Jason I. Hong Carnegie Mellon University.
Usable Privacy and Security: Trust, Phishing, and Pervasive Computing Jason I. Hong Carnegie Mellon University.
Location Privacy Christopher Pride. Readings Location Disclosure to Social Relations: Why, When, and What People Want to Share Location Disclosure to.
Four Two Rants on Mobile Computing Jason I. Hong Feb Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.
Who’s Viewed You? The Impact of Feedback in a Mobile Location-Sharing Application Date : 2011/09/06 Reporter : Lin Kelly.
Taking the Headache out of. Reach your sphere of influence on a daily basis – AT NO COST? Reconnect with friends and stay in touch with family – AT NO.
Workshop Presentation BNE 03. Workshop title Our team title and symbol has combine together as our website logo as you can see below.
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
Automated Tracking of Online Service Policies J. Trent Adams 1 Kevin Bauer 2 Asa Hardcastle 3 Dirk Grunwald 2 Douglas Sicker 2 1 The Internet Society 2.
Created by Amber Craddock, Kylee Stone & Caleb Truette.
You can customize your privacy settings. The privacy page gives you control over who can view your content. At most only your friends, their friends and.
Tutorial Video basic skills basic skills Next page -->
WebCall - A Rich Context Mobile Research Platform Zhigang Liu, Hawk Yin Pang, Jun Yang, Guang Yang, Peter Boda (Special thanks to August Joki) Nokia Research.
Instant Queue Manager Version 4 Enterprise Click to Chat For Lotus Sametime.
Mobile and Location-Based Services Jason I. Hong May
“What a Small World!” ---NaviChat Team 4: Andrew Puchle Arthur Liu Yi-Jen Lai.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
Privacy Acknowledgement: Jason Hong, CMU. Overview of Privacy Why care? Why is it hard? Thinking about and Designing for Privacy –Specific HCI issues.
EDW647: Internet for Educators Dr. Roger Webster Department of Computer Science Millersville University July 23, 2008 Create.
BIRTHDAY GREETINGS Suming Chen John Hwang Damandip Sanghera.
Suggested grade levels 7-12 Students will explore strategies that promote personal safety when using the texting-based social network, Twitter.
+ A rapid ethnographic study of the iPad on a campus bus Jim Hahn
P ERSUASIVE WRITING Advertising. W HAT IS ADVERTISING ? Advertising is a tool used to get people to want to buy something. The main reason ads are created.
Heuristic evaluation Functionality: Visual Design: Efficiency:
It’s a Big Deal. ‘It’s a Big Deal’  If a photo is sent to you, do not send it to other people.  If you receive a photo from someone you.
CS2003 Usability Engineering Usability Evaluation Dr Steve Love.
Longitude Usability Study Final Presentation Amir Malik Fiel Guhit Viet Pham Sabel Braganza.
Mobile Usage Patterns and Privacy Implications Michael Mitchell March 27, 2015 Ratnesh Patidar, Manik Saini, Parteek Singh, An-I Wang Florida State University.
An Architecture for Privacy-Sensitive Ubiquitous Computing By Jason I-An Hong In MobiSYS ’04: Proceedings of the 2nd international conference on mobile.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
Protecting Yourself on Social Media – Friend Requests And Messages.
Ubiquitous Computing Visions Jason I. Hong jasonh at cs cmu edu.
Android Permissions Remystified: A Field Study on Contextual Integrity Presenter: Hongyang Zhao Primal Wijesekera (UBC) Arjun Baokar (UC Berkeley) Ashkan.
Usable Privacy and Security and Mobile Social Services Jason Hong
IM Power Project Summer 2007 Raye Gomez April Wensel Heather Tomko Jen Mankoff (mentor) Anind Dey.
What is touchPRO EXPRESS? touchPRO EXPRESS is a way for Associations who meet certain criteria to be able to get a mobile app at a low cost and have their.
Is Context-Aware Computing Taking Control Away from the User? Three Levels of Interactivity Examined Louise Barkhuus and Anind Dey The IT University of.
Dude, Where's My Car? And Other Questions in Context-Awareness Jason I. Hong James A. Landay Group for User Interface Research University of California.
Privacy in the Age of Ubiquitous Computing Jason I. Hong Scott Lederer Jennifer Ng Anind K. Dey James A. Landay G r o u p f o r User Interface Research.
Christa Marsh Southern Arkansas University Biology Professor.
Get Secure! Facebook Privacy Tutorial Becky Benishek | November 2013.
The Context Fabric: An Infrastructure for Context-Aware Computing Jason I. Hong Group for User Interface Research, Computer Science Division University.
Prof. James A. Landay University of Washington Spring 2008 Web Interface Design, Prototyping, and Implementation Ubicomp Design Pre-Patterns May 29, 2008.
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
AP CSP: Identifying People with Data and The Cost of Free
Project Management: Messages
Using Jabber in Global Offices
UNIT 4 – THE COST OF FREE LESSON 4.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Privacy Acknowledgement: Jason Hong, CMU.
Spyware. By: Katheryn L. Gaston.
UNIT 4 – THE COST OF FREE LESSON 6.
Personalization & Privacy: Flow of Information
Online Safety: Rights and Responsibilities
Presentation transcript:

Privacy and Ubiquitous Computing Jason I. Hong

Ubicomp Privacy is a Serious Concern “[Active Badge] could tell when you were in the bathroom, when you left the unit, and how long and where you ate your lunch. EXACTLY what you are afraid of.” -allnurses.com

Characteristics –Real-time, distributed –Invisibility of sensors –Potential scale –What data? Who sees it? Design Issues –No control over system –No feedback, cannot act appropriately You think you are in one context, actually in many –No value proposition Why is Ubicomp Privacy Hard?

Devices becoming more intimate –Call record, SMS messages –Calendar, Notes, Photos –History of locations, People nearby, Interruptibility –With us nearly all the time Portable and automatic diary –Accidental viewing, losing device, hacking Protection from interruptions –Calls at bad times, other people’s (annoying) calls Projecting a desired persona –Accidental disclosures of location, plausible deniability

Exploring Ubicomp at CMU People Finder Sensor Andrew inTouch –Better awareness and messaging for small groups Contextual Instant Messaging –Control and feedback mechanisms for ubicomp privacy

Contextual Instant Messaging Facilitate coordination and communication by letting people request contextual information via IM –Interruptibility (via SUBTLE toolkit) –Location (via Place Lab WiFi positioning) –Active window Developed a custom client and robot on top of AIM –Client (Trillian plugin) captures and sends context to robot –People can query imbuddy411 robot for info “howbusyis username” –Robot also contains privacy rules governing disclosure

Web-based specification of privacy preferences –Users can create groups and put screennames into groups –Users can specify what each group can see Control – Setting Privacy Policies

Coarse grain controls plus access to privacy settings Control – System Tray

Feedback – Notifications

Feedback – Social Translucency

Feedback – Offline Notification

Feedback – Summaries

Feedback – Audit Logs

Evaluation Recruited fifteen people for four weeks –Selected people highly active in IM (ie undergrads ) –~120 buddies, ~1580 messages / week (sent and received) –~3.3 groups created per person Notified other parties of imbuddy411 service –Update AIM profile to advertise –Would notify other parties at start of conversation

Results of Evaluation 321 queries –~1 query / person / day –61 distinct screennames, 15 repeat users –67 interruptibility, 175 location, 79 active window Added Stalkerbot near end of study –A stranger making 2 queries per person per day

Results – Controls Controls easy to use (4.5 / 5, σ=0.7) “I really liked the privacy settings the way they are. I thought they were easy to use, especially changing between privacy settings.” “I felt pretty comfortable with using it because you can just easily modify the privacy settings.” However, can be lots of effort “It’s time consuming, if you have a long buddylist, to set up for each person.” Asked for more location disclosure levels –Around or near a certain place

Results – Comfort Level Comfort level good (4 / 5, σ=0.9) –12 participants noticed stalkerbot, 3 didn’t until debriefing –However, no real concerns –Reasoned that our stalkerbot was a buddy or old friend –Also confident in their privacy control settings “I know they won’t get any information, because I set to the default so they won’t be able to see anything.”

Results – Appropriateness of Disclosures Mostly appropriate (2.47 / 5, where 3 is appropriate) –Useful information for requester? Right level of info? –Two people increased privacy settings, one after experimentation, other after too many requests from specific person However, more complaints about accuracy –Ex. Left a laptop in a room to get food, person wasn’t there

Results – Usefulness of Feedback Bubble notification, 1.6 / 6 (σ=0.6)

Results – Usefulness of Feedback Bubble notification, 1.6 / 6 (σ=0.6) Disclosure log, 1.8 (σ=1.3)

Results – Usefulness of Feedback Bubble notification, 1.6 / 6 (σ=0.6) Disclosure log, 1.8 (σ=1.3) Mouse-over notification, 3.7 (σ=1.0) Offline statistic notification, 4 (σ=1.4) Social translucency Trillian tooltip popup, 4.8 (σ=1.1) Peripheral red-dot notification, 5.4 (σ=0.7)

Discussion

Scaling up notifications –~1 query / person / day, but just one app, not a lot of users –Pointing out anomalies more useful Disclosure log not used heavily –Though people liked knowing that it was there just in case Surprisingly few concerns about privacy –No user expressed strong privacy concerns –Feature requests were all non-privacy related –If low usage, due to not enough utility, not due to privacy Does this mean our privacy is good enough, or is this because of users’ attitudes and behaviors?

Better understanding of attitudes and behaviors towards privacy Westin identified three clusters of people wrt attitudes toward commercial entities –Fundamentalists (~25%) –Unconcerned (~10%) –Pragmatists (~65%) We need something like this for ubicomp –But for personal privacy rather than for commercial entities –With more fine-grained segmentation Fundamentalists include techno-libertarians and luddites Pragmatists include too busy, not enough value, profiling –Better segmentation would help us understand if our privacy is good enough for specific audience

Understanding Adoption Need to tie attitudes and behavior with adoption models Teens

Understanding Adoption Crafting better value propositions –“Ubiquitous computing” and a focus on technology really scared the bejeezus out of people –“Invisible computing” and a focus on how it helps people, far more palatable

Understanding Adoption Crafting better value propositions –“Ubiquitous computing” and a focus on technology really scared the bejeezus out of people –“Invisible computing” and a focus on how it helps people, far more palatable Finding and supporting existing practices –Already using IM, familiar metaphor, adding a few more features, rather than asking people to take a large step –Better deployment models

End-User Privacy in HCI 137 page article surveying privacy in HCI and CSCW Forthcoming in the new Foundations and Trends journal, in a few weeks

Acknowledgements NSF Cyber Trust CNS NSF IIS CNS ARO DAAD Motorola Nokia Research Skyhook Gary Hsiesh Wai-yong Low Karen Tang

Open Challenges

Lessons Thus Far

Total of 242 requests for contextual information –53 distinct screen names, 13 repeat users Results of First Evaluation

43 privacy groups, ~4 per participant –Groups organized as class, major, clubs, gender, work, location, ethnicity, family –6 groups revealed no information –7 groups disclosed all information Only two instances of changes to rules –In both cases, friend asked participant to increase level of disclosure Results of First Evaluation

Likert scale survey at end –1 is strongly disagree, 5 is strongly agree –All participants agreed contextual information sensitive Interruptibility 3.6, location 4.1, window 4.9 –Participants were comfortable using our controls (4.1) –Easy to understand (4.4) and modify (4.2) –Good sense of who had seen what (3.9) Participants also suggested improvements  Notification of offline requests  Better summaries (“User x asked for location 5 times today”)  Better notifications to reduce interruptions (abnormal use) Results of First Evaluation

What’s Hard about Ubicomp Privacy? Easier to store lots of data More kinds of data being collected Easier to distribute More sensors, real-time More devices Easier to search More intimate

Five Challenges Better ways of helping end-users manage their privacy A better understanding of people’s attitudes and behaviors towards privacy A privacy toolbox Better organizational support Understanding adoption