I AM WATCHING YOU!!! Irina Shklovski 21-Sep-01. Privacy in Social Spaces The question of privacy is becoming more relevant when the concepts of home and.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

AN INTELLIGENT BUILDING DEFINED
Site Visits Interviews and observations. Site visits What we see and do for ourselves is more memorable, more real, more true than what someone else tells.
TBR Quality Standards Mobile Apps for Education and Workforce Development.
Using PeopleSoft’s User Productivity Kit (UPK)
Washington DC Student Project Unit Portfolio Presentation By Terri Lackey.
1 Patients’ Rights and Responsibilities. PATIENT RIGHTS 2 Every healthcare facility is mandated to display the following Rights and Responsibilities:
MITA Access Controls Initiative Goals of the initiative –Provide a more common set of access controls across all systems Systems currently have elements.
Point of Decision Prompt Campaign January 17, 2005 And Ongoing.
FERPAFERPA Family Educational Rights and Privacy Act.
5:47 1: Default Clock State PM Alarm off, time set to 5:47PM. Hour
Data Collection Methods: Observation Studies Deepak Khazanchi.
Indian Institute of Technology Hyderabad AUTOMATIC ROOM LIGHT CONTROLLER by V Swetha B Deepthi Priya as.
Observation Tools Overview and User Guide. Does the need to determine the impact a student's ADHD is having in the classroom or quantitatively describe.
1 SWE Introduction to Software Engineering Lecture 16 – System Modeling An Example.
CS CS 5150 Software Engineering Lecture 12 Usability 2.
Identifying Needs and Establishing Requirements John Thiesfeld Jeff Morton Josh Edwards.
Password Management Strategies for Online Accounts Gaw & Felten Optional Reading.
Thursday, July 8, 2004DIMACS Workshop, NJ Instant Messaging and Privacy Sameer Patil University of California, Irvine (& IBM T. J. Watson Research Center)
©2006, CSA Using COS Funding Alert Automatic Notification of Relevant New Opportunities from the World’s Largest Funding Database ™ Easily Accessible Via.
Eagle Vision 24/7 security system Day - Night - Dark.
Surveillance camera in terms of business. Index *surveillance systems * Types of control systems * Elements of control systems * Types of monitoring camera.
1 INTRUSION ALARM TECHNOLOGY LOCAL VS. MONITORING.
Invasion of Privacy – What you are (and are not) entitled to in the eyes of the law Image courtesy of privacy-please/
Personal Data (Privacy) Ordinance Hong Kong Personal Data (Privacy) Ordinance Hong Kong by Stephen Lau Privacy Commissioner for Personal Data Hong Kong.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Phase II Instructor: Dr. Lawrence Chung Rachel Bock, Ruben Cavazos, Chih-Lin Cheng, Victor Isbell, Swathi Kandimalla, Nikhil Mishra, Amy Polcari, Ramon.
A year 1 computer userA year 2 computer userA year 3 computer user Algorithms and programming I can create a series of instructions. I can plan a journey.
CHAPTER seven Marketing research.
(Edited) WORKPLACE PRIVACY.
Apirada Thadadech Software Testing Career1 Your career as a software tester Apirada Thadadech.
CHQ Learning Management System. 2 Learning Management System General Dynamics Private l Leveraging an existing AIS training website and vendor, to provide.
TA: Chris Reilly Group 5: Benjamin, Ramie, Zachary, Dinal.
Evaluating GPS Technology Used for Household Surveys Kathy Yu, Arash Mirzaei, Behruz Paschai North Central Texas Council of Governments (NCTCOG) 15 th.
Requirements Review – July 21, Requirements for CMS Patricia McBride July 21, 2005.
1 Anabel Quan-Haase Barry Wellman Feature Interaction Workshop: Panel on New Features Ottawa, June Designing vs. Using Features of Communication.
Looking at systems. What is a SYSTEM? The radiator makes the room warmer by turning ON when the temperature of the room is lower than required The THERMOSTAT.
Indecent Exposure – Are Your Private Parts Truly Private? (Privacy and Technology) Barbara Buckett Barbara Buckett & Associates 27 August 2008.
Presented By SLAC and Hensel Phelps Welcome SUSB.
Open your web browser and navigate to protechra.webex.com Open your web browser and navigate to protechra.webex.com.
©2010 John Wiley and Sons Chapter 6 Research Methods in Human-Computer Interaction Chapter 6- Diaries.
Home Guard Security System. Introduction & Basic Ideas Home Guard Security System.
Chapter 1 Getting Started. 2Practical PC 5 th Edition Chapter 1 Getting Started In this Chapter, you will learn: − How to power up the computer − About.
ANDROME – WP3 - Applications definition and development | Enabling Community Communications-Platforms and Applications | WP3 : Applications.
Intro to Software System Modeling
 A teacher’s point of view  Pros  Cons  A student’s point of view  A parent’s point of view  My personal thoughts  Your thoughts.
Business Project Nicos Rodosthenous PhD 28/10/ /10/20141Dr Nicos Rodosthenous.
Information Security Training for People who Supervise Computer Users.
Virtual University - Human Computer Interaction 1 © Imran Hussain | UMT Imran Hussain University of Management and Technology (UMT) Lecture 40 Observing.
© Copyright 2013 OPP Ltd. All rights reserved. Making MBTI ® feedback more memorable and meaningful Vanessa Rhone, Lead Consultant.
The following slides provide the questions from the needs survey and the responses given by the participants taking the survey. After the questions and.
Introduction to Networked Robotics CS 643 Seminar on Advanced Robotics Wenzhe Li, Graduate Student Texas A&M University.
Invasion of Privacy in Digital Media Basic Concepts.
1 City With a Memory CSE 535: Mobile Computing Andreea Danielescu Andrew McCord Brandon Mechtley Shawn Nikkila.
Prepared by Dr. Hoda Abdel Azim
Smart Surveillance Technology Javier OcasioWilliam Sanchez Mariel MartinezAbraham Diaz.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
1. 2 INDEX MAIN DISPLAYS3-4 SYSTEM LAYOUT 5-6 ROOM P-109 DISPLAY7 ROOM P-108 DISPLAY8 ROOM P-107 DISPLAY 9 ROOM P-106 DISPLAY 10 ROOM P-105 DISPLAY 11.
Is Context-Aware Computing Taking Control Away from the User? Three Levels of Interactivity Examined Louise Barkhuus and Anind Dey The IT University of.
Awareness October 23, 2008 Dourish and Bellotti Ding and Patterson.
© 2012, Toshiba India Private Limited. Toshiba Eco Utility.
(3) Organize information processing centers environment, the various functions and details Controls over vulnerabilities: Interception controls: Interception.
Check In Check Out (CICO) Program Overview. What is CICO? The CICO Program is a school-wide, check-in, check-out prevention program for students who are.
McLean HIGHER COMPUTER NETWORKING Lesson 10 Ethical Implications Description of ethical implications of networks: Personal privacy Censorhip.
Surveillance in Care Homes
Home Security Options What can I do to deter Burglars?
Evaluating Survey Data Collection Methods
Time Entry Overview March 27, 2003
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
Big Brother Camera’s Brittany Todd.
Presentation transcript:

I AM WATCHING YOU!!! Irina Shklovski 21-Sep-01

Privacy in Social Spaces The question of privacy is becoming more relevant when the concepts of home and workplace merge. Human requirements of privacy within physical spaces vary with situation. Intrusions into private life have increased with the advent of the Internet and the WWW, and many of our private actions and moments are now closely monitored.

Situationally Appropriate Interaction & Questions of Privacy The system will monitor the user and collect information through various sensors. The system will try to be sensitive to the user’s privacy needs in its information displays. System’s sensors, cameras and LED displays may be seen as synonymous to surveillance equipment, hence eliciting an apprehensive response from users.

I AM WATCHING YOU An observational study – data collection. Social space – office or home office (graduate student office?) Equipment – camera, control software Duration – 24 hrs – 72 hrs – 1 week – 2 weeks – depends?

Option One The camera records unless user turns it off. Software prompts user for feedback before allowing to turn the camera off. The camera can be turned off for a specified period of time. The timer turns the camera back on and notifies the user with a chime.

Option Two – Less Scrutiny Than Promised Participant is lead to believe that the camera and the software is fully functional. The software controls a small red LED on the camera (on/off switch) Software prompts user for feedback when changing camera status and records data.

Experiment Purpose Reasons people give when requesting privacy. Frequency of privacy requests. Habituation to the camera – will they select to turn it off less often with time? How often will they “forget” about the camera.