Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style COPS Community Studies Presented by Sherley Codio Community-Oriented.

Slides:



Advertisements
Similar presentations
Intisar O. Hussien Faculty of Computer Studies Arab Open University
Advertisements

Hiring of Managers in the Bank Maryvonne Plessis-Fraissard Cities Alliance CG meeting Marrakech.
New Supervisor: Skills for Success
Digital Citizenship L’école élémentaire Beachy Cove Elementary School January 2013.
Evaluating Risk 1 IRB CELT Presentation Colleen Donaldson – IRB Administrator Julie Wilkens – IRB Coordinator.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
Joint Staff School Committee Training. Why do we need a JSSC? Provide orderly and professional means of improving educational programs, conditions within.
Effects of Social Networks on Managing Electronic Records Carol E.B. Choksy, Ph.D., CRM, PMP School of Library and Information Science Indiana University,
8 Criteria for IRB Approval of Research 45 CFR (a)
Understand your role 1 Standard.
RECRUITMENT AND SELECTION OF STAFF
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Network security policy: best practices
Business Intelligence: Data and Text Management Instructor: Bajuna Salehe Web:
Growing Success-Making Connections
Teamwork & Conflict resolution
Unit 2: Managing the development of self and others Life Science and Chemical Science Professionals Higher Apprenticeships Unit 2 Managing the development.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style COPS: Community-Oriented Privacy System The Prototype.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Design Extensions to Google+ CS6204 Privacy and Security.
Module 4: Association Personnel – The Executive Director Presented by the Southern Early Childhood Association.
Using the Internet to Conduct Research What Investigators and IRB Members Should Know -- January 29, Lisa Shickle, MS Analyst, VCU Massey Cancer.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
Effective collaboration Session 1 – A professional community.
Data Collection Methods
1 Ethics of Working with Human Subjects (BIOL/CHEM 397 ) Header image designed by Michelle Jordan, UMBC Creative Services, 2009.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
IB Business & Management
© 2004 SHRM SHRM Weekly Online Poll: March 9, 2004 Trade Secrets Analyzing 247 responses of s sent, 1622 received (response rate = 15%). Fielded.
Chapter 2 Copyright © 2015 Cengage Learning Team and Intercultural Communication.
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
1ICT 421 IT Professional Practice Semester 1, 2005 Communications Management Part 1 Diana Adorno
Evaluation Plan New Jobs “How to Get New Jobs? Innovative Guidance and Counselling 2 nd Meeting Liverpool | 3 – 4 February L Research Institute Roula.
Part TWO The Process of Software Documentation Chapter 5: Analyzing Your Users Chapter 6: Planning and writing your Doc. Chapter 7: Getting Useful reviews.
Dr. Engr. Sami ur Rahman Assistant Professor Department of Computer Science University of Malakand Research Methods in Computer Science Lecture: Data Generation.
Education Research and Social & Behavioral Science IRB.
Tips for Mastering overload By by Stever Robbins of the Harvard Business School Working Knowledge for Business Leaders.
Traditional Training Methods
Teams and groups. Major change in the workplace Teams are increasingly used in all organizations. Job descriptions are less common. Increasingly use role.
Copyright 2010, The World Bank Group. All Rights Reserved. Testing and Documentation Part II.
Team working in distributed environments M253 Communicating, Cooperating & Collaborating on Line Faculty of Computer Studies Arab Open University Kuwait.
The Marketing Research Process Overview. Learning Objectives  To learn the steps in the marketing research process.  To understand how the steps in.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
WELCOME to the TULANE UNIVERSITY HUMAN RESEARCH PROTECTION OFFICE WORKSHOP for SOCIAL/BEHAVIORAL RESEARCH (March 2, 2010) Tulane University HRPO Uptown.
Management & Leadership
Unit II PERFORMANCE FEEDBACK.
Descriptive Research & Questionnaire Design. Descriptive Research Survey versus Observation  Survey Primary data collection method based on communication.
Data Ethics Levette Williams Associate Superintendent Technology Services Brad Bryant, State Superintendent of Schools “We will lead the nation in improving.
Privacy/Confidentiality – Principles and Regulations in the Social Sciences and Behavioral Research Moira Keane, MA, CIP University of Minnesota May 4,
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 15 Creating Collaborative Partnerships.
Disclosure & record keeping February
MNCPA Career Workshops presents …. Interviewing to Impress 1.Importance of First Impressions 2.The Interview  Definition  Goal 3.Preparation  Documented.
Supporting the Success of Aboriginal Business WELCOMES YOU…
Summer Institutes Level 1 FRMCA Level 1, Chapter 7 Communication.
Investigator Initiated Research Best Practices for IRB: SBER Corey Zolondek, Ph.D. IRB Operations Manager Wayne State University.
8 – Protecting Data and Security
HUMAN RESOURCE MANAGEMENT
November 11, 2016 Paula Settoon, Dean of Libraries
Collaboration, Interpersonal Communication, and Business Etiquette
Complying with Maryland’s Open Meetings Act
UNC System Archivists and Records Managers Meeting
Organization and Knowledge Management
Answer the questions to reveal the blocks and guess the picture.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Research Ethics Matthew Billington
Records management and data security
PROTEÇÃO DAS MÃOS: LIÇÕES PARA TODA A VIDA
Presentation to - Management Team Javier Garza, HRM B-02
General Data Protection Regulation Q & A Session
HIPAA Do’s and Don'ts: What is Really Behind Protected Health Information (PHI) and Health Care Privacy Rules Paul Sisler, Director, Information Services;
Anuj Dube Jimmy Lambert Michael McClendon
Presentation transcript:

Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style COPS Community Studies Presented by Sherley Codio Community-Oriented Privacy and Security

Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science The design of individual questionnaire The design of topics and questions for group discussion The analysis of the data 2 Proposed Deliverables

Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science The design of individual questionnaire The design of topics and questions for group discussion Comments 3 Deliverables

Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science  Motivation and Goals  What is a Community  Privacy definition  Study Process  Outcome of the study  Comments on interviews and FG  Definition of Important Terms  Future work and Conclusion 4 Outline

Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science Challenge for group of people sharing sensitive information to control the disclosure Understanding how people in a community think and act about sensitive information to inform design for COPS Sensitive information means any information that has limitation on its disclosure. 5 Motivation and Goals

Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science “Community” is defined by three attributes:  collaborative  cooperative  collective 6 Community

Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science Advantages of community-based control over individual control  Expertise and knowledge on the use of privacy enforcement mechanisms can be shared across the community to ensure better awareness of privacy requirements.  A sense of responsibility to the community may encourage each member to pay more attention to privacy tasks. 7 Why Community?

Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science 8 Privacy A “boundary regulation” process in which privacy decisions are highly context dependent and cannot be reduced to a fixed set of “rules” or “policies” that are automatically enforced.

Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science  Understand the group structure  Learn about the group boundary regulation process  See evidence of privacy behaviors  Use of technology to support the process  Learn about metaphors used to manage sensitive information 9 Outcome Expected From Focus Group

Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science Plan to conduct focus groups an interviews with members of different communities: industry based community, school community  2 Individual interviews and 1 focus group per community  4 to 5 focus groups (5 to 8 participants)  Preparation and revision of the questionnaire  Preparation of consent form  Submission to the IRB  Conducting the interviews and Focus group 10 Study Process

Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science 11 Study process Why interviews and Focus Groups? Answers from the interviews can help probe questions for Focus Group

Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science  Good morning. We appreciate your agreeing to meet with us. We are trying to understand how people in a group think and act about sensitive information for which they share responsibility. By sensitive we mean information that, for whatever reason, has limitations on its dissemination or disclosure. We want to understand what actions are taken to achieve these limitations. We also want to learn about the group structure, the role of the group members and how they interact with each other. Your answers will help inform the design and study of systems dealing with sensitive information. Interview Procedure The interview will last about 45 minutes to an hour. We will ask you a series of questions related to the group structure and another series of questions related to the group interaction and the actions taken to control the disclosure of information. For all of these questions there are no right or wrong answers, therefore we encourage you express your opinions freely and openly. Now, we would ask you to read the consent form and sign it before we start the interview. All information and audio will be stored in a password-protected computer. Files will only be named with your participant number that is written at the top right of this form. Do you have any questions before we begin? 12 Questionnaire

Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science  Can you tell us about the group?  Can you tell us about how the group works and makes decisions?  We would like to know how you view information privacy in the context of the group.  Can you tell us about how the group keeps information private?  Can you tell us how the group shares private information with someone outside the group? 13 Questions Sample

Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science  Dealing with human subjects is difficult  Setting up time that works for everyone  Finding people willing to participate in the Study 14 Difficulties Encountered

Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science  2 Individual Interviews  Members of an industry based Community  Shows clearly that individuals manage privacy differently  being in a community facilitates the share of Knowledge on privacy issues 15 Individual Interviews

Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science  Group Structure:  Hierarchical structure  Become a member of a group based on job description  Collaboration done via video conference or over internal system  Small group  Decision Process:  manager plans and prioritize tasks  privacy policies are already set in place  Disclosure:  In case of privacy violation, report would be made to the manager to decide how big of a threat it is  Security practices:  Monthly rotation of password changes  lock down computer when not at your desk 16 Individual Interviews

Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science  Group Structure  Bigger group in different locations worldwide  No formal protocol for communication due to proximity  Dependent on other group to carry out their task (overlapping groups)  Decision Process:  Indirect higher level of management  Disclosure:  Don’t want certain information to go out because the code is not clean enough (dignitary harm)  Share privacy with someone outside the group: interns have access of repository as part of their job  Privacy Practices  Code is on isolated server on internal network, need to be on company VPN to check in  For sensitive information regarding the company employees depends on manager for advice.  No worry about being so secure because it is not used for sensitive information 17 Individual Interviews

Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science  Group Structure:  Group established by job title and description  Added to a group if profile fits well the group  Type of sensitive information:  Hiring  Compensation  Employee records  Performance review  Ways of communicating: Depends on the sensitivity of the information  Verbally   Videoconference  Internal social network  Other internal system **Level of person determines what kind of information they have access to. 18 Focus Group

Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science  Security concerns:  Information sent via  Accidental typos in the To fields  Legal reasons  Privacy Practices:  Use of prefix in the subject line: confidential, private, urgent  Encryption used to send sensitive information  Use of VPN for remote access of the internal network  HR goes over the handbook with new employees  Lock compute, password to protect workstation, badge 19 Focus Group If it is an important I will stare at it for like 10 minutes before I send it.

Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science  Disclosure:  sent to the right recipient with unintended content  Talking about someone’s performance and including that person in the To field  chains  Use video conferencing instead of phone for a better privacy context of the other person 20 Focus Group “There have been times I know there are a certain type of conversation that will only have over the phone because of the nature of the subject.”

Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science  Privacy Behaviors: Activities in response to internal or external stimuli -> Categories: - Avoidance: Not performing an originally intended action because of privacy concerns - Modification: Performing an action not in the intended manner - Alleviatory behavior: Taking action to prevent the spread of information, reducing consequences 21 Important Definitions

Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science  No conclusion can be drawn yet  Tag of privacy behaviors and boundary regulation  Need of more focus groups and Interviews 22 Future Work and Conclusion

Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science 23 Questions