Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.

Slides:



Advertisements
Similar presentations
Qualitative Social Research Methods Using Interviews in Research. Leah Wild.
Advertisements

Computer-Supported Collaborative Learning (CSCL), Virtual Math Teams (VMT), Group Cognition Gerry Stahl.
Getting to Know Us College of Business Presentation 4/29/09
Mobile applications Mobile applications have been a domain for recommendation –small display sizes and space limitations –naturally require.
The Usage of Social Networks In Educational Context Sacide Güzin MAZMAN, Yasemin KOÇAK USLUEL Hacettepe University, Faculty of Education Department of.
M-learning thru M-devices- Is it real learning?. Real challenges? Mobility – a fad, trend or a culture? Learning – have we change our learning behaviour?
1 Design, Prototyping, and Evaluation in Developing Countries Jen Mankoff, Assistant Professor EECS.
Beyond Prototypes: Challenges in Deploying Ubiquitous Systems N. Davies and H. Gellersen IEEE pervasive computing, 2002 Presenter: Min Zhang
Design for families Rikard Harr November 2010 © Rikard Harr Outline Short on: Participatory design Short on: Ubiquitous computing and the modern.
UNIVERSITY OF JYVÄSKYLÄ Faculty of Information Technology UNIVERSITY OF JYVÄSKYLÄ Faculty of Information Technology Jenni Rikala PhD student University.
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
A Brief Introduction to Classroom Assessment Techniques Strategies to Help You Help Your Students.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Network Routing Algorithms Patricia Desire Marconi Academy, CPS IIT Research Mentor: Tricha Anjali This material is based upon work supported by the National.
Ubiquitous Computing Computers everywhere. Agenda Old future videos
Ubiquitous Computing Computers everywhere.
Real-Time Systems and the Aware Home Anind K. Dey Ubiquitous Computing Future Computing Environments.
Analysis Concepts and Principles
Multilevel Security in Location Aware Applications Alexander Ng Monash University Masters of Computing (Research) Supervisor: A/P Arkady Zaslavsky.
Feedback from Usability Evaluation to User Interface Design: Are Usability Reports Any Good? Christian M. Nielsen 1 Michael Overgaard 2 Michael B. Pedersen.
Copyright 2001 by Allyn and Bacon Social Cognitive and Constructivist Views of Learning: Chapter 9.
Chapter 3 Preparing and Evaluating a Research Plan Gay and Airasian
Security as Experience & Practice Supporting Everyday Security Paul Dourish Donald Bren School of Information and Computer Sciences & California Institute.
User Centered Design Lecture # 5 Gabriel Spitz.
Investigator: Kyle Johnson Project Supervisors: Prof. Hannah Thinyane Mrs. Ingrid Siebörger.
Performance-Based Assessment June 16, 17, 18, 2008 Workshop.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
Communication Degree Program Outcomes
Ciarán O’Leary Wednesday, 23 rd September Ciarán O’Leary School of Computing, Dublin Institute of Technology, Kevin St Research Interests Distributed.
Cognitive Task Analysis and its Application to Restoring System Security by Robin Podmore, IncSys Frank Greitzer, PNNL.
Chapter 11: An Evaluation Framework Group 4: Tony Masi, Sam Esswein, Brian Rood, & Chris Troisi.
1 Pedagogical implications of mobile technologies Diana Laurillard WLE Symposium on M-Learning 9 February 2007.
Standards-Based Science Instruction. Ohio’s Science Cognitive Demands Science is more than a body of knowledge. It must not be misperceived as lists of.
Educator Effectiveness Academy STEM Follow-Up Webinar December 2011.
Some Computer Science Issues in Ubiquitous Computing Presenter : Junghee-Han Mark Weiser Communications of the ACM, July 1993.
Presented by Abirami Poonkundran.  Introduction  Current Work  Current Tools  Solution  Tesseract  Tesseract Usage Scenarios  Information Flow.
Ubiquitous Computing Computers everywhere. Where are we going? What happens when the input is your car pulls into the garage, and the output is the heat.
+ Interaction Design User Centred Design. + Does the Interface Make sense? Characteristics of successful ID Products makes sense to the users when they.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy and Trust: Social Factors Presented By: David Shelly Usable Security – CS.
Creating a Shared Vision Model. What is a Shared Vision Model? A “Shared Vision” model is a collective view of a water resources system developed by managers.
Tools for Understanding Relationships in Resilience Interventions.
Computer Science Department California Polytechnic State University San Luis Obispo, CA, U.S.A. Franz J. Kurfess CPE/CSC 484: User-Centered Design and.
1 Chapter 7 Designing for the Human Experience in Smart Environments.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
ATL’s in the Personal Project
VIRTUAL WORLDS IN EDUCATIONAL RESEARCH © LOUIS COHEN, LAWRENCE MANION & KEITH MORRISON.
Chapter 12: Introducing Evaluation. The aims To illustrate how observation, interviews and questionnaires that you encountered in Chapters 7 and 8 are.
Chapter 12: Introducing Evaluation. The aims To illustrate how observation, interviews and questionnaires that you encountered in Chapters 7 and 8 are.
Supplementary Power Point Slides Social Research Methods, Week 11
Introduction defining communication. communication let’s draw our map.
MA3C0207 丁筱雯.  Qualitative research is uniquely suited to discovery and exploration.  A research proposal consists of two sections: WHAT the researcher.
Dobrin / Weisser / Keller: Technical Communication in the Twenty-First Century. © 2010 Pearson Education. Upper Saddle River, NJ, All Rights Reserved.
Topic System Analyst Skills Role of system analyst Analyst user differences.
UBICOMP SYSTEMS: TOPICS & CHALLENGES. New computing model  Heterogeneous devices  Interaction:  Many-to-many  Possibly implicit, invisible, through.
Session VI Evaluation & Wrap Up. Evaluation Activities directed at collecting, analyzing, interpreting, and communicating information about the effectiveness.
“A presence based multimedia call screening service” Egil C. Østhus, now with TANDBERG Lill Kristiansen, Dept of Telematics, NTNU.
Social Reading and Privacy Norms: The Aesthetic of Simplicity, Online Reading, and Interface Confusion J. Richard Stevens.
SBD: Analyzing Requirements Chris North cs3724: HCI.
Quality Is in the Eye of the Beholder: Meeting Users ’ Requirements for Internet Quality of Service Anna Bouch, Allan Kuchinsky, Nina Bhatti HP Labs Technical.
{ Focus Groups An Assessment Tool in Student Affairs Image Retrieved from:
Introduction to Machine Learning, its potential usage in network area,
Stages of Research and Development
Writing Research Proposals
OVERVIEW OF SYSTEM ANALYS AND DESIGN
Leveraging Design-Based Research to Support IT Professional Development in Higher Education Jeffrey Burgazzoli Jr.
Ubiquitous Computing and Augmented Realities
Chapter 13 Interpersonal Communication: A Theoretical Foundation.
Dealing with Validity, Reliability, and Ethics
The Extensible Tool-chain for Evaluation of Architectural Models
Presentation transcript:

Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and analyzing privacy

Readings analyzing privacy Readings Unpacking “Privacy” for a Networked World Palen, Dourish Prototyping and Sampling Experience to Evaluate Ubiquitous Computing Privacy in the Real World Iachello, Truong, Abowd, Hayes, Stevens 2 Research Topics in Ubiquitous Computing Ben Elgart

Overview: model of privacy overview Palen & Dourish present model for privacy  Based on theory by social psychologist Irwin Altman  Concept of privacy as dynamic, dialectic process Privacy management as a balancing act  Multiple factors govern these social interactions  Case studies involving technology illustrate model 3 Research Topics in Ubiquitous Computing Ben Elgart

Introduction: traditional approach traditional approach in hci Design of pervasive and mobile systems  Interactions with systems impact personal privacy  New technologies introduce novel situations Relationship between privacy and technology  Consider outside of static, rule-based systems  Draw on earlier concepts to operationalize privacy for new situations involving information technology 4 Research Topics in Ubiquitous Computing Ben Elgart

Privacy regulation theory privacy regulation theory Altman sees privacy between individuals: “As a dialectic process, privacy regulation is conditioned by our own expectations and experiences, and by those of others with whom we interact.” “As a dynamic process, privacy is understood to be under continuous negotiation and management, with the boundary that distinguishes privacy and publicity refined according to circumstance.” (Palen and Dourish, 2003) 5 Research Topics in Ubiquitous Computing Ben Elgart

Privacy management privacy management Privacy as a social negotiation: “Privacy management is a process of give and take between and among technical and social entities— from individuals to groups to institutions—in ever- present and natural tension with the simultaneous need for publicity. Our central concern is with how this process is conducted in the presence of information technology.” (Palen and Dourish, 2003) 6 Research Topics in Ubiquitous Computing Ben Elgart

Limitations of Altman’s model of privacy altman’s model: limitations For managing personal access in interactions: circumstance = f(local physical environment, audience, social status, task or objective, motivation and intention, information technology) information technology ≠ spatial environment 7 Research Topics in Ubiquitous Computing Ben Elgart

Privacy outside physicality privacy outside physicality When digital information flows outside physical and temporal constraints, it changes the way to regulate privacy. 8 Research Topics in Ubiquitous Computing Ben Elgart

Boundaries manage privacy and are in tension boundaries manage privacy Disclosure boundary  Control of privacy and publicity in contexts Identity boundary  Display of affiliation before an audience Temporality boundary  Interpretations of and actions upon disclosed info from different points in time 9 Research Topics in Ubiquitous Computing Ben Elgart

Neutral Technology Genres of Disclosure neutrality of technology Genres of Disclosure shape privacy issues  Social expectation and interpretation of action Systems support different understanding  Family Intercom  Shared Calendars  Active Badges  Cellphones  IM 10 Research Topics in Ubiquitous Computing Ben Elgart

Overview: paratype overview A particular ubicomp prototype was studied Test tool for evaluating privacy concerns 11 Research Topics in Ubiquitous Computing Ben Elgart

New method: paratype inquiry method: paratype  Combines prototyping and sampling experience  Solicits feedback on ubicomp technology  Focuses on assessing real-life experience, not simulations nor testing the system  Proposed for investigating social domains 12 Research Topics in Ubiquitous Computing Ben Elgart

Evaluation challenge? evaluation challenge? Personal Audio Loop (PAL)  Memory aid to replace recent audio recordings Study participants respond with uses for device  Also raised concerns about impact on privacy What types of understanding does the system support?  What interactions?  What users?  What environments? 13 Research Topics in Ubiquitous Computing Ben Elgart

Methods of study methods of study Three proxies: ages  Used PAL in daily activities Paratype: interaction in real-world simulation  Proxie solicited opinions for specific conversation  Half of respondents were in related work fields  3/4 identified importance with being informed of use  On average, important that proxie ask permission  Same for replaying audio to others  Retention time not of concern 14 Research Topics in Ubiquitous Computing Ben Elgart

Paratype, for privacy? paratype, for privacy? Did the scenarios reflect circumstances that reveal issues for privacy management? 15 Research Topics in Ubiquitous Computing Ben Elgart

Further consideration 16 Research Topics in Ubiquitous Computing Ben Elgart

Questions, Comments questions, comments ? 17 Research Topics in Ubiquitous Computing Ben Elgart