Social Reading and Privacy Norms: The Aesthetic of Simplicity, Online Reading, and Interface Confusion J. Richard Stevens.

Slides:



Advertisements
Similar presentations
Seeing and Organizing Identity Online thoughts on digital context, perception of self and identity management.
Advertisements

+ Using technology to differentiate the curriculum for Gifted students Judy Lymbery GATE/e-learning advisor Victoria University, Wellington.
They’re Computer Savvy, Right? Well, Maybe…
David Ruse Society of Chief Librarians. What I want to cover  What is SCL  Some basic facts  Future role and purpose of libraries  Models of Governance.
Customer Interface. Agenda  What are the seven design elements of the customer interface?  What determines the look-and-feel of the site?  What are.
Curriculum Project Garred Kirk. EARL 1: Civics The student understands and applies knowledge of government, law, politics, and the nation’s fundamental.
Chapter 1 Introduction. “How do I send picture by ?” “Click on Attach button, or paper clip icon, select the picture and click attach” The instructions.
Content: Presenter: Bülent Duagi.
Computers and Law - Srishti Mehra – Team 2. What is Computer Law? Cross over of a number of legal areas affecting: Design and use of computers and software.
OASIS Reference Model for Service Oriented Architecture 1.0
+ Ways of interpreting film texts. + How do viewers discern meaning in film texts? Are we “meaning detectives”- with our main job to look for the meanings.
Clothing reveals: -both the themes and the formal relationships which serve a culture as orienting ideas, and - the real or imagined basis according to.
“COMPUTER-MEDIATED COMMUNICATION IS NOT JUST A TOOL; IT IS AT ONCE TECHNOLOGY, MEDIUM AND ENGINE OF SOCIAL RELATIONS. STEVEN G. JONES, CYBERSOCIETY Interviewing.
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
FindAnyFilm.com All films. All above board. All in one place.
THE NEW TEXAS CORE CURRICULUM (OCTOBER 27, 2011).
PRIMARY/SECONDARY SOURCE HISTORY LABS SOCIAL STUDIES CRITICAL THINKING LABS.
1. Human – the end-user of a program – the others in the organization Computer – the machine the program runs on – often split between clients & servers.
Intranet, Extranet, Firewall. Intranet and Extranet.
FACEBOOK AS A LEARNING TOOL Implications for ubiquitous learning.
E-Portfolios in Nursing Education. Tim Snashall. At a School of Nursing somewhere in the North West -
Ciarán O’Leary Wednesday, 23 rd September Ciarán O’Leary School of Computing, Dublin Institute of Technology, Kevin St Research Interests Distributed.
Principles of User Centred Design Howell Istance.
Ahmed El Gody Media and Communication Studies Örebro University.
Describing Methodologies PART II Rapid Application Development* Systems Analysis and Design II.
Presenting History Using Photostory January 2010 History Connected Teaching American History Grant Connections to Standards: Massachusetts History and.
1 The Web & Professional Communication English 3104.
 Examines the nature of culture and the diverse ways in which societies make meaning and are organized across time and space. Topics include cultural.
Presentation Outline What is a wiki? How does wiki work? Choosing a Wiki plan The educational benefits of a Wiki Wikis in higHeR eDucation Plans and Pricing.
Today Thursday Introduction to HCI and Contextual Design Course Introduction CS 321 Human-Computer Interaction Jerry B. Weinberg Reading: CD: Chapter.
OPERATING SYSTEMS Goals of the course Definitions of operating systems Operating system goals What is not an operating system Computer architecture O/S.
The Press, The Public & Politics. Overview The Role of the Media The Power of the Media?
Nagwa Abdel Salam Fahmy Prof of Journalism Mass Communication Dep. Faculty of Arts, Ain Shams University.
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
Chapter 2.2 Game Design. CS Overview This introduction covers: –Terms –Concepts –Approach All from a workaday viewpoint.
Technology In The Classroom Series Technology In The Classroom.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Holly, Pam, Karen, Bonnie, Bryan, Chantal. The National Counsil for the Social Studies said, « Powerful social studies teaching is integrative across.
Human Computer Interaction CITB 243 Chapter 1 What is HCI
Date 23 rd Jan Shatin 沙田 Mobile Information Architecture.
Digital Life: Our Kids’ Connected Culture. A life online…
Overview of the IWB Research. The IWB Research Literature: Is overwhelmingly positive about their potential. Primarily based on the views of teachers.
Digital Libraries Lillian N. Cassel Spring A digital library An informal definition of a digital library is a managed collection of information,
Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.
Communication/Discourse “Discourse can be described as a pattern of words, figures of speech, concepts, values, and symbols. A discourse is a coherent.
Unit 8 AO2. 1. Learn about a recent technological innovation 2. Research and present information including:  What the innovation is  How it works 
MOBILE INFORMATION LITERACY CURRICULUM Module 5 Slides: Putting It All Together.
Article: Article: ‘ Ignorant Theory And Knowledgeable Workers: Interrogating the Connections between Knowledge, Skills and Services ’ By : By : Paul Thompson,
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Collective Information Practice: Exploring Privacy and Security as Social and Cultural.
MOBILE INFORMATION LITERACY CURRICULUM Module 4 Slides: Working Online and Using Information via Mobile Devices.
IB: Language and Literature
MOBILE INFORMATION LITERACY CURRICULUM Module 1 Slides: Introduction to Mobile Information & Communication Technologies (ICTs)
David Herring NOAA Climate Program Office May 28, 2013 NOAA Climate.gov A brief overview and highlights of what’s new.
Institutional Mapping for GECAFS research Some thoughts on why and how.
HCI Meeting 1 Thursday, August 26. Class Activities [1] Student questionnaire Answer the following questions: 1.When and where was the computer mouse.
MKT 346: Marketing of Services Dr. Houston Chapter 5: Distributing Services Through Physical and Electronic Channels.
1 C H A P T E R © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in.
TECHNICAL WRITING 2013 UNIT 3: DESIGNING FOR CHANGE.
MOBILE INFORMATION LITERACY CURRICULUM Module 6 Slides: Module 5 Project Presentations.
THE USE OF MODERN TECHNOLOGY IN THE EFL CLASSROOM. AN EVALUATION OF TECHNOLOGY AS A TOOL IN LANGUAGE TEACHING. Jacob Burdette.
Social Media & Social Networking 101 Canadian Society of Safety Engineering (CSSE)
>>0 >>1 >> 2 >> 3 >> 4 >> Privacy and SNS in China Comundus-European Master of Arts in Media, Communication and Cultural Study Jin PENG the case of xiaonei.com.
Copyright 2006 John Wiley & Sons, Inc Chapter 5 – Cognitive Engineering HCI: Developing Effective Organizational Information Systems Dov Te’eni Jane Carey.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
Welcome.
Chapter 12 issues for Collaborative Discussion and Reflection
Relational Benefits and Costs in Social Media Brand Pages
Rob Gleasure IS3320 Developing and Using Management Information Systems Lecture 1: Introduction to IS3320 Rob Gleasure.
Computer-Mediated Communication
How did digital ads impact the 2016 election?
Presentation transcript:

Social Reading and Privacy Norms: The Aesthetic of Simplicity, Online Reading, and Interface Confusion J. Richard Stevens

The Paradox of Data Privacy Studies show Americans are generally concerned about data privacy (Stevens, 2007; Stutzman, 2006; Solove, 2004; Palen and Dourish, 2003) but do little to protect their private data (boyd, 2004; Gross and Acquisti, 2006; Jupiter Research, 2002) and continually adjust expectations to meet offered choices (Palen and Dourish, 2003; Bennett, Raab & Regan, 2003; Friedman, 1997; Murphy, 1964).

Privacy Defined Solove (2007) argues: “… the quest for a traditional definition of privacy has led to a rather fruitless and unresolved debate. In the meantime, there are real problems that must be addressed, but they are either conflated or ignored because they do not fit into various prefabricated conceptions of privacy” (759). Privacy as reaction to technological innovation Privacy controversies as routinized moral panics

Privacy and Context Decisions concerning information disclosure depend heavily on the circumstances, audience and perceived implications of the potential disclosure (Rosen, 2000) Privacy decisions are largely informed by expectations, expectations that rely on contextual cues Online, context is communicated through design aesthetics and affordances.

HCI and Interface Studies Classic Human-Computer Interaction has historically focused on usability, the effectiveness of design in allowing users to achieve their goals. Usability is usually defined in terms of a lack of obstruction or complexity Recent moves to examine aesthetics of interface as factors in encouraging particular behaviors. Design aesthetics communicate context: sense of “place” (Harrison and Dourish 1996) and interface interpretations (Dourish and Button 1998) for transactions.

Privacy Expectations and Interface Design Interface designs increasingly utilize affordances of simplicity to increase user confidence and performance + Back-end architecture is increasingly complex, creating “architectures of vulnerability” (Solove 2004) + Low user digital literacy = Increasing gulf between how tools APPEAR to function to users and the actual functionality of back-end tools

Interface Disconnections... the importance of interface design revolves around this apparent paradox: we live in a society that is increasingly shaped by events in cyberspace, and yet cyberspace remains, for all practical purposes, invisible, outside our perceptual grasp. Our only access to this parallel universe of zeros and ones runs through the conduit of the computer interface, which means that the most dynamic and innovative region of the modern word reveals itself through the anonymous middlemen of interface design (Johnson 1997, 19). “As far as the customer is concerned, the interface is the product” (Raskin 2000, 5) Hutchins et al.’s (1986) “gulf of interpretation” - difficulty of interpreting system’s state as a response to a user’s command

Open Graph Facebook protocol enabling “frictionless sharing,” introduced September First 9 weeks: Yahoo Social Reader - 10 million users The Guardian Social Reader - 4 million users The Washington Post million users

Privacy Controls/Permissions

Importance of Aesthetics In physical space, architecture creates psychological and social effects (Tuan 1977) including altering individual conduct (Katyal 2002). “Information design makes information understandable by giving it a context. Information design builds new relationships between thoughts and places” (Mok 1996, 46).

Washington Post Social Reader Permissions

Unconscious Promotion

Social Readers Increase Architectures of Vulnerability News media organizations using social reader exacerbate by appearing to offer content as an enticement for installing software. “Okay, Read Article” = install reader software, become unpaid distributor of content for a media organization. “Cancel” = don’t install, read article on website Result: further undermining of user contextual assessment, user surprise at results of choice (if comparative results of choice options are even detected)