Presentation is loading. Please wait.

Presentation is loading. Please wait.

Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.

Similar presentations


Presentation on theme: "Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and."— Presentation transcript:

1 Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and analyzing privacy

2 Readings analyzing privacy Readings Unpacking “Privacy” for a Networked World Palen, Dourish Prototyping and Sampling Experience to Evaluate Ubiquitous Computing Privacy in the Real World Iachello, Truong, Abowd, Hayes, Stevens 2 Research Topics in Ubiquitous Computing Ben Elgart

3 Overview: model of privacy overview Palen & Dourish present model for privacy  Based on theory by social psychologist Irwin Altman  Concept of privacy as dynamic, dialectic process Privacy management as a balancing act  Multiple factors govern these social interactions  Case studies involving technology illustrate model 3 Research Topics in Ubiquitous Computing Ben Elgart

4 Introduction: traditional approach traditional approach in hci Design of pervasive and mobile systems  Interactions with systems impact personal privacy  New technologies introduce novel situations Relationship between privacy and technology  Consider outside of static, rule-based systems  Draw on earlier concepts to operationalize privacy for new situations involving information technology 4 Research Topics in Ubiquitous Computing Ben Elgart

5 Privacy regulation theory privacy regulation theory Altman sees privacy between individuals: “As a dialectic process, privacy regulation is conditioned by our own expectations and experiences, and by those of others with whom we interact.” “As a dynamic process, privacy is understood to be under continuous negotiation and management, with the boundary that distinguishes privacy and publicity refined according to circumstance.” (Palen and Dourish, 2003) 5 Research Topics in Ubiquitous Computing Ben Elgart

6 Privacy management privacy management Privacy as a social negotiation: “Privacy management is a process of give and take between and among technical and social entities— from individuals to groups to institutions—in ever- present and natural tension with the simultaneous need for publicity. Our central concern is with how this process is conducted in the presence of information technology.” (Palen and Dourish, 2003) 6 Research Topics in Ubiquitous Computing Ben Elgart

7 Limitations of Altman’s model of privacy altman’s model: limitations For managing personal access in interactions: circumstance = f(local physical environment, audience, social status, task or objective, motivation and intention, information technology) information technology ≠ spatial environment 7 Research Topics in Ubiquitous Computing Ben Elgart

8 Privacy outside physicality privacy outside physicality When digital information flows outside physical and temporal constraints, it changes the way to regulate privacy. 8 Research Topics in Ubiquitous Computing Ben Elgart

9 Boundaries manage privacy and are in tension boundaries manage privacy Disclosure boundary  Control of privacy and publicity in contexts Identity boundary  Display of affiliation before an audience Temporality boundary  Interpretations of and actions upon disclosed info from different points in time 9 Research Topics in Ubiquitous Computing Ben Elgart

10 Neutral Technology Genres of Disclosure neutrality of technology Genres of Disclosure shape privacy issues  Social expectation and interpretation of action Systems support different understanding  Family Intercom  Shared Calendars  Active Badges  Cellphones  IM 10 Research Topics in Ubiquitous Computing Ben Elgart

11 Overview: paratype overview A particular ubicomp prototype was studied Test tool for evaluating privacy concerns 11 Research Topics in Ubiquitous Computing Ben Elgart

12 New method: paratype inquiry method: paratype  Combines prototyping and sampling experience  Solicits feedback on ubicomp technology  Focuses on assessing real-life experience, not simulations nor testing the system  Proposed for investigating social domains 12 Research Topics in Ubiquitous Computing Ben Elgart

13 Evaluation challenge? evaluation challenge? Personal Audio Loop (PAL)  Memory aid to replace recent audio recordings Study participants respond with uses for device  Also raised concerns about impact on privacy What types of understanding does the system support?  What interactions?  What users?  What environments? 13 Research Topics in Ubiquitous Computing Ben Elgart

14 Methods of study methods of study Three proxies: ages 27-31  Used PAL in daily activities Paratype: interaction in real-world simulation  Proxie solicited opinions for specific conversation  Half of respondents were in related work fields  3/4 identified importance with being informed of use  On average, important that proxie ask permission  Same for replaying audio to others  Retention time not of concern 14 Research Topics in Ubiquitous Computing Ben Elgart

15 Paratype, for privacy? paratype, for privacy? Did the scenarios reflect circumstances that reveal issues for privacy management? 15 Research Topics in Ubiquitous Computing Ben Elgart

16 Further consideration 16 Research Topics in Ubiquitous Computing Ben Elgart

17 Questions, Comments questions, comments ? 17 Research Topics in Ubiquitous Computing Ben Elgart


Download ppt "Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and."

Similar presentations


Ads by Google