Privacy and security putting people first
1 / 16

Privacy and Security: - PowerPoint PPT Presentation

  • Uploaded on

Everyday Computing: Understand the transformation of everyday life as computing is ...

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'Privacy and Security:' - Kelvin_Ajay

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Privacy and security putting people first l.jpg

Privacy and Security:Putting People First

Elizabeth Mynatt

College of Computing & GVU Center

Georgia Institute of Technology

Atlanta GA USA

Vantage point l.jpg

Associate ProfessorCollege of ComputingAssociate DirectorGVU CenterGeorgia Tech

Vantage point

Everyday Computing: Understand the transformation of everyday life as computing is ubiquitously integrated into informal, daily activities and routines

Ubiquitous Computing(Xerox PARC, 1995-1998)

GT “Aware Home”

Putting people first l.jpg
Putting People First

  • How to make informed (proactive) choices about sharing information?

  • How to learn how other people protect their information?

  • How to share information with an intended audience?(e.g. friends, my family and their friends)

  • Much more than usability–What is the framework for social communication?

People are social creatures l.jpg
People are Social Creatures

  • Communication

  • Processes

    • Social navigation

    • Legitimate peripheral participation

    • Social translucence

  • Structures

    • Relationships

    • Social networks

Social navigation l.jpg
Social Navigation

A crowd draws a crowd

Social navigation acumen l.jpg
Social Navigation: Acumen

“What cookies should I block?”

Critics mavens reviewers l.jpg
Critics, mavens & reviewers

  • Gladwell, The Tipping Point

  • Feick and Price, “The Market Maven: A Diffuser of Marketplace Information,” Journal of Marketing, Jan ‘87

Consumer s report for security and privacy l.jpg
Consumer’s Report™ for Security and Privacy??

Sharing information digital family portrait l.jpg
Sharing Information: Digital Family Portrait

Maintain awareness over distance

Augment common household object

Support “peace of mind”

Social networks l.jpg
Social Networks

  • Clusters

  • Jumps

  • Boundaries

  • Weight

  • Connectors

Saori social sharing l.jpg
Saori: Social Sharing

“Pictures for family friends but not internet weirdos”

“Trusted colleagues in human computer interaction”

  • Information sharing based shape & properties of social network

  • Structured broadcast

  • Constrained person-to-person

  • Benefits vs. burden

Social translucence l.jpg
Social Translucence

  • “I know that you know that I know”

  • Privacy Mirrors

    • Reflection of whatpeople can see

    • Inform informationdisclosure overtime

Privacy paradox l.jpg
Privacy Paradox

  • Sharing information to help ensure privacy and security

  • Acumen: web browsing

  • Digital family portrait: monitoring

  • Saori: social networks

  • Privacy mirror: information access

Putting people first15 l.jpg
Putting People First

  • Usability is just the first step

  • Making decisions is a social process

  • Over time, people learn how to make mature decisions from other people

  • Sharing information is about relationships

  • Integration with social activity is paramount

  • Computing should support all of this…

Thank you l.jpg
Thank you

  • For your time and attention

  • Additional thanks and credit to:

    • The Everyday Computing Lab, especially Jeremy Goecks

    • The Aware Home Research Initiative

    • Cybertrust colleagues at Georgia Tech

  • More information at