Privacy and security putting people first
Download
1 / 16

Privacy and Security: - PowerPoint PPT Presentation


  • 222 Views
  • Uploaded on

Everyday Computing: Understand the transformation of everyday life as computing is ...

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Privacy and Security:' - Kelvin_Ajay


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Privacy and security putting people first l.jpg

Privacy and Security:Putting People First

Elizabeth Mynatt

College of Computing & GVU Center

Georgia Institute of Technology

Atlanta GA USA


Vantage point l.jpg

Associate ProfessorCollege of ComputingAssociate DirectorGVU CenterGeorgia Tech

Vantage point

Everyday Computing: Understand the transformation of everyday life as computing is ubiquitously integrated into informal, daily activities and routines

Ubiquitous Computing(Xerox PARC, 1995-1998)

GT “Aware Home”


Putting people first l.jpg
Putting People First

  • How to make informed (proactive) choices about sharing information?

  • How to learn how other people protect their information?

  • How to share information with an intended audience?(e.g. friends, my family and their friends)

  • Much more than usability–What is the framework for social communication?


People are social creatures l.jpg
People are Social Creatures

  • Communication

  • Processes

    • Social navigation

    • Legitimate peripheral participation

    • Social translucence

  • Structures

    • Relationships

    • Social networks


Social navigation l.jpg
Social Navigation

A crowd draws a crowd


Social navigation acumen l.jpg
Social Navigation: Acumen

“What cookies should I block?”


Critics mavens reviewers l.jpg
Critics, mavens & reviewers

  • Gladwell, The Tipping Point

  • Feick and Price, “The Market Maven: A Diffuser of Marketplace Information,” Journal of Marketing, Jan ‘87


Consumer s report for security and privacy l.jpg
Consumer’s Report™ for Security and Privacy??



Sharing information digital family portrait l.jpg
Sharing Information: Digital Family Portrait

Maintain awareness over distance

Augment common household object

Support “peace of mind”


Social networks l.jpg
Social Networks

  • Clusters

  • Jumps

  • Boundaries

  • Weight

  • Connectors


Saori social sharing l.jpg
Saori: Social Sharing

“Pictures for family friends but not internet weirdos”

“Trusted colleagues in human computer interaction”

  • Information sharing based shape & properties of social network

  • Structured broadcast

  • Constrained person-to-person

  • Benefits vs. burden


Social translucence l.jpg
Social Translucence

  • “I know that you know that I know”

  • Privacy Mirrors

    • Reflection of whatpeople can see

    • Inform informationdisclosure overtime


Privacy paradox l.jpg
Privacy Paradox

  • Sharing information to help ensure privacy and security

  • Acumen: web browsing

  • Digital family portrait: monitoring

  • Saori: social networks

  • Privacy mirror: information access


Putting people first15 l.jpg
Putting People First

  • Usability is just the first step

  • Making decisions is a social process

  • Over time, people learn how to make mature decisions from other people

  • Sharing information is about relationships

  • Integration with social activity is paramount

  • Computing should support all of this…


Thank you l.jpg
Thank you

  • For your time and attention

  • Additional thanks and credit to:

    • The Everyday Computing Lab, especially Jeremy Goecks

    • The Aware Home Research Initiative

    • Cybertrust colleagues at Georgia Tech

  • More information at www.cc.gatech.edu/fce/ecl


ad