1 / 16

Privacy and Security:

Everyday Computing: Understand the transformation of everyday life as computing is ...

Kelvin_Ajay
Download Presentation

Privacy and Security:

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy and Security:Putting People First Elizabeth Mynatt College of Computing & GVU Center Georgia Institute of Technology Atlanta GA USA

  2. Associate ProfessorCollege of ComputingAssociate DirectorGVU CenterGeorgia Tech Vantage point Everyday Computing: Understand the transformation of everyday life as computing is ubiquitously integrated into informal, daily activities and routines Ubiquitous Computing(Xerox PARC, 1995-1998) GT “Aware Home”

  3. Putting People First • How to make informed (proactive) choices about sharing information? • How to learn how other people protect their information? • How to share information with an intended audience?(e.g. friends, my family and their friends) • Much more than usability–What is the framework for social communication?

  4. People are Social Creatures • Communication • Processes • Social navigation • Legitimate peripheral participation • Social translucence • Structures • Relationships • Social networks

  5. Social Navigation A crowd draws a crowd

  6. Social Navigation: Acumen “What cookies should I block?”

  7. Critics, mavens & reviewers • Gladwell, The Tipping Point • Feick and Price, “The Market Maven: A Diffuser of Marketplace Information,” Journal of Marketing, Jan ‘87

  8. Consumer’s Report™ for Security and Privacy??

  9. Legitimate Peripheral Participation

  10. Sharing Information: Digital Family Portrait Maintain awareness over distance Augment common household object Support “peace of mind”

  11. Social Networks • Clusters • Jumps • Boundaries • Weight • Connectors

  12. Saori: Social Sharing “Pictures for family friends but not internet weirdos” “Trusted colleagues in human computer interaction” • Information sharing based shape & properties of social network • Structured broadcast • Constrained person-to-person • Benefits vs. burden

  13. Social Translucence • “I know that you know that I know” • Privacy Mirrors • Reflection of whatpeople can see • Inform informationdisclosure overtime

  14. Privacy Paradox • Sharing information to help ensure privacy and security • Acumen: web browsing • Digital family portrait: monitoring • Saori: social networks • Privacy mirror: information access

  15. Putting People First • Usability is just the first step • Making decisions is a social process • Over time, people learn how to make mature decisions from other people • Sharing information is about relationships • Integration with social activity is paramount • Computing should support all of this…

  16. Thank you • For your time and attention • Additional thanks and credit to: • The Everyday Computing Lab, especially Jeremy Goecks • The Aware Home Research Initiative • Cybertrust colleagues at Georgia Tech • More information at www.cc.gatech.edu/fce/ecl

More Related