540 likes | 665 Views
Cars, Condoms, & Information Sharing How Private is Private Enough?. Vaibhav Garg. Drexel University. Cars. J. Adams. Cars, cholera, and cows. CATO Institute, 335: 1– 49, 1999. . Seat Belt Habit. http:// youtu.be /Fa5BVk9mbSY. Condoms.
E N D
Cars, Condoms, & Information SharingHow Private is Private Enough? Vaibhav Garg Drexel University
Cars J. Adams. Cars, cholera, and cows. CATO Institute, 335: 1–49, 1999.
Seat Belt Habit • http://youtu.be/Fa5BVk9mbSY
Condoms M. Cassell, D. Halperin, J. Shelton, and D. Stanton. Risk compensation: The Achilles’ heel of innovations in HIV prevention? British Medical Journal, 332(7541):605–607, 2006.
Privacy L. Brandimarte, A. Acquisti, and G. Loewenstein. Misplaced confidences: Privacy and the control paradox. Social Psychological and Personality Science, 2012.
Risk Comes from the Italian word ‘risicare’ Probability * Magnitude
Rational Agent Smoking is a factor which contributes to lung cancer. Most cancers that start in lung, known as primary lung cancers, are carcinomas that derive from epithelial cells. Depending on the type of tumor, so-called paraneoplastic phenomena may initially attract attention to the disease.[16] In lung cancer, these phenomena may include Lambert-Eaton myasthenic syndrome (muscle weakness due to auto-antibodies), hypercalcemia, or syndrome of inappropriate antidiuretic hormone (SIADH). Tumors in the top (apex) of the lung, known as Pancoast tumors,[17] may invade the local part of the sympathetic nervous system, leading to changed sweating patterns and eye muscle problems (a combination known as Horner's syndrome) as well as muscle weakness in the hands due to invasion of the brachial plexus.
People don’t care Complete Information == Market Efficiency R. A. Posner. The Economics of Privacy. American Economic Review, 71(2):405-409, 1981.
People don’t know Info graphic from Matt McKeon.
Usability P. Inglesant and M. Sasse. The true cost of unusable password policies: password use in the wild. In Proceedings of the 28th International conference on Human factors in computing systems, pages 383–392. ACM, 2010.
Risk Comes from the Italian word ‘risicare’ Probability * Magnitude
Boundedly Rational J. Grossklags and A.Acquisti. When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information. Workshop on Economics of Information Security. 2007.
Certainty Effect Bird in hand is worth two in the bush! For sure! Maybe! P=0.1
Reflection Effect LoseFor sure! We prefer certain gains but uncertain losses! Lose Maybe! P=0.1
Boundedly Rational J. Grossklags and A.Acquisti. When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information. Workshop on Economics of Information Security. 2007.
Nine Dimensional Model • Voluntariness • Immediacy • Knowledge to Experts • Knowledge to Exposed • Control • Newness • Common-Dread • Chronic-Catastrophic • Severity B. Fischhoff, P. Slovic, S. Lichtenstein, S. Read, and B. Combs. How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits. Policy Sciences, 9(2):127–152, 1978.
Revealed Preferences • Revealed Preferences • Attitudes are reflected by behavior • Traditionally Acceptable ‘The… assumption is that historically revealed social preferences and costs are sufficiently enduring to permit their use for predictive purposes.’ C. Starr. Social benefit versus technological risk. Science, 165(3899):1232–1238, 1969.
Expressed Preferences • Expressed Preferences • Behaviors are informed by attitudes • What end-users want or acceptable risk? ‘The societal value system fluctuates with time, and the technological capability to follow fast changing societal goals does not exist.’ C. Starr, R. Rudman, and C. Whipple. Philosophical Basis for Risk Analysis. Annual Review of Energy, 1:629-662, 1976.
Nine Dimensional Model • Voluntariness • Immediacy • Knowledge to Experts • Knowledge to Exposed • Control • Newness • Common-Dread • Chronic-Catastrophic • Severity B. Fischhoff, P. Slovic, S. Lichtenstein, S. Read, and B. Combs. How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits. Policy Sciences, 9(2):127–152, 1978.
Rational Risk Communication Smoking is a factor which contributes to lung cancer. Most cancers that start in lung, known as primary lung cancers, are carcinomas that derive from epithelial cells. Depending on the type of tumor, so-called paraneoplastic phenomena may initially attract attention to the disease.[16] In lung cancer, these phenomena may include Lambert-Eaton myasthenic syndrome (muscle weakness due to auto-antibodies), hypercalcemia, or syndrome of inappropriate antidiuretic hormone (SIADH). Tumors in the top (apex) of the lung, known as Pancoast tumors,[17] may invade the local part of the sympathetic nervous system, leading to changed sweating patterns and eye muscle problems (a combination known as Horner's syndrome) as well as muscle weakness in the hands due to invasion of the brachial plexus.
Mental Models • Physical • Criminal • Medical • Warfare • Economic
Privacy Case Study • Phishing • Keyloggers • Older Adults
Why Older Adults? • Fastest growing demographic • Susceptibility to fraud • 20% of the victims (FTC) • 1/10th of publicly held bonds • 1/3rd of publicly held stock
Why Design for Older Adults • Designs for younger people • Assumptions • Technical experience • Sight, focus, dexterity • Risk posture
Design Constraints • Memory • Semantic • Learnt • Lasts longer • Retention is better • Episodic • Experienced • Richer • Retrieval is better! • Mental Models • Physical, Criminal, Economic, Medical, and Warfare