1 / 17

Privacy and Security: Thinking About and Analyzing Privacy

Privacy and Security: Thinking About and Analyzing Privacy. privacy and security. thinking about and analyzing privacy. Research Topics in Ubiquitous Computing. 1. Ben Elgart. analyzing privacy. Readings. Readings Unpacking “Privacy” for a Networked World Palen, Dourish

Download Presentation

Privacy and Security: Thinking About and Analyzing Privacy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy and Security: Thinking About and Analyzing Privacy privacy and security thinking about and analyzing privacy Research Topics in Ubiquitous Computing 1 BenElgart

  2. analyzing privacy Readings Readings Unpacking “Privacy” for a Networked World Palen, Dourish Prototyping and Sampling Experience to Evaluate Ubiquitous Computing Privacy in the Real World Iachello, Truong, Abowd, Hayes, Stevens Research Topics in Ubiquitous Computing 2 BenElgart

  3. overview Overview: model of privacy Palen & Dourish present model for privacy • Based on theory by social psychologist Irwin Altman • Concept of privacy as dynamic, dialectic process Privacy management as a balancing act • Multiple factors govern these social interactions • Case studies involving technology illustrate model Research Topics in Ubiquitous Computing 3 BenElgart

  4. traditional approach in hci Introduction: traditional approach Design of pervasive and mobile systems • Interactions with systems impact personal privacy • New technologies introduce novel situations Relationship between privacy and technology • Consider outside of static, rule-based systems • Draw on earlier concepts to operationalize privacy for new situations involving information technology Research Topics in Ubiquitous Computing 4 BenElgart

  5. privacy regulation theory Privacy regulation theory Altman sees privacy between individuals: • “As a dialectic process, privacy regulation is conditioned by our own expectations and experiences, and by those of others with whom we interact.” • “As a dynamic process, privacy is understood to be under continuous negotiation and management, with the boundary that distinguishes privacy and publicity refined according to circumstance.” (Palen and Dourish, 2003) Research Topics in Ubiquitous Computing 5 BenElgart

  6. privacy management Privacy management Privacy as a social negotiation: • “Privacy management is a process of give and take between and among technical and social entities—from individuals to groups to institutions—in ever-present and natural tension with the simultaneous need for publicity. Our central concern is with how this process is conducted in the presence of information technology.” (Palen and Dourish, 2003) Research Topics in Ubiquitous Computing 6 BenElgart

  7. altman’s model: limitations Limitations of Altman’s model of privacy For managing personal access in interactions: circumstance = f(local physical environment, audience, social status, task or objective, motivation and intention, information technology) information technology ≠ spatial environment Research Topics in Ubiquitous Computing 7 BenElgart

  8. privacy outside physicality Privacy outside physicality When digital information flows outside physical and temporal constraints, it changes the way to regulate privacy. Research Topics in Ubiquitous Computing 8 BenElgart

  9. boundaries manage privacy Boundaries manage privacy and are in tension Disclosure boundary • Control of privacy and publicity in contexts Identity boundary • Display of affiliation before an audience Temporality boundary • Interpretations of and actions upon disclosed info from different points in time Research Topics in Ubiquitous Computing 9 BenElgart

  10. neutrality of technology Neutral Technology Genres of Disclosure Genres of Disclosure shape privacy issues • Social expectation and interpretation of action Systems support different understanding • Family Intercom • Shared Calendars • Active Badges • Cellphones • IM Research Topics in Ubiquitous Computing 10 BenElgart

  11. overview Overview: paratype A particular ubicomp prototype was studied Test tool for evaluating privacy concerns Research Topics in Ubiquitous Computing 11 BenElgart

  12. inquiry method: paratype New method: paratype • Combines prototyping and sampling experience • Solicits feedback on ubicomp technology • Focuses on assessing real-life experience, not simulations nor testing the system • Proposed for investigating social domains Research Topics in Ubiquitous Computing 12 BenElgart

  13. evaluation challenge? Evaluation challenge? Personal Audio Loop (PAL) • Memory aid to replace recent audio recordings Study participants respond with uses for device • Also raised concerns about impact on privacy What types of understanding does the system support? • What interactions? • What users? • What environments? Research Topics in Ubiquitous Computing 13 BenElgart

  14. methods of study Methods of study Three proxies: ages 27-31 • Used PAL in daily activities Paratype: interaction in real-world simulation • Proxie solicited opinions for specific conversation • Half of respondents were in related work fields • 3/4 identified importance with being informed of use • On average, important that proxie ask permission • Same for replaying audio to others • Retention time not of concern Research Topics in Ubiquitous Computing 14 BenElgart

  15. paratype, for privacy? Paratype, for privacy? Did the scenarios reflect circumstances that reveal issues for privacy management? Research Topics in Ubiquitous Computing 15 BenElgart

  16. Further consideration Research Topics in Ubiquitous Computing 16 BenElgart

  17. questions, comments Questions, Comments ? Research Topics in Ubiquitous Computing 17 BenElgart

More Related