LCV Dissertation Proposal Presentation

53
 March 8th, 2010 Security in Practice: Examining the Collaborative Management of Personal Sensitive Information in Childcares and Medical Centers Laurian C. Vega 1 Monday, March 8, 2010

Transcript of LCV Dissertation Proposal Presentation

Page 1: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 1/53

 March 8th, 2010

Security in Practice: Examining the

Collaborative Management of Personal SensitiveInformation in Childcares and Medical CentersLaurian C. Vega

1

Monday, March 8, 2010

Page 2: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 2/53

 What is

Security ✤ Computer Security = Rules,

Passwords, Policies

✤ Social Security = Social Norms(e.g., Privacy & Trust), SocialBehavior (e.g., whispering)

✤ Security Practice = the use andnegotiation between social andtechnical security to managethe day-to-day practice of fulfilling security needs

Monday, March 8, 2010

Page 3: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 3/53

Outline

✤ What is Usable Security?

✤ What are the social norms that impact security practice?

✤ Research Questions

✤ Description of guiding framework: Activity Theory

✤ Sensitive Information Rich Places: Childcares & Medical Centers✤ Pilot Study Work & Findings

✤ Proposed Work 

3Monday, March 8, 2010

Page 4: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 4/53

Usable Security 

✤ Traditional security: encodable& enforceable rules

Usable Security recognized thatthe social side of security has been ignored

✤ Whitten & Tygar: “Why JohnnyCan’t Encrypt” - security

 breaches because of theinterface

✤ Adams & Sasse: “Users are notthe enemy” - security is

infringing on work practice

“users perceive their {insecure}

 behavior to be caused by a

mechanism design to increase

security.”Monday, March 8, 2010

Page 5: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 5/53

Social Side of 

Security ✤ Flechais, Reiglesberger, & Sasse:

“Divide and Conquer: The Role of Trust and Assurance in the Design of 

Secure Socio-Technical Systems”✤ Humans: flexible, have intuition,

and evolve

✤ Technology: rigid & not adaptable

✤ Adams & Blandford:

“Organizational communication andawareness: a novel solution forhealth informatics”

✤ Security is designed for theindividual, and not for the

community

“a computer is secure if you can

depend on it and its software to

 behave as you expect…

Dependability is thereforedetermined by the degree to

which this socio-technical system

 behaves in a way it’s expected

to.”

Monday, March 8, 2010

Page 6: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 6/53

Guiding Argument: Joint

Optimization

Sensitive

Personal

Information

6Monday, March 8, 2010

Page 7: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 7/53

Guiding Argument: Joint

Optimization

Sensitive

Personal

Information

Social

Mechanisms

6Monday, March 8, 2010

Page 8: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 8/53

Guiding Argument: Joint

Optimization

Sensitive

Personal

Information

Technical

Mechanisms

Social

Mechanisms

6Monday, March 8, 2010

Page 9: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 9/53

Guiding Argument: Joint

Optimization

Sensitive

Personal

Information

Technical

Mechanisms

Social

Mechanisms

7Monday, March 8, 2010

Page 10: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 10/53

Guiding Argument: Joint

Optimization

Sensitive

Personal

Information

Technical

Mechanisms

Social

Mechanisms

7Monday, March 8, 2010

Page 11: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 11/53

Guiding Argument: Joint

Optimization

Sensitive

Personal

Information

8Monday, March 8, 2010

Page 12: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 12/53

Guiding Argument: Joint

Optimization

Sensitive

Personal

Information

Technical

Mechanisms

8Monday, March 8, 2010

Page 13: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 13/53

Guiding Argument: Joint

Optimization

Sensitive

Personal

Information

Technical

Mechanisms

Social

Mechanisms

8Monday, March 8, 2010

Page 14: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 14/53

Social NormsImpacting

Security Privacy & Trust

Monday, March 8, 2010

Page 15: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 15/53

Trust

✤ Many decades of research inrelevant areas

✤ Encompasses the idea of aperson or group behaving or

 believing in another person,group, or artifact to betrustworthy✤ Personnel trusting each

other, the institution, theirclients, third parties to work effectively

✤ Economic model of trust

(Handy 1995, Flechais 2005)Monday, March 8, 2010

Page 16: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 16/53

Models of 

Privacy ✤ Models of Privacy

✤ Private v. Public space

(Harper 1992)✤ Boundaries of Private

Identity (Buylund 2008;Palen & Dourish, 2003):Genres of disclosure

✤ Cultures of Secrecy (Dourish& Anderson)

✤ Economic Exchange Model(Dourish & Andreson)

“Privacy is not simply a way that

information is managed but how

social relations are managed”Monday, March 8, 2010

Page 17: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 17/53

Privacy &Contextual Integrity 

✤ Nissenbaum: Contextual Integrity✤ ‘Sensitive’ & ‘Confidential’ =

information that needs to be

private✤ Privacy Principles:

✤ Protect against governmentintrusion

✤ Determining the spectrum of sensitive, intimate, and

confidential✤ Determining spaces and

 boundaries for privacy✤ Failure to account for

appropriateness, distribution,

information flow, and change

“Privacy is not simply a way that

information is managed but how

social relations are managed”Monday, March 8, 2010

Page 18: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 18/53

Research

Question✤ How do socio-technical systems that

use sensitive personal informationmanage work-practice breakdownssurrounding the implicit and explicit

rules of process?✤ What are the implicit and explicit

rules surrounding how medicalpractices and childcares handlesensitive personal information?

What breakdowns happen when theexplicit and implicit rules are notfollowed?

✤ How are breakdowns accounted for,negotiated, and managed in socio-technical systems where sensitive

personal information exists?Monday, March 8, 2010

Page 19: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 19/53

 Activity Theory 

✤ Relationship betweenconsciousness and activity

✤ Focus on artifacts mediating theinterplay of subject and objectto create the emergent outcome

✤ Activity = central unit of analysis

✤ Emphasis on context andcultural/historical backgroundof the context + artifacts

 Tool

Subject Object Outcome Transformation

Process

14Monday, March 8, 2010

Page 20: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 20/53

 Activity Theory: Engström

 Tool

Subject Object Outcome TransformationProcess

Rules Community Division of 

Labor

15Monday, March 8, 2010

Page 21: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 21/53

 Activity Theory: Zone of Proximal

Development✤ External and Internal states

External: artifacts

✤ Internal: concepts, heuristics

✤ Internalization occurs through the

Zone of Proximal Development

✤ Internalization of social normsfor security for laterexternalization through activities

16Monday, March 8, 2010

Page 22: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 22/53

 Activity Theory:

Breakdowns✤ Perturbations in the activity

system indicates need for

growth & change✤ Perturbations are caused by

conflicts in activity levels, partsof the activity system, or betweenthe objectives of two activities

✤ Phases of change: coordination -no change; cooperation - minordisruptions in the system; co-construction - breakdowns occurresulting in the system realigning

“Co-construction necessarily involvesintensive learning as new practices

are being devised, which itself 

requires learning, and the new

practices are intended to be learned

 by others” - Nardi

Monday, March 8, 2010

Page 23: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 23/53

Infomation

Rich Places✤ Aspects:

Managing other’sinformation

✤ Information in multipleplaces

✤ Numerous people accessing

✤ Information in differentforms

Monday, March 8, 2010

Page 24: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 24/53

Childcares

✤ 36% of children under age 6 inUnited States participate in

childcare✤ State-licensed - annually and

many times during start-up; setof licensing regulations

✤ House anywhere from 1 - 250children (limits usually onyounger children)

✤ Open ~7AM, Close ~6PM

Statistic provided by: (2005) Percentage of Children Ages 0-6, Not Yet in

Kindergarten by Type of Care Arrangement and Child and Family

Characteristics, 1995, 2001, and 2005. ChildStats.gov

Monday, March 8, 2010

Page 25: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 25/53

Childcare Information& People

Director

Mother

Bus Driver

 Teacher

Father

Head Teacher

Computer

Report

FilePortion of 

File

Child

Owner

People

Information

Locations

Licensor

Director’sOffice

Bus

Classroom

Monday, March 8, 2010

Page 26: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 26/53

Childcare Layout &Space

Childcares have a particular

layout to facilitate daily

routines and safety practices

Front desk of a childcare center. There

is a monitor and picture frame in the

corner. Additional desk and 1-way

mirror from Director’s Office in the

 back.

Monday, March 8, 2010

Page 27: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 27/53

Small &Independent Medical

Practices

✤ (almost) All Americans gothrough US Healthcare System.

✤ In 2005 there were 1,169million visits to physicians’offices & outpatient care athospitals

✤ 3.94 visits per person

✤ State & Nationally regulated &licensed

Statistic provided by: Cutler, D.M. (2008) The American Healthcare System.

Medical Solutions,

Monday, March 8, 2010

Page 28: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 28/53

HIPAA

✤ Effective in 1996

✤ Outlines (somewhat

ambiguously) US Nationalregulations in regards toprivacy and security of patients’ ‘information’

“The HIPAA Privacy Rule provides federal protections for personal health information held bycovered entities and gives patients an array of rights with respect to that information. At the

same time, the Privacy Rule is balanced so that it permits the disclosure of personal health

information needed for patient care and other important purposes. The Security Rule specifies a

series of administrative, physical, and technical safeguards for covered entities to use to assure

the confidentiality, integrity, and availability of electronic protected health information.”  Monday, March 8, 2010

Page 29: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 29/53

Medical PracticeInformation & People

Director

Patient’s Family 

3rd Parties

Insurance

Nurse

Computer

 Temporary File

FilePortion of 

FilePatient

Owner/Doctor

PeopleInformationLocations

Director’sOffice

Patient’sRooms

Doctor’s

Office

Monday, March 8, 2010

Page 30: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 30/53

Comparing & Contrasting

Medical Practices Childcare Centers

File Storage

File Forms

New Customer

Daily Participation

Communication Methods

 Age of files

Policing Privacy Agency 

Method of conveying

explicit policies

File Travel

Large wall-spanning file cabinets Usually only set (3-4) of filing cabinets

Electronic billing patient file; physical file of

medical history; electronic copy of

information in physical file

Physical file in director’s office; sub-file in

teacher room; electronic copy of information in

physical file; possible additional over-flow file

Daily/Weekly Monthly, large enrollment in August and May

Different patients daily Same children daily

Email, inter-office memos, documenting in

files, face-to-face, staff meetings, phone

Email, inter-office memos, documenting in

files, face-to-face, texting, staff meetings,

phone, facebook, back-pack mail

Indefinite Indefinite

U.S. Department of Health & Human

Services through HIPPA 

Virginia’s Department of Social Services

through bi-annual licensing; additional

accreditation through NYCEA, and hosing

institution such as Virginia Tech

Signed forms provided when first enrolling

or at start of visit

 Ambient information, policy handbook, forms

sent back-pack mail to be returned, enrollment

formsTravels with Patient Central file stays in one location 25Monday, March 8, 2010

Page 31: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 31/53

Qualitative

Methods✤ Studying the world of the participants

as an active - observer

The research findings are dependent onthe interpretations of the researcher;researcher is the instrument

✤ Research questions are open, andadaptive to upon deeperunderstanding of the research context

✤ Data is captured in notes & richdescriptions, transcriptions, artifacts,memos of interpretation, audiorecordings, etc

✤ Data collection is never complete

Monday, March 8, 2010

Page 32: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 32/53

Research Problem andOpening Research Questions

Coding &

Data Collection Coding 

Memo Writing/Codes/ Tentative Categories

Initial

(1) (2)Focused

(3) Advanced &

Seeking SpecificNew Data

Sorting Memos & Adopting Certain Categories as

 Theoretical Concepts

 Writing First Draft

(4)Further TheoreticalSampling if Needed

1. Summer Interviews of Childcare and MedicalPractice Directors

2. Fall Observations andFollow-up Interviews

3. Fall Interviews of Parents

4. Proposed Observations

Grounded

Theory

Adapted from: Charmaz, K.,

Constructing Grounded Theory: A

Practical Guide through Qualitative

Analysis. 2006: Sage Publications Ltd.

27Monday, March 8, 2010

Page 33: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 33/53

Pilot Studies

✤ All participants from NewRiver Valley, Virginia

✤ IRB Approved✤ 46 Interviewed Participants:

Childcare & Medical Directors,Parents✤ Interviews = 45 min, audio

recorded, transcribed, coded by 2-3 researchers

✤ 14 Childcare Observations✤ Observations 2-3 hours,

Notes, collected artifacts,coded by 2 researchers

Monday, March 8, 2010

Page 34: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 34/53

1: Human-Mediated Access Management

✤ Ownership

✤ Place-based Norms

✤ Role-based Norms

Monday, March 8, 2010

Page 35: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 35/53

Ownership

✤ Center <-----> Client; shiftingideas

✤ Files are stored in center

✤ How much will they copy?What is the process of copying?

✤ Reasons for not providingcopies:

✤ Client wouldn’t understandinformation

✤ Kept information theywouldn’t want the client tosee

“the information in a file

 belongs to a patient, butthe file itself belongs to

the doctor… So people

think when they get an

X-ray they’ve bought an

X-ray but no, the

information on the X-ray

 belongs to the patient but the actual film itself 

 belongs to the doctor.”

Monday, March 8, 2010

Page 36: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 36/53

Place-Based

Norms✤ How information is situated in

the environment represents

social norms of access &management

✤ Official policies that impactwhere it is acceptable to shareinformation

✤ Physical layout of the director’soffice

HIPPA as I understand it wasdeveloped to protect information that

is sent over the internet… Now

HIPPA in my opinion, and I don’tmind if this is recorded, I think it’s a

stupid thing… I wouldn’t go out in thewaiting room and say, you know, “hey

Ms. Jones your syphilis test is

negative,” so to me it’s an ethical thingand not a legal issue… now myunderstanding of HIPPA

interpretations, you’re not evenallowed to say the patient’s name in

the office. But what a load of crap, allthat. If I got an 80 year old lady, shewants a hug. I’m not gonna ignore

her, you know, “205, you’re up!”That’s just, that’s a little ridiculous.

Monday, March 8, 2010

Page 37: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 37/53

Role-Based

Norms✤ The role of the director was

found to mediate theinformation seeker’s goal in a

way that is flexible, negotiated,and determined in a case-by-case fashion to best balance theneed for information for work with need to keep information

private.✤ Authority

✤ Auditing other’s work 

✤ Limiting information sharing

"If I want my kids' middle

names, are they gonna be in hereor in the file?" <points to black 

 box> … The teacher then says, in

a much softer voice, “can I dig?”

Monday, March 8, 2010

Page 38: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 38/53

Information

Duplication

✤ Information Redundancy

✤ Information On-hand

Monday, March 8, 2010

Page 39: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 39/53

Information

Redundancy ✤ Information in multiple forms:

electronic, billing, health

✤ Reasons:

✤ To serve a communitypurpose

✤ To protect information from

 being lost✤ To use appropriate

information based oncontextual needs

“The problem is, and someone

wouldn’t think about why it’s so

important, but it’s like theVirginia Tech massacre we had 3

patients who we had to identify

the bodies.”

Monday, March 8, 2010

Page 40: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 40/53

Information

Redundancy ✤ Information in multiple forms:

electronic, billing, health

✤ Reasons:

✤ To serve a communitypurpose

✤ To protect information from

 being lost✤ To use appropriate

information based oncontextual needs

“…we actually have a series of 

 backups. We have a local tape

 backup and we have an off site backup which actually backs up

over the internet at my house at

night... And then at my home we

actually have two hard drives

and my wife goes to the safety

deposit box and swaps them out

regularly. So if somebody’s mad

enough to burn this office down

and my home down, we’ll stillhave a record in a safe deposit

 box.”

Monday, March 8, 2010

Page 41: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 41/53

Information

Redundancy ✤ Information in multiple forms:

electronic, billing, health

✤ Reasons:

✤ To serve a communitypurpose

✤ To protect information from

 being lost✤ To use appropriate

information based oncontextual needs

“We have an electronic medical

record here – so it’s all eventually

entered in. The information is

taken down by a nurse

interviewer preoperatively on a

pre-op visit.... And then

eventually that all gets put intothe electronic medical record...

 but of course we transfer a lot of 

that information onto the

anesthesia record which is

entered in real time into the

electronic medical record”

Monday, March 8, 2010

Page 42: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 42/53

Information

On-hand

✤ Planning is instantiatedthrough multiple copies of information for differentpurposes

✤ Reasons

✤ Need it for work 

✤  Just in case (i.e.,emergencies)

✤ Files being too large

“… things have to be kept

confidential and locked, per se, but

the staff still need to be able to have

access to it even if {the director is}

not here ... So, sometimes they will

produce their own emergency

contact form for their classroom…and that way {the manila folder} can

remain locked but people still have

access to the information needed"

Monday, March 8, 2010

Page 43: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 43/53

Community of 

Trust✤ Trust decreases expenditures

for security, and increasesfeelings of shared

responsibility

✤ Representations:colloquialisms, feelings of  being part of the family,

displaying child’s artwork 

✤ 29% had individual passwords;door locks and keys neverobserved

“… teachers are bound by

confidentiality, it's in their

agreement, it's in our handbook,any violation of confidentiality is

immediate grounds of 

termination. We try to use a lot of 

trust… more often than not

there's not anything that they

can't see. Um, there are cases of 

children that you know we've

had suspicions of abuse or

different information, but wekinda want at the same time for

{the staff} to be privy.”

Monday, March 8, 2010

Page 44: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 44/53

Proposed Studies

✤ 2 month long observations; approximately 80 hours per location:

✤ 1 childcare

✤ 1 medical practice

✤ Role: Active-participant; semi-volunteer

✤ Goal: Observe the use of explicit and implicit policies & the breakdowns surrounding them

✤ Collect: Daily audio recordings, observation notes, pictures,representative artifacts

39Monday, March 8, 2010

Page 45: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 45/53

Product of Study 

✤ Set of problem & near-future scenarios that have been abstracted fromobservation and pilot studies

✤ Goal: comprehensive list of observed breakdowns --> abstracted totypes of breakdowns

✤ Problem Scenarios - will depict problems with the current situationin relation to security

✤ Near-Future Scenarios - will depict the positive and negativeconsequences of implementing solutions to problem scenarios

40Monday, March 8, 2010

Page 46: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 46/53

Conceptual Framework

✤ Scenarios created torepresent different aspectsof the conceptualframework created by Dr.Kafura & Usable SecurityTeam

✤ Depicts aspects of theDesign Space

41Monday, March 8, 2010

Page 47: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 47/53

Sample ProblemScenario

✤ Bus driver’s list of childrenwith contact information isinaccurate; missing child

✤ Reasons for breakdown:

✤ Problems with division of labor - dueling objectives

Lack of policy over updatinginformation

✤ Dueling objectives forsecurity & information on-hand

Monday, March 8, 2010

Page 48: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 48/53

Sample Near-Future Scenario

✤ Solution - allow mother to updateher own information; informationavailable through interactive

password protected onboarddatabase

✤ Important aspects:

✤ Bus system can only accesscertain information

✤ Division of Labor moredistinguished for driver/director

✤ New policy for accessinginformation in the moment

Monday, March 8, 2010

Page 49: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 49/53

Timeline

✤ Observations:

✤ One observation prior to

summer✤ One observation in August-

September

✤ Data Aggregation & Analysis:

Summer + Fall✤ Writing: November-April

✤ Research Defense: January

✤ Final Defense: April

Monday, March 8, 2010

Page 50: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 50/53

Thank you

A special thanks to Tom DeHart, Laura Agnich, Edgardo Vega,Zalia Shams, Monika Akbar, Stacy Branham who helped run,

code, and analyze the data.

Another thanks to Dr. Fancis Quek & Dr. Denis Gracanin from theUsable Security team for their feedback.

45Monday, March 8, 2010

Page 51: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 51/53

 Activity Theory: Levels

 Activity 

 Action

Operation

Motive

Goal

Condition

46Monday, March 8, 2010

Page 52: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 52/53

ContextualIntegrity 

✤ Appropriateness: Whatinformation is appropriate to

reveal in particular contexts

✤ Distribution: the movement ortransfer of information inparticular contexts

✤ Change & Information Flow:change in norms that guideinformation use

Monday, March 8, 2010

Page 53: LCV Dissertation Proposal Presentation

8/14/2019 LCV Dissertation Proposal Presentation

http://slidepdf.com/reader/full/lcv-dissertation-proposal-presentation 53/53

Conceptual Framework

✤ Behavior framing:mediating behaviors

through the ‘place’ -regulating privacy boundaries

✤ Boundary Regulation: theplace where privacy

norms regulate behavior✤ Trust negotiation:

negotiation between twoparties with differentprivacy policies