Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in...

17
Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and analyzing privacy

Transcript of Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in...

Page 1: Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.

Privacy and Security: Thinking About and Analyzing Privacy

privacy and securityprivacy and security

1Research Topics in Ubiquitous ComputingBen Elgart

thinking about and analyzing privacy

Page 2: Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.

Readingsanalyzing privacyanalyzing privacy

Readings

Unpacking “Privacy” for a Networked WorldPalen, Dourish

Prototyping and Sampling Experience to Evaluate Ubiquitous Computing Privacy in the Real WorldIachello, Truong, Abowd, Hayes, Stevens

2Research Topics in Ubiquitous ComputingBen Elgart

Page 3: Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.

Overview: model of privacyoverviewoverview

Palen & Dourish present model for privacy Based on theory by social psychologist Irwin Altman

Concept of privacy as dynamic, dialectic process

Privacy management as a balancing act Multiple factors govern these social interactions

Case studies involving technology illustrate model

3Research Topics in Ubiquitous ComputingBen Elgart

Page 4: Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.

Introduction: traditional approachtraditional approach in hcitraditional approach in hci

Design of pervasive and mobile systems Interactions with systems impact personal privacy

New technologies introduce novel situations

Relationship between privacy and technology Consider outside of static, rule-based systems

Draw on earlier concepts to operationalize privacy

for new situations involving information technology

4Research Topics in Ubiquitous ComputingBen Elgart

Page 5: Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.

Privacy regulation theoryprivacy regulation theoryprivacy regulation theory

Altman sees privacy between individuals:• “As a dialectic process, privacy regulation is

conditioned by our own expectations and experiences, and by those of others with whom we interact.”

• “As a dynamic process, privacy is understood to be under continuous negotiation and management, with the boundary that distinguishes privacy and publicity refined according to circumstance.”

(Palen and Dourish, 2003)

5Research Topics in Ubiquitous ComputingBen Elgart

Page 6: Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.

Privacy managementprivacy managementprivacy management

Privacy as a social negotiation: • “Privacy management is a process of give and take

between and among technical and social entities—from individuals to groups to institutions—in ever-present and natural tension with the simultaneous need for publicity. Our central concern is with how this process is conducted in the presence of information technology.”

(Palen and Dourish, 2003)

6Research Topics in Ubiquitous ComputingBen Elgart

Page 7: Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.

Limitations of Altman’s model of privacyaltman’s model: limitationsaltman’s model: limitations

For managing personal access in interactions:

circumstance = f(local physical environment,

audience, social status, task

or objective, motivation and intention, information

technology)

information technology ≠ spatial environment

7Research Topics in Ubiquitous ComputingBen Elgart

Page 8: Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.

Privacy outside physicalityprivacy outside physicalityprivacy outside physicality

When digital information flows outside physical

and temporal constraints, it changes the way

to regulate privacy.

8Research Topics in Ubiquitous ComputingBen Elgart

Page 9: Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.

Boundaries manage privacy and are in tensionboundaries manage privacyboundaries manage privacy

Disclosure boundary Control of privacy and publicity in contexts

Identity boundary Display of affiliation before an audience

Temporality boundary Interpretations of and actions upon disclosed info

from different points in time

9Research Topics in Ubiquitous ComputingBen Elgart

Page 10: Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.

Neutral Technology Genres of Disclosureneutrality of technologyneutrality of technology

Genres of Disclosure shape privacy issues Social expectation and interpretation of action

Systems support different understanding Family Intercom

Shared Calendars

Active Badges

Cellphones

IM

10Research Topics in Ubiquitous ComputingBen Elgart

Page 11: Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.

Overview: paratypeoverviewoverview

A particular ubicomp prototype was studied

Test tool for evaluating privacy concerns

11Research Topics in Ubiquitous ComputingBen Elgart

Page 12: Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.

New method: paratypeinquiry method: paratypeinquiry method: paratype

Combines prototyping and sampling experience

Solicits feedback on ubicomp technology

Focuses on assessing real-life experience, not

simulations nor testing the system

Proposed for investigating social domains

12Research Topics in Ubiquitous ComputingBen Elgart

Page 13: Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.

Evaluation challenge?evaluation challenge?evaluation challenge?

Personal Audio Loop (PAL) Memory aid to replace recent audio recordings

Study participants respond with uses for device Also raised concerns about impact on privacy

What types of understanding does the system support?

What interactions? What users? What environments?

13Research Topics in Ubiquitous ComputingBen Elgart

Page 14: Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.

Methods of studymethods of studymethods of study

Three proxies: ages 27-31 Used PAL in daily activities

Paratype: interaction in real-world simulation Proxie solicited opinions for specific conversation Half of respondents were in related work fields 3/4 identified importance with being informed of use On average, important that proxie ask permission Same for replaying audio to others Retention time not of concern

14Research Topics in Ubiquitous ComputingBen Elgart

Page 15: Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.

Paratype, for privacy?paratype, for privacy?paratype, for privacy?

Did the scenarios reflect circumstances that reveal issues for privacy management?

15Research Topics in Ubiquitous ComputingBen Elgart

Page 16: Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.

Further consideration

16Research Topics in Ubiquitous ComputingBen Elgart

Page 17: Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.

Questions, Commentsquestions, commentsquestions, comments

?

17Research Topics in Ubiquitous ComputingBen Elgart