UX STRAT USA, Richard Dalton, "Turning Strategy into Execution"
UX STRAT USA 2017: Dr. Faith McCreary, "Strategy for Designing Privacy into the Internet of Things"
Transcript of UX STRAT USA 2017: Dr. Faith McCreary, "Strategy for Designing Privacy into the Internet of Things"
designing for Privacy in the age of magicFaith McCreary
The work being shared today was a collaboration with
Alex Zafiroglu & Heather Patterson
Intel CorporationHeather
Alex
INCREASINGLY VISIBLE
BLURRING BOUNDARIESSource: http://www.michaelbeitz.com/home.html
SMART OR CREEPY?
WONDERING WHY
Confirm? Reference: https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf
How?
Privacy ≠ Security
LEGAL GUARD RAILS
Source: https://upload.wikimedia.org/wikipedia/commons/6/6a/Sign_in_Niagara_Falls,_Ontario,_warning_people_not_to_climb_over_guard_rail.jpg
by design
by design
1. PROACTIVE NOT REACTIVE; PREVENTATIVE NOT REMEDIAL
2. PRIVACY AS THE DEFAULT SETTING
3. PRIVACY EMBEDDED INTO DESIGN
4. FULL FUNCTIONALITY – POSITIVE-SUM, NOT ZERO-SUM
5. END-TO-END SECURITY – FULL LIFECYCLE PROTECTION
6. VISIBILITY AND TRANSPARENCY – KEEP IT OPEN
7. RESPECT FOR USER PRIVACY – KEEP IT USER-CENTRIC
Digital InvisibilityOptical camouflage by Susumu Tachi of the University of Tokyo https://commons.wikimedia.org/wiki/File:An_invisibility_cloak_using_optical_camouflage_by_Susumu_Tachi.jpg
CONTEXT MATTERS
PRIVACY SEGMENTATION
INFORMATION SENSITIVITY MODEL
CONTEXTUAL PRIVACY PROBES
TAXONOMY OF PRIVACY CONCERNS
BEHIND the Curtain
1 PRIVACY SEGMENTATION
FUNDAMENTALIST
PRAGMITIST
UNCONCERNED
Source: https://c1.staticflickr.com/8/7469/16263996296_aa8767d970_b.jpg
2
3 INFORMATION SENSITIVITY MODELStable Clusters of Expectations and Preferences for Boundaries
INFORMATION SENSITIVITY
SHARED
INFORMATION SENSITIVITY
TRADED
INFORMATION SENSITIVITY
SECRET
INFORMATION SENSITIVITY
TATTLED
4 TAXONOMY OF PRIVACY CONCERNS
4 CATEGORIES16 TYPES
LESS IS MOREINFORMATION COLLECTION
UNDERSTAND PURPOSE
LIMIT CAPTURE
MANAGE APPEARANCES
BEWARE LOCATION TRACKING
DO NO HARMINFORMATION PROCESSING
SAFEGUARD DATA
LIMIT USE
TRANSLUCENCE BUILDS TRUSTINFORMATION DISSEMINATION
ACCURACY
OPENNESS
EASY CONTROL
OPAQUENESS
Source: https://c1.staticflickr.com/6/5567/18806435646_b66ba85bac_b.jpg
USEFUL NOT DISRUPTIVEINFORMATION INVASIONS
AIM FOR INVISIBLE
ENCOURAGE SHUT-OFF
WHAT WILL YOU DO?
Email: [email protected]