Privacy and Security: Thinking About and Analyzing Privacy
privacy and securityprivacy and security
1Research Topics in Ubiquitous ComputingBen Elgart
thinking about and analyzing privacy
Readingsanalyzing privacyanalyzing privacy
Readings
Unpacking “Privacy” for a Networked WorldPalen, Dourish
Prototyping and Sampling Experience to Evaluate Ubiquitous Computing Privacy in the Real WorldIachello, Truong, Abowd, Hayes, Stevens
2Research Topics in Ubiquitous ComputingBen Elgart
Overview: model of privacyoverviewoverview
Palen & Dourish present model for privacy Based on theory by social psychologist Irwin Altman
Concept of privacy as dynamic, dialectic process
Privacy management as a balancing act Multiple factors govern these social interactions
Case studies involving technology illustrate model
3Research Topics in Ubiquitous ComputingBen Elgart
Introduction: traditional approachtraditional approach in hcitraditional approach in hci
Design of pervasive and mobile systems Interactions with systems impact personal privacy
New technologies introduce novel situations
Relationship between privacy and technology Consider outside of static, rule-based systems
Draw on earlier concepts to operationalize privacy
for new situations involving information technology
4Research Topics in Ubiquitous ComputingBen Elgart
Privacy regulation theoryprivacy regulation theoryprivacy regulation theory
Altman sees privacy between individuals:• “As a dialectic process, privacy regulation is
conditioned by our own expectations and experiences, and by those of others with whom we interact.”
• “As a dynamic process, privacy is understood to be under continuous negotiation and management, with the boundary that distinguishes privacy and publicity refined according to circumstance.”
(Palen and Dourish, 2003)
5Research Topics in Ubiquitous ComputingBen Elgart
Privacy managementprivacy managementprivacy management
Privacy as a social negotiation: • “Privacy management is a process of give and take
between and among technical and social entities—from individuals to groups to institutions—in ever-present and natural tension with the simultaneous need for publicity. Our central concern is with how this process is conducted in the presence of information technology.”
(Palen and Dourish, 2003)
6Research Topics in Ubiquitous ComputingBen Elgart
Limitations of Altman’s model of privacyaltman’s model: limitationsaltman’s model: limitations
For managing personal access in interactions:
circumstance = f(local physical environment,
audience, social status, task
or objective, motivation and intention, information
technology)
information technology ≠ spatial environment
7Research Topics in Ubiquitous ComputingBen Elgart
Privacy outside physicalityprivacy outside physicalityprivacy outside physicality
When digital information flows outside physical
and temporal constraints, it changes the way
to regulate privacy.
8Research Topics in Ubiquitous ComputingBen Elgart
Boundaries manage privacy and are in tensionboundaries manage privacyboundaries manage privacy
Disclosure boundary Control of privacy and publicity in contexts
Identity boundary Display of affiliation before an audience
Temporality boundary Interpretations of and actions upon disclosed info
from different points in time
9Research Topics in Ubiquitous ComputingBen Elgart
Neutral Technology Genres of Disclosureneutrality of technologyneutrality of technology
Genres of Disclosure shape privacy issues Social expectation and interpretation of action
Systems support different understanding Family Intercom
Shared Calendars
Active Badges
Cellphones
IM
10Research Topics in Ubiquitous ComputingBen Elgart
Overview: paratypeoverviewoverview
A particular ubicomp prototype was studied
Test tool for evaluating privacy concerns
11Research Topics in Ubiquitous ComputingBen Elgart
New method: paratypeinquiry method: paratypeinquiry method: paratype
Combines prototyping and sampling experience
Solicits feedback on ubicomp technology
Focuses on assessing real-life experience, not
simulations nor testing the system
Proposed for investigating social domains
12Research Topics in Ubiquitous ComputingBen Elgart
Evaluation challenge?evaluation challenge?evaluation challenge?
Personal Audio Loop (PAL) Memory aid to replace recent audio recordings
Study participants respond with uses for device Also raised concerns about impact on privacy
What types of understanding does the system support?
What interactions? What users? What environments?
13Research Topics in Ubiquitous ComputingBen Elgart
Methods of studymethods of studymethods of study
Three proxies: ages 27-31 Used PAL in daily activities
Paratype: interaction in real-world simulation Proxie solicited opinions for specific conversation Half of respondents were in related work fields 3/4 identified importance with being informed of use On average, important that proxie ask permission Same for replaying audio to others Retention time not of concern
14Research Topics in Ubiquitous ComputingBen Elgart
Paratype, for privacy?paratype, for privacy?paratype, for privacy?
Did the scenarios reflect circumstances that reveal issues for privacy management?
15Research Topics in Ubiquitous ComputingBen Elgart
Further consideration
16Research Topics in Ubiquitous ComputingBen Elgart
Questions, Commentsquestions, commentsquestions, comments
?
17Research Topics in Ubiquitous ComputingBen Elgart
Top Related