Title: Privacy and Security: Thinking About and Analyzing Privacy
1Privacy and Security Thinking About and
Analyzing Privacy
privacy and security
thinking about and analyzing privacy
1
Research Topics in Ubiquitous Computing
Ben Elgart
2Readings
analyzing privacy
Readings Unpacking Privacy for a Networked
World Palen, Dourish Prototyping and
Sampling Experience to Evaluate Ubiquitous
Computing Privacy in the Real World Iachello,
Truong, Abowd, Hayes, Stevens
2
Research Topics in Ubiquitous Computing
Ben Elgart
3Overview model of privacy
overview
- Palen Dourish present model for privacy
- Based on theory by social psychologist Irwin
Altman - Concept of privacy as dynamic, dialectic process
- Privacy management as a balancing act
- Multiple factors govern these social interactions
- Case studies involving technology illustrate
model
3
Research Topics in Ubiquitous Computing
Ben Elgart
4Introduction traditional approach
traditional approach in hci
- Design of pervasive and mobile systems
- Interactions with systems impact personal privacy
- New technologies introduce novel situations
- Relationship between privacy and technology
- Consider outside of static, rule-based systems
- Draw on earlier concepts to operationalize
privacy for new situations involving information
technology
4
Research Topics in Ubiquitous Computing
Ben Elgart
5Privacy regulation theory
privacy regulation theory
- Altman sees privacy between individuals
- As a dialectic process, privacy regulation is
conditioned by our own expectations and
experiences, and by those of others with whom we
interact. - As a dynamic process, privacy is understood to
be under continuous negotiation and management,
with the boundary that distinguishes privacy and
publicity refined according to circumstance. - (Palen
and Dourish, 2003)
5
Research Topics in Ubiquitous Computing
Ben Elgart
6Privacy management
privacy management
- Privacy as a social negotiation
- Privacy management is a process of give and take
between and among technical and social
entitiesfrom individuals to groups to
institutionsin ever-present and natural tension
with the simultaneous need for publicity. Our
central concern is with how this process is
conducted in the presence of information
technology. - (Palen
and Dourish, 2003)
6
Research Topics in Ubiquitous Computing
Ben Elgart
7Limitations of Altmans model of privacy
altmans model limitations
- For managing personal access in interactions
- circumstance f(local physical environment,
- audience, social status, task
- or objective, motivation and
intention, information technology) - information technology ? spatial environment
7
Research Topics in Ubiquitous Computing
Ben Elgart
8Privacy outside physicality
privacy outside physicality
When digital information flows outside
physical and temporal constraints, it changes the
way to regulate privacy.
8
Research Topics in Ubiquitous Computing
Ben Elgart
9Boundaries manage privacy and are in tension
boundaries manage privacy
- Disclosure boundary
- Control of privacy and publicity in contexts
- Identity boundary
- Display of affiliation before an audience
- Temporality boundary
- Interpretations of and actions upon disclosed
info from different points in time
9
Research Topics in Ubiquitous Computing
Ben Elgart
10Neutral Technology Genres of Disclosure
neutrality of technology
- Genres of Disclosure shape privacy issues
- Social expectation and interpretation of action
- Systems support different understanding
- Family Intercom
- Shared Calendars
- Active Badges
- Cellphones
- IM
10
Research Topics in Ubiquitous Computing
Ben Elgart
11Overview paratype
overview
- A particular ubicomp prototype was studied
- Test tool for evaluating privacy concerns
11
Research Topics in Ubiquitous Computing
Ben Elgart
12New method paratype
inquiry method paratype
- Combines prototyping and sampling experience
- Solicits feedback on ubicomp technology
- Focuses on assessing real-life experience, not
simulations nor testing the system - Proposed for investigating social domains
12
Research Topics in Ubiquitous Computing
Ben Elgart
13Evaluation challenge?
evaluation challenge?
- Personal Audio Loop (PAL)
- Memory aid to replace recent audio recordings
- Study participants respond with uses for device
- Also raised concerns about impact on privacy
- What types of understanding does the system
support? - What interactions?
- What users?
- What environments?
13
Research Topics in Ubiquitous Computing
Ben Elgart
14Methods of study
methods of study
- Three proxies ages 27-31
- Used PAL in daily activities
- Paratype interaction in real-world simulation
- Proxie solicited opinions for specific
conversation - Half of respondents were in related work fields
- 3/4 identified importance with being informed of
use - On average, important that proxie ask permission
- Same for replaying audio to others
- Retention time not of concern
14
Research Topics in Ubiquitous Computing
Ben Elgart
15Paratype, for privacy?
paratype, for privacy?
- Did the scenarios reflect circumstances that
reveal issues for privacy management?
15
Research Topics in Ubiquitous Computing
Ben Elgart
16Further consideration
16
Research Topics in Ubiquitous Computing
Ben Elgart
17Questions, Comments
questions, comments
?
17
Research Topics in Ubiquitous Computing
Ben Elgart