Presentation is loading. Please wait.

Presentation is loading. Please wait.

CARS, CONDOMS, & INFORMATION SHARING HOW PRIVATE IS PRIVATE ENOUGH? Vaibhav Garg Drexel University.

Similar presentations


Presentation on theme: "CARS, CONDOMS, & INFORMATION SHARING HOW PRIVATE IS PRIVATE ENOUGH? Vaibhav Garg Drexel University."— Presentation transcript:

1 CARS, CONDOMS, & INFORMATION SHARING HOW PRIVATE IS PRIVATE ENOUGH? Vaibhav Garg Drexel University

2 Cars J. Adams. Cars, cholera, and cows. CATO Institute, 335: 1–49, 1999.

3 Seat Belt Habit  http://youtu.be/Fa5BVk9mbSY

4 Condoms M. Cassell, D. Halperin, J. Shelton, and D. Stanton. Risk compensation: The Achilles’ heel of innovations in HIV prevention? British Medical Journal, 332(7541):605–607, 2006.

5 Privacy L. Brandimarte, A. Acquisti, and G. Loewenstein. Misplaced confidences: Privacy and the control paradox. Social Psychological and Personality Science, 2012.

6 Risk Comes from the Italian word ‘risicare’ Probability * Magnitude

7 Rational Agent Smoking is a factor which contributes to lung cancer. Most cancers that start in lung, known as primary lung cancers, are carcinomas that derive from epithelial cells. Depending on the type of tumor, so-called paraneoplastic phenomena may initially attract attention to the disease.[16] In lung cancer, these phenomena may include Lambert-Eaton myasthenic syndrome (muscle weakness due to auto-antibodies), hypercalcemia, or syndrome of inappropriate antidiuretic hormone (SIADH). Tumors in the top (apex) of the lung, known as Pancoast tumors,[17] may invade the local part of the sympathetic nervous system, leading to changed sweating patterns and eye muscle problems (a combination known as Horner's syndrome) as well as muscle weakness in the hands due to invasion of the brachial plexus.

8 Privacy Risk Communication (1)

9 Privacy Risk Communication (2)

10 Privacy Risk Communication (3)

11 People don’t care Complete Information == Market Efficiency R. A. Posner. The Economics of Privacy. American Economic Review, 71(2):405-409, 1981.

12 People don’t know Info graphic from Matt McKeon.

13 Usability P. Inglesant and M. Sasse. The true cost of unusable password policies: password use in the wild. In Proceedings of the 28th International conference on Human factors in computing systems, pages 383–392. ACM, 2010.

14 Risk Comes from the Italian word ‘risicare’ Probability * Magnitude

15 Boundedly Rational J. Grossklags and A.Acquisti. When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information. Workshop on Economics of Information Security. 2007.

16 Certainty Effect Bird in hand is worth two in the bush!  For sure! Maybe! P=0.1  16

17 Reflection Effect  Lose For sure! Lose Maybe! P=0.1  We prefer certain gains but uncertain losses! 17

18 Class Participation

19

20

21

22

23

24 Boundedly Rational J. Grossklags and A.Acquisti. When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information. Workshop on Economics of Information Security. 2007.

25 25 Voluntariness

26 Immediacy 26

27 Knowledge to Exposed 27

28 Knowledge to Science 28

29 Control 29

30 Newness 30

31 Common-Dread 31

32 Chronic-catatrophic 32

33 Severity 33

34 Nine Dimensional Model  Voluntariness  Immediacy  Knowledge to Experts  Knowledge to Exposed  Control  Newness  Common-Dread  Chronic-Catastrophic  Severity B. Fischhoff, P. Slovic, S. Lichtenstein, S. Read, and B. Combs. How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits. Policy Sciences, 9(2):127–152, 1978.

35 Revealed Preferences  Revealed Preferences  Attitudes are reflected by behavior  Traditionally Acceptable ‘The… assumption is that historically revealed social preferences and costs are sufficiently enduring to permit their use for predictive purposes.’ C. Starr. Social benefit versus technological risk. Science, 165(3899):1232– 1238, 1969.

36 Expressed Preferences  Expressed Preferences  Behaviors are informed by attitudes  What end-users want or acceptable risk? ‘The societal value system fluctuates with time, and the technological capability to follow fast changing societal goals does not exist.’ C. Starr, R. Rudman, and C. Whipple. Philosophical Basis for Risk Analysis. Annual Review of Energy, 1:629-662, 1976.

37 Nine Dimensional Model  Voluntariness  Immediacy  Knowledge to Experts  Knowledge to Exposed  Control  Newness  Common-Dread  Chronic-Catastrophic  Severity B. Fischhoff, P. Slovic, S. Lichtenstein, S. Read, and B. Combs. How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits. Policy Sciences, 9(2):127–152, 1978.

38 Rational Risk Communication Smoking is a factor which contributes to lung cancer. Most cancers that start in lung, known as primary lung cancers, are carcinomas that derive from epithelial cells. Depending on the type of tumor, so-called paraneoplastic phenomena may initially attract attention to the disease.[16] In lung cancer, these phenomena may include Lambert-Eaton myasthenic syndrome (muscle weakness due to auto-antibodies), hypercalcemia, or syndrome of inappropriate antidiuretic hormone (SIADH). Tumors in the top (apex) of the lung, known as Pancoast tumors,[17] may invade the local part of the sympathetic nervous system, leading to changed sweating patterns and eye muscle problems (a combination known as Horner's syndrome) as well as muscle weakness in the hands due to invasion of the brachial plexus.

39 Boundedly Rational

40 Gender Differences

41 Aging!

42 Income

43 Education

44 Mental Models  Physical  Criminal  Medical  Warfare  Economic

45 Boundedly Rational

46 Mental Model

47 Privacy Case Study  Phishing  Keyloggers  Older Adults

48 Why Older Adults?  Fastest growing demographic  Susceptibility to fraud  20% of the victims (FTC)  1/10 th of publicly held bonds  1/3 rd of publicly held stock 48

49 Why Design for Older Adults  Designs for younger people  Assumptions  Technical experience  Sight, focus, dexterity  Risk posture 49

50 Design Constraints  Memory  Semantic Learnt Lasts longer Retention is better  Episodic Experienced Richer Retrieval is better!  Mental Models  Physical, Criminal, Economic, Medical, and Warfare 50

51 Design Constraints  Memory  Semantic Learnt Lasts longer Retention is better  Episodic Experienced Richer Retrieval is better!  Mental Models  Physical, Criminal, Economic, Medical, and Warfare 51

52 Risk Communication: Text 52

53 Privacy Videos  Phishing  http://youtu.be/4ZQ9pFTCdy4 http://youtu.be/4ZQ9pFTCdy4  Keylogger  http://youtu.be/6zHJoZqrCB0 http://youtu.be/6zHJoZqrCB0

54 To conclude… 54


Download ppt "CARS, CONDOMS, & INFORMATION SHARING HOW PRIVATE IS PRIVATE ENOUGH? Vaibhav Garg Drexel University."

Similar presentations


Ads by Google