Privacy Interfaces for Location Sharing: when is too much transparency a bad thing? Blaine Price.

Slides:



Advertisements
Similar presentations
Difficult Conversations
Advertisements

Intercultural knowledge and language awareness
In the Best Families tracking and relationships Clara Mancini Yvonne Rogers, Keerthi Thomas, Adam Joinson, Blaine Price, Arosha Bandara, Lukasz Jedrzejczyk,
Materials and Lesson Planning
DIFFICULT CONVERSATIONS – THE VIEWS OF TERMINALLY ILL PEOPLE & THEIR FAMILIES Dr Phil McCarvill 8 th July
Managing Online Identity References: Prepared for Trustworthy Computing Group, Microsoft by Cross-Tab Marketing Services.
PART II THE MAIN STEPS OF EFFECTIVE COUNSELING. Counseling is a confidential dialogue between a medical provider and a client that helps a client to make.
1 RUNNING a CLASS (2) Pertemuan Matakuliah: G0454/Class Management & Education Media Tahun: 2006.
Digital Footprints Where have you been? Where are you going?
Why take classes through the Saskatoon Catholic Cyber School?
To Log or Not to Log? Privacy Risks and Solutions for Lifelogging and Continuous Activity Sharing Applications Blaine Price.
Outline of presentation Brief introduction of Facebook as a social networking tool Research questions Methods Findings and Results Some Experimentation.
HANDS The individual child’s needs Support systems everywhere Cognitive support at home and school HANDS Beginners – start here Self insight – but how?
Data collection methods Questionnaires Interviews Focus groups Observation –Incl. automatic data collection User journals –Arbitron –Random alarm mechanisms.
Observing Learning Helen Bacon and Jan Ridgway Inclusion Support Services.
“It’s Taking Me Somewhere” A Reflection on my Interconnected CCT Journey.
Elicitation Methods Information types Information types Information Information Internal Perspectives Internal Perspectives Behavior Behavior Facts Facts.
Who’s Viewed You? The Impact of Feedback in a Mobile Location-Sharing Application Date : 2011/09/06 Reporter : Lin Kelly.
The first steps Anna Lóa Ólafsdóttir Career counselor og project manager of The First Steps.
Damian Gordon.  Summary and Relevance of topic paper  Definition of Usability Testing ◦ Formal vs. Informal methods of testing  Testing Basics ◦ Five.
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
You can customize your privacy settings. The privacy page gives you control over who can view your content. At most only your friends, their friends and.
Basic Counselling Skills
Assessing employability through reflective diaries on teamwork CEC 202 A Sense of Place School of English Second Year Approved Module.
Towards A User-Centric Identity-Usage Monitoring System - ICIMP Daisuke Mashima and Mustaque Ahamad College of Computing Georgia Institute of Technology.
“What a Small World!” ---NaviChat Team 4: Andrew Puchle Arthur Liu Yi-Jen Lai.
Thinking Actively in a Social Context T A S C.
Information Literacy in the workplace: implications for trainers By Dr. Mark Hepworth Department of Information Science Loughborough University.
Communication Skills Anyone can hear. It is virtually automatic. Listening is another matter. It takes skill, patience, practice and conscious effort.
LILAC 2008 Perceptions of information: The Net Generation Marian Smith and Dr. Mark Hepworth.
Creating For Communities in Cape Town. 1.Name? 2.Age? 3.What is the language you use at home? 4.What subject do you teach? 5.Where is your family from?
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
By Edward Lim 8.7.  What?  Today we started the Cornerstone Piece and we were given a few tasks to complete. The tasks were to watch the Kurt Fearnly.
Helping the Shy Student Connect to School ASCA June 29, 2008 Dr. Teesue H. Fields.
Safety Framework Supervisors as Coaches Department of Children and Families.
Digital Citizenship - Framework for Teaching Digital Citizenship Mike Ribble Instructional Services Coordinator College of Education Kansas State University.
Scenarios Presented by Krista Strickland. Definition Scenario: “a narrative or story that describes the activities of one or more persons, including information.
How to Teaching Social Skills to a student who has Intellectual deficiency/PDD and or Autism with the help of current technology.
Introduction Managing time in organizations is difficult because time flows at the same rate for everyone and cannot be 'managed' like other resources.
A Good Start: Resilience in Families With a first Baby Irene de Haan BRCSS/SPEaR Colloquium.
Usability Evaluation/LP Usability: how to judge it.
©2010 John Wiley and Sons Chapter 6 Research Methods in Human-Computer Interaction Chapter 6- Diaries.
Nathaniel S. Good Aaron Krekelberg Usability and privacy: a study of Kazaa P2P file- sharing.
Ontology Summit 2015 Track C Report-back Summit Synthesis Session 1, 19 Feb 2015.
Final Project Presentation ETEC 550
Chapter 12: Introducing Evaluation. The aims To illustrate how observation, interviews and questionnaires that you encountered in Chapters 7 and 8 are.
Reflection helps you articulate and think about your processes for communication. Reflection gives you an opportunity to consider your use of rhetorical.
Instructed by: Alex Kogan Performed by: Adam Levi Tal Steier.
Mentoring in primary education Marieke Jaspers Under supervision of Theo Wubbels and Paulien Meijer Research in Teaching and Teacher.
1 Technical & Business Writing (ENG-715) Muhammad Bilal Bashir UIIT, Rawalpindi.
Chapter 12: Introducing Evaluation. The aims To illustrate how observation, interviews and questionnaires that you encountered in Chapters 7 and 8 are.
Writing Software Documentation A Task-Oriented Approach Thomas T. Barker Chapter 5: Analyzing Your Users Summary Cornelius Farrell Emily Werschay February.
Design Process … and some design inspiration. Course ReCap To make you notice interfaces, good and bad – You’ll never look at doors the same way again.
Presented by Ronni Rosewicz.  To learn the basics of Social Thinking  To learn practical strategies and common vocabulary to help your child be more.
Summary of “Towards Mobile Accessibility for Older People: A User Centered Evaluation” HCC 741 ASSISTIVE TECHNOLOGY AND ACCESSIBILITY FALL 2014 HYE-KYUNG.
EVALUATION PROfessional network of Master’s degrees in Informatics as a Second Competence – PROMIS ( TEMPUS FR-TEMPUS-JPCR)
Interface Composition
C. L. U. S. T. E. R. bringing people together through space and time Carolyn Holmes Fred Potter Chris Govella Sierra Michels-Slettvet.
HART RESEARCH ASSOTESCIA Key findings from telephone survey of parents of children who access the Internet, conducted for Who Needs Parental Controls?
Delivering Effective Feedback A Faculty Development Program for Teachers of International Medical Graduates.
Action Research Chantal Smith Liberton Christian School Is Blogging a Useful Tool for Supporting and Monitoring the Personal Reading of my Year 6-8 students?
AREA REP SUPPORT SKILLS B. This training follows Skill Building A Area Reps will continue with advanced trainings Area Reps will join monthly support.
Planning AS 2.1 SUS 201 Plan, implement and evaluate a personal action that will contribute towards a sustainable future. 6 credits.
Personal Responsibility and Decision Making
Software Design and Development Development Methodoligies Computing Science.
Housing Young Parents Linzi Ladlow University of Leeds.
国外教学法 澳洲学习汇报. Concept Check Questions  We use concept check questions to help clarify meaning and to check students’ understanding rather than saying.
AP CSP: Identifying People with Data and The Cost of Free
Make sure to check your audio using the Audio Setup Wizard in Tools
Workshop for ART mentors
Presentation transcript:

Privacy Interfaces for Location Sharing: when is too much transparency a bad thing? Blaine Price

The PRiMMA Team... Bashar Nuseibeh Yvonne Rogers Arosha Bandara Clara Mancini Lukasz Jedrzejczyk Keerthi Thomas Morris Slowman Alessandra Russo Emil Lupu Naranker Dulay Domenico Corapi Ryan Wishart Adam Joinson

Outline Methods for understanding mobile privacy Some experiments on Methodology A Location Tracking User Study with Families A Privacy Feedback Interface User Study Some Lessons Learned, Future Directions Questions/Discussion/Watch Videos...

The Problem With Asking People About Privacy is... But it is (largely) not their fault People are bad at judging the future value of their privacy People are bad at judging how they will react to using new systems they have never used before

New Methods for Studying Mobile Privacy Behaviour Privacy Practices of Mobile Facebook Users Experience Sampling with Memory Phrase Found Mobile Contexts were multi-faceted, including individual perceptions, and different physical/virtual world interconnections Places, defined by emerging social cultural knowledge, are a major determinant of privacy needs, so effort at defining rules for automation can be based on a location/context pairing

Studying Privacy Behaviour with Future Technologies People find it difficult to imagine privacy risks in a technology they have never used Video (and written scenarios) can be powerful tools to allow participants to immerse themselves in unfamiliar tech and vicariously experience it Corporate Concept Videos Videos Apple Knowledge Navigator 1988 Microsoft Future Healthcare 2008

Contravision Semi-Professional video of a 6 scene story shot twice with subtle difference between versions In one version, protagonist has positive attitude and everything works perfectly Alternative verison, protagonist has negative attitude, technology has problems Participants watch one version without being told which one Wider range of privacy concerns elicited

User Study 1: Tracking in Families tracking and relationships Why Familes?

Some implicit assumptions close knit tracking is safer news.bbc.co.uk/cbbcnews/hi/newsid_ /newsid_ / stm

Assumptions... the tracked is the vulnerable one imgfave.com/search/someone%20deleted%20my%20tag

Assumptions... Enough controls will set you free en.wikipedia.org/wiki/File:STSCPanel.jpg

Study Design F1 F2 Mother & father Daughter1 & partner Daughter2 & boyfriend Daughter3 Mother & father Son & friend Daughter 3 weeks, 1092 unique tracking events

Interface examples

Conditions and Questions complete visibility run/chase? jordanhoffman.com/2007/03/08/ das-experiment-2001-oliver- hirschbiegel-b

Findings “I don’t think it makes me a better person checking up on people…so I try to stay out of it as I possibly can as it’s none of my business, but this technology makes it a little bit too easy, you are only human”

Conditions and Questions tracking tasks uneasy/keen?

Findings “It was easier to [check on others] when I was asked to do so…I didn’t feel like it was my responsibility…it wasn’t me doing it, I was just carrying out a task” delegating responsibility

Conditions and Questions real-time feedback reassured/deterred?

Findings “I would prefer not to know, or I would have to start asking myself why they are checking on me…have I done something wrong…are they after something?” questioning others’ motives

Unexpectedness and destabilisation “I looked him up…he was last tracked four hours ago…I thought oh did he turn his phone off…or did he turn the tracker off and why did he do that… why didn’t he tell me? Who is he with? And why is he there?” F1-Daughter2 F1-Boyfriend

Closeness and control “At times I’d rather she didn’t track me…but I wouldn’t use privacy preferences [as] I know that would hurt her feelings” F2-Mother F2-Son

Breach and predation “I feel because [they] have shown in the past that [they] are not trustworthy, that kind of [they] started it…it means I can check up on [them] and not feel too bad…[they] are unlikely to do what [they] say the do, so anything you see [on the tracker] is probably just going to confirm that”

Close knit tracking is not safer Tracking affects both parties The closer the less in control Conclusions

Inspiration for Study 2 Pervasive systems allow collection of data about individuals – Increasing proliferation and dependence on these systems – Threats to privacy Users informed and manually manage privacy settings – Impractical ! Too many controls.. Pervasive systems need automated mechanisms for governing privacy behaviours that, – Reflect user preferences, – Adapt to changes in circumstances, context and user behaviours 24

Goals Develop automated mechanisms for governing privacy behaviours – Reflect user preferences, – Adapt to changes in circumstances, context and user behaviours – Use Social Translucence as Privacy Interface mechanism Example: Privacy Management for Location Based Applications – Share location information with appropriate precision to the appropriate people, at the appropriate times – Provide awareness of information access. How can we learn policies from user behaviours? 25

Challenge 26 Build a system capable of learning mobile privacy policies enforceable on mobile devices to reduce intervention in privacy management. User Agent … Phone call Current credit Current location Requirements:  User should be able to understand and modify the learned rules.  Existing structured information and constraints should be used.  Rules should be learned incrementally.  Learned rules should be revisable (minimally) depending on changing conditions.

Scenario: Real-time Feedback for LBS 27 Context, Constraints Context, Constraints New /Revised Rules New /Revised Rules E+E+ E+E+ E+E+ E+E+ E-E- E+E+ “Show location lookup using {mode} if {context}” Co-location Location (GPS, name) Social Network In meeting, Alice requests Driving, Bob requests Web browsing, Alice requests  We can learn sets of policy rules:  Concept invention  Recursion  Inter-related concepts  Tailor the search (customised search heuristics)  Use probabilities to handle noise in the data

User Study 2: Automatic Privacy Feedback Preference Detection Surveys, Interviews and Focus groups to find range of Privacy Feedback interfaces: – Dialog Box, Toast, Notification Bar, Vibration, LED, Sound, Flashlight, Natural Language New version of Buddy Track pre-seeded with context sensitive rules on which methods to use Feedback interface using experience sampling to teach engine which policies are correct

How it works: Example 1 2

Scenario: Real-time Feedback for LBS 30 At home HHH 07:00 Lookup from At location Day 1 07:30 Learning new user behavior rules…. Context: in_group(alice, home). in_group(bob, home). happens(gps(57,10),07:00). at_location(home, W, N) ← Conditions,…. phone_position(in_hand) ← Conditions,…. Examples: not do(rtf_toast(alice), 07:00). do(rtf_toast(bob), 07:30). do(rtf_toast(bob), 11:00). New policy: do(rtf_toast(Call_Id, From), T ) ← phone_position(in_hand) ∧ T ≥ 07:30

Scenario: Real-time Feedback for LBS 31 At home At Imperial Near desktop HCCHFCFH H 07:30 Lookup from At location Near device Day 2 …. and revising existing rules incrementally Context: ……….. do(rtf_toast(Call_Id, From), T ) ← phone_position(in_hand) ∧ T ≥ 07:30 Revised policy: do(rtf_toast(Req_Id, From), T ) ← phone_position(in_hand) ∧ T ≥ 07:30 ∧ in_group(From, college) do(rtf_toast(Req_Id, From), T ) ← phone_position(in_hand) ∧ T ≥ 07:30 ∧ ¬holdsAt(location(Imperial)), T )

Using privacy policies 32 Privacy policies; do(rtf_toast(Call_Id, From), T ) ← phone_position(in_hand) ∧ T ≥ 07:30 ∧ in_group(From, college). do(rtf_toast(CallId, From), T ) ← phone_position(in_hand) ∧ T ≥ 07:30 ∧ ¬holdsAt(status(bluetooth_near(desktop)), T ). Context … in_group(charles, college). …. 1) Location request made 2) do(rtf_toast(charles),T) ? YES 3) Toast notification of location lookup Querying rules….

User Study & Findings 15 participants, loosely knit groups, 3 weeks 2 phases (learning, evaluation) Predefined rules used in the phase 1 Interviews Increased accuracy (appropriateness of notifications). Greater Trust and Comfort. Awareness of notifications contributes towards the acceptance of the technology. “Invisibility” of the interface.

Summary 34 State-of-the-art learning system able to learn – Properties about the data, even if not directly observed – Recursive and inter-dependent policies – (Revised) policies from negative and positive examples – Incrementally – Minimal revisions of existing policies Demonstrated utility of learning for adaptive awareness for privacy management.

Future Directions Domain-specific heuristics – Apply to other lifelogging domains Application to (large) real data sets Scalability and efficiency Privacy Interface Controls too complicated – Apply learning to data from groups of users to derive ‘default’ privacy configurations – Learn privacy threats and requirements 35