Trust and Privacy. Agenda Questions? Questions? Trust Trust More project time More project time Privacy Privacy.

Slides:



Advertisements
Similar presentations
An Overview of Internet Credibility
Advertisements

Social Media for Business IFSA March Considering Your Options.
Our Digital World Second Edition
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
IS214 Recap. IS214 Understanding Users and Their Work –User and task analysis –Ethnographic methods –Site visits: observation, interviews –Contextual.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong 1 Design for Privacy February 20,
Phishing and Trust. Agenda Questions? Questions? Phishing Phishing Project feedback Project feedback Trust Trust.
Designing for security and privacy. Agenda Tests Tests Project questions? Project questions? Design lecture Design lecture Assignments Assignments.
Inspection Methods. Inspection methods Heuristic evaluation Guidelines review Consistency inspections Standards inspections Features inspection Cognitive.
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
Principles of Marketing
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Design for Privacy February.
Web 2.0 Testing and Marketing E-engagement capacity enhancement for NGOs HKU ExCEL3.
Review an existing website Usability in Design. to begin with.. Meeting Organization’s objectives and your Usability goals Meeting User’s Needs Complying.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
]. Website Must-Haves Know your audience Good design Clear navigation Clear messaging Web friendly content Good marketing strategy.
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
Introduction Our Topic: Mobile Security Why is mobile security important?
Blackboard Strategies: Using Blackboard Pedagogically.
CC1008NI - Personal Development For Computing Tutorial 1.
E-Commerce and the Entrepreneur
Health Chapter 2.
IIA Fraud Presentation (Press Space Bar to Continue)
1. 2 OVERVIEW First Impressions Content Purpose Design Distinction Closing.
Virtual Business CREATING A WEB PRESENCE Copyright © Texas Education Agency, All rights reserved.
1 The Web & Professional Communication English 3104.
Trust Jason Chalecki Usable Privacy and Security – Spring 2006.
Usability Evaluation/LP Usability: how to judge it.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 7: Focusing on Users and Their Tasks.
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
INTERLEGES AGM KIEV THE “ESSENTIALS” OF LAW FIRM WEBSITES.
Good Web Design. The Four A’s of Good Design Accessible Accurate Appropriate Appealing.
Chapter 14 Part II: Architectural Adaptation BY: AARON MCKAY.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
1 Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
E-Privacy and Cookies: Legal Aspects. E-Privacy Directive 2002/58, amended by 136/2009 Main amendments focus on DBN (security) and confidentiality of.
Part TWO The Process of Software Documentation Chapter 5: Analyzing Your Users Chapter 6: Planning and writing your Doc. Chapter 7: Getting Useful reviews.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
EPrivacy & Consenting Cookies Rakuten LinkShare Symposium 2012 Liz Robertson Jones Day 17 April 2012.
STEP 4 Manage Delivery. Role of Project Manager At this stage, you as a project manager should clearly understand why you are doing this project. Also.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Agents that Reduce Work and Information Overload and Beyond Intelligent Interfaces Presented by Maulik Oza Department of Information and Computer Science.
Project Sharing  Team discussions (15 minutes) –Share results of your work on the Project Scope Proposal –Discuss your choice of methods and results –Prepare.
Selection, Administration, Scoring, and Communicating Assessment Results Chapter 5.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Chapter6: E-Commerce Web Sites HNDIT11062 – Web Development 1.
Creating & Building the Web Site Week 8. Objectives Planning web site development Initiation of the project Analysis for web site development Designing.
Online Journalism in Agricultural Communication Agricultural Communication and Leadership.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 7: Focusing on Users and Their Tasks.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Databases vs the Internet. QUESTION: What is the main difference between using library databases and search engines? ANSWER: Databases are NOT the Internet.
Designing with Persuasion Is good design always persuasive? Push persuasion Take my product (advice) Buy my product Solicitation Messages & Warnings Pull.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
PROMOTING SPECIALTY CROPS AS LOCAL Module 4: How do you get your message out to consumers?
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
The Information School of the University of Washington Information System Design Info-440 Autumn 2002 Session #20.
McGraw-Hill/Irwin © 2009 The McGraw-Hill Companies, All Rights Reserved Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
 THE HEALTH SKILLS ◦ Interpersonal communication  Communication skills  Refusal skills  Conflict resolution ◦ Self management  Practicing healthful.
Information Security.
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
LO2 - Be Able to Design IT Systems to Meet Business Needs
The Psychology of Security
Online Safety: Rights and Responsibilities
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Informative & Positive Messages
Presentation transcript:

Trust and Privacy

Agenda Questions? Questions? Trust Trust More project time More project time Privacy Privacy

Trust is fundamental to security Lack of trust results in systems being ill-used or used not at all Lack of trust results in systems being ill-used or used not at all Lack of understanding of trust results in wrong decisions or no decisions Lack of understanding of trust results in wrong decisions or no decisions Too much trust can be more dangerous than too little Too much trust can be more dangerous than too little –E.g. I can open any file attachment because I run anti-virus software

What are your strategies? Scenario: you are buying a product from a new site, what leads you to trust the site and buy from them? Scenario: you are buying a product from a new site, what leads you to trust the site and buy from them? Scenario: you are looking up medical information on a new site, what leads you to trust the site? Scenario: you are looking up medical information on a new site, what leads you to trust the site? Scenario: you consider downloading a new browser plug-in, what leads you to trust the plug-in and download? Scenario: you consider downloading a new browser plug-in, what leads you to trust the plug-in and download?

Definitions Book: “Trust concerns a positive expectation regarding the behavior of somebody or something in a situation that entails risk to the trusting party” Book: “Trust concerns a positive expectation regarding the behavior of somebody or something in a situation that entails risk to the trusting party” Miriam-Webster: “assured reliance on the integrity, ability, or character of a person or thing” Miriam-Webster: “assured reliance on the integrity, ability, or character of a person or thing”

Layers Dispositional trust Dispositional trust –Psychological disposition or personality trait to be trusting or not Learned trust Learned trust –A person’s general tendency to trust, or not to trust, as a result of experience Situational trust Situational trust –Basic tendencies are adjusted in response to situational cues

Processing strategies Heuristic approach making quick judgments from the obvious information Heuristic approach making quick judgments from the obvious information Systematic approach involving detailed analysis of information Systematic approach involving detailed analysis of information

Models summarization Increases trust Increases trust –Familiarity –Benevolence –Integrity –Comprehensive info –Shared value –Credibility –Good feedback –Reliability –Usability Decreases trust Decreases trust –Risk –Transaction cost –Uncertainty

Losing trust What are ways to damage trust? What are ways to damage trust? How can you repair damaged trust? How can you repair damaged trust?

Trust Design Guidelines 1. Ensure good ease of use. 2. Use attractive design. 3. Create a professional image – avoid spelling mistakes and other simple errors. 4. Don’t mix advertising and content – avoid sales pitches and banner advertisements. 5. Convey a “real-world” look and feel – for example, with use of high- quality photographs of real places and people. 6. Maximize the consistency, familiarity, or predictability of an interaction both in terms of process and visually. 7. Include seals of approval such as TRUSTe. 8. Provide explanations, justifying the advice or information given. 9. Include independent peer evaluation such as references from past and current users and independent message boards. 10. Provide clearly stated security and privacy statements, and also rights to compensation and returns. 11. Include alternative views, including good links to independent sites with the same business area. 12. Include background information such as indicators of expertise and patterns of past performance. 13. Clearly assign responsibilities (to the vendor and the customer). 14. Ensure that communication remains open and responsive, and offer order tracking or an alternative means of getting in touch. 15. Offer a personalized service that takes account of each client’s needs and preferences and reflects its social identity.

Credibility How is this different than trust? How is this different than trust? Four Types of Credibility Four Types of Credibility –Presumed credibility. –Reputed credibility. –Surface credibility. –Experienced credibility.

Stanford Guidelines for Web Credibility 1. Make it easy to verify the accuracy of the information on your site. 2. Show that there's a real organization behind your site. 3. Highlight the expertise in your organization and in the content and services you provide. 4. Show that honest and trustworthy people stand behind your site. 5. Make it easy to contact you. 6. Design your site so it looks professional (or is appropriate for your purpose). 7. Make your site easy to use – and useful. 8. Update your site's content often (at least show it's been reviewed recently). 9. Use restraint with any promotional content (e.g., ads, offers). 10. Avoid errors of all types, no matter how small they seem. Stanford Persuasive Technology Lab

Food for thought What have you noticed websites doing to increase your trust? What have you noticed websites doing to increase your trust? Have you grown more or less trustworthy over time? General public? Have you grown more or less trustworthy over time? General public? Should computers (application designers) trust users? Should computers (application designers) trust users? –Should the system take over and prevent bad things from happening? When?

Project feedback Project proposal due NEXT WEEK Project proposal due NEXT WEEK I need to sign off on all IRB applications I need to sign off on all IRB applications – me (or post online) a draft, I will likely ask for modifications –Bring final printed copy to class Rule of thumb: someone else should be able to pick up your proposal and carry out the study Rule of thumb: someone else should be able to pick up your proposal and carry out the study Include implementation or other aspects in your proposal if applicable Include implementation or other aspects in your proposal if applicable

Privacy Why do we care? Why do we care? –Is privacy a fundamental right? –Or is it instead instrumental in achieving personal security? Holistic property of a system Holistic property of a system –Difficult to analyze and understand the impacts –Ethical, legal, political ramifications

Definitions Protection from unwarranted intrusions (informational self-determination) Protection from unwarranted intrusions (informational self-determination) Ability to control the terms under which personal information is acquired and used Ability to control the terms under which personal information is acquired and used “boundary regulation process” of managing disclosure and identity “boundary regulation process” of managing disclosure and identity “No definition of privacy is possible because privacy issues are fundamentally matters of values, interests and power” “No definition of privacy is possible because privacy issues are fundamentally matters of values, interests and power” –Alan F. Westin, legal and policy scholar

Privacy preferences Westin surveys: Westin surveys: Fundamentalists Fundamentalists Pragmatists Pragmatists Unconcerned or marginally concerned Unconcerned or marginally concerned Who are you? What are the implications? Who are you? What are the implications?

Privacy vs. Trust How does this relate to trust? How does this relate to trust? Are there layers of privacy like layers of trust? Are there layers of privacy like layers of trust? –Dispositional, learned, situational

Why is privacy such a huge problem? Incomplete information Incomplete information –How likely are risks? How serious are risks? –What can you do to mitigate risks? Decisions are highly contextual and individualized Decisions are highly contextual and individualized Bounded rationality – simplistic mental models Bounded rationality – simplistic mental models Difficulty in assessing tradeoffs Difficulty in assessing tradeoffs –Assign greater strength to short term than long term outcomes

Issues to consider Privacy is a secondary task Privacy is a secondary task –Users of privacy tools often seek out these tools due to their awareness of or concern about privacy –Even so, users still want to focus on their primary tasks Users have differing privacy concerns and needs Users have differing privacy concerns and needs –One-size-fits-all interface may not work Most users are not privacy experts Most users are not privacy experts –Difficult to explain current privacy state or future privacy implications –Difficult to explain privacy options to them –Difficult to capture privacy needs/preferences Many privacy tools reduce application performance, functionality, or convenience Many privacy tools reduce application performance, functionality, or convenience

Exoinformation Leaving information behind based on our activities Leaving information behind based on our activities –Examples? Users often unaware of these information trails and tidbits Users often unaware of these information trails and tidbits –If we aren’t aware, how can we give consent or make appropriate decisions? Chapter 20: A Users Centric Privacy Space Framework

Areas with big privacy issues eCommerce eCommerce Medical information systems Medical information systems Social networking and messaging (IM, MySpace, etc.) Social networking and messaging (IM, MySpace, etc.) Media spaces Media spaces Tracking & location-enhanced technologies Tracking & location-enhanced technologies

Friend Finder Location service of buddy list Location service of buddy list – –Loopt: – –Helio’s Buddy Beacon: What are privacy issues? What are models of interaction? (push vs. pull, etc.) Design a UI for configuring who sees what and when – –What functions or features are needed? – –How to convey model of disclosures? – –How do users quickly make changes? How would you evaluate your interface? Privacy Lost: These Phones Can Find You, NYTimes, Oct. 23, 2007

Final food for thought Is privacy awareness evolving? Are people more aware now? How can we increase their awareness? Is privacy awareness evolving? Are people more aware now? How can we increase their awareness? Is awareness enough? Identity theft is a big topic lately – but has it led to any increased usage of privacy and security software? Is awareness enough? Identity theft is a big topic lately – but has it led to any increased usage of privacy and security software? Why does cyberspace feel lacking in social morals and ethics? How can we improve? Why does cyberspace feel lacking in social morals and ethics? How can we improve?