Privacy & Security broadening the conversation Ken Anderson | Intel Research Paul Dourish | UC Irvine.

Slides:



Advertisements
Similar presentations
ICT through the Modernising Schools Project and the Primary Capital Programme Kristina Wingeleth – Education Officer (Funding & Projects) Dorset County.
Advertisements

Fostering Learners’ Collaborative Problem Solving with RiverWeb Roger Azevedo University of Maryland Mary Ellen Verona Maryland Virtual High School Jennifer.
Integration of Auditive and Visual Feedback in the Design of Interfaces for Security Applications. CLIHC 2007 September 10–11 Rio de Janeiro Brazil 2University.
Network Science and Engineering (NetSE) Research Agenda: v1.0 5 th GENI Engineering Conference Seattle, WA 21 July 2009 Ellen Zegura, Georgia Tech.
RESTROOM EXPECTATIONS 3 CORNERS ACTIVITY. WHAT RULE DOES THIS EXPECTATION FIT WITH? Use the restroom during passing time.
About the Food Research Collaboration (FRC) Tim Lang, City University London Mary Atkinson Victoria Schoen Nadia Barbu.
GENI: Global Environment for Networking Innovations Larry Landweber Senior Advisor NSF:CISE Joint Techs Madison, WI July 17, 2006.
GS/PPAL Section N Research Methods and Information Systems January 27, 2015 Professor Brenda Spotton Visano Office: 130 McLaughlin Voice Mail:
East Africa Tradeoff Analysis Workshop. Workshop goals and strategy Strategy Monday Introduction to TOA approach Tuesday AM Conceptual framework Tuesday.
Silo Compliance Risk vs. Enterprise Compliance Risk Presented to: ORIMS PD Day By: Joe Hardy & Tony Carlisle.
2011 Space Weather Enterprise Forum Sponsored by National Space Weather Program Council Commerce, Defense, Energy, Homeland Security, Interior, State,
Techniques for Visual Feedback of Security State Tara Whalen and Kori Inkpen Faculty of Computer Science Dalhousie University whalen at cs dot dal dot.
UCI - Redmiles Practical Lessons Learned While Using Notification Servers To Support Application Awareness David Redmiles Cleidson R. B. De Souza, Santhoshi.
NSF Cyber Trust Annual Principal Investigator Meeting Sept th 2005 Newport Beach California ITR: Usable Security: Towards a Trustable Information.
2004 ISR Research Forum Richard N. Taylor Director.
1 To advance software and information technology through research partnerships. ISR is the only organization focused on Software Research within the University.
Interaction in a Time of Computational Plenty Paul Dourish Information & Computer Science UC Irvine.
Security as Experience & Practice Supporting Everyday Security Paul Dourish Donald Bren School of Information and Computer Sciences & California Institute.
Software, Automation, and the Futility of Requirements Paul Dourish Information & Computer Science UC Irvine ASE Workshop, 6/28/02.
Contemporary Issues in Canadian Health Care Nola M. Ries, MPA, LLM Adjunct Assistant Professor, University of Victoria Research Associate, Health Law Institute,
11 CONFIGURE INTERNET EXPLORER Chapter 5. Chapter 5: Configure Internet Explorer2 CHAPTER OVERVIEW AND OBJECTIVES  Configuring Accessibility and Language.
The IUCN Programme Nature+ Proposal, May 2011.
2 Next Generation Catalogs Complete Faceted Not just a destination Community participation Flexible privacy and filtering Open.
SOCIAL WORK ETHICS Issue in Child Welfare. GOALS & OBJECTIVES 1. To discuss how we define ethics. 2. To examine personal values related to ethics. 3.
Ethical principles Honesty – be honest in the way you communicate as well as how you act. Integrity – Earn the trust of others.
Research using Social Media Challenges & Considerations 11 April 2014 Kelsey Beninger, NatCen Social #NSMNSS.
K E Y : SW Service Use Big Data Information Flow SW Tools and Algorithms Transfer Application Provider Visualization Access Analytics Curation Collection.
Seeking the Source Software Source Code as a Social and Technical Artifact Cleidson de Souza, Jon Froehlich, and Paul Dourish Jon Froehlich University.
Contract No. FP INSEC is a project co-funded by the European Commission under the Seventh Framework Programme ( ) INCREASE INNOVATION.
Patient Generated Data Hearing Summary of Presentations, Discussions, and Blog Responses.
Eclipse Trust Framework (ETF) Creation Review SocialPhysics April 6, 2005.
Building Vermont’s Moral Economy Paul A. Cillo Public Assets Institute August
Three Horizon2020 priorities: 1.Excellent science 2.Industrial leadership 3.Societal challenges.
RENEE LE ROUX SABIF MANAGER WHY SABIF ? (SOUTH AFRICAN NODE OF GBIF) To create an enabling platform for researchers in South Africa –to.
SAS ‘05 Reducing Software Security Risk through an Integrated Approach David P. Gilliam, John D. Powell Jet Propulsion Laboratory, California Institute.
David Carr The Wellcome Trust Data management and sharing: the Wellcome Trust’s approach Economic & Social Data Service conference.
ANIE IE Research Workshop Objectives towards a Curriculum Development University of Pretoria July 4-5, 2011 Rafael Capurro International Center for Information.
Improving Partnership Can Improve Humanitarian Action Summary of Global Humanitarian Platform Discussion: Recommendations, Action Points, and Challenges.
K E Y : SW Service Use Big Data Information Flow SW Tools and Algorithms Transfer Transformation Provider Visualization Access Analytics Curation Collection.
THE PUBLIC POLICY OF REINTEGRATION Professor David Adams Social Inclusion Commissioner June 2010.
© Heikki Topi Briefing on Upcoming Workshop on Data Science Education ACM Education Council Denver, CO August 24-25, 2015 Heikki Topi, Bentley University.
Living Earth Platform = FuturICT Knowledge Accelerator Flagship Infrastructures Innovative Management Other Projects and Programs Policy Partnerships Business.
Welcome to the Data Privacy Day Event!. Privacy Practices in SaaS Environments Ben Nelson, CISO and Director, IT Services Julie Smith David, Director,
Security at Line Speed: Integrating Academic Research and Enterprise Security.
THE SUSTAINABLE 21 ST CENTURY MUSEUM LEADER INTERCOM 2015, October 29, 2015 Marsha Semmel, Anne Ackerson, Joan Baldwin, David Young.
When ethics travel The global environment. Looking at the company-type Foreign Country Type -does not apply home-country concepts to the countries abroad.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Collective Information Practice: Exploring Privacy and Security as Social and Cultural.
Federated Identity Management for Scientific Collaborations The Common Vision David Kelsey (STFC) 3 Nov 2011.
What are campaigns? Directional activity designed to achieve a particular purpose  More than education, general advocacy  Enlist a wider public  Aim.
Citizen leadership Friday 11 September 2015 Jess Alexander, Scottish Social Services Council.
K E Y : DATA SW Service Use Big Data Information Flow SW Tools and Algorithms Transfer Hardware (Storage, Networking, etc.) Big Data Framework Scalable.
1 Nelson Mandela Foundation Community Dialogues Mothomang Diaho November
What is our Primary Task?. Identifying our Primary / Core Responsibilities? (in relation to our Primary Task)
FET Proactive Initiative: “The Disappearing Computer 2” Thomas Skordas.
CMGT 411 Week 3 DQ 2 Of the three principles of data security; availability, integrity, and confidentiality, which principle is likely to have the greatest.
Chapter 23: Building Community
Linking theory to practice
Federated Identity Management for Scientific Collaborations
Cumbria Museums Partnership An Entrepreneurial Approach
Decision Support Tool: When and How to Integrate!
Ken Davies, Housing Strategy Officer
June 22 – 25, 2017 National Conference Center • Leesburg, VA
Usability Issues in Identity Management Improving the engagement ceremony between users and services Panel Moderator: J. Trent Adams
Open Systems reference architectures, standards & platforms
6th Framework Programme
Regional workshop on Approaches to the implementation and monitoring of community-based ecosystem approach to fisheries management (CEAFM): finding common.
REU student: Domonique Cox Graduate mentors: Kaiqiang Song
REU student: Domonique Cox Graduate mentors: Kaiqiang Song
Information from Understanding Comics by Scott McCloud
RESEARCH AND INNOVATION POLICY OF UKRAINE
Presentation transcript:

Privacy & Security broadening the conversation Ken Anderson | Intel Research Paul Dourish | UC Irvine

joint research People and Practices Research ethnography, design research ISR Group exploratory system design, empirical studies joint research funded by Intel Research Council & NSF two-fold exploration conceptual understandings technology prototypes

privacy security

privacy security danger safety secrecy trust identity morality power risk

Public = shared (like in toilet), not “out in the open”

risk and the morality of food

risk and public space

the risk society

secrecy and trust

collective information practices an alternative framing from privacy and security… … to collective information practices practice “practice is, first and foremost, a process by which we find the world and our encounters with it as meaningful” (Wenger) meaning-in-use as a collective phenomenon

technological development a change of tack how is practice enacted and sustained? technology as a platform for information practice helping people “do” privacy three design principles no normative distinction visualizing system activity integrating configuration & action

summary information practices privacy is not an abstract goal it is a way in which social action is achieved a fruitful avenue for design technology as a platform for practical action how practice is sustained and developed

acknowledgements intel scott mainwaring, virginia meade, mary rossell ISR david f. redmiles, rogerio depaula, sharon ding, kari nies, ben pillet, jie ren, jennifer a. rode, roberto silva filho