Mark Ackerman Department of Electrical Engineering and Computer Science and School of Information University of Michigan HCI Issues in Privacy DIMACS July,

Slides:



Advertisements
Similar presentations
Why we love looking at money but still hate banks Bruce Davis 15 th February 2005.
Advertisements

The Challenge of the New Data Mark Elliot, Social Sciences University of Manchester January 2013
BUSINESS B2 Ethics.
Interaction of RFID Technology and Public Policy Presentation at RFID Privacy MIT 15 TH November 2003 By Rakesh Kumar
Web Applications: Get a Grip on Privacy Michael Corn CAMP 2008.
Creating an Effective Information Security Training, Education and Awareness Programme Annual ISACA Kampala Chapter Information Security Workshop Prof.
Usable Security (Part 1 – Oct. 30/07) Dr. Kirstie Hawkey Content primarily from Teaching Usable Privacy and Security: A guide for instructors (
INFO 310 User Centered Design. User centered design (Allen, 1996) Identify a user population Investigate the information needs of the user group Discover.
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Engineering Privacy November 6, 2008.
Agenda today 2:00-3:00: lecture 3:00-5:00: The tutor Irene will demonstrate an example of how to use Protocol Analysis for your project.
Computers and Society Carnegie Mellon University Spring 2007 Cranor/Tongia 1 Regulating Online Speech / Privacy.
C MU U sable P rivacy and S ecurity Laboratory Making privacy visible Lorrie Faith Cranor October 19, 2007.
Institute of Information Systems, Humboldt University, 2006· Privacy Engineering Sarah Spiekermann & Lorrie Faith Cranor DIMACS Workshop, Rutgers University.
Chapter 10: Project Communications Management. 2303KM Project Management Learning Objectives 1.Project Communications Management Processes 2.Explain the.
Marketing Information and Research
Cloud Usability Framework
INTRODUCTION. Concepts HCI, CHI Usability User-centered Design (UCD) An approach to design (software, Web, other) that involves the user Interaction Design.
Attorney at the Bars of Paris and Brussels Database exploitation & Data protection Thibault Verbiest Amsterdam 1 April 2005
CS 235: User Interface Design August 27 Class Meeting Department of Computer Science San Jose State University Fall 2014 Instructor: Ron Mak
Credits: Adopted from Web Engineering: A Practitioner’s Approach (The McGraw-Hill Companies, Inc.) by Roger Pressman and David Lowe, copyright Agile.
1. Human – the end-user of a program – the others in the organization Computer – the machine the program runs on – often split between clients & servers.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Company Confidential How to implement privacy and security requirements in practice? Tobias Bräutigam, OTT Senior Legal Counsel, Nokia 8 October
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Overview Week 1 - August.
Lecture 6 User Interface Design
References  Cranor & Garfinkel, Security and Usability, O’Reilly  Sasse & Flechais, “Usable Security: Why Do We Need It? How Do We Get It?”  McCracken.
Disclosure Control in Practice: issues and approaches Andy Sutherland Health and Social Care Information Centre.
UWCISA Symposium on Information Systems Assurance 2005 Internet Privacy Research University of Waterloo Efrim Boritz Won Gyun No R. P. Sundarraj Framework,
Computer and Network Use Policies ITSS 4201 Internet Insurance and Information Hiding ► University of Palestine ► Eng. Wisam Zaqoot ► Feb 2010.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
MANAGEMENT AND SOCIETY
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
Dimensions of Privacy 18739A: Foundations of Security and Privacy Anupam Datta Fall 2009.
INF5200/TOOL5100: CSCW/L Issues in CSCW and groupware Lecture 1, Issues in CSCW and Groupware: Anders Mørch and Sisse Finken INF5200/TOOL 5100,
Chapter 2 Web Site Design Principles Principles of Web Design, Third Edition.
Privacy & How IT Will Help JEFF NORTHROP, CTO
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Designing for Privacy Human factors and system’s engineering Usable Security – CS.
Part TWO The Process of Software Documentation Chapter 5: Analyzing Your Users Chapter 6: Planning and writing your Doc. Chapter 7: Getting Useful reviews.
SOCIAL IMPLICATIONS AND DESIGN ISSUES IN CSCW AND HCI I203 Social and Organizational Issues of Information.
The Role of HCI In IS Curriculum Ping Zhang School of Information Studies Syracuse University AMCIS’03 Panel.
TOOL5100: CSCL Issues in CSCW and groupware A. Mørch, Issues in CSCW and Groupware: Anders Mørch TOOL 5100,
PICTURE your design. Purpose : Functions & Content Functions the facilities that make the content of the ICT useful for relevant users and other ICT’s.
1 Designing Better Software User Centred Design and Usability Adam Smith Director, Design and Usability Flight Level Media Ltd.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Designing Attention-Centric Notification Systems Five HCI Challenges Scott McCrickard Center for Human-Computer Interaction & Department of Computer Science.
4 November 2000Bridging the Gap Workshop 1 Control of avatar gestures Francesca Barrientos Computer Science Division UC Berkeley.
Human-Computer Interaction at CMU Jodi Forlizzi Jason Hong.
Jon Froehlich 1 Leah Findlater 2 James Landay 1 1 Computer Science and Engineering (DUB Institute, University of Washington ) 2 The Information School.
Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Collective Information Practice: Exploring Privacy and Security as Social and Cultural.
The AdHority Aslı Çağlar Instructor: Ekmel Ertan VA 401 Project Presentation.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Wide Area Grid – Technical Requirements Paul Kopp.
Business Challenges in the evolution of HOME AUTOMATION (IoT)
Creating a Culture of Privacy Michael Kaiser Executive Director National Cyber Security
Privacy. Some Web Science Issues Kieron O’Hara 29 November 2011.
Framework of engagement : big data for official use Roy D. Ibay AVP Regulatory PLDT – Smart.
Research & Professional Ethics. Objectives Understand the ethical considerations for social science research. Understand the elements that must be included.
Michael Spiegel, Esq Timothy Shimeall, Ph.D.
Research and the Data Protection and Freedom of Information Acts
Frank E. Ritter 12 feb 08 (presented 19 feb 08)
Survey Design Web Surveys.
Human Computer Interaction
The basics of Social Science Research Lecture 3
Howard Rosenbaum "Your Vulnerability in CyberSpace - FBI and IU perspectives on Internet security, intellectual property,
MSc. Research Methods Week 1- Introduction.
Should we also regulate non-personal data?
Presentation transcript:

Mark Ackerman Department of Electrical Engineering and Computer Science and School of Information University of Michigan HCI Issues in Privacy DIMACS July, 2004

2 Overview of talk 1.HCI 2.What is “privacy”? 3.The “privacy problem” 4.Why is privacy hard?

3 HCI Human-Computer Interaction qUser control aka User-centered –Not just about user interfaces –Cognitive versus micro-sociology –Broad view of HCI -Combined social and technical co-design space qEmpirically driven (both as science and development process)

4 Privacy What is “privacy” qDiffering but connected senses in social psychology, micro-sociology, policy literatures –Solitude -Regulation of social interaction (Altman) –A private (versus public) space or activity –Avoiding unwanted personal disclosure or noise –Freedom from surveillence –Control over release and dissemination of personal data -Control over one’s persona (Goffman)

5 Privacy What is “privacy” qControl over one’s personal data –Control over release and dissemination qOverlapping with security but different qInherently a tension between person and others qThought to be critical element in using a commercial Web site, adoption of ubicomp

6 The “Privacy Problem” Privacy is important –Growing problem for users Consumers see privacy as a big problem –41% of sampled US consumers very concerned about their privacy [Harris Poll, 2000] – 92% of respondents indicated that even when companies promised to keep personal data private, they would not actually do so [Light 2001] –57% of sampled US consumers want better legal protection [Harris Poll, 2000]

7 The “Privacy Problem” But privacy is not a monolithic problem qDiffering attitudes in different cultures

8 The “Privacy Problem” But privacy is not a monolithic problem qDiffering types of privacy concerns (Culnan and Armstrong 1999) –Unauthorized access –Risk of secondary use -Reuse of personal data for unrelated purposes without consent -Sharing with third-parties -Creation of profiles

9 The “Privacy Problem” But privacy is not a monolithic problem qAttitudes are hardly monolithic –3 basic groups in US (Ackerman, Cranor, Reagle 1999, based on Westin 1991) -Marginally concerned (27%) -Privacy fundamentalists (17%) -Privacy pragmatics (56%) –Spiekermann et al. found similar in Germany –Based on what people both said they would do in an activity and their actual activity

10 The “Privacy Problem” But privacy is not a monolithic problem q Large gap between most people's stated preferences and their actual behavior q But most people want a feeling of control –For example, no automatic transfer of data (86% of sample in Ackerman, Cranor and Reagle 1999)

11 Why is privacy a hard problem for HCI? Social theoretic background q Goffman (1961)  Release of personal info is highly nuanced  Presentation of “face” is critically important to people  An everyday activity  Garfinkel (1967)  People expect to be able to make sense of their environments and their activities

12 Why is privacy a hard problem for HCI? Social activity is fluid and nuanced q Details of interaction matter (Garfinkel 1967, Strauss 1993) q People handle this detail with agility (Suchman 1987) q What people pay attention differs according to the situation (situated activity, Suchman 1987)

13 Why is privacy a hard problem for HCI? HCI problem (also CSCW problem)  Information space is horrendous  At least nine dimensions of analysis (e.g., what, who, intended use, duration of use)  And  Critically important to people  Highly nuanced  An everyday activity  Social-technical gap (Ackerman 2001)  We know what we need to do, but we don’t know how to do it.

14 Why is privacy a hard problem for HCI? Ubicomp makes user control even harder: qAn individual will operate within many social and organizational contexts, and surrounding social and organizational environments may make use of many individuals' data. qA pervasive software environment, consisting of many systems, may be in a complex relation to “the user.”

15 More info? Mark Ackerman

16 Privacy Critics Privacy critics (Ackerman and Cranor 1996)

17 Privacy Critics