Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Slides:



Advertisements
Similar presentations
My EBSCOhost Tutorial Tutorial support.ebsco.com.
Advertisements

Welcome to the Award Winning Easiest to Use & Most Advanced View, Manage, and Control Security, Access Control, Video, Energy & Lighting Systems, & Critical.
Altman IM Ltd | | capture | index | organise | workflow Enterprise document & content management … for all types & size.
Supporting The Mobile Client: Expanding Our Borders John Guidone Manager, Desktop Technologies and Dawn E. Colonese Manager, Help Desk & Client Access.
Introduction to Online Data Collection (OLDC) Community Based Abstinence Education September, 2009.
Advanced Workgroup System. Printer Admin Utility Monitors printers over IP networks Views Sharp and non-Sharp SNMP Devices Provided Standard with Sharp.
Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.
Fòmasyon Itilizatè Ayiti Office 365 Fòmasyon. Why the Change? Partners in Health's new hosted Microsoft Office 365 solution allows users to access their.
6/10/2015Cookies1 What are Cookies? 6/10/2015Cookies2 How did they do that?
Privacy and Ubiquitous Computing Jason I. Hong. Ubicomp Privacy is a Serious Concern “[Active Badge] could tell when you were in the bathroom, when you.
Usable Privacy and Security Carnegie Mellon University Spring 2006 Cranor/Hong/Reiter 1 Course Overview January.
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
Can We Achieve Secure Mobile Computing Anytime Soon? Jason I. Hong WMCSA2006 April
Usable Privacy and Security: Trust, Phishing, and Pervasive Computing Jason I. Hong Carnegie Mellon University.
User- Controllable Privacy and Security for Pervasive Computing Jason I. Hong Carnegie Mellon University.
1 Personal Activity Coordinator (PAC) Xia Hong UC Berkeley ISRG retreat 1/11/2000.
Usable Privacy and Security: Trust, Phishing, and Pervasive Computing Jason I. Hong Carnegie Mellon University.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong 1 Course Overview January 16, 2007.
Computer Networks IGCSE ICT Section 4.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Smartphones. Lesson Objectives To understand and demonstrate an understanding of Smartphones.
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
WebQuilt and Mobile Devices: A Web Usability Testing and Analysis Tool for the Mobile Internet Tara Matthews Seattle University April 5, 2001 Faculty Mentor:
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Microsoft Office 2010 Office 2010 and Windows 7: Essential Concepts and Skills.
Automated Tracking of Online Service Policies J. Trent Adams 1 Kevin Bauer 2 Asa Hardcastle 3 Dirk Grunwald 2 Douglas Sicker 2 1 The Internet Society 2.
Human-Computer Interaction Breakout Clare-Marie Karat, Charles Wiecha Wanda Dunn, Jason Hong, Bonnie John, Bob Kraut, Brad Myers, Norman Sadeh.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Mobile and Location-Based Services Jason I. Hong May
Pasewark & Pasewark 1 Outlook Lesson 1 Outlook Basics and Microsoft Office 2007: Introductory.
Cyber Crimes.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Module 8: Managing Client Configuration and Connectivity.
Introduction to our On-Line Self Service Center at
System for Administration, Training, and Educational Resources for NASA SATERN Overview for Learners May 2006.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
IT security By Tilly Gerlack.
EDW647: Internet for Educators Dr. Roger Webster Department of Computer Science Millersville University July 23, 2008 Create.
How KeePass password safe can save you time and energy
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
Maintaining File Services. Shadow Copies of Shared Folders Automatically retains copies of files on a server from specific points in time Prevents administrators.
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
Introducing Paperless Bill Management and Accounts Receivable Processing.
©2010 John Wiley and Sons Chapter 12 Research Methods in Human-Computer Interaction Chapter 12- Automated Data Collection.
 Saundra Speed  Mariela Esparza  Kevin Escalante.
Copyright © 2006 TietoEnator Corporation Using Community Tools To Improve Team Work Magnus Einarsson.
Diagnostic Pathfinder for Instructors. Diagnostic Pathfinder Local File vs. Database Normal operations Expert operations Admin operations.
Mobile and Location-Based Services Jason I. Hong Product Design and Usability April
Denise Oliver, Education and Outreach Director Alabama Supercomputer Authority.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
Usable Privacy and Security and Mobile Social Services Jason Hong
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Usable Privacy and Security.
Configuring and Deploying Web Applications Lesson 7.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Campus Mail Services New USPS Requirement USPS IMpb Solution (Intelligent Mail Parcel Barcode) EMS WEBVIEW SHIPPING.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
1 A Look at the Application Authorized users can access Communicator! NXT from any Internet-capable computer via the Web.
[FUNCTIONALITY AND SAFETY OF A MODERN TECHNOLOGY] [CLOUD COMPUTING FOR INDIVIDUAL CONSUMERS]
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
Helping patrons get the most out of eLibraries Manitoba!
Quality Assurance System Field Service Automation
Five Reasons to Use SharePoint 2013 Communities
Quality Assurance System Field Service Automation
PLANNING A SECURE BASELINE INSTALLATION
COMPLETE BUSINESS TEXTING SOLUTION
Provide secure environment for online assessment with Moodle – POC.
Presentation transcript:

Four Two Rants on Mobile Computing Jason I. Hong Feb Carnegie Mellon University Intel Ultra-Mobile Devices Workshop

Two Rants on Mobile Computing Text input is terrible Facing new privacy and security risks Cross-platform issues stifle wide-scale deployment Conducting realistic user evaluations difficult

Rant #1 – Text Input is Terrible Standard phones –Multi-tap, 8-20 wpm, world record 29 wpm –T9, ~20 wpm Special hardware –Twiddler, ~26-47 wpm (training) Pen –QWERTY, ~34 wpm –IBM SHARK (pen), wpm Stuck with ~20 wpm for near future

Rant #1 – Text Input is Terrible Observation: don’t have to support generic text input –Support input for tasks that are common when mobile inTouch –Leverage daily rhythms and real-time context –Improve group awareness and messaging GurunGo –Use existing desktop web browsing activities –Improve information retrieval while on the go

inTouch: Mobile Group Coordination Goal: Better coordination for small mobile groups –Contextual awareness –Contextual messaging

Project: InTouch It’s 4:30pm and Mom is stuck in traffic inTouch checks her calendar and sees she’s supposed to pick up Cindy from ballet

Project: InTouch Mom’s phone senses that she is in a traffic jam, and automatically prepares a status message Mom hits “send”, and Cindy sees that Mom is running late. Cindy decides to wait inside.

inTouch: Mobile Group Coordination Using context to: –Select a message template –Fill in the blanks (like a MadLib) When is contextual messaging useful? –Calendar alarms (“running late, will be there in ”) –Current activity (“I’m in a meeting, done at ”) –Daily rhythms (“Picked up kid ok” at 3PM) –Messages received (“Where r u?” -> “I am at ”) Currently developing a working prototype

GurunGo Goal: Make it easy to access useful information while mobile Observation #1: People still tend to print out online maps, despite having mobile device. Why? –Found it via desktop, easier to print than to copy to mobile –Slow or expensive wireless connections –Inconvenient form factor on mobile device Observation #2: People don’t do the same kind of web browsing on mobile phones as on desktops –Don’t have to support all information finding tasks, just ones more likely to be done when mobile

GurunGo Scenarios Idea: Tie mobile more closely with desktop You find an interesting product while browsing –Use GurunGo to copy-and-paste to mobile –Augments with product reviews –Copies to mobile –Kept until explicitly deleted As you browse web on desktop: –GurunGo scans HTML for maps –Generates speech-based directions –Copies to mobile –Directions eventually discarded after given time

GurunGo Usage Acquire –Let people explicitly copy-and-paste info to mobile –Let people implicitly copy info via regular web browsing GurunGo scans pages seen for potentially useful stuff Augment –Look for known data types, make mobile data more useful –Ex. Augment maps with speech-based directions Copy (to mobile in the background) Browse –Organize data based on common data types –Street addresses, product comparisons, phone #s

GurunGo: Speech-based Directions

Nice Features of GurunGo Reduces number of clicks to get to useful information –Can support specific information finding tasks while mobile –Currently: Directions, products –Future: Movies, phone #s, dates and times, recent s Works even if you don’t have wide-area wireless –Works disconnected (no network or don’t want to pay) –Only needs personal area network (Bluetooth)

Rant #2: New Privacy and Security Risks Mobile devices becoming intimate part of our lives –Mobile communication –Mobile e-commerce –Sharing location information with others –Unlock doors in home Leads to lots of new risks –Mobile spyware (tracks location, already starting) –Steal and punch thru corporate firewalls –Device lost, embarrassment

User Controllable Privacy and Security Goal: Make it easy for people to manage privacy and security policies for pervasive computing –Simple UIs for specifying policies –Clear notifications and explanations of what happened –Better visualizations to summarize results –Machine learning for learning preferences –Start with small evaluations, continue with large-scale ones Large multi-disciplinary team and project –Six faculty, 1.5 postdocs, six students –Supported by NSF, CMU CyLab –Roughly 1 year into project

Contextual Instant Messaging Facilitate coordination and communication by letting people request contextual information via IM –Interruptibility (via SUBTLE toolkit) –Location (via Place Lab WiFi positioning) –Active window Developed a custom client and robot on top of AIM –Client (Trillian plugin) captures and sends context to robot –People can query imbuddy411 robot for info “howbusyis username” –Robot also contains privacy rules governing disclosure

Contextual Instant Messaging Privacy Mechanisms Web-based specification of privacy preferences –Users can create groups and put screennames into groups –Users can specify what each group can see

Contextual Instant Messaging Privacy Mechanisms Notifications of requests

Contextual Instant Messaging Privacy Mechanisms Social translucency

Contextual Instant Messaging Privacy Mechanisms Audit logs

People Finder Location useful for micro-coordination –Meeting up –Okayness checking Developed phone-based client –GSM localization (Intel) Conducted studies to see how people specify rules (& how well) See how well machine learning can learn preferences

Grey – Access Control to Resources Distributed smartphone-based access control system –physical resources like office doors, computers, and coke machines –electronic ones like computer accounts and electronic files –currently only physical doors Proofs assembled from credentials –No central access control list –End-users can create flexible policies

Some Early Lessons People don’t seem to think about things in terms of privacy and security, more of value proposition Need large network effects to study some things –Right now, only seeing small interesting results –Believe we will find interesting results with LOTS of people Machine learning seems promising Social psychology issues –Projecting a desired persona, plausible deniability Cornwell, J., et al. User-Controllable Security and Privacy for Pervasive Computing. In the Proceedings of The 8th IEEE Workshop on Mobile Computing Systems and Applications (HotMobile 2007).

Other Rants (Briefly) Rant #3 – Cross-platform issues stifling wide-scale deployability –Symbian, Nokia, Palm, Windows Mobile, Blackberry –All incompatible! –J2ME only helps a little –Severely limits deployability and usage of apps Rant #4 – Conducting realistic user evals difficult –Hard to do lab studies since (by definition) mobile –Hard to observe while mobile –Majority of people already have phones (contacts, phone#)

Summary Text input is terrible –Likely we will be stuck with 20wpm –Leverage real-time context to support specific mobile information finding tasks rather than generic ones Facing new privacy and security risks –This may be an Achilles’ heel for pervasive computing Hard, and lots of devices to manage –Our work looks at making it easy for people to specify, visualize, and manage their privacy and security policies

Backup Slides

Usability Issues ~20% of WiFi access points returned –People couldn’t figure out how to make it work My guess: ~80% of unsecured WiFi access points –When you are mobile, risk of eavesdroppers –Computer security too hard to understand, too hard to setup

Usability Issues Phishing really really works –Exact numbers hard to find, but LOTS of people fall for them Semantic gap between us and everyday users –SSL, certificates, encryption, man-in-the-middle attacks –But simple phishing is stunningly effective Observation: need security models that are invisible (managed by others) or extremely easy to understand “Civilization advances by extending the number of operations we can perform without thinking about them.” - Alfred North Whitehead

Cultural Issues Browser Cookies –Originally meant for maintaining state –Now a pervasive means for tracking people online –Embedded in every browser, hard to change Observation: Security hard issue to wrap brain around –Hard to assess risk of low-probability event in future –Adds to cost of development for uncertain benefit –Thus, often done as an afterthought (ie too late)

Economic Issues Estimated cost of phishing in US is ~$5 billion Solutions already exist –Two-factor authentication – authentication But: –Non-computer scams ~$200 billion –Estimated cost of implementation > $5 billion Observation: Many solutions are out there, but: –Need to align needs of various parties (politics) –Need incentives (cost-benefit, law) Observation: Scammers getting more sophisticated –Market for scammers (setup + steal, mules, bookkeeping) –“Build it, and scammers will also come”

No Secure Mobile Computing Soon Lots of important info on mobile devices Usability issues Cultural issues Economic issues IEEE Computer, Dec 2005 “Minimizing Security Risks in Ubicomp Systems” Invisible Computing Column

GurunGo: Product Reviews

Rant #2: New Privacy and Security Risks This was just March 2006