Security as Experience & Practice Supporting Everyday Security Paul Dourish Donald Bren School of Information and Computer Sciences & California Institute.

Slides:



Advertisements
Similar presentations
Improving the Intelligence of Assessment Through Technology: An IES Perspective Martin E. Orland, Ph.D. Special Assistant Institute of Education Sciences.
Advertisements

What is research methodology
Emerging Leadership Vistas and Organizational Design: Public and Private Sector Applications Kalu N. Kalu, Ph. D Associate Professor Auburn University.
Annoy Your Users Less Session 202 Philip Wolfe, Lead Developer Farm Credit Services of America.
Chapter 1 INTRODUCTION TO MANAGEMENT AND ORGANIZATIONS
Aims of MYP Technology JLOwens 8/2010 “…the know-how and creative processes that may assist people to utilize tools, resources and systems to solve problems.
Decision-Making Processes Lina Hourani Neeraja Ganeshalingam Riley Truswell.
Effective Coordination of Multiple Intelligent Agents for Command and Control The Robotics Institute Carnegie Mellon University PI: Katia Sycara
An Application-led Approach for Security-related Research in Ubicomp Philip Robinson TecO, Karlsruhe University 11 May 2005.
Privacy Chris Kelly iLaw July 5, 2002.
Privacy & Security broadening the conversation Ken Anderson | Intel Research Paul Dourish | UC Irvine.
Elements of Planning and Decision-Making
ADM Leadership Lecture 11 – Team Leadership.
Developing Ideas for Research and Evaluating Theories of Behavior
Historical and Philosophical Methods of Research Emily H. Wughalter, Ed.D. Spring 2007 Research Methods in Kinesiology.
Interaction in a Time of Computational Plenty Paul Dourish Information & Computer Science UC Irvine.
Consumer Decision Making
Research Methods in MIS Dr. Deepak Khazanchi. Objectives for the Course Identify Problem Areas Conduct Interview Do Library Research Develop Theoretical.
Outline: Research Methodology: Case Study - what is case study
System Engineering Instructor: Dr. Jerry Gao. System Engineering Jerry Gao, Ph.D. Jan System Engineering Hierarchy - System Modeling - Information.
1 Designing Health Information Technologies: A Socio-Technical Perspective Madhu Reddy College of Information Sciences and Technology Center for Integrated.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Portable Skills A Human Resources perspective.. Overview Portability is ? Company Employee point of view Skills evaluation Skills transference Tangible.
Organizational Behavior BUS-542 Instructor: Erlan Bakiev, Ph.D.
Course Overview B290 Fall 2014 What is a strategy? Context / Environment Political Regulatory Technological Resources Skills Knowledge Assets Capital.
Introduction to Theory & Research Design
Copyright ©2010 Pearson Education, Inc. Publishing as Prentice Hall 15-1 Essentials of Organizational Behavior, 10/e Stephen P. Robbins & Timothy A. Judge.
1. 1. OLD Italian SYSTEM 2 INDIRIZZO ECONOMICO-AZIENDALE Economics Maths History Italian language and literature Science Subject x 4e - 5e Project area,
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Reconciling institutional theory with organizational theories How neoinstitutionalism resolves five paradoxes? Ms.Chanatip Dansirisanti ( 陳美清 ) MA2N0204.
Types of Research 1. Categorized by Practicality a. Basic research  done to satisfy a need to know with no intention of resolving an immediate social.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Privacy Overview and Issues.
Organizations: Effectiveness, Design, and Cultures
Copyright 2002 Prentice-Hall, Inc. Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 20 Object-Oriented.
State of California Executive Leadership Competency Model January 12, 2011 Presentation for the California Citizens Redistricting Commission.
Inspire Personal Skills Interpersonal & Organisational Awareness Developing People Deliver Creative Thinking & Problem Solving Decision Making, Prioritising,
© 2008 McGraw-Hill Higher Education The Statistical Imagination Chapter 1. The Statistical Imagination.
Methodological Framework for the Assessment of Governance Institutions P. Diaz and A. Rojas PFRA Workshop, March 17, 2006.
Unifying Artifacts and Activities in a Visual Tool for Distributed Software Development Teams Jon Froehlich and Paul Dourish Interactive & Collaborative.
Increasing the Relevance of Health Care Organizational Research Jeff Alexander, Ph.D. AHRQ Annual Meeting Sept 8, 2008.
ANIE IE Research Workshop Objectives towards a Curriculum Development University of Pretoria July 4-5, 2011 Rafael Capurro International Center for Information.
Research studies that investigate the quality of relationships, activities, situations, or materials. Places a greater emphasis on holistic description.
Global Environmental Change and Food Systems Scenarios Research up to date Monika Zurek FAO April 2005.
Queen’s Management & Leadership Framework
Configuring the Networked Self: Law, Code, and the Play of Everyday Practice CC licensed
Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.
(Environment: Uncertainty
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Collective Information Practice: Exploring Privacy and Security as Social and Cultural.
MGT 450 – Spring, 2016 Class 4 – Chapter 3 Effective Leadership Behavior.
Leadership in Groups and Teams Chapter 7. “When building a team, I always search first for people who love to win. If I can’t find any of those, I look.
Conclusions and Future Prospects Van Den Bulte Wuyts.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
The Environment of Management
Contents Expectation Setting and Diagnostic Final Project
An Architecture-Centric Approach for Software Engineering with Situated Multiagent Systems PhD Defense Danny Weyns Katholieke Universiteit Leuven October.
Models of the OASIS SOA Reference Architecture Foundation Ken Laskey Chair, SOA Reference Model Technical Committee 20 March 2013.
Leadership Guide for Strategic Information Management Leadership Guide for Strategic Information Management for State DOTs NCHRP Project Information.
Collaborative & Interpersonal Leadership
Organization and Knowledge Management
Organizational Change, Development, and Learning
CASE STUDY BY: JESSICA PATRON.
Aims of MYP Technology “…the know-how and creative processes that may assist people to utilize tools, resources and systems to solve problems and to enhance.
Public Health Interventions
Corporate Governance It is a system by which companies are managed and directed in the best interests of the owners and shareholders. It refers to the.
Chapter 1 INTRODUCTION TO MANAGEMENT AND ORGANIZATIONS
Understanding the Management Process
Formal Interpersonal Cultural
Howard Rosenbaum "Your Vulnerability in CyberSpace - FBI and IU perspectives on Internet security, intellectual property,
Presentation transcript:

Security as Experience & Practice Supporting Everyday Security Paul Dourish Donald Bren School of Information and Computer Sciences & California Institute for Telecommunications and Information Technology UC Irvine

privacy and security alternative formulation of security “problem” –one that people routinely encounter and solve the question is, how? usual approach: –use security ideas to tackle privacy problems P3P, ACLs, alternative approach: –use privacy ideas to tackle security problems focus on ongoing management and situated practice

altman’s model borrowed a model from irwin altman –altman’s primary concern is f2f interaction management of interpersonal space, etc three key ideas –a dialectic… –… and dynamic process of … –… boundary regulation

privacy as a process privacy is not rule-governed an optimization –continuum of degrees of openness and closedness –managing against conflicting goals –personal, interpersonal, organizational, institutional systemic –many regulatory behavioral mechanisms –operate as a system a collective response to circumstances and needs

managing boundaries the destablizing effect of technology –disrupting the regulation of boundaries by setting up new boundaries or replacing existing ones by transforming the ways in which actions are mediated etc… a look at three of these boundaries –disclosure –identity –temporality

empirical investigation studies of everyday security practices –security as a barrier homogeneous treatment of “threats” –spammers, hackers, stalkers and marketers –delegating security to technology to individuals to organizations to institutions –security as a problem

our approach moving away from normative models –inherently contingent moving away from abstract descriptions –resolved in-the-moment practical action and decision-making –always part and parcel of the same setting –social, organizational, cultural, temporal context

technical approach supporting informed decision-making –providing a context for security actions –seeing the consequences of your actions a twin approach –visualization continual visual monitoring exploit ability to perceive structure and regularities –event-based architectures integrate information from many sources balance individual and holistic accounts event inference and analysis

scenario architecture JVM Application View YANCEES View publishes JVM events events routed Sequence detection Application being monitored Vavoom loader siena elvin router

summary security as an everyday phenomenon grounding –empirical investigations of real-world security practices –analytic development of Altman’s model technological implications –non-normative stance –integrating decision-making and action