Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Collective Information Practice: Exploring Privacy and Security as Social and Cultural.

Slides:



Advertisements
Similar presentations
Chapter 5 Strategic Human Resource Management Within a Resource-capability View of the Firm Ken Kamoche.
Advertisements

Researching the Practice of Design for Learning: Integrating Cognitive and Social Perspectives Liz Masterman, OUCS 27 th June 2006.
Ch:8 Design Concepts S.W Design should have following quality attribute: Functionality Usability Reliability Performance Supportability (extensibility,
16 key concepts.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Multimedia Communications Tejinder Judge Usable Security – CS 6204 – Fall, 2009.
Paul Hubbard Portfolio Manager, Border and Transportation Security Information Sharing: Barriers and Solutions Sept 9 Workshop Summary Presented to Armed.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy and Trust Frameworks/Systems Presented by Zalia Shams Usable Security –
LOCAL SYSTEM OF INNOVATION CENTERED ON AUDIOVISUAL PRODUCTION Marcelo Matos Fluminense Federal University and RedeSist - IE/UFRJ.
Object-Oriented Analysis and Design
1 Suzanne Lockhart M.A. Criminology thesis University of Melbourne, 2005 Current: PhD candidate University of S.A Identity Fraud – Displacement effects.
Techniques for Visual Feedback of Security State Tara Whalen and Kori Inkpen Faculty of Computer Science Dalhousie University whalen at cs dot dal dot.
Tussle in cyberspace: Defining tomorrow ’ s internet D.Clark, J.Wroclawski, K.Sollins & R.Braden Presented by: Ao-Jan Su (Slides in courtesy of: Baoning.
Privacy & Security broadening the conversation Ken Anderson | Intel Research Paul Dourish | UC Irvine.
Designing Your Project Output Achieving your objectives by targeting your audience Ken Peffers UNLV February 2004.
Security as Experience & Practice Supporting Everyday Security Paul Dourish Donald Bren School of Information and Computer Sciences & California Institute.
What is HCI? CSE/ISE 323 Spring 2011 Tony Scarlatos.
Guidelines for Best Practices in Educational Use of Virtual Instrumentation Presentation created by Adina Glava Babeş – Bolyai University of Cluj-Napoca,
Investment Management Concepts Portfolio Management | Segment Architecture March 25, 2009 Adrienne Walker and Kshemendra Paul
Opportunities & Implications for Turkish Organisations & Projects
Z514: Social Aspects of Information Technology
UN/CEFACT Pioneering Paperless Trade: The way covered and the way ahead Experience of Innovative Compliance in Supply Chain Security UN/CEFACT Executive.
Basic Concepts The Unified Modeling Language (UML) SYSC System Analysis and Design.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy Preferences Edgardo Vega Usable Security – CS 6204 – Fall, 2009 – Dennis.
THE NEW TEXAS CORE CURRICULUM (OCTOBER 27, 2011).
Chapter 1 SUPPLY CHAIN MANAGEMENT: An Overview. ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a.
BIS310: Structured Analysis and Design Introduction and Systems Planning Week 1.
Redefining Accountability in a Network Society: Mollie Painter-Morland, PhD “The accountable corporation” Santa Clara 2005.
EXAMING SOCIAL LIFE Social sciences are disciplines that study human social behavior or institutions and functions of human society. Social interaction.
ITGS Standard Level Mr Gavin Johnson. ITGS The Diploma Programme information technology in a global society (ITGS) course is the study and evaluation.
1 IBM Software Group ® Mastering Requirements Management with Use Cases Module 4: Analyze the Problem.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
INFORMATION SYSTEMS Overview
Mission and Mission Fulfillment Tom Miller University of Alaska Anchorage.
 Learning Objectives:  Understand the meaning, levels and sources of Conflict  Discuss various ways and styles to deal with conflict  Recognize the.
How Smart Homes Learn The Evolution of the Networked Home and Household Marshini Chetty, Ja-Young Sung, and Rebecca E. Grinter Ubicomp 2007 Presenter:Brian.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Designing for Privacy Human factors and system’s engineering Usable Security – CS.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Principles of Context aware systems Presented by: Rajesh Gangam Usable Security.
Enterprise Content Management: Building a Collaborative Framework 32 nd Meeting of the Section of International Organizations, International Council on.
CONCEPT OF MIS. Management “Management can be defined as a science of using resources rationally (utilization of resources in judicious manner using appropriate.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy in Context: Contextual Integrity Peter Radics Usable Security – CS 6204.
MIS 605 Class presentations Socio-technical theory Group1 Members 1.Simon Wasike 2.John Njau Muriithi 3.Francis Timonah 4.Eliud Murithi 5.Franciscah Waihenya.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Automatic Trust Negotiation Rajesh Gangam
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Policy Authoring Matthew Dunlop Usable Security – CS 6204 – Fall, 2009 – Dennis.
Improving the Social Nature of OnLine Learning Tap into what students are already doing Tap into what students are already doing Educause SWRC07 Copyright.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Smart, Secure and Sustainable Home: A Socio-Technological Perspective Aleksandr.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
Health Management Information Systems Unit 3 Electronic Health Records Component 6/Unit31 Health IT Workforce Curriculum Version 1.0/Fall 2010.
Activity theory Olivier Georgeon April 8 th
GLOBALIZATION SPREAD OF ECONOMIC INNOVATIONS AROUND THE WORLD AND POLITICAL, LEGAL AND CULTURAL ADJUSTMENTS THAT ACCOMPANY THIS DIFFUSION ASPECTS OF GLOBALIZATION.
Activity theory Shaoke Zhang Olivier Georgeon Frank Ritter March
What Is Science?. 1. Science is limited to studying only the natural world. 2. The natural world are those phenomena that can be investigated, discovered,
TECHNICAL WRITING 2013 UNIT 3: DESIGNING FOR CHANGE.
Information Literacy Prepared for “The Role of Academic Libraries In Fostering Civil Society” Nancy Bolt, September 2002 Nancy Bolt & Associates.
Fairness and Diversity in the Workplace
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Semantic Web Policy Systems Presented By: John Paul Dunning Usable Security – CS.
Models of the OASIS SOA Reference Architecture Foundation Ken Laskey Chair, SOA Reference Model Technical Committee 20 March 2013.
Federal Land Manager Environmental Database (FED) Overview and Update June 6, 2011 Shawn McClure.
Review to Date… November 8, What is literacy? We defined literacy and different types of literacy on the web. We also defined this in class We did.
Copyright © 2014 Wolters Kluwer Health | Lippincott Williams & Wilkins Chapter 42 Emerging Theories Debra Tupe.
Sociology 125 Lectures 19 & 20 DEMOCRACY: HOW IT WORKS November 11 & 16, 2010.
Exploring Interpersonal Communication
Exploring young adults’ perceptions of cycling and cyclists
Enabling Collaboration with IT
Grade 6 Outdoor School Program Curriculum Map
Chapter 5 Ethical Decision Making
Social Navigation as a Model for Usable Security
Creating-1: Generate and conceptualize artistic ideas and work.
Presentation transcript:

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena Paul Dourish and Ken Anderson Presented by: Monika Akbar Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Overview Privacy & Security in HCI 3 parallel approach to people and privacy Social & cultural practice  Risk, danger, morality  Secrecy, trust, identity Collective information practice in design Discussion

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech HCI perspective on security & privacy Three types of research  Investigation of current security practice  Usability of security software systems Security cannot be “grafted on” to a design once it is completed  Novel technology for people to understand and manage privacy and security P3P

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Other works Ubiquitous computing  Infrastructure: PlaceLab  Application environment: ActiveCampus  Novel application: Reno Information technology and privacy  Study of social context Organizational practice Social analysis Public policy Information Systems Design

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Overview Privacy & Security in HCI 3 Models of information practices Social & cultural effect on people and privacy  Risk, danger, morality  Secrecy, trust, identity Collective information practice in design Discussion

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Thinking about People and Privacy Argument  Privacy and Security has social origin  Explore the nature & scope of this origin Information Practice: people & privacy  3 Parallel approaches Privacy as a Economic Rationality Privacy as Practical Action Privacy as Discursive Practice

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy as Economic Rationality Information as commodity  Cost – benefit as Risk – reward Economic model  Concept of exchange value  Figure of rational actor Models collective actions as outcome of individual decision making by rational actors optimizing for individual benefit Service Provider Consumer Cost Benefit

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy as Economic Rationality Problem: based more on activities  Fails to recognize privacy is a “social practice” Privacy is not “a way that information is managed” but how “social relations are managed” Fails  To capture sharing of secrets  Morality of full disclosure Economic principles Social Factors Psychology

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Overview Privacy & Security in HCI 3 Models of information practices Privacy as a Economic Rationality Privacy as Practical Action Privacy as Discursive Practice Social & cultural effect on people and privacy  Risk, danger, morality  Secrecy, trust, identity Collective information practice in design Discussion

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy as Practical Action From abstract idea to what people do Focus on practice Two major implications  Privacy & security are continual ongoing accomplishments  Privacy & security are pervasive elements of everyday settings Cost – benefit Information Surroundings Activity

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Overview Privacy & Security in HCI 3 Models of information practices Privacy as a Economic Rationality Privacy as Practical Action Privacy as Discursive Practice Social & cultural effect on people and privacy  Risk, danger, morality  Secrecy, trust, identity Collective information practice in design Discussion

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy as Discursive Practice Understand how privacy and security is used  To categorize activities, events and setting Separating acceptable (secure) actions from unacceptable (insecure) actions. Corporate security - organizational convenience ahead of personal ones

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Overview Privacy & Security in HCI 3 Models of information practices Privacy as a Economic Rationality Privacy as Practical Action Privacy as Discursive Practice Social & cultural effect on people and privacy  Risk, danger, morality  Secrecy, trust, identity Collective information practice in design Discussion

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Risk, danger, morality Security is defined with respect to perceived risks  Cultural aspect of risk formulation  Risk perception is relative to social structure “Risk Society” –risk at the center of social life Cultural, Political and Moral judgments Douglas and Wildavsky (1982)

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Secrecy and collective identity Secrecy is connected with social boundaries  Secret – disclosure – endanger Cultures of secrecy  Information and its flow is meaningful to those who are part of this – group membership  Flow of information reproduce those cultures Objects and artifacts – not public, not private  Used to create boundaries Information practices in Info. Systems design  Selective sharing of information  Appropriate management (forgetting, not noticing)  Identity as “manageable” component of social life SIM cards, Instant messaging

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Overview Privacy & Security in HCI 3 Models of information practices Privacy as a Economic Rationality Privacy as Practical Action Privacy as Discursive Practice Social & cultural effect on people and privacy  Risk, danger, morality  Secrecy, trust, identity Collective information practice in design Discussion

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Collective information practice in design Information Practice  Ways in which we collectively share, withhold and manage information  How we interpret and deploy such acts Focus on information practice  Contribute to the development of analytic perspective  Collective information practice: target for design Current development efforts  Visualizing system activity  Integrating configuration and action  Support “collective shaping and sharing” not “collective practice”

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Discussion Contribution  3 models Economic: risk vs. reward Information practice: collaborative process Practices are ways in which social actions are achieved.  Noted different and dynamic social context within which people are embedded  Information need & user – continually subject to change, revision and reinterpretation  Risk, danger, trust, secrecy Goal – not to transform privacy into a technical property but to support the collective practice

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Conclusion Privacy & Security from Social & Cultural point  No artifact/object is inherently “public” or “private”  Social-cultural-moral judgments are used to define “risk” – social products rather than natural fact.  Ongoing process that evolves Issues  Less focus on “privacy”, more on “security”  “Social” context  Influence of “space” on privacy/behavior

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Thank You