privacy and mobile ubiquitous computing a lecture of sorts by travis christian

24
Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

Post on 19-Dec-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

Privacy and Mobile Ubiquitous Computing

A lecture of sorts by Travis Christian

Page 2: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

Agenda

Defining some terms What's the big deal? From the user's perspective Privacy concepts Case studies Design guidelines Conclusions

Page 3: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

Definitions

Privacy: “The ability of individuals to control the

terms under which their personal information is acquired and used.”

Mary J. Culnan, “Protecting Privacy Online: Is Self-Regulation Working?” Journal of Public Policy and Marketing 19:1 (2000), 20–26.

“The right to be let alone” Samuel Warren and Louis D. Brandeis

Page 4: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

Definitions

Ubiquitous Computing “third wave in computing, just now beginning […]

or the age of calm technology, when technology recedes into the background of our lives.”

- Mark Weiser, http://sandbox.xerox.com/ubicomp/

“ubicomp”

“pervasive computing”

“everyware” “Computing without computers, where information

processing has diffused into everyday life, and virtually disappeared from view.”

Adam Greenfield, Everyware

Page 5: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

What's the big deal?

UbiComp 11th Internation Conference http://www.ubicomp.org/ubicomp2009/

Locaccino, Google Latitude Project Oxygen (MIT) RFID Future: smart homes, wearable computers,

embedded devices.... ???

Page 6: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

What's the big deal?

With all of these potentials come privacy risks.

Location → tracking Aggregation → activity inference Networking → data farming Complexity → lack of understanding Easy to forget → no informed consent

(Chapter 19: Privacy Issues and Human-Computer Interaction)

Page 7: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

From the user's perspective

How they view privacy Research on privacy configuration shows

that most do not customize settings It's important, but not a primary task

Different concerns Unauthorized access (security breach) Sharing without consent Collection of personal data Inability to correct errors

(Chapter 19: Privacy Issues and Human-Computer Interaction)

Page 8: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

From the user's perspective

3 consistently observed levels of concern Marginal (indifferent) Fundamentalist (uncompromising) Pragmatic (will make tradeoffs)

Majority across many studies

(Chapter 19: Privacy Issues and Human-Computer Interaction)

Page 9: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

Privacy concepts

Different forms of privacy Access personal data (conscious decision) “Exoinformation”: left by interactions

Queries, timestamps, IP addresses, etc. Used to build aggregate profiles

“Barn Door” property Once left unprotected, there is no way

of knowing whether data has been seen

(Chapter 20: A User-Centric Privacy Space Framework)

Page 10: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

Privacy Concepts

Privacy boundaries Disclosure boundary Identity boundary Temporal boundary Users need to be aware and manage

(Peripheral Privacy Notifications for Wireless Networks)

Page 11: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

Case Study: Faces

Privacy manager for ubicomp environments Disclosure preferences: user decides rules

WHO sees WHAT info in WHICH situations Metaphor: “faces” represent how users

portray themselves to others in a situation Situation: generic setting for the purpose of

establishing a “face” Ex: Weekend shopping trip

(Chapter 21: Five Pitfalls in the Design for Privacy)

Page 12: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

Case Study: Faces

Levels of precision Undisclosed, vague, approximate,

precise Types of information

Identity, location, activity, nearby people Feedback: log of disclosures used to

iteratively define preferences

Page 13: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

Case Study: Faces

Testing: 5 participants Created rules for 2 inquirers, 2 situations Given realistic scenario for each situation Preferences stated in scenarios did not

match settings for associated situations Conclusion: Separating configuration from

context is a mistake. Users should mold system behavior through their actions, instead of thinking abstractly about privacy.

Page 14: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

Case Study: Reno

SMS-based location inquiry tool 3-stage experimental process

Experience Sampling Method (ESM) Who would disclose what information

Pilot study Internal testing

User study Tested with 2 families

(Developing Privacy Guidelines for Social Location Disclosure Applications and Services)

Page 15: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

Case Study: Reno

Results Responses based on specific goals Denial and deception Automation not popular

Derived design guidelines Next step: “Boise” map-based successor

Page 16: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

Design Guidelines: Faces

Don't obscure potential information flow Users can make informed use of a

system only when they understand the scope of its privacy implications.

Don't obscure actual information flow Users should understand what

information is being disclosed to whom.

Page 17: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

Design Guidelines: Faces

Promote user action over configuration Designs should enable users to practice

privacy as a natural consequence of their use of the system.

Provide coarse-grained control Designs should provide an obvious way

to halt and resume disclosure. Support established practice

Page 18: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

Design Guidelines: Reno

Don't start with automation Allow flexible disclosure Support plausible deniability Support deception Support simple evasion (“busy”) Start with person-to-person communication Provide status/away messages

Page 19: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

Design Guidelines: Reno

Avoid handling user data Consider user groups likely to need privacy Characterize users' use of privacy features Account for long learning curve Account for specific circumstances

Page 20: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

Design Guidelines: Proportionality

Principle of proportionality: “any application, system, tool, or process

should balance its utility with the rights to privacy (personal, informational, etc) of the involved individuals”

Method built on 3 “judgments” Legitimacy: are the goals useful? Appropriateness: find the best alternative Adequacy: justify proper use of parameters

Page 21: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

Summary

Importance of ubicomp Role of privacy User's perspectives Case studies: prior research Design guidelines

Page 22: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

Conclusion

Ubicomp is an important concept and will expand rapidly in the near future.

Usable privacy plays a vital role in real-world ubicomp systems.

Privacy risks are a real threat to end users Design for ubicomp is challenging, but

there are guidelines for preserving privacy More research is needed

Page 23: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

Sources Security and Usability. Chapter 19 Privacy Issues and Human-Computer Interaction

(M. Ackerman and S. Mainwaring)

Security and Usability. Chapter 20 A User-Centric Privacy Space Framework (B. Brunk)

Security and Usability. Chapter 21 Five Pitfalls in the Design for Privacy (S. Lederer, J. Hong, A. Dey, and J. Landay)

Samuel Warren and Louis D. Brandeis, The Right to Privacy, Harvard Law Review, 1890.

B. Kowitz and L. Cranor. Peripheral Privacy Notifications for Wireless Networks. In Proceedings of the 2005 Workshop on Privacy in the Electronic Society, 7 November 2005, Alexandria, VA, pp. 90-96.

G. Iachello, I. Smith, S. Consolvo, M. Chen, and G. Abowd. Developing Privacy Guidelines for Social Location Disclosure Applications and Services. In Proceedings of the Symposium On Usable Privacy and Security 2005, Pittsburgh, PA, July 6-8, 2005.

Iachello, G. and Abowd, G. D. 2005. Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Portland, Oregon, USA, April 02 - 07, 2005). CHI '05. ACM Press, New York, NY, 91-100.

http://www.ubiq.com/hypertext/weiser/UbiHome.html

http://www.studies-observations.com/everyware/

http://www.ubicomp.org/ubicomp2009/

Page 24: Privacy and Mobile Ubiquitous Computing A lecture of sorts by Travis Christian

Questions

?