user centricity: privacy and security issues · user centricity: privacy and security issues hatem...

18
User Centricity: Privacy and Security Issues Hatem Halaoui, Haigazian University, Lebanon

Upload: others

Post on 25-Jun-2020

19 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: User Centricity: Privacy and Security Issues · User Centricity: Privacy and Security Issues Hatem Halaoui, Haigazian University, Lebanon

User Centricity:Privacy and Security Issues

Hatem Halaoui, Haigazian University, Lebanon

Page 2: User Centricity: Privacy and Security Issues · User Centricity: Privacy and Security Issues Hatem Halaoui, Haigazian University, Lebanon

What is User-Centricity?

• A design philosophy in which theneeds and expectations of the enduser of an interface are the centreof focus.

(http://www.igi-global.com/dictionary/user-centricity/31261)

• Let your users be inspired. Giveyour team the tools, access,information when, where, and howthey want it.

(http://www.usercentricit.com/)Human-oriented/ Citizen

Trust, Privacy and Security- User Centricity -

Dr-Ing. Karima Boudaoud/ Dr-Ing. Mounib MekhilefI3S-University of Nice Sophia Antipolis-CNRS /

Page 3: User Centricity: Privacy and Security Issues · User Centricity: Privacy and Security Issues Hatem Halaoui, Haigazian University, Lebanon

Security & Privacy

• Today’s rich service offer in the World Wide Web increasingly requires the disclosure of personal user data.

• Service providers’ appetite for personal user data, however, is accompanied by growing privacy implications for Internetusers.

• Targeting the rising privacy concerns of users, privacy-enhancing technologies (PETs) emerged.

• One goal of these technologies is the provision of tools that facilitate more informed decisions about personal datadisclosures.

• Unfortunately, available PET solutions that protect personal user data are used by only a small fraction of Internet users.

• A major reason for the low acceptance of PETs is their lack of usability.

• Furthermore, most PET approaches rely on the cooperation of service providers that do not voluntarily adopt privacycomponents in their service infrastructures.

• Addressing the weaknesses of existing PETs, this work introduces a user-centric privacy architecture that facilitates aprovider-independent exchange of privacy-related information about service providers.

Jan Paul KolterDissertation, Sept 2009University of RegensburgUser-Centric Privacy – A Usable and Provider-Independent Privacy Infrastructure

Human-oriented/Citizen

Trust, Privacy andSecurity

- User Centricity -Dr-Ing. Karima

Boudaoud/ Dr-Ing.Mounib MekhilefI3S-University of

Nice SophiaAntipolis-CNRS /

Page 4: User Centricity: Privacy and Security Issues · User Centricity: Privacy and Security Issues Hatem Halaoui, Haigazian University, Lebanon

Human-oriented/ Citizen

Trust, Privacy and Security

- User Centricity -

Dr-Ing. Karima Boudaoud/ Dr-Ing. Mounib Mekhilef

I3S-University of Nice Sophia Antipolis-CNRS /

Page 5: User Centricity: Privacy and Security Issues · User Centricity: Privacy and Security Issues Hatem Halaoui, Haigazian University, Lebanon

Gamification in theInternet of Things

1

From http://www.altag.net/

From www.iconodigital.com

Panel: User-centricity in a Smart World: Between Human Factors and theInternet of Things.

CENTRIC’15 Conference.Inmaculada Rodríguez PhD. University of Barcelona.

Page 6: User Centricity: Privacy and Security Issues · User Centricity: Privacy and Security Issues Hatem Halaoui, Haigazian University, Lebanon

The first“thing” inthe IoT.

John Romkey, Simon Hackett, 1989

2

Page 7: User Centricity: Privacy and Security Issues · User Centricity: Privacy and Security Issues Hatem Halaoui, Haigazian University, Lebanon

Photograph: Peter Menzel

From nowon…

3

Page 8: User Centricity: Privacy and Security Issues · User Centricity: Privacy and Security Issues Hatem Halaoui, Haigazian University, Lebanon

Whoa!What a

huge leap!

NewInteraction Design (IxD)

approaches.4

Page 9: User Centricity: Privacy and Security Issues · User Centricity: Privacy and Security Issues Hatem Halaoui, Haigazian University, Lebanon

• More and more devices• More and more users• More and more apps

How can some designs gainadvantage over others?

5

Page 10: User Centricity: Privacy and Security Issues · User Centricity: Privacy and Security Issues Hatem Halaoui, Haigazian University, Lebanon

• More and more devices

• More and more users/communities

• More and more apps

How can some designs gainadvantage over others?

6

Motivational Design

Page 11: User Centricity: Privacy and Security Issues · User Centricity: Privacy and Security Issues Hatem Halaoui, Haigazian University, Lebanon

From elearningindustry.com

7

Gamificationis theapplication ofgame-designelements andgameprinciples innon-gamecontexts.

Page 12: User Centricity: Privacy and Security Issues · User Centricity: Privacy and Security Issues Hatem Halaoui, Haigazian University, Lebanon

Gamificationis theapplication ofgame-designelements andgameprinciples innon-gamecontexts.

From elearningindustry.com

Challenge:Design Human-Centricexperiences that focus on themotivations and rewards thattruly engage IoT users. 8

Page 13: User Centricity: Privacy and Security Issues · User Centricity: Privacy and Security Issues Hatem Halaoui, Haigazian University, Lebanon

Octalysis Gamification Framework

9

Page 14: User Centricity: Privacy and Security Issues · User Centricity: Privacy and Security Issues Hatem Halaoui, Haigazian University, Lebanon

10

Page 15: User Centricity: Privacy and Security Issues · User Centricity: Privacy and Security Issues Hatem Halaoui, Haigazian University, Lebanon

Marczewski’s player and user types hexad.

11

Page 16: User Centricity: Privacy and Security Issues · User Centricity: Privacy and Security Issues Hatem Halaoui, Haigazian University, Lebanon

Thanks for hearing:)

12

Page 17: User Centricity: Privacy and Security Issues · User Centricity: Privacy and Security Issues Hatem Halaoui, Haigazian University, Lebanon

Tanja Bos

1993-1999 Msc. Industrial Design Engineering

Technical university Delft, The Netherlands

1999-2015 Operator Performance researcher

Netherlands Aerospace Centre

HMI design and validation

pilots,

air traffic controllers,

maintenance engineers

Penel discussion Softnet 19 November 2015 1

Page 18: User Centricity: Privacy and Security Issues · User Centricity: Privacy and Security Issues Hatem Halaoui, Haigazian University, Lebanon

Penel discussion Softnet 19 November 2015 2

Human factors and the Internet of Things

An everyday example

ProsGreat!Time efficient

ConsWhat if you want to put back a product?Quite a number of cards and devicesPotential of manipulation of buying behaviour

Dilemma: do I provide my personal details to make use of this system?