ux strat usa 2017: dr. faith mccreary, "strategy for designing privacy into the internet of...

Post on 21-Jan-2018

241 Views

Category:

Internet

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

designing for Privacy in the age of magicFaith McCreary

The work being shared today was a collaboration with

Alex Zafiroglu & Heather Patterson

Intel CorporationHeather

Alex

INCREASINGLY VISIBLE

BLURRING BOUNDARIESSource: http://www.michaelbeitz.com/home.html

SMART OR CREEPY?

WONDERING WHY

Confirm? Reference: https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf

How?

Privacy ≠ Security

LEGAL GUARD RAILS

Source: https://upload.wikimedia.org/wikipedia/commons/6/6a/Sign_in_Niagara_Falls,_Ontario,_warning_people_not_to_climb_over_guard_rail.jpg

by design

by design

1. PROACTIVE NOT REACTIVE; PREVENTATIVE NOT REMEDIAL

2. PRIVACY AS THE DEFAULT SETTING

3. PRIVACY EMBEDDED INTO DESIGN

4. FULL FUNCTIONALITY – POSITIVE-SUM, NOT ZERO-SUM

5. END-TO-END SECURITY – FULL LIFECYCLE PROTECTION

6. VISIBILITY AND TRANSPARENCY – KEEP IT OPEN

7. RESPECT FOR USER PRIVACY – KEEP IT USER-CENTRIC

Digital InvisibilityOptical camouflage by Susumu Tachi of the University of Tokyo https://commons.wikimedia.org/wiki/File:An_invisibility_cloak_using_optical_camouflage_by_Susumu_Tachi.jpg

CONTEXT MATTERS

PRIVACY SEGMENTATION

INFORMATION SENSITIVITY MODEL

CONTEXTUAL PRIVACY PROBES

TAXONOMY OF PRIVACY CONCERNS

BEHIND the Curtain

1 PRIVACY SEGMENTATION

FUNDAMENTALIST

PRAGMITIST

UNCONCERNED

Source: https://c1.staticflickr.com/8/7469/16263996296_aa8767d970_b.jpg

2

3 INFORMATION SENSITIVITY MODELStable Clusters of Expectations and Preferences for Boundaries

INFORMATION SENSITIVITY

SHARED

INFORMATION SENSITIVITY

TRADED

INFORMATION SENSITIVITY

SECRET

INFORMATION SENSITIVITY

TATTLED

4 TAXONOMY OF PRIVACY CONCERNS

4 CATEGORIES16 TYPES

LESS IS MOREINFORMATION COLLECTION

UNDERSTAND PURPOSE

LIMIT CAPTURE

MANAGE APPEARANCES

BEWARE LOCATION TRACKING

DO NO HARMINFORMATION PROCESSING

SAFEGUARD DATA

LIMIT USE

TRANSLUCENCE BUILDS TRUSTINFORMATION DISSEMINATION

ACCURACY

OPENNESS

EASY CONTROL

OPAQUENESS

Source: https://c1.staticflickr.com/6/5567/18806435646_b66ba85bac_b.jpg

USEFUL NOT DISRUPTIVEINFORMATION INVASIONS

AIM FOR INVISIBLE

ENCOURAGE SHUT-OFF

WHAT WILL YOU DO?

Email: Faith.A.Mccreary@intel.com

top related