master's presentation to intel security

32
Privacy Protection Against “Creepers” Designing Systems To Prevent Unwanted Oversharing On Social Networks And The Internet June 4, 2015

Upload: andrea-wong

Post on 13-Aug-2015

12 views

Category:

Design


1 download

TRANSCRIPT

Page 1: Master's Presentation to Intel Security

Privacy Protection Against “Creepers”

Designing Systems To Prevent Unwanted Oversharing On Social

Networks And The Internet

June 4, 2015

Page 2: Master's Presentation to Intel Security

The Team

Andrea Wong: User Experience & Design Research Consultant (Presenter)

John Amir-Abbassi: Senior User Researcher at Dropbox

Helga Gruenbauer: Senior User Experience Researcher at National Geographic Learning

Tracy Flynn: User Experience Researcher at Fidelity Investments

Dan Orth: User Experience Designer at Project Management Institute

Caroline Handel: User Experience Designer

M.S. Human Factors in Information Design

Page 3: Master's Presentation to Intel Security

Background

Problem Statement: Considering the vast amounts of data we are generating, where that data resides and who can view it - unintended or not - is a source of anxiety for many and an opportunity for us to address.

Our Focus: We are focused on the emotions surrounding the unintended viewing of personal data by a specific third-party: creepers. Creepers are people you know, but don’t want having access to shared details of your online life

Page 4: Master's Presentation to Intel Security

Wait, why are we starting with emotions?

Page 5: Master's Presentation to Intel Security

“A formal method for practical, creative resolution of problems and creation of emotionally meaningful solutions, with the intent of an improved future result.

In this regard it is a form of solution-based, or solution-focused thinking – starting with a goal (a better future situation) instead of solving a specific problem.

By considering both present and future conditions and parameters of the problem, alternative solutions may be explored simultaneously.”

Design Thinking Methodology

Page 6: Master's Presentation to Intel Security

Using Design Thinking means we can…Envision better future situations can help us to provide answers to questions that users may not even know they have.

Make solutions memorable rather than merely good.

Go beyond expectations to deliver ease and benefit, which evokes positive emotions, and positive emotion encourages people to engage more and tell others about their experiences, leading to the all important word of mouth.

Page 7: Master's Presentation to Intel Security

Okay, so how do we get to our goal, the better future situation, by looking at emotions?

Page 8: Master's Presentation to Intel Security

Research

Page 9: Master's Presentation to Intel Security

What our research interviews told us

Existing Relationship

Boundary Crossed

Coming to Terms

Resolving the Situation

Solving the Problem

Description

Emotions

In nearly all cases the journey begins with an existing

relationship or acquaintance with the creeper

Steps

The creeper takes an action that crosses a healthy

boundary in the relationship and raises concern

The person being creeped upon has to process what has

happened

Difficult steps are taken in an attempt to resolve the

situation

The issue is resolved, but at the expense of both time and

an emotional rollercoaster

Comfort

Neutrality

Shock

Surprise

Anger

Annoyance

Anxiety

Discomfort

Openness

Withdrawal

Sadness

Resignation

Weariness

Skepticism

Wariness

Page 10: Master's Presentation to Intel Security

Our Goals1. How might we reduce the anxiety people feel over their shared information being viewed by unintended parties online?

2. How might we give people hope that they can quickly recover their sense of safety after a creeper incident?

3. How might we turn anxiety into a catalyst for engagement?

Page 11: Master's Presentation to Intel Security

Emotional association with social boundaries in physical space

This is a famous visual concept of personal space by anthropologist Edward T. Hall, used to think about our social circles and the emotions that are evoked when social boundaries are crossed in the physical space.

Awareness triggers of threats in the physical space are easy to perceive:

- Being followed - Being stared / glared at - Having someone stand over your

shoulder

We notice these triggers and react appropriately with anxiety and fear.

INTIMATESpace

1.5 ft(0.45 m)

4 ft(1.2 m)

12 ft(3.00 m)

25 ft(7.00 m)

PERSONALSpace

SOCIAL Space

PUBLIC Space

Edward Hall’s Concept of Personal Space

Newly

formed

groups and

strangers

Newly

formed

groups and

strangersPartner

Children

Partner

Children

Friends

Associates

Friends

Associates

Larger AudiencesLarger Audiences

A stranger

entering the

personal space

triggers anxiety

in a person.

A stranger

entering the

personal space

triggers anxiety

in a person.

Triggers are easier

perceived, enabling a

person to respond to

anxiety and fear.

Triggers in the

Physical Space

TRIGGERTRIGGER

Page 12: Master's Presentation to Intel Security

Perception of threat is missing and therefore the correct response is missing.

Triggers in the Digital Space

Triggers in the digital space are much harder to perceive.

In the digital world, you don’t know if someone is looking over your shoulder, you can’t tell if someone has been staring at you for hours.

When the perception of threat is missing, the correct response to a threat is missing - we don’t respond, we think we’re safe.

Emotional association with social boundaries in digital space

Page 13: Master's Presentation to Intel Security

“The Internet is the most dangerous parking lot imaginable.

But if you were crossing a mall parking lot late at night, your entire sense of danger would be heightened. You would stand straight. You'd walk quickly. You'd know where you were

going. You would look for light.

Folks are wandering around that proverbial parking lot of the Internet all day long, without

giving it a thought to whose attachments they're opening, what sites they're visiting. And

that makes it easy for the bad guys.”

FBI Director James Comey

Page 14: Master's Presentation to Intel Security

Cyberstalking Studies & Statistics

United States, Facebook (2012):

88% of U.S. college students creep on their ex's page 74% creep around the ex's new partner 70% use a mutual friend to spy on the ex-partner

England & Wales, Police Data, Facebook (2012):

There’s a Facebook-related crime every 40 minutes

12,300 investigations of “murder, rape, child sex offenses, assault, kidnap, death threats, witness intimidation and fraud…”

The vast majority of cases involved alleged harassment or intimidation by cyber-bullies

UK, Cyberstalking (2011):

Cyberstalking became more common than face-to-face harassment

Stalkers are now more likely to be complete strangers or a casual acquaintance

40% of the victims were men

1out of 5 said the offender targeted them via social networking sites

http://www.telegraph.co.uk/news/uknews/crime/8439833/Computer-stalking-outstrips-face-to-face-harassment.html

http://www.telegraph.co.uk/news/uknews/crime/9311462/Facebook-linked-crime-every-40-minutes.html

http://ansonalex.com/infographics/facebook-stalking-statistics-2012-infographic

Page 15: Master's Presentation to Intel Security

Brainstormed the association between threats and reactions

FEAR

THREATTRIGGER:

ANXIETYA threat perceived as

uncontrollable or unavoidable causes...

A threat perceived as a risk to one’s life

causes...

Anxiety and Fearare induced by a perceived thread

What we learned:Awareness can generate a perception of greater threat.

Threats that are perceived as uncontrollable causes anxiety.

Anxiety is: - General, vague feeling- Future-focused- Underlying fear of being vulnerable- Subjective- Worry - Uneasiness

Page 16: Master's Presentation to Intel Security

Negative emotional journey of being creeped

Page 17: Master's Presentation to Intel Security

Flipping the negative emotional journey to a positive journey

What are the opposite positive emotions for Anxiety? So we should flip the emotion from negative to positive

Page 18: Master's Presentation to Intel Security

Two audience segments

1. Those who want to prevent the surprise/shock of being creeped

2. Those who have been creeped looking to prevent additional creeping

Page 19: Master's Presentation to Intel Security

Our Solutions

We want to make people aware of the threat without making them so fearful that they become steeped in fear or turn away in denial.

Both of our solutions are aimed at empowering users to feel comfortable, confident and safe enough online to share whatever information they want,

whenever they want.

Page 20: Master's Presentation to Intel Security

WhoSeesMe

Lets you control how widely your shared information will be seen and by whom, preventing creepers from finding and

viewing your information ever again.

Page 21: Master's Presentation to Intel Security

How Can We Help Sally?

Page 22: Master's Presentation to Intel Security

WhoSeesMe Alerts

Carrier 12:00 PM

FacebookStatus Photo Check in

Disneyland is awesome. I’m so happy to bring my baby girl here for the first time! Magic kingdom, here we come! with Margie McGrath

Stephen Kim, Arvind Gupta, Kristen Erickson, Annie Boller and 15,462 others will see this post.

Postcancel

J. Walter Weatherman 23 mins

This is the most beautiful thing I’ve ever seen in my whole life. So beautiful!

SallyInstagram

Like • Comment • Share

Write a comment…

Lil_Razcals 2h

Who can see this post?Stephen Kim, Arvind Gupta, Kristen Erickson, Annie Boller and 15,462 others will see this post

Friends connected to people on my WhoSeesMe Blocked List.

WhoSeesMe Block ListBob Ballard, John McDonald, and Elise Richards and their friends on this platform will not have access.

People who will see the post.

People who will see the post and people you’ve blocked who won’t be able to see it.

Page 23: Master's Presentation to Intel Security

Targeted Emotions: Confidence, safety, openness, trust, in control, empowerment

Sally can quickly be alerted to find and adjust settings for information she doesn’t want viewable on social media platforms and search engines

Sally can easily add and remove contacts from her watch list to ensure she can proactively restrict posts from reaching these individuals.

Sally

My Online InformationWhoSeesMe scanned all social media and search engines for your personally identifiable information and found the following.

WhoSeesMeManage Your Privacy

Date of Birth Not Visible

Where You Live Not Visible

Phone Found on Facebook

Physical Addresses Not Visible

Email Addresses Found on Twitter

Income Not Visible

Place of Work Found on LinkedIn

Current Location Found on Waze, Instagram

Keep Lock

Keep Lock

Keep Lock

Keep Lock

What Do I Look Like?View what you look like to specific people online at different connected levels to you.

Lucile Bluth Follower 1st Connection Friend

Bob Ballard Blocked:

What Do They See:

Maebe Fünke

View:

Friend of Friend Follower FollowerView:

Tobias Fünke Unrelated Unrelated 2nd ConnectionView:

Block ListBlock specific people online.

Search Connections

Add to Block List

Connected: None

Elsie Richards Blocked: Connected:Block

WhoSeesMe Alert Center

Sally can easily simulate how her profile looks to these other individuals on social media.

Notifications can be adjusted. If Sally doesn’t want a pop-up prior to sharing each post, the eye logo itself can be a strong visual reminder. Also, we could explore a weekly digest email.

Page 24: Master's Presentation to Intel Security

IntelAwareMonitors of all your data-collecting devices and platforms so that you’ll always be aware of any suspicious activity

around any of your online platforms.

Page 25: Master's Presentation to Intel Security

How Can We Help Sam?

Page 26: Master's Presentation to Intel Security

Googlehttp://www.intelaware.com

intelAware | Keep connected and safe.

My Accounts Monitor PatintelAware

Where is this account?

Your Social Accounts

Facebook LinkedIn Instagram Twitter more Pinterest

Current Accounts

Add Account

Facebook No current alerts

Current Settings: Share: Friends of Friends view moreBirthdate: Viewable by Friends

All Time change range

Connections: 346 Friends 139 Tagged on Photos 456 Tagged in PostsYour Activity: 672 Posts 422 Photos Uploaded 1,256 Likes 354 CommentsActivity on Your Posts: 822 Likes 223 Comments 5 SharesServices Used for Auth: 7

Instagram No current alerts

All Time change range view moreConnections: 1,254 Followers 1,456 Following 728 Tagged in PostsYour Activity: 725 Posts 910 Likes 444 CommentsActivity on Your Posts: 822 Likes 223 Comments

Add your social media accounts to intelAware to monitor your safety and unwanted access to your info.

Save Account

Username

Password

enter username

enter password

Googlehttp://www.intelaware.com

intelAware | Keep connected and safe.

My Accounts Monitor PatintelAware

People Are Viewing You FromFriendsInclude views from people who are: Friends of Friends Distantly Connedted

Facebook InstagramInclude views from your accounts:

Not Connected

LinkedIn

783 Views342 People

40 V3 P

125 V92 P

60 V45 P

628 Views7 People

40 ViewsBob Loblaw / Instagram 37 ViewsBarry Zuckercorn / Facebook 1 ViewGeorge Bluth / Facebook 1 View

Timeframe: Today

Connect your social accounts and track activity by others on your accounts.

See where your accounts are being viewed from.

IntelAware

Page 27: Master's Presentation to Intel Security

ATT 12:00 PM ATT 12:00 PM

IntelAware AlertYour Facebook, Instagram and LinkedIn have been accessed 43 times in the past 24 hours from one device.

intelAwareAlert 5/1/2015 4:26 PMYour Facebook, Instagram & LinkedIn were accessed 43 times in the past 24 hours.MAC Address: 00-A0-90-B0-9D-A4

WhoFacebook User: Peter WessonRelated to You: Friend of Friend

Instagram User: Frank SmithRelated to You: No

LinkedIn User: Arnold GatlinRelated to You: 3rd

The above accounts use the same email address.

Would you like to:

Block the Users with this Email >

Report these Users >

Edit Security Settings >

More >

Get alerts when there is unusual behavior by a single individual across all your accounts.

IntelAware Realtime Alerts

Page 28: Master's Presentation to Intel Security

Emotional journey without our solutions

Page 29: Master's Presentation to Intel Security

Emotional journey with our solutions

Page 30: Master's Presentation to Intel Security

Addressable Target MarketBased on our conversations with Christian, we focused our solutions on two types of users that make up 50% of your current market.

You’ve met Sally and Sam; here’s why they would like our solutions.

• Values security• Wants control• Appreciates automation• Values awareness and likes fixing things

• Values convenience• Wants simplicity and peace of mind• Values reporting

SamSally

Page 31: Master's Presentation to Intel Security

OpportunityValue Proposition: By cleaning up that dangerous “parking lot,” our security solutions give Sally and Sam the confidence, control and freedom to hang out and share in the parking lot without fear.

Protected By Intel Our solutions can be part of a larger solution called “Protected By Intel.”

Intel became famous with their B2B chips branded as “Intel Inside.” McAfee is a B2B and B2C company that became famous for protecting consumers with top notch security. Together, Intel Security is a trusted, credible, powerful company with the relationships and partnerships to the world’s biggest companies.

Intel Security is well poised to create and shape a whole new safety tier of internet — including the emerging world of connected devices — to make the parking lot safe for everyone. The level of anxiety and fear is high, the need is huge, and no one currently owns this space. We think Intel Security can.

Page 32: Master's Presentation to Intel Security

Thank you!

Any Questions?