privacy factors in video-based media spaces

56
Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Privacy Factors in Video-based Media Spaces Presented by: Anurodh Joshi & Nikhil Komawar

Upload: akina

Post on 25-Feb-2016

44 views

Category:

Documents


1 download

DESCRIPTION

Privacy Factors in Video-based Media Spaces. Presented by: Anurodh Joshi & Nikhil Komawar. Authors. Michael Boyle SMART Technologies, ULC Carman Neustaedter Kodak Research Labs Saul Greenberg University of Calgary. Introduction. Video Media Spaces (VMS) - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

Privacy Factors in Video-based Media Spaces

Presented by:Anurodh Joshi & Nikhil Komawar

Page 2: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

2Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Michael Boyle SMART Technologies, ULC

Carman Neustaedter Kodak Research Labs

Saul Greenberg University of Calgary

Authors

Page 3: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

3Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Video Media Spaces (VMS) Multi-person audio/video networks that are

usually on most of the time

Introduction

Office

Home: Privacy more important

Page 4: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

4Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Perspectives on privacy

Privacy? Opposite of public (being together) Brierley-Newell (1998) being apart Privacy != Being alone Couple in a large group

Disclosure – boundary tension Organization Perspective

Seen positively -> increases ‘togetherness experienced by group members’. Increased collaboration

Workers don’t want to be on camera all the time

Page 5: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

5Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Privacy Regulation

Privacy regulation Dynamic process Each person has his /her own privacy preferences Complicated (cross-cultural contact, groups) Privacy regulation is a situated action• Interactions are constrained by temporal and spatial

contexts Media Spaces• Interactions are much more de-contextualized

Page 6: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

6Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Privacy violation: Deliberate • Unauthorized access

Unintentional• When user becomes cut off from the

context of people viewing him, it leads to privacy violation

Self appropriation• A regulatory process where people

modify their behavior and expectation according to social norms

Privacy Violation

Page 7: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

7Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Dilemma: Purpose of media space is to reveal Privacy Vs Utility

For one person to have richer awareness, others must necessarily have less privacy (Hudson & Smith)

Safeguard against deliberate abuse Access Control• Computer Security & Cryptographic measure • Hackers • VMS not equipped with adequate measures

Privacy Control In Media Spaces

Page 8: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

8Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Techniques for preserving privacy Distortion Filters

• Masks sensitive details• Work on visual information channel

Privacy Control In Media Spaces

Page 9: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

9Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Publication Filters Background

Subtraction – Removes unimportant information

Privacy Control In Media Spaces

Page 10: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

10Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

In physical environment Controls are:• Fine-grained: can be adjusted person-by-

person, instance-by-instance basis• Light-weight: needs little physical or

cognitive effort In VMS

Not so Eg. Plugging the camera: light-weight

but not fine-grained (video is blocked for all recipients)

Difficulties in Privacy Control In Media Spaces

Page 11: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

11Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Feedbacks need to be conspicuous as well as not distracting

In physical environment feedback cues about privacy are socially natural, light-weight yet conspicuous and not distracting

Privacy Feedback in Media Spaces

Page 12: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

12Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

In VMS such subtle feedback is not fully supported Disembodiment and Disassociation

confound the problem Technical limitation (speed,

bandwidth) Example ( so far):

Person in office can hear footsteps of a colleague approaching him to strike conversation

This audible cue signals onset of interactivity

Privacy Feedback in Media Spaces

Page 13: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

13Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Modes based on elements of privacy outlined by Gavison (1980) to control self-environment boundary

Solitude: Control over one’s interpersonal interaction

Confidentiality: Control over other’s access to information of self

Autonomy: control over the observable manifestations of the self

such as action, appearance, impression and identity

Privacy as Control Modalities

Page 14: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

14Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

helps to ‘be apart’ from others Being apart != Being alone Crowding

Others are granted too much access to the self Isolation

One cannot interact with others to the degree one wishesWestin (1967) introduces four states:

Total isolation Intimacy Anonymity Reserve

Solitude

Page 15: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

15Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Most VMS require users to make extra effort

Camera shyness Heightened self awareness that people are

monitoring self causes discomfort Verbal and Para-Verbal Solitude controls Verbal

Telling others verbally or leave a sign outside the door

Solitude in VMS

Page 16: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

16Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Solitude

Para-Verbal means Posture or facial expression Gestures to dismiss

In Physical Environment These mechanisms are light-weight

In VMS Low Resolution, Low speed videos make it more

heavy-weight and explicit These changes may alter social interpretation of

expressed desires

Page 17: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

17Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Affordance of Space for Solitude

To regulate solitude one can go somewhere to be alone(get away) or even with few people

VMS is expensive so it is hard to regulate solitude (expensive)

VMS design complicates refuge-seeking Pulling the plug:

May not be suitable Reconnection is sometimes complicated -> people

refuse to pull the plug

Page 18: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

18Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Places partially determine accessibility i.e. effort people must extend for interaction

People control affordance of space for interactionPeople capitalize on ambiguity to regulate solitude

Closed door can symbolize either no one inside the room or someone wishing to be left alone

Nardi et. al. (2000) report that people use inaccuracies of IM presence indicators as a form of plausible deniability – making it ambiguous of there presence by being non-responsive

Affordances of Space for Solitude

Page 19: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

19Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Invisible space or boundary around self Distance is a strong cue for need of personal

space as well as interaction Example

Person sitting directly across Person sitting out of direct eye sight

In VMS The distance is not really a cue for social distance

or personal space

Personal Space

Page 20: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

20Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Space and social behavior interpolate with respect to solitude Personal space refers to invisible boundary in

space around a person separating him from others Boundaries are undefined but people show

definite behavioral and psychological responses when others enter their physical space

Territory is similar but usually specifies a fixed spatial or psychological location

Personal Space

Page 21: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

21Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Control of access to information about oneself Informal awareness cues, intentions, vital statistics, thoughts and feelings, medical

history It is about controlling information in forms of

Aural Visual Numeric Textual

Secrecy• It is similar but narrower • emphasizes what information is concealed from certain people• aspect of confidentiality as it modulates communication of information to

others

Confidentiality

Page 22: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

22Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Affects others’ attention

Directly regulates outward flow of information

Confidentiality vs. Solitude

Regulated one’s attention

Affects inward flow of information from others

Page 23: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

23Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

A fundamental difference lies between confidentiality and informal awareness cues in VMS

Sensitivity: property of a piece of information that can be defined as a perception of how important it is to maintain control over it

Others’ impressions of a person are predicted upon their knowledge of the person, making confidentiality a part of impression management

Confidentiality continued …

Page 24: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

24Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Harms arising due to breach of confidentiality: Embarrassment Damage to ego, identity Loss of other’s esteem Impairment of livelihood

VMS can reveal sensitive when unintentionally capture and transmit a person’s image which might be socially unacceptable

Confidentiality continued …

Page 25: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

25Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Authorization and data integrity are a part of confidentiality

Process integrity, availability, responsiveness and reliability: ensure that computers perform their intended

functions completely and correctly in expected amount of time with no undesired side-effects.

Cryptography methods provide access control, verifying identity and checking the integrity.

Computers and Confidentiality

Page 26: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

26Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Authorization and data integrity are a part of confidentiality

Process integrity(important component of confidentiality), availability, responsiveness and reliability concern: ensuring that computers perform their intended

functions completely and correctly in expected amount of time with no undesired side-effects.

Cryptography methods provide access control, verifying identity and checking the integrity.

Computers and Confidentiality

Page 27: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

27Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

A perception of how faithfully a piece of information represents some truth. Includes precision: detail of perception Includes accuracy: confidence in the information

Influence by the trust placed in the sender and also on the number of recipients

As persistency and transitivity are relevant to confidentiality Regulation of fidelity of information third parties

transmit about us is relevant to confidentiality

Fidelity

Page 28: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

28Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

A perception of how faithfully a piece of information represents some truth. Includes precision: detail of perception Includes accuracy: confidence in the information

Influence by the trust placed in the sender and also on the number of recipients

As persistency and transitivity are relevant to confidentiality Regulation of fidelity of information third parties

transmit about us is relevant to confidentiality

Fidelity

Page 29: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

29Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Within VMS design, confidentiality includes control over fidelity.

Different dimensions: Field view Resolution Frame rate Codec quality Latency jitter

Technology puts upper bound on these parameters, much lower than face-to-face interactions

Fidelity within VMS design

Page 30: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

30Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Despite these upper bounds, video is high fidelity medium for informal awareness and casual interactions.

Video offers more fidelity than what is needed in many scenarios, hence many video media spaces try to preserve confidentiality by discarding fidelity. Eg. Using a blur filter for distortion in the video

Studies show that effectiveness of such techniques is limited.

Fidelity within VMS design continued…

Page 31: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

31Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Principle means of confidentiality: keeping our bodies, possessions and thoughts accessible to some and not to others.

Possessions: Diaries, driver’s license, automobiles

Territorial and personal space help restrict others’ access to our bodies and things.

Similar control is available over speech: Directing his voice, modulating speech for whispering

Direct Controls

Page 32: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

32Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Architecture plays vital role in preservation of confidentiality: Walls reduce visual and auditory channels Walls fortification can be done using sound-

proofing materials Window blinds, doors

Direct Controls continued…

Page 33: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

33Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

In VMS this can be achieved by: Turning down microphone volume Encoding information with cryptographic methods

so others cannot eavesdrop Filtration technique

Direct Controls continued…

Page 34: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

34Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

People tell others their confidentiality desires verbally or para-verbally. Does not prevent them from revealing the secrets. People can choose to and sometimes keep secrets

confidentiality preferences are revealed over time as relationships are built

Notion of genres of disclosure: Institutional and situational expectations regarding confidentiality Patterns of disclosure evolving over time As they are loosely defined –

• it possible to feel violation of privacy by misuse and misappropriation of confidential information

• And not just inappropriate disclosure

Indirect controls

Page 35: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

35Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

VMS changes rules of engagement Eg. Archiving of audio/video exchanges for replay Verbal telling people to keep matters confidential does not

prevent others from listening in laterPeople willingly and unwittingly spread information,

disinformation or inaccurate information intentionally or unintentionally

VMS should incorporate : Awareness and interaction channels

• Diagnose, police, reprimand damaging violations Accountable by letting users know how sensitive information is

handled within the system

Indirect Controls continued…

Page 36: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

36Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Freedom to choose how to act and interact in the world. (syn. personal liberty)

Self-appropriation and autonomy point to control over one’s behavior.

Privacy preserving in VMS requires: Managing behavior, identity and impressions Understanding of autonomy to regulate these

Autonomy

Page 37: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

37Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Author compares autonomy with ‘muscle’ Routinely exercise it or it will atrophy

Trying to do as one wishes is importantCommunication the same is important as well

explicit: content of speech implicit : speech, posture, face

Informal awareness cues for availability simultaneously reveal one’s desires.

Preserving and Constraining Autonomy

Page 38: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

38Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Autonomy is impaired when: Technology imposes constraint on time and place

for participationEg. Work from home situation

VMS connecting home and office puts social pressure to schedule one’s activities at home

Difficulties in deciding when to work

Preserving and Constraining Autonomy contd…

Page 39: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

39Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Exercising autonomy does not imply that one “always gets one’s way”

Each may do as one wishes as long as their choices conform to group expectations

Autonomy is generally constrained by group normsAutonomy can be compromised:

if the group norms change faster than people can adapt

Insufficient feedback is offered about activities for self-appropriation

Preserving and Constraining Autonomy contd…

Page 40: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

40Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Autonomy may be constrained by others as well Institutionalized people

Parents restricting children to keep them safePrimary motive is punishing bad behavior

Incarceration of criminals Grounding of children

Preserving and Constraining Autonomy contd…

Page 41: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

41Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Autonomy may be constrained by others as well Institutionalized people Parents restricting children to keep them safe

Primary motive is punishing bad behavior Incarceration of criminals Grounding of children

Observations have implications for VMS design Single UI for such a social technology eliminates

social governance of its use.

Preserving and Constraining Autonomy contd…

Page 42: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

42Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Symbiosis between: Autonomy-Confidentiality-Solitude

Autonomy gives people their privacy choices Autonomy depends on solitude &confidentiality Solitude &confidentiality also depends on autonomy

If VMS design impairs regulation of one of these controls, then others may be negatively affected Ubiquitously embedded cameras in a room limit autonomy

Symbiosis

Page 43: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

43Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

People are actors who have fronts (conduits for social expression of self and team)

Front manifestation in signifiers like: Actions, utterances, interactions, verbal and non-

verbal signifiers Social settings like location, scenery, props,

appearance, costumes, posture, expressions, gestures, manners.

Fronts are carefully constructed and maintained to ensure homogeneity between performances.

Symbiosis

Page 44: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

44Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Autonomy includes control over identity and its expression: Physical appearance, mannerisms and voice

Passports, driver’s license, credit cards etc. are considered valid artifacts to reveal identity

Electronic equivalents: email ID, webpage, etc.Civil penalties for libel or unauthorized use of one’s

identity still lack in electronic mediaHence, privacy-enhancing techniques must be used

Identity

Page 45: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

45Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Identity is highly relevant to VMS design.Impersonation and identity theft are possible in

the VMS designsConfidentiality can guard against these crimesHowever, certain privacy preserving techniques

used can lead to confusion of identity: like distortion filters that blur an image Substitute actors in video

Identity continued…

Page 46: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

46Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

A person may be involved in disjoint social worlds with a different identity in each (Pseudonymity).

Transportation and telecommunication technologies facilitate pseudonymity by allowing social circles to extend geographical ranges and population bases.

Pseudonymity

Page 47: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

47Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

VMS are at odds with pseudonymity as identity information is conveyed through video of one’s face and body

Implementing video manipulation techniques to replace one’s image for multiple identities are tricky and could reduce value

of video channel

Pseudonymity

Page 48: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

48Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

People assume different roles in different social worlds.

A single person can play different roles: As a leader with underlings As a suppliant with boss As a parent with children As a lover with her mate

Role Conflict

Page 49: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

49Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

This creates a status divisions, role obligations

Overlapping social worlds can result in social conflicts. Parents visiting their children in their dorm

Role Conflict

Page 50: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

50Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Role conflict can be a major problem in VMS.VMS connects physically distributed people

Each likely inhabiting different physical contexts Each may have different set of privacy norms Problems with self-appropriation

These are evident when VMS connect both homes and offices

Could result into privacy violation leading participants to apprehend media space.

Role Conflict in VMS

Page 51: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

51Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Role conflict can be a major problem in VMS.VMS connects physically distributed people

Each likely inhabiting different physical contexts Each may have different set of privacy norms Problems with self-appropriation

These are evident when VMS connect both homes and offices

Could result into privacy violation leading participants to apprehend media space.

Role Conflict in VMS

Page 52: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

52Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

A comprehensive vocabulary of privacy.Unambiguous description of privacy related

phenomenon and issues connected with design of VMS.

Three control modalities for privacy: Solitude Confidentiality autonomy

Conclusion

Page 53: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

53Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

It does not specify the application of the vocabulary.Limit to the work:

Does not give design ideas, implementation or evaluation It’s a descriptive theory

• analysis of video media space systems within their real world context• Can reveal assumptions hidden within design, implementation or

evaluationThe further work needs to evolve these single words

describing privacy into axioms explaining ‘privacy-preserving’ Which will enable designing and evaluating privacy supporting

social technologies. Each term could generate investigation in its own.

Conclusion

Page 54: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

54Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Do not adequately elucidate their definition in the paper with example of VMS.

In their conclusion they focus on some discussion of another work which analyzes design of a VMS based on their work.

Critique

Page 55: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

55Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Video

http://research.microsoft.com/apps/video/default.aspx?id=135950

Page 56: Privacy Factors in Video-based Media Spaces

Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Click to edit Master title style

56Fall, 2011 - Privacy&Security - Virginia Tech – Computer Science

Questions?

Thank You