cars, condoms, & information sharing how private is private enough?

Post on 23-Feb-2016

32 Views

Category:

Documents

1 Downloads

Preview:

Click to see full reader

DESCRIPTION

Cars, Condoms, & Information Sharing How Private is Private Enough?. Vaibhav Garg. Drexel University. Cars. J. Adams. Cars, cholera, and cows. CATO Institute, 335: 1– 49, 1999. . Seat Belt Habit. http:// youtu.be /Fa5BVk9mbSY. Condoms. - PowerPoint PPT Presentation

TRANSCRIPT

CARS, CONDOMS, & INFORMATION SHARINGHOW PRIVATE IS PRIVATE ENOUGH?Vaibhav Garg Drexel

University

Cars

J. Adams. Cars, cholera, and cows. CATO Institute, 335: 1–49, 1999.

Seat Belt Habit http://youtu.be/Fa5BVk9mbSY

Condoms

M. Cassell, D. Halperin, J. Shelton, and D. Stanton. Risk compensation: The Achilles’ heel of innovations in HIV prevention? British Medical Journal, 332(7541):605–607, 2006.

Privacy

L. Brandimarte, A. Acquisti, and G. Loewenstein. Misplaced confidences: Privacy and the control paradox. Social Psychological and Personality Science, 2012.

RiskComes from the Italian word ‘risicare’

Probability * Magnitude

Rational Agent

Smoking is a factor which contributes to lung cancer. Most cancers that start in lung, known as primary lung cancers, are carcinomas that derive from epithelial cells. Depending on the type of tumor, so-called paraneoplastic phenomena may initially attract attention to the disease.[16] In lung cancer, these phenomena may include Lambert-Eaton myasthenic syndrome (muscle weakness due to auto-antibodies), hypercalcemia, or syndrome of inappropriate antidiuretic hormone (SIADH). Tumors in the top (apex) of the lung, known as Pancoast tumors,[17] may invade the local part of the sympathetic nervous system, leading to changed sweating patterns and eye muscle problems (a combination known as Horner's syndrome) as well as muscle weakness in the hands due to invasion of the brachial plexus.

Privacy Risk Communication (1)

Privacy Risk Communication (2)

Privacy Risk Communication (3)

People don’t care

Complete Information == Market Efficiency

R. A. Posner. The Economics of Privacy. American Economic Review, 71(2):405-409, 1981.

People don’t know

Info graphic from Matt McKeon.

Usability

P. Inglesant and M. Sasse. The true cost of unusable password policies: password use in the wild. In Proceedings of the 28th International conference on Human factors in computing systems, pages 383–392. ACM, 2010.

RiskComes from the Italian word ‘risicare’

Probability * Magnitude

Boundedly Rational

J. Grossklags and A.Acquisti. When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information. Workshop on Economics of Information Security. 2007.

16

Certainty Effect

Bird in hand is worth two in the bush!

For sure!

Maybe! P=0.1

17

Reflection Effect

Lose For sure!

Lose Maybe! P=0.1

We prefer certain gains but uncertain losses!

Class Participation

Class Participation

Class Participation

Class Participation

Class Participation

Class Participation

Boundedly Rational

J. Grossklags and A.Acquisti. When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information. Workshop on Economics of Information Security. 2007.

25

Voluntariness

26

Immediacy

27

Knowledge to Exposed

28

Knowledge to Science

29

Control

30

Newness

31

Common-Dread

32

Chronic-catatrophic

33

Severity

Nine Dimensional Model Voluntariness Immediacy Knowledge to Experts Knowledge to Exposed Control Newness Common-Dread Chronic-Catastrophic SeverityB. Fischhoff, P. Slovic, S. Lichtenstein, S. Read, and B. Combs. How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits. Policy Sciences, 9(2):127–152, 1978.

Revealed Preferences Revealed Preferences

Attitudes are reflected by behavior Traditionally Acceptable

‘The… assumption is that historically revealed social preferences and costs are sufficiently enduring to permit their use for predictive purposes.’

C. Starr. Social benefit versus technological risk. Science, 165(3899):1232–1238, 1969.

Expressed Preferences Expressed Preferences

Behaviors are informed by attitudes What end-users want or acceptable risk?

‘The societal value system fluctuates with time, and the technological capability to follow fast changing societal goals does not exist.’C. Starr, R. Rudman, and C. Whipple. Philosophical Basis for Risk Analysis. Annual Review of Energy, 1:629-662, 1976.

Nine Dimensional Model Voluntariness Immediacy Knowledge to Experts Knowledge to Exposed Control Newness Common-Dread Chronic-Catastrophic SeverityB. Fischhoff, P. Slovic, S. Lichtenstein, S. Read, and B. Combs. How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits. Policy Sciences, 9(2):127–152, 1978.

Rational Risk Communication

Smoking is a factor which contributes to lung cancer. Most cancers that start in lung, known as primary lung cancers, are carcinomas that derive from epithelial cells. Depending on the type of tumor, so-called paraneoplastic phenomena may initially attract attention to the disease.[16] In lung cancer, these phenomena may include Lambert-Eaton myasthenic syndrome (muscle weakness due to auto-antibodies), hypercalcemia, or syndrome of inappropriate antidiuretic hormone (SIADH). Tumors in the top (apex) of the lung, known as Pancoast tumors,[17] may invade the local part of the sympathetic nervous system, leading to changed sweating patterns and eye muscle problems (a combination known as Horner's syndrome) as well as muscle weakness in the hands due to invasion of the brachial plexus.

Boundedly Rational

Gender Differences

Aging!

Income

Education

Mental Models Physical Criminal Medical Warfare Economic

Boundedly Rational

Mental Model

Privacy Case Study Phishing Keyloggers Older Adults

48

Why Older Adults? Fastest growing demographic Susceptibility to fraud

20% of the victims (FTC) 1/10th of publicly held bonds 1/3rd of publicly held stock

49

Why Design for Older Adults Designs for younger people Assumptions

Technical experience Sight, focus, dexterity Risk posture

50

Design Constraints Memory

Semantic Learnt Lasts longer Retention is better

Episodic Experienced Richer Retrieval is better!

Mental Models Physical, Criminal, Economic, Medical, and

Warfare

51

Design Constraints Memory

Semantic Learnt Lasts longer Retention is better

Episodic Experienced Richer Retrieval is better!

Mental Models Physical, Criminal, Economic, Medical, and

Warfare

52

Risk Communication: Text

Privacy Videos Phishing

http://youtu.be/4ZQ9pFTCdy4 Keylogger

http://youtu.be/6zHJoZqrCB0

54

To conclude…

top related