decoding privacy - future implications of privacy in technology
Post on 20-May-2015
1.499 Views
Preview:
DESCRIPTION
TRANSCRIPT
decodingPRIVACY
Diana SCHNEIDER ICED’13 Young Members Event
BRISKROADambassadors of design thinking
future implications of privacy in technology
© -
htt
p://
expe
rtte
chno
logy
revi
ew.c
om/p
redi
c-tio
ns-f
or-m
obile
-tec
hnol
ogy-
in-2
013/
THE PRIVATE REALM
WHY THE FUSS
PRIVACY STRATEGIES
FUTURE ROLE OF DESIGN
1234
2Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
defining privacyinterpersonally negotiated rules of access to the self
3Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
min. participants male female expert reviews
co-creationsessions
MUC
SEOUL
empirical studyunderstanding perceptions, conflicts and solutions of privacy
WORLDWIDEeSurvey
ICED’13Research
Presentation
50 197 116 81 10 24Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
name 5 concrete situations in which you experienced
privacy
5Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
INFORMATION
CULTURE
NATURE
CONSUMPTION
TERRITORY
TOGETHERNESS
SECLUSION
ROOM DIVISIONPSEU-
DO-SPACE
VIRTUAL SPA-CE
COMMUNICATIONINTERSPACE
MOBILITY
DOMESTICITY
FAMILIARITY
MOTION
ENTERTAINMENT
ACQUAINTANCEOWNERSHIP
INACCESSIBILITYREGENERATION
FREEDOM
PERSON OF TRUST
INTELLECT
CREATION
isolate
interact
isolateisolate
PLACES OFENCOUNTER
NORMED PLACES
BEINGUNOBSERVED
PHYSICALhuman body member of society
identityCONTENTUAL
SOCIAL
ISOLATE Degree of INTERACTION
INTERACT
ILLU
SO
RY
EN
VR
ON
ME
NT
SOLITUDE
INDIVIDUAL CONTENT
ENV
IRO
NM
EN
T
PEER GROUP INTERAC
TION
INDIVIDUAL EXPERIENCE OF COLLECTIVITY
PR
OD
UC
T
FRIENDSHIP & RELATE
DN
ES
S
COLLECTIVE EXPERIENCE
BO
DY
INTIMACY
CREATION OF CONT-
concentric model of privacytrichotomy of the self
6Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
INFORMATION
CULTURE
NATURE
CONSUMPTION
TERRITORY
TOGETHERNESS
SECLUSION
ROOM DIVISIONPSEU-
DO-SPACE
VIRTUAL SPA-CE
COMMUNICATIONINTERSPACE
MOBILITY
DOMESTICITY
FAMILIARITY
MOTION
ENTERTAINMENT
ACQUAINTANCEOWNERSHIP
INACCESSIBILITYREGENERATION
FREEDOM
PERSON OF TRUST
INTELLECT
CREATION
isolate
interact
isolateisolate
PLACES OFENCOUNTER
NORMED PLACES
BEINGUNOBSERVED
PHYSICALhuman body member of society
identityCONTENTUAL
SOCIAL
ISOLATE Degree of INTERACTION
INTERACT
ILLU
SO
RY
EN
VR
ON
ME
NT
SOLITUDE
INDIVIDUAL CONTENT
ENV
IRO
NM
EN
T
PEER GROUP INTERAC
TION
INDIVIDUAL EXPERIENCE OF COLLECTIVITY
PR
OD
UC
T
FRIENDSHIP & RELATE
DN
ES
S
COLLECTIVE EXPERIENCE
BO
DY
INTIMACY
CREATION OF CONT-
concentric model of privacytrichotomy of the self
dinner with friends
driving at night
sunday morning routine
7Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
name 5 recent situations in which your privacy was compromised
8Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
LOSS OF CONTROL
of an individual over his / her PHYSICAL privacy
LOSS OF CONTROL
of an individual over his / her SOCIAL privacy
LOSS OF CONTROL
of an individual over his / her CONTENTUAL privacy
CONTROL TAKE-OVER
of another‘s PHYSICAL privacy over one‘s own
CONTROL TAKE-OVER
of another‘s SOCIAL privacy over one‘s own
CONTROL TAKE-OVER
of another‘s CONTENTUAL privacy over one‘s own
INTRUSION Locus of TAKING CONTROL
LOSS
PHYSICALhuman body member of society
identityCONTENTUAL
SOCIAL
DISRESPECTOF INTIMACY
UNPROTECTEDCONDEMNATION
UNWANTED ENTRANCEINTO PRIVATE CONTENT
intrinsic CONTROLover one‘s
privacy
DANGER EXCESSIVE DISROBEMENT
BODILYVULNERABILITY
PUBLICEXPOSURE
TRESPASSING THE BODILY/ SENSORIAL PROTECTIVE ZONE
INCAPACITY TO FULFILLONE‘S PUBLIC ROLE
ENDANGERED PROPERTY
UNWANTED EXCESSOF INFORMATION
IRRECONCILABLEROLES
THREATENEDDATA
THREATENED SENSORIAL SPHERE
EXCESS OFPUBLIC ORDER
privacy conflictsduality of control between individuals and their surrounding
9Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
LOSS OF CONTROL
of an individual over his / her PHYSICAL privacy
LOSS OF CONTROL
of an individual over his / her SOCIAL privacy
LOSS OF CONTROL
of an individual over his / her CONTENTUAL privacy
CONTROL TAKE-OVER
of another‘s PHYSICAL privacy over one‘s own
CONTROL TAKE-OVER
of another‘s SOCIAL privacy over one‘s own
CONTROL TAKE-OVER
of another‘s CONTENTUAL privacy over one‘s own
INTRUSION Locus of TAKING CONTROL
LOSS
PHYSICALhuman body member of society
identityCONTENTUAL
SOCIAL
DISRESPECTOF INTIMACY
UNPROTECTEDCONDEMNATION
UNWANTED ENTRANCEINTO PRIVATE CONTENT
intrinsic CONTROLover one‘s
privacy
DANGER EXCESSIVE DISROBEMENT
BODILYVULNERABILITY
PUBLICEXPOSURE
TRESPASSING THE BODILY/ SENSORIAL PROTECTIVE ZONE
INCAPACITY TO FULFILLONE‘S PUBLIC ROLE
ENDANGERED PROPERTY
UNWANTED EXCESSOF INFORMATION
IRRECONCILABLEROLES
THREATENEDDATA
THREATENED SENSORIAL SPHERE
EXCESS OFPUBLIC ORDER
privacy conflictsduality of control between individuals and their surrounding
bodily contactin crowded public transport
camera surveillancein elevators
receiving a private phonecall at the office
10Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
2
why the fuss?
11Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
current situationprivacy crisis?
12Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
13Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
00110101100010101000101110111
0101010111110110111001010
0000101011110110001110101011101001110
00011101010
10100011
2955
3056
check-in
3157
3258
3359
2652
3460
2753
3561
2854
36
PRIVACY
UBIQUITY
password: *********** ?vs.
despite
within
through
14Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
3
privacy strategies
15Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
which strategies do you use to protect / regain /ensure your
privacy
16Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
analogue privacy strategiesdiversity of ways to acquire and protect privacy
17Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
analogue privacy strategiesdiversity of ways to acquire and protect privacy
paperbags to hide bought items
time-management and independence
towel ondeck-chair
18Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
© 2
013
- PA
YWO
RKS
Gm
bH -
J. L
echn
er, C
. Deg
er, D
. Bel
lem
, S. E
umes
mobile tech.ubiquitous accessibility via portable devices
19Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
mobile tech. privacy strategieslimitations and lack of user control
shut down PC
passwordencrypt data
headphones
20Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
future role of design
421Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
TECHNOLOGYPRIVACY
the gapdiscrepancy between privacy and technologically enabled strategies
situativesubjectiveinterpersonalindividualculturalcreativenuanced
genericobjective
impersonalcommon
globalbasictrivial
vs.
22Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
empowering through a workable design tool connecting developers and users
AWARENESS of relevance
UNDERSTANDING of implications
ENABLING user control
Future Role of Design
the bridge
+23Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
Online Pre-SurveyPRIVACY PERCEPTIONS & CONFLICTS
Online CrowdSource BetaPRIVACY IN MOBILE TECH.
10
197
11
awarenessblueprint &
Developer InterviewsSFO
Developer InterviewsMUC
DESIGN ENGINEERING
TOOL
REAL-TIMEUSER IDEA PLATFORM
it takes twoinvestigating user and developer perspectives
now.
goalt=0
decodingPRIVACY perceptions, conflicts and strategies of privacy in the mobile world
strategies
situation
description
location
participants
decodingPRIVACY perceptions, conflicts and strategies of privacy in the mobile world
conflicts
participants
PLACES OFENCOUNTER
ISOLATE Degree of INTERACTION
INTERACT
ILLU
SO
RY
EN
VR
ON
ME
NT
SOLITUDE
INDIVIDUAL CONTENT
ENV
IRO
NM
EN
T
PEER GROUP INTERAC
TION
INDIVIDUAL EXPERIENCE OF COLLECTIVITY
PR
OD
UC
T
FRIENDSHIP & RELATE
DN
ES
S
COLLECTIVE EXPERIENCE
BO
DY
INTIMACY
CREATION OF CONT-
OWN SPACE OF PERCEPTION
MOBILE TECHNOLOGIES
PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER
SOLUTION HEATMAP
privacy DEFINITIONS
privacy CONFLICTS
privacy STRATEGIES
decodingPRIVACY design tool
OWN SPACE OF PERCEPTION
MOBILE TECHNOLOGIES
LOSS Lover his /
her vacy
OF CONTROL
over his / her SOCIAL privacy
TROL
over his / privacy
CONTROL TAKE-OVER
of another‘s PHYSICAL privacy over one‘s own
CONTROL TAKE-OVER
of another‘s SOCIAL privacy over one‘s own
TAKE-OVER
of another‘s CONTENTUAL privacy over one‘s own
INTRUSION Locus of TAKING CONTROL
LOSS
intrinsic CONTROL
CONCEAL
OUTSOURCE
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES sneak previewwww.decodingprivacy.com
24Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
Diana SCHNEIDERDesign Thinker l Founder
d.schneider@briskroad.comwww.briskroad.com
BRISKROADambassadors of design thinking
questions?
@S05 - D5 Design for User Experience I Thurs. 08/22 I 10:45am - 12:15pm
25Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
top related