decoding privacy - perceptions, conflicts and strategies of privacy in the mobile world

17
decoding PRIVACY Tanja KORNBERGER I Diana SCHNEIDER ICED’13 Conference Presentation BRISKROAD ambassadors of design thinking perceptions , conflicts & strategies of privacy in the mobile world © - http://experttechnologyreview.com/predic- tions-for-mobile-technology-in-2013/

Upload: diana-schneider

Post on 08-Jul-2015

209 views

Category:

Technology


0 download

DESCRIPTION

Scientific Paper Presentation given by Tanja KORNBERGER and Diana SCHNEIDER at the International Conference on Engineering Design (ICED'13), in Seoul, Korea, August 2013. www.decodingprivacy.com

TRANSCRIPT

Page 1: DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World

decodingPRIVACY

Tanja KORNBERGER I Diana SCHNEIDER ICED’13 Conference Presentation

BRISKROADambassadors of design thinking

perceptions, conflicts & strategiesof privacy in the mobile world

© -

htt

p://

expe

rtte

chno

logy

revi

ew.c

om/p

redi

c-tio

ns-f

or-m

obile

-tec

hnol

ogy-

in-2

013/

Page 2: DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World

PROBLEM FIELD

RESEARCH APPROACH

DEVELOPER INSIGHTS

DESIGN TOOL

1234

Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy2

Page 3: DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World

problem field

1Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy3

Page 4: DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World

interpersonalsubjectiveindividualcreativenuanced

impersonalobjectivegenericbasictrivial

00110101100010101000101110111

0101010111110110111001010

0000101011110110001110101011101001110

00011101010

10100011

2955

3056

check-in

3157

3258

3359

2652

3460

2753

35

2854

password: ***********

private sphere vs. mobile solutions

?Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy4

Page 5: DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World

2

research approach

Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy5

Page 6: DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World

ONLINE PRE-SURVEYPrivacy Perceptions & Conflicts

CROWDSOURCED BETAPrivacy in Mobile Tech.

10

197

11DEVELOPER InterviewsSFO

DEVELOPER InterviewsMUC

DESIGN ENGINEERING

TOOL

REAL-TIME USER IDEA PLATFORM

it takes twoinvestigating both perspectives

now.

goalt=0

DEVELOPER

USER

Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy6

Page 7: DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World

qualitative methodologyinterview transcription and analysis of developer interviews in SFO and MUC

interviews min. each transcription qualitative codes

insightcategories

selectedclusters

21 40 63 5

3

1000+tagged quotes

Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy7

Page 8: DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World

3

developer insights

Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy8

Page 9: DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World

layered concept of privacyprivacy as a concrete model of informational control

Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy9

Page 10: DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World

SMARTPHONEUSERUSER NETWORK

DEVICE MANUFACTURER

OS PROVIDER

APP MANUFACTURER

FREELANCE Developer

IN-HOUSE Developer

Product MANAGER

to use or not to use dissecting the responsibility of stakeholders

Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy10

Page 11: DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World

Degree of TECHNOLOGY INTERACTION

Degr

ee o

f USE

R IN

ITIA

TIVE

PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER

ACTIVEin exchange with the environment

PASSIVErestricted to oneself

PHYSICALlayer

USERlayer

SOLUTION HEATMAP

a fine line privacy strategies need to consider both user and technology

Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy11

Page 12: DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World

Degree of TECHNOLOGY INTERACTION

Degr

ee o

f USE

R IN

ITIA

TIVE

PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER

ACTIVEin exchange with the environment

PASSIVErestricted to oneself

PHYSICALlayer

USERlayer

SOLUTION HEATMAP

opt-in instead of opt-out, educational trainings

encrypted storage, haptic feedback

explain reasons for app permissions

a fine line privacy strategies need to consider both user and technology

Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy12

Page 13: DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World

conclusionsprivacy strategies need to consider both user and technology

knowledge communicationresponsibility participation

Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy13

Page 14: DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World

design toolbeta-version to design privacy in technology

4Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy14

Page 15: DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World

decodingPRIVACY perceptions, conflicts and strategies of privacy in the mobile world

strategies

situation

description

location

participants

decodingPRIVACY perceptions, conflicts and strategies of privacy in the mobile world

conflicts

participants

ISOLATE Degree of INTERACTION

INTERACT

ILLU

SO

RY

EN

VR

ON

ME

NT

SOLITUDE

INDIVIDUAL CONTENT

ENV

IRO

NM

EN

T

PEER GROUP INTERAC

TION

INDIVIDUAL EXPERIENCE OF COLLECTIVITY

PR

OD

UC

T

FRIENDSHIP & RELATE

DN

ES

S

COLLECTIVE EXPERIENCE

BO

DY

INTIMACY

CREATION OF CONT-

OWN SPACE OF PERCEPTION

MOBILE TECHNOLOGIES

PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER

SOLUTION HEATMAP

privacy DEFINITIONS

privacy CONFLICTS

privacy STRATEGIES

decodingPRIVACY design tool

OWN SPACE OF PERCEPTION

MOBILE TECHNOLOGIES

LOSS TROLover his /

her ivacy

OF CONTROL

over his / her SOCIAL privacy

TROL

over his / privacy

CONTROL TAKE-OVER

of another‘s PHYSICAL privacy over one‘s own

CONTROL TAKE-OVER

of another‘s SOCIAL privacy over one‘s own

CONTROL TAKE-OVER

of another‘s CONTENTUAL privacy over one‘s own

INTRUSION Locus of TAKING CONTROL

LOSS

intrinsic CONTROL

CONCEAL

OUTSOURCE

OWN SPACE OF

PERCEPTION

MOBILE TECHNOLOGIES

user insights fuel developer processesraising awareness & understanding through a workable design tool

Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy15

Page 16: DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World

www.decodingprivacy.com

Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy16

Page 17: DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World

Tanja KORNBERGERPrivacy Researcher

[email protected]

Diana SCHNEIDERDesign Thinker l Founder

[email protected]

BRISKROADambassadors of design thinking

contribute!feedback, questions, suggestions?

@Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy17