• Like

Loading…

Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Digital provocations presentation

  • 95 views
Uploaded on

 

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
95
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
1
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Visualisation and Other Methods of Expression
  • 2. VOMEFunded by:
  • 3. FocusVOME’s focus is to develop different types of interventions toraise privacy awareness.These interventions might be social interventions used in off-linesocial interactions or digital interventions that are used as part ofan on-line service.The interventions are designed as “thinking tools” to raiseawareness about privacy issues when using on-line technologies.Depending on the service design, these tools might be used as apart of a means of empowering users to have greater control overthe use of their personal information.
  • 4. InterventionsThe interventions presented in this slide show are all digitalinterventions.The interventions are developed from design principleswhich a VOME team developed in a user-centric designstudy.They are technical probes whose purpose is to elicitresponses from research participants on particular aspectsof privacy awareness, probe usability and accessibility.
  • 5. ContextThese digital interventions are set in a mock-up of an on-lineregistration process.Typical of the services we have researched, the mock-up uses thescenario of an on-line council service.Intervention one was used as a probe to explore differentapproaches to communicating and stimulating privacyawareness between service user and service provider.Intervention two was used as a probe to explore how andwhere intervention was most effective for people with differentlevels of confidence in technology use.
  • 6. INTERVENTION ONE
  • 7. Intervention OneThe aim of our first intervention was to evaluate differentways for service users to explore issues of privacy as theywere asked to register for a serviceWe experimented with three exploration methods: Privacy Enquiry Privacy Transparency Discussion Page
  • 8. Registration
  • 9. Privacy FeaturesThe privacy awareness features are all designed tostimulate some kind of exploration or inquiry. Privacy Enquiry – a means of raising questions with service providers Privacy Transparency – maps to show where personal information flows to once it has been disclosed Discussion Page – a means of discussing information use with your community (either on-line or off-line communities).All features are on the side bar and separate to theprocess of registration
  • 10. Privacy Enquiry : a means of raisingquestions with service providersPrivacy Transparency : maps to show wherepersonal information flows to once it has beendisclosedDiscussion Page : a means of discussinginformation use with your community (either on-line or off-line communities)
  • 11. Privacy Transparency: The MapThe privacy transparency map turned out to be the mostpopular method of inquiry.Even those people who did not read the privacy policy stillengaged with the map.The map proved to be the engagement method mostparticipants wanted to use.The chat and discussion pages did not work particularlywell but participants reported that they were happy bothfeatures were there.
  • 12. Privacy Transparency: The MapAn early prototype of the map can be seen on the next slide.The map plays a number of important roles: Re-enforcement of privacy messages Visualisation of third party involvement Articulation of personal data use policiesAll these roles were derived from the user studies weconducted.
  • 13. Re-enforcement of privacy messages
  • 14. Visualisation of third party involvement
  • 15. Traditional MethodsIn addition to providing methods of inquiry, our mockservice also provided the traditional methods of raisingprivacy awareness (service agreement and privacy policy)Examples of how we do this can be seen on the next slide.
  • 16. Traditional methods of raising privacy awareness
  • 17. INTERVENTION TWO
  • 18. Intervention TwoThe aim of our second intervention is to explore how toembed privacy awareness into the design of an on-lineserviceIn this intervention we have developed our idea ofmapping services and information but incorporatedthese ideas into the service design itself and gave serviceusers more granular control over the disclosure of theirinformation.This intervention is also located in the scenario of serviceregistration with a local council.
  • 19. The FeaturesThe next slide shows the privacy awareness features inIntervention Two.As you can see, we have included chat and discussionfeatures as well as the maps. We have also included a“Frequently Asked Questions” slot…
  • 20. Map Chat Community FAQs discussion
  • 21. ScenarioThe scenario is still the same; a mock-up of an on-lineregistration service with a local council.The next shows how we have adapted the map to show howthe personal information is used in different local councilservices.
  • 22. Creating the MapIn Intervention Two, a service user constructs the mapwhen they select a particular service they want to registerwith.The next slide shows how service users make these choices.The following slide shows how the maps are built up.
  • 23. Traditional MethodsThe traditional methods of privacy awareness andcommunication have been retained in this prototype too.The next slide shows how they are positioned…
  • 24. Traditional methods of raising privacy awareness
  • 25. A Question of BalanceIntervention Two was used as probe to encourage researchparticipants to explore with researchers: the degree of on-line support and help they wanted when disclosing personal information the form that support should takeThe next slide shows how we have designed the probe toprovoke this type of discussion.
  • 26. OutcomesVOME research has shown that users require a mix ofprivacy awareness methods.The interventions have provoked a range of reactions inservice users which have been recorded both in terms ofinterface use and in terms of feedback and comment.These reactions have informed a number of insightsrelated to how to design privacy awareness technologiesfor people with various levels of confidence in bothtechnology and in the service provider.
  • 27. Where to next?VOME completes on July 4th 2012In the last six months we are running three casestudies to explore our design principles still further: We are developing a map to communicate institutional values when managing personal information. We are working to include our design principles in the overall design of Sunderland City Council’s Child Poverty Portal. We are working with Pallion Action Group, West Sunderland, to design a community support service for the community to use during a period of benefit change.
  • 28. Contact usYou can find VOME here: www.vome.orgOr on Twitter twitter.com/vome_project or email lynne.white@rhul.ac.uk