Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
decoding
PRIVACY
Tanja KORNBERGER I Diana SCHNEIDER 										 ICED’13 Conference Presentation
BRISKROAD
ambassadors of de...
PROBLEM FIELD
	RESEARCH APPROACH
	 DEVELOPER INSIGHTS
	DESIGN TOOL
1
2
3
4
Tanja KORNBERGER I Diana SCHNEIDER 										 	...
problem field
1Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy3
interpersonal
subjective
individual
creative
nuanced
impersonal
objective
generic
basic
trivial
0011010110001
010100010111...
2
research approach
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy5
ONLINE PRE-SURVEY
Privacy Perceptions & Conflicts
CROWDSOURCED BETA
Privacy in Mobile Tech.
10
197
11
DEVELOPER Interviews...
qualitative methodology
interview transcription and analysis of developer interviews in SFO and MUC
interviews min. each t...
3
developer insights
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy8
layered concept of privacy
privacy as a concrete model of informational control
Tanja KORNBERGER I Diana SCHNEIDER 							...
SMARTPHONEUSERUSER NETWORK
DEVICE
MANUFACTURER
OS PROVIDER
APP
MANUFACTURER
FREELANCE
Developer
IN-HOUSE
Developer
Product...
Degree of TECHNOLOGY INTERACTION
DegreeofUSERINITIATIVE
PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USE...
Degree of TECHNOLOGY INTERACTION
DegreeofUSERINITIATIVE
PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USE...
conclusions
privacy strategies need to consider both user and technology
knowledge communicationresponsibility participati...
design tool
beta-version to design privacy in technology
4Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Dec...
decoding
PRIVACYperceptions, conflicts and strategies of privacy in the mobile world
strategies
situation
description
loca...
www.decodingprivacy.com
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy16
Tanja KORNBERGER
Privacy Researcher
tanja.kornberger@cdtm.de
www.cdtm.de
Diana SCHNEIDER
Design Thinker l Founder
d.schnei...
Upcoming SlideShare
Loading in …5
×

DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World

467 views

Published on

Scientific Paper Presentation given by Tanja KORNBERGER and Diana SCHNEIDER at the International Conference on Engineering Design (ICED'13), in Seoul, Korea, August 2013.

www.decodingprivacy.com

Published in: Technology, News & Politics
  • Be the first to comment

DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World

  1. 1. decoding PRIVACY Tanja KORNBERGER I Diana SCHNEIDER ICED’13 Conference Presentation BRISKROAD ambassadors of design thinking perceptions,conflicts&strategies of privacy in the mobile world ©-http://experttechnologyreview.com/predic- tions-for-mobile-technology-in-2013/
  2. 2. PROBLEM FIELD RESEARCH APPROACH DEVELOPER INSIGHTS DESIGN TOOL 1 2 3 4 Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy2
  3. 3. problem field 1Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy3
  4. 4. interpersonal subjective individual creative nuanced impersonal objective generic basic trivial 0011010110001 0101000101110111 01010101111101 10111001010 00001010111101 100011101010 11101001110 00011101010 10100011 29 55 30 56 check-in 31 57 32 58 33 59 26 52 34 60 27 53 35 28 54 password: *********** private sphere vs. mobile solutions ? Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy4
  5. 5. 2 research approach Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy5
  6. 6. ONLINE PRE-SURVEY Privacy Perceptions & Conflicts CROWDSOURCED BETA Privacy in Mobile Tech. 10 197 11 DEVELOPER Interviews SFO DEVELOPER Interviews MUC DESIGN ENGINEERING TOOL REAL-TIME USER IDEA PLATFORM it takes two investigating both perspectives now. goalt=0 DEVELOPERUSER Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy6
  7. 7. qualitative methodology interview transcription and analysis of developer interviews in SFO and MUC interviews min. each transcription qualitative codes insight categories selected clusters 21 40 63 5 3 1000+ tagged quotes Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy7
  8. 8. 3 developer insights Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy8
  9. 9. layered concept of privacy privacy as a concrete model of informational control Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy9
  10. 10. SMARTPHONEUSERUSER NETWORK DEVICE MANUFACTURER OS PROVIDER APP MANUFACTURER FREELANCE Developer IN-HOUSE Developer Product MANAGER to use or not to use dissecting the responsibility of stakeholders Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy10
  11. 11. Degree of TECHNOLOGY INTERACTION DegreeofUSERINITIATIVE PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER ACTIVE in exchange with the environment PASSIVE restricted to oneself PHYSICAL layer USER layer SOLUTION HEATMAP a fine line privacy strategies need to consider both user and technology Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy11
  12. 12. Degree of TECHNOLOGY INTERACTION DegreeofUSERINITIATIVE PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER ACTIVE in exchange with the environment PASSIVE restricted to oneself PHYSICAL layer USER layer SOLUTION HEATMAP opt-in instead of opt-out, educational trainings encrypted storage, haptic feedback explain reasons for app permissions a fine line privacy strategies need to consider both user and technology Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy12
  13. 13. conclusions privacy strategies need to consider both user and technology knowledge communicationresponsibility participation Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy13
  14. 14. design tool beta-version to design privacy in technology 4Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy14
  15. 15. decoding PRIVACYperceptions, conflicts and strategies of privacy in the mobile world strategies situation description location participants decoding PRIVACYperceptions, conflicts and strategies of privacy in the mobile world conflicts participants ISOLATE Degree of INTERACTION INTERACT ILLUSORYENVRONMENT SOLITUDE INDIV IDUALCONTENT ENVIRONMENT PEER GROUP INTE RACTION IND IVIDUALEXPERIENCEOFCOLLECTIVITY PRODUCT FRIENDSHIP & RELATEDNESS C O LLECTIVEEXPERIENCE BODY INTIMAC Y C REATIONOFCONT- ISOLATE Degree of INTERACTION INTERACT ILLUSORYENVRONMENT SOLITUDE INDIV IDUALCONTENT ENVIRONMENT PEER GROUP INTE RACTION IND IVIDUALEXPERIENCEOFCOLLECTIVITY PRODUCT FRIENDSHIP & RELATEDNESS C O LLECTIVEEXPERIENCE BODY INTIMAC Y C REATIONOFCONT- OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER SOLUTION HEATMAP PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER SOLUTION HEATMAP privacy DEFINITIONS privacy CONFLICTS privacy STRATEGIES decoding PRIVACYdesign tool OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES LOSS TROL over his / her ivacy OF CONTROL over his / her SOCIAL privacy TROL over his / privacy CONTROL TAKE-OVER of another‘s PHYSICAL privacy over one‘s own CONTROL TAKE-OVER of another‘s SOCIAL privacy over one‘s own CONTROL TAKE-OVER of another‘s CONTENTUAL privacy over one‘s own INTRUSION Locus of TAKING CONTROL LOSS intrinsic CONTROL LOSS TROL over his / her ivacy OF CONTROL over his / her SOCIAL privacy TROL over his / privacy CONTROL TAKE-OVER of another‘s PHYSICAL privacy over one‘s own CONTROL TAKE-OVER of another‘s SOCIAL privacy over one‘s own CONTROL TAKE-OVER of another‘s CONTENTUAL privacy over one‘s own INTRUSION Locus of TAKING CONTROL LOSS intrinsic CONTROL CEAL OUTSOURCE OWN S MOBILE TECHNOLOGIES CEAL OUTSOURCE OWN S MOBILE TECHNOLOGIES user insights fuel developer processes raising awareness & understanding through a workable design tool Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy15
  16. 16. www.decodingprivacy.com Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy16
  17. 17. Tanja KORNBERGER Privacy Researcher tanja.kornberger@cdtm.de www.cdtm.de Diana SCHNEIDER Design Thinker l Founder d.schneider@briskroad.com www.briskroad.com BRISKROAD ambassadors of design thinking contribute! feedback, questions, suggestions? @Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy17

×