DECODING PRIVACY - Future Implications of Privacy in Technology

2,332 views

Published on

Conference Speech (YME) at the International Conference on Engineering Design (ICED'13), in Seoul, Korea, August 2013, held by Diana Schneider, Design Thinker at BRISKROAD (www.briskroad.com)

Published in: Technology, News & Politics
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,332
On SlideShare
0
From Embeds
0
Number of Embeds
713
Actions
Shares
0
Downloads
54
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide

DECODING PRIVACY - Future Implications of Privacy in Technology

  1. 1. decoding PRIVACY Diana SCHNEIDER ICED’13 Young Members Event BRISKROAD ambassadors of design thinking future implications of privacy in technology ©-http://experttechnologyreview.com/predic- tions-for-mobile-technology-in-2013/
  2. 2. THE PRIVATE REALM WHY THE FUSS PRIVACY STRATEGIES FUTURE ROLE OF DESIGN 1 2 3 4 2Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  3. 3. defining privacy interpersonally negotiated rules of access to the self 3Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  4. 4. min. participants male female expert reviews co-creation sessions MUC SEOUL empirical study understanding perceptions, conflicts and solutions of privacy WORLDWIDE eSurvey ICED’13 Research Presentation 50 197 116 81 10 2 4Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  5. 5. name 5 concrete situations in which you experienced privacy 5Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  6. 6. INFORMATION CULTURE NATURE CONSUMPTION TERRITORY TOGETHERNESS SECLUSION ROOM DIVISION PSEU- DO-SPACE VIRTUAL SPA- CE COMMUNICATIONINTERSPACE MOBILITY DOMESTICITY FAMILIARITY MOTION ENTERTAINMENT ACQUAINTANCEOWNERSHIP INACCESSIBILITY REGENERATION FREEDOM PERSON OF TRUST INTELLECT CREATION isolate interact isolateisolate PLACES OF ENCOUNTER NORMED PLACES BEING UNOBSERVED PHYSICALhuman body member of society identity CONTENTUAL SOCIAL ISOLATE Degree of INTERACTION INTERACT ILLUSORYENVRONMENT SOLITUDE INDIV IDUALCONTENT ENVIRONMENT PEER GROUP INTE RACTION IND IVIDUALEXPERIENCEOFCOLLECTIVITY PRODUCT FRIENDSHIP & RELATEDNESS C O LLECTIVEEXPERIENCE BODY INTIMAC Y C REATIONOFCONT- concentric model of privacy trichotomy of the self 6Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  7. 7. INFORMATION CULTURE NATURE CONSUMPTION TERRITORY TOGETHERNESS SECLUSION ROOM DIVISION PSEU- DO-SPACE VIRTUAL SPA- CE COMMUNICATIONINTERSPACE MOBILITY DOMESTICITY FAMILIARITY MOTION ENTERTAINMENT ACQUAINTANCEOWNERSHIP INACCESSIBILITY REGENERATION FREEDOM PERSON OF TRUST INTELLECT CREATION isolate interact isolateisolate PLACES OF ENCOUNTER NORMED PLACES BEING UNOBSERVED PHYSICALhuman body member of society identity CONTENTUAL SOCIAL ISOLATE Degree of INTERACTION INTERACT ILLUSORYENVRONMENT SOLITUDE INDIV IDUALCONTENT ENVIRONMENT PEER GROUP INTE RACTION IND IVIDUALEXPERIENCEOFCOLLECTIVITY PRODUCT FRIENDSHIP & RELATEDNESS C O LLECTIVEEXPERIENCE BODY INTIMAC Y C REATIONOFCONT- concentric model of privacy trichotomy of the self dinner with friends driving at night sunday morning routine 7Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  8. 8. name 5 recent situations in which your privacy was compromised 8Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  9. 9. LOSS OF CONTROL of an individual over his / her PHYSICAL privacy LOSS OF CONTROL of an individual over his / her SOCIAL privacy LOSS OF CONTROL of an individual over his / her CONTENTUAL privacy CONTROL TAKE-OVER of another‘s PHYSICAL privacy over one‘s own CONTROL TAKE-OVER of another‘s SOCIAL privacy over one‘s own CONTROL TAKE-OVER of another‘s CONTENTUAL privacy over one‘s own INTRUSION Locus of TAKING CONTROL LOSS PHYSICALhuman body member of society identity CONTENTUAL SOCIAL DISRESPECT OF INTIMACY UNPROTECTED CONDEMNATION UNWANTED ENTRANCE INTO PRIVATE CONTENT intrinsic CONTROL over one‘s privacy DANGER EXCESSIVE DISROBEMENT BODILY VULNERABILITY PUBLIC EXPOSURE TRESPASSING THE BODILY/ SENSORIAL PROTECTIVE ZONE INCAPACITY TO FULFILL ONE‘S PUBLIC ROLE ENDANGERED PROPERTY UNWANTED EXCESS OF INFORMATION IRRECONCILABLE ROLES THREATENED DATA THREATENED SENSORIAL SPHERE EXCESS OF PUBLIC ORDER privacy conflicts duality of control between individuals and their surrounding 9Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  10. 10. LOSS OF CONTROL of an individual over his / her PHYSICAL privacy LOSS OF CONTROL of an individual over his / her SOCIAL privacy LOSS OF CONTROL of an individual over his / her CONTENTUAL privacy CONTROL TAKE-OVER of another‘s PHYSICAL privacy over one‘s own CONTROL TAKE-OVER of another‘s SOCIAL privacy over one‘s own CONTROL TAKE-OVER of another‘s CONTENTUAL privacy over one‘s own INTRUSION Locus of TAKING CONTROL LOSS PHYSICALhuman body member of society identity CONTENTUAL SOCIAL DISRESPECT OF INTIMACY UNPROTECTED CONDEMNATION UNWANTED ENTRANCE INTO PRIVATE CONTENT intrinsic CONTROL over one‘s privacy DANGER EXCESSIVE DISROBEMENT BODILY VULNERABILITY PUBLIC EXPOSURE TRESPASSING THE BODILY/ SENSORIAL PROTECTIVE ZONE INCAPACITY TO FULFILL ONE‘S PUBLIC ROLE ENDANGERED PROPERTY UNWANTED EXCESS OF INFORMATION IRRECONCILABLE ROLES THREATENED DATA THREATENED SENSORIAL SPHERE EXCESS OF PUBLIC ORDER privacy conflicts duality of control between individuals and their surrounding bodily contact in crowded public transport camera surveillance in elevators receiving a private phonecall at the office 10Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  11. 11. 2 why the fuss? 11Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  12. 12. current situation privacy crisis? 12Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  13. 13. 13Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  14. 14. 0011010110001 0101000101110111 01010101111101 10111001010 00001010111101 100011101010 11101001110 00011101010 10100011 29 55 30 56 check-in 31 57 32 58 33 59 26 52 34 60 27 53 35 61 28 54 36PRIVACY UBIQUITY password: *********** ? vs. despite within through 14Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  15. 15. 3 privacy strategies 15Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  16. 16. whichstrategies do you use to protect/regain/ ensure your privacy 16Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  17. 17. analogue privacy strategies diversity of ways to acquire and protect privacy 17Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  18. 18. analogue privacy strategies diversity of ways to acquire and protect privacy paperbags to hide bought items time-management and independence towel on deck-chair 18Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  19. 19. ©2013-PAYWORKSGmbH-J.Lechner,C.Deger,D.Bellem,S.Eumes mobile tech. ubiquitous accessibility via portable devices 19Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  20. 20. mobile tech. privacy strategies limitations and lack of user control shut down PC password encrypt data headphones 20Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  21. 21. future role of design 421Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  22. 22. TECHNOLOGY PRIVACY the gap discrepancy between privacy and technologically enabled strategies situative subjective interpersonal individual cultural creative nuanced generic objective impersonal common global basic trivial vs. 22Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  23. 23. empowering through a workable design tool connecting developers and users AWARENESSof relevance UNDERSTANDING of implications ENABLING user control Future Role of Design the bridge + 23Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  24. 24. Online Pre-Survey PRIVACY PERCEPTIONS & CONFLICTS Online CrowdSource Beta PRIVACY IN MOBILE TECH. 10 197 11 awareness blueprint & Developer Interviews SFO Developer Interviews MUC DESIGN ENGINEERING TOOL REAL-TIME USER IDEA PLATFORM it takes two investigating user and developer perspectives now. goalt=0 decoding PRIVACYperceptions, conflicts and strategies of privacy in the mobile world strategies situation description location participants decoding PRIVACYperceptions, conflicts and strategies of privacy in the mobile world conflicts participants PLACES OF ENCOUNTER ISOLATE Degree of INTERACTION INTERACT ILLUSORYENVRONMENT SOLITUDE INDIV IDUALCONTENT ENVIRONMENT PEER GROUP INTE RACTION IND IVIDUALEXPERIENCEOFCOLLECTIVITY PRODUCT FRIENDSHIP & RELATEDNESS C O LLECTIVEEXPERIENCE BODY INTIMAC Y C REATIONOFCONT- PLACES OF ENCOUNTER ISOLATE Degree of INTERACTION INTERACT ILLUSORYENVRONMENT SOLITUDE INDIV IDUALCONTENT ENVIRONMENT PEER GROUP INTE RACTION IND IVIDUALEXPERIENCEOFCOLLECTIVITY PRODUCT FRIENDSHIP & RELATEDNESS C O LLECTIVEEXPERIENCE BODY INTIMAC Y C REATIONOFCONT- OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER SOLUTION HEATMAP PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER SOLUTION HEATMAP privacy DEFINITIONS privacy CONFLICTS privacy STRATEGIES decoding PRIVACYdesign tool OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES LOSS L over his / her vacy OF CONTROL over his / her SOCIAL privacy TROL over his / privacy CONTROL TAKE-OVER of another‘s PHYSICAL privacy over one‘s own CONTROL TAKE-OVER of another‘s SOCIAL privacy over one‘s own TAKE-OVER of another‘s CONTENTUAL privacy over one‘s own INTRUSION Locus of TAKING CONTROL LOSS intrinsic CONTROL LOSS L over his / her vacy OF CONTROL over his / her SOCIAL privacy TROL over his / privacy CONTROL TAKE-OVER of another‘s PHYSICAL privacy over one‘s own CONTROL TAKE-OVER of another‘s SOCIAL privacy over one‘s own TAKE-OVER of another‘s CONTENTUAL privacy over one‘s own INTRUSION Locus of TAKING CONTROL LOSS intrinsic CONTROL CONCEAL OUTSOURCE OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES CONCEAL OUTSOURCE OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES sneak preview www.decodingprivacy.com 24Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  25. 25. Diana SCHNEIDER Design Thinker l Founder d.schneider@briskroad.com www.briskroad.com BRISKROAD ambassadors of design thinking questions? @ S05 - D5 Design for User Experience I Thurs. 08/22 I 10:45am - 12:15pm 25Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy

×