Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Visualizing Privacy

2,155 views

Published on

Lookout's in-house UX researcher, Morgan Eisler, presented her research at the Grace Hopper Celebration of Women in Computing on October 9, 2014. She explains what considerations should be made when creating a visual short form privacy policies that users understand and engage with.

Published in: Technology
  • Be the first to comment

Visualizing Privacy

  1. 1. Visualizing Privacy! Morgan Eisler (@mogasaur)! UX Researcher! 2014 ! ! 10/09/14! #GHC14 2014
  2. 2. 2014
  3. 3. 2014
  4. 4. 2014
  5. 5. TL;DR! 2014
  6. 6. 2014
  7. 7. 2014
  8. 8. 2014 Users With! Data Exposed! Data! Breaches!
  9. 9. 2014
  10. 10. 2014
  11. 11. 2014
  12. 12. The NTIA Code of Conduct! § Categories of Data Collected:! − Biometrics! − Browser History! − Phone or Text Log! − Contacts! − Financial Info! − Health, medical, or therapy info! − Location! − User Files! 2014
  13. 13. The NTIA Code of Conduct! § Entities Data is Shared With:! − Ad Networks! − Carriers! − Consumer Data Resellers! − Data Analytics Providers! − Government Entities! − Operating Systems and Platforms! − Other Apps! − Social Networks! 2014
  14. 14. 2014
  15. 15. 2014
  16. 16. “I think this signifies a company that is very conscientious. A company that cares about people's privacy and is aware of people's concerns about how their information will be gathered, shared, and used.”! " "- Lookout Customer! 2014 !
  17. 17. “I think if a privacy policy was that way then everybody’s policy would get read. It would help a lot of people out if it looked like this.”! " "- Lookout Customer! 2014
  18. 18. 2014
  19. 19. 2014
  20. 20. 2014
  21. 21. 2014
  22. 22. 2014
  23. 23. Final Thoughts! § Be more transparent! § Inspire trust! § Improve comprehension! § Keep in mind:! − A short form policy is not a replacement for a 2014 full-length policy! − Make sure that users understand that a short form policy is just that!
  24. 24. References § 2013, 9 May.“More than 2 billion people use the internet, here’s what they’re up to (inforgraphic)”. The Cultureist. Retrieved from <http://www.thecultureist.com/ 2013/05/09/how-many-people-use-the-internet- more-than-2-billion-infographic/>.! § O’Toole, James. 2014, 28 February. “Mobile apps overtake PC internet usage in U.S.”. CNN Money. Retrieved from http:// money.cnn.com/2014/02/28/technology/ mobile/mobile-apps-internet/>.! 2014
  25. 25. References § Ezor, Jonathan I. 2009, 12 August. “Why your web site’s privacy policy matters more than you think.” Bloomberg Businessweek. Retrieved from <http:// www.businessweek.com/smallbiz/ running_small_business/archives/2009/08/ why_web_site_pr.html>.! § ,2012. “ Global Internet User Survey Summary Report”. The Internet Society. Retrieved from <https:// www.internetsociety.org/sites/default/files/ rep-GIUS2012global-201211-en.pdf>.! 2014
  26. 26. References § 2009, 10 March. “TRUSTe survey findings indicate majority of small business neglect vital privacy measures” [press release]. TRUSTe. Retrieved from <http:// www.truste.com/about-TRUSTe/press-room/ news_truste_smb_neglect_privacy>.! § Bilton, Nick. 2010, 12 May. “Price of Facebook privacy? Start clicking.” The New York Times. Retrieved from <http:// www.nytimes.com/2010/05/13/technology/ personaltech/13basics.html? src=tptw&_r=0>.! 2014
  27. 27. References § Vedantam, Shankar. 2012, 19 April. “To read all those web privacy policies, just take a month off work.” NPR. Retrieved from <http:// www.npr.org/blogs/alltechconsidered/ 2012/04/19/150905465/to-read-all-those-web-privacy- policies-just-take-a-month-off-work>.! § McDonald, Aleecia M. & Faith Cranor, Lorrie, 2008. “The cost of reading privacy policies.” I/ S: A Journal of Law and Policy for the Information Society, 2008 Privacy Year in Review Issue. Retrieved from <http:// lorrie.cranor.org/pubs/readingPolicyCost-authorDraft. 2014 pdf>.!
  28. 28. References § Westerman, Ilana. 2013, 3 June. “What misconceptions do consumers have about privacy?” IAPP. Retrieved from <https:// privacyassociation.org/news/a/what-misconceptions- do-consumers-have-about-privacy/>. 2014 ! § Weise, Elizabeth. 2014, 24 September. “43% of companies had a data breach in the past year.” USA Today. Retrieved from <http:// www.usatoday.com/story/tech/2014/09/24/ data-breach-companies-60/16106197/>.!
  29. 29. References § Pagliery, Jose. 2014, 28 May. “Half of American adults hacked this year.” CNN Money. Retrieved from <http:// money.cnn.com/2014/05/28/technology/ security/hack-data-breach/?iid=EL>.! § Fiegerman, Seth. 2014, 20 June. “Yo gets hacked.” Mashable. Retrieved from <http:// mashable.com/2014/06/20/yo-gets-hacked/ >.! 2014
  30. 30. References § 2013, 25 July. “Short Form Notice Code of Conduct to Promote Transparency in Mobile App Practices”. The National Telecommunications and Information Administration. Retrieved from <http:// www.ntia.doc.gov/files/ntia/publications/ july_25_code_draft.pdf>.! § 2014, 24 July. “Apps Alliance and Intuit partner to release new app privacy tool” [press release]. Application Developers Alliance. Retrieved from <http://www.appdevelopersalliance.org/news/ 2014/7/23/new-tool-allows-developers-to-create-consumer- friendly-app-privacy-notices>.! 2014
  31. 31. Links to Tools on GitHub! 2014 § Lookout: ! − https://github.com/lookout/private-parts! § Intuit/TRUSTe:! − https://github.com/appsalliance/privacynotices! § Mozilla:! − https://github.com/flamsmark/privacy-policy-template !
  32. 32. Contact/Feedback! Questions?! MORGAN.EISLER@LOOKOUT.COM or! Lookout Booth at the Career Fair! ! Rate and Review the session using the GHC Mobile App! To download visit www.gracehopper.org! 2014

×