SlideShare a Scribd company logo
1 of 13
Download to read offline
| secureIoT
Hello!
I am Kiley Judge
I am the User Interface Designer.
You can find me at:
kajudge@umich.edu
Hello!
I am Erica Sietsema
I am the Director of Research and
Development.
You can find me at:
secureIoT@umich.edu
Hello!
I am Mel Savich
I am the Cybersecurity Lead.
You can find me at:
@melaleucaaa
Security is hard; it's nearly impossible to
know what devices are connected to
your home network.. and extremely
difficult to decide what to do if someone
is on your network.
Who is our customer?
Becca Davis
Becca is a 22 year-old Political Science
student at Indiana University.
In one of her political science lectures, she
became Inspired by Edward Snowden’s
story. Learning that he leaked government
secrets because he felt government spying
was wrong inspired her. She’s planning to go
to law school to pursue this interest in citizen
privacy rights.
Since Becca is interested in protected citizen
privacy rights, she feels that she needs to
ensure that her information is private as well.
She knows that her private information is
vulnerable, but she doesn’t know what to do
about it.
Becca’s Dream
Becca’s dream is to one day
work on Capitol Hill
lobbying congress to
change citizen privacy laws.
She needs to ensure that
her private information is
secure so that her motives
aren’t questioned.
Persona: Think/See/Feel/Do
secureIoT
Think thinks that being secure is hard
See sees that private information is not secure
Feel
feels that she should secure her own private
information if she’s going to be advocating for
that
Do does nothing about it right now
Use Case
As an undergraduate,
I want to scan my home
network
so that I can know my private
information is secure.
OUR PROCESS IS EASY
➜ we believe that users of our
application aren’t knowledged in
security, but would like to be
➜ we hope to learn whether users
would use secureIoT often in their
everyday lives
➜ this information would be valuable
to security usability research
Hypothesis
Thanks!
Any questions?
You can find us at:
secureIoT@umich.edu

More Related Content

What's hot

Responsible Digital Citizenship
Responsible Digital CitizenshipResponsible Digital Citizenship
Responsible Digital CitizenshipAlex Noudelman
 
Digital citizenship presentation
Digital citizenship presentationDigital citizenship presentation
Digital citizenship presentationCasey McDaniel
 
Computer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using ComputerComputer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using ComputerNur Azlina
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rulesMazni Salleh
 
Legal Issues in Applied Technology
Legal Issues in Applied Technology Legal Issues in Applied Technology
Legal Issues in Applied Technology AlyssaSingleterry
 
Netiquette and safety
Netiquette and safetyNetiquette and safety
Netiquette and safetyBVJohnson
 
Safe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point finalSafe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point finalejl2
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethicsvincentl33
 
Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Matthew Asbell
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptxKnepperE
 

What's hot (20)

Responsible Digital Citizenship
Responsible Digital CitizenshipResponsible Digital Citizenship
Responsible Digital Citizenship
 
Digital citizenship presentation
Digital citizenship presentationDigital citizenship presentation
Digital citizenship presentation
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Computer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using ComputerComputer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using Computer
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
Erasmus+ group 2
Erasmus+ group 2Erasmus+ group 2
Erasmus+ group 2
 
Legal Issues in Applied Technology
Legal Issues in Applied Technology Legal Issues in Applied Technology
Legal Issues in Applied Technology
 
Netiquette and safety
Netiquette and safetyNetiquette and safety
Netiquette and safety
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Safe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point finalSafe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point final
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Social Media Marketing 04 08 10
Social Media Marketing 04 08 10
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptx
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 

Viewers also liked

Free food preso#2_round3
Free food preso#2_round3Free food preso#2_round3
Free food preso#2_round3Liang Liu
 
AdPerks preso #2
AdPerks preso #2AdPerks preso #2
AdPerks preso #2Kangxu Wang
 
Adperk free food_mvp1
Adperk free food_mvp1Adperk free food_mvp1
Adperk free food_mvp1Liang Liu
 
AdPerks-Presentation1
AdPerks-Presentation1AdPerks-Presentation1
AdPerks-Presentation1Kangxu Wang
 
Eecs441 persona mvp_2
Eecs441 persona mvp_2Eecs441 persona mvp_2
Eecs441 persona mvp_2Jiabin Zhu
 
Eecs441 presentation1 ar_kickers
Eecs441 presentation1 ar_kickersEecs441 presentation1 ar_kickers
Eecs441 presentation1 ar_kickersJiabin Zhu
 
Eecs441 persona mvp1_ar_kickers
Eecs441 persona mvp1_ar_kickersEecs441 persona mvp1_ar_kickers
Eecs441 persona mvp1_ar_kickersJiabin Zhu
 
secureIoT Presentation #1
secureIoT Presentation #1secureIoT Presentation #1
secureIoT Presentation #1Mel Savich
 
My stox persona presentation v2
My stox persona presentation v2My stox persona presentation v2
My stox persona presentation v2Daniel Verderese
 
OnTopic Presentation 3
OnTopic Presentation 3OnTopic Presentation 3
OnTopic Presentation 3Tyler Laredo
 
Presentation 3 - MVP 1 ExpireX
Presentation 3 - MVP 1 ExpireXPresentation 3 - MVP 1 ExpireX
Presentation 3 - MVP 1 ExpireXChristian Axel
 
Presentation 1 wednesday 9 27
Presentation 1 wednesday 9 27Presentation 1 wednesday 9 27
Presentation 1 wednesday 9 27Kyrinna Wei
 
Persona preso v3
Persona preso v3Persona preso v3
Persona preso v3Kyrinna Wei
 
Persona preso v2
Persona preso v2Persona preso v2
Persona preso v2Kyrinna Wei
 
Company Presentation - Ford Motor Company
Company Presentation - Ford Motor CompanyCompany Presentation - Ford Motor Company
Company Presentation - Ford Motor CompanyDavid Harris
 

Viewers also liked (20)

Free food preso#2_round3
Free food preso#2_round3Free food preso#2_round3
Free food preso#2_round3
 
AdPerks preso #2
AdPerks preso #2AdPerks preso #2
AdPerks preso #2
 
Adperk free food_mvp1
Adperk free food_mvp1Adperk free food_mvp1
Adperk free food_mvp1
 
AdPerks-Presentation1
AdPerks-Presentation1AdPerks-Presentation1
AdPerks-Presentation1
 
Eecs441 persona mvp_2
Eecs441 persona mvp_2Eecs441 persona mvp_2
Eecs441 persona mvp_2
 
Eecs441 presentation1 ar_kickers
Eecs441 presentation1 ar_kickersEecs441 presentation1 ar_kickers
Eecs441 presentation1 ar_kickers
 
Perso#3
Perso#3Perso#3
Perso#3
 
Eecs441 persona mvp1_ar_kickers
Eecs441 persona mvp1_ar_kickersEecs441 persona mvp1_ar_kickers
Eecs441 persona mvp1_ar_kickers
 
secureIoT Presentation #1
secureIoT Presentation #1secureIoT Presentation #1
secureIoT Presentation #1
 
My stox persona presentation v2
My stox persona presentation v2My stox persona presentation v2
My stox persona presentation v2
 
Mvp1 preso
Mvp1   presoMvp1   preso
Mvp1 preso
 
OnTopic Presentation 3
OnTopic Presentation 3OnTopic Presentation 3
OnTopic Presentation 3
 
Stockr presentation 1
Stockr presentation 1Stockr presentation 1
Stockr presentation 1
 
Presentation 3 - MVP 1 ExpireX
Presentation 3 - MVP 1 ExpireXPresentation 3 - MVP 1 ExpireX
Presentation 3 - MVP 1 ExpireX
 
Presentation 1 wednesday 9 27
Presentation 1 wednesday 9 27Presentation 1 wednesday 9 27
Presentation 1 wednesday 9 27
 
Persona preso v3
Persona preso v3Persona preso v3
Persona preso v3
 
Persona preso v2
Persona preso v2Persona preso v2
Persona preso v2
 
2k
2k2k
2k
 
Company Presentation - Ford Motor Company
Company Presentation - Ford Motor CompanyCompany Presentation - Ford Motor Company
Company Presentation - Ford Motor Company
 
SoundCloud
SoundCloudSoundCloud
SoundCloud
 

Similar to secureIoT Presentation #2

Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525chadolivard
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxTriveni Prabaakar
 
Online safety 2011
Online safety 2011Online safety 2011
Online safety 2011Tea Teić
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for childrenSaurav Jha
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianKate Gukeisen
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop SlidesNathanielCarlson2
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipKermit Agbas
 
Persona Driven Journey Maps
Persona Driven Journey MapsPersona Driven Journey Maps
Persona Driven Journey MapsDylan Todd
 
School Essay Examples Of Academi
School Essay Examples Of AcademiSchool Essay Examples Of Academi
School Essay Examples Of AcademiJody Sullivan
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 

Similar to secureIoT Presentation #2 (20)

Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Digital Literacy Fundamentals.pptx
Digital Literacy Fundamentals.pptxDigital Literacy Fundamentals.pptx
Digital Literacy Fundamentals.pptx
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
 
Online safety 2011
Online safety 2011Online safety 2011
Online safety 2011
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School Librarian
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Persona Driven Journey Maps
Persona Driven Journey MapsPersona Driven Journey Maps
Persona Driven Journey Maps
 
School Essay Examples Of Academi
School Essay Examples Of AcademiSchool Essay Examples Of Academi
School Essay Examples Of Academi
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Kevin Mitnick
Kevin Mitnick Kevin Mitnick
Kevin Mitnick
 

More from Mel Savich

Phish Fryer Presentation #5
Phish Fryer Presentation #5Phish Fryer Presentation #5
Phish Fryer Presentation #5Mel Savich
 
Sandia National Laboratories
Sandia National LaboratoriesSandia National Laboratories
Sandia National LaboratoriesMel Savich
 
Phish Fryer Presentation #4
Phish Fryer Presentation #4Phish Fryer Presentation #4
Phish Fryer Presentation #4Mel Savich
 
Phish Fryer Presentation #3
Phish Fryer Presentation #3Phish Fryer Presentation #3
Phish Fryer Presentation #3Mel Savich
 
Let's Get Political Presentation #1
Let's Get Political Presentation #1Let's Get Political Presentation #1
Let's Get Political Presentation #1Mel Savich
 

More from Mel Savich (6)

Duo Security
Duo SecurityDuo Security
Duo Security
 
Phish Fryer Presentation #5
Phish Fryer Presentation #5Phish Fryer Presentation #5
Phish Fryer Presentation #5
 
Sandia National Laboratories
Sandia National LaboratoriesSandia National Laboratories
Sandia National Laboratories
 
Phish Fryer Presentation #4
Phish Fryer Presentation #4Phish Fryer Presentation #4
Phish Fryer Presentation #4
 
Phish Fryer Presentation #3
Phish Fryer Presentation #3Phish Fryer Presentation #3
Phish Fryer Presentation #3
 
Let's Get Political Presentation #1
Let's Get Political Presentation #1Let's Get Political Presentation #1
Let's Get Political Presentation #1
 

Recently uploaded

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 

Recently uploaded (20)

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 

secureIoT Presentation #2

  • 2. Hello! I am Kiley Judge I am the User Interface Designer. You can find me at: kajudge@umich.edu
  • 3. Hello! I am Erica Sietsema I am the Director of Research and Development. You can find me at: secureIoT@umich.edu
  • 4. Hello! I am Mel Savich I am the Cybersecurity Lead. You can find me at: @melaleucaaa
  • 5. Security is hard; it's nearly impossible to know what devices are connected to your home network.. and extremely difficult to decide what to do if someone is on your network.
  • 6. Who is our customer?
  • 7. Becca Davis Becca is a 22 year-old Political Science student at Indiana University. In one of her political science lectures, she became Inspired by Edward Snowden’s story. Learning that he leaked government secrets because he felt government spying was wrong inspired her. She’s planning to go to law school to pursue this interest in citizen privacy rights. Since Becca is interested in protected citizen privacy rights, she feels that she needs to ensure that her information is private as well. She knows that her private information is vulnerable, but she doesn’t know what to do about it.
  • 8. Becca’s Dream Becca’s dream is to one day work on Capitol Hill lobbying congress to change citizen privacy laws. She needs to ensure that her private information is secure so that her motives aren’t questioned.
  • 9. Persona: Think/See/Feel/Do secureIoT Think thinks that being secure is hard See sees that private information is not secure Feel feels that she should secure her own private information if she’s going to be advocating for that Do does nothing about it right now
  • 10. Use Case As an undergraduate, I want to scan my home network so that I can know my private information is secure.
  • 12. ➜ we believe that users of our application aren’t knowledged in security, but would like to be ➜ we hope to learn whether users would use secureIoT often in their everyday lives ➜ this information would be valuable to security usability research Hypothesis
  • 13. Thanks! Any questions? You can find us at: secureIoT@umich.edu