Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

UX STRAT USA 2017: Dr. Faith McCreary, "Strategy for Designing Privacy into the Internet of Things"

3,837 views

Published on

UX STRAT USA 2017 presentation by Dr. Faith McCreary, Principal Engineer, Intel Corporation

Published in: Internet
  • Be the first to comment

UX STRAT USA 2017: Dr. Faith McCreary, "Strategy for Designing Privacy into the Internet of Things"

  1. 1. designingforPrivacy intheageofmagic Faith McCreary
  2. 2. The work being shared today was a collaboration with Alex Zafiroglu & Heather Patterson Intel CorporationHeather Alex
  3. 3. INCREASINGLYVISIBLE
  4. 4. BLURRINGBOUNDARIES Source: http://www.michaelbeitz.com/home.html
  5. 5. SMARTORCREEPY?
  6. 6. WONDERINGWHY
  7. 7. Confirm? Reference: https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report- november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf How?
  8. 8. Privacy≠Security
  9. 9. LEGALGUARDRAILS Source: https://upload.wikimedia.org/wikipedia/commons/6/6a/Sign_in_Niagara_Falls,_Ontario,_warning_people_not_to_climb_over_guard_rail.jpg
  10. 10. bydesign
  11. 11. bydesign 1.PROACTIVENOTREACTIVE;PREVENTATIVENOTREMEDIAL 2.PRIVACYASTHEDEFAULTSETTING 3.PRIVACYEMBEDDEDINTODESIGN 4.FULLFUNCTIONALITY–POSITIVE-SUM,NOTZERO-SUM 5.END-TO-ENDSECURITY–FULLLIFECYCLEPROTECTION 6.VISIBILITYANDTRANSPARENCY–KEEPITOPEN 7.RESPECTFORUSERPRIVACY–KEEPITUSER-CENTRIC
  12. 12. DigitalInvisibilityOptical camouflage by Susumu Tachi of the University of Tokyo https://commons.wikimedia.org/wiki/File:An_invisibility_cloak_using_optical_camouflage_by_Susumu_Tachi.jpg
  13. 13. CONTEXTMATTERS
  14. 14. PRIVACYSEGMENTATION INFORMATIONSENSITIVITYMODEL CONTEXTUALPRIVACYPROBES TAXONOMYOFPRIVACYCONCERNS BEHINDtheCurtain
  15. 15. 1PRIVACYSEGMENTATION FUNDAMENTALIST PRAGMITIST UNCONCERNED Source: https://c1.staticflickr.com/8/7469/16263996296_aa8767d970_b.jpg
  16. 16. 2
  17. 17. 3INFORMATIONSENSITIVITYMODEL Stable Clusters of Expectations and Preferences for Boundaries
  18. 18. INFORMATION SENSITIVITY SHARED
  19. 19. INFORMATION SENSITIVITY TRADED
  20. 20. INFORMATION SENSITIVITY SECRET
  21. 21. INFORMATION SENSITIVITY TATTLED
  22. 22. 4TAXONOMYOFPRIVACYCONCERNS 4CATEGORIES 16TYPES
  23. 23. LESSISMORE INFORMATION COLLECTION UNDERSTAND PURPOSE LIMITCAPTURE MANAGEAPPEARANCES BEWARE LOCATION TRACKING
  24. 24. DONOHARMINFORMATION PROCESSING SAFEGUARD DATA LIMITUSE
  25. 25. TRANSLUCENCEBUILDSTRUST INFORMATION DISSEMINATION ACCURACY OPENNESS EASY CONTROL OPAQUENESS
  26. 26. urce: https://c1.staticflickr.com/6/5567/18806435646_b66ba85bac_b.jpg USEFULNOTDISRUPTIVE INFORMATION INVASIONS AIMFORINVISIBLE ENCOURAGE SHUT-OFF
  27. 27. WHATWILLYOUDO?
  28. 28. Email: Faith.A.Mccreary@intel.com

×