Designing the User Experience for Online Privacy, at IAPP Navigate 2013

Jason Hong
Jason HongProfessor at Carnegie Mellon University, Human Computer Interaction
©2009CarnegieMellonUniversity:1
Designing the User Experience
for Online Privacy
IAPP
June 21, 2013
Jason Hong
Associate Professor, HCII
Computer
Human
Interaction:
Mobility
Privacy
Security
©2013CarnegieMellonUniversity:2
Full policy is 10x this length
©2013CarnegieMellonUniversity:3
But this assumes people read it
©2013CarnegieMellonUniversity:4
©2013CarnegieMellonUniversity:5
Mental models not always clear
©2013CarnegieMellonUniversity:6
Location Data
Unique device ID
Location Data
Network Access
Unique device ID
Location Data
Unique device ID
Many hidden and surprising behaviors
©2013CarnegieMellonUniversity:7
Timing really matters too
©2013CarnegieMellonUniversity:8
©2013CarnegieMellonUniversity:9
Not always clear who your audience is
©2013CarnegieMellonUniversity:10
©2013CarnegieMellonUniversity:11
Too many options!
©2013CarnegieMellonUniversity:12
So what can we do to help
with the user experience?
©2013CarnegieMellonUniversity:13
Can we simplify and
standardize privacy info?
(Kelley et al, CHI 2010)
©2013CarnegieMellonUniversity:14
Standard symbols
Standard locations
High level visual feedback
©2013CarnegieMellonUniversity:15
Finding Surprises
Can we find the gaps between what
people think an app does and what
an app actually does?
App Behavior
(What an app
actually does)
User Expectations
(What people think
the app does)
©2013CarnegieMellonUniversity:16
Amazon Mechanical Turk
©2013CarnegieMellonUniversity:17
©2013CarnegieMellonUniversity:18
Expectations Condition
Why do you think Angry Birds uses
your location data?
How comfortable are you with Angry
Birds using your location data?
©2013CarnegieMellonUniversity:19
Purpose Condition
Angry Birds uses your location data
for advertising.
How comfortable are you with Angry
Birds using your location data?
©2013CarnegieMellonUniversity:20
Results for Location Data
(N=20 per app, Expectations Condition)
App Comfort Level (-2 – 2)
Maps 1.52
GasBuddy 1.47
Weather Channel 1.45
Foursquare 0.95
TuneIn Radio 0.60
Evernote 0.15
Angry Birds -0.70
Brightest Flashlight Free -1.15
Toss It -1.2
©2013CarnegieMellonUniversity:21
“[H]e was able to identify about 25 products
that… allowed him to assign each shopper a
‘pregnancy prediction’ score. [H]e could also
estimate her due date to within a small window,
so Target could send coupons timed to very
specific stages of her pregnancy.”
©2013CarnegieMellonUniversity:22
“We’d put an ad for a lawn mower next to
diapers. We’d put a coupon for wineglasses next
to infant clothes. That way, it looked like all the
products were chosen by chance.”
©2013CarnegieMellonUniversity:23
Privacy placebos?
©2013CarnegieMellonUniversity:24
Computation
Communication
Sensing
©2013CarnegieMellonUniversity:25
©2013CarnegieMellonUniversity:26
©2013CarnegieMellonUniversity:27
©2013CarnegieMellonUniversity:28
©2013CarnegieMellonUniversity:29
1 of 29

Recommended

Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ... by
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Jason Hong
1.5K views51 slides
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011 by
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011Jason Hong
1.3K views73 slides
The Role of Social Influence In Security Feature Adoption, at CSCW 2015 by
The Role of Social Influence In Security Feature Adoption, at CSCW 2015The Role of Social Influence In Security Feature Adoption, at CSCW 2015
The Role of Social Influence In Security Feature Adoption, at CSCW 2015Jason Hong
501 views36 slides
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ... by
Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...Jason Hong
2.7K views65 slides
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015 by
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015Jason Hong
2.6K views43 slides
Privacy and Security for the Emerging Internet of Things by
Privacy and Security for the Emerging Internet of ThingsPrivacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsJason Hong
20.2K views74 slides

More Related Content

What's hot

Shuhanhui zhuang desma9_midterm by
Shuhanhui zhuang desma9_midtermShuhanhui zhuang desma9_midterm
Shuhanhui zhuang desma9_midtermMilton Zhuang
390 views10 slides
Negative Effects of Technology on Young Children by
Negative Effects of Technology on Young ChildrenNegative Effects of Technology on Young Children
Negative Effects of Technology on Young Childrenascarcello
22K views25 slides
Children, Technology, and the Evolution of Education by
Children, Technology, and the Evolution of EducationChildren, Technology, and the Evolution of Education
Children, Technology, and the Evolution of Education8cr1
1.4K views22 slides
Bits of Evidence by
Bits of EvidenceBits of Evidence
Bits of EvidenceGreg Wilson
31.1K views32 slides
The Age of Technology-Enhanced Teaching by
The Age of Technology-Enhanced TeachingThe Age of Technology-Enhanced Teaching
The Age of Technology-Enhanced TeachingMaria H. Andersen
3.8K views37 slides
Mobile Gamification by
Mobile GamificationMobile Gamification
Mobile GamificationJonathan Engelsma
701 views43 slides

What's hot(6)

Shuhanhui zhuang desma9_midterm by Milton Zhuang
Shuhanhui zhuang desma9_midtermShuhanhui zhuang desma9_midterm
Shuhanhui zhuang desma9_midterm
Milton Zhuang390 views
Negative Effects of Technology on Young Children by ascarcello
Negative Effects of Technology on Young ChildrenNegative Effects of Technology on Young Children
Negative Effects of Technology on Young Children
ascarcello22K views
Children, Technology, and the Evolution of Education by 8cr1
Children, Technology, and the Evolution of EducationChildren, Technology, and the Evolution of Education
Children, Technology, and the Evolution of Education
8cr11.4K views
Bits of Evidence by Greg Wilson
Bits of EvidenceBits of Evidence
Bits of Evidence
Greg Wilson31.1K views
The Age of Technology-Enhanced Teaching by Maria H. Andersen
The Age of Technology-Enhanced TeachingThe Age of Technology-Enhanced Teaching
The Age of Technology-Enhanced Teaching
Maria H. Andersen3.8K views

Similar to Designing the User Experience for Online Privacy, at IAPP Navigate 2013

Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne... by
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Jason Hong
279 views27 slides
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ... by
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Jason Hong
391 views80 slides
Extreme IoT Games by
Extreme IoT GamesExtreme IoT Games
Extreme IoT GamesMike Kavis
7.9K views26 slides
M learning 002 by
M learning 002M learning 002
M learning 002Allen Partridge
2.4K views18 slides
C3E talk on Navigating Cyberspace, January 2014 by
C3E talk on Navigating Cyberspace, January 2014C3E talk on Navigating Cyberspace, January 2014
C3E talk on Navigating Cyberspace, January 2014Jason Hong
336 views42 slides
Introduction to User Experience and User Interface Design: A One-Hour Crash C... by
Introduction to User Experience and User Interface Design: A One-Hour Crash C...Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Introduction to User Experience and User Interface Design: A One-Hour Crash C...Jason Hong
65.1K views99 slides

Similar to Designing the User Experience for Online Privacy, at IAPP Navigate 2013(19)

Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne... by Jason Hong
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Jason Hong279 views
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ... by Jason Hong
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Jason Hong391 views
Extreme IoT Games by Mike Kavis
Extreme IoT GamesExtreme IoT Games
Extreme IoT Games
Mike Kavis7.9K views
C3E talk on Navigating Cyberspace, January 2014 by Jason Hong
C3E talk on Navigating Cyberspace, January 2014C3E talk on Navigating Cyberspace, January 2014
C3E talk on Navigating Cyberspace, January 2014
Jason Hong336 views
Introduction to User Experience and User Interface Design: A One-Hour Crash C... by Jason Hong
Introduction to User Experience and User Interface Design: A One-Hour Crash C...Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Jason Hong65.1K views
How to Analyze the Privacy of 750000 Smartphone Apps by Jason Hong
How to Analyze the Privacy of 750000 Smartphone Apps How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps
Jason Hong311 views
Getting Beyond the Hype-What’s Really Working In Mobile Marketing Today by Mo... by SIM Partners
Getting Beyond the Hype-What’s Really Working In Mobile Marketing Today by Mo...Getting Beyond the Hype-What’s Really Working In Mobile Marketing Today by Mo...
Getting Beyond the Hype-What’s Really Working In Mobile Marketing Today by Mo...
SIM Partners917 views
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012 by Jason Hong
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Jason Hong303 views
HCI and Smartphone Data at Scale by Jason Hong
HCI and Smartphone Data at ScaleHCI and Smartphone Data at Scale
HCI and Smartphone Data at Scale
Jason Hong464 views
Outlook 2014 Mid-Year Review by IPG Media Lab
Outlook 2014 Mid-Year ReviewOutlook 2014 Mid-Year Review
Outlook 2014 Mid-Year Review
IPG Media Lab740 views
Open social mobile apps increase community involvement in policing and confid... by Angus Fox
Open social mobile apps increase community involvement in policing and confid...Open social mobile apps increase community involvement in policing and confid...
Open social mobile apps increase community involvement in policing and confid...
Angus Fox497 views
Speaking - cloud computing and the sysop professional - how to get ready by Eduardo Coelho
Speaking - cloud computing and the sysop professional - how to get readySpeaking - cloud computing and the sysop professional - how to get ready
Speaking - cloud computing and the sysop professional - how to get ready
Eduardo Coelho538 views
An Overview of Prototyping Software (NYU/IDEO) by Joshua Wexler
An Overview of Prototyping Software (NYU/IDEO)An Overview of Prototyping Software (NYU/IDEO)
An Overview of Prototyping Software (NYU/IDEO)
Joshua Wexler674 views
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013 by Jason Hong
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Jason Hong285 views
BYOD: The Easyjet approach to Mobile Learning? by TCappelli
BYOD: The Easyjet approach to Mobile Learning?BYOD: The Easyjet approach to Mobile Learning?
BYOD: The Easyjet approach to Mobile Learning?
TCappelli183 views

Recently uploaded

Throughput by
ThroughputThroughput
ThroughputMoisés Armani Ramírez
32 views11 slides
Report 2030 Digital Decade by
Report 2030 Digital DecadeReport 2030 Digital Decade
Report 2030 Digital DecadeMassimo Talia
13 views41 slides
Roadmap to Become Experts.pptx by
Roadmap to Become Experts.pptxRoadmap to Become Experts.pptx
Roadmap to Become Experts.pptxdscwidyatamanew
11 views45 slides
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensorssugiuralab
11 views15 slides
Empathic Computing: Delivering the Potential of the Metaverse by
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the MetaverseMark Billinghurst
449 views80 slides
SAP Automation Using Bar Code and FIORI.pdf by
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdfVirendra Rai, PMP
19 views38 slides

Recently uploaded(20)

TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab11 views
Empathic Computing: Delivering the Potential of the Metaverse by Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst449 views
SAP Automation Using Bar Code and FIORI.pdf by Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
Data-centric AI and the convergence of data and model engineering: opportunit... by Paolo Missier
Data-centric AI and the convergence of data and model engineering:opportunit...Data-centric AI and the convergence of data and model engineering:opportunit...
Data-centric AI and the convergence of data and model engineering: opportunit...
Paolo Missier29 views
AMAZON PRODUCT RESEARCH.pdf by JerikkLaureta
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta14 views
The Importance of Cybersecurity for Digital Transformation by NUS-ISS
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
NUS-ISS25 views
Spesifikasi Lengkap ASUS Vivobook Go 14 by Dot Semarang
Spesifikasi Lengkap ASUS Vivobook Go 14Spesifikasi Lengkap ASUS Vivobook Go 14
Spesifikasi Lengkap ASUS Vivobook Go 14
Dot Semarang35 views
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica... by NUS-ISS
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
NUS-ISS15 views
.conf Go 2023 - Data analysis as a routine by Splunk
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
Splunk90 views
The details of description: Techniques, tips, and tangents on alternative tex... by BookNet Canada
The details of description: Techniques, tips, and tangents on alternative tex...The details of description: Techniques, tips, and tangents on alternative tex...
The details of description: Techniques, tips, and tangents on alternative tex...
BookNet Canada110 views
[2023] Putting the R! in R&D.pdf by Eleanor McHugh
[2023] Putting the R! in R&D.pdf[2023] Putting the R! in R&D.pdf
[2023] Putting the R! in R&D.pdf
Eleanor McHugh38 views
Five Things You SHOULD Know About Postman by Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman25 views
Voice Logger - Telephony Integration Solution at Aegis by Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma17 views
Special_edition_innovator_2023.pdf by WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2214 views
Attacking IoT Devices from a Web Perspective - Linux Day by Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri15 views

Designing the User Experience for Online Privacy, at IAPP Navigate 2013

Editor's Notes

  1. My background is in HCISome reasons why designing for the user experience for online privacy is so hardStart out with the most visible form of privacy today, the privacy policy
  2. http://moritzlaw.osu.edu/students/groups/is/files/2012/02/Cranor_Formatted_Final.pdfAverage policy takes about 10 minutes to readEstimate it would take 25 full days to read every privacy policy of every web site visited in a yearClear cost (time), unclear benefit to reading these policies
  3. Grade 12.5About 10 min to readSo based on Lorrie and Aleecia’s work, it will take 25 full days to read all privacy policies of all web sitesBut this assumes people read itRationale behavior not to read privacy policies: we want to use the service, painful to read, clear cost but unclear benefit
  4. We all have mental models about every aspect of the worldMaps of where we live, how computers work, how our cars workHere’s an example
  5. So what does this have to do with privacy?Unclear mental models make it hard to be effective with respect to privacyIf you make a private album, no one can see it. But what happens if you tag someone in a photo? Can that person see it? So the mental models aren’t always clear.
  6. Brightest Flashlighthttps://play.google.com/store/apps/details?id=goldenshorestechnologies.brightestflashlight.freeBible apphttps://play.google.com/store/apps/details?id=com.sirma.mobile.bible.android
  7. Harder to maintain personas in digital worldHarder to know who can see what, plus stored for a long time
  8. One reason privacy is hard is that there are way too many optionsFrom http://online.wsj.com/article/SB10001424127887324880504578300312528424302.html
  9. More accurate and faster in a number of comprehension and comparison tasks
  10. http://www.nytimes.com/2012/02/19/magazine/shopping-habits.htmlAs Pole’s computers crawled through the data, he was able to identify about 25 products that, when analyzed together, allowed him to assign each shopper a “pregnancy prediction” score. 
  11. See http://cups.cs.cmu.edu/privacyLabel/files/CHI-privacyFinal2010 for more details