The document summarizes research on privacy perceptions and strategies in mobile technology. It discusses interviews conducted with developers to understand their perspectives on privacy issues. It then presents insights from the interviews, including the idea that privacy involves multiple layers and stakeholders. Finally, it introduces a design tool developed to help design for privacy in technology by considering user and developer needs.
11. Degree of TECHNOLOGY INTERACTION
DegreeofUSERINITIATIVE
PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER
ACTIVE
in exchange with the environment
PASSIVE
restricted to oneself
PHYSICAL
layer
USER
layer
SOLUTION HEATMAP
a fine line
privacy strategies need to consider both user and technology
Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy11
12. Degree of TECHNOLOGY INTERACTION
DegreeofUSERINITIATIVE
PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER
ACTIVE
in exchange with the environment
PASSIVE
restricted to oneself
PHYSICAL
layer
USER
layer
SOLUTION HEATMAP
opt-in instead of opt-out,
educational trainings
encrypted storage,
haptic feedback
explain reasons for
app permissions
a fine line
privacy strategies need to consider both user and technology
Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy12
13. conclusions
privacy strategies need to consider both user and technology
knowledge communicationresponsibility participation
Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy13
14. design tool
beta-version to design privacy in technology
4Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy14
15. decoding
PRIVACYperceptions, conflicts and strategies of privacy in the mobile world
strategies
situation
description
location
participants
decoding
PRIVACYperceptions, conflicts and strategies of privacy in the mobile world
conflicts
participants
ISOLATE
Degree of INTERACTION
INTERACT
ILLUSORYENVRONMENT
SOLITUDE
INDIV
IDUALCONTENT
ENVIRONMENT
PEER GROUP
INTE
RACTION
IND
IVIDUALEXPERIENCEOFCOLLECTIVITY
PRODUCT
FRIENDSHIP
&
RELATEDNESS
C
O
LLECTIVEEXPERIENCE
BODY
INTIMAC
Y
C
REATIONOFCONT-
ISOLATE
Degree of INTERACTION
INTERACT
ILLUSORYENVRONMENT
SOLITUDE
INDIV
IDUALCONTENT
ENVIRONMENT
PEER GROUP
INTE
RACTION
IND
IVIDUALEXPERIENCEOFCOLLECTIVITY
PRODUCT
FRIENDSHIP
&
RELATEDNESS
C
O
LLECTIVEEXPERIENCE
BODY
INTIMAC
Y
C
REATIONOFCONT-
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER
SOLUTION HEATMAP
PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER
SOLUTION HEATMAP
privacy DEFINITIONS
privacy CONFLICTS
privacy STRATEGIES
decoding
PRIVACYdesign tool
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
LOSS TROL
over his /
her ivacy
OF CONTROL
over his /
her SOCIAL privacy
TROL
over his /
privacy
CONTROL TAKE-OVER
of another‘s PHYSICAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s SOCIAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s CONTENTUAL
privacy over one‘s own
INTRUSION
Locus of TAKING CONTROL
LOSS
intrinsic
CONTROL
LOSS TROL
over his /
her ivacy
OF CONTROL
over his /
her SOCIAL privacy
TROL
over his /
privacy
CONTROL TAKE-OVER
of another‘s PHYSICAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s SOCIAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s CONTENTUAL
privacy over one‘s own
INTRUSION
Locus of TAKING CONTROL
LOSS
intrinsic
CONTROL
CEAL
OUTSOURCE
OWN S
MOBILE TECHNOLOGIES
CEAL
OUTSOURCE
OWN S
MOBILE TECHNOLOGIES
user insights fuel developer processes
raising awareness & understanding through a workable design tool
Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy15