SlideShare a Scribd company logo
1 of 17
Download to read offline
decoding
PRIVACY
Tanja KORNBERGER I Diana SCHNEIDER 										 ICED’13 Conference Presentation
BRISKROAD
ambassadors of design thinking
perceptions,conflicts&strategies
of privacy in the mobile world
©-http://experttechnologyreview.com/predic-
tions-for-mobile-technology-in-2013/
PROBLEM FIELD
	RESEARCH APPROACH
	 DEVELOPER INSIGHTS
	DESIGN TOOL
1
2
3
4
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy2
problem field
1Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy3
interpersonal
subjective
individual
creative
nuanced
impersonal
objective
generic
basic
trivial
0011010110001
0101000101110111
01010101111101
10111001010
00001010111101
100011101010
11101001110
00011101010
10100011
29
55
30
56
check-in
31
57
32
58
33
59
26
52
34
60
27
53
35
28
54
password: ***********
private sphere vs. mobile solutions
?
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy4
2
research approach
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy5
ONLINE PRE-SURVEY
Privacy Perceptions & Conflicts
CROWDSOURCED BETA
Privacy in Mobile Tech.
10
197
11
DEVELOPER Interviews
SFO
DEVELOPER Interviews
MUC
DESIGN
ENGINEERING
TOOL
REAL-TIME USER
IDEA PLATFORM
it takes two
investigating both perspectives
now.
goalt=0
DEVELOPERUSER
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy6
qualitative methodology
interview transcription and analysis of developer interviews in SFO and MUC
interviews min. each transcription qualitative
codes
insight
categories
selected
clusters
21 40 63 5
3
1000+
tagged quotes
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy7
3
developer insights
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy8
layered concept of privacy
privacy as a concrete model of informational control
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy9
SMARTPHONEUSERUSER NETWORK
DEVICE
MANUFACTURER
OS PROVIDER
APP
MANUFACTURER
FREELANCE
Developer
IN-HOUSE
Developer
Product
MANAGER
to use or not to use
dissecting the responsibility of stakeholders
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy10
Degree of TECHNOLOGY INTERACTION
DegreeofUSERINITIATIVE
PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER
ACTIVE
in exchange with the environment
PASSIVE
restricted to oneself
PHYSICAL
layer
USER
layer
SOLUTION HEATMAP
a fine line
privacy strategies need to consider both user and technology
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy11
Degree of TECHNOLOGY INTERACTION
DegreeofUSERINITIATIVE
PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER
ACTIVE
in exchange with the environment
PASSIVE
restricted to oneself
PHYSICAL
layer
USER
layer
SOLUTION HEATMAP
opt-in instead of opt-out,
educational trainings
encrypted storage,
haptic feedback
explain reasons for
app permissions
a fine line
privacy strategies need to consider both user and technology
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy12
conclusions
privacy strategies need to consider both user and technology
knowledge communicationresponsibility participation
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy13
design tool
beta-version to design privacy in technology
4Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy14
decoding
PRIVACYperceptions, conflicts and strategies of privacy in the mobile world
strategies
situation
description
location
participants
decoding
PRIVACYperceptions, conflicts and strategies of privacy in the mobile world
conflicts
participants
ISOLATE
Degree of INTERACTION
INTERACT
ILLUSORYENVRONMENT
SOLITUDE
INDIV
IDUALCONTENT
ENVIRONMENT
PEER GROUP
INTE
RACTION
IND
IVIDUALEXPERIENCEOFCOLLECTIVITY
PRODUCT
FRIENDSHIP
&
RELATEDNESS
C
O
LLECTIVEEXPERIENCE
BODY
INTIMAC
Y
C
REATIONOFCONT-
ISOLATE
Degree of INTERACTION
INTERACT
ILLUSORYENVRONMENT
SOLITUDE
INDIV
IDUALCONTENT
ENVIRONMENT
PEER GROUP
INTE
RACTION
IND
IVIDUALEXPERIENCEOFCOLLECTIVITY
PRODUCT
FRIENDSHIP
&
RELATEDNESS
C
O
LLECTIVEEXPERIENCE
BODY
INTIMAC
Y
C
REATIONOFCONT-
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER
SOLUTION HEATMAP
PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER
SOLUTION HEATMAP
privacy DEFINITIONS
privacy CONFLICTS
privacy STRATEGIES
decoding
PRIVACYdesign tool
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
LOSS TROL
over his /
her ivacy
OF CONTROL
over his /
her SOCIAL privacy
TROL
over his /
privacy
CONTROL TAKE-OVER
of another‘s PHYSICAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s SOCIAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s CONTENTUAL
privacy over one‘s own
INTRUSION
Locus of TAKING CONTROL
LOSS
intrinsic
CONTROL
LOSS TROL
over his /
her ivacy
OF CONTROL
over his /
her SOCIAL privacy
TROL
over his /
privacy
CONTROL TAKE-OVER
of another‘s PHYSICAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s SOCIAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s CONTENTUAL
privacy over one‘s own
INTRUSION
Locus of TAKING CONTROL
LOSS
intrinsic
CONTROL
CEAL
OUTSOURCE
OWN S
MOBILE TECHNOLOGIES
CEAL
OUTSOURCE
OWN S
MOBILE TECHNOLOGIES
user insights fuel developer processes
raising awareness & understanding through a workable design tool
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy15
www.decodingprivacy.com
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy16
Tanja KORNBERGER
Privacy Researcher
tanja.kornberger@cdtm.de
www.cdtm.de
Diana SCHNEIDER
Design Thinker l Founder
d.schneider@briskroad.com
www.briskroad.com
BRISKROAD
ambassadors of design thinking
contribute!
feedback, questions, suggestions?
@Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy17

More Related Content

Similar to DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World

Color based android shuffling pattern lock
Color based android shuffling pattern lockColor based android shuffling pattern lock
Color based android shuffling pattern lockIRJET Journal
 
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...Feroot
 
5 Keys to Designing UX That Drives Patient Engagement
5 Keys to Designing UX That Drives Patient Engagement5 Keys to Designing UX That Drives Patient Engagement
5 Keys to Designing UX That Drives Patient EngagementPointClear Solutions
 
ZION: Security and Internet of Things
ZION: Security and Internet of ThingsZION: Security and Internet of Things
ZION: Security and Internet of ThingsAnkam Karthik
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingShivam Singh
 
Privacy by Design workshop for Developers - School for Computer Science (HBO-...
Privacy by Design workshop for Developers - School for Computer Science (HBO-...Privacy by Design workshop for Developers - School for Computer Science (HBO-...
Privacy by Design workshop for Developers - School for Computer Science (HBO-...Anne Marleen
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYIRJET Journal
 
Design Do's and Don'ts for Great AR
Design Do's and Don'ts for Great ARDesign Do's and Don'ts for Great AR
Design Do's and Don'ts for Great AREvelina Deleanu
 
Andrew Newman UX director
Andrew Newman UX directorAndrew Newman UX director
Andrew Newman UX directorAndrew Newman
 
Digital jewellery
Digital jewellery Digital jewellery
Digital jewellery harish kumar
 
Digital jewellery final report
Digital jewellery final reportDigital jewellery final report
Digital jewellery final reportDuggirala Madhu
 
TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...Ann Wuyts
 
Six key business / tech trends and how they're impacting IT investment and go...
Six key business / tech trends and how they're impacting IT investment and go...Six key business / tech trends and how they're impacting IT investment and go...
Six key business / tech trends and how they're impacting IT investment and go...MWD Advisors
 
Designing for Sensors 
& the Future of Experiences
Designing for Sensors 
& the Future of ExperiencesDesigning for Sensors 
& the Future of Experiences
Designing for Sensors 
& the Future of ExperiencesJeremy Johnson
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agendaFuture Agenda
 

Similar to DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World (20)

Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Color based android shuffling pattern lock
Color based android shuffling pattern lockColor based android shuffling pattern lock
Color based android shuffling pattern lock
 
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
 
5 Keys to Designing UX That Drives Patient Engagement
5 Keys to Designing UX That Drives Patient Engagement5 Keys to Designing UX That Drives Patient Engagement
5 Keys to Designing UX That Drives Patient Engagement
 
ZION: Security and Internet of Things
ZION: Security and Internet of ThingsZION: Security and Internet of Things
ZION: Security and Internet of Things
 
Accessible Privacy and Security
Accessible Privacy and SecurityAccessible Privacy and Security
Accessible Privacy and Security
 
Writing effective crisis scenarios
Writing effective crisis scenariosWriting effective crisis scenarios
Writing effective crisis scenarios
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using Watermarking
 
Privacy by Design workshop for Developers - School for Computer Science (HBO-...
Privacy by Design workshop for Developers - School for Computer Science (HBO-...Privacy by Design workshop for Developers - School for Computer Science (HBO-...
Privacy by Design workshop for Developers - School for Computer Science (HBO-...
 
Cyber Threat Intel : Overview
Cyber Threat Intel : OverviewCyber Threat Intel : Overview
Cyber Threat Intel : Overview
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
 
Design Do's and Don'ts for Great AR
Design Do's and Don'ts for Great ARDesign Do's and Don'ts for Great AR
Design Do's and Don'ts for Great AR
 
Andrew Newman UX director
Andrew Newman UX directorAndrew Newman UX director
Andrew Newman UX director
 
Digital jewellery
Digital jewellery Digital jewellery
Digital jewellery
 
Digital jewellery final report
Digital jewellery final reportDigital jewellery final report
Digital jewellery final report
 
TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...
 
Six key business / tech trends and how they're impacting IT investment and go...
Six key business / tech trends and how they're impacting IT investment and go...Six key business / tech trends and how they're impacting IT investment and go...
Six key business / tech trends and how they're impacting IT investment and go...
 
Designing for Sensors 
& the Future of Experiences
Designing for Sensors 
& the Future of ExperiencesDesigning for Sensors 
& the Future of Experiences
Designing for Sensors 
& the Future of Experiences
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World

  • 1. decoding PRIVACY Tanja KORNBERGER I Diana SCHNEIDER ICED’13 Conference Presentation BRISKROAD ambassadors of design thinking perceptions,conflicts&strategies of privacy in the mobile world ©-http://experttechnologyreview.com/predic- tions-for-mobile-technology-in-2013/
  • 2. PROBLEM FIELD RESEARCH APPROACH DEVELOPER INSIGHTS DESIGN TOOL 1 2 3 4 Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy2
  • 3. problem field 1Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy3
  • 5. 2 research approach Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy5
  • 6. ONLINE PRE-SURVEY Privacy Perceptions & Conflicts CROWDSOURCED BETA Privacy in Mobile Tech. 10 197 11 DEVELOPER Interviews SFO DEVELOPER Interviews MUC DESIGN ENGINEERING TOOL REAL-TIME USER IDEA PLATFORM it takes two investigating both perspectives now. goalt=0 DEVELOPERUSER Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy6
  • 7. qualitative methodology interview transcription and analysis of developer interviews in SFO and MUC interviews min. each transcription qualitative codes insight categories selected clusters 21 40 63 5 3 1000+ tagged quotes Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy7
  • 8. 3 developer insights Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy8
  • 9. layered concept of privacy privacy as a concrete model of informational control Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy9
  • 10. SMARTPHONEUSERUSER NETWORK DEVICE MANUFACTURER OS PROVIDER APP MANUFACTURER FREELANCE Developer IN-HOUSE Developer Product MANAGER to use or not to use dissecting the responsibility of stakeholders Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy10
  • 11. Degree of TECHNOLOGY INTERACTION DegreeofUSERINITIATIVE PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER ACTIVE in exchange with the environment PASSIVE restricted to oneself PHYSICAL layer USER layer SOLUTION HEATMAP a fine line privacy strategies need to consider both user and technology Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy11
  • 12. Degree of TECHNOLOGY INTERACTION DegreeofUSERINITIATIVE PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER ACTIVE in exchange with the environment PASSIVE restricted to oneself PHYSICAL layer USER layer SOLUTION HEATMAP opt-in instead of opt-out, educational trainings encrypted storage, haptic feedback explain reasons for app permissions a fine line privacy strategies need to consider both user and technology Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy12
  • 13. conclusions privacy strategies need to consider both user and technology knowledge communicationresponsibility participation Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy13
  • 14. design tool beta-version to design privacy in technology 4Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy14
  • 15. decoding PRIVACYperceptions, conflicts and strategies of privacy in the mobile world strategies situation description location participants decoding PRIVACYperceptions, conflicts and strategies of privacy in the mobile world conflicts participants ISOLATE Degree of INTERACTION INTERACT ILLUSORYENVRONMENT SOLITUDE INDIV IDUALCONTENT ENVIRONMENT PEER GROUP INTE RACTION IND IVIDUALEXPERIENCEOFCOLLECTIVITY PRODUCT FRIENDSHIP & RELATEDNESS C O LLECTIVEEXPERIENCE BODY INTIMAC Y C REATIONOFCONT- ISOLATE Degree of INTERACTION INTERACT ILLUSORYENVRONMENT SOLITUDE INDIV IDUALCONTENT ENVIRONMENT PEER GROUP INTE RACTION IND IVIDUALEXPERIENCEOFCOLLECTIVITY PRODUCT FRIENDSHIP & RELATEDNESS C O LLECTIVEEXPERIENCE BODY INTIMAC Y C REATIONOFCONT- OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER SOLUTION HEATMAP PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER SOLUTION HEATMAP privacy DEFINITIONS privacy CONFLICTS privacy STRATEGIES decoding PRIVACYdesign tool OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES LOSS TROL over his / her ivacy OF CONTROL over his / her SOCIAL privacy TROL over his / privacy CONTROL TAKE-OVER of another‘s PHYSICAL privacy over one‘s own CONTROL TAKE-OVER of another‘s SOCIAL privacy over one‘s own CONTROL TAKE-OVER of another‘s CONTENTUAL privacy over one‘s own INTRUSION Locus of TAKING CONTROL LOSS intrinsic CONTROL LOSS TROL over his / her ivacy OF CONTROL over his / her SOCIAL privacy TROL over his / privacy CONTROL TAKE-OVER of another‘s PHYSICAL privacy over one‘s own CONTROL TAKE-OVER of another‘s SOCIAL privacy over one‘s own CONTROL TAKE-OVER of another‘s CONTENTUAL privacy over one‘s own INTRUSION Locus of TAKING CONTROL LOSS intrinsic CONTROL CEAL OUTSOURCE OWN S MOBILE TECHNOLOGIES CEAL OUTSOURCE OWN S MOBILE TECHNOLOGIES user insights fuel developer processes raising awareness & understanding through a workable design tool Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy15
  • 16. www.decodingprivacy.com Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy16
  • 17. Tanja KORNBERGER Privacy Researcher tanja.kornberger@cdtm.de www.cdtm.de Diana SCHNEIDER Design Thinker l Founder d.schneider@briskroad.com www.briskroad.com BRISKROAD ambassadors of design thinking contribute! feedback, questions, suggestions? @Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy17