SlideShare a Scribd company logo
1 of 29
©2009CarnegieMellonUniversity:1
Designing the User Experience
for Online Privacy
IAPP
June 21, 2013
Jason Hong
Associate Professor, HCII
Computer
Human
Interaction:
Mobility
Privacy
Security
©2013CarnegieMellonUniversity:2
Full policy is 10x this length
©2013CarnegieMellonUniversity:3
But this assumes people read it
©2013CarnegieMellonUniversity:4
©2013CarnegieMellonUniversity:5
Mental models not always clear
©2013CarnegieMellonUniversity:6
Location Data
Unique device ID
Location Data
Network Access
Unique device ID
Location Data
Unique device ID
Many hidden and surprising behaviors
©2013CarnegieMellonUniversity:7
Timing really matters too
©2013CarnegieMellonUniversity:8
©2013CarnegieMellonUniversity:9
Not always clear who your audience is
©2013CarnegieMellonUniversity:10
©2013CarnegieMellonUniversity:11
Too many options!
©2013CarnegieMellonUniversity:12
So what can we do to help
with the user experience?
©2013CarnegieMellonUniversity:13
Can we simplify and
standardize privacy info?
(Kelley et al, CHI 2010)
©2013CarnegieMellonUniversity:14
Standard symbols
Standard locations
High level visual feedback
©2013CarnegieMellonUniversity:15
Finding Surprises
Can we find the gaps between what
people think an app does and what
an app actually does?
App Behavior
(What an app
actually does)
User Expectations
(What people think
the app does)
©2013CarnegieMellonUniversity:16
Amazon Mechanical Turk
©2013CarnegieMellonUniversity:17
©2013CarnegieMellonUniversity:18
Expectations Condition
Why do you think Angry Birds uses
your location data?
How comfortable are you with Angry
Birds using your location data?
©2013CarnegieMellonUniversity:19
Purpose Condition
Angry Birds uses your location data
for advertising.
How comfortable are you with Angry
Birds using your location data?
©2013CarnegieMellonUniversity:20
Results for Location Data
(N=20 per app, Expectations Condition)
App Comfort Level (-2 – 2)
Maps 1.52
GasBuddy 1.47
Weather Channel 1.45
Foursquare 0.95
TuneIn Radio 0.60
Evernote 0.15
Angry Birds -0.70
Brightest Flashlight Free -1.15
Toss It -1.2
©2013CarnegieMellonUniversity:21
“[H]e was able to identify about 25 products
that… allowed him to assign each shopper a
‘pregnancy prediction’ score. [H]e could also
estimate her due date to within a small window,
so Target could send coupons timed to very
specific stages of her pregnancy.”
©2013CarnegieMellonUniversity:22
“We’d put an ad for a lawn mower next to
diapers. We’d put a coupon for wineglasses next
to infant clothes. That way, it looked like all the
products were chosen by chance.”
©2013CarnegieMellonUniversity:23
Privacy placebos?
©2013CarnegieMellonUniversity:24
Computation
Communication
Sensing
©2013CarnegieMellonUniversity:25
©2013CarnegieMellonUniversity:26
©2013CarnegieMellonUniversity:27
©2013CarnegieMellonUniversity:28
©2013CarnegieMellonUniversity:29

More Related Content

What's hot

Shuhanhui zhuang desma9_midterm
Shuhanhui zhuang desma9_midtermShuhanhui zhuang desma9_midterm
Shuhanhui zhuang desma9_midtermMilton Zhuang
 
Negative Effects of Technology on Young Children
Negative Effects of Technology on Young ChildrenNegative Effects of Technology on Young Children
Negative Effects of Technology on Young Childrenascarcello
 
Children, Technology, and the Evolution of Education
Children, Technology, and the Evolution of EducationChildren, Technology, and the Evolution of Education
Children, Technology, and the Evolution of Education8cr1
 
Bits of Evidence
Bits of EvidenceBits of Evidence
Bits of EvidenceGreg Wilson
 
The Age of Technology-Enhanced Teaching
The Age of Technology-Enhanced TeachingThe Age of Technology-Enhanced Teaching
The Age of Technology-Enhanced TeachingMaria H. Andersen
 

What's hot (6)

Shuhanhui zhuang desma9_midterm
Shuhanhui zhuang desma9_midtermShuhanhui zhuang desma9_midterm
Shuhanhui zhuang desma9_midterm
 
Negative Effects of Technology on Young Children
Negative Effects of Technology on Young ChildrenNegative Effects of Technology on Young Children
Negative Effects of Technology on Young Children
 
Children, Technology, and the Evolution of Education
Children, Technology, and the Evolution of EducationChildren, Technology, and the Evolution of Education
Children, Technology, and the Evolution of Education
 
Bits of Evidence
Bits of EvidenceBits of Evidence
Bits of Evidence
 
The Age of Technology-Enhanced Teaching
The Age of Technology-Enhanced TeachingThe Age of Technology-Enhanced Teaching
The Age of Technology-Enhanced Teaching
 
Mobile Gamification
Mobile GamificationMobile Gamification
Mobile Gamification
 

Similar to Designing the User Experience for Online Privacy, at IAPP Navigate 2013

Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Jason Hong
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Jason Hong
 
Extreme IoT Games
Extreme IoT GamesExtreme IoT Games
Extreme IoT GamesMike Kavis
 
C3E talk on Navigating Cyberspace, January 2014
C3E talk on Navigating Cyberspace, January 2014C3E talk on Navigating Cyberspace, January 2014
C3E talk on Navigating Cyberspace, January 2014Jason Hong
 
Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Introduction to User Experience and User Interface Design: A One-Hour Crash C...Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Introduction to User Experience and User Interface Design: A One-Hour Crash C...Jason Hong
 
How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps Jason Hong
 
Getting Beyond the Hype-What’s Really Working In Mobile Marketing Today by Mo...
Getting Beyond the Hype-What’s Really Working In Mobile Marketing Today by Mo...Getting Beyond the Hype-What’s Really Working In Mobile Marketing Today by Mo...
Getting Beyond the Hype-What’s Really Working In Mobile Marketing Today by Mo...SIM Partners
 
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Jason Hong
 
HCI and Smartphone Data at Scale
HCI and Smartphone Data at ScaleHCI and Smartphone Data at Scale
HCI and Smartphone Data at ScaleJason Hong
 
Outlook 2014 Mid-Year Review
Outlook 2014 Mid-Year ReviewOutlook 2014 Mid-Year Review
Outlook 2014 Mid-Year ReviewIPG Media Lab
 
Open social mobile apps increase community involvement in policing and confid...
Open social mobile apps increase community involvement in policing and confid...Open social mobile apps increase community involvement in policing and confid...
Open social mobile apps increase community involvement in policing and confid...Angus Fox
 
Speaking - cloud computing and the sysop professional - how to get ready
Speaking - cloud computing and the sysop professional - how to get readySpeaking - cloud computing and the sysop professional - how to get ready
Speaking - cloud computing and the sysop professional - how to get readyEduardo Coelho
 
An Overview of Prototyping Software (NYU/IDEO)
An Overview of Prototyping Software (NYU/IDEO)An Overview of Prototyping Software (NYU/IDEO)
An Overview of Prototyping Software (NYU/IDEO)Joshua Wexler
 
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Jason Hong
 
BYOD: The Easyjet approach to Mobile Learning?
BYOD: The Easyjet approach to Mobile Learning?BYOD: The Easyjet approach to Mobile Learning?
BYOD: The Easyjet approach to Mobile Learning?TCappelli
 

Similar to Designing the User Experience for Online Privacy, at IAPP Navigate 2013 (19)

Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
 
Extreme IoT Games
Extreme IoT GamesExtreme IoT Games
Extreme IoT Games
 
M learning 002
M learning 002M learning 002
M learning 002
 
C3E talk on Navigating Cyberspace, January 2014
C3E talk on Navigating Cyberspace, January 2014C3E talk on Navigating Cyberspace, January 2014
C3E talk on Navigating Cyberspace, January 2014
 
Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Introduction to User Experience and User Interface Design: A One-Hour Crash C...Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Introduction to User Experience and User Interface Design: A One-Hour Crash C...
 
How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps
 
Google glass
Google glassGoogle glass
Google glass
 
Getting Beyond the Hype-What’s Really Working In Mobile Marketing Today by Mo...
Getting Beyond the Hype-What’s Really Working In Mobile Marketing Today by Mo...Getting Beyond the Hype-What’s Really Working In Mobile Marketing Today by Mo...
Getting Beyond the Hype-What’s Really Working In Mobile Marketing Today by Mo...
 
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
 
HCI and Smartphone Data at Scale
HCI and Smartphone Data at ScaleHCI and Smartphone Data at Scale
HCI and Smartphone Data at Scale
 
MMA 2013_App solutely
MMA 2013_App solutelyMMA 2013_App solutely
MMA 2013_App solutely
 
Outlook 2014 Mid-Year Review
Outlook 2014 Mid-Year ReviewOutlook 2014 Mid-Year Review
Outlook 2014 Mid-Year Review
 
Open social mobile apps increase community involvement in policing and confid...
Open social mobile apps increase community involvement in policing and confid...Open social mobile apps increase community involvement in policing and confid...
Open social mobile apps increase community involvement in policing and confid...
 
Speaking - cloud computing and the sysop professional - how to get ready
Speaking - cloud computing and the sysop professional - how to get readySpeaking - cloud computing and the sysop professional - how to get ready
Speaking - cloud computing and the sysop professional - how to get ready
 
Making the case for moble
Making the case for mobleMaking the case for moble
Making the case for moble
 
An Overview of Prototyping Software (NYU/IDEO)
An Overview of Prototyping Software (NYU/IDEO)An Overview of Prototyping Software (NYU/IDEO)
An Overview of Prototyping Software (NYU/IDEO)
 
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
 
BYOD: The Easyjet approach to Mobile Learning?
BYOD: The Easyjet approach to Mobile Learning?BYOD: The Easyjet approach to Mobile Learning?
BYOD: The Easyjet approach to Mobile Learning?
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Designing the User Experience for Online Privacy, at IAPP Navigate 2013

Editor's Notes

  1. My background is in HCISome reasons why designing for the user experience for online privacy is so hardStart out with the most visible form of privacy today, the privacy policy
  2. http://moritzlaw.osu.edu/students/groups/is/files/2012/02/Cranor_Formatted_Final.pdfAverage policy takes about 10 minutes to readEstimate it would take 25 full days to read every privacy policy of every web site visited in a yearClear cost (time), unclear benefit to reading these policies
  3. Grade 12.5About 10 min to readSo based on Lorrie and Aleecia’s work, it will take 25 full days to read all privacy policies of all web sitesBut this assumes people read itRationale behavior not to read privacy policies: we want to use the service, painful to read, clear cost but unclear benefit
  4. We all have mental models about every aspect of the worldMaps of where we live, how computers work, how our cars workHere’s an example
  5. So what does this have to do with privacy?Unclear mental models make it hard to be effective with respect to privacyIf you make a private album, no one can see it. But what happens if you tag someone in a photo? Can that person see it? So the mental models aren’t always clear.
  6. Brightest Flashlighthttps://play.google.com/store/apps/details?id=goldenshorestechnologies.brightestflashlight.freeBible apphttps://play.google.com/store/apps/details?id=com.sirma.mobile.bible.android
  7. Harder to maintain personas in digital worldHarder to know who can see what, plus stored for a long time
  8. One reason privacy is hard is that there are way too many optionsFrom http://online.wsj.com/article/SB10001424127887324880504578300312528424302.html
  9. More accurate and faster in a number of comprehension and comparison tasks
  10. http://www.nytimes.com/2012/02/19/magazine/shopping-habits.htmlAs Pole’s computers crawled through the data, he was able to identify about 25 products that, when analyzed together, allowed him to assign each shopper a “pregnancy prediction” score. 
  11. See http://cups.cs.cmu.edu/privacyLabel/files/CHI-privacyFinal2010 for more details