SlideShare a Scribd company logo
Azadeh Nematzadeh
Omar Sosa-Tzec
School of Informatics and Computing
Indiana University
Design Research Society Conference 2014
June 16, 2014. Umeå, Sweden
ExperienceDesignFrameworkfor
SecuringLargeScaleInformationand
CommunicationSystems
1. SecurityandPrivacyConcerns
2. InformationandCommunicationSystems
(ICSs) Concerns
3. ComplexSystemsandICSs
4. SecurityandPrivacyFramework
5. Implications
6. Conclusions
agenda
1.SecurityandPrivacyConcerns
Asdesigners,whatandhow
dowethinkabout
securityandprivacy
ofInformationand
CommunicationSystems?
People have different
privacy and security concerns
Picturesource:http://bit.ly/1xFLspW
responsibility on the users’ hands
between public and private
Unknown and unpredictable
security and privacy
threats and failures
2.ICSsconcerns
Heterogeneity of users
Imagebytheauthors
u
u
u
u
u
u
u
u
uu
u
u
u
u
u
u
u
u
u
u
u
u
u
diverse people: a “world” using icss
ICSs entail
multiple use scenarios
same system, different use
different security and privacy scenarios
Use scenarios change over time
Information and Communication
Systems also change
Picturesource:http://bit.ly/1lblv7T
3.ComplexSystemsandICSs
Picturesource:http://karaaustin.blogspot.com/
complex systems
Picturesource:http://tinyurl.com/k76185y Picturesource:http://bit.ly/SDVhE9 Picturesource:http://dailym.ai/IUNYDM
Aspects of security and privacy in
ICSs show the characteristics of
complex systems
Picturesource:http://bit.ly/1s7lmw0
self-organization
Picturesource:http://bit.ly/1kQ3X64
emergence
Picturesource:http://bit.ly/1oWmXiy
evolution
Picturesource:http://bit.ly/1qBWKXJ
Picturesource:http://bit.ly/1nxVy70
coevolution
As complex systems,ICSs entail
user-system coevolution
Imagebytheauthors
ICSTime
User
User-System Coevolution
4.SecurityandPrivacyFramework
Complex System
Heterogeneity of users
User's privacy and security
concerns and behaviors
Multiple use scenarios
Evolvable use scenarios
Evolution on ICT infrastructure
security and privacy challenges
for experience design
Avoid
Unintentional
Disclosure
Security
and Privacy
Matters
Expandability
Personalization
AdaptabilityUsability
Imagebytheauthors
framework
security and privacy matters
Imagebytheauthors
*Discussion
*Reflection
*Interaction
flows
*Possible security
and privacy mechanisms
*Taking into account
dynamic behavior
*How to mitigate future attacks
*Think about possible system failures
*Generalities of the users
*Context of use
*Technological aspects
Security
and Privacy
Specialist
Experience
Designer
User
personalization
Imagebytheauthors
Users: group 1 Users: group n-1
Large-ScaleICS
PrivacyandSecurityMechanisms
Users: group n
Sensitive
Parameters
Sensitive
Parameters
Sensitive
Parameters
Facebookimagesfromauthor'sprofile
personalization
adaptability, expandability and usability
Imagebytheauthors
User
t
n
t
n+1User's attributes
Interaction with
the system
User's attributes
ICS
Facebookimagesfromauthor'sprofile
adaptability, expandability and usability
Facebookimagesfromauthor'sprofile
unintentional disclosure
5.Implications
ICSTime
User
+ +
what is the meaning of this relation?
The experience designer as
translator and communicator
of knowledge
ICS
Time
User
Experience
Designer
Security
and Privacy
Specialist
Client and
Stakeholders
User-SystemCoevolution
DesignProcess
ICSs entail a challenge for
both design practice
and design pedagogy
6.Conclusions
We proposed an experience
design framework constituted
by six security and
privacy principles
Security and Privacy Matters
Personalization
Adaptability
Expandability
Usability
Avoid Unintentional Disclosure
Complex Systems
Heterogeneity of Users
Multiple and Evolvable Use Scenarios
User-System Coevolution
Security and Privacy
Experience Design
Our attempt is to open
a conversation about security
and privacy,and also about the
implications of user-system
coevolution in ICSs
for experience design.
azadnema@indiana.edu
http://mypage.iu.edu/~azadnema/
omarsosa@indiana.edu
http://tzec.com/
Paper available at:
http://goo.gl/qZ7qsA
Thankyou!
Questions?

More Related Content

Viewers also liked

Viewers also liked (20)

Sometimes a sign, sometimes a figure
Sometimes a sign, sometimes a figureSometimes a sign, sometimes a figure
Sometimes a sign, sometimes a figure
 
Método de diseño y Modos de apelación retóricos
Método de diseño y Modos de apelación retóricosMétodo de diseño y Modos de apelación retóricos
Método de diseño y Modos de apelación retóricos
 
Esquemática y Diseño de Información
Esquemática y Diseño de InformaciónEsquemática y Diseño de Información
Esquemática y Diseño de Información
 
Asuntos sobre el pensamiento y ejecución de diseño
Asuntos sobre el pensamiento y ejecución de diseñoAsuntos sobre el pensamiento y ejecución de diseño
Asuntos sobre el pensamiento y ejecución de diseño
 
Building the Narrative Cloud: Reflection and Distributed Cognition in a Desig...
Building the Narrative Cloud: Reflection and Distributed Cognition in a Desig...Building the Narrative Cloud: Reflection and Distributed Cognition in a Desig...
Building the Narrative Cloud: Reflection and Distributed Cognition in a Desig...
 
User Experience Design, Navigation, and Interaction Flows
User Experience Design, Navigation, and Interaction FlowsUser Experience Design, Navigation, and Interaction Flows
User Experience Design, Navigation, and Interaction Flows
 
Manual de Identidad Visual para AmexIHC: Asociación Mexicana para la Interacc...
Manual de Identidad Visual para AmexIHC: Asociación Mexicana para la Interacc...Manual de Identidad Visual para AmexIHC: Asociación Mexicana para la Interacc...
Manual de Identidad Visual para AmexIHC: Asociación Mexicana para la Interacc...
 
Sketchnoting Tutorial
Sketchnoting TutorialSketchnoting Tutorial
Sketchnoting Tutorial
 
Rhetoric in Graphic Design
Rhetoric in Graphic DesignRhetoric in Graphic Design
Rhetoric in Graphic Design
 
Introduction to Visual Design for User Experience
Introduction to Visual Design for User ExperienceIntroduction to Visual Design for User Experience
Introduction to Visual Design for User Experience
 
Visual Design for Interface and Experience Design
Visual Design for Interface and Experience DesignVisual Design for Interface and Experience Design
Visual Design for Interface and Experience Design
 
Gaza Everywhere: exploring the applicability of a rhetorical lens in HCI
Gaza Everywhere: exploring the applicability of a rhetorical lens in HCIGaza Everywhere: exploring the applicability of a rhetorical lens in HCI
Gaza Everywhere: exploring the applicability of a rhetorical lens in HCI
 
Affordances, Constraints, and Feedback in User Experience Design
Affordances, Constraints, and Feedback in User Experience DesignAffordances, Constraints, and Feedback in User Experience Design
Affordances, Constraints, and Feedback in User Experience Design
 
Doctoral Consortium Persuasive Technology Conference 2015
Doctoral Consortium Persuasive Technology Conference 2015Doctoral Consortium Persuasive Technology Conference 2015
Doctoral Consortium Persuasive Technology Conference 2015
 
Takeaways from the course Visual Design for User Experience
Takeaways from the course Visual Design for User ExperienceTakeaways from the course Visual Design for User Experience
Takeaways from the course Visual Design for User Experience
 
My Design Philosophy
My Design PhilosophyMy Design Philosophy
My Design Philosophy
 
La creatividad es un mito
La creatividad es un mitoLa creatividad es un mito
La creatividad es un mito
 
Presentation at Seminar I: Rhetorical Evaluation of User Interfaces
Presentation at Seminar I: Rhetorical Evaluation of User Interfaces Presentation at Seminar I: Rhetorical Evaluation of User Interfaces
Presentation at Seminar I: Rhetorical Evaluation of User Interfaces
 
Principios de Diseño Visual para Interacción Humano-Computadora
Principios de Diseño Visual para Interacción Humano-ComputadoraPrincipios de Diseño Visual para Interacción Humano-Computadora
Principios de Diseño Visual para Interacción Humano-Computadora
 
Exploration of Rhetorical Appeals, Operations and Figures in UI/UX Design
Exploration of Rhetorical Appeals, Operations and Figures in UI/UX DesignExploration of Rhetorical Appeals, Operations and Figures in UI/UX Design
Exploration of Rhetorical Appeals, Operations and Figures in UI/UX Design
 

Similar to Experience Design Framework for securing Large Scale Information and Communication Systems

THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docxTHE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
oreo10
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
segughana
 
Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!
Tammy Clark
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
IAEME Publication
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
IAEME Publication
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
DaliaCulbertson719
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
IJECEIAES
 

Similar to Experience Design Framework for securing Large Scale Information and Communication Systems (20)

Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use case
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Usable Security: When Security Meets Usability
Usable Security: When Security Meets UsabilityUsable Security: When Security Meets Usability
Usable Security: When Security Meets Usability
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdf
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
 
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docxTHE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
 
Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente Intelligence
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
 
A novel secure e contents system for multi-media interchange workflows in e-l...
A novel secure e contents system for multi-media interchange workflows in e-l...A novel secure e contents system for multi-media interchange workflows in e-l...
A novel secure e contents system for multi-media interchange workflows in e-l...
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
 
Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!
 
Ist curriculum
Ist curriculumIst curriculum
Ist curriculum
 
Lecture 1-2.pdf
Lecture 1-2.pdfLecture 1-2.pdf
Lecture 1-2.pdf
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
 
The red book
The red book  The red book
The red book
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 

More from Omar Sosa-Tzec

More from Omar Sosa-Tzec (19)

Digital Wellbeing Technology through a Social Semiotic Multimodal Lens: A Cas...
Digital Wellbeing Technology through a Social Semiotic Multimodal Lens: A Cas...Digital Wellbeing Technology through a Social Semiotic Multimodal Lens: A Cas...
Digital Wellbeing Technology through a Social Semiotic Multimodal Lens: A Cas...
 
Delight in the User Experience: Form and Place
Delight in the User Experience: Form and PlaceDelight in the User Experience: Form and Place
Delight in the User Experience: Form and Place
 
Delight by Motion: Investigating the Role of Animation in Microinteractions
Delight by Motion: Investigating the Role of Animation in MicrointeractionsDelight by Motion: Investigating the Role of Animation in Microinteractions
Delight by Motion: Investigating the Role of Animation in Microinteractions
 
Critical Design Research and Constructive Research Outcomes as Arguments
Critical Design Research and Constructive Research Outcomes as ArgumentsCritical Design Research and Constructive Research Outcomes as Arguments
Critical Design Research and Constructive Research Outcomes as Arguments
 
Creative Data and Information Visualization: Reflections on Two Pedagogical A...
Creative Data and Information Visualization: Reflections on Two Pedagogical A...Creative Data and Information Visualization: Reflections on Two Pedagogical A...
Creative Data and Information Visualization: Reflections on Two Pedagogical A...
 
Teaching Design, Information, and Interaction: Reflections, Foundations, and ...
Teaching Design, Information, and Interaction: Reflections, Foundations, and ...Teaching Design, Information, and Interaction: Reflections, Foundations, and ...
Teaching Design, Information, and Interaction: Reflections, Foundations, and ...
 
Visualizing Data Trails: Metaphors and a Symbolic Language for Interfaces
Visualizing Data Trails: Metaphors and a Symbolic Language for InterfacesVisualizing Data Trails: Metaphors and a Symbolic Language for Interfaces
Visualizing Data Trails: Metaphors and a Symbolic Language for Interfaces
 
Communicating design-related intellectual influence: towards visual references
 Communicating design-related intellectual influence: towards visual references Communicating design-related intellectual influence: towards visual references
Communicating design-related intellectual influence: towards visual references
 
Design tensions: Interaction Criticism on Instagram’s Mobile Interface
Design tensions: Interaction Criticism on Instagram’s Mobile InterfaceDesign tensions: Interaction Criticism on Instagram’s Mobile Interface
Design tensions: Interaction Criticism on Instagram’s Mobile Interface
 
Interacciones Encantadoras: Interfaces de Usuario desde una Perspectiva Semió...
Interacciones Encantadoras: Interfaces de Usuario desde una Perspectiva Semió...Interacciones Encantadoras: Interfaces de Usuario desde una Perspectiva Semió...
Interacciones Encantadoras: Interfaces de Usuario desde una Perspectiva Semió...
 
My fascination with the visual: meaning, persuasion, and delight
My fascination with the visual: meaning, persuasion, and delightMy fascination with the visual: meaning, persuasion, and delight
My fascination with the visual: meaning, persuasion, and delight
 
Introduction to Human-Computer Interaction and Interaction Design
Introduction to Human-Computer Interaction and Interaction DesignIntroduction to Human-Computer Interaction and Interaction Design
Introduction to Human-Computer Interaction and Interaction Design
 
Principios de Diseño Visual para Interacción Humano-Computadora
Principios de Diseño Visual para Interacción Humano-ComputadoraPrincipios de Diseño Visual para Interacción Humano-Computadora
Principios de Diseño Visual para Interacción Humano-Computadora
 
HCI Seminar Fall 2015
HCI Seminar Fall 2015HCI Seminar Fall 2015
HCI Seminar Fall 2015
 
Exploration of Rhetorical Appeals, Operations and Figures in UI/UX Design
Exploration of Rhetorical Appeals, Operations and Figures in UI/UX DesignExploration of Rhetorical Appeals, Operations and Figures in UI/UX Design
Exploration of Rhetorical Appeals, Operations and Figures in UI/UX Design
 
Towards a Pentadic Interaction Criticism
Towards a Pentadic Interaction CriticismTowards a Pentadic Interaction Criticism
Towards a Pentadic Interaction Criticism
 
Visual Design for Presentations
Visual Design for PresentationsVisual Design for Presentations
Visual Design for Presentations
 
Rhetorical Handbook. An Illustrated Manual for UX/UI Designers.
Rhetorical Handbook. An Illustrated Manual for UX/UI Designers.Rhetorical Handbook. An Illustrated Manual for UX/UI Designers.
Rhetorical Handbook. An Illustrated Manual for UX/UI Designers.
 
Rhetorical Evaluation of User Interfaces
Rhetorical Evaluation of User InterfacesRhetorical Evaluation of User Interfaces
Rhetorical Evaluation of User Interfaces
 

Recently uploaded

National-Learning-Camp 2024 deped....pptx
National-Learning-Camp 2024 deped....pptxNational-Learning-Camp 2024 deped....pptx
National-Learning-Camp 2024 deped....pptx
AlecAnidul
 
Heuristic Evaluation of System & Application
Heuristic Evaluation of System & ApplicationHeuristic Evaluation of System & Application
Heuristic Evaluation of System & Application
Jaime Brown
 
Research about Venice ppt for grade 6f anas
Research about Venice ppt for grade 6f anasResearch about Venice ppt for grade 6f anas
Research about Venice ppt for grade 6f anas
anasabutalha2013
 

Recently uploaded (14)

Spring 2024 wkrm_Enhancing Campus Mobility.pdf
Spring 2024 wkrm_Enhancing Campus Mobility.pdfSpring 2024 wkrm_Enhancing Campus Mobility.pdf
Spring 2024 wkrm_Enhancing Campus Mobility.pdf
 
Pitch Presentation for Service Design in Technology
Pitch Presentation for Service Design in TechnologyPitch Presentation for Service Design in Technology
Pitch Presentation for Service Design in Technology
 
The Design Code Google Developer Student Club.pptx
The Design Code Google Developer Student Club.pptxThe Design Code Google Developer Student Club.pptx
The Design Code Google Developer Student Club.pptx
 
The Evolution of Fashion Trends: History to Fashion
The Evolution of Fashion Trends: History to FashionThe Evolution of Fashion Trends: History to Fashion
The Evolution of Fashion Trends: History to Fashion
 
National-Learning-Camp 2024 deped....pptx
National-Learning-Camp 2024 deped....pptxNational-Learning-Camp 2024 deped....pptx
National-Learning-Camp 2024 deped....pptx
 
Art Nouveau Movement Presentation for Art History.
Art Nouveau Movement Presentation for Art History.Art Nouveau Movement Presentation for Art History.
Art Nouveau Movement Presentation for Art History.
 
PORTFOLIO FABIANA VILLANI ARCHITECTURE.pdf
PORTFOLIO FABIANA VILLANI ARCHITECTURE.pdfPORTFOLIO FABIANA VILLANI ARCHITECTURE.pdf
PORTFOLIO FABIANA VILLANI ARCHITECTURE.pdf
 
Claire's designing portfolio presentation
Claire's designing portfolio presentationClaire's designing portfolio presentation
Claire's designing portfolio presentation
 
CA OFFICE office office office _VIEWS.pdf
CA OFFICE office office office _VIEWS.pdfCA OFFICE office office office _VIEWS.pdf
CA OFFICE office office office _VIEWS.pdf
 
Design lessons from Singapore | Volume 3
Design lessons from Singapore | Volume 3Design lessons from Singapore | Volume 3
Design lessons from Singapore | Volume 3
 
BIT- Pinal .H. Prajapati Graphic Designer
BIT- Pinal .H. Prajapati  Graphic DesignerBIT- Pinal .H. Prajapati  Graphic Designer
BIT- Pinal .H. Prajapati Graphic Designer
 
Heuristic Evaluation of System & Application
Heuristic Evaluation of System & ApplicationHeuristic Evaluation of System & Application
Heuristic Evaluation of System & Application
 
Common Designing Mistakes and How to avoid them
Common Designing Mistakes and How to avoid themCommon Designing Mistakes and How to avoid them
Common Designing Mistakes and How to avoid them
 
Research about Venice ppt for grade 6f anas
Research about Venice ppt for grade 6f anasResearch about Venice ppt for grade 6f anas
Research about Venice ppt for grade 6f anas
 

Experience Design Framework for securing Large Scale Information and Communication Systems