A growing number of contact tracing apps are being developed to complement manual contact tracing. Yet, for these technological solutions to benefit public health, users must be willing to adopt these apps. While privacy was the main consideration of experts at the start of contact tracing app development, privacy is only one of many factors in users' decision to adopt these apps. In this talk I showcase the value of taking a descriptive ethics approach to setting best practices in this new domain. Descriptive ethics, introduced by the field of moral philosophy, determines best practices by learning directly from the user -- observing people’s preferences and inferring best practice from that behavior -- instead of exclusively relying on experts' normative decisions. This talk presents an empirically-validated framework of the inputs that factor into a user's decision to adopt COVID19 contact tracing apps, including app accuracy, privacy, benefits, and mobile costs. Using predictive models of users' likelihood to install COVID apps based on quantifications of these factors, I show how high the bar is for these apps to achieve adoption and suggest user-driven directions for ethically encouraging adoption.
What is algorithmic bias, and what does it mean for an algorithm to be fair or unfair? This talk explores fair decision making in the context of criminal justice, lending, hiring, and so on, providing both intuitions and their connection to legal and mathematical principles. It describes the basic frameworks of "allocative fairness," that is, fairness when giving out a benefit or a punishment.
Talk video and more at http://jonathanstray.com/introduction-to-algorithmic-bias
A talk at Code for America HQ in San Francisco.
The key to success in the age of the digital patient is to think about the patient as being at the center of the health care and communication network and to design solutions to make it easier for them to participate in their own health care.
CynergisTek’s Survey Data Reveals Leading Cybersecurity Concerns for Healthcare Organization Executives.
Client-Conference Data Unveils That Risks Associated with Internet of Things, Medical Devices, Third-Party Vendors, and Program Management are Top of Mind for Security Executives, Yet Action is Lagging
Insightful Research: The State of Mobile Application Insecurity Casey Lucas
The State of Mobile Application Insecurity
Customer need and demand often affect mobile application security. 65% of the participants in this study strongly agree that the security of mobile apps is sometimes put at risk because of expanding customer demand or need.
That said, the purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace.
Ponemon Institute surveyed 640 individuals involved in the application development and security process in their organizations on the following topics:
- Why mobile application security eludes many organizations.
- The difficulty in controlling employees’ risky behaviors.
- Are organizations taking the right steps to secure mobile apps?
We are pleased to present the findings of The State of Mobile Application Insecurity sponsored by IBM. The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace.
Melinda Thielbar, Data Science Practice Lead and Director of Data Science at Fidelity Investments
From corporations to governments to private individuals, most of the AI community has recognized the growing need to incorporate ethics into the development and maintenance of AI models. Much of the current discussion, though, is meant for leaders and managers. This talk is directed to data scientists, data engineers, ML Ops specialists, and anyone else who is responsible for the hands-on, day-to-day of work building, productionalizing, and maintaining AI models. We'll give a short overview of the business case for why technical AI expertise is critical to developing an AI Ethics strategy. Then we'll discuss the technical problems that cause AI models to behave unethically, how to detect problems at all phases of model development, and the tools and techniques that are available to support technical teams in Ethical AI development.
What is algorithmic bias, and what does it mean for an algorithm to be fair or unfair? This talk explores fair decision making in the context of criminal justice, lending, hiring, and so on, providing both intuitions and their connection to legal and mathematical principles. It describes the basic frameworks of "allocative fairness," that is, fairness when giving out a benefit or a punishment.
Talk video and more at http://jonathanstray.com/introduction-to-algorithmic-bias
A talk at Code for America HQ in San Francisco.
The key to success in the age of the digital patient is to think about the patient as being at the center of the health care and communication network and to design solutions to make it easier for them to participate in their own health care.
CynergisTek’s Survey Data Reveals Leading Cybersecurity Concerns for Healthcare Organization Executives.
Client-Conference Data Unveils That Risks Associated with Internet of Things, Medical Devices, Third-Party Vendors, and Program Management are Top of Mind for Security Executives, Yet Action is Lagging
Insightful Research: The State of Mobile Application Insecurity Casey Lucas
The State of Mobile Application Insecurity
Customer need and demand often affect mobile application security. 65% of the participants in this study strongly agree that the security of mobile apps is sometimes put at risk because of expanding customer demand or need.
That said, the purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace.
Ponemon Institute surveyed 640 individuals involved in the application development and security process in their organizations on the following topics:
- Why mobile application security eludes many organizations.
- The difficulty in controlling employees’ risky behaviors.
- Are organizations taking the right steps to secure mobile apps?
We are pleased to present the findings of The State of Mobile Application Insecurity sponsored by IBM. The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace.
Melinda Thielbar, Data Science Practice Lead and Director of Data Science at Fidelity Investments
From corporations to governments to private individuals, most of the AI community has recognized the growing need to incorporate ethics into the development and maintenance of AI models. Much of the current discussion, though, is meant for leaders and managers. This talk is directed to data scientists, data engineers, ML Ops specialists, and anyone else who is responsible for the hands-on, day-to-day of work building, productionalizing, and maintaining AI models. We'll give a short overview of the business case for why technical AI expertise is critical to developing an AI Ethics strategy. Then we'll discuss the technical problems that cause AI models to behave unethically, how to detect problems at all phases of model development, and the tools and techniques that are available to support technical teams in Ethical AI development.
How to evaluate and improve the quality of mHealth behaviour change tools3GDR
Presented by Jeremy Wyatt DM FRCP ACMI Fellow Leadership chair in eHealth research, University of Leeds; Clinical Adviser on New Technologies, Royal College of Physicians, London
At: What Works in Digital Health? University of Glasgow, 23-24 July 2015.
http://www.sicsa.ac.uk/events/sicsa-ux-mhealth-works-digital-health/
The General Data Protection Regulation (GDPR) becomes enforceable at the end of May, 2018. Designed to strengthen and unify data protection for individuals within the European Union (EU), it comes with a strict set of compliance protocols. And, because GDPR also applies to the export of the export of personal data outside the EU, it is applicable to any entity that uses or exchanges this data. As Vice President and Senior Legal Counsel for a leading international bank, Paul knows firsthand the importance of protecting and securing customer data and intelligence. Join Paul to learn about responsibilities and accountabilities that your organization will need to address.
MEF Global Consumer Trust Report.
The study explores the key areas of trust, privacy, transparency and security to identify their impact on mobile consumers globally from purchasing a new device to downloading apps or paying for goods and services.
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...Saurabh Mishra
This group reviewed data and measurements indicating the positive potential of AI to serve Sustainable Development Goals (SDG’s). Alongside these optimistic inquiries, this group also investigated the risks of AI in areas such as privacy, vulnerable populations, human rights, workplace and organizational policy. The socio-political consequences of AI raise many complex questions which require continued rigorous examination.
Predicting the Future of Predictive Analytics in HealthcareDale Sanders
This is the latest version of a slide deck that discusses some of the less technical, but very important issues, related to the effective use of predictive analytics in healthcare.
How to Analyze the Privacy of 1 Million Smartphone AppsJason Hong
These slides are from a briefing to Congressional staffers about privacy, October 30 2014. It talks about our ongoing work with PrivacyGrade.org, which uses crowdsourcing techniques plus static analysis techniques to infer the privacy-related behaviors of apps.
All information, data, and material contained, presented, or provided on is for educational purposes only.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners.
It is not to be construed or intended as providing legal advice.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
17 U.S. Code § 107 - Limitations on exclusive rights: Fair use
Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright.
Lack of passwords, use of public Wi-Fi lead consumer cyber security risks. New survey from Experian's ProtectMyID® reveals how Americans can take greater control when securing their personal information. The study, conducted by Edelman Berland, reveals areas where consumers’ identities are at the most risk, including electronic devices and online accounts. The findings show that 93 percent of respondents believe that identify theft is a growing problem, yet are not doing enough to address the issue.
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...Frances Coronel
Published December 14, 2015, in Social media
Research Presentation on Online Social Networks (OSN) Privacy.
CSC 425
Senior Seminar
Hampton University
Fall 2015
---
FVCproductions
https://fvcproductions.com
How Telemedicine Apps Prepares You for the Future of Remote HealthcareEMed HealthTech Pvt Ltd
Telemedicine app development is changing healthcare. It offers better access, convenience, and patient engagement. In the post-COVID era, one thing has become very clear: Technology and remote healthcare play a major role in the future of healthcare.
Traditional healthcare models are no longer suitable for today’s world. The rise of technology has transformed the approach to medical care.
If you are a healthcare provider that wants to succeed, EMed HealthTech is the answer you are looking for.
EMed HealthTech is ideal for customized telemedicine app development services.
Salas, V. (2024) "John of St. Thomas (Poinsot) on the Science of Sacred Theol...Studia Poinsotiana
I Introduction
II Subalternation and Theology
III Theology and Dogmatic Declarations
IV The Mixed Principles of Theology
V Virtual Revelation: The Unity of Theology
VI Theology as a Natural Science
VII Theology’s Certitude
VIII Conclusion
Notes
Bibliography
All the contents are fully attributable to the author, Doctor Victor Salas. Should you wish to get this text republished, get in touch with the author or the editorial committee of the Studia Poinsotiana. Insofar as possible, we will be happy to broker your contact.
Nutraceutical market, scope and growth: Herbal drug technologyLokesh Patil
As consumer awareness of health and wellness rises, the nutraceutical market—which includes goods like functional meals, drinks, and dietary supplements that provide health advantages beyond basic nutrition—is growing significantly. As healthcare expenses rise, the population ages, and people want natural and preventative health solutions more and more, this industry is increasing quickly. Further driving market expansion are product formulation innovations and the use of cutting-edge technology for customized nutrition. With its worldwide reach, the nutraceutical industry is expected to keep growing and provide significant chances for research and investment in a number of categories, including vitamins, minerals, probiotics, and herbal supplements.
More Related Content
Similar to Learning from the People: Responsibly Encouraging Adoption of Contact Tracing Apps
How to evaluate and improve the quality of mHealth behaviour change tools3GDR
Presented by Jeremy Wyatt DM FRCP ACMI Fellow Leadership chair in eHealth research, University of Leeds; Clinical Adviser on New Technologies, Royal College of Physicians, London
At: What Works in Digital Health? University of Glasgow, 23-24 July 2015.
http://www.sicsa.ac.uk/events/sicsa-ux-mhealth-works-digital-health/
The General Data Protection Regulation (GDPR) becomes enforceable at the end of May, 2018. Designed to strengthen and unify data protection for individuals within the European Union (EU), it comes with a strict set of compliance protocols. And, because GDPR also applies to the export of the export of personal data outside the EU, it is applicable to any entity that uses or exchanges this data. As Vice President and Senior Legal Counsel for a leading international bank, Paul knows firsthand the importance of protecting and securing customer data and intelligence. Join Paul to learn about responsibilities and accountabilities that your organization will need to address.
MEF Global Consumer Trust Report.
The study explores the key areas of trust, privacy, transparency and security to identify their impact on mobile consumers globally from purchasing a new device to downloading apps or paying for goods and services.
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...Saurabh Mishra
This group reviewed data and measurements indicating the positive potential of AI to serve Sustainable Development Goals (SDG’s). Alongside these optimistic inquiries, this group also investigated the risks of AI in areas such as privacy, vulnerable populations, human rights, workplace and organizational policy. The socio-political consequences of AI raise many complex questions which require continued rigorous examination.
Predicting the Future of Predictive Analytics in HealthcareDale Sanders
This is the latest version of a slide deck that discusses some of the less technical, but very important issues, related to the effective use of predictive analytics in healthcare.
How to Analyze the Privacy of 1 Million Smartphone AppsJason Hong
These slides are from a briefing to Congressional staffers about privacy, October 30 2014. It talks about our ongoing work with PrivacyGrade.org, which uses crowdsourcing techniques plus static analysis techniques to infer the privacy-related behaviors of apps.
All information, data, and material contained, presented, or provided on is for educational purposes only.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners.
It is not to be construed or intended as providing legal advice.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
17 U.S. Code § 107 - Limitations on exclusive rights: Fair use
Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright.
Lack of passwords, use of public Wi-Fi lead consumer cyber security risks. New survey from Experian's ProtectMyID® reveals how Americans can take greater control when securing their personal information. The study, conducted by Edelman Berland, reveals areas where consumers’ identities are at the most risk, including electronic devices and online accounts. The findings show that 93 percent of respondents believe that identify theft is a growing problem, yet are not doing enough to address the issue.
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...Frances Coronel
Published December 14, 2015, in Social media
Research Presentation on Online Social Networks (OSN) Privacy.
CSC 425
Senior Seminar
Hampton University
Fall 2015
---
FVCproductions
https://fvcproductions.com
How Telemedicine Apps Prepares You for the Future of Remote HealthcareEMed HealthTech Pvt Ltd
Telemedicine app development is changing healthcare. It offers better access, convenience, and patient engagement. In the post-COVID era, one thing has become very clear: Technology and remote healthcare play a major role in the future of healthcare.
Traditional healthcare models are no longer suitable for today’s world. The rise of technology has transformed the approach to medical care.
If you are a healthcare provider that wants to succeed, EMed HealthTech is the answer you are looking for.
EMed HealthTech is ideal for customized telemedicine app development services.
Similar to Learning from the People: Responsibly Encouraging Adoption of Contact Tracing Apps (20)
Salas, V. (2024) "John of St. Thomas (Poinsot) on the Science of Sacred Theol...Studia Poinsotiana
I Introduction
II Subalternation and Theology
III Theology and Dogmatic Declarations
IV The Mixed Principles of Theology
V Virtual Revelation: The Unity of Theology
VI Theology as a Natural Science
VII Theology’s Certitude
VIII Conclusion
Notes
Bibliography
All the contents are fully attributable to the author, Doctor Victor Salas. Should you wish to get this text republished, get in touch with the author or the editorial committee of the Studia Poinsotiana. Insofar as possible, we will be happy to broker your contact.
Nutraceutical market, scope and growth: Herbal drug technologyLokesh Patil
As consumer awareness of health and wellness rises, the nutraceutical market—which includes goods like functional meals, drinks, and dietary supplements that provide health advantages beyond basic nutrition—is growing significantly. As healthcare expenses rise, the population ages, and people want natural and preventative health solutions more and more, this industry is increasing quickly. Further driving market expansion are product formulation innovations and the use of cutting-edge technology for customized nutrition. With its worldwide reach, the nutraceutical industry is expected to keep growing and provide significant chances for research and investment in a number of categories, including vitamins, minerals, probiotics, and herbal supplements.
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...University of Maribor
Slides from:
11th International Conference on Electrical, Electronics and Computer Engineering (IcETRAN), Niš, 3-6 June 2024
Track: Artificial Intelligence
https://www.etran.rs/2024/en/home-english/
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...University of Maribor
Slides from talk:
Aleš Zamuda: Remote Sensing and Computational, Evolutionary, Supercomputing, and Intelligent Systems.
11th International Conference on Electrical, Electronics and Computer Engineering (IcETRAN), Niš, 3-6 June 2024
Inter-Society Networking Panel GRSS/MTT-S/CIS Panel Session: Promoting Connection and Cooperation
https://www.etran.rs/2024/en/home-english/
What is greenhouse gasses and how many gasses are there to affect the Earth.moosaasad1975
What are greenhouse gasses how they affect the earth and its environment what is the future of the environment and earth how the weather and the climate effects.
Richard's aventures in two entangled wonderlandsRichard Gill
Since the loophole-free Bell experiments of 2020 and the Nobel prizes in physics of 2022, critics of Bell's work have retreated to the fortress of super-determinism. Now, super-determinism is a derogatory word - it just means "determinism". Palmer, Hance and Hossenfelder argue that quantum mechanics and determinism are not incompatible, using a sophisticated mathematical construction based on a subtle thinning of allowed states and measurements in quantum mechanics, such that what is left appears to make Bell's argument fail, without altering the empirical predictions of quantum mechanics. I think however that it is a smoke screen, and the slogan "lost in math" comes to my mind. I will discuss some other recent disproofs of Bell's theorem using the language of causality based on causal graphs. Causal thinking is also central to law and justice. I will mention surprising connections to my work on serial killer nurse cases, in particular the Dutch case of Lucia de Berk and the current UK case of Lucy Letby.
This presentation explores a brief idea about the structural and functional attributes of nucleotides, the structure and function of genetic materials along with the impact of UV rays and pH upon them.
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...Wasswaderrick3
In this book, we use conservation of energy techniques on a fluid element to derive the Modified Bernoulli equation of flow with viscous or friction effects. We derive the general equation of flow/ velocity and then from this we derive the Pouiselle flow equation, the transition flow equation and the turbulent flow equation. In the situations where there are no viscous effects , the equation reduces to the Bernoulli equation. From experimental results, we are able to include other terms in the Bernoulli equation. We also look at cases where pressure gradients exist. We use the Modified Bernoulli equation to derive equations of flow rate for pipes of different cross sectional areas connected together. We also extend our techniques of energy conservation to a sphere falling in a viscous medium under the effect of gravity. We demonstrate Stokes equation of terminal velocity and turbulent flow equation. We look at a way of calculating the time taken for a body to fall in a viscous medium. We also look at the general equation of terminal velocity.
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
Learning from the People: Responsibly Encouraging Adoption of Contact Tracing Apps
1. Learning from the People:
Responsibly Encouraging Adoption of
Contact Tracing Apps
Elissa M. Redmiles, Ph.D.
Microsoft Research & Max Planck Institute for Software Systems
@eredmil1 eredmiles@gmail.com
2. Computational problems require constant decision-making
What data should be used &
which features prioritized?
Which features are fair to use?
ML Classifier
3. Typically: experts set best practices
What data should be used &
which features prioritized?
Which features are fair to use?
ML Classifier
4. Inspiration figure credit:
Privacy, ethics, and data access: A case study of the Fragile Families
Challenge. Lundberg, I., Narayanan, A., Levy, K., and Salganik, M.J.
Benefittopublichealth
Experts trade off costs and benefits
Risk to individuals
Expert’s Normative Decision
5. Elissa M. Redmiles. Microsoft Research 2020.
What data should be used &
which features prioritized?
Which features are fair to use?
Elissa M. Redmiles. Microsoft Research 2020.
Experts do not always agree on best practices
7. Normative
Experts prescribe best practices
Descriptive
Learn non-expert preference/behavior
Infer best practices
This disagreement is a classic tension in moral philosophy
8. Descriptive ethics approaches to developing technology
Identify ideal / acceptable functionality
from citizen preferences & behavior
9. This talk: applying descriptive ethics to
increase adoption of COVID19 apps
Contact tracing
https://www.microsoft.com/en-us/research/project/descriptive-ethics-for-covid19-apps/
10. Adoption matters
Benefit of contact tracing apps scales
quadratically with the number of users
https://www.research.ox.ac.uk/Article/2020-04-16-digital-contact-tracing-can-
slow-or-even-stop-coronavirus-transmission-and-ease-us-out-of-lockdown
14. We used a series of carefully constructed online surveys to
identify American’s adoption considerations
Closed-answer questions
regarding willingness to install
Open-answer descriptions of
reasoning for install intent
Panel-based online surveys quota sampled to ensure respondent demographics
match those of the U.S. census on age, race, gender, education & income
15. Many possible inputs to COVID19 adoption decisions; privacy is
necessary, but may not be sufficient
Benefits
Accuracy
Provider Privacy
Mobile costs
Architecture:
Security & Agency
See: User Concerns & Tradeoffs in Technology-Facilitated Contact Tracing https://arxiv.org/abs/2004.13219
Redmiles, E.M. User Concerns & Tradeoffs in Technology-Facilitated Contact Tracing.
ACM Digital Government 2020
Used by
16. Provider influences willingness to install;
public health agencies are preferred but not universally
Provider
Featured in
Hargittai, E., Redmiles, E.M., Vitak, J., and Zimmer, M.
Americans’ Willingness to Adopt a COVID-19 Tracking App: The Role of App Distributor. First Monday 2020.
17. Those who don’t want to install are concerned about privacy,
accuracy, costs & necessity
18. Which of these considerations matter most?
Benefits
Accuracy
Provider Privacy
Mobile costs
Architecture:
Security & Agency
See: User Concerns & Tradeoffs in Technology-Facilitated Contact Tracing https://arxiv.org/abs/2004.13219
19. We used conjoint analyses to identify the most important
considerations in COVID19 app adoption intent
Imagine that there is a mobile phone
app intended to help combat the
coronavirus in the U.S.
Different apps have different benefits
and risks and may collect different
types of information about you.
20. Importance (out of 1)
Density
Battery life
Benefits
Mobile Data Use
Privacy/Data Use
Accuracy
For the average American surveyed,
intent to install COVID19 app depends on:
Work in collaboration with Dana Turjeman (Univ. Michigan).
11% Battery life considerations
16% Mobile data use considerations
14% App benefits considerations
29% Privacy / Data Use considerations
29% Accuracy considerations
Accuracy & privacy among the most important factors
in American’s intent to install COVID19 apps
21. But, everyone does
not value these
attributes equally
Democrats focus on accuracy; Republicans on privacy
Younger adults: benefits & accuracy; Older adults: privacy & mobile costs
More engaged COVID19 news consumers: benefits; Less engaged: privacy
More knowledgeable about COVID19 more focus on accuracy
Linear regression models; significant p<0.05
22. Identify adoption
considerations
01
Use descriptive
approaches to
predict adoption
02
Leverage findings to
improve adoption
through changes to
app design &
marketing
03
How good is good enough? Can we predict when adoption
intent is sufficiently high to release?
23. Identify adoption
considerations
01
Use descriptive
approaches to
predict adoption
02
Leverage findings to
improve adoption
through changes to
app design &
marketing
03
How good is good enough? Can we predict when adoption
intent is sufficiently high to release?
24. Importance (out of 1)
Density
Battery life
Benefits
Mobile Data Use
Privacy/Data Use
Accuracy
For the average American surveyed,
intent to install COVID19 app depends on:
Work in collaboration with Dana Turjeman (Univ. Michigan).
11% Battery life considerations
16% Mobile data use considerations
14% App benefits considerations
29% Privacy / Data Use considerations
29% Accuracy considerations
How private does a COVID19 app have to be?
How accurate?
25. Does amount of privacy
and accuracy predict
adoption intent?
How good is
good enough?
26. Surveyed nearly 4,000 crowd workers;
Predict adoption intent given quantified privacy/accuracy
False Negatives
False Positives
Privacy
Implicit assessment of
privacy perception
Studies show that despite best attempts to protect the data of those who use this
app, some people may have information about who they have been near
compromised and used for purposes other than the fight against coronavirus.
Please indicate on the chart below how many app users you think will have this
information compromised over the next year.
Willingness to adopt
given concrete FN rate
Imagine that you are exposed to someone who
has coronavirus 100 times over the next year.
If you do not use the app, 1 out of 100 times
public health workers will be able to detect and
notify you that you were exposed.
If you use the app, TP out of 100 times the app
will be able to detect and notify that you that
you were exposed.
Would you install this app?
Implicit assessment of
privacy perception
Willingness to adopt
given concrete FP rate
Imagine that you are exposed to someone who
has coronavirus 100 times over the next year.
If you do not use the app, 1 out of 100 times
public health workers will be able to detect and
notify you that you were exposed.
The app is not perfect. If you use the app, the
app will correctly notify you every time that
you were exposed (100 out of 100 times). The
app will also incorrectly notify you an
additional FP times, when you were not
actually exposed.
Would you install this app?
Explicit statement of
privacy risk
Studies show that despite best attempts to
protect the data of those who use this app,
some people may have information about who
they have been near compromised and used for
purposes other than the fight against
coronavirus.
P out of 1000 people who use this app will have
this information compromised
Willingness to adopt
given concrete FN rate
27. How good is good enough?
Ideal: 50%+ sensitivity & fewer than 10% false positives
73.0%
63.5%
62.7%
46.2%
35.6%
Logistic regression line,
accuracy on 20% test set = 70.0%.
Logistic regression line,
accuracy on 20% test set 62.5%.
Kaptchuk, G., Goldstein, D. G., Hargittai, E., Hofman, J., Redmiles, E.M.
How good is good enough for COVID19 apps? https://arxiv.org/abs/2004.13219.
Featured in
28. People have a-priori privacy risk expectations
risk quantity influences adoption intent
Intended adoption rate when just
asked about false negative rate
with implicit privacy assumption
≈ intended adoption rate in
response to false negative rate
when privacy risk is quantified
and made explicit up front
Privacy expectations both improve prediction accuracy &
influence behavioral intent
32. For the average American surveyed,
intent to install COVID19 app depends on:
11% Battery life considerations
16% Mobile data use considerations
14% App intrinsic benefits considerations
29% Privacy / Data Use considerations
29% Accuracy considerations
For the average American surveyed,
intent to install COVID19 app depends on:
11% Battery life considerations
16% Mobile data use considerations
14% App benefits considerations
29% Privacy / Data Use considerations
29% Accuracy considerations
Importance (out of 1)
Density
Battery life
Benefits
Mobile Data Use
Privacy/Data Use
Accuracy
Work in collaboration with Dana Turjeman (Univ. Michigan).
No: Incentives change what people will adopt
but not how many will adopt
11% Battery life
10%* Mobile data
26%* Health care benefits
27% Privacy / Data Use
26% Accuracy
13%* Battery life
10%* Mobile data
28%* Monetary benefit
25% Privacy / Data Use
25% Accuracy
34. These results are being used directly in the marketing of
COVID19 apps in Israel, Louisiana & other jurisdictions
Survey
Results
Experimentation
Measurement
Advertising field studies to improve
COVID19 app adoption
35. Responsible data use goes beyond privacy,
to provide tech that respects user preferences
Questions? Elissa M. Redmiles | eredmiles@gmail.com | @eredmil1
Editor's Notes
Expert says: these are the security requirements you need to observe
These are the features that are fair to include in this classifier
This is the data you’re allowed to use in advertising
Prior work in security showed significant disagreement between experts about the best behaviors, and over 50% disagreement between users and experts
Yet, experts disagree on what security advice to do themselves, let alone to recommend (2015 paper)
Massive controversy over classifiers suggests that expert views do not always match those of the general population
And etc.
Ian Lundberg, Arvind Narayanan, Karen Levy, Matthew J. Salganik
Prior work in security showed significant disagreement between experts about the best behaviors, and over 50% disagreement between users and experts
If we’re going to use these tools,
Contextual integrity
Trust in a particular provider significantly related to willingness to install from that provider