SlideShare a Scribd company logo
SEE IT, SHAKE IT, SET IT
privacy awareness and control for mobile applications

                 Arosha K. Bandara
              The Open University, UK

                  Mobile East Conference
                        June 2012
RESEARCH CONTEXT
•   EPSRC Funded PRiMMA Project:
    Privacy Rights Management for Mobile Applications

•   Collaboration between
    The Open University and Imperial College London

•   Contributions include methodologies for understanding privacy
    requirements, machine learning techniques, architectures for
    privacy aware social networks and design of real-time feedback
    mechanisms for privacy awareness and control.


                                           http://primma.open.ac.uk
RESEARCH TEAM

• Bashar  Nuseibeh      • Morris Sloman
• Yvonne Rogers         • Alessandra Russo
• Clara Mancini         • Emil Lupu
• Arosha K. Bandara     • Naranker Dulay
• Blaine Price          • Domenico Corapi
• Lukasz Jedrejcyzk     • Ryan Wishart
• Keerthi Thomas


• Adam     Joinson
PRIVACY THEORY
•   Bi-directionality (Altmann)                          Status
                                                         Update
    •   Output: sharing information      Location

        with others

    •   Input: sensing activity of
        others, previous experience,
        etc.                                         2
                                                     1


                                       Photographs
PRIVACY THEORY
•   Social translucence
    (Erickson and Kellog)

    •   Visibility

    •   Awareness

    •   Accountability

•   Enforces social norms.
RESEARCH CHALLENGES

         •   Understand people, their
             behaviour and requirements.
RESEARCH CHALLENGES

         •   Understand people, their
             behaviour and requirements.

         •   Translate this understanding
             into solutions.
RESEARCH CHALLENGES

         •   Understand people, their
             behaviour and requirements.

         •   Translate this understanding
             into solutions.

         •   Evaluate solutions ‘in the wild’
UNDERSTANDING PEOPLE                        !"#$%&'($)*+",#-'./$"01




•   Investigating mobile privacy is
    difficult because ...

    ... privacy is sensitive and
    depends on socio-cultural
    context.

    ... mobility introduces
    contextual shifts and logistical
    obstacles.

                                       !"##$%&'()*%+,-$".'$%'/)($0"'%"#1)-2$%&
UNDERSTANDING PEOPLE

•   It is also difficult ...

    ... for people to articulate
    subtle concerns and
    preferences.

    ... for researchers to observe
    contextualised behaviour.
EXPERIENCE SAMPLING ++
•   We address these challenges
    by combining a variety of
    complementary, indirect
    methods:

      •   Experience sampling
          enhanced with memory
          phrase.

      •   Individual, in-depth
          deferred contextual
          interviews.
EXPERIENCE SAMPLING ++
•   We address these challenges
    by combining a variety of
    complementary, indirect
    methods:

      •   Experience sampling
          enhanced with memory
          phrase.

      •   Individual, in-depth
          deferred contextual
          interviews.
BUDDY TRACKER
               1. Location      Contextual
                     Updates
                                                         Real-time
              Learning
Alice          Engine
                                             3. Notification
        2. Location Request


                                1.
                               Location
                                   Updates


                                                              Bob
FEEDBACK MODES
FEEDBACK MODES
FEEDBACK MODES
SEE IT: REAL-TIME FEEDBACK
•   Study 1

    •   Two families with mixture of     Week 1         Week 2
        relationships.                    58%            24%

    •   Conducted over 3 weeks, with
        simple real-time feedback                 Week 3
        introduced in final week.                   18%

    •   Quantitative data from server
        logs and qualitative data from
        ESM and post-study                  Location Request
        interviews.                            Frequency
SEE IT: REAL-TIME FEEDBACK
•   Study 2
                                                            Phase 2
    •   3 week study with 15                                   7
        participants.

    •   Context-aware real-time          Phase 1
        feedback with machine              42
        learning in final week.

    •   Quantitative data from server
        logs and qualitative data from
        ESM and post-study                        Frequency of
        interviews.                       ‘intrusive’ feedback events
SEE IT: REAL-TIME FEEDBACK
Study 2 - Feedback Accuracy
                                                Phase 1    Phase 2


                                                                     100


                                                                     75




                                                                           % Accuracy
                                                                    50

   U7 U8
         U9 U12                                                  25
                U14 U20
                        U21 U22
                                  U23 U24
                                          U25 U30               0
                        Participant ID            U31 U32
                                                          U33
SHAKE IT: HAPTIC CONTROL
PRIVACY-SHAKE
   1. Initialise - vertical shake

   2. Phone indicates ‘ready’

   3. Set privacy - horizontal movement

       - Away → Relaxed privacy settings

       - Closer → Strict privacy settings
   4. Privacy settings updated.
PRIVACY-SHAKE
 Study 3 - User evaluation
Experience    Strongly                                Strongly
                         Disagree   Neutral   Agree
is ...        Disagree                                 Agree
Enjoyable        0          2         2         7        5
Engaging         0          1         4         6        5
Pleasurable      0          2         5         5        4
Exciting         1          1         6         3        5
Fun              0          2         1         5        8
Boring           9          3         2         0        2
Frustrating      2          3         5         6        0
Annoying         2          5         5         3        1
PRIVACY-SHAKE
Study 3 - User evaluation

                                           Male       Female
                                                                   100


                                                                75




                                                                         % Success
                                                               50

                                                               25

 Initialise                                                    0
               Increase Privacy
                                     Reduce Privacy
              Privacy control task
SEE IT, SHAKE IT, SET IT

• Context-aware   real-time feedback supports bi-directionality
 and social translucence in location sharing applications.

• Machine learning techniques make awareness less intrusive,
 leading to greater acceptance of technology.

• Intuitive   control mechanisms can be used for privacy control
 actions.

• Further work is required to investigate alternative privacy
 control interactions - e.g., multi-touch gestures.
SEE IT, SHAKE IT, SET IT
privacy awareness and control for mobile applications

                 Arosha K. Bandara
              The Open University, UK
          a.k.bandara@open.ac.uk - @arosha
               http://primma.open.ac.uk

More Related Content

Viewers also liked

Code Club Assembly Presentation
Code Club Assembly PresentationCode Club Assembly Presentation
Code Club Assembly PresentationArosha Bandara
 
Semantische Technologien (nicht nur) für die verbesserte Suche in SharePoint
Semantische Technologien (nicht nur) für die verbesserte Suche in SharePointSemantische Technologien (nicht nur) für die verbesserte Suche in SharePoint
Semantische Technologien (nicht nur) für die verbesserte Suche in SharePointDIQA Projektmanagement GmbH
 
SMW User Conference 2014: Monuments Database for Kanton Zürich / Kanton Züric...
SMW User Conference 2014: Monuments Database for Kanton Zürich / Kanton Züric...SMW User Conference 2014: Monuments Database for Kanton Zürich / Kanton Züric...
SMW User Conference 2014: Monuments Database for Kanton Zürich / Kanton Züric...DIQA Projektmanagement GmbH
 
Privacy Dynamics: Learning Privacy Norms for Social Software
Privacy Dynamics: Learning Privacy Norms for Social SoftwarePrivacy Dynamics: Learning Privacy Norms for Social Software
Privacy Dynamics: Learning Privacy Norms for Social SoftwareArosha Bandara
 

Viewers also liked (8)

power point!
power point!power point!
power point!
 
Code Club Assembly Presentation
Code Club Assembly PresentationCode Club Assembly Presentation
Code Club Assembly Presentation
 
Semantische Technologien (nicht nur) für die verbesserte Suche in SharePoint
Semantische Technologien (nicht nur) für die verbesserte Suche in SharePointSemantische Technologien (nicht nur) für die verbesserte Suche in SharePoint
Semantische Technologien (nicht nur) für die verbesserte Suche in SharePoint
 
Knowlede Management with SMW and SharePoint
Knowlede Management with SMW and SharePointKnowlede Management with SMW and SharePoint
Knowlede Management with SMW and SharePoint
 
SMW User Conference 2014: Monuments Database for Kanton Zürich / Kanton Züric...
SMW User Conference 2014: Monuments Database for Kanton Zürich / Kanton Züric...SMW User Conference 2014: Monuments Database for Kanton Zürich / Kanton Züric...
SMW User Conference 2014: Monuments Database for Kanton Zürich / Kanton Züric...
 
Grasp 1.6 terminology management features
Grasp 1.6 terminology management featuresGrasp 1.6 terminology management features
Grasp 1.6 terminology management features
 
Privacy Dynamics: Learning Privacy Norms for Social Software
Privacy Dynamics: Learning Privacy Norms for Social SoftwarePrivacy Dynamics: Learning Privacy Norms for Social Software
Privacy Dynamics: Learning Privacy Norms for Social Software
 
DataWiki Semantic Enterprise Wiki v1.7.1
DataWiki Semantic Enterprise Wiki v1.7.1DataWiki Semantic Enterprise Wiki v1.7.1
DataWiki Semantic Enterprise Wiki v1.7.1
 

Similar to See it, shake it, set it

Identification and evaluation of the cousellors function in the UOC's 'Master...
Identification and evaluation of the cousellors function in the UOC's 'Master...Identification and evaluation of the cousellors function in the UOC's 'Master...
Identification and evaluation of the cousellors function in the UOC's 'Master...Francesc Llorens Cerdà
 
Do Screencasts Really Work? Assessing Student Learning through Instructional ...
Do Screencasts Really Work? Assessing Student Learning through Instructional ...Do Screencasts Really Work? Assessing Student Learning through Instructional ...
Do Screencasts Really Work? Assessing Student Learning through Instructional ...juliepia
 
Hpai class 16 - learning - 041320
Hpai   class 16 - learning - 041320Hpai   class 16 - learning - 041320
Hpai class 16 - learning - 041320melendez321
 
18th october chep df slides undergraduate dissertation supervision
18th october chep df slides undergraduate dissertation supervision18th october chep df slides undergraduate dissertation supervision
18th october chep df slides undergraduate dissertation supervisioncampone
 
17 june 29 Attention and consciousness @ University of Sydney
17 june 29 Attention and consciousness @ University of Sydney17 june 29 Attention and consciousness @ University of Sydney
17 june 29 Attention and consciousness @ University of SydneyNao (Naotsugu) Tsuchiya
 
Redefining Projects For an Age of Complexity
Redefining Projects For an Age of ComplexityRedefining Projects For an Age of Complexity
Redefining Projects For an Age of ComplexityJovan Vidić
 
A case study on experiential learning in NUS Second Life
A case study on experiential learning in NUS Second LifeA case study on experiential learning in NUS Second Life
A case study on experiential learning in NUS Second LifeCIT, NUS
 
Psbe2 08 research methods 2011-2012 - week 4
Psbe2 08 research methods 2011-2012 - week 4Psbe2 08 research methods 2011-2012 - week 4
Psbe2 08 research methods 2011-2012 - week 4Vlady Fckfb
 
Psbe2 08 research methods 2011-2012 - week 4
Psbe2 08 research methods 2011-2012 - week 4Psbe2 08 research methods 2011-2012 - week 4
Psbe2 08 research methods 2011-2012 - week 4Vlady Fckfb
 
Crowdsourcing for HCI Research with Amazon Mechanical Turk
Crowdsourcing for HCI Research with Amazon Mechanical TurkCrowdsourcing for HCI Research with Amazon Mechanical Turk
Crowdsourcing for HCI Research with Amazon Mechanical TurkEd Chi
 
Using Public Social Media to Find Answers to Questions
Using Public Social Media to Find Answers to QuestionsUsing Public Social Media to Find Answers to Questions
Using Public Social Media to Find Answers to QuestionsJeffrey Nichols
 
Webquest
WebquestWebquest
Webquesttrevas
 
Budget Usability without a Usability Budget
Budget Usability without a Usability BudgetBudget Usability without a Usability Budget
Budget Usability without a Usability Budgetjuliepia
 
Effect of Self-animated Avatars in Virtual Environments
Effect of Self-animated Avatars in Virtual EnvironmentsEffect of Self-animated Avatars in Virtual Environments
Effect of Self-animated Avatars in Virtual Environmentsmukundraj2
 
Eiji_UseYourIllusion.ppt
Eiji_UseYourIllusion.pptEiji_UseYourIllusion.ppt
Eiji_UseYourIllusion.pptChandru741153
 
Crowdsourcing using MTurk for HCI research
Crowdsourcing using MTurk for HCI researchCrowdsourcing using MTurk for HCI research
Crowdsourcing using MTurk for HCI researchEd Chi
 
Ch 5 Object Recognition.pptx
Ch 5 Object Recognition.pptxCh 5 Object Recognition.pptx
Ch 5 Object Recognition.pptxLarry195181
 

Similar to See it, shake it, set it (20)

Identification and evaluation of the cousellors function in the UOC's 'Master...
Identification and evaluation of the cousellors function in the UOC's 'Master...Identification and evaluation of the cousellors function in the UOC's 'Master...
Identification and evaluation of the cousellors function in the UOC's 'Master...
 
Do Screencasts Really Work? Assessing Student Learning through Instructional ...
Do Screencasts Really Work? Assessing Student Learning through Instructional ...Do Screencasts Really Work? Assessing Student Learning through Instructional ...
Do Screencasts Really Work? Assessing Student Learning through Instructional ...
 
Hpai class 16 - learning - 041320
Hpai   class 16 - learning - 041320Hpai   class 16 - learning - 041320
Hpai class 16 - learning - 041320
 
18th october chep df slides undergraduate dissertation supervision
18th october chep df slides undergraduate dissertation supervision18th october chep df slides undergraduate dissertation supervision
18th october chep df slides undergraduate dissertation supervision
 
17 june 29 Attention and consciousness @ University of Sydney
17 june 29 Attention and consciousness @ University of Sydney17 june 29 Attention and consciousness @ University of Sydney
17 june 29 Attention and consciousness @ University of Sydney
 
Radhika Thesis
Radhika ThesisRadhika Thesis
Radhika Thesis
 
Redefining Projects For an Age of Complexity
Redefining Projects For an Age of ComplexityRedefining Projects For an Age of Complexity
Redefining Projects For an Age of Complexity
 
A case study on experiential learning in NUS Second Life
A case study on experiential learning in NUS Second LifeA case study on experiential learning in NUS Second Life
A case study on experiential learning in NUS Second Life
 
Psbe2 08 research methods 2011-2012 - week 4
Psbe2 08 research methods 2011-2012 - week 4Psbe2 08 research methods 2011-2012 - week 4
Psbe2 08 research methods 2011-2012 - week 4
 
Psbe2 08 research methods 2011-2012 - week 4
Psbe2 08 research methods 2011-2012 - week 4Psbe2 08 research methods 2011-2012 - week 4
Psbe2 08 research methods 2011-2012 - week 4
 
Crowdsourcing for HCI Research with Amazon Mechanical Turk
Crowdsourcing for HCI Research with Amazon Mechanical TurkCrowdsourcing for HCI Research with Amazon Mechanical Turk
Crowdsourcing for HCI Research with Amazon Mechanical Turk
 
Using Public Social Media to Find Answers to Questions
Using Public Social Media to Find Answers to QuestionsUsing Public Social Media to Find Answers to Questions
Using Public Social Media to Find Answers to Questions
 
Webquest
WebquestWebquest
Webquest
 
Promising avenues for interdisciplinary research in vision
Promising avenues for interdisciplinary research in visionPromising avenues for interdisciplinary research in vision
Promising avenues for interdisciplinary research in vision
 
Smart sensors, Smart Blind Glasses
Smart sensors, Smart Blind GlassesSmart sensors, Smart Blind Glasses
Smart sensors, Smart Blind Glasses
 
Budget Usability without a Usability Budget
Budget Usability without a Usability BudgetBudget Usability without a Usability Budget
Budget Usability without a Usability Budget
 
Effect of Self-animated Avatars in Virtual Environments
Effect of Self-animated Avatars in Virtual EnvironmentsEffect of Self-animated Avatars in Virtual Environments
Effect of Self-animated Avatars in Virtual Environments
 
Eiji_UseYourIllusion.ppt
Eiji_UseYourIllusion.pptEiji_UseYourIllusion.ppt
Eiji_UseYourIllusion.ppt
 
Crowdsourcing using MTurk for HCI research
Crowdsourcing using MTurk for HCI researchCrowdsourcing using MTurk for HCI research
Crowdsourcing using MTurk for HCI research
 
Ch 5 Object Recognition.pptx
Ch 5 Object Recognition.pptxCh 5 Object Recognition.pptx
Ch 5 Object Recognition.pptx
 

See it, shake it, set it

  • 1. SEE IT, SHAKE IT, SET IT privacy awareness and control for mobile applications Arosha K. Bandara The Open University, UK Mobile East Conference June 2012
  • 2. RESEARCH CONTEXT • EPSRC Funded PRiMMA Project: Privacy Rights Management for Mobile Applications • Collaboration between The Open University and Imperial College London • Contributions include methodologies for understanding privacy requirements, machine learning techniques, architectures for privacy aware social networks and design of real-time feedback mechanisms for privacy awareness and control. http://primma.open.ac.uk
  • 3. RESEARCH TEAM • Bashar Nuseibeh • Morris Sloman • Yvonne Rogers • Alessandra Russo • Clara Mancini • Emil Lupu • Arosha K. Bandara • Naranker Dulay • Blaine Price • Domenico Corapi • Lukasz Jedrejcyzk • Ryan Wishart • Keerthi Thomas • Adam Joinson
  • 4. PRIVACY THEORY • Bi-directionality (Altmann) Status Update • Output: sharing information Location with others • Input: sensing activity of others, previous experience, etc. 2 1 Photographs
  • 5. PRIVACY THEORY • Social translucence (Erickson and Kellog) • Visibility • Awareness • Accountability • Enforces social norms.
  • 6. RESEARCH CHALLENGES • Understand people, their behaviour and requirements.
  • 7. RESEARCH CHALLENGES • Understand people, their behaviour and requirements. • Translate this understanding into solutions.
  • 8. RESEARCH CHALLENGES • Understand people, their behaviour and requirements. • Translate this understanding into solutions. • Evaluate solutions ‘in the wild’
  • 9. UNDERSTANDING PEOPLE !"#$%&'($)*+",#-'./$"01 • Investigating mobile privacy is difficult because ... ... privacy is sensitive and depends on socio-cultural context. ... mobility introduces contextual shifts and logistical obstacles. !"##$%&'()*%+,-$".'$%'/)($0"'%"#1)-2$%&
  • 10. UNDERSTANDING PEOPLE • It is also difficult ... ... for people to articulate subtle concerns and preferences. ... for researchers to observe contextualised behaviour.
  • 11. EXPERIENCE SAMPLING ++ • We address these challenges by combining a variety of complementary, indirect methods: • Experience sampling enhanced with memory phrase. • Individual, in-depth deferred contextual interviews.
  • 12. EXPERIENCE SAMPLING ++ • We address these challenges by combining a variety of complementary, indirect methods: • Experience sampling enhanced with memory phrase. • Individual, in-depth deferred contextual interviews.
  • 13. BUDDY TRACKER 1. Location Contextual Updates Real-time Learning Alice Engine 3. Notification 2. Location Request 1. Location Updates Bob
  • 17. SEE IT: REAL-TIME FEEDBACK • Study 1 • Two families with mixture of Week 1 Week 2 relationships. 58% 24% • Conducted over 3 weeks, with simple real-time feedback Week 3 introduced in final week. 18% • Quantitative data from server logs and qualitative data from ESM and post-study Location Request interviews. Frequency
  • 18. SEE IT: REAL-TIME FEEDBACK • Study 2 Phase 2 • 3 week study with 15 7 participants. • Context-aware real-time Phase 1 feedback with machine 42 learning in final week. • Quantitative data from server logs and qualitative data from ESM and post-study Frequency of interviews. ‘intrusive’ feedback events
  • 19. SEE IT: REAL-TIME FEEDBACK Study 2 - Feedback Accuracy Phase 1 Phase 2 100 75 % Accuracy 50 U7 U8 U9 U12 25 U14 U20 U21 U22 U23 U24 U25 U30 0 Participant ID U31 U32 U33
  • 20. SHAKE IT: HAPTIC CONTROL
  • 21. PRIVACY-SHAKE 1. Initialise - vertical shake 2. Phone indicates ‘ready’ 3. Set privacy - horizontal movement - Away → Relaxed privacy settings - Closer → Strict privacy settings 4. Privacy settings updated.
  • 22. PRIVACY-SHAKE Study 3 - User evaluation Experience Strongly Strongly Disagree Neutral Agree is ... Disagree Agree Enjoyable 0 2 2 7 5 Engaging 0 1 4 6 5 Pleasurable 0 2 5 5 4 Exciting 1 1 6 3 5 Fun 0 2 1 5 8 Boring 9 3 2 0 2 Frustrating 2 3 5 6 0 Annoying 2 5 5 3 1
  • 23. PRIVACY-SHAKE Study 3 - User evaluation Male Female 100 75 % Success 50 25 Initialise 0 Increase Privacy Reduce Privacy Privacy control task
  • 24. SEE IT, SHAKE IT, SET IT • Context-aware real-time feedback supports bi-directionality and social translucence in location sharing applications. • Machine learning techniques make awareness less intrusive, leading to greater acceptance of technology. • Intuitive control mechanisms can be used for privacy control actions. • Further work is required to investigate alternative privacy control interactions - e.g., multi-touch gestures.
  • 25. SEE IT, SHAKE IT, SET IT privacy awareness and control for mobile applications Arosha K. Bandara The Open University, UK a.k.bandara@open.ac.uk - @arosha http://primma.open.ac.uk