SlideShare a Scribd company logo
USABLE	PRIVACY	
VIVIAN	GENARO	MOTTI	
ASSISTANT	PROFESSOR	
INFORMATION	SCIENCES	AND	TECHNOLOGY	
VOLGENAU	SCHOOL	OF	ENGINEERING	
GEORGE	MASON	UNIVERSITY	
Washington	DC,	March	14th,	2019
Wearables	
Privacy	
Visual	
Privacy	
Smart	
Home	
Devices
OUTLINE	
•  Contextualization	
•  Theoretical	definitions	vs.	privacy	in	practice	
•  Privacy	studies	
•  Online	reviews	
•  Wearables	and	Smart	Home	Technologies	
•  Imagery	Analysis	
•  Visual	Privacy	
•  Open	questions
WHAT	IS	PRIVACY?
Differential	
privacy	
Privacy	by	
design	
Engineered	
privacy	
Contextual	
privacy	
Privacy
PRIVACY	IN	PRACTICE
PRIVACY	IN	PRACTICE
MULTIDISCIPLINARY	
No	consensual	definition	or	one-size-fits-all	solutions	
	
Privacy	…	
Personal	
Cultural	
Legal	
Technical	
Contextual	
…
MULTIDIMENSIONAL	
•  Context	sensitive	and	domain	specific	
•  varying	across	culture,	age,	generation,	domain	
•  Cutting	across	multiple	levels	
•  data,	information,	device,	system,	services,	network,	
application	
•  Span	across	temporal	aspects	
•  Life-cycle	from	data	collection,	transmission,	storage	
to	sharing	
•  Several	trade-offs	involved	
•  costs	vs.	benefits
MULTIDIMENSIONAL	
Ecosystem	
Network	
Application	&	System	
Data	&	Information
EXISTING	SOLUTIONS	
Terms	and	
Conditions	
Policies	
Settings	
Non-
Disclosure	
Agreements
INEFFECTIVE	
Technical	
Long	
Complex	
Not	user-
centric
OPEN	QUESTIONS	
What	are	actual	users’	concerns?	
How	aware	are	users	about	privacy?	
How	users’	consider	privacy	in	practice?	
What	measures	do	they	take?	
What	actions	should	they	take?	
What	are	the	mismatches	among	stakeholders?	
How	can	we	facilitate	adoption?
USER-CENTERED	DESIGN	
Understanding	Users’	Perspectives	
•  Characterizing	users’	mental	models	and	awareness	of	
concerns	through	online	reviews,	questionnaires	
Prototyping	
•  Framework,	Design,	Models	
User	Studies	
•  Participatory	design	
•  Usability	tests	
Field	Study	
•  Deployment	in	the	wild
1.	ONLINE	REVIEWS	
•  Wearables	and	Smart	Home	Devices	
•  Major	Findings	
•  ‘I	have	never	thought	about	it…’	
•  Oblivious	users	
•  ‘Pick	your	poison’	
•  Deliberate	choices	
•  ‘I	am	[my	data	is]	not	important’	
•  Unconcerned	users
WEARABLES	
Right	to	forget	
•  ‘it	gives	a	record	of	everything	you’ve	done,	day	in	and	
day	out,	possibly	even	some	things	you	don’t	want	to	be	
reminded	of’	
Location	disclosure	
•  ‘...	stalkers	know	where	you	are	at	all	times	of	the	day,	
know	when	you	go	to	sleep,	riding	a	car,	or	climbing	a	
mountain’
WEARABLES	
Discreet	Display	
•  ‘the	second	screen	will	act	as	sort	of	a	privacy	screen,	
keeping	folks	from	reading	your	texts	by	glancing	at	your	
wrist’	
Surreptitious	Audio	and	Video	Recording	
•  ‘Social	norms	already	frown	on	making	surreptitious	
audio	recordings	(though	it	isn't	illegal,	it	is	done	only	
infrequently	and	with	an	air	of	"secret	agency"	about	it);	
video	is	much	more	of	an	intrusion.’
WEARABLES	
Fear	of	Surveillance	
•  ‘[wearable	devices	are]	the	NSA's	new	best	friend’	
Fear	of	Sousveillence	
•  ‘There's	also	another	challenge	that	affects	not	only	
those	who	wear	Glass,	but	everyone	else	around	privacy’
Social	Implications	
Criminal	Abuse	
Facial	Recognition*	
Access	Control	
Social	Media	Sync	
	
Right	to	Forget	
Users’	Fear	
Speech	Disclosure*	
Surreptitious	A/V	Recording*	
Location	Disclosure	
Device	and	Application	Specific	
Sensor	
Specific	
Data	
Specific	
Discrete		
Display		
and	Visual		
Occlusion
2.	VISUAL	PRIVACY	
•  Imagery	analysis
USERS’	MENTAL	MODELS	
On	Privacy	Imagery
Who	
People,	institutions,	
organizations	
How	
Objects,	actions,	behaviors	
Why	
Goals,	feelings,	emotions	
Where	
Locations,	places	
Themes
TAXONOMY	
Action	 Analyzing,	Authenticating,	Blindfolding,	Blocking,	Blurring,	
Covering,	Connecting,	Closing,	Dimming,	Disclosing,	Erasing,	
Forwarding,	Hiding,	Localizing,	Locking	/	Unlocking,	Looking,	
Observing	/	being	observed,	Packing,	Protecting,	Protesting,	
Revealing,	Sharing,	Shredding,	Spying,	Surveilling,	
Synchronizing,	Uploading,	Uncovering	
Object	 Blockers	
Controls	
Sensors	
Storage	
Blinders,	Curtains,	Diary,	Door,	Fence,	Gate	Key,	Message,	
Padlock,	Wall,	Windows	Semaphore	
Camera,	Camcorder,	Microphone	
Memory	Card,	Cloud	
Organization	 Regulatory	
Social	Media	
&	I.T.	
NSA,	HIPPAA	
Ashley	Madison,	Bitcoin,	Facebook,	Google+,	Instagram,	
Pinterest,	RSS,	Twitter,	Whatsapp	
People	 Role	
Public	Persons	
Circle	
Politicians,	Legislators	
Edward	Snowden,	George	Orwell	
Group,	Individual	
Concept	 Betrayal,	Confidentiality,	Creepiness,	Exclusivity,	Concepts	
Fear,	Intimacy,	Isolation,	Loneliness,	Public	vs.	
Private,	Safety,	Secrecy,	Shame
PRIVACY	ACTIONS	
	
	
	
	
	
	
	
shredding	
	
	
	
	
	
	
	
	
	
	
	
	
hiding	
	
	
	
	
	
	
	
spying
microphone	
OBJECTS	
	
	
	
	
	
	
	
	
cameras	
	
	
	
	
	
	
	
door	
	
	
	
	
	
	
	
padlock
ORGANIZATIONS	
	
	
	
	
	
	
	
	
NSA	
	
	
	
	
	
	
	
	
Social	Media
PEOPLE	
	
	
	
	
	
	
	
	
Snowden	
	
	
	
	
	
	
	
	
Hillary
CONCEPTS	
	
	
	
	
	
	
	
	
Solitude	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
Isolation
FREQUENCY	OF	CODES	
Actions	and	objects	were	the	most	frequent	
•  n=73	and	n=39	
UI	designers	focus	mainly	on	actions	
•  Privicons,	Material	icons,	Mozilla	icons	
Variability	
•  Instagram	was	the	most	diverse	source	in	terms	of	codes	
All	codes	were	used		
•  Real	world	actions	
•  Physical	objects	
•  Privacy	mechanisms
PRIVACY	REQUIREMENTS	
Data-driven,	temporal	perspective		
Data	collection	
Data	transmission	
Data	storage	
Data	sharing	(access	control)
PRIVACY	METAPHORS
OPEN	QUESTIONS	
How	to	train	users	so	that	they	become	more	aware?	
How	to	support	designers	and	developers?	
What	are	the	necessary	tools,	guidelines,	principles,	etc.?	
How	to	simplify	privacy	to	make	it	accessible	and	effective	
for	users	regardless	of	their	profile?	
How	to	devise	privacy	controls?	
…
FUTURE	DIRECTIONS	
•  Quantifiable	privacy	
•  Users’	concerns	and	nudging	
•  Visual	vocabulary	
•  Simplified	language	based	on	mental	models	
•  Privacy	framework	
•  Meta	definition	
•  Personalized	privacy	
•  Universal	models	vs.	individualized	needs
FINAL	REMARKS	
Privacy	is	a	multidisciplinary	concept	
•  Important	but	also	challenging	to	address	with	a	
universal	solution	
	
User-centric	approach	can	help	to	understand	users’	
mental	models	and	aid	to	create	privacy	solutions	that	are	
easier	to	use	
• By	matching	familiar	and	real-world	concepts	with	UI	
design	elements
ACKNOWLEDGMENT	
This	material	is	based	upon	work	supported	by	the	National	Science	
Foundation	 under	 Grant	 No.	 1314342.	 Any	 opinions,	 findings,	 and	
conclusions	or	recommendations	expressed	in	this	material	are	those	
of	 the	 author(s)	 and	 do	 not	 necessarily	 reflect	 the	 views	 of	 the	
National	Science	Foundation.
REFERENCES	
•  CHHETRI,	C.;	MOTTI,	V.	G.	(2019).	Eliciting	Privacy	Concerns	for	Smart	Home	
Devices	from	a	User	Centered	Perspective.	In	Proceedings	of	the	iConference	
2019.	Lecture	Notes	in	Computer	Science.	Springer-Verlag.		
•  LOWENS,	B.;	MOTTI,	V.	G.;	CAINE,	K.	(2017)	Wearable	Privacy:	Skeletons	in	The	
Data	Closet.	In	Proceedings	of	the	IEEE	International	Conference	on	Healthcare	
Informatics.	DOI	10.1109/ICHI.2017.29	[PDF]	[Slides]	
•  MOTTI,	V.	G.	&	CAINE,	K.	E.	(2016).	Towards	a	Visual	Vocabulary	for	Privacy	
Concepts.	In	Proceedings	of	the	Human	Factors	and	Ergonomics	Society	2016	
Annual	Meeting.	Washington	DC,	USA:	Human	Factors	and	Ergonomics	Society.	
September	2016		
•  MOTTI,	V.	G.;	CAINE,	K.	E.	(2015).	Users'	Privacy	Concerns	About	Wearables:	
Impact	of	Form	Factor,	Sensors	and	Type	of	Data	Collected.	In	Proceedings	of	
the	Financial	Cryptography	and	Data	Security	(1st	Workshop	on	Wearable	
Security	and	Privacy).	Lecture	Notes	in	Computer	Science.	Springer-Verlag	
Berlin	Heidelberg,	Vol	8976,	pp.	1-14.	DOI=10.1007/978-3-662-48051-9_16
Q+A	
vmotti@gmu.edu

More Related Content

What's hot

Overview of ICT for Development (ICT4D)
Overview of  ICT for Development (ICT4D)Overview of  ICT for Development (ICT4D)
Overview of ICT for Development (ICT4D)
Deo Shao
 
Fia presentatie
Fia presentatieFia presentatie
Fia presentatie
ictseserv
 
Social Impact of Information Technology
Social Impact of Information TechnologySocial Impact of Information Technology
Social Impact of Information Technology
Sanjeev Gupta
 
ICS2208 Lecture2
ICS2208 Lecture2ICS2208 Lecture2
ICS2208 Lecture2
Vanessa Camilleri
 
ICS2208 Lecture 5
ICS2208 Lecture 5ICS2208 Lecture 5
ICS2208 Lecture 5
Vanessa Camilleri
 
Putting the horse in front of the cart: A strategic approach to designing IC...
Putting the horse in front of the cart:  A strategic approach to designing IC...Putting the horse in front of the cart:  A strategic approach to designing IC...
Putting the horse in front of the cart: A strategic approach to designing IC...
Technical Centre for Agricultural and Rural Cooperation ACP-EU (CTA)
 
Nsta2012
Nsta2012Nsta2012
Nsta2012
Bridget Miller
 
Nsta2012
Nsta2012Nsta2012
Nsta2012
bmiller6
 
Building an Effective School BYOD Plan
Building an Effective School BYOD PlanBuilding an Effective School BYOD Plan
Building an Effective School BYOD Plan
Sam Gliksman
 
Information communication technology & cyber law presentation
Information communication technology & cyber law presentationInformation communication technology & cyber law presentation
Information communication technology & cyber law presentation
Being Aabis
 
Impact Of IT on Society.
Impact Of IT on Society.Impact Of IT on Society.
Impact Of IT on Society.
Monica Khatri
 
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-ThingsThe social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
Anax Fotopoulos
 
Societal impacts of it
Societal impacts of itSocietal impacts of it
Societal impacts of it
Samrat Sikri
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technology
Aditya
 
Internet of things
Internet of thingsInternet of things
Internet of things
sk csa
 
1 ICT in Society
1 ICT in Society1 ICT in Society
1 ICT in Society
Cik Na Shohaili
 
Jennifer Reader Presentation 504
Jennifer Reader Presentation 504Jennifer Reader Presentation 504
Jennifer Reader Presentation 504
jkdwb
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technology
Being Aabis
 
ICT General Capability ACSA 1 Nov 2012
ICT General Capability ACSA 1 Nov 2012ICT General Capability ACSA 1 Nov 2012
ICT General Capability ACSA 1 Nov 2012
Trudy Sweeney
 
Universal usability
Universal usabilityUniversal usability
Universal usability
ChitraR23
 

What's hot (20)

Overview of ICT for Development (ICT4D)
Overview of  ICT for Development (ICT4D)Overview of  ICT for Development (ICT4D)
Overview of ICT for Development (ICT4D)
 
Fia presentatie
Fia presentatieFia presentatie
Fia presentatie
 
Social Impact of Information Technology
Social Impact of Information TechnologySocial Impact of Information Technology
Social Impact of Information Technology
 
ICS2208 Lecture2
ICS2208 Lecture2ICS2208 Lecture2
ICS2208 Lecture2
 
ICS2208 Lecture 5
ICS2208 Lecture 5ICS2208 Lecture 5
ICS2208 Lecture 5
 
Putting the horse in front of the cart: A strategic approach to designing IC...
Putting the horse in front of the cart:  A strategic approach to designing IC...Putting the horse in front of the cart:  A strategic approach to designing IC...
Putting the horse in front of the cart: A strategic approach to designing IC...
 
Nsta2012
Nsta2012Nsta2012
Nsta2012
 
Nsta2012
Nsta2012Nsta2012
Nsta2012
 
Building an Effective School BYOD Plan
Building an Effective School BYOD PlanBuilding an Effective School BYOD Plan
Building an Effective School BYOD Plan
 
Information communication technology & cyber law presentation
Information communication technology & cyber law presentationInformation communication technology & cyber law presentation
Information communication technology & cyber law presentation
 
Impact Of IT on Society.
Impact Of IT on Society.Impact Of IT on Society.
Impact Of IT on Society.
 
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-ThingsThe social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
 
Societal impacts of it
Societal impacts of itSocietal impacts of it
Societal impacts of it
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technology
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
1 ICT in Society
1 ICT in Society1 ICT in Society
1 ICT in Society
 
Jennifer Reader Presentation 504
Jennifer Reader Presentation 504Jennifer Reader Presentation 504
Jennifer Reader Presentation 504
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technology
 
ICT General Capability ACSA 1 Nov 2012
ICT General Capability ACSA 1 Nov 2012ICT General Capability ACSA 1 Nov 2012
ICT General Capability ACSA 1 Nov 2012
 
Universal usability
Universal usabilityUniversal usability
Universal usability
 

Similar to Usable Privacy

A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
Micah Altman
 
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
Internetwork Engineering (IE)
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
robkitchin
 
Sharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSRSharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSR
ARDC
 
MBA621 Emerging Technologies
MBA621 Emerging TechnologiesMBA621 Emerging Technologies
MBA621 Emerging Technologies
cvanslyke
 
BYOD in e-Learning - Some Considerations
BYOD in e-Learning - Some ConsiderationsBYOD in e-Learning - Some Considerations
BYOD in e-Learning - Some Considerations
eLearning Consortium 電子學習聯盟
 
Cloud computing slideshare
Cloud computing slideshareCloud computing slideshare
Cloud computing slideshare
Alberta Education
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
blogzilla
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Internetwork Engineering (IE)
 
Ten trends 2011
Ten trends 2011Ten trends 2011
Ten trends 2011
Derek Wenmoth
 
My Interests and Projects
My Interests and ProjectsMy Interests and Projects
My Interests and Projects
Roger Stack
 
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
i_scienceEU
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
Malinka Ivanova
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
Gabriela Grosseck
 
Reality Check
Reality CheckReality Check
Reality Check
MEASURE Evaluation
 
AI's Impact on Connectivity in Higher Education
AI's Impact on Connectivity in Higher EducationAI's Impact on Connectivity in Higher Education
AI's Impact on Connectivity in Higher Education
VistaspKarbhari
 
Me and My Big Data Project
Me and My Big Data Project Me and My Big Data Project
Me and My Big Data Project
DIPRC2019
 
Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016
Diana Benner
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Jennifer Polack
 
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
Jonathan Ezor
 

Similar to Usable Privacy (20)

A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
 
Sharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSRSharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSR
 
MBA621 Emerging Technologies
MBA621 Emerging TechnologiesMBA621 Emerging Technologies
MBA621 Emerging Technologies
 
BYOD in e-Learning - Some Considerations
BYOD in e-Learning - Some ConsiderationsBYOD in e-Learning - Some Considerations
BYOD in e-Learning - Some Considerations
 
Cloud computing slideshare
Cloud computing slideshareCloud computing slideshare
Cloud computing slideshare
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
 
Ten trends 2011
Ten trends 2011Ten trends 2011
Ten trends 2011
 
My Interests and Projects
My Interests and ProjectsMy Interests and Projects
My Interests and Projects
 
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
 
Reality Check
Reality CheckReality Check
Reality Check
 
AI's Impact on Connectivity in Higher Education
AI's Impact on Connectivity in Higher EducationAI's Impact on Connectivity in Higher Education
AI's Impact on Connectivity in Higher Education
 
Me and My Big Data Project
Me and My Big Data Project Me and My Big Data Project
Me and My Big Data Project
 
Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
 

More from Vivian Motti

Keynote speech - Webmedia 2020
Keynote speech - Webmedia 2020Keynote speech - Webmedia 2020
Keynote speech - Webmedia 2020
Vivian Motti
 
Cards - Users with Disabilities - Course Material
Cards - Users with Disabilities - Course MaterialCards - Users with Disabilities - Course Material
Cards - Users with Disabilities - Course Material
Vivian Motti
 
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Vivian Motti
 
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Vivian Motti
 
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Vivian Motti
 
mHealth Application to Inform Caregivers of Babies with Congenital Zika Virus...
mHealth Application to Inform Caregivers of Babies with Congenital Zika Virus...mHealth Application to Inform Caregivers of Babies with Congenital Zika Virus...
mHealth Application to Inform Caregivers of Babies with Congenital Zika Virus...
Vivian Motti
 
Smartwatch Applications for Mental Health: A Qualitative Analysis of Users’ P...
Smartwatch Applications for Mental Health: A Qualitative Analysis of Users’ P...Smartwatch Applications for Mental Health: A Qualitative Analysis of Users’ P...
Smartwatch Applications for Mental Health: A Qualitative Analysis of Users’ P...
Vivian Motti
 
Wearable privacy skeletons in the data closet
Wearable privacy  skeletons in the data closetWearable privacy  skeletons in the data closet
Wearable privacy skeletons in the data closet
Vivian Motti
 
Wearable Life: a Wrist-Worn Application to Assist Students in Special Education
Wearable Life: a Wrist-Worn Application to Assist Students in Special EducationWearable Life: a Wrist-Worn Application to Assist Students in Special Education
Wearable Life: a Wrist-Worn Application to Assist Students in Special Education
Vivian Motti
 
UX Design for Wrist-Worn Wearables – how contextual dynamics influence intera...
UX Design for Wrist-Worn Wearables – how contextual dynamics influence intera...UX Design for Wrist-Worn Wearables – how contextual dynamics influence intera...
UX Design for Wrist-Worn Wearables – how contextual dynamics influence intera...
Vivian Motti
 
Using Smartwatches to Assist Students with Intellectual and Developmental Dis...
Using Smartwatches to Assist Students with Intellectual and Developmental Dis...Using Smartwatches to Assist Students with Intellectual and Developmental Dis...
Using Smartwatches to Assist Students with Intellectual and Developmental Dis...
Vivian Motti
 
Smart Wearables or Dumb Wearables? Understanding how Context Impacts the UX i...
Smart Wearables or Dumb Wearables? Understanding how Context Impacts the UX i...Smart Wearables or Dumb Wearables? Understanding how Context Impacts the UX i...
Smart Wearables or Dumb Wearables? Understanding how Context Impacts the UX i...
Vivian Motti
 
Toward a Visual Vocabulary for Privacy Concepts
Toward a Visual Vocabulary for Privacy ConceptsToward a Visual Vocabulary for Privacy Concepts
Toward a Visual Vocabulary for Privacy Concepts
Vivian Motti
 
Wearable Health
Wearable HealthWearable Health
Wearable Health
Vivian Motti
 
Wearable Computing: Healthcare, Human Factors and Privacy
Wearable Computing: Healthcare, Human Factors and PrivacyWearable Computing: Healthcare, Human Factors and Privacy
Wearable Computing: Healthcare, Human Factors and Privacy
Vivian Motti
 
Micro interactions and multi dimensional graphical user interfaces in the des...
Micro interactions and multi dimensional graphical user interfaces in the des...Micro interactions and multi dimensional graphical user interfaces in the des...
Micro interactions and multi dimensional graphical user interfaces in the des...
Vivian Motti
 
An Overview of Wearable Applications for Health Care: Requirements and Challe...
An Overview of Wearable Applications for Health Care: Requirements and Challe...An Overview of Wearable Applications for Health Care: Requirements and Challe...
An Overview of Wearable Applications for Health Care: Requirements and Challe...
Vivian Motti
 
Wrist-Worn Interaction: Design Challenges and Opportunities
Wrist-Worn Interaction: Design Challenges and OpportunitiesWrist-Worn Interaction: Design Challenges and Opportunities
Wrist-Worn Interaction: Design Challenges and Opportunities
Vivian Motti
 
Wristsense2015
Wristsense2015Wristsense2015
Wristsense2015
Vivian Motti
 
Users' Privacy Concerns About Wearables: Impact of form factor, sensors and t...
Users' Privacy Concerns About Wearables: Impact of form factor, sensors and t...Users' Privacy Concerns About Wearables: Impact of form factor, sensors and t...
Users' Privacy Concerns About Wearables: Impact of form factor, sensors and t...
Vivian Motti
 

More from Vivian Motti (20)

Keynote speech - Webmedia 2020
Keynote speech - Webmedia 2020Keynote speech - Webmedia 2020
Keynote speech - Webmedia 2020
 
Cards - Users with Disabilities - Course Material
Cards - Users with Disabilities - Course MaterialCards - Users with Disabilities - Course Material
Cards - Users with Disabilities - Course Material
 
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
 
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
 
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
 
mHealth Application to Inform Caregivers of Babies with Congenital Zika Virus...
mHealth Application to Inform Caregivers of Babies with Congenital Zika Virus...mHealth Application to Inform Caregivers of Babies with Congenital Zika Virus...
mHealth Application to Inform Caregivers of Babies with Congenital Zika Virus...
 
Smartwatch Applications for Mental Health: A Qualitative Analysis of Users’ P...
Smartwatch Applications for Mental Health: A Qualitative Analysis of Users’ P...Smartwatch Applications for Mental Health: A Qualitative Analysis of Users’ P...
Smartwatch Applications for Mental Health: A Qualitative Analysis of Users’ P...
 
Wearable privacy skeletons in the data closet
Wearable privacy  skeletons in the data closetWearable privacy  skeletons in the data closet
Wearable privacy skeletons in the data closet
 
Wearable Life: a Wrist-Worn Application to Assist Students in Special Education
Wearable Life: a Wrist-Worn Application to Assist Students in Special EducationWearable Life: a Wrist-Worn Application to Assist Students in Special Education
Wearable Life: a Wrist-Worn Application to Assist Students in Special Education
 
UX Design for Wrist-Worn Wearables – how contextual dynamics influence intera...
UX Design for Wrist-Worn Wearables – how contextual dynamics influence intera...UX Design for Wrist-Worn Wearables – how contextual dynamics influence intera...
UX Design for Wrist-Worn Wearables – how contextual dynamics influence intera...
 
Using Smartwatches to Assist Students with Intellectual and Developmental Dis...
Using Smartwatches to Assist Students with Intellectual and Developmental Dis...Using Smartwatches to Assist Students with Intellectual and Developmental Dis...
Using Smartwatches to Assist Students with Intellectual and Developmental Dis...
 
Smart Wearables or Dumb Wearables? Understanding how Context Impacts the UX i...
Smart Wearables or Dumb Wearables? Understanding how Context Impacts the UX i...Smart Wearables or Dumb Wearables? Understanding how Context Impacts the UX i...
Smart Wearables or Dumb Wearables? Understanding how Context Impacts the UX i...
 
Toward a Visual Vocabulary for Privacy Concepts
Toward a Visual Vocabulary for Privacy ConceptsToward a Visual Vocabulary for Privacy Concepts
Toward a Visual Vocabulary for Privacy Concepts
 
Wearable Health
Wearable HealthWearable Health
Wearable Health
 
Wearable Computing: Healthcare, Human Factors and Privacy
Wearable Computing: Healthcare, Human Factors and PrivacyWearable Computing: Healthcare, Human Factors and Privacy
Wearable Computing: Healthcare, Human Factors and Privacy
 
Micro interactions and multi dimensional graphical user interfaces in the des...
Micro interactions and multi dimensional graphical user interfaces in the des...Micro interactions and multi dimensional graphical user interfaces in the des...
Micro interactions and multi dimensional graphical user interfaces in the des...
 
An Overview of Wearable Applications for Health Care: Requirements and Challe...
An Overview of Wearable Applications for Health Care: Requirements and Challe...An Overview of Wearable Applications for Health Care: Requirements and Challe...
An Overview of Wearable Applications for Health Care: Requirements and Challe...
 
Wrist-Worn Interaction: Design Challenges and Opportunities
Wrist-Worn Interaction: Design Challenges and OpportunitiesWrist-Worn Interaction: Design Challenges and Opportunities
Wrist-Worn Interaction: Design Challenges and Opportunities
 
Wristsense2015
Wristsense2015Wristsense2015
Wristsense2015
 
Users' Privacy Concerns About Wearables: Impact of form factor, sensors and t...
Users' Privacy Concerns About Wearables: Impact of form factor, sensors and t...Users' Privacy Concerns About Wearables: Impact of form factor, sensors and t...
Users' Privacy Concerns About Wearables: Impact of form factor, sensors and t...
 

Recently uploaded

FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 

Recently uploaded (20)

FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 

Usable Privacy