SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
2010 CRC PhD Student Conference




 “Privacy-Shake”, a Haptic Interface for Managing Privacy
     Settings in Mobile Location Sharing Applications.

                                Lukasz Jedrzejczyk
                            l.jedrzejczyk@open.ac.uk

Supervisors          Arosha Bandara
                     Bashar Nuseibeh
                     Blaine Price
Department/Institute Computing Dept.
Status               Fulltime
Probation viva       After
Starting date        June 2008


Abstract
I describe the “Privacy-Shake”, a novel interface for managing coarse grained privacy
settings. I built a prototype that enables users of Buddy Tracker, an example location
sharing application, to change their privacy preferences by shaking their phone. Users
can enable or disable location sharing and change the level of granularity of disclosed
location by shaking and sweeping their phone. In this poster I present and motivate
my work on Privacy-Shake and report on a lab-based evaluation of the interface with
16 participants.

1.     INTRODUCTION
The proliferation of location sharing applications raises several concerns related to
personal privacy. Some solutions involving location privacy policies have been
suggested (e.g., [1]). However, prior research shows that end-users have difficulties in
expressing and setting their privacy preferences [2,3]. Setting privacy rules is a time-
consuming process, which many people are unwilling to do until their privacy is
violated. Moreover, privacy preferences vary across the context, and it is hard to
define privacy policy that reflects the dynamic nature of our lives. I see this as a
strong motivation to design interfaces that help users update their privacy settings as a
consequence of their daily tasks within the system. The underlying requirement of my
interface is to provide an efficient, heads-up interface for managing location privacy
that does not overwhelm the configuration over action [4].
In order to fulfil this requirement I developed the Privacy-Shake, a haptic interface [5]
supporting ad-hoc privacy management. To evaluate the Privacy-Shake interface I
conducted a lab-based study to examine its effectiveness and explore users‟ reactions
to that technology. I also evaluated several usability aspects of Privacy-Shake and
compared its performance against graphical user interface. My study confirmed the
potential of haptic interfaces for performing simple privacy tasks and showed that
Privacy-Shake can be faster than the GUI. However, my subjective results suggest
further work on improving the interface, such as support for individual calibration and
personalized gestures for better efficiency.




                                       Page 41 of 125
2010 CRC PhD Student Conference



2.     THE PRIVACY-SHAKE SYSTEM
The current prototype of Privacy-Shake is developed in Java and works on Android
powered mobile devices. It uses the built in accelerometer to monitor the current
position of the device. The application works in a background to save time needed for
switching the phone on.
The current prototype supports the following settings: visibility (user can
enable/disable location sharing) and granularity (changing the level of granularity of
disclosed location from exact location to city level location).
2.1    Haptic interaction
Due to the dynamic nature of the mobile device, every action has to be initiated by a
dynamic, vertical shake. This is required to distinguish the action from the noise
generated by user‟s daily movements, e.g. walking, jogging, using a lift. As the
system recognizes the movement, vibrational feedback is provided to confirm that the
system is ready. Once the system is initiated, a user can change privacy settings by
performing one of the following actions:
•       Vertical movement enables location sharing (Figure 1a),
•       Horizontal movement (left and right) disables location sharing (Figure 1b),
•       By moving the phone forward, a user can change the granularity of disclosed
location to the city level (Figure 1c),
•       User instructs the system to share exact location by approximating the phone
to his body (Figure 1d).
Successful action is confirmed by short vibration (the length depends on the action)
and optional auditory message (e.g. natural language message “Anyone can see you”)
when the user enables location sharing.




Figure 1. Privacy-Shake in action. Arrows present the direction of movement
that triggers a privacy-management task.

3.     In lab evaluation
I conducted a lab-based trial of Privacy-Shake interface to evaluate the usability of the
interface and examine both the potential and vulnerabilities of the current prototype.
3.1    Method
I recruited 16 participants aged from 23 to 45 for the study, 8 women and 8 men.
Most of them had prior experience with motion-capture interaction, mainly from
playing the Nintendo Wii. Eleven participants were graduate students, 4 were
recruited from the university‟s stuff and the remaining user was recruited outside the
university. Participants were asked to complete the following privacy management
tasks using Privacy-Shake (results presented in Figure 2):
T1.     Enable location sharing,
T2.     Disable location sharing,



                                       Page 42 of 125
2010 CRC PhD Student Conference



T3.      Change the granularity of disclosed location to (a) exact location (building
level), (b) city level,
T4.      Disable location sharing using the GUI.
The following measures were recorded:
 Time to performing a task – from the time when user started the initiation
    movement to the vibration confirming the action,
 Number of successfully completed tasks,
 Time of disabling location sharing using the GUI.
Participants took part in the study individually, at the beginning of each session I
introduced the Privacy-Shake concept and the purpose of the study. Users were
presented a short demo of the system and were given a chance to play with the
interface prior to performing four privacy management tasks using Privacy-Shake.
Each participant had three attempts to perform each task. At the end of each session I
asked participants to complete a questionnaire to rate the Privacy-Shake.
3.2    Results
Twelve participants reported that learning how to use the Privacy-Shake was easy (2
users reported that it was difficult), 12 of them said that it is also easy to remember
how to use it, as the interaction is simple and intuitive. However, 4 users said that
they would not like to use it due to the awkwardness of the interface and potential
harm it may cause, e.g. accidentally pushing people in a crowded bus.




Figure 2. Bar chart presents the percentage of successfully completed tasks
(efficiency) during the study.
Four participants reported that using Privacy-Shake was annoying and six of them
said that it caused frustration, which is related to the problems their experienced with
the interface. Only five users managed to successfully complete each privacy
management task using Privacy-Shake. Three users could not disable their location
sharing and nine users had problems changing the granularity of disclosed location.
The biggest difficulty users experienced was with task 3b, only three users
successfully completed the task three times. More than a half of all attempts to
perform this task were unsuccessful (58%). Only task T1 was successfully completed
by all users, thirteen participants disabled location sharing using Privacy-Shake and
ten of them successfully changed the granularity of location to city level. Two users
successfully completed 11 of 12 attempts, which was the best result during the study.




                                       Page 43 of 125
2010 CRC PhD Student Conference



58% of all attempts were successful. I observed that females performed slightly better
at using Privacy-Shake with 64% efficiency versus 53% for males.

4.     CONCLUSIONS AND FUTURE WORK
I presented the concept and initial results of the evaluation of Privacy-Shake, a novel
interface for „heads-up‟ privacy management. The chosen demographic was not broad,
but the study helped me identify both social and technical issues related to the
interface. One of the main issues I found were lack of individual calibration and
support for more discreet movements, which highlights the future research agenda for
my work on Privacy-Shake. Though the actual efficiency is not ideal, the comparison
between the mean time of performing tasks T2 (6 seconds) and T4 (18 seconds)
shows that haptic interface can be successfully used to perform some basic privacy
management tasks faster than the traditional GUI. The Privacy-Shake concept
received a positive feedback, which encourages me to continue the work on
improving the interface and enhancing the user experience. Further work is also
needed to extend the functionality of Privacy-Shake by implementing new gestures
for managing group settings or expressing more fine-grained preferences.

5.     REFERENCES
[1]     G. Myles, A. Friday, and N. Davies, “Preserving Privacy in Environments
with Location-Based Applications,” IEEE Pervasive Computing, vol. 2, 2003, pp. 56-
64.
[2]     L.F. Cranor and S. Garfinkel, Security and usability: designing secure systems
that people can use, O'Reilly Media, Inc., 2005.
[3]     N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley, M. Prabaker, and J. Rao,
“Understanding and capturing people‟s privacy policies in a people finder
application,” The Journal of Personal and Ubiquitous Computing, vol. 13, Aug. 2009,
pp. 401-412.
[4]     S. Lederer, I. Hong, K. Dey, and A. Landay, “Personal privacy through
understanding and action: five pitfalls for designers,” Personal Ubiquitous Computing,
vol. 8, 2004, pp. 440-454.
[5]     S. Robinson, P. Eslambolchilar, and M. Jones, “Sweep-Shake: finding digital
resources in physical environments,” Proc. of Mobile HCI'09, ACM, 2009, p.12.




                                      Page 44 of 125

Weitere ähnliche Inhalte

Was ist angesagt?

ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...Ville Antila
 
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...Ville Antila
 
Preserving Global and Local Features for Robust FaceRecognition under Various...
Preserving Global and Local Features for Robust FaceRecognition under Various...Preserving Global and Local Features for Robust FaceRecognition under Various...
Preserving Global and Local Features for Robust FaceRecognition under Various...CSCJournals
 
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...IJERA Editor
 
google glases document
google glases documentgoogle glases document
google glases documentmahesh b
 
Bieg Eye And Pointer Coordination In Search And Selection Tasks
Bieg Eye And Pointer Coordination In Search And Selection TasksBieg Eye And Pointer Coordination In Search And Selection Tasks
Bieg Eye And Pointer Coordination In Search And Selection TasksKalle
 
UbiComp2011: ContextCapture (Poster)
UbiComp2011: ContextCapture (Poster)UbiComp2011: ContextCapture (Poster)
UbiComp2011: ContextCapture (Poster)Ville Antila
 
A Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research ChallengesA Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research ChallengesEswar Publications
 
Vertical Fragmentation of Location Information to Enable Location Privacy in ...
Vertical Fragmentation of Location Information to Enable Location Privacy in ...Vertical Fragmentation of Location Information to Enable Location Privacy in ...
Vertical Fragmentation of Location Information to Enable Location Privacy in ...ijasa
 
From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...Fread Mzee
 
Recognition of activities of daily living with egocentric vision
Recognition of activities of daily living with egocentric visionRecognition of activities of daily living with egocentric vision
Recognition of activities of daily living with egocentric visionNaeem Shehzad
 
Micro interactions and multi dimensional graphical user interfaces in the des...
Micro interactions and multi dimensional graphical user interfaces in the des...Micro interactions and multi dimensional graphical user interfaces in the des...
Micro interactions and multi dimensional graphical user interfaces in the des...Vivian Motti
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET Journal
 
Paper id 25201413
Paper id 25201413Paper id 25201413
Paper id 25201413IJRAT
 

Was ist angesagt? (17)

4 newmain doc
4 newmain doc4 newmain doc
4 newmain doc
 
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...
 
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...
 
Preserving Global and Local Features for Robust FaceRecognition under Various...
Preserving Global and Local Features for Robust FaceRecognition under Various...Preserving Global and Local Features for Robust FaceRecognition under Various...
Preserving Global and Local Features for Robust FaceRecognition under Various...
 
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
 
google glases document
google glases documentgoogle glases document
google glases document
 
Bieg Eye And Pointer Coordination In Search And Selection Tasks
Bieg Eye And Pointer Coordination In Search And Selection TasksBieg Eye And Pointer Coordination In Search And Selection Tasks
Bieg Eye And Pointer Coordination In Search And Selection Tasks
 
UbiComp2011: ContextCapture (Poster)
UbiComp2011: ContextCapture (Poster)UbiComp2011: ContextCapture (Poster)
UbiComp2011: ContextCapture (Poster)
 
A Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research ChallengesA Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research Challenges
 
Vertical Fragmentation of Location Information to Enable Location Privacy in ...
Vertical Fragmentation of Location Information to Enable Location Privacy in ...Vertical Fragmentation of Location Information to Enable Location Privacy in ...
Vertical Fragmentation of Location Information to Enable Location Privacy in ...
 
TSA Eyebox project
TSA Eyebox project TSA Eyebox project
TSA Eyebox project
 
From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...
 
A Mobile Indoor Navigation System Interface Adapted to Vision-Based Localization
A Mobile Indoor Navigation System Interface Adapted to Vision-Based LocalizationA Mobile Indoor Navigation System Interface Adapted to Vision-Based Localization
A Mobile Indoor Navigation System Interface Adapted to Vision-Based Localization
 
Recognition of activities of daily living with egocentric vision
Recognition of activities of daily living with egocentric visionRecognition of activities of daily living with egocentric vision
Recognition of activities of daily living with egocentric vision
 
Micro interactions and multi dimensional graphical user interfaces in the des...
Micro interactions and multi dimensional graphical user interfaces in the des...Micro interactions and multi dimensional graphical user interfaces in the des...
Micro interactions and multi dimensional graphical user interfaces in the des...
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language Interpreter
 
Paper id 25201413
Paper id 25201413Paper id 25201413
Paper id 25201413
 

Andere mochten auch

Andere mochten auch (7)

Mouawad
MouawadMouawad
Mouawad
 
Wilkie
WilkieWilkie
Wilkie
 
Pantidi
PantidiPantidi
Pantidi
 
Aizatulin poster
Aizatulin posterAizatulin poster
Aizatulin poster
 
Abraham
AbrahamAbraham
Abraham
 
Aizatulin slides-4-3
Aizatulin slides-4-3Aizatulin slides-4-3
Aizatulin slides-4-3
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
 

Ähnlich wie Jedrzejczyk

SMARCOS Abstract Paper submitted to ICCHP 2012
SMARCOS Abstract Paper submitted to ICCHP 2012SMARCOS Abstract Paper submitted to ICCHP 2012
SMARCOS Abstract Paper submitted to ICCHP 2012Smarcos Eu
 
Eye(I) Still Know! – An App for the Blind Built using Web and AI
Eye(I) Still Know! – An App for the Blind Built using Web and AIEye(I) Still Know! – An App for the Blind Built using Web and AI
Eye(I) Still Know! – An App for the Blind Built using Web and AIDr. Amarjeet Singh
 
smartwatch-user-identification
smartwatch-user-identificationsmartwatch-user-identification
smartwatch-user-identificationSebastian W. Cheah
 
Securing Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingSecuring Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingIRJET Journal
 
Iaetsd efficient file transferring in
Iaetsd efficient file transferring inIaetsd efficient file transferring in
Iaetsd efficient file transferring inIaetsd Iaetsd
 
Analyzing And Predicting Focus Of Attention In Remote Collaborative Tasks
Analyzing And Predicting Focus Of Attention In Remote Collaborative TasksAnalyzing And Predicting Focus Of Attention In Remote Collaborative Tasks
Analyzing And Predicting Focus Of Attention In Remote Collaborative TasksKayla Smith
 
Study reveals we are being tracked by our smartphones --- every 3 minutes
Study reveals we are being tracked by our smartphones --- every 3 minutesStudy reveals we are being tracked by our smartphones --- every 3 minutes
Study reveals we are being tracked by our smartphones --- every 3 minutesWaqas Amir
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEEMEMTECHSTUDENTPROJECTS
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...IEEEFINALYEARSTUDENTSPROJECTS
 
An effective approach to develop location-based augmented reality information...
An effective approach to develop location-based augmented reality information...An effective approach to develop location-based augmented reality information...
An effective approach to develop location-based augmented reality information...IJECEIAES
 
preserving location privacy in geosocial applications
preserving location privacy in geosocial applicationspreserving location privacy in geosocial applications
preserving location privacy in geosocial applicationsswathi78
 
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET Journal
 
Understanding user interactivity for immersive communications and its impact ...
Understanding user interactivity for immersive communications and its impact ...Understanding user interactivity for immersive communications and its impact ...
Understanding user interactivity for immersive communications and its impact ...lauratoni4
 
Understanding user interactivity for immersive communications and its impact ...
Understanding user interactivity for immersive communications and its impact ...Understanding user interactivity for immersive communications and its impact ...
Understanding user interactivity for immersive communications and its impact ...Alpen-Adria-Universität
 
Principle to support usability
Principle to support usabilityPrinciple to support usability
Principle to support usabilityZeeshan598
 
Norman Sadeh's Presentation
Norman Sadeh's PresentationNorman Sadeh's Presentation
Norman Sadeh's PresentationMediabistro
 
Geochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using CloudGeochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using CloudIJERA Editor
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMijiert bestjournal
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesMigrant Systems
 

Ähnlich wie Jedrzejczyk (20)

SMARCOS Abstract Paper submitted to ICCHP 2012
SMARCOS Abstract Paper submitted to ICCHP 2012SMARCOS Abstract Paper submitted to ICCHP 2012
SMARCOS Abstract Paper submitted to ICCHP 2012
 
Eye(I) Still Know! – An App for the Blind Built using Web and AI
Eye(I) Still Know! – An App for the Blind Built using Web and AIEye(I) Still Know! – An App for the Blind Built using Web and AI
Eye(I) Still Know! – An App for the Blind Built using Web and AI
 
smartwatch-user-identification
smartwatch-user-identificationsmartwatch-user-identification
smartwatch-user-identification
 
EDI_PRESENTATION
EDI_PRESENTATIONEDI_PRESENTATION
EDI_PRESENTATION
 
Securing Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingSecuring Location of User in Geo Social Networking
Securing Location of User in Geo Social Networking
 
Iaetsd efficient file transferring in
Iaetsd efficient file transferring inIaetsd efficient file transferring in
Iaetsd efficient file transferring in
 
Analyzing And Predicting Focus Of Attention In Remote Collaborative Tasks
Analyzing And Predicting Focus Of Attention In Remote Collaborative TasksAnalyzing And Predicting Focus Of Attention In Remote Collaborative Tasks
Analyzing And Predicting Focus Of Attention In Remote Collaborative Tasks
 
Study reveals we are being tracked by our smartphones --- every 3 minutes
Study reveals we are being tracked by our smartphones --- every 3 minutesStudy reveals we are being tracked by our smartphones --- every 3 minutes
Study reveals we are being tracked by our smartphones --- every 3 minutes
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
 
An effective approach to develop location-based augmented reality information...
An effective approach to develop location-based augmented reality information...An effective approach to develop location-based augmented reality information...
An effective approach to develop location-based augmented reality information...
 
preserving location privacy in geosocial applications
preserving location privacy in geosocial applicationspreserving location privacy in geosocial applications
preserving location privacy in geosocial applications
 
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
 
Understanding user interactivity for immersive communications and its impact ...
Understanding user interactivity for immersive communications and its impact ...Understanding user interactivity for immersive communications and its impact ...
Understanding user interactivity for immersive communications and its impact ...
 
Understanding user interactivity for immersive communications and its impact ...
Understanding user interactivity for immersive communications and its impact ...Understanding user interactivity for immersive communications and its impact ...
Understanding user interactivity for immersive communications and its impact ...
 
Principle to support usability
Principle to support usabilityPrinciple to support usability
Principle to support usability
 
Norman Sadeh's Presentation
Norman Sadeh's PresentationNorman Sadeh's Presentation
Norman Sadeh's Presentation
 
Geochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using CloudGeochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using Cloud
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
 

Mehr von anesah

Van der merwe
Van der merweVan der merwe
Van der merweanesah
 
Thomas
ThomasThomas
Thomasanesah
 
Taubenberger
TaubenbergerTaubenberger
Taubenbergeranesah
 
Pantidi
PantidiPantidi
Pantidianesah
 
Corneli
CorneliCorneli
Cornelianesah
 
Collins
CollinsCollins
Collinsanesah
 
Ullmann
UllmannUllmann
Ullmannanesah
 
Quinto
QuintoQuinto
Quintoanesah
 
Pawlik
PawlikPawlik
Pawlikanesah
 
Overbeeke
OverbeekeOverbeeke
Overbeekeanesah
 
Nguyen
NguyenNguyen
Nguyenanesah
 
Murphy
MurphyMurphy
Murphyanesah
 
Montrieux
MontrieuxMontrieux
Montrieuxanesah
 

Mehr von anesah (20)

Van der merwe
Van der merweVan der merwe
Van der merwe
 
Thomas
ThomasThomas
Thomas
 
Taubenberger
TaubenbergerTaubenberger
Taubenberger
 
Sach
SachSach
Sach
 
Rae
RaeRae
Rae
 
Pantidi
PantidiPantidi
Pantidi
 
Corneli
CorneliCorneli
Corneli
 
Collins
CollinsCollins
Collins
 
Xambo
XamboXambo
Xambo
 
Ullmann
UllmannUllmann
Ullmann
 
Tran
TranTran
Tran
 
Quinto
QuintoQuinto
Quinto
 
Pluss
PlussPluss
Pluss
 
Pawlik
PawlikPawlik
Pawlik
 
Overbeeke
OverbeekeOverbeeke
Overbeeke
 
Nguyen
NguyenNguyen
Nguyen
 
Murphy
MurphyMurphy
Murphy
 
Moyo
MoyoMoyo
Moyo
 
Montrieux
MontrieuxMontrieux
Montrieux
 
Ma
MaMa
Ma
 

Kürzlich hochgeladen

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Kürzlich hochgeladen (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Jedrzejczyk

  • 1. 2010 CRC PhD Student Conference “Privacy-Shake”, a Haptic Interface for Managing Privacy Settings in Mobile Location Sharing Applications. Lukasz Jedrzejczyk l.jedrzejczyk@open.ac.uk Supervisors Arosha Bandara Bashar Nuseibeh Blaine Price Department/Institute Computing Dept. Status Fulltime Probation viva After Starting date June 2008 Abstract I describe the “Privacy-Shake”, a novel interface for managing coarse grained privacy settings. I built a prototype that enables users of Buddy Tracker, an example location sharing application, to change their privacy preferences by shaking their phone. Users can enable or disable location sharing and change the level of granularity of disclosed location by shaking and sweeping their phone. In this poster I present and motivate my work on Privacy-Shake and report on a lab-based evaluation of the interface with 16 participants. 1. INTRODUCTION The proliferation of location sharing applications raises several concerns related to personal privacy. Some solutions involving location privacy policies have been suggested (e.g., [1]). However, prior research shows that end-users have difficulties in expressing and setting their privacy preferences [2,3]. Setting privacy rules is a time- consuming process, which many people are unwilling to do until their privacy is violated. Moreover, privacy preferences vary across the context, and it is hard to define privacy policy that reflects the dynamic nature of our lives. I see this as a strong motivation to design interfaces that help users update their privacy settings as a consequence of their daily tasks within the system. The underlying requirement of my interface is to provide an efficient, heads-up interface for managing location privacy that does not overwhelm the configuration over action [4]. In order to fulfil this requirement I developed the Privacy-Shake, a haptic interface [5] supporting ad-hoc privacy management. To evaluate the Privacy-Shake interface I conducted a lab-based study to examine its effectiveness and explore users‟ reactions to that technology. I also evaluated several usability aspects of Privacy-Shake and compared its performance against graphical user interface. My study confirmed the potential of haptic interfaces for performing simple privacy tasks and showed that Privacy-Shake can be faster than the GUI. However, my subjective results suggest further work on improving the interface, such as support for individual calibration and personalized gestures for better efficiency. Page 41 of 125
  • 2. 2010 CRC PhD Student Conference 2. THE PRIVACY-SHAKE SYSTEM The current prototype of Privacy-Shake is developed in Java and works on Android powered mobile devices. It uses the built in accelerometer to monitor the current position of the device. The application works in a background to save time needed for switching the phone on. The current prototype supports the following settings: visibility (user can enable/disable location sharing) and granularity (changing the level of granularity of disclosed location from exact location to city level location). 2.1 Haptic interaction Due to the dynamic nature of the mobile device, every action has to be initiated by a dynamic, vertical shake. This is required to distinguish the action from the noise generated by user‟s daily movements, e.g. walking, jogging, using a lift. As the system recognizes the movement, vibrational feedback is provided to confirm that the system is ready. Once the system is initiated, a user can change privacy settings by performing one of the following actions: • Vertical movement enables location sharing (Figure 1a), • Horizontal movement (left and right) disables location sharing (Figure 1b), • By moving the phone forward, a user can change the granularity of disclosed location to the city level (Figure 1c), • User instructs the system to share exact location by approximating the phone to his body (Figure 1d). Successful action is confirmed by short vibration (the length depends on the action) and optional auditory message (e.g. natural language message “Anyone can see you”) when the user enables location sharing. Figure 1. Privacy-Shake in action. Arrows present the direction of movement that triggers a privacy-management task. 3. In lab evaluation I conducted a lab-based trial of Privacy-Shake interface to evaluate the usability of the interface and examine both the potential and vulnerabilities of the current prototype. 3.1 Method I recruited 16 participants aged from 23 to 45 for the study, 8 women and 8 men. Most of them had prior experience with motion-capture interaction, mainly from playing the Nintendo Wii. Eleven participants were graduate students, 4 were recruited from the university‟s stuff and the remaining user was recruited outside the university. Participants were asked to complete the following privacy management tasks using Privacy-Shake (results presented in Figure 2): T1. Enable location sharing, T2. Disable location sharing, Page 42 of 125
  • 3. 2010 CRC PhD Student Conference T3. Change the granularity of disclosed location to (a) exact location (building level), (b) city level, T4. Disable location sharing using the GUI. The following measures were recorded:  Time to performing a task – from the time when user started the initiation movement to the vibration confirming the action,  Number of successfully completed tasks,  Time of disabling location sharing using the GUI. Participants took part in the study individually, at the beginning of each session I introduced the Privacy-Shake concept and the purpose of the study. Users were presented a short demo of the system and were given a chance to play with the interface prior to performing four privacy management tasks using Privacy-Shake. Each participant had three attempts to perform each task. At the end of each session I asked participants to complete a questionnaire to rate the Privacy-Shake. 3.2 Results Twelve participants reported that learning how to use the Privacy-Shake was easy (2 users reported that it was difficult), 12 of them said that it is also easy to remember how to use it, as the interaction is simple and intuitive. However, 4 users said that they would not like to use it due to the awkwardness of the interface and potential harm it may cause, e.g. accidentally pushing people in a crowded bus. Figure 2. Bar chart presents the percentage of successfully completed tasks (efficiency) during the study. Four participants reported that using Privacy-Shake was annoying and six of them said that it caused frustration, which is related to the problems their experienced with the interface. Only five users managed to successfully complete each privacy management task using Privacy-Shake. Three users could not disable their location sharing and nine users had problems changing the granularity of disclosed location. The biggest difficulty users experienced was with task 3b, only three users successfully completed the task three times. More than a half of all attempts to perform this task were unsuccessful (58%). Only task T1 was successfully completed by all users, thirteen participants disabled location sharing using Privacy-Shake and ten of them successfully changed the granularity of location to city level. Two users successfully completed 11 of 12 attempts, which was the best result during the study. Page 43 of 125
  • 4. 2010 CRC PhD Student Conference 58% of all attempts were successful. I observed that females performed slightly better at using Privacy-Shake with 64% efficiency versus 53% for males. 4. CONCLUSIONS AND FUTURE WORK I presented the concept and initial results of the evaluation of Privacy-Shake, a novel interface for „heads-up‟ privacy management. The chosen demographic was not broad, but the study helped me identify both social and technical issues related to the interface. One of the main issues I found were lack of individual calibration and support for more discreet movements, which highlights the future research agenda for my work on Privacy-Shake. Though the actual efficiency is not ideal, the comparison between the mean time of performing tasks T2 (6 seconds) and T4 (18 seconds) shows that haptic interface can be successfully used to perform some basic privacy management tasks faster than the traditional GUI. The Privacy-Shake concept received a positive feedback, which encourages me to continue the work on improving the interface and enhancing the user experience. Further work is also needed to extend the functionality of Privacy-Shake by implementing new gestures for managing group settings or expressing more fine-grained preferences. 5. REFERENCES [1] G. Myles, A. Friday, and N. Davies, “Preserving Privacy in Environments with Location-Based Applications,” IEEE Pervasive Computing, vol. 2, 2003, pp. 56- 64. [2] L.F. Cranor and S. Garfinkel, Security and usability: designing secure systems that people can use, O'Reilly Media, Inc., 2005. [3] N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley, M. Prabaker, and J. Rao, “Understanding and capturing people‟s privacy policies in a people finder application,” The Journal of Personal and Ubiquitous Computing, vol. 13, Aug. 2009, pp. 401-412. [4] S. Lederer, I. Hong, K. Dey, and A. Landay, “Personal privacy through understanding and action: five pitfalls for designers,” Personal Ubiquitous Computing, vol. 8, 2004, pp. 440-454. [5] S. Robinson, P. Eslambolchilar, and M. Jones, “Sweep-Shake: finding digital resources in physical environments,” Proc. of Mobile HCI'09, ACM, 2009, p.12. Page 44 of 125