SlideShare ist ein Scribd-Unternehmen logo
1 von 46
Downloaden Sie, um offline zu lesen
Privacy Awareness: An
inclusive design approach
  Lizzie Coles-Kemp, Information
  Security Group, Royal Holloway
Outline
•    Objectives of the project
•    Research design
•    Engagement evolution
•    Lessons learned
VOME
  •  A five party
     consortium
  •  Funded by
     Technology Strategy
     Board, EPSRC and
     ESRC
  •  Interdisciplinary
     project
Goal
•  Designing privacy awareness tools
  –  Both social and technological tools
•  Underpinning the design with explanatory
   power to enable more efficient and
   effective tool deployment (prediction)
Context
•  On-line public service delivery
  –  Broad set of demographics
  –  Variable levels of digital and visual literacy
  –  Communities: service users, families of
     service users, service providers and third
     parties
Contextualising the Debate
•  Situated fieldwork
  –  Formal and informal education
  –  Older internet users
  –  NEETs
  –  Young parents
•  Contextualised in the shifting landscape
   public service debate
  –  E.g. NEETs to NEATs
Outputs
•  Social interventions:
  –  Music video
  –  Short stories
  –  Game
•  Technical interventions:
  –  Design principles for privacy awareness
  –  Cartographies of information flows
  –  Communication tools
Proposition
•  The value of the proposition depends on
   the ethos of the service
  –  Descriptive power
  –  Engagement
  –  Empowerment
Outline
•    Objectives of the project
•    Research design
•    Engagement evolution
•    Lessons learned
Overall Approach
•    Mediated through gatekeepers
•    Within the communities themselves
•    In consultation with the community
•    Mixed methods of engagement
•    Across a range of demographics
Panorama	
  of	
  the	
  City	
  of	
  New	
  York.	
  (Robert	
  Moses/Leeser	
  Associates	
  1964)	
  
Conceptual Perspectives
•  Three broad categories (Introna, 1997):
  –  privacy as no access to the person or the
     personal realm;
  –  privacy as control over personal information ;
     and
  –  privacy as freedom from judgement or
     scrutiny by others.
Concern and Its Expression
•  Information privacy concern refers to an
   individual s subjective views of fairness
   within the context of information privacy
   (Campbell 1997)
•  Interestingly: no literature refers to how
   these concerns are expressed - either in
   the metaphors, images or languages used
   or in the means of expression
Concern Trajectory
•  Westin and Harris (1998):
  –  Privacy Fundamentalists, who view privacy as an
     especially high value which they feel very strongly
     about;
  –  Privacy Pragmatists, who too have strong feelings
     about privacy but can also see the benefits from
     surrendering some privacy in situations where they
     believe care is taken to prevent the misuse of this
     information;
  –  Privacy Unconcerned who have no real concerns
     about privacy or about how other people and
     organizations are using information about them
Uta	
  Eisenreich,	
  Network/Teamwork	
  sociogram	
  2002	
  
On-­‐line	
  or	
  Off-­‐line	
  
•  Privacy	
  isn’t	
  either	
  off-­‐line	
  or	
  on-­‐line,	
  it’s	
  an	
  
   entangled	
  mesh	
  
    –  	
  technology	
  mediated	
  privacy	
  is	
  situated	
  in	
  a	
  
       physical	
  world	
  (and	
  vice	
  versa).	
  	
  
Baseline	
  Survey	
  
•  The	
  total	
  number	
  of	
  valid	
  responses	
  for	
  the	
  survey	
  
   was	
  1048.	
  	
  
•  Of	
  the	
  1048	
  respondents,	
  49.8%	
  (523)	
  were	
  male	
  
   and	
  50.2%	
  (525)	
  were	
  female	
  	
  
•  The	
  mean	
  age	
  was	
  41.0	
  years	
  (range:	
  18	
  –	
  82	
  years)	
  
•  Used	
  quesQons	
  adapted	
  from	
  a	
  number	
  of	
  
   established	
  scales	
  including	
  Internet	
  Users	
  
   InformaQon	
  Privacy	
  Concerns.	
  
IUIPC: Collection of Information
                ü  34.1% of the respondents
                    strongly agree that they
                    are concerned when
                    online sites collect their
                    personal information.
                    Only about 16.1% of the
                    respondents disagree
                    that the collection of
                    personal information by
                    online sites is a concern.
IUIPC: Control of Information
               ü  46.8% of the respondents
                   strongly agree that online
                   sites should provide them
                   with the right to exercise
                   control and autonomy
                   over decisions about how
                   their information is
                   collected, use and
                   shared. Only 11.6% of
                   the respondents disagree
                   that having control over
                   collected information
                   about themselves is a
                   concern.
IUIPC: Awareness of Privacy Practices

                   ü  51.2% of the respondents
                       strongly agree that
                       Internet sites seeking
                       information online should
                       disclose the way the data
                       are collected, processed
                       and used. Only 10.4%
                       feel that having
                       awareness of such
                       privacy practices is not a
                       concern.
Influencers
•    Age
•    Gender
•    Internet experience
•    Levels of education
Practices
•  Two categories of privacy practice
   identified (Buchannan et al 2007):
  –  common sense steps (general caution)
  –  technical protection of privacy
•  Gender divide: females more likely to
   undertake general caution and males
   more likely to undertake technical
   protection measures
Off-line Responses to On-line
               Problems
•  VOME survey agreed with the gender
   hypothesis
•  The VOME fieldwork did not:
  –  Much broader range of general caution
     activities undertaken by both men and women
  –  Use of off-line recommender networks (social)
  –  The use of technical protection measures
     depends on who manages the technology
Two Dominant Paradoxes
•  In VOME research, the following “paradoxes” are
   dominant:
   –  Users are concerned about their privacy, but are unwilling
      to engage with privacy technologies. This is in line with the
      findings discussed in Buchanan et al.’s work (2007)
      •  FW: But this doesn’t mean there are no privacy protection
         practices
   –  Users want autonomy over on-line privacy but are
      prepared to trade their privacy in return for some reward.
      This is in-line with the paradoxes discussed in, for
      example, Norberg et al.’s work (2007)
      •  FW: This does not necessarily mean a financial reward.
Paradox or Just Different
           Choices?
•  VOME at the point of practice shows that:
  –  Privacy journey is on-going
  –  Privacy protection practices are related to the
     relationship in question and the trust within that
     relationship
  –  Different relationships have different concerns related
     to them and different practices (foregrounding)
  –  Choice of foregrounding and lack of awareness of
     privacy risks result in weaker privacy protection
     choices
Question..
•  How do we find out more about those choices?
•  Interviews and focus groups delivered as
   expected answers
•  Surveys delivered as expected patterns
•  Neither approach told us much about practices,
   their link to concerns and how privacy
   awareness was built
•  Neither approach reached into the liminal
   communities
Outline
•    Objectives of the project
•    Research design
•    Engagement evolution
•    Lessons learned
Who We Engaged With
•  Service providers
  –  Public service providers (local government)
  –  Central government
  –  Application developers
  –  Third sector
  –  Commercial service providers
•  General public
  –  Community groups
  –  Young people
  –  Vulnerable young adults
  –  General public
Methods
•  Traditional social research methods:
  –  Survey
  –  Interview
  –  Focus group
•  User-centric design methods:
  –  Questionnaire
  –  User evaluation
  –  Interview
•  Participatory methods:
  –  Artistic engagement
  –  Co-design
Traditional Social Research
•  Pros
  –  Can compare against existing baselines
  –  Using known and trusted approaches
  –  Researchers familiar with the role
  –  Obtain a solid overview of patterns of practice
•  Cons
  –  Difficult to move beyond the known
  –  Participants unfamiliar with the role and fear failure
  –  Language barrier
  –  Lengthy process
  –  Technology can have a passive role
User-Centric Design
•  Pros
  –  Derive requirements from the users of existing and
     potential systems
  –  Engages with the owners of the problem space and
     with the potential users of any outputs; therefore
     gains a range of perspectives
  –  Technology has an equal role in the research
•  Cons
  –  Affirmative design
  –  Language barrier
  –  Participants are often passive actors
Participatory Methods
•  Pros
  –  Participants and researchers are on a more equal
     footing
  –  Language barrier reduces
  –  Participants drive the direction of the research
  –  Output that can be used in different ways
  –  Strong explanatory power
•  Cons
  –  A less well-known approach
  –  Expensive
  –  Resource intensive for set-up
  –  Risk of failure
Outline
•    Objectives of the project
•    Research design
•    Engagement evolution
•    Lessons learned
Lessons Learned
•  Can be divided into three groups:
  –  Control Tension
  –  Situation
  –  Segmentation
Where to Next
•  Three case studies for technical interventions:
   –  Sunderland City Council’s Child Poverty Portal
   –  Information values map for Safe@Last
   –  Community support network for community action
      (Pallion, West Sunderland)
•  Evaluation of the game and music video:
   –  Social marketing methods
   –  User experience evaluations
Thank you
•  More details can be found at:
   http://www.vome.org.uk
•  Publications at:
   http://www.vome.org.uk/publications/
•  Video collection at:
   http://www.vome.org.uk/videos/
•  Interventions at:
   http://www.vome.org.uk/toolkit/

Weitere ähnliche Inhalte

Was ist angesagt?

A study of sixth graders’ critical evaluation of Internet sources
A study of sixth graders’ critical evaluation of Internet sourcesA study of sixth graders’ critical evaluation of Internet sources
A study of sixth graders’ critical evaluation of Internet sourcesaj6785
 
Are we all knowledgeable now
Are we all knowledgeable nowAre we all knowledgeable now
Are we all knowledgeable nowPetr Lupac
 
British columbia september2014_final
British columbia september2014_finalBritish columbia september2014_final
British columbia september2014_finalcarolbumd
 
Technology and Student Affairs
Technology and Student AffairsTechnology and Student Affairs
Technology and Student AffairsLeslie Dare
 
The fate-of-the-semantic-web
The fate-of-the-semantic-webThe fate-of-the-semantic-web
The fate-of-the-semantic-webMarketingfacts
 
Harnessing the Technological IQ of the New Generation
Harnessing the Technological IQ of the New GenerationHarnessing the Technological IQ of the New Generation
Harnessing the Technological IQ of the New GenerationJawad Rachami
 
In search of a framework for understanding the processes that maintain digita...
In search of a framework for understanding the processes that maintain digita...In search of a framework for understanding the processes that maintain digita...
In search of a framework for understanding the processes that maintain digita...Jane65
 
Coloma 109
Coloma 109Coloma 109
Coloma 109Mae
 
Decline of interpersonal communication
Decline of interpersonal communicationDecline of interpersonal communication
Decline of interpersonal communicationNaeemMushtaq4
 
Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...Alexander Decker
 
The Net Generation: Myths, Realities and Implications for Higher Education
The Net Generation: Myths, Realities and Implications for Higher EducationThe Net Generation: Myths, Realities and Implications for Higher Education
The Net Generation: Myths, Realities and Implications for Higher EducationMark Bullen
 
Cyberbullying in adolescent victims
Cyberbullying in adolescent victimsCyberbullying in adolescent victims
Cyberbullying in adolescent victimsMarcelo Pesallaccia
 
Digital literacy & reserach ethics
Digital literacy & reserach ethicsDigital literacy & reserach ethics
Digital literacy & reserach ethicsDjamel Eddine Benchaib
 
It ethics undergraduates’ perception based on their awareness
It ethics undergraduates’ perception based on their awarenessIt ethics undergraduates’ perception based on their awareness
It ethics undergraduates’ perception based on their awarenessAlexander Decker
 
Research Proposal
Research ProposalResearch Proposal
Research Proposaldinsmoor
 
Intel PaPR Project Findings
Intel PaPR Project FindingsIntel PaPR Project Findings
Intel PaPR Project Findingsdanielconnolly10
 

Was ist angesagt? (19)

A study of sixth graders’ critical evaluation of Internet sources
A study of sixth graders’ critical evaluation of Internet sourcesA study of sixth graders’ critical evaluation of Internet sources
A study of sixth graders’ critical evaluation of Internet sources
 
Are we all knowledgeable now
Are we all knowledgeable nowAre we all knowledgeable now
Are we all knowledgeable now
 
British columbia september2014_final
British columbia september2014_finalBritish columbia september2014_final
British columbia september2014_final
 
Technology and Student Affairs
Technology and Student AffairsTechnology and Student Affairs
Technology and Student Affairs
 
The fate-of-the-semantic-web
The fate-of-the-semantic-webThe fate-of-the-semantic-web
The fate-of-the-semantic-web
 
Harnessing the Technological IQ of the New Generation
Harnessing the Technological IQ of the New GenerationHarnessing the Technological IQ of the New Generation
Harnessing the Technological IQ of the New Generation
 
In search of a framework for understanding the processes that maintain digita...
In search of a framework for understanding the processes that maintain digita...In search of a framework for understanding the processes that maintain digita...
In search of a framework for understanding the processes that maintain digita...
 
Coloma 109
Coloma 109Coloma 109
Coloma 109
 
Decline of interpersonal communication
Decline of interpersonal communicationDecline of interpersonal communication
Decline of interpersonal communication
 
Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...
 
The Net Generation: Myths, Realities and Implications for Higher Education
The Net Generation: Myths, Realities and Implications for Higher EducationThe Net Generation: Myths, Realities and Implications for Higher Education
The Net Generation: Myths, Realities and Implications for Higher Education
 
Overview Of Wcu Research (16 Dec2009)Sj
Overview Of Wcu Research (16 Dec2009)SjOverview Of Wcu Research (16 Dec2009)Sj
Overview Of Wcu Research (16 Dec2009)Sj
 
Cyberbullying in adolescent victims
Cyberbullying in adolescent victimsCyberbullying in adolescent victims
Cyberbullying in adolescent victims
 
Digital literacy & reserach ethics
Digital literacy & reserach ethicsDigital literacy & reserach ethics
Digital literacy & reserach ethics
 
Social Media
Social MediaSocial Media
Social Media
 
It ethics undergraduates’ perception based on their awareness
It ethics undergraduates’ perception based on their awarenessIt ethics undergraduates’ perception based on their awareness
It ethics undergraduates’ perception based on their awareness
 
Research Proposal
Research ProposalResearch Proposal
Research Proposal
 
Intel PaPR Project Findings
Intel PaPR Project FindingsIntel PaPR Project Findings
Intel PaPR Project Findings
 
Johnsoncritique1
Johnsoncritique1Johnsoncritique1
Johnsoncritique1
 

Ähnlich wie Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An Inclusive Design Approach

EDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul SimonEDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul SimonPaul Simon
 
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...Ansgar Koene
 
Internet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 TutorialInternet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 TutorialKa_Kinder
 
Supporting user driven innovation activities in a crowdsourcing community
Supporting user driven innovation activities in a crowdsourcing communitySupporting user driven innovation activities in a crowdsourcing community
Supporting user driven innovation activities in a crowdsourcing communityMiia Kosonen
 
Prof. Melinda Laituri, Colorado State University | Ethics's Guidelines for Se...
Prof. Melinda Laituri, Colorado State University | Ethics's Guidelines for Se...Prof. Melinda Laituri, Colorado State University | Ethics's Guidelines for Se...
Prof. Melinda Laituri, Colorado State University | Ethics's Guidelines for Se...Kathmandu Living Labs
 
Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataAnsgar Koene
 
Online Misinformation: Challenges and Future Directions
Online Misinformation: Challenges and Future DirectionsOnline Misinformation: Challenges and Future Directions
Online Misinformation: Challenges and Future DirectionsMiriam Fernandez
 
The Challenges of Making Data Travel, by Sabina Leonelli
The Challenges of Making Data Travel, by Sabina LeonelliThe Challenges of Making Data Travel, by Sabina Leonelli
The Challenges of Making Data Travel, by Sabina LeonelliLEARN Project
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsUniversity of South Africa (Unisa)
 
Access to e-resources within the NHS in England: the role and impact of organ...
Access to e-resources within the NHS in England: the role and impact of organ...Access to e-resources within the NHS in England: the role and impact of organ...
Access to e-resources within the NHS in England: the role and impact of organ...Catherine Ebenezer
 
Data protection and social networks
Data protection and social networksData protection and social networks
Data protection and social networksblogzilla
 
Social Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsSocial Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsTheSRAOrg
 
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_smaAnsgar Koene
 
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral SymposiumNetnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral SymposiumUniversity of Southern California
 
Global Futures Intelligence System talk at WFSF 2013
Global Futures Intelligence System talk at WFSF 2013Global Futures Intelligence System talk at WFSF 2013
Global Futures Intelligence System talk at WFSF 2013Jerome Glenn
 
WAPWG 16_jan_ethicsoverview
WAPWG 16_jan_ethicsoverviewWAPWG 16_jan_ethicsoverview
WAPWG 16_jan_ethicsoverviewSara Day Thomson
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Kandy Woodfield
 

Ähnlich wie Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An Inclusive Design Approach (20)

EDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul SimonEDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul Simon
 
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
 
Internet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 TutorialInternet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 Tutorial
 
Supporting user driven innovation activities in a crowdsourcing community
Supporting user driven innovation activities in a crowdsourcing communitySupporting user driven innovation activities in a crowdsourcing community
Supporting user driven innovation activities in a crowdsourcing community
 
ViralVCD
ViralVCDViralVCD
ViralVCD
 
Harnessing the Potential of Social Networks: The ABCs of using social network...
Harnessing the Potential of Social Networks: The ABCs of using social network...Harnessing the Potential of Social Networks: The ABCs of using social network...
Harnessing the Potential of Social Networks: The ABCs of using social network...
 
Prof. Melinda Laituri, Colorado State University | Ethics's Guidelines for Se...
Prof. Melinda Laituri, Colorado State University | Ethics's Guidelines for Se...Prof. Melinda Laituri, Colorado State University | Ethics's Guidelines for Se...
Prof. Melinda Laituri, Colorado State University | Ethics's Guidelines for Se...
 
Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived data
 
Online Misinformation: Challenges and Future Directions
Online Misinformation: Challenges and Future DirectionsOnline Misinformation: Challenges and Future Directions
Online Misinformation: Challenges and Future Directions
 
The Challenges of Making Data Travel, by Sabina Leonelli
The Challenges of Making Data Travel, by Sabina LeonelliThe Challenges of Making Data Travel, by Sabina Leonelli
The Challenges of Making Data Travel, by Sabina Leonelli
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analytics
 
Access to e-resources within the NHS in England: the role and impact of organ...
Access to e-resources within the NHS in England: the role and impact of organ...Access to e-resources within the NHS in England: the role and impact of organ...
Access to e-resources within the NHS in England: the role and impact of organ...
 
Data protection and social networks
Data protection and social networksData protection and social networks
Data protection and social networks
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Social Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsSocial Media, Social Science and Research Ethics
Social Media, Social Science and Research Ethics
 
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_sma
 
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral SymposiumNetnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
 
Global Futures Intelligence System talk at WFSF 2013
Global Futures Intelligence System talk at WFSF 2013Global Futures Intelligence System talk at WFSF 2013
Global Futures Intelligence System talk at WFSF 2013
 
WAPWG 16_jan_ethicsoverview
WAPWG 16_jan_ethicsoverviewWAPWG 16_jan_ethicsoverview
WAPWG 16_jan_ethicsoverview
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
 

Mehr von i_scienceEU

Internet science conference
Internet science conferenceInternet science conference
Internet science conferencei_scienceEU
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...i_scienceEU
 
Privacy 2020 (Participants) EINS summer school
Privacy 2020 (Participants) EINS summer schoolPrivacy 2020 (Participants) EINS summer school
Privacy 2020 (Participants) EINS summer schooli_scienceEU
 
[participants Communicating Privacy Risks to Users] EINS summer school
[participants Communicating Privacy Risks to Users] EINS summer school[participants Communicating Privacy Risks to Users] EINS summer school
[participants Communicating Privacy Risks to Users] EINS summer schooli_scienceEU
 
Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...
Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...
Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...i_scienceEU
 
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th... Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...i_scienceEU
 
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...i_scienceEU
 
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...i_scienceEU
 
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...i_scienceEU
 
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...i_scienceEU
 
Caspar Bowden EINS Summer School
Caspar Bowden EINS Summer SchoolCaspar Bowden EINS Summer School
Caspar Bowden EINS Summer Schooli_scienceEU
 
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...i_scienceEU
 
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...i_scienceEU
 
Network of Excellence in Internet Science (Supported Activities, Callegati, U...
Network of Excellence in Internet Science (Supported Activities, Callegati, U...Network of Excellence in Internet Science (Supported Activities, Callegati, U...
Network of Excellence in Internet Science (Supported Activities, Callegati, U...i_scienceEU
 
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...i_scienceEU
 
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...i_scienceEU
 
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...i_scienceEU
 
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...i_scienceEU
 
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...i_scienceEU
 
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...i_scienceEU
 

Mehr von i_scienceEU (20)

Internet science conference
Internet science conferenceInternet science conference
Internet science conference
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
 
Privacy 2020 (Participants) EINS summer school
Privacy 2020 (Participants) EINS summer schoolPrivacy 2020 (Participants) EINS summer school
Privacy 2020 (Participants) EINS summer school
 
[participants Communicating Privacy Risks to Users] EINS summer school
[participants Communicating Privacy Risks to Users] EINS summer school[participants Communicating Privacy Risks to Users] EINS summer school
[participants Communicating Privacy Risks to Users] EINS summer school
 
Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...
Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...
Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...
 
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th... Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...
 
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...
 
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
 
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
 
Caspar Bowden EINS Summer School
Caspar Bowden EINS Summer SchoolCaspar Bowden EINS Summer School
Caspar Bowden EINS Summer School
 
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
 
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...
 
Network of Excellence in Internet Science (Supported Activities, Callegati, U...
Network of Excellence in Internet Science (Supported Activities, Callegati, U...Network of Excellence in Internet Science (Supported Activities, Callegati, U...
Network of Excellence in Internet Science (Supported Activities, Callegati, U...
 
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...
 
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...
 
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...
 
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...
 
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
 
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
 

Kürzlich hochgeladen

Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 

Kürzlich hochgeladen (20)

Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 

Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An Inclusive Design Approach

  • 1. Privacy Awareness: An inclusive design approach Lizzie Coles-Kemp, Information Security Group, Royal Holloway
  • 2.
  • 3. Outline •  Objectives of the project •  Research design •  Engagement evolution •  Lessons learned
  • 4. VOME •  A five party consortium •  Funded by Technology Strategy Board, EPSRC and ESRC •  Interdisciplinary project
  • 5.
  • 6. Goal •  Designing privacy awareness tools –  Both social and technological tools •  Underpinning the design with explanatory power to enable more efficient and effective tool deployment (prediction)
  • 7.
  • 8. Context •  On-line public service delivery –  Broad set of demographics –  Variable levels of digital and visual literacy –  Communities: service users, families of service users, service providers and third parties
  • 9. Contextualising the Debate •  Situated fieldwork –  Formal and informal education –  Older internet users –  NEETs –  Young parents •  Contextualised in the shifting landscape public service debate –  E.g. NEETs to NEATs
  • 10. Outputs •  Social interventions: –  Music video –  Short stories –  Game •  Technical interventions: –  Design principles for privacy awareness –  Cartographies of information flows –  Communication tools
  • 11.
  • 12. Proposition •  The value of the proposition depends on the ethos of the service –  Descriptive power –  Engagement –  Empowerment
  • 13. Outline •  Objectives of the project •  Research design •  Engagement evolution •  Lessons learned
  • 14. Overall Approach •  Mediated through gatekeepers •  Within the communities themselves •  In consultation with the community •  Mixed methods of engagement •  Across a range of demographics
  • 15. Panorama  of  the  City  of  New  York.  (Robert  Moses/Leeser  Associates  1964)  
  • 16. Conceptual Perspectives •  Three broad categories (Introna, 1997): –  privacy as no access to the person or the personal realm; –  privacy as control over personal information ; and –  privacy as freedom from judgement or scrutiny by others.
  • 17. Concern and Its Expression •  Information privacy concern refers to an individual s subjective views of fairness within the context of information privacy (Campbell 1997) •  Interestingly: no literature refers to how these concerns are expressed - either in the metaphors, images or languages used or in the means of expression
  • 18. Concern Trajectory •  Westin and Harris (1998): –  Privacy Fundamentalists, who view privacy as an especially high value which they feel very strongly about; –  Privacy Pragmatists, who too have strong feelings about privacy but can also see the benefits from surrendering some privacy in situations where they believe care is taken to prevent the misuse of this information; –  Privacy Unconcerned who have no real concerns about privacy or about how other people and organizations are using information about them
  • 19. Uta  Eisenreich,  Network/Teamwork  sociogram  2002  
  • 20. On-­‐line  or  Off-­‐line   •  Privacy  isn’t  either  off-­‐line  or  on-­‐line,  it’s  an   entangled  mesh   –   technology  mediated  privacy  is  situated  in  a   physical  world  (and  vice  versa).    
  • 21. Baseline  Survey   •  The  total  number  of  valid  responses  for  the  survey   was  1048.     •  Of  the  1048  respondents,  49.8%  (523)  were  male   and  50.2%  (525)  were  female     •  The  mean  age  was  41.0  years  (range:  18  –  82  years)   •  Used  quesQons  adapted  from  a  number  of   established  scales  including  Internet  Users   InformaQon  Privacy  Concerns.  
  • 22. IUIPC: Collection of Information ü  34.1% of the respondents strongly agree that they are concerned when online sites collect their personal information. Only about 16.1% of the respondents disagree that the collection of personal information by online sites is a concern.
  • 23. IUIPC: Control of Information ü  46.8% of the respondents strongly agree that online sites should provide them with the right to exercise control and autonomy over decisions about how their information is collected, use and shared. Only 11.6% of the respondents disagree that having control over collected information about themselves is a concern.
  • 24. IUIPC: Awareness of Privacy Practices ü  51.2% of the respondents strongly agree that Internet sites seeking information online should disclose the way the data are collected, processed and used. Only 10.4% feel that having awareness of such privacy practices is not a concern.
  • 25. Influencers •  Age •  Gender •  Internet experience •  Levels of education
  • 26. Practices •  Two categories of privacy practice identified (Buchannan et al 2007): –  common sense steps (general caution) –  technical protection of privacy •  Gender divide: females more likely to undertake general caution and males more likely to undertake technical protection measures
  • 27. Off-line Responses to On-line Problems •  VOME survey agreed with the gender hypothesis •  The VOME fieldwork did not: –  Much broader range of general caution activities undertaken by both men and women –  Use of off-line recommender networks (social) –  The use of technical protection measures depends on who manages the technology
  • 28. Two Dominant Paradoxes •  In VOME research, the following “paradoxes” are dominant: –  Users are concerned about their privacy, but are unwilling to engage with privacy technologies. This is in line with the findings discussed in Buchanan et al.’s work (2007) •  FW: But this doesn’t mean there are no privacy protection practices –  Users want autonomy over on-line privacy but are prepared to trade their privacy in return for some reward. This is in-line with the paradoxes discussed in, for example, Norberg et al.’s work (2007) •  FW: This does not necessarily mean a financial reward.
  • 29.
  • 30.
  • 31. Paradox or Just Different Choices? •  VOME at the point of practice shows that: –  Privacy journey is on-going –  Privacy protection practices are related to the relationship in question and the trust within that relationship –  Different relationships have different concerns related to them and different practices (foregrounding) –  Choice of foregrounding and lack of awareness of privacy risks result in weaker privacy protection choices
  • 32. Question.. •  How do we find out more about those choices? •  Interviews and focus groups delivered as expected answers •  Surveys delivered as expected patterns •  Neither approach told us much about practices, their link to concerns and how privacy awareness was built •  Neither approach reached into the liminal communities
  • 33. Outline •  Objectives of the project •  Research design •  Engagement evolution •  Lessons learned
  • 34. Who We Engaged With •  Service providers –  Public service providers (local government) –  Central government –  Application developers –  Third sector –  Commercial service providers •  General public –  Community groups –  Young people –  Vulnerable young adults –  General public
  • 35. Methods •  Traditional social research methods: –  Survey –  Interview –  Focus group •  User-centric design methods: –  Questionnaire –  User evaluation –  Interview •  Participatory methods: –  Artistic engagement –  Co-design
  • 36. Traditional Social Research •  Pros –  Can compare against existing baselines –  Using known and trusted approaches –  Researchers familiar with the role –  Obtain a solid overview of patterns of practice •  Cons –  Difficult to move beyond the known –  Participants unfamiliar with the role and fear failure –  Language barrier –  Lengthy process –  Technology can have a passive role
  • 37.
  • 38. User-Centric Design •  Pros –  Derive requirements from the users of existing and potential systems –  Engages with the owners of the problem space and with the potential users of any outputs; therefore gains a range of perspectives –  Technology has an equal role in the research •  Cons –  Affirmative design –  Language barrier –  Participants are often passive actors
  • 39.
  • 40. Participatory Methods •  Pros –  Participants and researchers are on a more equal footing –  Language barrier reduces –  Participants drive the direction of the research –  Output that can be used in different ways –  Strong explanatory power •  Cons –  A less well-known approach –  Expensive –  Resource intensive for set-up –  Risk of failure
  • 41.
  • 42. Outline •  Objectives of the project •  Research design •  Engagement evolution •  Lessons learned
  • 43. Lessons Learned •  Can be divided into three groups: –  Control Tension –  Situation –  Segmentation
  • 44. Where to Next •  Three case studies for technical interventions: –  Sunderland City Council’s Child Poverty Portal –  Information values map for Safe@Last –  Community support network for community action (Pallion, West Sunderland) •  Evaluation of the game and music video: –  Social marketing methods –  User experience evaluations
  • 45.
  • 46. Thank you •  More details can be found at: http://www.vome.org.uk •  Publications at: http://www.vome.org.uk/publications/ •  Video collection at: http://www.vome.org.uk/videos/ •  Interventions at: http://www.vome.org.uk/toolkit/