SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
Reframing
Usable Privacy + Security
to Design for ‘Cyber Health’
Cori Faklaris | March 29, 2019
Lightning talk for the 2019 Women in Cybersecurity conference (WiCyS 2019), Pittsburgh, Penn., USA
Human-Computer Interaction Institute
Takeaways:
● Health as a lens for security design
● Design model adapts the
Transtheoretical Model of (Health)
Behavior Change
● How to use this model in practice
2
3
4
Social contagion
Herd immunity
Viral hoaxes
Source: “The Transtheoretical Model ( Stages of Change)”. 2016. Boston University School of Public Health. Last visited Feb. 7, 2018
at http://sphweb.bumc.bu.edu/otlt/MPH-Modules/SB/BehavioralChangeTheories/BehavioralChangeTheories6.html
(Awareness)
(Motivation)
(Knowledge)
(Resistance)
(Reinforcement)
(Denial)
5
Pre-Contemplation
AW
ARENESS
MOTIVATION
Contemplation
Preparation
(Determination)Action
M
aintenance
-Regulations
-Government
-Society
-Culture
Relapse
-Larger
system
environment
-Global
internet
infrastructure
SELF-EFFICACY
TEMPTATION
KNOWLEDGE
REINFORCEMENT
R
ESISTAN
C
E
DENIAL
SITUATIONAL FACTORS
SOCIAL FACTORS
OTHER
INDIVIDUAL
FACTORS
EXTERNAL
FACTORS
EXTERNAL
FACTORS
6Cori Faklaris - July 2018 - Carnegie Mellon Univ. - Page 6
7
Get from this …
“I don’t need to
use/have time to
use/ these privacy
and security
practices.”
Stage 1: Precontemplation (or “Resistance to Change”)
… To this ...
“It may be a good
idea to use these
privacy and
security
practices.”
Create Awareness
… Using these:
● Feedback
● Education
● Reading materials
● Storytelling
● Media campaigns
● Empathy training
8
Get from this …
“I worry that I don’t
use these privacy
and security
practices.”
… To this ...
“I will regret it if I
do not start using
these privacy and
security practices.”
Create Motivation
… Using these:
● “Family interventions”
● Role playing
● Documentaries
● Imagery
● Value reflection and
clarification
Stages 2-3: Contemplation/Preparation (“Receptiveness”)
9
Stages 2-3: Contemplation/Preparation (“Receptiveness”)
Get from this …
“I want to
change/need to
change my privacy
and security
practices.”
… To this ...
“I feel better for
commiting to my
chosen privacy
and security
practices.”
Agency/Knowledge
… Using these:
● Empowerment
procedures + policies
● Public testimonials
● Providing choices among
2-3 alternatives
● Advocacy at the margins
10
Stages 4-5: Action + Maintenance (“Engagement”)
Get from this …
“I intend to
use/am actively
using/am
committed to
these privacy and
security
practices.”
… To this ...
“I ask for help with
using/am
successful with
using/keep
improving my use
of privacy and
security practices.”
Reinforce Behavior
… Using these:
● Rewards and
punishments
● Controlling stimuli to
nudge behaviors
● Environmental changes
● Groups and coaching
● Lens: Security as health
● Design model adapts TTM
● How to use the model
Any questions?
You can find me at
○ Twitter: @heycori | Email: heycori @cmu.edu
○ Website: http://corifaklaris.com
11

Weitere ähnliche Inhalte

Ähnlich wie Reframing Usable Privacy + Security to Design for 'Cyber Health'

Research Methodology For A Researcher
Research Methodology For A ResearcherResearch Methodology For A Researcher
Research Methodology For A Researcher
Renee Wardowski
 
ideas-safety-bbs-presentation.pptx
ideas-safety-bbs-presentation.pptxideas-safety-bbs-presentation.pptx
ideas-safety-bbs-presentation.pptx
binasnasar1
 
CHI abstract camera ready
CHI abstract camera readyCHI abstract camera ready
CHI abstract camera ready
Mark Sinclair
 
Discussion 1 Affinity Group Checkpoint #4This week, you will on
Discussion 1 Affinity Group Checkpoint #4This week, you will onDiscussion 1 Affinity Group Checkpoint #4This week, you will on
Discussion 1 Affinity Group Checkpoint #4This week, you will on
VinaOconner450
 

Ähnlich wie Reframing Usable Privacy + Security to Design for 'Cyber Health' (12)

Research Methodology For A Researcher
Research Methodology For A ResearcherResearch Methodology For A Researcher
Research Methodology For A Researcher
 
Sleeping with Cognitive Capital
Sleeping with Cognitive CapitalSleeping with Cognitive Capital
Sleeping with Cognitive Capital
 
Dual Approaches for Integrating Ethics into the Information Systems Curriculum
Dual Approaches for Integrating Ethics into the Information Systems CurriculumDual Approaches for Integrating Ethics into the Information Systems Curriculum
Dual Approaches for Integrating Ethics into the Information Systems Curriculum
 
Addressing vaccine misinformation beyond clinical settings.pdf
Addressing vaccine misinformation beyond clinical settings.pdfAddressing vaccine misinformation beyond clinical settings.pdf
Addressing vaccine misinformation beyond clinical settings.pdf
 
re
rere
re
 
Tackling issues earlier through smarter use of data
Tackling issues earlier through smarter use of dataTackling issues earlier through smarter use of data
Tackling issues earlier through smarter use of data
 
ideas-safety-bbs-presentation.pptx
ideas-safety-bbs-presentation.pptxideas-safety-bbs-presentation.pptx
ideas-safety-bbs-presentation.pptx
 
CHI abstract camera ready
CHI abstract camera readyCHI abstract camera ready
CHI abstract camera ready
 
A Hypothesis is Placed to Justify the Extendibility of Recommender System/ Re...
A Hypothesis is Placed to Justify the Extendibility of Recommender System/ Re...A Hypothesis is Placed to Justify the Extendibility of Recommender System/ Re...
A Hypothesis is Placed to Justify the Extendibility of Recommender System/ Re...
 
Discussion 1 Affinity Group Checkpoint #4This week, you will on
Discussion 1 Affinity Group Checkpoint #4This week, you will onDiscussion 1 Affinity Group Checkpoint #4This week, you will on
Discussion 1 Affinity Group Checkpoint #4This week, you will on
 
Research Paradigms lec2
Research Paradigms lec2Research Paradigms lec2
Research Paradigms lec2
 
Communication For Change: A Short Guide to Social and Behavior Change (SBCC) ...
Communication For Change: A Short Guide to Social and Behavior Change (SBCC) ...Communication For Change: A Short Guide to Social and Behavior Change (SBCC) ...
Communication For Change: A Short Guide to Social and Behavior Change (SBCC) ...
 

Mehr von Cori Faklaris

Mehr von Cori Faklaris (14)

Human Factors at the Grid Edge
Human Factors at the Grid EdgeHuman Factors at the Grid Edge
Human Factors at the Grid Edge
 
An Introduction to Generative AI
An Introduction  to Generative AIAn Introduction  to Generative AI
An Introduction to Generative AI
 
Behavior Change Using Social Influences
Behavior Change Using Social InfluencesBehavior Change Using Social Influences
Behavior Change Using Social Influences
 
Designing for Usable Security and Privacy
Designing for Usable Security and PrivacyDesigning for Usable Security and Privacy
Designing for Usable Security and Privacy
 
A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)
 
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
 
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
 
Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017
 
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
 
"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides
 
Together: An app to foster community for young urbanites
Together: An app to foster community for young urbanitesTogether: An app to foster community for young urbanites
Together: An app to foster community for young urbanites
 
The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile
 
5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student
 
Social media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement onlineSocial media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement online
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Reframing Usable Privacy + Security to Design for 'Cyber Health'

  • 1. Reframing Usable Privacy + Security to Design for ‘Cyber Health’ Cori Faklaris | March 29, 2019 Lightning talk for the 2019 Women in Cybersecurity conference (WiCyS 2019), Pittsburgh, Penn., USA Human-Computer Interaction Institute
  • 2. Takeaways: ● Health as a lens for security design ● Design model adapts the Transtheoretical Model of (Health) Behavior Change ● How to use this model in practice 2
  • 3. 3
  • 5. Source: “The Transtheoretical Model ( Stages of Change)”. 2016. Boston University School of Public Health. Last visited Feb. 7, 2018 at http://sphweb.bumc.bu.edu/otlt/MPH-Modules/SB/BehavioralChangeTheories/BehavioralChangeTheories6.html (Awareness) (Motivation) (Knowledge) (Resistance) (Reinforcement) (Denial) 5
  • 7. 7 Get from this … “I don’t need to use/have time to use/ these privacy and security practices.” Stage 1: Precontemplation (or “Resistance to Change”) … To this ... “It may be a good idea to use these privacy and security practices.” Create Awareness … Using these: ● Feedback ● Education ● Reading materials ● Storytelling ● Media campaigns ● Empathy training
  • 8. 8 Get from this … “I worry that I don’t use these privacy and security practices.” … To this ... “I will regret it if I do not start using these privacy and security practices.” Create Motivation … Using these: ● “Family interventions” ● Role playing ● Documentaries ● Imagery ● Value reflection and clarification Stages 2-3: Contemplation/Preparation (“Receptiveness”)
  • 9. 9 Stages 2-3: Contemplation/Preparation (“Receptiveness”) Get from this … “I want to change/need to change my privacy and security practices.” … To this ... “I feel better for commiting to my chosen privacy and security practices.” Agency/Knowledge … Using these: ● Empowerment procedures + policies ● Public testimonials ● Providing choices among 2-3 alternatives ● Advocacy at the margins
  • 10. 10 Stages 4-5: Action + Maintenance (“Engagement”) Get from this … “I intend to use/am actively using/am committed to these privacy and security practices.” … To this ... “I ask for help with using/am successful with using/keep improving my use of privacy and security practices.” Reinforce Behavior … Using these: ● Rewards and punishments ● Controlling stimuli to nudge behaviors ● Environmental changes ● Groups and coaching
  • 11. ● Lens: Security as health ● Design model adapts TTM ● How to use the model Any questions? You can find me at ○ Twitter: @heycori | Email: heycori @cmu.edu ○ Website: http://corifaklaris.com 11