SlideShare a Scribd company logo
1 of 17
Download to read offline
decoding
PRIVACY
Tanja KORNBERGER I Diana SCHNEIDER 										 ICED’13 Conference Presentation
BRISKROAD
ambassadors of design thinking
perceptions,conflicts&strategies
of privacy in the mobile world
©-http://experttechnologyreview.com/predic-
tions-for-mobile-technology-in-2013/
PROBLEM FIELD
	RESEARCH APPROACH
	 DEVELOPER INSIGHTS
	DESIGN TOOL
1
2
3
4
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy2
problem field
1Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy3
interpersonal
subjective
individual
creative
nuanced
impersonal
objective
generic
basic
trivial
0011010110001
0101000101110111
01010101111101
10111001010
00001010111101
100011101010
11101001110
00011101010
10100011
29
55
30
56
check-in
31
57
32
58
33
59
26
52
34
60
27
53
35
28
54
password: ***********
private sphere vs. mobile solutions
?
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy4
2
research approach
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy5
ONLINE PRE-SURVEY
Privacy Perceptions & Conflicts
CROWDSOURCED BETA
Privacy in Mobile Tech.
10
197
11
DEVELOPER Interviews
SFO
DEVELOPER Interviews
MUC
DESIGN
ENGINEERING
TOOL
REAL-TIME USER
IDEA PLATFORM
it takes two
investigating both perspectives
now.
goalt=0
DEVELOPERUSER
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy6
qualitative methodology
interview transcription and analysis of developer interviews in SFO and MUC
interviews min. each transcription qualitative
codes
insight
categories
selected
clusters
21 40 63 5
3
1000+
tagged quotes
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy7
3
developer insights
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy8
layered concept of privacy
privacy as a concrete model of informational control
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy9
SMARTPHONEUSERUSER NETWORK
DEVICE
MANUFACTURER
OS PROVIDER
APP
MANUFACTURER
FREELANCE
Developer
IN-HOUSE
Developer
Product
MANAGER
to use or not to use
dissecting the responsibility of stakeholders
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy10
Degree of TECHNOLOGY INTERACTION
DegreeofUSERINITIATIVE
PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER
ACTIVE
in exchange with the environment
PASSIVE
restricted to oneself
PHYSICAL
layer
USER
layer
SOLUTION HEATMAP
a fine line
privacy strategies need to consider both user and technology
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy11
Degree of TECHNOLOGY INTERACTION
DegreeofUSERINITIATIVE
PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER
ACTIVE
in exchange with the environment
PASSIVE
restricted to oneself
PHYSICAL
layer
USER
layer
SOLUTION HEATMAP
opt-in instead of opt-out,
educational trainings
encrypted storage,
haptic feedback
explain reasons for
app permissions
a fine line
privacy strategies need to consider both user and technology
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy12
conclusions
privacy strategies need to consider both user and technology
knowledge communicationresponsibility participation
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy13
design tool
beta-version to design privacy in technology
4Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy14
decoding
PRIVACYperceptions, conflicts and strategies of privacy in the mobile world
strategies
situation
description
location
participants
decoding
PRIVACYperceptions, conflicts and strategies of privacy in the mobile world
conflicts
participants
ISOLATE
Degree of INTERACTION
INTERACT
ILLUSORYENVRONMENT
SOLITUDE
INDIV
IDUALCONTENT
ENVIRONMENT
PEER GROUP
INTE
RACTION
IND
IVIDUALEXPERIENCEOFCOLLECTIVITY
PRODUCT
FRIENDSHIP
&
RELATEDNESS
C
O
LLECTIVEEXPERIENCE
BODY
INTIMAC
Y
C
REATIONOFCONT-
ISOLATE
Degree of INTERACTION
INTERACT
ILLUSORYENVRONMENT
SOLITUDE
INDIV
IDUALCONTENT
ENVIRONMENT
PEER GROUP
INTE
RACTION
IND
IVIDUALEXPERIENCEOFCOLLECTIVITY
PRODUCT
FRIENDSHIP
&
RELATEDNESS
C
O
LLECTIVEEXPERIENCE
BODY
INTIMAC
Y
C
REATIONOFCONT-
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER
SOLUTION HEATMAP
PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER
SOLUTION HEATMAP
privacy DEFINITIONS
privacy CONFLICTS
privacy STRATEGIES
decoding
PRIVACYdesign tool
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
LOSS TROL
over his /
her ivacy
OF CONTROL
over his /
her SOCIAL privacy
TROL
over his /
privacy
CONTROL TAKE-OVER
of another‘s PHYSICAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s SOCIAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s CONTENTUAL
privacy over one‘s own
INTRUSION
Locus of TAKING CONTROL
LOSS
intrinsic
CONTROL
LOSS TROL
over his /
her ivacy
OF CONTROL
over his /
her SOCIAL privacy
TROL
over his /
privacy
CONTROL TAKE-OVER
of another‘s PHYSICAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s SOCIAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s CONTENTUAL
privacy over one‘s own
INTRUSION
Locus of TAKING CONTROL
LOSS
intrinsic
CONTROL
CEAL
OUTSOURCE
OWN S
MOBILE TECHNOLOGIES
CEAL
OUTSOURCE
OWN S
MOBILE TECHNOLOGIES
user insights fuel developer processes
raising awareness & understanding through a workable design tool
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy15
www.decodingprivacy.com
Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy16
Tanja KORNBERGER
Privacy Researcher
tanja.kornberger@cdtm.de
www.cdtm.de
Diana SCHNEIDER
Design Thinker l Founder
d.schneider@briskroad.com
www.briskroad.com
BRISKROAD
ambassadors of design thinking
contribute!
feedback, questions, suggestions?
@Tanja KORNBERGER I Diana SCHNEIDER 										 	 		 ICED’13 I Decoding Privacy17

More Related Content

Similar to DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World

Color based android shuffling pattern lock
Color based android shuffling pattern lockColor based android shuffling pattern lock
Color based android shuffling pattern lockIRJET Journal
 
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...Feroot
 
5 Keys to Designing UX That Drives Patient Engagement
5 Keys to Designing UX That Drives Patient Engagement5 Keys to Designing UX That Drives Patient Engagement
5 Keys to Designing UX That Drives Patient EngagementPointClear Solutions
 
ZION: Security and Internet of Things
ZION: Security and Internet of ThingsZION: Security and Internet of Things
ZION: Security and Internet of ThingsAnkam Karthik
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingShivam Singh
 
Privacy by Design workshop for Developers - School for Computer Science (HBO-...
Privacy by Design workshop for Developers - School for Computer Science (HBO-...Privacy by Design workshop for Developers - School for Computer Science (HBO-...
Privacy by Design workshop for Developers - School for Computer Science (HBO-...Anne Marleen
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYIRJET Journal
 
Design Do's and Don'ts for Great AR
Design Do's and Don'ts for Great ARDesign Do's and Don'ts for Great AR
Design Do's and Don'ts for Great AREvelina Deleanu
 
Andrew Newman UX director
Andrew Newman UX directorAndrew Newman UX director
Andrew Newman UX directorAndrew Newman
 
Digital jewellery
Digital jewellery Digital jewellery
Digital jewellery harish kumar
 
Digital jewellery final report
Digital jewellery final reportDigital jewellery final report
Digital jewellery final reportDuggirala Madhu
 
TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...Ann Wuyts
 
Six key business / tech trends and how they're impacting IT investment and go...
Six key business / tech trends and how they're impacting IT investment and go...Six key business / tech trends and how they're impacting IT investment and go...
Six key business / tech trends and how they're impacting IT investment and go...MWD Advisors
 
Designing for Sensors 
& the Future of Experiences
Designing for Sensors 
& the Future of ExperiencesDesigning for Sensors 
& the Future of Experiences
Designing for Sensors 
& the Future of ExperiencesJeremy Johnson
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agendaFuture Agenda
 

Similar to DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World (20)

Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Color based android shuffling pattern lock
Color based android shuffling pattern lockColor based android shuffling pattern lock
Color based android shuffling pattern lock
 
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
 
5 Keys to Designing UX That Drives Patient Engagement
5 Keys to Designing UX That Drives Patient Engagement5 Keys to Designing UX That Drives Patient Engagement
5 Keys to Designing UX That Drives Patient Engagement
 
ZION: Security and Internet of Things
ZION: Security and Internet of ThingsZION: Security and Internet of Things
ZION: Security and Internet of Things
 
Accessible Privacy and Security
Accessible Privacy and SecurityAccessible Privacy and Security
Accessible Privacy and Security
 
Writing effective crisis scenarios
Writing effective crisis scenariosWriting effective crisis scenarios
Writing effective crisis scenarios
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using Watermarking
 
Privacy by Design workshop for Developers - School for Computer Science (HBO-...
Privacy by Design workshop for Developers - School for Computer Science (HBO-...Privacy by Design workshop for Developers - School for Computer Science (HBO-...
Privacy by Design workshop for Developers - School for Computer Science (HBO-...
 
Cyber Threat Intel : Overview
Cyber Threat Intel : OverviewCyber Threat Intel : Overview
Cyber Threat Intel : Overview
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
 
Design Do's and Don'ts for Great AR
Design Do's and Don'ts for Great ARDesign Do's and Don'ts for Great AR
Design Do's and Don'ts for Great AR
 
Andrew Newman UX director
Andrew Newman UX directorAndrew Newman UX director
Andrew Newman UX director
 
Digital jewellery
Digital jewellery Digital jewellery
Digital jewellery
 
Digital jewellery final report
Digital jewellery final reportDigital jewellery final report
Digital jewellery final report
 
TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...
 
Six key business / tech trends and how they're impacting IT investment and go...
Six key business / tech trends and how they're impacting IT investment and go...Six key business / tech trends and how they're impacting IT investment and go...
Six key business / tech trends and how they're impacting IT investment and go...
 
Designing for Sensors 
& the Future of Experiences
Designing for Sensors 
& the Future of ExperiencesDesigning for Sensors 
& the Future of Experiences
Designing for Sensors 
& the Future of Experiences
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
 

Recently uploaded

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 

Recently uploaded (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 

DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mobile World

  • 1. decoding PRIVACY Tanja KORNBERGER I Diana SCHNEIDER ICED’13 Conference Presentation BRISKROAD ambassadors of design thinking perceptions,conflicts&strategies of privacy in the mobile world ©-http://experttechnologyreview.com/predic- tions-for-mobile-technology-in-2013/
  • 2. PROBLEM FIELD RESEARCH APPROACH DEVELOPER INSIGHTS DESIGN TOOL 1 2 3 4 Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy2
  • 3. problem field 1Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy3
  • 5. 2 research approach Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy5
  • 6. ONLINE PRE-SURVEY Privacy Perceptions & Conflicts CROWDSOURCED BETA Privacy in Mobile Tech. 10 197 11 DEVELOPER Interviews SFO DEVELOPER Interviews MUC DESIGN ENGINEERING TOOL REAL-TIME USER IDEA PLATFORM it takes two investigating both perspectives now. goalt=0 DEVELOPERUSER Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy6
  • 7. qualitative methodology interview transcription and analysis of developer interviews in SFO and MUC interviews min. each transcription qualitative codes insight categories selected clusters 21 40 63 5 3 1000+ tagged quotes Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy7
  • 8. 3 developer insights Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy8
  • 9. layered concept of privacy privacy as a concrete model of informational control Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy9
  • 10. SMARTPHONEUSERUSER NETWORK DEVICE MANUFACTURER OS PROVIDER APP MANUFACTURER FREELANCE Developer IN-HOUSE Developer Product MANAGER to use or not to use dissecting the responsibility of stakeholders Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy10
  • 11. Degree of TECHNOLOGY INTERACTION DegreeofUSERINITIATIVE PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER ACTIVE in exchange with the environment PASSIVE restricted to oneself PHYSICAL layer USER layer SOLUTION HEATMAP a fine line privacy strategies need to consider both user and technology Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy11
  • 12. Degree of TECHNOLOGY INTERACTION DegreeofUSERINITIATIVE PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER ACTIVE in exchange with the environment PASSIVE restricted to oneself PHYSICAL layer USER layer SOLUTION HEATMAP opt-in instead of opt-out, educational trainings encrypted storage, haptic feedback explain reasons for app permissions a fine line privacy strategies need to consider both user and technology Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy12
  • 13. conclusions privacy strategies need to consider both user and technology knowledge communicationresponsibility participation Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy13
  • 14. design tool beta-version to design privacy in technology 4Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy14
  • 15. decoding PRIVACYperceptions, conflicts and strategies of privacy in the mobile world strategies situation description location participants decoding PRIVACYperceptions, conflicts and strategies of privacy in the mobile world conflicts participants ISOLATE Degree of INTERACTION INTERACT ILLUSORYENVRONMENT SOLITUDE INDIV IDUALCONTENT ENVIRONMENT PEER GROUP INTE RACTION IND IVIDUALEXPERIENCEOFCOLLECTIVITY PRODUCT FRIENDSHIP & RELATEDNESS C O LLECTIVEEXPERIENCE BODY INTIMAC Y C REATIONOFCONT- ISOLATE Degree of INTERACTION INTERACT ILLUSORYENVRONMENT SOLITUDE INDIV IDUALCONTENT ENVIRONMENT PEER GROUP INTE RACTION IND IVIDUALEXPERIENCEOFCOLLECTIVITY PRODUCT FRIENDSHIP & RELATEDNESS C O LLECTIVEEXPERIENCE BODY INTIMAC Y C REATIONOFCONT- OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER SOLUTION HEATMAP PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER SOLUTION HEATMAP privacy DEFINITIONS privacy CONFLICTS privacy STRATEGIES decoding PRIVACYdesign tool OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES LOSS TROL over his / her ivacy OF CONTROL over his / her SOCIAL privacy TROL over his / privacy CONTROL TAKE-OVER of another‘s PHYSICAL privacy over one‘s own CONTROL TAKE-OVER of another‘s SOCIAL privacy over one‘s own CONTROL TAKE-OVER of another‘s CONTENTUAL privacy over one‘s own INTRUSION Locus of TAKING CONTROL LOSS intrinsic CONTROL LOSS TROL over his / her ivacy OF CONTROL over his / her SOCIAL privacy TROL over his / privacy CONTROL TAKE-OVER of another‘s PHYSICAL privacy over one‘s own CONTROL TAKE-OVER of another‘s SOCIAL privacy over one‘s own CONTROL TAKE-OVER of another‘s CONTENTUAL privacy over one‘s own INTRUSION Locus of TAKING CONTROL LOSS intrinsic CONTROL CEAL OUTSOURCE OWN S MOBILE TECHNOLOGIES CEAL OUTSOURCE OWN S MOBILE TECHNOLOGIES user insights fuel developer processes raising awareness & understanding through a workable design tool Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy15
  • 16. www.decodingprivacy.com Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy16
  • 17. Tanja KORNBERGER Privacy Researcher tanja.kornberger@cdtm.de www.cdtm.de Diana SCHNEIDER Design Thinker l Founder d.schneider@briskroad.com www.briskroad.com BRISKROAD ambassadors of design thinking contribute! feedback, questions, suggestions? @Tanja KORNBERGER I Diana SCHNEIDER ICED’13 I Decoding Privacy17