Diese Präsentation wurde erfolgreich gemeldet.
Wir verwenden Ihre LinkedIn Profilangaben und Informationen zu Ihren Aktivitäten, um Anzeigen zu personalisieren und Ihnen relevantere Inhalte anzuzeigen. Sie können Ihre Anzeigeneinstellungen jederzeit ändern.
designingforPrivacy
intheageofmagic
Faith McCreary
The work being shared today
was a collaboration with
Alex Zafiroglu &
Heather Patterson
Intel CorporationHeather
Alex
INCREASINGLYVISIBLE
BLURRINGBOUNDARIES
Source: http://www.michaelbeitz.com/home.html
SMARTORCREEPY?
WONDERINGWHY
Confirm?
Reference: https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-
november-201...
Privacy≠Security
LEGALGUARDRAILS
Source: https://upload.wikimedia.org/wikipedia/commons/6/6a/Sign_in_Niagara_Falls,_Ontario,_warning_people...
bydesign
bydesign
1.PROACTIVENOTREACTIVE;PREVENTATIVENOTREMEDIAL
2.PRIVACYASTHEDEFAULTSETTING
3.PRIVACYEMBEDDEDINTODESIGN
4.FULLFUN...
DigitalInvisibilityOptical camouflage by Susumu Tachi of the University of Tokyo
https://commons.wikimedia.org/wiki/File:A...
CONTEXTMATTERS
PRIVACYSEGMENTATION
INFORMATIONSENSITIVITYMODEL
CONTEXTUALPRIVACYPROBES
TAXONOMYOFPRIVACYCONCERNS
BEHINDtheCurtain
1PRIVACYSEGMENTATION
FUNDAMENTALIST
PRAGMITIST
UNCONCERNED
Source: https://c1.staticflickr.com/8/7469/16263996296_aa8767d9...
2
3INFORMATIONSENSITIVITYMODEL
Stable Clusters of Expectations and Preferences for Boundaries
INFORMATION
SENSITIVITY
SHARED
INFORMATION
SENSITIVITY
TRADED
INFORMATION
SENSITIVITY
SECRET
INFORMATION
SENSITIVITY
TATTLED
4TAXONOMYOFPRIVACYCONCERNS
4CATEGORIES
16TYPES
LESSISMORE
INFORMATION COLLECTION
UNDERSTAND PURPOSE
LIMITCAPTURE
MANAGEAPPEARANCES
BEWARE LOCATION TRACKING
DONOHARMINFORMATION PROCESSING
SAFEGUARD DATA
LIMITUSE
TRANSLUCENCEBUILDSTRUST
INFORMATION DISSEMINATION
ACCURACY
OPENNESS
EASY CONTROL
OPAQUENESS
urce: https://c1.staticflickr.com/6/5567/18806435646_b66ba85bac_b.jpg
USEFULNOTDISRUPTIVE
INFORMATION INVASIONS
AIMFORINVI...
WHATWILLYOUDO?
Email: Faith.A.Mccreary@intel.com
UX STRAT USA 2017: Dr. Faith McCreary, "Strategy for Designing Privacy into the Internet of Things"
UX STRAT USA 2017: Dr. Faith McCreary, "Strategy for Designing Privacy into the Internet of Things"
UX STRAT USA 2017: Dr. Faith McCreary, "Strategy for Designing Privacy into the Internet of Things"
Nächste SlideShare
Wird geladen in …5
×

UX STRAT USA 2017: Dr. Faith McCreary, "Strategy for Designing Privacy into the Internet of Things"

3.960 Aufrufe

Veröffentlicht am

UX STRAT USA 2017 presentation by Dr. Faith McCreary, Principal Engineer, Intel Corporation

Veröffentlicht in: Internet
  • Als Erste(r) kommentieren

UX STRAT USA 2017: Dr. Faith McCreary, "Strategy for Designing Privacy into the Internet of Things"

  1. 1. designingforPrivacy intheageofmagic Faith McCreary
  2. 2. The work being shared today was a collaboration with Alex Zafiroglu & Heather Patterson Intel CorporationHeather Alex
  3. 3. INCREASINGLYVISIBLE
  4. 4. BLURRINGBOUNDARIES Source: http://www.michaelbeitz.com/home.html
  5. 5. SMARTORCREEPY?
  6. 6. WONDERINGWHY
  7. 7. Confirm? Reference: https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report- november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf How?
  8. 8. Privacy≠Security
  9. 9. LEGALGUARDRAILS Source: https://upload.wikimedia.org/wikipedia/commons/6/6a/Sign_in_Niagara_Falls,_Ontario,_warning_people_not_to_climb_over_guard_rail.jpg
  10. 10. bydesign
  11. 11. bydesign 1.PROACTIVENOTREACTIVE;PREVENTATIVENOTREMEDIAL 2.PRIVACYASTHEDEFAULTSETTING 3.PRIVACYEMBEDDEDINTODESIGN 4.FULLFUNCTIONALITY–POSITIVE-SUM,NOTZERO-SUM 5.END-TO-ENDSECURITY–FULLLIFECYCLEPROTECTION 6.VISIBILITYANDTRANSPARENCY–KEEPITOPEN 7.RESPECTFORUSERPRIVACY–KEEPITUSER-CENTRIC
  12. 12. DigitalInvisibilityOptical camouflage by Susumu Tachi of the University of Tokyo https://commons.wikimedia.org/wiki/File:An_invisibility_cloak_using_optical_camouflage_by_Susumu_Tachi.jpg
  13. 13. CONTEXTMATTERS
  14. 14. PRIVACYSEGMENTATION INFORMATIONSENSITIVITYMODEL CONTEXTUALPRIVACYPROBES TAXONOMYOFPRIVACYCONCERNS BEHINDtheCurtain
  15. 15. 1PRIVACYSEGMENTATION FUNDAMENTALIST PRAGMITIST UNCONCERNED Source: https://c1.staticflickr.com/8/7469/16263996296_aa8767d970_b.jpg
  16. 16. 2
  17. 17. 3INFORMATIONSENSITIVITYMODEL Stable Clusters of Expectations and Preferences for Boundaries
  18. 18. INFORMATION SENSITIVITY SHARED
  19. 19. INFORMATION SENSITIVITY TRADED
  20. 20. INFORMATION SENSITIVITY SECRET
  21. 21. INFORMATION SENSITIVITY TATTLED
  22. 22. 4TAXONOMYOFPRIVACYCONCERNS 4CATEGORIES 16TYPES
  23. 23. LESSISMORE INFORMATION COLLECTION UNDERSTAND PURPOSE LIMITCAPTURE MANAGEAPPEARANCES BEWARE LOCATION TRACKING
  24. 24. DONOHARMINFORMATION PROCESSING SAFEGUARD DATA LIMITUSE
  25. 25. TRANSLUCENCEBUILDSTRUST INFORMATION DISSEMINATION ACCURACY OPENNESS EASY CONTROL OPAQUENESS
  26. 26. urce: https://c1.staticflickr.com/6/5567/18806435646_b66ba85bac_b.jpg USEFULNOTDISRUPTIVE INFORMATION INVASIONS AIMFORINVISIBLE ENCOURAGE SHUT-OFF
  27. 27. WHATWILLYOUDO?
  28. 28. Email: Faith.A.Mccreary@intel.com

×