SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
2010 CRC PhD Student Conference




 “Privacy-Shake”, a Haptic Interface for Managing Privacy
     Settings in Mobile Location Sharing Applications.

                                Lukasz Jedrzejczyk
                            l.jedrzejczyk@open.ac.uk

Supervisors          Arosha Bandara
                     Bashar Nuseibeh
                     Blaine Price
Department/Institute Computing Dept.
Status               Fulltime
Probation viva       After
Starting date        June 2008


Abstract
I describe the “Privacy-Shake”, a novel interface for managing coarse grained privacy
settings. I built a prototype that enables users of Buddy Tracker, an example location
sharing application, to change their privacy preferences by shaking their phone. Users
can enable or disable location sharing and change the level of granularity of disclosed
location by shaking and sweeping their phone. In this poster I present and motivate
my work on Privacy-Shake and report on a lab-based evaluation of the interface with
16 participants.

1.     INTRODUCTION
The proliferation of location sharing applications raises several concerns related to
personal privacy. Some solutions involving location privacy policies have been
suggested (e.g., [1]). However, prior research shows that end-users have difficulties in
expressing and setting their privacy preferences [2,3]. Setting privacy rules is a time-
consuming process, which many people are unwilling to do until their privacy is
violated. Moreover, privacy preferences vary across the context, and it is hard to
define privacy policy that reflects the dynamic nature of our lives. I see this as a
strong motivation to design interfaces that help users update their privacy settings as a
consequence of their daily tasks within the system. The underlying requirement of my
interface is to provide an efficient, heads-up interface for managing location privacy
that does not overwhelm the configuration over action [4].
In order to fulfil this requirement I developed the Privacy-Shake, a haptic interface [5]
supporting ad-hoc privacy management. To evaluate the Privacy-Shake interface I
conducted a lab-based study to examine its effectiveness and explore users‟ reactions
to that technology. I also evaluated several usability aspects of Privacy-Shake and
compared its performance against graphical user interface. My study confirmed the
potential of haptic interfaces for performing simple privacy tasks and showed that
Privacy-Shake can be faster than the GUI. However, my subjective results suggest
further work on improving the interface, such as support for individual calibration and
personalized gestures for better efficiency.




                                       Page 41 of 125
2010 CRC PhD Student Conference



2.     THE PRIVACY-SHAKE SYSTEM
The current prototype of Privacy-Shake is developed in Java and works on Android
powered mobile devices. It uses the built in accelerometer to monitor the current
position of the device. The application works in a background to save time needed for
switching the phone on.
The current prototype supports the following settings: visibility (user can
enable/disable location sharing) and granularity (changing the level of granularity of
disclosed location from exact location to city level location).
2.1    Haptic interaction
Due to the dynamic nature of the mobile device, every action has to be initiated by a
dynamic, vertical shake. This is required to distinguish the action from the noise
generated by user‟s daily movements, e.g. walking, jogging, using a lift. As the
system recognizes the movement, vibrational feedback is provided to confirm that the
system is ready. Once the system is initiated, a user can change privacy settings by
performing one of the following actions:
•       Vertical movement enables location sharing (Figure 1a),
•       Horizontal movement (left and right) disables location sharing (Figure 1b),
•       By moving the phone forward, a user can change the granularity of disclosed
location to the city level (Figure 1c),
•       User instructs the system to share exact location by approximating the phone
to his body (Figure 1d).
Successful action is confirmed by short vibration (the length depends on the action)
and optional auditory message (e.g. natural language message “Anyone can see you”)
when the user enables location sharing.




Figure 1. Privacy-Shake in action. Arrows present the direction of movement
that triggers a privacy-management task.

3.     In lab evaluation
I conducted a lab-based trial of Privacy-Shake interface to evaluate the usability of the
interface and examine both the potential and vulnerabilities of the current prototype.
3.1    Method
I recruited 16 participants aged from 23 to 45 for the study, 8 women and 8 men.
Most of them had prior experience with motion-capture interaction, mainly from
playing the Nintendo Wii. Eleven participants were graduate students, 4 were
recruited from the university‟s stuff and the remaining user was recruited outside the
university. Participants were asked to complete the following privacy management
tasks using Privacy-Shake (results presented in Figure 2):
T1.     Enable location sharing,
T2.     Disable location sharing,



                                       Page 42 of 125
2010 CRC PhD Student Conference



T3.      Change the granularity of disclosed location to (a) exact location (building
level), (b) city level,
T4.      Disable location sharing using the GUI.
The following measures were recorded:
 Time to performing a task – from the time when user started the initiation
    movement to the vibration confirming the action,
 Number of successfully completed tasks,
 Time of disabling location sharing using the GUI.
Participants took part in the study individually, at the beginning of each session I
introduced the Privacy-Shake concept and the purpose of the study. Users were
presented a short demo of the system and were given a chance to play with the
interface prior to performing four privacy management tasks using Privacy-Shake.
Each participant had three attempts to perform each task. At the end of each session I
asked participants to complete a questionnaire to rate the Privacy-Shake.
3.2    Results
Twelve participants reported that learning how to use the Privacy-Shake was easy (2
users reported that it was difficult), 12 of them said that it is also easy to remember
how to use it, as the interaction is simple and intuitive. However, 4 users said that
they would not like to use it due to the awkwardness of the interface and potential
harm it may cause, e.g. accidentally pushing people in a crowded bus.




Figure 2. Bar chart presents the percentage of successfully completed tasks
(efficiency) during the study.
Four participants reported that using Privacy-Shake was annoying and six of them
said that it caused frustration, which is related to the problems their experienced with
the interface. Only five users managed to successfully complete each privacy
management task using Privacy-Shake. Three users could not disable their location
sharing and nine users had problems changing the granularity of disclosed location.
The biggest difficulty users experienced was with task 3b, only three users
successfully completed the task three times. More than a half of all attempts to
perform this task were unsuccessful (58%). Only task T1 was successfully completed
by all users, thirteen participants disabled location sharing using Privacy-Shake and
ten of them successfully changed the granularity of location to city level. Two users
successfully completed 11 of 12 attempts, which was the best result during the study.




                                       Page 43 of 125
2010 CRC PhD Student Conference



58% of all attempts were successful. I observed that females performed slightly better
at using Privacy-Shake with 64% efficiency versus 53% for males.

4.     CONCLUSIONS AND FUTURE WORK
I presented the concept and initial results of the evaluation of Privacy-Shake, a novel
interface for „heads-up‟ privacy management. The chosen demographic was not broad,
but the study helped me identify both social and technical issues related to the
interface. One of the main issues I found were lack of individual calibration and
support for more discreet movements, which highlights the future research agenda for
my work on Privacy-Shake. Though the actual efficiency is not ideal, the comparison
between the mean time of performing tasks T2 (6 seconds) and T4 (18 seconds)
shows that haptic interface can be successfully used to perform some basic privacy
management tasks faster than the traditional GUI. The Privacy-Shake concept
received a positive feedback, which encourages me to continue the work on
improving the interface and enhancing the user experience. Further work is also
needed to extend the functionality of Privacy-Shake by implementing new gestures
for managing group settings or expressing more fine-grained preferences.

5.     REFERENCES
[1]     G. Myles, A. Friday, and N. Davies, “Preserving Privacy in Environments
with Location-Based Applications,” IEEE Pervasive Computing, vol. 2, 2003, pp. 56-
64.
[2]     L.F. Cranor and S. Garfinkel, Security and usability: designing secure systems
that people can use, O'Reilly Media, Inc., 2005.
[3]     N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley, M. Prabaker, and J. Rao,
“Understanding and capturing people‟s privacy policies in a people finder
application,” The Journal of Personal and Ubiquitous Computing, vol. 13, Aug. 2009,
pp. 401-412.
[4]     S. Lederer, I. Hong, K. Dey, and A. Landay, “Personal privacy through
understanding and action: five pitfalls for designers,” Personal Ubiquitous Computing,
vol. 8, 2004, pp. 440-454.
[5]     S. Robinson, P. Eslambolchilar, and M. Jones, “Sweep-Shake: finding digital
resources in physical environments,” Proc. of Mobile HCI'09, ACM, 2009, p.12.




                                      Page 44 of 125

Más contenido relacionado

La actualidad más candente

Preserving Global and Local Features for Robust FaceRecognition under Various...
Preserving Global and Local Features for Robust FaceRecognition under Various...Preserving Global and Local Features for Robust FaceRecognition under Various...
Preserving Global and Local Features for Robust FaceRecognition under Various...
CSCJournals
 
Paper id 25201413
Paper id 25201413Paper id 25201413
Paper id 25201413
IJRAT
 

La actualidad más candente (17)

4 newmain doc
4 newmain doc4 newmain doc
4 newmain doc
 
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...
 
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...
 
Preserving Global and Local Features for Robust FaceRecognition under Various...
Preserving Global and Local Features for Robust FaceRecognition under Various...Preserving Global and Local Features for Robust FaceRecognition under Various...
Preserving Global and Local Features for Robust FaceRecognition under Various...
 
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
 
google glases document
google glases documentgoogle glases document
google glases document
 
Bieg Eye And Pointer Coordination In Search And Selection Tasks
Bieg Eye And Pointer Coordination In Search And Selection TasksBieg Eye And Pointer Coordination In Search And Selection Tasks
Bieg Eye And Pointer Coordination In Search And Selection Tasks
 
UbiComp2011: ContextCapture (Poster)
UbiComp2011: ContextCapture (Poster)UbiComp2011: ContextCapture (Poster)
UbiComp2011: ContextCapture (Poster)
 
A Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research ChallengesA Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research Challenges
 
Vertical Fragmentation of Location Information to Enable Location Privacy in ...
Vertical Fragmentation of Location Information to Enable Location Privacy in ...Vertical Fragmentation of Location Information to Enable Location Privacy in ...
Vertical Fragmentation of Location Information to Enable Location Privacy in ...
 
TSA Eyebox project
TSA Eyebox project TSA Eyebox project
TSA Eyebox project
 
From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...
 
A Mobile Indoor Navigation System Interface Adapted to Vision-Based Localization
A Mobile Indoor Navigation System Interface Adapted to Vision-Based LocalizationA Mobile Indoor Navigation System Interface Adapted to Vision-Based Localization
A Mobile Indoor Navigation System Interface Adapted to Vision-Based Localization
 
Recognition of activities of daily living with egocentric vision
Recognition of activities of daily living with egocentric visionRecognition of activities of daily living with egocentric vision
Recognition of activities of daily living with egocentric vision
 
Micro interactions and multi dimensional graphical user interfaces in the des...
Micro interactions and multi dimensional graphical user interfaces in the des...Micro interactions and multi dimensional graphical user interfaces in the des...
Micro interactions and multi dimensional graphical user interfaces in the des...
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language Interpreter
 
Paper id 25201413
Paper id 25201413Paper id 25201413
Paper id 25201413
 

Destacado (7)

Mouawad
MouawadMouawad
Mouawad
 
Wilkie
WilkieWilkie
Wilkie
 
Pantidi
PantidiPantidi
Pantidi
 
Aizatulin poster
Aizatulin posterAizatulin poster
Aizatulin poster
 
Abraham
AbrahamAbraham
Abraham
 
Aizatulin slides-4-3
Aizatulin slides-4-3Aizatulin slides-4-3
Aizatulin slides-4-3
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
 

Similar a Jedrzejczyk

smartwatch-user-identification
smartwatch-user-identificationsmartwatch-user-identification
smartwatch-user-identification
Sebastian W. Cheah
 
An effective approach to develop location-based augmented reality information...
An effective approach to develop location-based augmented reality information...An effective approach to develop location-based augmented reality information...
An effective approach to develop location-based augmented reality information...
IJECEIAES
 
Norman Sadeh's Presentation
Norman Sadeh's PresentationNorman Sadeh's Presentation
Norman Sadeh's Presentation
Mediabistro
 

Similar a Jedrzejczyk (20)

SMARCOS Abstract Paper submitted to ICCHP 2012
SMARCOS Abstract Paper submitted to ICCHP 2012SMARCOS Abstract Paper submitted to ICCHP 2012
SMARCOS Abstract Paper submitted to ICCHP 2012
 
Eye(I) Still Know! – An App for the Blind Built using Web and AI
Eye(I) Still Know! – An App for the Blind Built using Web and AIEye(I) Still Know! – An App for the Blind Built using Web and AI
Eye(I) Still Know! – An App for the Blind Built using Web and AI
 
smartwatch-user-identification
smartwatch-user-identificationsmartwatch-user-identification
smartwatch-user-identification
 
EDI_PRESENTATION
EDI_PRESENTATIONEDI_PRESENTATION
EDI_PRESENTATION
 
Securing Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingSecuring Location of User in Geo Social Networking
Securing Location of User in Geo Social Networking
 
Iaetsd efficient file transferring in
Iaetsd efficient file transferring inIaetsd efficient file transferring in
Iaetsd efficient file transferring in
 
Analyzing And Predicting Focus Of Attention In Remote Collaborative Tasks
Analyzing And Predicting Focus Of Attention In Remote Collaborative TasksAnalyzing And Predicting Focus Of Attention In Remote Collaborative Tasks
Analyzing And Predicting Focus Of Attention In Remote Collaborative Tasks
 
Study reveals we are being tracked by our smartphones --- every 3 minutes
Study reveals we are being tracked by our smartphones --- every 3 minutesStudy reveals we are being tracked by our smartphones --- every 3 minutes
Study reveals we are being tracked by our smartphones --- every 3 minutes
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
 
An effective approach to develop location-based augmented reality information...
An effective approach to develop location-based augmented reality information...An effective approach to develop location-based augmented reality information...
An effective approach to develop location-based augmented reality information...
 
preserving location privacy in geosocial applications
preserving location privacy in geosocial applicationspreserving location privacy in geosocial applications
preserving location privacy in geosocial applications
 
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
 
Understanding user interactivity for immersive communications and its impact ...
Understanding user interactivity for immersive communications and its impact ...Understanding user interactivity for immersive communications and its impact ...
Understanding user interactivity for immersive communications and its impact ...
 
Understanding user interactivity for immersive communications and its impact ...
Understanding user interactivity for immersive communications and its impact ...Understanding user interactivity for immersive communications and its impact ...
Understanding user interactivity for immersive communications and its impact ...
 
Principle to support usability
Principle to support usabilityPrinciple to support usability
Principle to support usability
 
Norman Sadeh's Presentation
Norman Sadeh's PresentationNorman Sadeh's Presentation
Norman Sadeh's Presentation
 
Geochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using CloudGeochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using Cloud
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
 

Más de anesah (20)

Van der merwe
Van der merweVan der merwe
Van der merwe
 
Thomas
ThomasThomas
Thomas
 
Taubenberger
TaubenbergerTaubenberger
Taubenberger
 
Sach
SachSach
Sach
 
Rae
RaeRae
Rae
 
Pantidi
PantidiPantidi
Pantidi
 
Corneli
CorneliCorneli
Corneli
 
Collins
CollinsCollins
Collins
 
Xambo
XamboXambo
Xambo
 
Ullmann
UllmannUllmann
Ullmann
 
Tran
TranTran
Tran
 
Quinto
QuintoQuinto
Quinto
 
Pluss
PlussPluss
Pluss
 
Pawlik
PawlikPawlik
Pawlik
 
Overbeeke
OverbeekeOverbeeke
Overbeeke
 
Nguyen
NguyenNguyen
Nguyen
 
Murphy
MurphyMurphy
Murphy
 
Moyo
MoyoMoyo
Moyo
 
Montrieux
MontrieuxMontrieux
Montrieux
 
Ma
MaMa
Ma
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Jedrzejczyk

  • 1. 2010 CRC PhD Student Conference “Privacy-Shake”, a Haptic Interface for Managing Privacy Settings in Mobile Location Sharing Applications. Lukasz Jedrzejczyk l.jedrzejczyk@open.ac.uk Supervisors Arosha Bandara Bashar Nuseibeh Blaine Price Department/Institute Computing Dept. Status Fulltime Probation viva After Starting date June 2008 Abstract I describe the “Privacy-Shake”, a novel interface for managing coarse grained privacy settings. I built a prototype that enables users of Buddy Tracker, an example location sharing application, to change their privacy preferences by shaking their phone. Users can enable or disable location sharing and change the level of granularity of disclosed location by shaking and sweeping their phone. In this poster I present and motivate my work on Privacy-Shake and report on a lab-based evaluation of the interface with 16 participants. 1. INTRODUCTION The proliferation of location sharing applications raises several concerns related to personal privacy. Some solutions involving location privacy policies have been suggested (e.g., [1]). However, prior research shows that end-users have difficulties in expressing and setting their privacy preferences [2,3]. Setting privacy rules is a time- consuming process, which many people are unwilling to do until their privacy is violated. Moreover, privacy preferences vary across the context, and it is hard to define privacy policy that reflects the dynamic nature of our lives. I see this as a strong motivation to design interfaces that help users update their privacy settings as a consequence of their daily tasks within the system. The underlying requirement of my interface is to provide an efficient, heads-up interface for managing location privacy that does not overwhelm the configuration over action [4]. In order to fulfil this requirement I developed the Privacy-Shake, a haptic interface [5] supporting ad-hoc privacy management. To evaluate the Privacy-Shake interface I conducted a lab-based study to examine its effectiveness and explore users‟ reactions to that technology. I also evaluated several usability aspects of Privacy-Shake and compared its performance against graphical user interface. My study confirmed the potential of haptic interfaces for performing simple privacy tasks and showed that Privacy-Shake can be faster than the GUI. However, my subjective results suggest further work on improving the interface, such as support for individual calibration and personalized gestures for better efficiency. Page 41 of 125
  • 2. 2010 CRC PhD Student Conference 2. THE PRIVACY-SHAKE SYSTEM The current prototype of Privacy-Shake is developed in Java and works on Android powered mobile devices. It uses the built in accelerometer to monitor the current position of the device. The application works in a background to save time needed for switching the phone on. The current prototype supports the following settings: visibility (user can enable/disable location sharing) and granularity (changing the level of granularity of disclosed location from exact location to city level location). 2.1 Haptic interaction Due to the dynamic nature of the mobile device, every action has to be initiated by a dynamic, vertical shake. This is required to distinguish the action from the noise generated by user‟s daily movements, e.g. walking, jogging, using a lift. As the system recognizes the movement, vibrational feedback is provided to confirm that the system is ready. Once the system is initiated, a user can change privacy settings by performing one of the following actions: • Vertical movement enables location sharing (Figure 1a), • Horizontal movement (left and right) disables location sharing (Figure 1b), • By moving the phone forward, a user can change the granularity of disclosed location to the city level (Figure 1c), • User instructs the system to share exact location by approximating the phone to his body (Figure 1d). Successful action is confirmed by short vibration (the length depends on the action) and optional auditory message (e.g. natural language message “Anyone can see you”) when the user enables location sharing. Figure 1. Privacy-Shake in action. Arrows present the direction of movement that triggers a privacy-management task. 3. In lab evaluation I conducted a lab-based trial of Privacy-Shake interface to evaluate the usability of the interface and examine both the potential and vulnerabilities of the current prototype. 3.1 Method I recruited 16 participants aged from 23 to 45 for the study, 8 women and 8 men. Most of them had prior experience with motion-capture interaction, mainly from playing the Nintendo Wii. Eleven participants were graduate students, 4 were recruited from the university‟s stuff and the remaining user was recruited outside the university. Participants were asked to complete the following privacy management tasks using Privacy-Shake (results presented in Figure 2): T1. Enable location sharing, T2. Disable location sharing, Page 42 of 125
  • 3. 2010 CRC PhD Student Conference T3. Change the granularity of disclosed location to (a) exact location (building level), (b) city level, T4. Disable location sharing using the GUI. The following measures were recorded:  Time to performing a task – from the time when user started the initiation movement to the vibration confirming the action,  Number of successfully completed tasks,  Time of disabling location sharing using the GUI. Participants took part in the study individually, at the beginning of each session I introduced the Privacy-Shake concept and the purpose of the study. Users were presented a short demo of the system and were given a chance to play with the interface prior to performing four privacy management tasks using Privacy-Shake. Each participant had three attempts to perform each task. At the end of each session I asked participants to complete a questionnaire to rate the Privacy-Shake. 3.2 Results Twelve participants reported that learning how to use the Privacy-Shake was easy (2 users reported that it was difficult), 12 of them said that it is also easy to remember how to use it, as the interaction is simple and intuitive. However, 4 users said that they would not like to use it due to the awkwardness of the interface and potential harm it may cause, e.g. accidentally pushing people in a crowded bus. Figure 2. Bar chart presents the percentage of successfully completed tasks (efficiency) during the study. Four participants reported that using Privacy-Shake was annoying and six of them said that it caused frustration, which is related to the problems their experienced with the interface. Only five users managed to successfully complete each privacy management task using Privacy-Shake. Three users could not disable their location sharing and nine users had problems changing the granularity of disclosed location. The biggest difficulty users experienced was with task 3b, only three users successfully completed the task three times. More than a half of all attempts to perform this task were unsuccessful (58%). Only task T1 was successfully completed by all users, thirteen participants disabled location sharing using Privacy-Shake and ten of them successfully changed the granularity of location to city level. Two users successfully completed 11 of 12 attempts, which was the best result during the study. Page 43 of 125
  • 4. 2010 CRC PhD Student Conference 58% of all attempts were successful. I observed that females performed slightly better at using Privacy-Shake with 64% efficiency versus 53% for males. 4. CONCLUSIONS AND FUTURE WORK I presented the concept and initial results of the evaluation of Privacy-Shake, a novel interface for „heads-up‟ privacy management. The chosen demographic was not broad, but the study helped me identify both social and technical issues related to the interface. One of the main issues I found were lack of individual calibration and support for more discreet movements, which highlights the future research agenda for my work on Privacy-Shake. Though the actual efficiency is not ideal, the comparison between the mean time of performing tasks T2 (6 seconds) and T4 (18 seconds) shows that haptic interface can be successfully used to perform some basic privacy management tasks faster than the traditional GUI. The Privacy-Shake concept received a positive feedback, which encourages me to continue the work on improving the interface and enhancing the user experience. Further work is also needed to extend the functionality of Privacy-Shake by implementing new gestures for managing group settings or expressing more fine-grained preferences. 5. REFERENCES [1] G. Myles, A. Friday, and N. Davies, “Preserving Privacy in Environments with Location-Based Applications,” IEEE Pervasive Computing, vol. 2, 2003, pp. 56- 64. [2] L.F. Cranor and S. Garfinkel, Security and usability: designing secure systems that people can use, O'Reilly Media, Inc., 2005. [3] N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley, M. Prabaker, and J. Rao, “Understanding and capturing people‟s privacy policies in a people finder application,” The Journal of Personal and Ubiquitous Computing, vol. 13, Aug. 2009, pp. 401-412. [4] S. Lederer, I. Hong, K. Dey, and A. Landay, “Personal privacy through understanding and action: five pitfalls for designers,” Personal Ubiquitous Computing, vol. 8, 2004, pp. 440-454. [5] S. Robinson, P. Eslambolchilar, and M. Jones, “Sweep-Shake: finding digital resources in physical environments,” Proc. of Mobile HCI'09, ACM, 2009, p.12. Page 44 of 125