SlideShare a Scribd company logo
1 of 29
©2009CarnegieMellonUniversity:1
Designing the User Experience
for Online Privacy
IAPP
June 21, 2013
Jason Hong
Associate Professor, HCII
Computer
Human
Interaction:
Mobility
Privacy
Security
©2013CarnegieMellonUniversity:2
Full policy is 10x this length
©2013CarnegieMellonUniversity:3
But this assumes people read it
©2013CarnegieMellonUniversity:4
©2013CarnegieMellonUniversity:5
Mental models not always clear
©2013CarnegieMellonUniversity:6
Location Data
Unique device ID
Location Data
Network Access
Unique device ID
Location Data
Unique device ID
Many hidden and surprising behaviors
©2013CarnegieMellonUniversity:7
Timing really matters too
©2013CarnegieMellonUniversity:8
©2013CarnegieMellonUniversity:9
Not always clear who your audience is
©2013CarnegieMellonUniversity:10
©2013CarnegieMellonUniversity:11
Too many options!
©2013CarnegieMellonUniversity:12
So what can we do to help
with the user experience?
©2013CarnegieMellonUniversity:13
Can we simplify and
standardize privacy info?
(Kelley et al, CHI 2010)
©2013CarnegieMellonUniversity:14
Standard symbols
Standard locations
High level visual feedback
©2013CarnegieMellonUniversity:15
Finding Surprises
Can we find the gaps between what
people think an app does and what
an app actually does?
App Behavior
(What an app
actually does)
User Expectations
(What people think
the app does)
©2013CarnegieMellonUniversity:16
Amazon Mechanical Turk
©2013CarnegieMellonUniversity:17
©2013CarnegieMellonUniversity:18
Expectations Condition
Why do you think Angry Birds uses
your location data?
How comfortable are you with Angry
Birds using your location data?
©2013CarnegieMellonUniversity:19
Purpose Condition
Angry Birds uses your location data
for advertising.
How comfortable are you with Angry
Birds using your location data?
©2013CarnegieMellonUniversity:20
Results for Location Data
(N=20 per app, Expectations Condition)
App Comfort Level (-2 – 2)
Maps 1.52
GasBuddy 1.47
Weather Channel 1.45
Foursquare 0.95
TuneIn Radio 0.60
Evernote 0.15
Angry Birds -0.70
Brightest Flashlight Free -1.15
Toss It -1.2
©2013CarnegieMellonUniversity:21
“[H]e was able to identify about 25 products
that… allowed him to assign each shopper a
‘pregnancy prediction’ score. [H]e could also
estimate her due date to within a small window,
so Target could send coupons timed to very
specific stages of her pregnancy.”
©2013CarnegieMellonUniversity:22
“We’d put an ad for a lawn mower next to
diapers. We’d put a coupon for wineglasses next
to infant clothes. That way, it looked like all the
products were chosen by chance.”
©2013CarnegieMellonUniversity:23
Privacy placebos?
©2013CarnegieMellonUniversity:24
Computation
Communication
Sensing
©2013CarnegieMellonUniversity:25
©2013CarnegieMellonUniversity:26
©2013CarnegieMellonUniversity:27
©2013CarnegieMellonUniversity:28
©2013CarnegieMellonUniversity:29

More Related Content

What's hot

Shuhanhui zhuang desma9_midterm
Shuhanhui zhuang desma9_midtermShuhanhui zhuang desma9_midterm
Shuhanhui zhuang desma9_midtermMilton Zhuang
 
Negative Effects of Technology on Young Children
Negative Effects of Technology on Young ChildrenNegative Effects of Technology on Young Children
Negative Effects of Technology on Young Childrenascarcello
 
Children, Technology, and the Evolution of Education
Children, Technology, and the Evolution of EducationChildren, Technology, and the Evolution of Education
Children, Technology, and the Evolution of Education8cr1
 
Bits of Evidence
Bits of EvidenceBits of Evidence
Bits of EvidenceGreg Wilson
 
The Age of Technology-Enhanced Teaching
The Age of Technology-Enhanced TeachingThe Age of Technology-Enhanced Teaching
The Age of Technology-Enhanced TeachingMaria H. Andersen
 

What's hot (6)

Shuhanhui zhuang desma9_midterm
Shuhanhui zhuang desma9_midtermShuhanhui zhuang desma9_midterm
Shuhanhui zhuang desma9_midterm
 
Negative Effects of Technology on Young Children
Negative Effects of Technology on Young ChildrenNegative Effects of Technology on Young Children
Negative Effects of Technology on Young Children
 
Children, Technology, and the Evolution of Education
Children, Technology, and the Evolution of EducationChildren, Technology, and the Evolution of Education
Children, Technology, and the Evolution of Education
 
Bits of Evidence
Bits of EvidenceBits of Evidence
Bits of Evidence
 
The Age of Technology-Enhanced Teaching
The Age of Technology-Enhanced TeachingThe Age of Technology-Enhanced Teaching
The Age of Technology-Enhanced Teaching
 
Mobile Gamification
Mobile GamificationMobile Gamification
Mobile Gamification
 

Similar to Designing the User Experience for Online Privacy, at IAPP Navigate 2013

Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Jason Hong
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Jason Hong
 
Extreme IoT Games
Extreme IoT GamesExtreme IoT Games
Extreme IoT GamesMike Kavis
 
C3E talk on Navigating Cyberspace, January 2014
C3E talk on Navigating Cyberspace, January 2014C3E talk on Navigating Cyberspace, January 2014
C3E talk on Navigating Cyberspace, January 2014Jason Hong
 
Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Introduction to User Experience and User Interface Design: A One-Hour Crash C...Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Introduction to User Experience and User Interface Design: A One-Hour Crash C...Jason Hong
 
How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps Jason Hong
 
Getting Beyond the Hype-What’s Really Working In Mobile Marketing Today by Mo...
Getting Beyond the Hype-What’s Really Working In Mobile Marketing Today by Mo...Getting Beyond the Hype-What’s Really Working In Mobile Marketing Today by Mo...
Getting Beyond the Hype-What’s Really Working In Mobile Marketing Today by Mo...SIM Partners
 
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Jason Hong
 
HCI and Smartphone Data at Scale
HCI and Smartphone Data at ScaleHCI and Smartphone Data at Scale
HCI and Smartphone Data at ScaleJason Hong
 
Outlook 2014 Mid-Year Review
Outlook 2014 Mid-Year ReviewOutlook 2014 Mid-Year Review
Outlook 2014 Mid-Year ReviewIPG Media Lab
 
Open social mobile apps increase community involvement in policing and confid...
Open social mobile apps increase community involvement in policing and confid...Open social mobile apps increase community involvement in policing and confid...
Open social mobile apps increase community involvement in policing and confid...Angus Fox
 
Speaking - cloud computing and the sysop professional - how to get ready
Speaking - cloud computing and the sysop professional - how to get readySpeaking - cloud computing and the sysop professional - how to get ready
Speaking - cloud computing and the sysop professional - how to get readyEduardo Coelho
 
An Overview of Prototyping Software (NYU/IDEO)
An Overview of Prototyping Software (NYU/IDEO)An Overview of Prototyping Software (NYU/IDEO)
An Overview of Prototyping Software (NYU/IDEO)Joshua Wexler
 
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Jason Hong
 
BYOD: The Easyjet approach to Mobile Learning?
BYOD: The Easyjet approach to Mobile Learning?BYOD: The Easyjet approach to Mobile Learning?
BYOD: The Easyjet approach to Mobile Learning?TCappelli
 

Similar to Designing the User Experience for Online Privacy, at IAPP Navigate 2013 (19)

Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
 
Extreme IoT Games
Extreme IoT GamesExtreme IoT Games
Extreme IoT Games
 
M learning 002
M learning 002M learning 002
M learning 002
 
C3E talk on Navigating Cyberspace, January 2014
C3E talk on Navigating Cyberspace, January 2014C3E talk on Navigating Cyberspace, January 2014
C3E talk on Navigating Cyberspace, January 2014
 
Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Introduction to User Experience and User Interface Design: A One-Hour Crash C...Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Introduction to User Experience and User Interface Design: A One-Hour Crash C...
 
How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps
 
Google glass
Google glassGoogle glass
Google glass
 
Getting Beyond the Hype-What’s Really Working In Mobile Marketing Today by Mo...
Getting Beyond the Hype-What’s Really Working In Mobile Marketing Today by Mo...Getting Beyond the Hype-What’s Really Working In Mobile Marketing Today by Mo...
Getting Beyond the Hype-What’s Really Working In Mobile Marketing Today by Mo...
 
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
 
HCI and Smartphone Data at Scale
HCI and Smartphone Data at ScaleHCI and Smartphone Data at Scale
HCI and Smartphone Data at Scale
 
MMA 2013_App solutely
MMA 2013_App solutelyMMA 2013_App solutely
MMA 2013_App solutely
 
Outlook 2014 Mid-Year Review
Outlook 2014 Mid-Year ReviewOutlook 2014 Mid-Year Review
Outlook 2014 Mid-Year Review
 
Open social mobile apps increase community involvement in policing and confid...
Open social mobile apps increase community involvement in policing and confid...Open social mobile apps increase community involvement in policing and confid...
Open social mobile apps increase community involvement in policing and confid...
 
Speaking - cloud computing and the sysop professional - how to get ready
Speaking - cloud computing and the sysop professional - how to get readySpeaking - cloud computing and the sysop professional - how to get ready
Speaking - cloud computing and the sysop professional - how to get ready
 
Making the case for moble
Making the case for mobleMaking the case for moble
Making the case for moble
 
An Overview of Prototyping Software (NYU/IDEO)
An Overview of Prototyping Software (NYU/IDEO)An Overview of Prototyping Software (NYU/IDEO)
An Overview of Prototyping Software (NYU/IDEO)
 
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
 
BYOD: The Easyjet approach to Mobile Learning?
BYOD: The Easyjet approach to Mobile Learning?BYOD: The Easyjet approach to Mobile Learning?
BYOD: The Easyjet approach to Mobile Learning?
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Designing the User Experience for Online Privacy, at IAPP Navigate 2013

Editor's Notes

  1. My background is in HCISome reasons why designing for the user experience for online privacy is so hardStart out with the most visible form of privacy today, the privacy policy
  2. http://moritzlaw.osu.edu/students/groups/is/files/2012/02/Cranor_Formatted_Final.pdfAverage policy takes about 10 minutes to readEstimate it would take 25 full days to read every privacy policy of every web site visited in a yearClear cost (time), unclear benefit to reading these policies
  3. Grade 12.5About 10 min to readSo based on Lorrie and Aleecia’s work, it will take 25 full days to read all privacy policies of all web sitesBut this assumes people read itRationale behavior not to read privacy policies: we want to use the service, painful to read, clear cost but unclear benefit
  4. We all have mental models about every aspect of the worldMaps of where we live, how computers work, how our cars workHere’s an example
  5. So what does this have to do with privacy?Unclear mental models make it hard to be effective with respect to privacyIf you make a private album, no one can see it. But what happens if you tag someone in a photo? Can that person see it? So the mental models aren’t always clear.
  6. Brightest Flashlighthttps://play.google.com/store/apps/details?id=goldenshorestechnologies.brightestflashlight.freeBible apphttps://play.google.com/store/apps/details?id=com.sirma.mobile.bible.android
  7. Harder to maintain personas in digital worldHarder to know who can see what, plus stored for a long time
  8. One reason privacy is hard is that there are way too many optionsFrom http://online.wsj.com/article/SB10001424127887324880504578300312528424302.html
  9. More accurate and faster in a number of comprehension and comparison tasks
  10. http://www.nytimes.com/2012/02/19/magazine/shopping-habits.htmlAs Pole’s computers crawled through the data, he was able to identify about 25 products that, when analyzed together, allowed him to assign each shopper a “pregnancy prediction” score. 
  11. See http://cups.cs.cmu.edu/privacyLabel/files/CHI-privacyFinal2010 for more details