SlideShare una empresa de Scribd logo
1 de 25
Descargar para leer sin conexión
decoding
PRIVACY
Diana SCHNEIDER 										 					 ICED’13 Young Members Event
BRISKROAD
ambassadors of design thinking
future implications of
privacy in technology
©-http://experttechnologyreview.com/predic-
tions-for-mobile-technology-in-2013/
THE PRIVATE REALM
	WHY THE FUSS
	 PRIVACY STRATEGIES
	 FUTURE ROLE OF DESIGN
1
2
3
4
2Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
defining privacy
interpersonally negotiated rules of access to the self
3Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
min. participants male	 female expert
reviews
co-creation
sessions
MUC
SEOUL
empirical study
understanding perceptions, conflicts and solutions of privacy
WORLDWIDE
eSurvey
ICED’13
Research
Presentation
50 197 116 81 10 2
4Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
name 5 concrete
situations in which
you experienced
privacy
5Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
INFORMATION
CULTURE
NATURE
CONSUMPTION
TERRITORY
TOGETHERNESS
SECLUSION
ROOM
DIVISION
PSEU-
DO-SPACE
VIRTUAL SPA-
CE
COMMUNICATIONINTERSPACE
MOBILITY
DOMESTICITY
FAMILIARITY
MOTION
ENTERTAINMENT
ACQUAINTANCEOWNERSHIP
INACCESSIBILITY
REGENERATION
FREEDOM
PERSON OF
TRUST
INTELLECT
CREATION
isolate
interact
isolateisolate
PLACES OF
ENCOUNTER
NORMED
PLACES
BEING
UNOBSERVED
PHYSICALhuman body member of society
identity
CONTENTUAL
SOCIAL
ISOLATE
Degree of INTERACTION
INTERACT
ILLUSORYENVRONMENT
SOLITUDE
INDIV
IDUALCONTENT
ENVIRONMENT
PEER GROUP
INTE
RACTION
IND
IVIDUALEXPERIENCEOFCOLLECTIVITY
PRODUCT
FRIENDSHIP
&
RELATEDNESS
C
O
LLECTIVEEXPERIENCE
BODY
INTIMAC
Y
C
REATIONOFCONT-
concentric model of privacy
trichotomy of the self
6Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
INFORMATION
CULTURE
NATURE
CONSUMPTION
TERRITORY
TOGETHERNESS
SECLUSION
ROOM
DIVISION
PSEU-
DO-SPACE
VIRTUAL SPA-
CE
COMMUNICATIONINTERSPACE
MOBILITY
DOMESTICITY
FAMILIARITY
MOTION
ENTERTAINMENT
ACQUAINTANCEOWNERSHIP
INACCESSIBILITY
REGENERATION
FREEDOM
PERSON OF
TRUST
INTELLECT
CREATION
isolate
interact
isolateisolate
PLACES OF
ENCOUNTER
NORMED
PLACES
BEING
UNOBSERVED
PHYSICALhuman body member of society
identity
CONTENTUAL
SOCIAL
ISOLATE
Degree of INTERACTION
INTERACT
ILLUSORYENVRONMENT
SOLITUDE
INDIV
IDUALCONTENT
ENVIRONMENT
PEER GROUP
INTE
RACTION
IND
IVIDUALEXPERIENCEOFCOLLECTIVITY
PRODUCT
FRIENDSHIP
&
RELATEDNESS
C
O
LLECTIVEEXPERIENCE
BODY
INTIMAC
Y
C
REATIONOFCONT-
concentric model of privacy
trichotomy of the self
dinner
with
friends
driving
at night
sunday
morning
routine
7Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
name 5 recent
situations in which
your privacy was
compromised
8Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
LOSS OF CONTROL
of an individual over his /
her PHYSICAL privacy
LOSS OF CONTROL
of an individual over his /
her SOCIAL privacy
LOSS OF CONTROL
of an individual over his /
her CONTENTUAL privacy
CONTROL TAKE-OVER
of another‘s PHYSICAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s SOCIAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s CONTENTUAL
privacy over one‘s own
INTRUSION
Locus of TAKING CONTROL
LOSS
PHYSICALhuman body member of society
identity
CONTENTUAL
SOCIAL
DISRESPECT
OF INTIMACY
UNPROTECTED
CONDEMNATION
UNWANTED ENTRANCE
INTO PRIVATE CONTENT
intrinsic
CONTROL
over one‘s
privacy
DANGER
EXCESSIVE
DISROBEMENT
BODILY
VULNERABILITY
PUBLIC
EXPOSURE
TRESPASSING THE BODILY/
SENSORIAL PROTECTIVE ZONE
INCAPACITY TO FULFILL
ONE‘S PUBLIC ROLE
ENDANGERED
PROPERTY
UNWANTED EXCESS
OF INFORMATION
IRRECONCILABLE
ROLES
THREATENED
DATA
THREATENED
SENSORIAL SPHERE
EXCESS OF
PUBLIC ORDER
privacy conflicts
duality of control between individuals and their surrounding
9Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
LOSS OF CONTROL
of an individual over his /
her PHYSICAL privacy
LOSS OF CONTROL
of an individual over his /
her SOCIAL privacy
LOSS OF CONTROL
of an individual over his /
her CONTENTUAL privacy
CONTROL TAKE-OVER
of another‘s PHYSICAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s SOCIAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s CONTENTUAL
privacy over one‘s own
INTRUSION
Locus of TAKING CONTROL
LOSS
PHYSICALhuman body member of society
identity
CONTENTUAL
SOCIAL
DISRESPECT
OF INTIMACY
UNPROTECTED
CONDEMNATION
UNWANTED ENTRANCE
INTO PRIVATE CONTENT
intrinsic
CONTROL
over one‘s
privacy
DANGER
EXCESSIVE
DISROBEMENT
BODILY
VULNERABILITY
PUBLIC
EXPOSURE
TRESPASSING THE BODILY/
SENSORIAL PROTECTIVE ZONE
INCAPACITY TO FULFILL
ONE‘S PUBLIC ROLE
ENDANGERED
PROPERTY
UNWANTED EXCESS
OF INFORMATION
IRRECONCILABLE
ROLES
THREATENED
DATA
THREATENED
SENSORIAL SPHERE
EXCESS OF
PUBLIC ORDER
privacy conflicts
duality of control between individuals and their surrounding
bodily contact
in crowded
public transport
camera
surveillance
in elevators
receiving a
private phonecall
at the office
10Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
2
why the fuss?
11Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
current situation
privacy crisis?
12Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
13Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
0011010110001
0101000101110111
01010101111101
10111001010
00001010111101
100011101010
11101001110
00011101010
10100011
29
55
30
56
check-in
31
57
32
58
33
59
26
52
34
60
27
53
35
61
28
54
36PRIVACY
UBIQUITY
password: ***********
?
vs.
despite
within
through
14Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
3
privacy strategies
15Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
whichstrategies
do you use to
protect/regain/
ensure your 	
privacy
16Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
analogue privacy strategies
diversity of ways to acquire and protect privacy
17Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
analogue privacy strategies
diversity of ways to acquire and protect privacy
paperbags to
hide bought
items
time-management
and independence
towel on
deck-chair
18Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
©2013-PAYWORKSGmbH-J.Lechner,C.Deger,D.Bellem,S.Eumes
mobile tech.
ubiquitous accessibility via portable devices
19Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
mobile tech. privacy strategies
limitations and lack of user control
shut down PC
password
encrypt data
headphones
20Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
future role of design
421Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
TECHNOLOGY
PRIVACY
the gap
discrepancy between privacy and technologically enabled strategies
situative
subjective
interpersonal
individual
cultural
creative
nuanced
generic
objective
impersonal
common
global
basic
trivial
vs.
22Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
empowering through a workable design tool connecting developers and users
AWARENESSof relevance
UNDERSTANDING of implications
ENABLING user control
Future Role of Design
the bridge
+ 23Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
Online Pre-Survey
PRIVACY PERCEPTIONS & CONFLICTS
Online CrowdSource Beta
PRIVACY IN MOBILE TECH.
10
197
11
awareness
blueprint &
Developer Interviews
SFO
Developer Interviews
MUC
DESIGN
ENGINEERING
TOOL
REAL-TIME
USER IDEA
PLATFORM
it takes two
investigating user and developer perspectives
now.
goalt=0
decoding
PRIVACYperceptions, conflicts and strategies of privacy in the mobile world
strategies
situation
description
location
participants
decoding
PRIVACYperceptions, conflicts and strategies of privacy in the mobile world
conflicts
participants
PLACES OF
ENCOUNTER
ISOLATE
Degree of INTERACTION
INTERACT
ILLUSORYENVRONMENT
SOLITUDE
INDIV
IDUALCONTENT
ENVIRONMENT
PEER GROUP
INTE
RACTION
IND
IVIDUALEXPERIENCEOFCOLLECTIVITY
PRODUCT
FRIENDSHIP
&
RELATEDNESS
C
O
LLECTIVEEXPERIENCE
BODY
INTIMAC
Y
C
REATIONOFCONT-
PLACES OF
ENCOUNTER
ISOLATE
Degree of INTERACTION
INTERACT
ILLUSORYENVRONMENT
SOLITUDE
INDIV
IDUALCONTENT
ENVIRONMENT
PEER GROUP
INTE
RACTION
IND
IVIDUALEXPERIENCEOFCOLLECTIVITY
PRODUCT
FRIENDSHIP
&
RELATEDNESS
C
O
LLECTIVEEXPERIENCE
BODY
INTIMAC
Y
C
REATIONOFCONT-
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER
SOLUTION HEATMAP
PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER
SOLUTION HEATMAP
privacy DEFINITIONS
privacy CONFLICTS
privacy STRATEGIES
decoding
PRIVACYdesign tool
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
LOSS L
over his /
her vacy
OF CONTROL
over his /
her SOCIAL privacy
TROL
over his /
privacy
CONTROL TAKE-OVER
of another‘s PHYSICAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s SOCIAL
privacy over one‘s own
TAKE-OVER
of another‘s CONTENTUAL
privacy over one‘s own
INTRUSION
Locus of TAKING CONTROL
LOSS
intrinsic
CONTROL
LOSS L
over his /
her vacy
OF CONTROL
over his /
her SOCIAL privacy
TROL
over his /
privacy
CONTROL TAKE-OVER
of another‘s PHYSICAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s SOCIAL
privacy over one‘s own
TAKE-OVER
of another‘s CONTENTUAL
privacy over one‘s own
INTRUSION
Locus of TAKING CONTROL
LOSS
intrinsic
CONTROL
CONCEAL
OUTSOURCE
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
CONCEAL
OUTSOURCE
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
sneak preview
www.decodingprivacy.com
24Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
Diana SCHNEIDER
Design Thinker l Founder
d.schneider@briskroad.com
www.briskroad.com
BRISKROAD
ambassadors of design thinking
questions?
@
S05 - D5 Design for User Experience I Thurs. 08/22 I 10:45am - 12:15pm
25Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy

Más contenido relacionado

Similar a DECODING PRIVACY - Future Implications of Privacy in Technology

DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mo...
DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mo...DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mo...
DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mo...Diana Schneider
 
PersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet ApplicationsPersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet ApplicationsSven Wohlgemuth
 
Social engineering – posing challenges to the thinking security professional ...
Social engineering – posing challenges to the thinking security professional ...Social engineering – posing challenges to the thinking security professional ...
Social engineering – posing challenges to the thinking security professional ...Paul Devassy, CPP
 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Marco Morana
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsDavid Wood
 
GDPR Art. 25 - Privacy by design and default
GDPR Art. 25 - Privacy by design and defaultGDPR Art. 25 - Privacy by design and default
GDPR Art. 25 - Privacy by design and defaultMichelangelo van Dam
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative mediaAnies Syahieda
 
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionA Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionIRJET Journal
 
MINDSET BEYOND THE MYTH - practice, applicability and teachability of Design ...
MINDSET BEYOND THE MYTH - practice, applicability and teachability of Design ...MINDSET BEYOND THE MYTH - practice, applicability and teachability of Design ...
MINDSET BEYOND THE MYTH - practice, applicability and teachability of Design ...Diana Schneider
 
The Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by DesignThe Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by DesignDr. Ann Cavoukian
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Kaliya "Identity Woman" Young
 
Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksMighty Guides, Inc.
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityPC Doctors NET
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Scott Wright
 
Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Lutz Schmitt
 
Designing products and services with GDPR
Designing products and services with GDPRDesigning products and services with GDPR
Designing products and services with GDPRCyber-Duck
 
Protect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLPProtect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLPAdi Saputra
 

Similar a DECODING PRIVACY - Future Implications of Privacy in Technology (20)

DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mo...
DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mo...DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mo...
DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mo...
 
PersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet ApplicationsPersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet Applications
 
Social engineering – posing challenges to the thinking security professional ...
Social engineering – posing challenges to the thinking security professional ...Social engineering – posing challenges to the thinking security professional ...
Social engineering – posing challenges to the thinking security professional ...
 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable Claims
 
GDPR Art. 25 - Privacy by design and default
GDPR Art. 25 - Privacy by design and defaultGDPR Art. 25 - Privacy by design and default
GDPR Art. 25 - Privacy by design and default
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative media
 
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionA Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
 
Accessible Privacy and Security
Accessible Privacy and SecurityAccessible Privacy and Security
Accessible Privacy and Security
 
MINDSET BEYOND THE MYTH - practice, applicability and teachability of Design ...
MINDSET BEYOND THE MYTH - practice, applicability and teachability of Design ...MINDSET BEYOND THE MYTH - practice, applicability and teachability of Design ...
MINDSET BEYOND THE MYTH - practice, applicability and teachability of Design ...
 
Lecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security BreachLecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security Breach
 
The Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by DesignThe Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down Attacks
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
 
Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017
 
10 Overriding Themes from SXSW (March 2014)
10 Overriding Themes from SXSW (March 2014)10 Overriding Themes from SXSW (March 2014)
10 Overriding Themes from SXSW (March 2014)
 
Designing products and services with GDPR
Designing products and services with GDPRDesigning products and services with GDPR
Designing products and services with GDPR
 
Protect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLPProtect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLP
 

Último

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

DECODING PRIVACY - Future Implications of Privacy in Technology

  • 1. decoding PRIVACY Diana SCHNEIDER ICED’13 Young Members Event BRISKROAD ambassadors of design thinking future implications of privacy in technology ©-http://experttechnologyreview.com/predic- tions-for-mobile-technology-in-2013/
  • 2. THE PRIVATE REALM WHY THE FUSS PRIVACY STRATEGIES FUTURE ROLE OF DESIGN 1 2 3 4 2Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 3. defining privacy interpersonally negotiated rules of access to the self 3Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 4. min. participants male female expert reviews co-creation sessions MUC SEOUL empirical study understanding perceptions, conflicts and solutions of privacy WORLDWIDE eSurvey ICED’13 Research Presentation 50 197 116 81 10 2 4Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 5. name 5 concrete situations in which you experienced privacy 5Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 6. INFORMATION CULTURE NATURE CONSUMPTION TERRITORY TOGETHERNESS SECLUSION ROOM DIVISION PSEU- DO-SPACE VIRTUAL SPA- CE COMMUNICATIONINTERSPACE MOBILITY DOMESTICITY FAMILIARITY MOTION ENTERTAINMENT ACQUAINTANCEOWNERSHIP INACCESSIBILITY REGENERATION FREEDOM PERSON OF TRUST INTELLECT CREATION isolate interact isolateisolate PLACES OF ENCOUNTER NORMED PLACES BEING UNOBSERVED PHYSICALhuman body member of society identity CONTENTUAL SOCIAL ISOLATE Degree of INTERACTION INTERACT ILLUSORYENVRONMENT SOLITUDE INDIV IDUALCONTENT ENVIRONMENT PEER GROUP INTE RACTION IND IVIDUALEXPERIENCEOFCOLLECTIVITY PRODUCT FRIENDSHIP & RELATEDNESS C O LLECTIVEEXPERIENCE BODY INTIMAC Y C REATIONOFCONT- concentric model of privacy trichotomy of the self 6Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 7. INFORMATION CULTURE NATURE CONSUMPTION TERRITORY TOGETHERNESS SECLUSION ROOM DIVISION PSEU- DO-SPACE VIRTUAL SPA- CE COMMUNICATIONINTERSPACE MOBILITY DOMESTICITY FAMILIARITY MOTION ENTERTAINMENT ACQUAINTANCEOWNERSHIP INACCESSIBILITY REGENERATION FREEDOM PERSON OF TRUST INTELLECT CREATION isolate interact isolateisolate PLACES OF ENCOUNTER NORMED PLACES BEING UNOBSERVED PHYSICALhuman body member of society identity CONTENTUAL SOCIAL ISOLATE Degree of INTERACTION INTERACT ILLUSORYENVRONMENT SOLITUDE INDIV IDUALCONTENT ENVIRONMENT PEER GROUP INTE RACTION IND IVIDUALEXPERIENCEOFCOLLECTIVITY PRODUCT FRIENDSHIP & RELATEDNESS C O LLECTIVEEXPERIENCE BODY INTIMAC Y C REATIONOFCONT- concentric model of privacy trichotomy of the self dinner with friends driving at night sunday morning routine 7Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 8. name 5 recent situations in which your privacy was compromised 8Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 9. LOSS OF CONTROL of an individual over his / her PHYSICAL privacy LOSS OF CONTROL of an individual over his / her SOCIAL privacy LOSS OF CONTROL of an individual over his / her CONTENTUAL privacy CONTROL TAKE-OVER of another‘s PHYSICAL privacy over one‘s own CONTROL TAKE-OVER of another‘s SOCIAL privacy over one‘s own CONTROL TAKE-OVER of another‘s CONTENTUAL privacy over one‘s own INTRUSION Locus of TAKING CONTROL LOSS PHYSICALhuman body member of society identity CONTENTUAL SOCIAL DISRESPECT OF INTIMACY UNPROTECTED CONDEMNATION UNWANTED ENTRANCE INTO PRIVATE CONTENT intrinsic CONTROL over one‘s privacy DANGER EXCESSIVE DISROBEMENT BODILY VULNERABILITY PUBLIC EXPOSURE TRESPASSING THE BODILY/ SENSORIAL PROTECTIVE ZONE INCAPACITY TO FULFILL ONE‘S PUBLIC ROLE ENDANGERED PROPERTY UNWANTED EXCESS OF INFORMATION IRRECONCILABLE ROLES THREATENED DATA THREATENED SENSORIAL SPHERE EXCESS OF PUBLIC ORDER privacy conflicts duality of control between individuals and their surrounding 9Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 10. LOSS OF CONTROL of an individual over his / her PHYSICAL privacy LOSS OF CONTROL of an individual over his / her SOCIAL privacy LOSS OF CONTROL of an individual over his / her CONTENTUAL privacy CONTROL TAKE-OVER of another‘s PHYSICAL privacy over one‘s own CONTROL TAKE-OVER of another‘s SOCIAL privacy over one‘s own CONTROL TAKE-OVER of another‘s CONTENTUAL privacy over one‘s own INTRUSION Locus of TAKING CONTROL LOSS PHYSICALhuman body member of society identity CONTENTUAL SOCIAL DISRESPECT OF INTIMACY UNPROTECTED CONDEMNATION UNWANTED ENTRANCE INTO PRIVATE CONTENT intrinsic CONTROL over one‘s privacy DANGER EXCESSIVE DISROBEMENT BODILY VULNERABILITY PUBLIC EXPOSURE TRESPASSING THE BODILY/ SENSORIAL PROTECTIVE ZONE INCAPACITY TO FULFILL ONE‘S PUBLIC ROLE ENDANGERED PROPERTY UNWANTED EXCESS OF INFORMATION IRRECONCILABLE ROLES THREATENED DATA THREATENED SENSORIAL SPHERE EXCESS OF PUBLIC ORDER privacy conflicts duality of control between individuals and their surrounding bodily contact in crowded public transport camera surveillance in elevators receiving a private phonecall at the office 10Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 11. 2 why the fuss? 11Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 12. current situation privacy crisis? 12Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 13. 13Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 15. 3 privacy strategies 15Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 16. whichstrategies do you use to protect/regain/ ensure your privacy 16Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 17. analogue privacy strategies diversity of ways to acquire and protect privacy 17Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 18. analogue privacy strategies diversity of ways to acquire and protect privacy paperbags to hide bought items time-management and independence towel on deck-chair 18Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 19. ©2013-PAYWORKSGmbH-J.Lechner,C.Deger,D.Bellem,S.Eumes mobile tech. ubiquitous accessibility via portable devices 19Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 20. mobile tech. privacy strategies limitations and lack of user control shut down PC password encrypt data headphones 20Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 21. future role of design 421Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 22. TECHNOLOGY PRIVACY the gap discrepancy between privacy and technologically enabled strategies situative subjective interpersonal individual cultural creative nuanced generic objective impersonal common global basic trivial vs. 22Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 23. empowering through a workable design tool connecting developers and users AWARENESSof relevance UNDERSTANDING of implications ENABLING user control Future Role of Design the bridge + 23Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 24. Online Pre-Survey PRIVACY PERCEPTIONS & CONFLICTS Online CrowdSource Beta PRIVACY IN MOBILE TECH. 10 197 11 awareness blueprint & Developer Interviews SFO Developer Interviews MUC DESIGN ENGINEERING TOOL REAL-TIME USER IDEA PLATFORM it takes two investigating user and developer perspectives now. goalt=0 decoding PRIVACYperceptions, conflicts and strategies of privacy in the mobile world strategies situation description location participants decoding PRIVACYperceptions, conflicts and strategies of privacy in the mobile world conflicts participants PLACES OF ENCOUNTER ISOLATE Degree of INTERACTION INTERACT ILLUSORYENVRONMENT SOLITUDE INDIV IDUALCONTENT ENVIRONMENT PEER GROUP INTE RACTION IND IVIDUALEXPERIENCEOFCOLLECTIVITY PRODUCT FRIENDSHIP & RELATEDNESS C O LLECTIVEEXPERIENCE BODY INTIMAC Y C REATIONOFCONT- PLACES OF ENCOUNTER ISOLATE Degree of INTERACTION INTERACT ILLUSORYENVRONMENT SOLITUDE INDIV IDUALCONTENT ENVIRONMENT PEER GROUP INTE RACTION IND IVIDUALEXPERIENCEOFCOLLECTIVITY PRODUCT FRIENDSHIP & RELATEDNESS C O LLECTIVEEXPERIENCE BODY INTIMAC Y C REATIONOFCONT- OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER SOLUTION HEATMAP PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER SOLUTION HEATMAP privacy DEFINITIONS privacy CONFLICTS privacy STRATEGIES decoding PRIVACYdesign tool OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES LOSS L over his / her vacy OF CONTROL over his / her SOCIAL privacy TROL over his / privacy CONTROL TAKE-OVER of another‘s PHYSICAL privacy over one‘s own CONTROL TAKE-OVER of another‘s SOCIAL privacy over one‘s own TAKE-OVER of another‘s CONTENTUAL privacy over one‘s own INTRUSION Locus of TAKING CONTROL LOSS intrinsic CONTROL LOSS L over his / her vacy OF CONTROL over his / her SOCIAL privacy TROL over his / privacy CONTROL TAKE-OVER of another‘s PHYSICAL privacy over one‘s own CONTROL TAKE-OVER of another‘s SOCIAL privacy over one‘s own TAKE-OVER of another‘s CONTENTUAL privacy over one‘s own INTRUSION Locus of TAKING CONTROL LOSS intrinsic CONTROL CONCEAL OUTSOURCE OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES CONCEAL OUTSOURCE OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES sneak preview www.decodingprivacy.com 24Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 25. Diana SCHNEIDER Design Thinker l Founder d.schneider@briskroad.com www.briskroad.com BRISKROAD ambassadors of design thinking questions? @ S05 - D5 Design for User Experience I Thurs. 08/22 I 10:45am - 12:15pm 25Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy