Diana Schneider presented on decoding privacy at the ICED'13 conference. She discussed defining privacy as interpersonally negotiated rules of access and highlighted current privacy conflicts between individuals and their surroundings. Schneider also outlined strategies for protecting privacy, both analog and digital, and emphasized the future role of design in bridging the gap between privacy needs and technological capabilities by enabling user control and understanding. Her presentation called for investigating user and developer perspectives to inform the creation of a design tool focused on privacy in mobile technologies.
2. THE PRIVATE REALM
WHY THE FUSS
PRIVACY STRATEGIES
FUTURE ROLE OF DESIGN
1
2
3
4
2Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
4. min. participants male female expert
reviews
co-creation
sessions
MUC
SEOUL
empirical study
understanding perceptions, conflicts and solutions of privacy
WORLDWIDE
eSurvey
ICED’13
Research
Presentation
50 197 116 81 10 2
4Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
5. name 5 concrete
situations in which
you experienced
privacy
5Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
8. name 5 recent
situations in which
your privacy was
compromised
8Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
9. LOSS OF CONTROL
of an individual over his /
her PHYSICAL privacy
LOSS OF CONTROL
of an individual over his /
her SOCIAL privacy
LOSS OF CONTROL
of an individual over his /
her CONTENTUAL privacy
CONTROL TAKE-OVER
of another‘s PHYSICAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s SOCIAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s CONTENTUAL
privacy over one‘s own
INTRUSION
Locus of TAKING CONTROL
LOSS
PHYSICALhuman body member of society
identity
CONTENTUAL
SOCIAL
DISRESPECT
OF INTIMACY
UNPROTECTED
CONDEMNATION
UNWANTED ENTRANCE
INTO PRIVATE CONTENT
intrinsic
CONTROL
over one‘s
privacy
DANGER
EXCESSIVE
DISROBEMENT
BODILY
VULNERABILITY
PUBLIC
EXPOSURE
TRESPASSING THE BODILY/
SENSORIAL PROTECTIVE ZONE
INCAPACITY TO FULFILL
ONE‘S PUBLIC ROLE
ENDANGERED
PROPERTY
UNWANTED EXCESS
OF INFORMATION
IRRECONCILABLE
ROLES
THREATENED
DATA
THREATENED
SENSORIAL SPHERE
EXCESS OF
PUBLIC ORDER
privacy conflicts
duality of control between individuals and their surrounding
9Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
10. LOSS OF CONTROL
of an individual over his /
her PHYSICAL privacy
LOSS OF CONTROL
of an individual over his /
her SOCIAL privacy
LOSS OF CONTROL
of an individual over his /
her CONTENTUAL privacy
CONTROL TAKE-OVER
of another‘s PHYSICAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s SOCIAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s CONTENTUAL
privacy over one‘s own
INTRUSION
Locus of TAKING CONTROL
LOSS
PHYSICALhuman body member of society
identity
CONTENTUAL
SOCIAL
DISRESPECT
OF INTIMACY
UNPROTECTED
CONDEMNATION
UNWANTED ENTRANCE
INTO PRIVATE CONTENT
intrinsic
CONTROL
over one‘s
privacy
DANGER
EXCESSIVE
DISROBEMENT
BODILY
VULNERABILITY
PUBLIC
EXPOSURE
TRESPASSING THE BODILY/
SENSORIAL PROTECTIVE ZONE
INCAPACITY TO FULFILL
ONE‘S PUBLIC ROLE
ENDANGERED
PROPERTY
UNWANTED EXCESS
OF INFORMATION
IRRECONCILABLE
ROLES
THREATENED
DATA
THREATENED
SENSORIAL SPHERE
EXCESS OF
PUBLIC ORDER
privacy conflicts
duality of control between individuals and their surrounding
bodily contact
in crowded
public transport
camera
surveillance
in elevators
receiving a
private phonecall
at the office
10Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
16. whichstrategies
do you use to
protect/regain/
ensure your
privacy
16Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
17. analogue privacy strategies
diversity of ways to acquire and protect privacy
17Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
18. analogue privacy strategies
diversity of ways to acquire and protect privacy
paperbags to
hide bought
items
time-management
and independence
towel on
deck-chair
18Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
20. mobile tech. privacy strategies
limitations and lack of user control
shut down PC
password
encrypt data
headphones
20Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
21. future role of design
421Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
22. TECHNOLOGY
PRIVACY
the gap
discrepancy between privacy and technologically enabled strategies
situative
subjective
interpersonal
individual
cultural
creative
nuanced
generic
objective
impersonal
common
global
basic
trivial
vs.
22Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
23. empowering through a workable design tool connecting developers and users
AWARENESSof relevance
UNDERSTANDING of implications
ENABLING user control
Future Role of Design
the bridge
+ 23Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
24. Online Pre-Survey
PRIVACY PERCEPTIONS & CONFLICTS
Online CrowdSource Beta
PRIVACY IN MOBILE TECH.
10
197
11
awareness
blueprint &
Developer Interviews
SFO
Developer Interviews
MUC
DESIGN
ENGINEERING
TOOL
REAL-TIME
USER IDEA
PLATFORM
it takes two
investigating user and developer perspectives
now.
goalt=0
decoding
PRIVACYperceptions, conflicts and strategies of privacy in the mobile world
strategies
situation
description
location
participants
decoding
PRIVACYperceptions, conflicts and strategies of privacy in the mobile world
conflicts
participants
PLACES OF
ENCOUNTER
ISOLATE
Degree of INTERACTION
INTERACT
ILLUSORYENVRONMENT
SOLITUDE
INDIV
IDUALCONTENT
ENVIRONMENT
PEER GROUP
INTE
RACTION
IND
IVIDUALEXPERIENCEOFCOLLECTIVITY
PRODUCT
FRIENDSHIP
&
RELATEDNESS
C
O
LLECTIVEEXPERIENCE
BODY
INTIMAC
Y
C
REATIONOFCONT-
PLACES OF
ENCOUNTER
ISOLATE
Degree of INTERACTION
INTERACT
ILLUSORYENVRONMENT
SOLITUDE
INDIV
IDUALCONTENT
ENVIRONMENT
PEER GROUP
INTE
RACTION
IND
IVIDUALEXPERIENCEOFCOLLECTIVITY
PRODUCT
FRIENDSHIP
&
RELATEDNESS
C
O
LLECTIVEEXPERIENCE
BODY
INTIMAC
Y
C
REATIONOFCONT-
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER
SOLUTION HEATMAP
PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER
SOLUTION HEATMAP
privacy DEFINITIONS
privacy CONFLICTS
privacy STRATEGIES
decoding
PRIVACYdesign tool
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
LOSS L
over his /
her vacy
OF CONTROL
over his /
her SOCIAL privacy
TROL
over his /
privacy
CONTROL TAKE-OVER
of another‘s PHYSICAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s SOCIAL
privacy over one‘s own
TAKE-OVER
of another‘s CONTENTUAL
privacy over one‘s own
INTRUSION
Locus of TAKING CONTROL
LOSS
intrinsic
CONTROL
LOSS L
over his /
her vacy
OF CONTROL
over his /
her SOCIAL privacy
TROL
over his /
privacy
CONTROL TAKE-OVER
of another‘s PHYSICAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s SOCIAL
privacy over one‘s own
TAKE-OVER
of another‘s CONTENTUAL
privacy over one‘s own
INTRUSION
Locus of TAKING CONTROL
LOSS
intrinsic
CONTROL
CONCEAL
OUTSOURCE
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
CONCEAL
OUTSOURCE
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
sneak preview
www.decodingprivacy.com
24Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
25. Diana SCHNEIDER
Design Thinker l Founder
d.schneider@briskroad.com
www.briskroad.com
BRISKROAD
ambassadors of design thinking
questions?
@
S05 - D5 Design for User Experience I Thurs. 08/22 I 10:45am - 12:15pm
25Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy