Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena



Similar documents
Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena

EDS Innovation Research Programme DISCUSSION PAPER SERIES. No.005 Media, Connectivity, Literacies and Ethics

Considering the Cultural Issues of Web Design in Implementing Web-Based E-Commerce for International Customers

Programme Curriculum for Master Programme in Information Systems

Fundamental Concepts and Models

Managing Mobility in the BYOD Era:

IRLS 571: Introduction to Information Technology (SUBJECT TO CHANGE)

Why Your Strategy Isn t Working

Group Membership Salience and the Ethical Aspects of. Globally Integrated Marketing Communications

PEOPLESOFT HUMAN RESOURCES

First Nations Health Information Governance in Action: First Nations Inclusion in the BC Panorama Joint Stewardship Data Governance Model.

Part I: Decision Support Systems

ZAP Business Intelligence Application for Microsoft Dynamics

PERFORMANCE STANDARDS FOR ADVANCED MASTERS PROGRAMS CURRICULUM STUDIES

School of Advanced Studies Doctor Of Health Administration. DHA 003 Requirements

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT

Whitepaper WHY VOICE IN THE CLOUD

NIST Big Data Phase I Public Working Group

Mapping a Social Foundation of HRD: A Framework for Theoretical Development. Russell Korte. University of Illinois at Urbana-Champaign

ARCHITECTURE DESIGN OF SECURITY SYSTEM

IEEE IoT IoT Scenario & Use Cases: Social Sensors

Improving Performance by Breaking Down Organizational Silos. Understanding Organizational Barriers

CRITICAL AND CREATIVE THINKING RUBRIC GRADUATE PROGRAMS

Whitepaper WHY MOVE VOICE TO THE CLOUD

Practical and ethical considerations on the use of cloud computing in accounting

Cybersecurity Research. Online Learning

Cloud Workload Planning and Placement: A New Opportunity

1. Global E Business and Collaboration. Lecture 2 TIM 50 Autumn 2012

Performance Feedback

CORPORATE INFORMATION AND TECHNOLOGY STRATEGY

School of Advanced Studies Doctor Of Management In Organizational Leadership. DM 004 Requirements

HUMAN COMPUTER INTERACTION. Course Convenor: Constantine Stephanidis

HRCS. Round 7. Creating HR Value from the Outside-In

Why Data Mining Research Does Not Contribute to Business?

Instructional Design Framework CSE: Unit 1 Lesson 1

Top 10 Privacy Risks Project

Organizational Leadership

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

NEW AVENUES for e-health RESEARCH

What Makes a Learning Analytics Dashboard Successful?

Designing Effective Web Sites: How Academic Research Influences Practice

Information Technology Strategic Plan

Top 5 Things to Know About The 2014 Edition ONC HIT Certification Program. Rylla Riverman, RN, CISM, GEIT, CHCQM-Fellow Gorylla Inc.

M.S. in Business and Information Systems

Making Data Work. Florida Department of Transportation October 24, 2014

School of Advanced Studies Doctor Of Business Administration. DBA 003 Requirements

Blueprint 2020: Key Interface Requirements to Develop a Knowledge Sharing Infrastructure for the Public Service Workplace

TNS Small Business: Top 10 Trends for 2013

Creating a Publication Work Breakdown Structure

STOF Model & Mobile Ticketing. T Systems Engineering in Data Communications Software Antero Juntunen / Doctoral Student

HRG Assessment The Cloud Computing Challenge

Business Financial Crime: Theories of Motivation

INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT

CLOUD COMPUTING TECHNOLOGY INFRASTRUCTURE TO SUPPORT THE KNOWLEDGE MANAGEMENT PROCESS (A CASE STUDY APPROACH)

Enterprise effectiveness of digital certificates: Are they ready for prime-time?

Course Author: Dr. Monica Belcourt, School of Human Resource Management, York University; Ron Alexandrowich and Mark Podolsky

WOMEN S RECOVERY CENTER 25 Beulah Road New Britain, Pennsylvania VOLUNTEER APPLICATION NAME: DATE: ADDRESS: TELEPHONE: EDUCATION:

International Society of Exposure Science (ISES) Strategic Plan: Creating a Safer and Healthier World by Advancing The Science of Exposure

Soft Skills Requirements in Software Architecture s Job: An Exploratory Study

Enterprise risk management: A pragmatic, four-phase implementation plan

Understanding E-Signatures: A Beginner s Guide

School of Advanced Studies Doctor Of Management In Organizational Leadership/information Systems And Technology. DM/IST 004 Requirements

FORUM ON TAX ADMINISTRATION

Consulting Performance, Rewards & Talent. Making Employee Engagement Happen: Best Practices from Best Employers

Study Plan in Psychology Education

A Framework of Smart Internet of Things based Cloud Computing

Course Title: Introduction to Human Computer Interaction Course Number: HCI101 Course Prerequisites: none Credit Hours: 3 General Studies Credits: 0

A Rational Software & Context Integration white paper

BIG DATA & ANALYTICS. Transforming the business and driving revenue through big data and analytics

How To Build Privacy Into Information Technology

Qualitative data acquisition methods (e.g. Interviews and observations) -.

Critical design goggles: Explorative use of critical design perspectives in a video production project

Access to Electronic PHI Finding the Balance. Security, Convenience, and Usability

CS6031 Interactive Media in Society Cristiano Storni Week 10 Assignment Colm Walsh

Making the Connection

Evaluation of Adaptive Web Systems

Management Fundamentals in Healthcare Organizations

QUALITY ONLINE EDUCATION: PERCEPTION OR REALITY? Dr. Kaye Shelton Associate Professor, Lamar University Consultant, Online Learning Consortium

MASTER OF SCIENCE (MSc) IN ENGINEERING (SOFTWARE ENGINEERING) (Civilingeniør, Cand. Polyt. i Software Engineering)

Trust areas: a security paradigm for the Future Internet

Ph. D. Program in Education Specialization: Educational Leadership School of Education College of Human Sciences Iowa State University

MEDICAL SCIENCES Vol.II -Human Aspects of Health Care Information Systems - Andre Kushniruk, Joseph Kannry

School of Advanced Studies Doctor Of Education In Educational Leadership With A Specialization In Educational Technology. EDD/ET 003 Requirements

School of Business Bachelor Of Science In Business With A Concentration In Marketing. Required Course of Study

Guidelines for Integrative Core Curriculum Themes and Perspectives Designations

Print Management customers have a print first mentality Print management tools are utilized daily by the majority of users in an organization

Strategic approach to cloud computing deployment

2012 VISUAL ART STANDARDS GRADES K-1-2

STEPS OF THE ETHICAL DECISION-MAKING PROCESS

Software development for the on demand enterprise. Building your business with the IBM Software Development Platform

Helen Featherstone, Visitor Studies Group and University of the West of England, Bristol

Software Engineering/Courses Description Introduction to Software Engineering Credit Hours: 3 Prerequisite: (Computer Programming 2).

ORGANISATIONAL CULTURE. Students what do you all think Organizational Culture is? Can you all define it in your own way.

Syllabus Study Programme in Occupational Therapy

Distributing Interaction in Responsive Cross-Device Applications

Basic Unified Process: A Process for Small and Agile Projects

G u i d e l i n e s f o r K12 Global C l i m a t e Change Education

A Framework of Context-Sensitive Visualization for User-Centered Interactive Systems

Session 4. System Engineering Management. Session Speaker : Dr. Govind R. Kadambi. M S Ramaiah School of Advanced Studies 1

Enterprise 2.0 in Action: Potentials for Improvement of Awareness Support in Enterprises

Transcription:

Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena Paul Dourish and Ken Anderson Presented by: Monika Akbar

Overview Privacy & Security in HCI 3 parallel approach to people and privacy Social & cultural practice Risk, danger, morality Secrecy, trust, identity Collective information practice in design Discussion

HCI perspective on security & privacy Three types of research Investigation of current security practice Usability of security software systems Security cannot be grafted on to a design once it is completed Novel technology for people to understand and manage privacy and security P3P

Other works Ubiquitous computing Infrastructure: PlaceLab Application environment: ActiveCampus Novel application: Reno Information technology and privacy Study of social context Public policy Social analysi s Organizational practice Information Systems Design

Overview Privacy & Security in HCI 3 Models of information practices Social & cultural effect on people and privacy Risk, danger, morality Secrecy, trust, identity Collective information practice in design Discussion

Thinking about People and Privacy Argument Privacy and Security has social origin Explore the nature & scope of this origin Information Practice: people & privacy 3 Parallel approaches Privacy as a Economic Rationality Privacy as Practical Action Privacy as Discursive Practice

Privacy as Economic Rationality Information as commodity Cost benefit as Risk reward Economic model Concept of exchange value Figure of rational actor Models collective actions as outcome of individual decision making by rational actors optimizing for individual benefit Consumer Cost Benefit Service Provider

Privacy as Economic Rationality Problem: based more on activities Psychology Social Factors Economic principles Fails to recognize privacy is a social practice Privacy is not a way that information is managed but how social relations are managed Fails To capture sharing of secrets Morality of full disclosure

Overview Privacy & Security in HCI 3 Models of information practices Privacy as a Economic Rationality Privacy as Practical Action Privacy as Discursive Practice Social & cultural effect on people and privacy Risk, danger, morality Secrecy, trust, identity Collective information practice in design Discussion

Privacy as Practical Action From abstract idea to what people do Focus on practice Two major implications Cost benefit Privacy & security are continual ongoing accomplishments Surroundings Information Activity Privacy & security are pervasive elements of everyday settings

Overview Privacy & Security in HCI 3 Models of information practices Privacy as a Economic Rationality Privacy as Practical Action Privacy as Discursive Practice Social & cultural effect on people and privacy Risk, danger, morality Secrecy, trust, identity Collective information practice in design Discussion

Privacy as Discursive Practice Understand how privacy and security is used To categorize activities, events and setting Separating acceptable (secure) actions from unacceptable (insecure) actions. Corporate security organizational convenience ahead of personal ones

Overview Privacy & Security in HCI 3 Models of information practices Privacy as a Economic Rationality Privacy as Practical Action Privacy as Discursive Practice Social & cultural effect on people and privacy Risk, danger, morality Secrecy, trust, identity Collective information practice in design Discussion

Risk, danger, morality Security is defined with respect to perceived risks Cultural aspect of risk formulation Douglas and Wildavsky (1982) Cultural, Political and Moral judgments Risk perception is relative to social structure Risk Society risk at the center of social life

Secrecy and collective identity Secrecy is connected with social boundaries Secret disclosure endanger Cultures of secrecy Information and its flow is meaningful to those who are part of this group membership Flow of information reproduce those cultures Objects and artifacts not public, not private Used to create boundaries Information practices in Info. Systems design Selective sharing of information Appropriate management (forgetting, not noticing) Identity as manageable component of social life SIM cards, Instant messaging

Overview Privacy & Security in HCI 3 Models of information practices Privacy as a Economic Rationality Privacy as Practical Action Privacy as Discursive Practice Social & cultural effect on people and privacy Risk, danger, morality Secrecy, trust, identity Collective information practice in design Discussion

Collective information practice in design Information Practice Ways in which we collectively share, withhold and manage information How we interpret and deploy such acts Focus on information practice Contribute to the development of analytic perspective Collective information practice: target for design Current development efforts Visualizing system activity Integrating configuration and action Support collective shaping and sharing not collective practice

Discussion Contribution 3 models Economic: risk vs. reward Information practice: collaborative process Practices are ways in which social actions are achieved. Noted different and dynamic social context within which people are embedded Information need & user continually subject to change, revision and reinterpretation Risk, danger, trust, secrecy Goal not to transform privacy into a technical property but to support the collective practice

Conclusion Privacy & Security from Social & Cultural point No artifact/object is inherently public or private Social cultural moral judgments are used to define risk social products rather than natural fact. Ongoing process that evolves Issues Less focus on privacy, more on security Social context Influence of space on privacy/behavior

Thank You